Communications Relationships

Slides:



Advertisements
Similar presentations
The Diffie-Hellman Algorithm
Advertisements

Cyber Defence Data Exchange and Collaboration Infrastructure (CDXI)
Directory and Trust Services (D&TS) Define an Abstract Model Purpose: Document a common terminology that the group can use between the various tracks Identify.
Cryptography and Network Security
 Authorization via symmetric crypto  Key exchange o Using asymmetric crypto o Using symmetric crypto with KDC  KDC shares a key with every participant.
 Key exchange o Kerberos o Digital certificates  Certificate authority structure o PGP, hierarchical model  Recovery from exposed keys o Revocation.
Cryptography and Network Security Chapter 17
Key Management public-key encryption helps address key distribution problems have two aspects of this: –distribution of public keys –use of public-key.
Chapter 8 Web Security.
Cryptography and Network Security Chapter 10. Chapter 10 – Key Management; Other Public Key Cryptosystems No Singhalese, whether man or woman, would venture.
Security Management.
1 CS 194: Distributed Systems Security Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
Secure Electronic Transactions (SET). SET SET is an encryption and security specification designed to protect credit card transactions on the Internet.
Part Two Network Security Applications Chapter 4 Key Distribution and User Authentication.
1 International Forum on Trade Facilitation May 2003 Trade Facilitation, Security Concerns and the Postal Industry Thomas E. Leavey Director General, UPU.
Network Security Lecture 26 Presented by: Dr. Munam Ali Shah.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian.
Session Initiation Protocol (SIP). What is SIP? An application-layer protocol A control (signaling) protocol.
Cryptography, Authentication and Digital Signatures
Lecture 11: Strong Passwords
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Web Security : Secure Socket Layer Secure Electronic Transaction.
Cryptography and Network Security (CS435) Part Eight (Key Management)
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Digital Signatures, Message Digest and Authentication Week-9.
Matej Bel University Cascaded signatures Ladislav Huraj Department of Computer Science Faculty of Natural Sciences Matthias Bel University Banska Bystrica.
1 Normal executable Infected executable Sequence of program instructions Entry Original program Entry Jump Replication and payload Viruses.
Public Key Infrastructure (PKI) Chien-Chung Shen
1 Chapter 10: Key Management in Public key cryptosystems Fourth Edition by William Stallings Lecture slides by Lawrie Brown (Modified by Prof. M. Singhal,
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Network Security Continued. Digital Signature You want to sign a document. Three conditions. – 1. The receiver can verify the identity of the sender.
Computer and Network Security - Message Digests, Kerberos, PKI –
Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B.
E-Authentication & Authorization Presentation to the EA2 Task Force March 6, 2007.
Key Management Network Systems Security Mort Anvari.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
DIGITAL CITIZENSHIP What you need to know.. DIGITAL CITIZENSHIP There are nine elements of Digital Citizenship: 1.Digital Access 2.Digital Commerce 3.Digital.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
Key management issues in PGP
Trust Profiling for Adaptive Trust Negotiation
Secure Single Sign-On Across Security Domains
IP Telephony (VoIP).
Public Key Infrastructure (PKI)
National Electoral Register
Cryptography and Network Security
Florida Information Protection Act of 2014 (FIPA)
Digital Signatures A digital signature is a protocol that produces the same effect as a real signature: It is a mark that only the sender can make but.
How a Stateful Firewall Works
Session Initiation Protocol (SIP)
S/MIME T ANANDHAN.
Florida Information Protection Act of 2014 (FIPA)
Information Security message M one-way hash fingerprint f = H(M)
Choosing the Discovery Model Martin Forsberg
Cryptography and Network Security
2016 Annual CPNI Training CPNI & PI Awareness Beth Slough,
Secure Electronic Transaction (SET) University of Windsor
Encryption in Office 365 Shobhit Sahay Technical Product Manager
Identity Theft Prevention Program Training
Chapter 4 Cryptography / Encryption
SHAKEN & Know Your Customer
Key Management Network Systems Security
Secure Electronic Transactions (SET)
Vulnerability Reporting Process
Doug Bellows – Inteliquent 3/18/2019
Cryptography and Network Security
Presentation transcript:

Communications Relationships Telecommunications Service Providers have traditionally been in the business of helping people communicate in real-time. Illegal robo-calling has broken the traditional communications trust model of someone is calling and you answer. SHAKEN helps restore some trust in the calling number but service providers are challenged: with respect to how much useful trust information they can determine a priori about a call with respect to how best to alert called party People and businesses are vetted and recognized for their relative trustworthiness Dun & Bradstreet, KPMG, Barron’s, et cetera. Equifax, TransUnion, Experian, etc. People and business commonly establish communications relationships in which they exchange: Phone numbers E-mail addresses Social Network application identities People, Businesses, and Service Providers need standard methods of creating, storing, discovering, and transporting trust information.

Communications Relationships A simple model for establishing trust and exchanging digitized trust information using Passport Information Elements (PIEs).

Communications Relationships A simple model for storing Communications Relationship Information using Passport Information Elements (PIEs).

Communications Relationships Alice has relationships with Bob and Ted. They are similar but Bob has a Time Of Day restriction. Neither Bob nor Ted is entitled to complete knowledge of all of Alice’s managed communications.

Communications Relationships Bob has a smaller set of management communications relationships than Alice. And, Alice is not entitled to knowledge of all of Bob’s managed communications capabilities. Bob has not created any policy restrictions for Alice’s communications attempts.

Communications Relationships A simple model for discovering Communications Relationship Information using Passport Information Elements (PIEs).

Communications Relationships SHAKEN-capable Service Providers sign and verify calling number. Alice and Bob exchange Passport Information Elements and Alice (or her proxy) sends personal communications relationship PIE to Bob.

Communications Relationships The modern consumer of communications services uses many services which are reached via many transport and application protocols and these services are in some cases vulnerable to unwanted (and in some cases illegal) communications attempts. Service Providers should develop an infrastructure which enhances a customer’s ability to personally and securely manage communications relationships. By putting trust management in the hands of the user, telephony service providers can focus more on what they do best which is transport communications sessions between people. Creating a communications trust management infrastructure reinforces existing behavior: Same effect as Do Not Call Registry participation Established trust relationship permits direct but managed access. Service providers can offer opt-in communications. Helps unknown and untrusted parties who have reason to attempt communications and can verifiably offer a reason to be trusted. Agencies and entities can be granted access based on sovereignty or other legal authorization.