Secure Group Communication in Constrained Networks. A Gap Analysis

Size: px
Start display at page:

Download "Secure Group Communication in Constrained Networks. A Gap Analysis"

Transcription

1 Tobias Guggemos, Nils gentschen Felde, Dieter Kranzlmüller MNM-Team Ludwig-Maximilians-Universität München Secure Group Communication in Constrained Networks A Gap Analysis IEEE Global IoT Summit 2017 Geneva, Switzerland 1

2 Motivation Since ~2013: Several and long discussions about Secure Group Communication in IETF working groups (DICE, ACE, ) 2

3 The Goal Toolbox for Secure Group Communication in constrained environments (e.g. IoT) 3

4 Motivation - Testbed Devices Arduino Uno Arduino M0+ Arduino Due ESP 8266 Raspberry Pi (v1-v3) Banana Pi Beaglebone Architecture ATmega328 ARM Cortex-M0+ ARM Cortex-M3 Tensilica L106 ARMv6 ARMv8 CPU 16 MHz 48 MHz 84 MHz MHz MHz RAM 2 KB 32 KB 96 KB 64 KB MB Flash 32 KB 256 KB 512 KB 1 MB Operating System RIOT OS RIOT OS RIOT OS Free RTOS Linux 4

5 Motivation 5

6 Motivation Is there any formal description for secure group communication in constrained networks? 6

7 What is Group Communication? Group communication includes most major IoT-related communication models 1:n communication 1:1 communication Securing groups can help securing IoT in general Group communication is a management problem! n:1 communication n:m communication 7

8 Question What is Secure Group Communication What is Secure Group Management 8

9 What is secure? Definition according to ISO/IEC 27000: information security preservation of confidentiality (2.13), integrity (2.36) and availability (2.10) of information NOTE In addition, other properties, such as authenticity (2.9), accountability (2.2), nonrepudiation (2.49), and reliability (2.56) can also be involved. [ISO/IEC27000, 2.30] 9

10 What does that mean for Group Communication? Definition according to ISO/IEC 27000: Property that information security information is not preservation of confidentiality: made confidentiality available or (2.13), integrity (2.36) and availability (2.10) of Data Encryption information disclosed to (usually symmetric) NOTE In addition, unauthorized (Group) other Key properties, Distributionsuch as authenticity (2.9), accountability (2.2), nonrepudiation (2.49), individuals, to authorized and reliability members (2.56) can also be involved. entities or processes [ISO/IEC27000, 2.13] [ISO/IEC27000, 2.30] 10

11 What does that mean for Group Communication? Definition according to ISO/IEC 27000: information security integrity: preservation of confidentiality (2.13), Cryptographic integrity (2.36) Signatures and availability (2.10) of information Property Group Integrity of accuracy and completeness Key Distribution(!!!) NOTE In addition, other properties, such as Sender authenticity [ISO/IEC27000, Integrity (2.9), 2.40] accountability (2.2), nonrepudiation (2.49), and reliability (2.56) can also be involved. PKI [ISO/IEC27000, 2.30] 11

12 What does that mean for Group Communication? Definition according to ISO/IEC 27000: information security availability: preservation of confidentiality (2.13), integrity (2.36) and Member Property availability can of being join (2.10) group of information Group accessible Management and usable (GM) upon AAIdemand NOTE In addition, other properties, such as authenticity (2.9), accountability (2.2), nonrepudiation (2.49), and reliability (2.56) can also be by an Secure authorized GM entity involved. [ISO/IEC27000, 2.9] [ISO/IEC27000, 2.30] 12

13 What does that mean for Group Communication? Definition according to ISO/IEC 27000: information security preservation of confidentiality (2.13), integrity (2.36) and availability (2.10) of information NOTE In addition, other properties, such as authenticity (2.9), accountability (2.2), nonrepudiation (2.49), and reliability (2.56) reliability: can also be involved. Property of consistent intended [ISO/IEC27000, 2.30] Reliable GM behaviour grant and and revoke results membership [ISO/IEC27000, 2.62] 13

14 What does that mean for Group Communication? Definition according to ISO/IEC 27000: information security preservation of confidentiality (2.13), integrity (2.36) and availability (2.10) of information NOTE In addition, other properties, such as authenticity (2.9), accountability: (2.2), nonrepudiation (2.49), and reliability (2.56) can also be involved. Assignment of actions Right Management and decisions [ISO/IEC27000, 2.30] to an entity join, leave, create,destroy send messages [ISO/IEC27000, 2.2] 14

15 What does that mean for Group Communication? Definition according to ISO/IEC 27000: information security preservation of confidentiality (2.13), integrity (2.36) and availability (2.10) of information NOTE In addition, other properties, such as authenticity: (2.9), accountability (2.2), nonrepudiation (2.49), and reliability (2.56) can also be involved. Property Signatures that with an entity is what it claims to be [ISO/IEC27000, 2.30] sender identification Identity Management Public Key Infrastructure [ISO/IEC27000, 2,2] 15

