Jim Schaad August Cellars

Slides:



Advertisements
Similar presentations
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Advertisements

Spring 2012: CS419 Computer Security Vinod Ganapathy SSL, etc.
XML Encryption Prabath Siriwardena Director, Security Architecture.
Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)
JOSE Open Issue Discussion Chairs Jim Schaad. Process Room vote for Closure – Three Choices for topics We adopt the change We reject the change We discuss.
Lecture 22 Internet Security Protocols and Standards modified from slides of Lawrie Brown.
Information Security. Information Security Requirements Confidentiality: Protection from disclosure to unauthorised persons Access control: Unauthorised.
Key Management Guidelines. 1. Introduction 2. Glossary of Terms and Acronyms 3. Cryptographic Algorithms, Keys and Other Keying Material 4. Key Management.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Announcement Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed. 1.
CSCI 6962: Server-side Design and Programming
Electronic Mail Security
S/MIME and CMS Presentation for CSE712 By Yi Wen Instructor: Dr. Aidong Zhang.
Behzad Akbari Spring 2012 (These slides are based on lecture slides by Lawrie Brown)
Key Management with the Voltage Data Protection Server Luther Martin IEEE P May 7, 2007.
WS-Security: SOAP Message Security Web-enhanced Information Management (WHIM) Justin R. Wang Professor Kaiser.
Key Management Workshop November 1-2, Cryptographic Algorithms, Keys, and other Keying Material  Approved cryptographic algorithms  Security.
Web Services Security Standards Overview for the Non-Specialist Hal Lockhart Office of the CTO BEA Systems.
Network Security Essentials Chapter 5
COSE Overview Jim Schaad August Cellars. Willing Changes No crypto compatibility Use of CBOR idioms Partial change of naming schemes.
XML Encryption, XML Signature, and Derived Keys: Suggestion For a Minor Addition Magnus Nyström RSA.
Network Security David Lazăr.
Electronic Mail Security Prepared by Dr. Lamiaa Elshenawy
Web Services Security INFOSYS 290, Section 3 Web Services: Concepts, Design and Implementation Adam Blum
@Yuan Xue CS 285 Network Security Secure Socket Layer Yuan Xue Fall 2013.
Cryptography CSS 329 Lecture 13:SSL.
1 CNLab/University of Ulsan Chapter 16 Electronic Mail Security  PGP (Pretty Good Privacy)  S/MIME.
@Yuan Xue 285: Network Security CS 285 Network Security Digital Signature Yuan Xue Fall 2012.
Lecture 8 (Chapter 18) Electronic Mail Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Computer and Network Security
VPNs & IPsec Dr. X Slides adopted by Prof. William Enck, NCSU.
IPSecurity.
Authenticated Identity
VNF Package Integrity and Authenticity – Public key based
IETF Provisioning of Symmetric Keys (keyprov) WG Update
Hash Functions Which of these problems is easier to solve:
Phil Hunt, Hannes Tschofenig
Dan Brown, Certicom Research November 10, 2004
Using E-Business Suite Attachments
Asymmetric Cryptography
Jim Schaad Soaring Hawk Security
Assignment #5 – Solutions
Security Services for
BINF 711 Amr El Mougy Sherif Ismail
S/MIME T ANANDHAN.
CSE 4095 Transport Layer Security TLS, Part II
NET 536 Network Security Networks and Communication Department
Digital Signatures Last Updated: Oct 14, 2017.
Security at the Application Layer: PGP and S/MIME
(free certificate not available)
ELECTRONIC MAIL SECURITY
Security Requirements
SSL (Secure Socket Layer)
March 2018 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [SG SECN Call for Proposals] Date Submitted:
XCBF - XML Common Biometric Format
ELECTRONIC MAIL SECURITY
Security at the Transport Layer: SSL and TLS
Pre-image Resistance: Given a, hard to find b such that ____
Tim Bornholtz Director of Technology Services
The Secure Sockets Layer (SSL) Protocol
JOSE New Specs & New Features
OAuth Design Team Call 11th February 2013.
Outline Using cryptography in networks IPSec SSL and TLS.
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
Electronic Payment Security Technologies
Cryptography Fundamentals
Cryptography and Network Security
HTTP Request Signing with AWS Signature Version 4
The devil is in the details
CSE 5/7349 – February 15th 2006 IPSec.
Presentation transcript:

Jim Schaad August Cellars JOSE Feature Set Jim Schaad August Cellars

Capability List from CMS (1) One Pass Processing (I,E) Interior Content Identification (I,E) Content encoding methods (I,E) Parallel Signatures (I) Protected Attributes (I,E) Unprotected Attributes (I,E) How much effort are we looking at for processing during the serialization process? Is interior content identification a suggestion or somehow a unique requirement? What methods of encoding of content are going to be allowed? Encapsulated, Detached, Embedded – one response saying not embedded The ALTO group is currently defining a detached method where the content is in the body and the HTTP header has the sign header and value info Are parallel signatures allowed in an integrity object. There exist ways to do this. If this is supported is it going to depend if we are looking at a signature or a MAC algorithm being applied to the object? Are we supporting the ability to have signed or authenticated attributes for both the integrity protected and the encrypted formats – AEAD algorithms such as GCM are called for but not fully utilized.

Capability List from CMS (2) Multiple Recipients (I, E) Recipient Encryption Methods (I, E) Key Transport (RSA) Key Agreement (ECDH) Static-static, ephemeral-static, ephemeral-ephemeral Pre-Shared Secret w/o Key Derivation Pre-Shared Secret w/ Key Derivation (Password) Other (IBE, Plasma) Using HMAC or Encryption can we setup for multiple recipients to have different keys and get the message?

Capability List from CMS (3) Recipient/Signer Identification (I, E) Re-serialization (I) Currently support URL and hash, what about the traditional issuer/signer option? Do we want to allow for re-serialization of content –implies some degree of canonization, but may be required if we want to allow for detached contents. This is a very hard problem as was found in XML, only slightly less of a problem for S/MIME

Discussion?