Assignment #5 – Solutions

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

Public Key Management and X.509 Certificates
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
PGP Overview 2004/11/30 Information-Center meeting peterkim.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
Computer Security Key Management
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 6 Wenbing Zhao Department of Electrical and Computer Engineering.
Homework #8 Solutions Brian A. LaMacchia Portions © , Brian A. LaMacchia. This material is provided without.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Csci5233 Computer Security1 Bishop: Chapter 10 (Cont.) Key Management: Storage & Revoking.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
Information Security Fundamentals Major Information Security Problems and Solutions Department of Computer Science Southern Illinois University Edwardsville.
The Cryptographic Sensor FTO Libor Dostálek, Václav Novák.
SEC835 Practical aspects of security implementation Part 1.
Certification asynchrone à grande échelle avec des arbres de vérification de certificats Josep Domingo-Ferrer Universitat Rovira i Virgili
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
King Mongkut’s University of Technology Faculty of Information Technology Network Security Prof. Reuven Aviv 6. Public Key Infrastructure Prof. R. Aviv,
Chapter 16 Security Introduction to CS 1 st Semester, 2012 Sanghyun Park.
Compliance Defects in Public- key Cryptography “ A public-key security system trusts its users to validate each others’s public keys rigorously and to.
ASYNCHRONOUS LARGE-SCALE CERTIFICATION BASED ON CERTIFICATE VERIFICATION TREES Josep Domingo-Ferrer, Marc Alba and Francesc Sebé Dept. of Computer Engineering.
Merkle trees Introduced by Ralph Merkle, 1979 An authentication scheme
Secure and efficient key management in mobile ad hoc networks Authors: Bing Wu, Jie Wu, Eduardo B. Fernandez, Mohammad Ilyas, and Spyros Magliveras Sources:
1 Network Security Lecture 7 Overview of Authentication Systems Waleed Ejaz
بسم الله. PKI Revealed Ayman Saeed Agenda Cryptography Review. PKI …… WHY and HOW!!!!!. X.509 Certificate. PKI Hierarchies Certification. Practical Implementation.
A Simple Traceable Pseudonym Certificate System for RSA-based PKI SCGroup Jinhae Kim.
Biometric Encryption Base RSA Algorithm Supervisor: Ass. Prof. Dr. Dang Tran Khanh Student: Dung Ngo Dinh.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
@Yuan Xue Case Study (Mid-term question) Bob sells BatLab Software License Alice buys BatLab Credit card information Number of.
Mar 18, 2003Mårten Trolin1 Agenda Parts that need to be secured Card authentication Key management.
@Yuan Xue 285: Network Security CS 285 Network Security Digital Signature Yuan Xue Fall 2012.
Key management issues in PGP
Basics of Cryptography
VNF Package Integrity and Authenticity – Public key based
Cryptography Why Cryptography Symmetric Encryption
Computer Communication & Networks
Cryptography and Network Security
Information Security message M one-way hash fingerprint f = H(M)
Cryptographic Hash Function
e-Health Platform End 2 End encryption
Asymmetric Cryptography
Security.
Josep Domingo-Ferrer Universitat Rovira i Virgili
IS3230 Access Security Unit 9 PKI and Encryption
Information Security message M one-way hash fingerprint f = H(M)
Information Security message M one-way hash fingerprint f = H(M)
Digital Signatures Last Updated: Oct 14, 2017.
Message Security, User Authentication, and Key Management
SSH: SECURE LOGIN CONNECTIONS OVER THE INTERNET
Assignment #7 – Solutions
Introduction to Symmetric-key and Public-key Cryptography
Secure Electronic Transaction (SET) University of Windsor
Assignment #4 – Solutions
Information Security message M one-way hash fingerprint f = H(M)
Security.
Digital Certificates and X.509
Cryptographic Usage Mask
Lecture 4 - Cryptography
The Secure Sockets Layer (SSL) Protocol
Random inserting into a B+ Tree
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Public Key Infrastructure
Install AD Certificate Services
Chapter 29 Cryptography and Network Security
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Chapter 15 Key Management
Introduction to Cryptography
The devil is in the details
National Trust Platform
Presentation transcript:

Assignment #5 – Solutions

Problem 1 Suppose that ORCA cards and readers are only capable of symmetric (e.g. AES) encryption but you want each card to have its own symmetric key for communications with readers.  Although you don’t like it, you are assured that there is enough physical security around the readers so that they can all share a single key. Describe a design wherein each card can use its unique symmetric key to communicate securely with any reader. 2/17/2011 Practical Aspects of Modern Cryptography