16 What does that mean for Group Communication? Definition according to ISO/IEC 27000: information security preservation of confidentiality (2.13), integrity (2.36) and availability (2.10) of information NOTE In non-repudiation: addition, other properties, such as authenticity (2.9), accountability (2.2), nonrepudiation Ability (2.49), to prove and the reliability (2.56) can also be involved. occurrence Sender Authentication of a claimed [ISO/IEC27000, 2.30] AND event Identity or action and its AND originating Public Key entities Management Message ID (Seq. Nr) Acknowledgement (?) [ISO/IEC27000, 2.54] 16

17 Gap Analysis 17

18 Current & Further Investigations Group (Key) Management G-IKEv2 (GDOI, GKMP) Group-DTLS Identity Management Public Key Management Confidentiality / Integrity DTLS IPsec Authentication / Non-Repudiation TESLA EMSS Identity Based Signatures (IBS) Lightweight Cryptography Elliptic Curves Walnut DSA Based on Lattices 18

19 Conclusion / Take Aways Secure Group Communication is a management problem We defined properties for Secure Group Management Analysis shows no existing IoT-aware solution Research requires a solid testbed: MNM-Team setup: 19

20 The End Curious? Tobias Guggemos MNM-Team Ludwig-Maximilians-Universität München 20

21 Testbed 21

Electronics Single Board Computers

Electronics Single Board Computers Electronics Single Board Computers Wilfrid Laurier University November 23, 2016 Single Board Computers Single Board Computers As electronic devices get smaller and more sophisticated, they often contain

More information

SAFEcrypto: Secure Architectures of Future Emerging cryptography

SAFEcrypto: Secure Architectures of Future Emerging cryptography SAFEcrypto: Secure Architectures of Future Emerging cryptography Máire O Neill Queen s University Belfast This project has received funding from the European Union H2020 research and innovation programme

More information

Delegated Authenticated Authorization for Constrained Environments

Delegated Authenticated Authorization for Constrained Environments Delegated Authenticated Authorization for Constrained Environments Stefanie Gerdes, Olaf Bergmann, Carsten Bormann {gerdes bergmann cabo}@tzi.org Universität Bremen NPSec 14, 2014-10-21 Motivation Smart

More information

Public Key Infrastructure

Public Key Infrastructure Public Key Infrastructure Ed Crowley Summer 11 1 Topics Public Key Infrastructure Defined PKI Overview PKI Architecture Trust Models Components X.509 Certificates X.500 LDAP 2 Public Key Infrastructure

More information

Legacy-Compliant Data Authentication for Industrial Control System Traffic

Legacy-Compliant Data Authentication for Industrial Control System Traffic Legacy-Compliant Data Authentication for Industrial Control System Traffic John Henry Castellanos, Daniele Antonioli, Nils Ole Tippenhauer and Martín Ochoa Singapore University of Technology and Design

More information

Uses of Cryptography

Uses of Cryptography Uses of Cryptography What can we use cryptography for? Lots of things Secrecy Authentication Prevention of alteration Page 1 Cryptography and Secrecy Pretty obvious Only those knowing the proper keys can

More information

BCA III Network security and Cryptography Examination-2016 Model Paper 1

BCA III Network security and Cryptography Examination-2016 Model Paper 1 Time: 3hrs BCA III Network security and Cryptography Examination-2016 Model Paper 1 M.M:50 The question paper contains 40 multiple choice questions with four choices and student will have to pick the correct

More information

Standardisation efforst in lightweight cryptography

Standardisation efforst in lightweight cryptography Standardisation efforts in lighweight cryptography February 2, 2014 Outline Motivation for standardisation. Keeloq. Standardisation processes and structures at ISO. What is in the ISO standards currently?

More information

Post-Quantum Cryptography

Post-Quantum Cryptography Post-Quantum Cryptography Professor Máire O Neill www.csit.qub.ac.uk CSIT is a Research Centre of the ECIT Institute 1 Rationale What happens if/when quantum computers become a reality? Commonly used Public-key

More information

Major Components of the Internet of Things Systems

Major Components of the Internet of Things Systems Major Components of the Internet of Things Systems 1 1. Sensors and Control Units 2 Sensors Analog Sensors: thermistor, photoconductor, pressure gauge and Hall sensor Digital Sensors: touch sensor, proximity

More information

1) Revision history Revision 0 (Oct 29, 2008) First revision (r0)

1) Revision history Revision 0 (Oct 29, 2008) First revision (r0) To: INCITS Technical Committee T10 From: David L. Black, EMC Email: black_david@emc.com Date: October 29, 2008 Subject: SPC-4: Digital Signature Authentication (08-423r0) 1) Revision history Revision 0

More information

Getting to Grips with Public Key Infrastructure (PKI)

Getting to Grips with Public Key Infrastructure (PKI) Getting to Grips with Public Key Infrastructure (PKI) What is a PKI? A Public Key Infrastructure (PKI) is a combination of policies, procedures and technology that forms a trust infrastructure to issue

