TRUST:Team for Research in Applied Cryptography

Slides:



Advertisements
Similar presentations
A Crash Course in Modern Crypto Tools Dan Boneh Stanford University.
Advertisements

Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Grid Security. Typical Grid Scenario Users Resources.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
CSCI283 Fall 2005 GWU All slides from Bishop’s slide set Public Key Infrastructure (PKI)
Dan Boneh with Monica Lam, David Mazieres, John Mitchell, and many students. Security for Mobile Devices NSF Site Visit, June 2010.
Cryptography for Backup Navigation
Online Security Tuesday April 8, 2003 Maxence Crossley.
Stronger Password Authentication Using Browser Extensions Blake Ross, Collin Jackson, Nick Miyake, Dan Boneh, John Mitchell Stanford University
A New Life for Group Signatures Dan Boneh Stanford University.
Spring 2002CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Mini-Project 2006 Secure positioning in vehicular networks based on map sharing with radars Mini-Project IC-29 Self-Organized Wireless and Sensor Networks.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
MJ10/07041 Session 10 Accounting, Security Management Adapted from Network Management: Principles and Practice © Mani Subramanian 2000 and solely used.
Overview of Cryptography Anupam Datta CMU Fall A: Foundations of Security and Privacy.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Information Security of Embedded Systems : Algorithms and Measures Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.
Dan Boneh Introduction What is cryptography? Online Cryptography Course Dan Boneh.
Computer Science Public Key Management Lecture 5.
DUKE UNIVERSITY DNSSEC 101 Kevin Miller.
Dan Boneh Stream ciphers The One Time Pad Online Cryptography Course Dan Boneh.
Kittiphan Techakittiroj (24/08/58 22:49 น. 24/08/58 22:49 น. 24/08/58 22:49 น.) Digital Certification Kittiphan Techakittiroj
INTRODUCTION Coined in 1996 by computer hackers. Hackers use to fish the internet hoping to hook users into supplying them the logins, passwords.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Privacy Issues in Vehicular Ad Hoc Networks.
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
1 Architectural Support for Copy and Tamper Resistant Software David Lie, Chandu Thekkath, Mark Mitchell, Patrick Lincoln, Dan Boneh, John Mitchell and.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Geneva, Switzerland, September 2014 Identity Based Attestation and Open Exchange Protocol (IBOPS) Scott Streit Chief Scientist.
Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 31 Omar Meqdadi Department of Computer Science and Software Engineering.
Network Security Introduction Light stuff – examples with Alice, Bob and Trudy Serious stuff - Security attacks, mechanisms and services.
Security Requirements of NVO3 draft-hartman-nvo3-security-requirements-01 S. Hartman M. Wasserman D. Zhang 1.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
ICC Module 3 Lesson 5 – IT Security 1 / 4 © 2015 Ph. Janson Information, Computing & Communication Security – Clip 0 – Introduction School of Computer.
CIS 325: Data Communications1 Chapter Seventeen Network Security.
Dan Boneh Introduction Course Overview Online Cryptography Course Dan Boneh.
Security Review Q&A Session May 1. Outline  Class 1 Security Overview  Class 2 Security Introduction  Class 3 Advanced Security Constructions  Class.
Key Generation Protocol in IBC Author : Dhruti Sharma and Devesh Jinwala 論文報告 2015/12/24 董晏彰 1.
Education and Human Resource development By Ruzena Bajcsy TRUST TRUST:Team for Research in Ubiquitous Secure Technologies September 13th 2004 NSF STC Review.
Dan Boneh Collision resistance Timing attacks on MAC verification Online Cryptography Course Dan Boneh.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
29/Jul/2009 Young Hoon Park.  M.Bellare, D.Micciancio, B.Warinschi, Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and.
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
Web Server Management: Securing Access to Web Servers Jon Warbrick University of Cambridge Computing Service.
Security Outline Encryption Algorithms Authentication Protocols
Security&Privacy Considerations for IP over p OCB
Grid Security.
S/MIME T ANANDHAN.
TRUST:Team for Research in Ubiquitous Secure Technologies
Digital Signatures Last Updated: Oct 14, 2017.
Scams, Identity Theft, and Viruses Kelly & Caitlin
Enhancing Web Application Security with Secure Hardware Tokens
קורס פיננסי – מושגים פיננסיים / כלכליים
Computer Security Firewalls November 19, 2018 ©2004, Bryan J. Higgs.
Message Digest Cryptographic checksum One-way function Relevance
NAAS 2.0 Features and Enhancements
A Cryptographic Defense Against Connection Depletion Attacks
A Cryptographic Defense Against Connection Depletion Attacks
TRUST: Security Education Program at Stanford
Anonymity - Background
TRUST:Team for Research in Ubiquitous Secure Technologies
VEHICLE TECHNOLOGY BRAKE SYSTEMS.
Chapter -8 Digital Signatures
Unit 8 Network Security.
Syed Rafiul Hussain*, Mitziu Echeverria†, Ankush Singla*,
Presentation transcript:

TRUST:Team for Research in Applied Cryptography Dan Boneh, Stanford University NSF STC Review September 6, 2004

Some Pet Projects Rebuilding cryptography using bilinear maps. Better cryptographic primitives that are easier to use. Defense against Web spoofing and online ID theft Security for my mom … Attacks: DeRandomization attacks [SPPGMB’04] ASLR software diversity is ineffective. Timing attacks on web servers using OpenSSL [BB’03] Short Group signatures [BBS’04] Privacy mechanism for Cars and Trusted Computing. NSF STC Review November 17, 2018

Vehicle Safety Comm (VSC) brake Car 1 Car 2 Car 3 Car 4 Ambulance out of my way !! Car Require authenticated (signed) messages from cars. Prevent impersonation and DoS on traffic system. Privacy problem: cars broadcasting signed (x,y, v). Project requirement: msg-size < 300 bytes Clean solution: short group signatures [BBS’04] NSF STC Review November 17, 2018