Problem 1 Readers share secret symmetric key 𝑘. Cards each have a unique symmetric key 𝑘 𝑖 A couple possible solutions: On card 𝑖, store 𝑘 𝑖 and 𝐸 𝑘 ( 𝑘 𝑖 ). When communicating with a reader, send 𝐸 𝑘 𝑘 𝑖 from the card to the reader. The reader can decrypt 𝐸 𝑘 𝑘 𝑖 , retrieving 𝑘 𝑖 . Then the card & reader can communicate using 𝑘 𝑖 . This is like pre-loading a Kerberos ticket for the reader “service” onto each card. 2/17/2011 Practical Aspects of Modern Cryptography

Problem 1 On card 𝑖, store 𝑖 and 𝑘 𝑖 , where 𝑘 𝑖 = HMAC(𝑘,𝑖). When communicating with a reader, send 𝑖 from the card to the reader. The reader can then derive 𝑘 𝑖 from 𝑘 and 𝑖. Then the card & reader can communicate using 𝑘 𝑖 . 2/17/2011 Practical Aspects of Modern Cryptography

Problem 2 “Fun with CRLs” 1,000,000 ORCA cards, 1%/month loss rate. Q: How big is the CRL in the steady state if you have to hold 2 years of info? Assume CRL requires 512 bytes of fixed information plus 36 bytes of storage per revocation entry when ASN.1 encoded. 1,000,000 cards, 1% month  24% loss over 2 years  240,000 entries on the CRL CRL size: (240,000 * 36) + 512 bytes = 8,640,512 bytes 2/17/2011 Practical Aspects of Modern Cryptography

Problem 3 “Fun with CRLs, Part II” Design an alternative data structure for holding CRL information on each reader that has the following properties, where 𝑚 is the total number of revoked cards in the data structure and 𝑛 is the number of additions and deletions made to the data structure in a single day: Each day’s incremental updates involve only 𝑂(𝑛 log 𝑚 ) modifications to the data structure. Searching the “CRL” for an entry takes 𝑂( log 𝑚) time. Like a “regular” CRL, the data structure is always integrity-protected with a digital signature from the CA. 2/17/2011 Practical Aspects of Modern Cryptography

Problem 3 Solution: “Certificate Revocation Trees”* Basic idea: Create a tree data structure where the leaves of the tree hold (in sorted order) the serial numbers of revoked certs. Intermediate parent nodes are formed by hashing the contents of the node’s children. Digitally sign the root node using the CA’s private key and distribute that signature as part of the root node. *Kocher, “On Certificate Revocation and Validation,” Proceedings of Financial Cryptography ‘98, LCS 1465, pp. 127-177. 2/17/2011 Practical Aspects of Modern Cryptography

Problem 3 N0,0: SN #5 N0,1: SN#12 N0,2: SN#17 N1,0: SHA-256(N0 || N1) Root w/ signature N1,0: SHA-256(N0 || N1) N0,0: SN #5 N0,1: SN#12 N1,1: SHA-256(N2) N0,2: SN#17 2/17/2011 Practical Aspects of Modern Cryptography

Problem 3 Updates: Just need to update leaf nodes that change on each incremental update and the intermediate nodes between each changed leaf and the root. Also need to send a new signature on the root each time (because any change will change the root). 2/17/2011 Practical Aspects of Modern Cryptography

Problem 4 Pres and two VPs share modulus 𝑁=𝑝𝑞. Pres uses public exponent 𝑒=65537. VPs use public exponents 𝑒 1 =3 and 𝑒 2 =5. 𝑚 15 𝑑 1 𝑑 2 mod 𝑁= 𝑚 3 𝑑 1 5 𝑑 2 mod 𝑁= 𝑚 5 𝑑 2 𝑚𝑜𝑑 𝑁=𝑚 The bad news: A corresponding 𝑑,𝑒 pair allows you to factor 𝑁. 1/20/2011 Practical Aspects of Modern Cryptography

Problem 4 (cont.) What can you do with the VP keys? 𝑑𝑒=𝑘 𝑝−1 𝑞−1 3 𝑑 1 = 𝑘 1 (𝑝−1)(𝑞−1) 5𝑑 2 = 𝑘 2 (𝑝−1)(𝑞−1) 𝑘 1 and 𝑘 2 must be very small. Given one of 𝑑 1 and 𝑑 2 , one need try very few possibilities for 𝑘 1 and 𝑘 2 to derive the 𝑑 𝑖 that you don’t already have. 1/20/2011 Practical Aspects of Modern Cryptography