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 9594-8 Sixth edition 2008-12-15 Information technology Open Systems Interconnection The Directory: Publickey and attribute certificate frameworks Technologies de l'information

More information

UNIT - IV Cryptographic Hash Function 31.1

UNIT - IV Cryptographic Hash Function 31.1 UNIT - IV Cryptographic Hash Function 31.1 31-11 SECURITY SERVICES Network security can provide five services. Four of these services are related to the message exchanged using the network. The fifth service

More information

Cryptographic Concepts

Cryptographic Concepts Outline Identify the different types of cryptography Learn about current cryptographic methods Chapter #23: Cryptography Understand how cryptography is applied for security Given a scenario, utilize general

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 9594-8 Fifth edition 2005-12-15 Information technology Open Systems Interconnection The Directory: Publickey and attribute certificate frameworks Technologies de l'information

More information

Loosely Coupled Actor Systems

Loosely Coupled Actor Systems Loosely Coupled Actor Systems for the Internet of Things Raphael Hiesgen Internet Technologies Group Hamburg University of Applied Sciences Agenda Introduction Where We Are Next Steps Risks and Conclusion

More information

Public Key Infrastructure PKI. National Digital Certification Center Information Technology Authority Sultanate of Oman

Public Key Infrastructure PKI. National Digital Certification Center Information Technology Authority Sultanate of Oman Public Key Infrastructure PKI National Digital Certification Center Information Technology Authority Sultanate of Oman Agenda Objectives PKI Features etrust Components Government eservices Oman National

More information

The Design and Implementation of the NDN Protocol Stack for RIOT-OS

The Design and Implementation of the NDN Protocol Stack for RIOT-OS The Design and Implementation of the NDN Protocol Stack for RIOT-OS Wentao Shang, Alex Afanasyev, Lixia Zhang UCLA Presented by Alex Afanasyev December 8, 2016 Workshop on Information Centric Networking

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography Objectives Define cryptography Describe hashing List the basic symmetric cryptographic algorithms 2 Objectives

More information

The Cryptographic Sensor

The Cryptographic Sensor The Cryptographic Sensor Libor Dostálek and Václav Novák {libor.dostalek, vaclav.novak}@prf.jcu.cz Faculty of Science University of South Bohemia České Budějovice Abstract The aim is to find an effective

More information

SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY Secure applications and services Security protocols

SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY Secure applications and services Security protocols I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T X.1159 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (11/2014) SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY

More information

ISO INTERNATIONAL STANDARD. Road vehicles Extended data link security. Véhicules routiers Sécurité étendue de liaison de données

ISO INTERNATIONAL STANDARD. Road vehicles Extended data link security. Véhicules routiers Sécurité étendue de liaison de données INTERNATIONAL STANDARD ISO 15764 First edition 2004-08-15 Road vehicles Extended data link security Véhicules routiers Sécurité étendue de liaison de données Reference number ISO 15764:2004(E) ISO 2004

More information

Danube University Krems. The University for Continuing Education. Security Issues in Resource-limited Sensor Networks. Thilo Sauter Albert Treytl

Danube University Krems. The University for Continuing Education. Security Issues in Resource-limited Sensor Networks. Thilo Sauter Albert Treytl Danube University Krems. The University for Continuing Education. Security Issues in Resource-limited Sensor Networks Thilo Sauter Albert Treytl Wireless Sensor Network Vision High-level company functions

More information

Diffie-Hellman. Part 1 Cryptography 136

Diffie-Hellman. Part 1 Cryptography 136 Diffie-Hellman Part 1 Cryptography 136 Diffie-Hellman Invented by Williamson (GCHQ) and, independently, by D and H (Stanford) A key exchange algorithm o Used to establish a shared symmetric key Not for

More information

Chapter 6: Security of higher layers. (network security)

Chapter 6: Security of higher layers. (network security) Chapter 6: Security of higher layers (network security) Outline TLS SET 1. TLS History of TLS SSL = Secure Socket Layer defined by Netscape normalized as TLS TLS = Transport Layer Security between TCP

More information

Elliptic Curve Cryptography (ECC) based. Public Key Infrastructure (PKI) Kunal Abhishek Society for Electronic Transactions & Security (SETS), Chennai

Elliptic Curve Cryptography (ECC) based. Public Key Infrastructure (PKI) Kunal Abhishek Society for Electronic Transactions & Security (SETS), Chennai Elliptic Curve Cryptography (ECC) based Public Key Infrastructure (PKI) Kunal Abhishek Society for Electronic Transactions & Security (SETS), Chennai 14th November, 2017 Focus of this talk What should

More information

Information technology Security techniques Cryptographic algorithms and security mechanisms conformance testing

Information technology Security techniques Cryptographic algorithms and security mechanisms conformance testing INTERNATIONAL STANDARD ISO/IEC 18367 First edition 2016-12-15 Information technology Security techniques Cryptographic algorithms and security mechanisms conformance testing Technologie de l information

More information

ISACA CISA. ISACA CISA ( Certified Information Systems Auditor ) Download Full Version :

