Ceremonies (in 3 minutes)

Slides:



Advertisements
Similar presentations
Some names to Remember ! Herbert Street Technologies Ltd
Advertisements

Live Excel PRESENTER: Brad Leupen | CTO, Entrinsik |
Secure In-Band Wireless Pairing Shyamnath Gollakota Nabeel Ahmed Nickolai Zeldovich Dina Katabi.
Netprog: Cryptgraphy1 Cryptography Reference: Network Security PRIVATE Communication in a PUBLIC World. by Kaufman, Perlman & Speciner.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
... Jesús Almansa and Marco Carbone 4th April 2002 { jfa,
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
® © 2003 Intel Corporation Security Issues with Names Carl Ellison Sr. Security Architect Network Architecture Lab Intel Corporation June 17, 2003.
Dan Boneh Basic key exchange The Diffie-Hellman protocol Online Cryptography Course Dan Boneh.
Secure Electronic Transactions (SET). SET SET is an encryption and security specification designed to protect credit card transactions on the Internet.
Securing Squid (Proxy) Using Digest Authentication.
Security Protocols in Automation Dwaine Clarke MIT Laboratory for Computer Science January 8, 2002 With help from: Matt Burnside, Todd.
Bridging the UI Gap for Authentication in Smart Environments Sebastian Unger Prof. Dirk Timmermann University of Rostock, Germany MuSAMA DFG Graduate Program.
The Secure Password-Based Authentication Protocol
Advanced Geometry Unit 4 Lines in a Plane PRIZE SHOW.
Shadow Security Scanner Li,Guorui. Introduction Remote computer vulnerabilities scanner Runs on Windows Operating Systems SSS also scans servers built.
Sauna Network Protocol. Create User $SAU,CU,[UserName],[Password],[Firstname],[ Lastname],[ ],[Phone]
Bob Baker Open Systems Interconnection OSI Reference model –Layer 7 application –Layer 6 presentation –Layer 5 session –Layer 4 transport –Layer 3 network.
Integrity-regions: Authentication Through Presence in Wireless Networks Srdjan Čapkun 1 and Mario Čagalj 2 1 Department of Computer Science, ETH Zurich.
Secure Sockets Layer (SSL) Presented by: Piyush Saggi Baylor University Dec 6, 2002.
Network Security Lecture 10 Presented by: Dr. Munam Ali Shah.
1 Cryptography NOTES. 2 Secret Key Cryptography Single key used to encrypt and decrypt. Key must be known by both parties. Assuming we live in a hostile.
Presented by: Suparita Parakarn Kinzang Wangdi Research Report Presentation Computer Network Security.
Security (and privacy) Larry Rudolph With help from Srini Devedas, Dwaine Clark.
Windows Server 2003 with Active Directory and Group Policies Wendy Hurst Eastern Kentucky University Department of Technology CEN/CET.
CSE 331: Introduction to Networks and Security Fall 2001 Instructor: Carl A. Gunter Encrypted Knock Knock.
Protocol Steganography Norka Lucena and Steve Chapin Syracuse University May 27, 2004.
Saeed Ur Rehman Supervised by AP Kevin Sowerby Colin Coghill.
P2P Streaming Protocol (PPSP) Requirements Ning Zong Yunfei Zhang Victor Pascual Carl Williams Lin Xiao draft-ietf-ppsp-reqs-02.
Applied cryptography Project 2. 2CSE539 Applied Cryptography A demo Chat server registration Please enter a login name : > Alice Please enter the.
A A E E D D C C B B # Symmetric Keys = n*(n-1)/2 F F
SCIENTIFIC METHOD. A researcher must follow scientific method for research to be considered valid. The following slides will discuss the procedure for.
6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes.
GROBJ Problem Statement – GROBJ BoF – IETF76 1 GROBJ BoF: Problem Statement Dan Wing, v0.3, revised: 2-Nov-2009.
Setting Up a Client PC for Windows Physically install a NIC Set Up Microsoft Networking –Adapter (installed with NIC) –Protocol –Client.
Dan Boneh Basic key exchange Trusted 3 rd parties Online Cryptography Course Dan Boneh.
Speaker:Chiang Hong-Ren An Investigation and Implementation of Botnet Detection Schemes.
Microsoft NetMeeting Setup and Use. First Steps Find out what your network address is. –Start/Run. Type “command.” –At the prompt, type “ipconfig.” –Write.
1 Authenticated Key Exchange Rocky K. C. Chang 20 March 2007.
Introduction to computer networking Objective: To be acquainted with: The definitions of networking Network topology Network peripherals, hardware and.
Security Hannes Tschofenig. Goal for this Meeting Use the next 2 hours to determine what the security consideration section of the OAuth draft(s) should.
Security Issues Introduction.. Security All the connectivity schemes you will hear about have security implications. –4 computer security incidents in.
Professional Development Without Borders Cindy Phthisic Edenton-Chowan Schools
Database Management Systems, 3ed, R. Ramakrishnan and J. Gehrke1 Database architecture and security Workshop 4.
- Richard Bhuleskar “At the end of the day, the goals are simple: safety and security” – Jodi Rell.
PROJECT DOMAIN : NETWORK SECURITY Project Members : M.Ananda Vadivelan & E.Kalaivanan Department of Computer Science.
Mitm.
Private Facebook Chat Chris Robison, Scott Ruoti, Tim van der Horst, Kent Seamons Internet Security Research Lab Computer Science Department Brigham Young.
Cryptography Reference: Network Security
Cryptography Reference: Network Security
Secure Sockets Layer (SSL)
Internet Protocol Mr. Paulk.
Two Way Authentication
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Figure 1-7: Eavesdropping on a Dialog
Diffie-Hellman Key-Exchange Algorithm
CS 140 Lecture Notes: Protection
CS 140 Lecture Notes: Protection
Alex Guy packets (stars) tor routers users web servers (squares)
09/12/2018 Virtual Networks.
PREPARED BY: RIDDHI PATEL (09CE085)
Protocol ap1.0: Alice says “I am Alice”
TDW-11: 24-28th April 2017, Noumea, New Caledonia
Secure Electronic Transactions (SET)
Based on results by: Masanes, Renner, Christandl, Winter and Barrett
CS 140 Lecture Notes: Protection
Similarities Differences
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
THE SCIENTIFIC METHOD.
Recommender Systems Problem formulation Machine Learning.
Presentation transcript:

Ceremonies (in 3 minutes) Carl M. Ellison Microsoft 16 August 2005

Network Protocol A B C D

Ceremony Carol Alice Bob A B C D

HTTPS MITM Protocol Legitimate MITM User PC Channel Setup a b c d HTTP(S) HTTP(S) PC Channel Setup a b c d

HTTPS MITM Ceremony Legitimate MITM User PC a b Channel Setup c d e f HTTP(S) HTTP(S) PC a b Channel Setup c d e f g

Conclusion Design a great protocol, prove it secure; add a user, it’s insecure Design a great protocol, prove it secure; embed it in a larger protocol, it’s insecure These two observations aren’t just similar …with Ceremonies, they are the same statement.

Think Ceremonies Carol Alice Bob A B C D