Thomas Kunz, Susanne Okunick, Ulrich Pordesch

Slides:



Advertisements
Similar presentations
한양대학교 정보보호 및 알고리즘 연구실 이재준 담당교수님 : 박희진 교수님
Advertisements

Functions and Their Representations
RPKI Standards Activity Geoff Huston APNIC February 2010.
4-Byte AS number registry Policy Proposal [LACNIC Proposal ] Geoff Huston APNIC 25 May.
Spearheading Internet technology and policy development in the African Region Resource Services Report.
PKCS-11 Protocol for Enterprise Key Management
Combining Like Terms. Only combine terms that are exactly the same!! Whats the same mean? –If numbers have a variable, then you can combine only ones.
Adapted Multimedia Internet KEYing (AMIKEY): An extension of Multimedia Internet KEYing (MIKEY) Methods for Generic LLN Environments draft-alexander-roll-mikey-lln-key-mgmt-01.txt.
BGP-SRx BGP - Secure Routing Extension BRITE BGP Security / RPKI Interoperability Test & Evaluation Doug Montgomery 1IETF 802/12/2014.
2 pt 3 pt 4 pt 5pt 1 pt 2 pt 3 pt 4 pt 5 pt 1 pt 2pt 3 pt 4pt 5 pt 1pt 2pt 3 pt 4 pt 5 pt 1 pt 2 pt 3 pt 4pt 5 pt 1pt Integer Addition Integer Subtraction.
Biometric Information Management For Security Phillip H. Griffin Griffin Consulting 1625 Glenwood Avenue Hayes Barton at Five Points Raleigh, North Carolina.
Support to the Policy Making Process Knowledge Maps, Ontologies and multi- criteria decision making Arantza Aldea.
Technical Presentation AIAC Group 11. System Rationale System Architecture Secure Channel Establishment Username/Password Cartão Cidadão Digital.
UPnP Security Vic Lortz Chair, Security WC Intel Corporation.
FIPS 201 Framework: Special Pubs ,76,78 Jim Dray HSPD-12 Workshop May 4/5, 2005.
Makespan with Sequence Dependent Setup Time (MSDST) 1|s jk |C max.
5Min 5-4 1) Evaluate 3 × (4 + 7) – 5 × 4. 2) Evaluate × 5 3) Evaluate 13 squared. 4) Evaluate 9 cubed. Warm Up.
DQM Services: Status and Plans DQM Workshop (CMS week) – 28 February 2007 Christos Leonidopoulos CERN PH for the EvF/DQM group.
Lets play bingo!!. Calculate: MEAN Calculate: MEDIAN
School Census Summer 2010 Headlines 1 Jim Haywood Product Manager for Statutory Returns Version 1.0.
State of DNS Security Extensions Edward Lewis February 26, 2001 APRICOT 2001 Panel.
Web security: SSL and TLS
Digital Signatures and Hash Functions. Digital Signatures.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (4) Information Security.
1/03/09 De 89 à 98. 1/03/09 De 89 à 98 1/03/09 De 89 à 98.
Java Security Model Lab#1 I. Omaima Al-Matrafi. Safety features built into the JVM Type-safe reference casting Structured memory access (no pointer arithmetic)
Information Security of Embedded Systems : Public Key Cryptosystems, Communication Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer.
Attacks on Digital Signature Algorithm: RSA
LTANS WG Meeting July 30, IETF 78 – Maastricht Tobias Gondrom Carl Wallace.
Announcements:Questions? This week: Digital signatures, DSA Digital signatures, DSA DTTF/NB479: DszquphsbqizDay 29.
Long-term Archive Service Requirements draft-ietf-ltans-reqs-00.txt.
Archive Time-Stamps-Syntax Dr. Ulrich Pordesch
CSE 597E Fall 2001 PennState University1 Digital Signature Schemes Presented By: Munaiza Matin.
Cryptography in.Net CS 795. Goals Confidentiality---no one else can intercept a message as it passes from A to B---Encryption is the answer Integrity---message.
Cryptography in.Net Chapters (O’Reilly book) CS 795.