ISACA CISA. ISACA CISA ( Certified Information Systems Auditor ) Download Full Version : ISACA CISA ISACA CISA ( Certified Information Systems Auditor ) Download Full Version : http://killexams.com/pass4sure/exam-detail/cisa QUESTION: 390 Applying a digital signature to data traveling in a

More information

Innovation and Cryptoventures. Technology 101. Lee Jacobs and Campbell R. Harvey. February 22, 2017

Innovation and Cryptoventures. Technology 101. Lee Jacobs and Campbell R. Harvey. February 22, 2017 Innovation and Cryptoventures Technology 101 Lee Jacobs and Campbell R. Harvey February 22, 2017 What is a computer? Electronic device that has the ability to store, retrieve, and process data Hardware

More information

The Application of Elliptic Curves Cryptography in Embedded Systems

The Application of Elliptic Curves Cryptography in Embedded Systems The Application of Elliptic Curves Cryptography in Embedded Systems Wang Qingxian School of Computer Science and Engineering University of Electronic Science and Technology China Introduction to Cryptography

More information

Digital Certificates Demystified

Digital Certificates Demystified Digital Certificates Demystified Ross Cooper, CISSP IBM Corporation RACF/PKI Development Poughkeepsie, NY Email: rdc@us.ibm.com August 9 th, 2012 Session 11622 Agenda Cryptography What are Digital Certificates

More information

The 5 Elements of IoT Security. Julien Vermillard - Sierra Wireless

The 5 Elements of IoT Security. Julien Vermillard - Sierra Wireless The 5 Elements of IoT Security Julien Vermillard - Sierra Wireless Who am I? Software Engineer Sierra Wireless AirVantage.net cloud service Eclipse IoT: Leshan project lead Wakaama and Californium committer

More information

JerryScript An ultra-lightweight JavaScript engine for the Internet of Things

JerryScript An ultra-lightweight JavaScript engine for the Internet of Things JerryScript An ultra-lightweight JavaScript engine for the Internet of Things Tilmann Scheller Principal Compiler Engineer t.scheller@samsung.com Samsung Research UK OpenIoT Summit Europe 2016 Berlin,

More information

Performance and overhead evaluation of OSCOAP and DTLS

Performance and overhead evaluation of OSCOAP and DTLS Performance and overhead evaluation of OSCOAP and DTLS Martin Gunnarsson 1, Tobias Andersson 1, Ludwig Seitz 1 1 RISE SICS AB Box 1263, Kista 16429, Sweden {martin.gunnarsson, tobias.andersson, ludwig.seitz}@ri.se

More information

Employing Attribute-Based Encryption in Systems with Resource Constrained Devices in an Information-Centric Networking Context

Employing Attribute-Based Encryption in Systems with Resource Constrained Devices in an Information-Centric Networking Context Employing Attribute-Based Encryption in Systems with Resource Constrained Devices in an Information-Centric Networking Context Global IoT Summit (GIoTS) Geneva, June 6-9, 2017 Börje Ohlman Ericsson Research

More information

ETSI TS V7.1.0 ( )

ETSI TS V7.1.0 ( ) TS 102 266 V7.1.0 (2006-01) Technical Specification Smart Cards; USSM: UICC Security Service Module; Stage 1 2 TS 102 266 V7.1.0 (2006-01) Reference RTS/SCP-R0002r1 Keywords smart card, security 650 Route

More information

INTERNATIONAL STANDARD

INTERNATIONAL STANDARD INTERNATIONAL STANDARD This is a preview - click here to buy the full publication ISO/IEC 9594-8 Eighth edition 2017-05 Information technology Open Systems Interconnection The Directory Part 8: frameworks

More information

Lecture III : Communication Security Mechanisms

Lecture III : Communication Security Mechanisms Lecture III : Communication Security Mechanisms Internet Security: Principles & Practices John K. Zao, PhD (Harvard) SMIEEE Computer Science Department, National Chiao Tung University 2 X.800 : Security

More information

Overview. SSL Cryptography Overview CHAPTER 1

Overview. SSL Cryptography Overview CHAPTER 1 CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet. SSL ensures the secure transmission of data between a client and a server through

More information

SOSCON 2016 JerryScript

SOSCON 2016 JerryScript SOSCON 2016 JerryScript An ultra-lightweight JavaScript engine for the Internet of Things Samsung Electronics SRUK OSG Tilmann Scheller 18.11.2016 Overview Introduction JerryScript JerryScript Internals

More information

CSC 774 Network Security

CSC 774 Network Security CSC 774 Network Security Mid-Term Exam #2 4:10pm 5:00pm, March 26, 2004 Student Name: Score: You are allowed to use your textbook and notes; however, you are not allowed to exchange anything before you

More information

CCNA Security 1.1 Instructional Resource

CCNA Security 1.1 Instructional Resource CCNA Security 1.1 Instructional Resource Chapter 7 Cryptographic Systems 2012 Cisco and/or its affiliates. All rights reserved. 1 Explain how cryptology consists of cryptography (encoding messages) and

