Issues in Cryptography

Slides:



Advertisements
Similar presentations
Operating System Security
Advertisements

Secure Communication Architectures.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Ronald L. Rivest MIT Laboratory for Computer Science
Applied Cryptography for Network Security
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
Remarks on Voting using Cryptography Ronald L. Rivest MIT Laboratory for Computer Science.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Issues in Cryptography Ronald L. Rivest MIT Laboratory for Computer Science.
Electronic Voting Ronald L. Rivest MIT Laboratory for Computer Science.
Symmetric versus Asymmetric Cryptography. Why is it worth presenting cryptography? Top concern in security Fundamental knowledge in computer security.
Cryptography, Authentication and Digital Signatures
Cyber Security Anchorage School District – 7 th grade Internet Safety.
Key Management. Session and Interchange Keys  Key management – distribution of cryptographic keys, mechanisms used to bind an identity to a key, and.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
DIGITAL SIGNATURE.
Pertemuan #9 Security in Practice Kuliah Pengaman Jaringan.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
1 Lecture 1: Introduction Outline course’s focus intruder’s capabilities motivation for security worms, viruses, etc. legal and patent issues.
Guided by : VIPUL GAJJAR Prepared by: JIGAR KAKADIYA.
Securely Managing VMS from a Windows Environment 1.
TAG Presentation 18th May 2004 Paul Butler
Key management issues in PGP
iPhones and iPads and iTunes, Oh My!
Outline The basic authentication problem
Cryptography: an overview
Outline Basic concepts in computer security
Public Key Infrastructure (PKI)
Basics of Cryptography
Chapter 1: Introduction
Outline Properties of keys Key management Key servers Certificates.
USAGE OF CRYPTOGRAPHY IN NETWORK SECURITY
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF.
Cryptography Much of computer security is about keeping secrets
Cryptography Reference: Network Security
Cryptography Reference: Network Security
TAG Presentation 18th May 2004 Paul Butler
Outline What does the OS protect? Authentication for operating systems
Certificates An increasingly popular form of authentication
Uses Uses of cryptography Lab today on RSA
Public-key Cryptography
Ronald L. Rivest MIT Laboratory for Computer Science
The Security Problem Security must consider external environment of the system, and protect it from: unauthorized access. malicious modification or destruction.
Big Numbers: Mathematics and Internet Commerce
Information and Network Security
Outline What does the OS protect? Authentication for operating systems
CS691 M2009 Semester Project PHILIP HUYNH
The TESLA Broadcast Authentication Protocol CS 218 Fall 2017
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Malware, Phishing and Network Policies
CS691 M2009 Semester Project PHILIP HUYNH
پروتكلهاي احرازاصالت Authentication protocols
Chapt. 10 – Key Management Dr. Wayne Summers
Prepared By : Binay Tiwari
Certificates An increasingly popular form of authentication
Protocol ap1.0: Alice says “I am Alice”
Faculty of Science IT Department By Raz Dara MA.
Cryptography Reference: Network Security
Outline Using cryptography in networks IPSec SSL and TLS.
DISSERTATION ON CRYPTOGRAPHY.
Appropriate Access InCommon Identity Assurance Profiles
e-Security Solutions Penki Kontinentai Vladas Lapinskas
Diffie/Hellman Key Exchange
Computer Security Protection in general purpose Operating Systems
Certificates An increasingly popular form of authentication
Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Unit 1.6 Systems security Lesson 1
Cryptography and Network Security
Presentation transcript:

Issues in Cryptography Ronald L. Rivest MIT Laboratory for Computer Science

Outline “Where’s Alice?” ---The Secure Platform Problem Digital Signatures Repudiation

The “Alice abstraction” Assumes Alice can generate and use her secret key SKA, while keeping it secret. Alice’s secret key SKA is her “cyber-soul”, her “electronic identity” (or pseudonym), her way of identifying herself. SKA is Alice!

Cryptography in Theory Internet SKA Alice

But Alice is not a computer! Alice needs a computer (or at least a processor) to store her secret key SKA and perform cryptographic computations on her behalf. In particular, her processor should produce Alice’s digital signature when appropriately authorized…

Cryptography in Practice Internet SKA Alice? Alice!

But her OS is not secure! Modern OS’s (Windows, Unix) are too complex to be adequately secure for many applications (viruses, Trojan horses). Would you base the security of an Internet presidential election on the security of Linux? Alice’s key SKA may be vulnerable to abuse or theft…

Can SKA go on a smart card? Internet Alice? Alice? SKA Alice?

But her OS is still not secure! Smart card has no direct I/O to Alice. When Alice authorizes a digital signature, she must trust OS to present correct message to smart card for signing.

Can SKA go on a phone or PDA? Internet SKA Alice? Alice?

But this looks very familiar! Same story as for PC, but smaller! PC smart card  Phone SIM card. Phones now have complicated OS’s, downloadable apps, the whole can of worms. Little has changed.

Why can’t we solve problem? There is a fundamental conflict! Downloadable apps and complexity are: Necessary for reasonable UI Incompatible with security

The Sad Truth? Security Reasonable UI The following are incompatible: A reasonable UI Security Security Reasonable UI

But Digital Sigs Need Both! Security to protect secret key and securely show user what is being signed. Reasonable UI to support complex and variable transactions.

Are Digital Signatures Dead? As usually conceived, perhaps… We should change our mind-set: A digital signature is not nonrepudiable proof of user’s intent, but merely plausible evidence. We should build in repudiation mechanisms to handle the damage that can be caused by malicious apps. Repudiate signatures, not keys.

Use a Co-Signing Registry Signature not OK until saved and co-signed by user’s co-signing registry (e.g. at home or bank). User can easily review all messages signed with his key. Registry can follow user-defined policy on co-signing. Registry can notify user whenever his key is used to sign something.

Use One-Time Signing Keys Registry can give user a set of one-time signing keys, so damage from key compromise is limited. Registry won’t co-sign if key was used before. In this case, registry really holds user’s secret signing key, and signs for him when authorized by one-time key.

Repudiation May not be so hard to live with, once we accept that it is necessary. Consistent with legal status of handwritten signatures (can be repudiated, need witnesses for higher security).

Conclusions Cryptography works great, but insecure OS’s make digital signatures problematic, because of conflict between security and reasonable UI’s. Design systems that are robust in face of some key abuse (Alice may not always know what is being signed by her key!)

(THE END)