Trust Anchor Management Problem Statement 69 th IETF Trust Anchor Management BOF Carl Wallace.
Java Security Pingping Ma Nov 2 nd, Overview Platform Security Cryptography Authentication and Access Control Public Key Infrastructure (PKI)
Incident Object Description and Exchange Format
Terminology and Use Cases Status Report David Harrington IETF 88 – Nov Security Automation and Continuous Monitoring WG.
LWDRM (Lightweight Digital Rights Management) Information Science and Technology Master 1 st Yuuki Horita.
SAML in Authorization Policies draft-guenther-geopriv-saml-policy-00.
Project Phoenix – An Update EuMetCAL Workshop Toulouse, August 2008 Jaymie Gadal.
Pairing Based Cryptography Standards Terence Spies VP Engineering Voltage Security
Electronic signature Validity Model 1. Shell model Certificate 1 Certificate 2 Certificate 3 Signed document Generate valid signature validCheck invalidCheck.
Elliptic Curve Cryptography
Slide 1 November 2005, Vancouver, BCIETF DNSEXT 2929bis etc. Donald E. Eastlake 3 rd
Long-term Archive and Notary Services (LTANS) Working Group.
Multiple Signatures in CMS Russ Housley IETF 66, Montreal, Canada.
。 33 投资环境 3 开阔视野 提升竞争力 。 3 嘉峪关市概况 。 3 。 3 嘉峪关是一座新兴的工业旅游城市,因关得名,因企设市,是长城文化与丝路文化交 汇点,是全国唯一一座以长城关隘命名的城市。嘉峪关关城位于祁连山、黑山之间。 1965 年建市,下辖雄关区、镜铁区、长城区, 全市总面积 2935.
RSA Laboratories’ PKCS Series - a Tutorial
SBSM BOF Session-Based Security Model for SNMPv3
56th IETF syslog WG Chair: Chris Lonvick
Denis Pinkas. Bull SA. Cryptographic Maintenance Policy IETF LTANS meeting in Paris August, 1rst , 2005 Denis Pinkas. Bull SA.
Trust Anchor Management Problem Statement
ERS to XML Introduction to ERS syntax in XML format
August 1, 2005 Carl Wallace & Tobias Gondrom
IS-IS WG IS-IS Cryptographic Authentication Requirements
Introduction Used for communication to verify
58th IETF Minneapolis, MN, November 9-14, “EAP support in smartcards”
Donald E. Eastlake 3rd TSIG SHA etc. Donald E. Eastlake 3rd March.
LTANS WG: ERS Status July 10, 2006 Tobias Gondrom.
PSAMP MIB Status: Document Changes
July 14th, to 1130 hours Vienna, Austria
Glen Zorn Cisco Systems
draft-ietf-pim-igmp-mld-yang-04
XCBF - XML Common Biometric Format
Digital Signature Standard (DSS)
Cryptography Lecture 26.
Changing Education Paradigms
Presentation transcript:

Thomas Kunz, Susanne Okunick, Ulrich Pordesch Data Structure for Security Suitabilities of Cryptographic Algorithms <draft-ietf-ltans-dssc-01.txt > Thomas Kunz, Susanne Okunick, Ulrich Pordesch forename.surname@sit.fraunhofer.de

Evaluation of cryptographic algorithms give a prognosis how long an algorithm will be presumably secure validity period of algorithms have been secure in the past automatically interpretable by e.g. signing and verification tools  data structure for security suitability of cryptographic algorithms

DSSC approach: Data structure

DSSC: News and Changes Current release: draft-ietf-ltans-dssc-01.txt Policy contains all algorithm evaluations Current policy contains algorithms which are no longer valid Old policies need not be kept Definition of ranges for parameter values (exact, min, max, range) Definition of current parameter names RSA: “modulus” DSA: “p” and “q” Data structures in XML and ASN.1

DSSC example <Algorithm> <AlgorithmIdentifier> <Name>RSA 1024</Name> <ObjectIdentifier>1.3.14.3.2.26</ObjectIdentifier> </AlgorithmIdentifier> <Parameter name="modulus"> <Min>1024</Min> </Parameter> <Validity> <End>2007-12-31</End> </Validity> </Algorithm>