More information

Feasibility of Security in Micro-Controllers. Aaron Ardiri!!!!!!!! Chief Technology Officer - Evothings AB

Feasibility of Security in Micro-Controllers. Aaron Ardiri!!!!!!!! Chief Technology Officer - Evothings AB Feasibility of Security in Micro-Controllers Aaron Ardiri!!!!!!!! Chief Technology Officer - Evothings AB jfokus IoT, Stockholm!!!!!!!!!!!!!! 3rd February, 2015 Overview IoT Security! why is it such a

More information

Security and Privacy in the Internet of Things : Antonio F. Skarmeta

Security and Privacy in the Internet of Things : Antonio F. Skarmeta Security and Privacy in the Internet of Things : Antonio F. Skarmeta University of Murcia (UMU) SPAIN Motivation Security and privacy concerns were always there but we need to move from

More information

Lecture 1: Introduction to Security Architecture. for. Open Systems Interconnection

Lecture 1: Introduction to Security Architecture. for. Open Systems Interconnection Lecture 1: Introduction to Security Architecture for Open Systems Interconnection 1. Purpose of Document This document includes notes to guide the self-study of the students of the lectures on Network

More information

KALASALINGAM UNIVERSITY

KALASALINGAM UNIVERSITY KALASALINGAM UNIVERSITY (Kalasalingam Academy of Research and Education) DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING CLASS NOTES CRYPTOGRAPHY AND NETWOTK SECURITY (CSE 405) Prepared by M.RAJA AP/CSE

More information

Implementation of an RFID Key Management System for DASH7

Implementation of an RFID Key Management System for DASH7 J. lnf. Commun. Converg. Eng. 12(1): 19-25, Mar. 2014 Regular paper Implementation of an RFID Key Management System for DASH7 Aparna Vegendla, Hwajeong Seo, Donggeon Lee, and Howon Kim *, Member, KIICE

More information

ASC Chairman. Best Practice In Data Security In The Cloud. Speaker Name Dr. Eng. Bahaa Hasan

ASC Chairman. Best Practice In Data Security In The Cloud. Speaker Name Dr. Eng. Bahaa Hasan Regional Forum on Cybersecurity in the Era of Emerging Technologies & the Second Meeting of the Successful Administrative Practices -2017 Cairo, Egypt 28-29 November 2017 Best Practice In Data Security

More information

ENABLING EMBEDDED UA SECURITY AND DISCOVERY

ENABLING EMBEDDED UA SECURITY AND DISCOVERY ENABLING EMBEDDED UA SECURITY AND DISCOVERY Liam Power Principal Engineer, Embedded Systems Copyright 2014 2012 Matrikon Inc. STATE OF EMBEDDED TECHNOLOGY Copyright 2014 2012 Matrikon Inc. Mountain View,

More information

Security in sensors, an important requirement for embedded systems

Security in sensors, an important requirement for embedded systems Security in sensors, an important requirement for embedded systems Georg Sigl Institute for Security in Information Technology Technical University Munich sigl@tum.de Fraunhofer AISEC Institute for Applied

More information

Lesson 7 Programming Embedded Galileo, Raspberry Pi, BeagleBone and mbed Platforms

Lesson 7 Programming Embedded Galileo, Raspberry Pi, BeagleBone and mbed Platforms Lesson 7 Programming Embedded Galileo, Raspberry Pi, BeagleBone and mbed Platforms 1 Development Of Programs For Prototype Development Platforms Done using an IDE The cycles of edit-test-debug used When

More information

The friendly operating system for the IoT!

The friendly operating system for the IoT! The friendly operating system for the IoT! www.riot-os.org AGENDA Internet of Things: Which OS? RIOT in a nutshell RIOT user and developer evolution Roadmap www.riot-os.org 2 The Internet of Things (IoT)

More information

Introduction to Security

Introduction to Security to Security CSS322: Security and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 31 October 2012 CSS322Y12S2L01, Steve/Courses/2012/s2/css322/lectures/introduction.tex,

More information

Assurance Activity Report (AAR) for a Target of Evaluation

Assurance Activity Report (AAR) for a Target of Evaluation Assurance Activity Report (AAR) for a Target of Evaluation Apple IOS 10.2 VPN Client on iphone and ipad Apple IOS 10.2 VPN Client Security Target Version 1.0, July 2017 Protection Profile for IPsec Virtual

More information

Satisfying CC Cryptography Requirements through CAVP/CMVP Certifications. International Crypto Module Conference May 19, 2017

Satisfying CC Cryptography Requirements through CAVP/CMVP Certifications. International Crypto Module Conference May 19, 2017 Satisfying CC Cryptography Requirements through CAVP/CMVP Certifications International Crypto Module Conference May 19, 2017 Synopsis Background NIAP policy relating to cryptographic requirements NIAP

More information

Internet Engineering Task Force Mark Baugher(Cisco) Expires: April, 2003 October, 2002

Internet Engineering Task Force Mark Baugher(Cisco) Expires: April, 2003 October, 2002 Internet Engineering Task Force Mark Baugher(Cisco) INTERNET-DRAFT Thomas Hardjono (Verisign) Category: Standards Track Hugh Harney (Sparta) Document: draft-ietf-msec-gdoi-06.txt Brian Weis (Cisco) Expires:

More information

Key Management in IP Multicast

Key Management in IP Multicast Key Management in IP Multicast Petri Jokela Helsinki University of Technology petri.jokela@nomadiclab.com ABSTRACT The IP networking was originally designed to operate in point topoint way. However, when

More information

Cryptography Introduction

Cryptography Introduction Cryptography Introduction Last Updated: Aug 20, 2013 Terminology Access Control o Authentication Assurance that entities are who they claim to be o Authorization Assurance that entities have permission

More information

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Security Architecture. Lecture 13: Prof. Shervin Shirmohammadi CEG

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Security Architecture. Lecture 13: Prof. Shervin Shirmohammadi CEG Lecture 13: Security Architecture Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 13-1 Network Assets and Security Threats Assets: Hardware (PC, workstation,

More information

Network Security: Broadcast and Multicast. Tuomas Aura T Network security Aalto University, Nov-Dec 2010

Network Security: Broadcast and Multicast. Tuomas Aura T Network security Aalto University, Nov-Dec 2010 Network Security: Broadcast and Multicast Tuomas Aura T-110.5240 Network security Aalto University, Nov-Dec 2010 Outline 1. Broadcast and multicast 2. Receiver access control (i.e. data confidentiality)

More information

IoT.js. Next generation web for connected things. Samsung Electronics Software Center Piotr Marcinkiewicz 2017

IoT.js. Next generation web for connected things. Samsung Electronics Software Center Piotr Marcinkiewicz 2017 IoT.js Next generation web for connected things Samsung Electronics Software Center Piotr Marcinkiewicz 2017 Agenda Introduction Architecture Node.js vs. IoT.js APIs You are invited Community Q&A 01 02

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 9594-8 Fourth edition 2001-08-01 Information technology Open Systems Interconnection The Directory: Public-key and attribute certificate frameworks Technologies de l'information

More information

Leveraging Blockchain-based protocols in IoT systems

Leveraging Blockchain-based protocols in IoT systems Leveraging Blockchain-based protocols in IoT systems Angelos Stavrou Volgenau School of Engineering Talk Outline Overview of IoT Security Failures in IoT: Motivating Use Cases Why direct use of Blockchain

More information

High-performance aspects in virtualized infrastructures

High-performance aspects in virtualized infrastructures SVM 21 High-performance aspects in virtualized infrastructures Vitalian Danciu, Nils gentschen Felde, Dieter Kranzlmüller, Tobias Lindinger SVM 21 - HPC aspects in virtualized infrastructures 1/29/21 Niagara

More information

About FIPS, NGE, and AnyConnect

About FIPS, NGE, and AnyConnect About FIPS, NGE, and AnyConnect, on page 1 Configure FIPS for the AnyConnect Core VPN Client, on page 4 Configure FIPS for the Network Access Manager, on page 5 About FIPS, NGE, and AnyConnect AnyConnect

More information

UNIVERSITY OF MASSACHUSETTS Dept. of Electrical & Computer Engineering. Introduction to Cryptography ECE 597XX/697XX

UNIVERSITY OF MASSACHUSETTS Dept. of Electrical & Computer Engineering. Introduction to Cryptography ECE 597XX/697XX UNIVERSITY OF MASSACHUSETTS Dept. of Electrical & Computer Engineering Introduction to Cryptography ECE 597XX/697XX Part 10 Digital Signatures Israel Koren ECE597/697 Koren Part.10.1 Content of this part

More information

IEEE Std and IEEE Std 1363a Ashley Butterworth Apple Inc.

IEEE Std and IEEE Std 1363a Ashley Butterworth Apple Inc. apple IEEE Std 1363-2000 and IEEE Std 1363a-2004 Ashley Butterworth Apple Inc. The Titles IEEE Std 1363-2000 - IEEE Standard Specifications for Public-Key Cryptography IEED Std 1363a-2004 - IEEE Standard

More information

(2½ hours) Total Marks: 75

(2½ hours) Total Marks: 75 (2½ hours) Total Marks: 75 N. B.: (1) All questions are compulsory. (2) Makesuitable assumptions wherever necessary and state the assumptions made. (3) Answers to the same question must be written together.

More information

M2351 Security Architecture. TrustZone Technology for Armv8-M Architecture

M2351 Security Architecture. TrustZone Technology for Armv8-M Architecture Architecture TrustZone Technology for Armv8-M Architecture Outline NuMicro Architecture TrustZone for Armv8-M Processor Core, Interrupt Handling, Memory Partitioning, State Transitions. TrustZone Implementation

More information

6 Cryptographic Techniques A Brief Introduction

6 Cryptographic Techniques A Brief Introduction 6 Cryptographic Techniques A Brief Introduction 6.1 Introduction to Cryptography 6.2 Symmetric Encryption 6.3 Asymmetric (Public-Key) Encryption 6.4 Digital Signatures 6.5 Public Key Infrastructures Literature:

More information

Introduction to Network Security Missouri S&T University CPE 5420 Data Integrity Algorithms

Introduction to Network Security Missouri S&T University CPE 5420 Data Integrity Algorithms Introduction to Network Security Missouri S&T University CPE 5420 Data Integrity Algorithms Egemen K. Çetinkaya Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University of

More information

_isms_27001_fnd_en_sample_set01_v2, Group A

_isms_27001_fnd_en_sample_set01_v2, Group A 1) What is correct with respect to the PDCA cycle? a) PDCA describes the characteristics of information to be maintained in the context of information security. (0%) b) The structure of the ISO/IEC 27001

More information

Diet-ESP: A flexible and compressed format for IPsec/ESP

Diet-ESP: A flexible and compressed format for IPsec/ESP unrestricted Diet-ESP: A flexible and compressed format for IPsec/ESP draft-mglt-ipsecme-diet-esp-01.txt D. Migault, T. Guggemos 25/02/2014- IETF89- London Table of Contents Securing IoT communications

More information

Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks

Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks INTERNATIONAL STANDARD ISO/IEC 9594-8:2014 TECHNICAL CORRIGENDUM 2 Published 2016-10-15 INTERNATIONAL ORGANIZATION FOR STANDARDIZATION МЕЖДУНАРОДНАЯ ОРГАНИЗАЦИЯ ПО СТАНДАРТИЗАЦИИ ORGANISATION INTERNATIONALE

More information

ARCHITECTURING AND SECURING IOT PLATFORMS JANKO ISIDOROVIC MAINFLUX

ARCHITECTURING AND SECURING IOT PLATFORMS JANKO ISIDOROVIC MAINFLUX ARCHITECTURING AND SECURING IOT PLATFORMS JANKO ISIDOROVIC CEO @ MAINFLUX Outline Internet of Things (IoT) Common IoT Project challenges - Networking - Power Consumption - Computing Power - Scalability

More information

Connecting Securely to the Cloud

Connecting Securely to the Cloud Connecting Securely to the Cloud Security Primer Presented by Enrico Gregoratto Andrew Marsh Agenda 2 Presentation Speaker Trusting The Connection Transport Layer Security Connecting to the Cloud Enrico

More information

Interrupt response times on Arduino and Raspberry Pi. Tomaž Šolc

Interrupt response times on Arduino and Raspberry Pi. Tomaž Šolc Interrupt response times on Arduino and Raspberry Pi Tomaž Šolc tomaz.solc@ijs.si Introduction Full-featured Linux-based systems are replacing microcontrollers in some embedded applications for low volumes,

More information

Practical Experiences with crypto on 8-bit

Practical Experiences with crypto on 8-bit Practical Experiences with crypto on 8-bit draft-aks-lwig-crypto-sensors-01 Mohit Sethi, Jari Arkko, Ari Keranen, Heidi-Maria Back 1 Public Key Experiences Can we do Public key crypto on (really) small

More information

Introduction and Overview. Why CSCI 454/554?

Introduction and Overview. Why CSCI 454/554? Introduction and Overview CSCI 454/554 Why CSCI 454/554? Get Credits and Graduate Security is important More job opportunities More research funds 1 Workload Five homework assignments Two exams (open book

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 15945 First edition 2002-02-01 Information technology Security techniques Specification of TTP services to support the application of digital signatures Technologies de l'information

More information

Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP,

Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls 32.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 32.2 Figure 32.1 Common structure

More information

CASAN: A New Communication Architecture for Sensors Based on CoAP

CASAN: A New Communication Architecture for Sensors Based on CoAP CASAN: A New Communication Architecture for Sensors Based on Pierre David pda@unistra.fr Philippe Pittoli p.pittoli@unistra.fr Thomas Noël noel@unistra.fr Laboratoire ICube Université de Strasbourg France

More information

VPN World. MENOG 16 Istanbul-Turkey. By Ziad Zubidah Network Security Specialist

VPN World. MENOG 16 Istanbul-Turkey. By Ziad Zubidah Network Security Specialist VPN World MENOG 16 Istanbul-Turkey By Ziad Zubidah Network Security Specialist What is this Van used for?! Armed Van It used in secure transporting for valuable goods from one place to another. It is bullet

More information

Grenzen der Kryptographie

Grenzen der Kryptographie Microsoft Research Grenzen der Kryptographie Dieter Gollmann Microsoft Research 1 Summary Crypto does not solve security problems Crypto transforms security problems Typically, the new problems relate

More information

Public Key Cryptography: Feasible for Security in Modern Personal Area Sensor Networks?

Public Key Cryptography: Feasible for Security in Modern Personal Area Sensor Networks? Public Key Cryptography: Feasible for Security in Modern Personal Area Sensor Networks? Roy Fisher, Mengxuan Lyu, Bo Cheng, Gerhard Hancke Department of Computer Science City University of Hong Kong Hong

More information

Evaluation of Real-time operating systems for FGC controls

Evaluation of Real-time operating systems for FGC controls Evaluation of Real-time operating systems for FGC controls Konstantinos Chalas, CERN, Geneva, Switzerland September 2015 Abstract Power Converter Control for various experiments at CERN, is conducted using

More information

Designing Network Encryption for the Future Emily McAdams Security Engagement Manager, Security & Trust Organization BRKSEC-2015

Designing Network Encryption for the Future Emily McAdams Security Engagement Manager, Security & Trust Organization BRKSEC-2015 Designing Network Encryption for the Future Emily McAdams Security Engagement Manager, Security & Trust Organization BRKSEC-2015 What Could It Cost You? Average of $0.58 a record According to the Verizon

More information

SAML-Based SSO Solution

SAML-Based SSO Solution About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,

More information

Efficient and Secure Source Authentication for Multicast

Efficient and Secure Source Authentication for Multicast Efficient and Secure Source Authentication for Multicast Authors: Adrian Perrig, Ran Canetti Dawn Song J. D. Tygar Presenter: Nikhil Negandhi CSC774 Network Security Outline: Background Problem Related

More information

Embedded Linux With Raspberry Pi IOT

Embedded Linux With Raspberry Pi IOT Embedded Linux With Raspberry Pi IOT Module 1 : Raspberry Pi Set up & Configurations Program Raspberry Pi : a credit-card sized computer Python programming for Raspberry Pi Interacting and configuring

More information

Securing the Frisbee Multicast Disk Loader

Securing the Frisbee Multicast Disk Loader Securing the Frisbee Multicast Disk Loader Robert Ricci, Jonathon Duerig University of Utah 1 What is Frisbee? 2 Frisbee is Emulab s tool to install whole disk images from a server to many clients using

More information

CONTENTS. vii. Chapter 1 TCP/IP Overview 1. Chapter 2 Symmetric-Key Cryptography 33. Acknowledgements

CONTENTS. vii. Chapter 1 TCP/IP Overview 1. Chapter 2 Symmetric-Key Cryptography 33. Acknowledgements CONTENTS Preface Acknowledgements xiii xvii Chapter 1 TCP/IP Overview 1 1.1 Some History 2 1.2 TCP/IP Protocol Architecture 4 1.2.1 Data-link Layer 4 1.2.2 Network Layer 5 1.2.2.1 Internet Protocol 5 IPv4

More information

National Institute of Information and Communications Technology. Cybersecurity Laboratory Security Fundamentals Laboratory Planning Office

National Institute of Information and Communications Technology. Cybersecurity Laboratory Security Fundamentals Laboratory Planning Office National Institute of Information and Communications Technology Cybersecurity Research Institute Cybersecurity Laboratory Security Fundamentals Laboratory Planning Office National Institute of Information

More information

Protecting Information Assets - Week 11 - Cryptography, Public Key Encryption and Digital Signatures. MIS 5206 Protecting Information Assets

Protecting Information Assets - Week 11 - Cryptography, Public Key Encryption and Digital Signatures. MIS 5206 Protecting Information Assets Protecting Information Assets - Week 11 - Cryptography, Public Key Encryption and Digital Signatures MIS5206 Week 11 Identity and Access Control Week 10 continued Cryptography, Public Key Encryption and

More information

CSE 565 Computer Security Fall 2018

CSE 565 Computer Security Fall 2018 CSE 565 Computer Security Fall 2018 Lecture 11: Public Key Infrastructure Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline Public key infrastructure Certificates Trust

More information

Implementation of ATM security using IOT

Implementation of ATM security using IOT Implementation of ATM security using IOT Mahalakshmi.T.K 1, J.Kumudha 2, M.Ranjitha 3, Mr.J.Gurumurthy 4, Dr.D.Sivakumar 5 1,2,3 Department of electronics and communication engineering, Easwari engineering

More information

Kurose & Ross, Chapters (5 th ed.)

Kurose & Ross, Chapters (5 th ed.) Kurose & Ross, Chapters 8.2-8.3 (5 th ed.) Slides adapted from: J. Kurose & K. Ross \ Computer Networking: A Top Down Approach (5 th ed.) Addison-Wesley, April 2009. Copyright 1996-2010, J.F Kurose and

More information

Building Ultra-Low Power Wearable SoCs

Building Ultra-Low Power Wearable SoCs Building Ultra-Low Power Wearable SoCs 1 Wearable noun An item that can be worn adjective Easy to wear, suitable for wearing 2 Wearable Opportunity: Fastest Growing Market Segment Projected Growth from

More information

This document is a preview generated by EVS

This document is a preview generated by EVS INTERNATIONAL STANDARD ISO/IEC 7816-15 Second edition 2016-05-15 Identification cards Integrated circuit cards Part 15: Cryptographic information application Cartes d identification Cartes à circuit intégré

More information