Published in 2016 International Computer Symposium (ICS) Authors

Slides:



Advertisements
Similar presentations
Deep Packet Inspection with DFA-trees and Parametrized Language Overapproximation Author: Daniel Luchaup, Lorenzo De Carli, Somesh Jha, Eric Bach Publisher:
Advertisements

Optimizing Regular Expression Matching with SR-NFA on Multi-Core Systems Authors : Yang, Y.E., Prasanna, V.K. Yang, Y.E. Prasanna, V.K. Publisher : Parallel.
Cryptographic Security CS5204 – Operating Systems1.
CNS2010handout 10 :: digital signatures1 computer and network security matt barrie.
An Efficient and Scalable Pattern Matching Scheme for Network Security Applications Department of Computer Science and Information Engineering National.
CSE 597E Fall 2001 PennState University1 Digital Signature Schemes Presented By: Munaiza Matin.
E- Business Digital Signature Varna Free University Prof. Teodora Bakardjieva.
CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS
Cryptographic Security Cryptographic Mechanisms 1Mesbah Islam– Operating Systems.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
Cryptology Digital Signatures and Digital Certificates Prof. David Singer Dept. of Mathematics Case Western Reserve University.
CS555Topic 211 Cryptography CS 555 Topic 21: Digital Schemes (1)
Cryptography, Authentication and Digital Signatures
A Regular Expression Matching Algorithm Using Transition Merging Department of Computer Science and Information Engineering National Cheng Kung University,
Internet Security. Four Issues of Internet Security Authenticity: Is the sender of a message who they claim to be? Privacy: Are the contents of a message.
Signcryption Parshuram Budhathoki Department of Mathematical Sciences Florida Atlantic University April 18, 2013
1 Information Security Practice I Lab 5. 2 Cryptography and security Cryptography is the science of using mathematics to encrypt and decrypt data.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Digital Signatures, Message Digest and Authentication Week-9.
StriD 2 FA: Scalable Regular Expression Matching for Deep Packet Inspection Author: Xiaofei Wang, Junchen Jiang, Yi Tang, Bin Liu, and Xiaojun Wang Publisher:
Cryptography: Digital Signatures Message Digests Authentication
Memory-Efficient and Scalable Virtual Routers Using FPGA Department of Computer Science and Information Engineering, National Cheng Kung University, Tainan,
Early Detection of DDoS Attacks against SDN Controllers
Presentation Road Map 1 Authenticated Encryption 2 Message Authentication Code (MAC) 3 Authencryption and its Application Objective Modes of Operation.
Binary-tree-based high speed packet classification system on FPGA Author: Jingjiao Li*, Yong Chen*, Cholman HO**, Zhenlin Lu* Publisher: 2013 ICOIN Presenter:
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
A Fast Regular Expression Matching Engine for NIDS Applying Prediction Scheme Author: Lei Jiang, Qiong Dai, Qiu Tang, Jianlong Tan and Binxing Fang Publisher:
Packet Classification Using Dynamically Generated Decision Trees
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
LOP_RE: Range Encoding for Low Power Packet Classification Author: Xin He, Jorgen Peddersen and Sri Parameswaran Conference : IEEE 34th Conference on Local.
SRD-DFA Achieving Sub-Rule Distinguishing with Extended DFA Structure Author: Gao Xia, Xiaofei Wang, Bin Liu Publisher: IEEE DASC (International Conference.
Hierarchical Hybrid Search Structure for High Performance Packet Classification Authors : O˜guzhan Erdem, Hoang Le, Viktor K. Prasanna Publisher : INFOCOM,
Network Security and It’s Issues
LightFlow : Speeding Up GPU-based Flow Switching and Facilitating Maintenance of Flow Table Author : Nobutaka Matsumoto and Michiaki Hayashi Conference:
Scalable Multi-match Packet Classification Using TCAM and SRAM Author: Yu-Chieh Cheng, Pi-Chung Wang Publisher: IEEE Transactions on Computers (2015) Presenter:
JA-trie: Entropy-Based Packet Classification Author: Gianni Antichi, Christian Callegari, Andrew W. Moore, Stefano Giordano, Enrico Anastasi Conference.
Overview Modern public-key cryptosystems: RSA
Cryptography: an overview
Cryptography: an overview
Proxy Blind Signature Scheme
USAGE OF CRYPTOGRAPHY IN NETWORK SECURITY
網路環境中通訊安全技術之研究 Secure Communication Schemes in Network Environments
Public Key Encryption Systems
e-Health Platform End 2 End encryption
CSCE 715: Network Systems Security
2018/6/26 An Energy-efficient TCAM-based Packet Classification with Decision-tree Mapping Author: Zhao Ruan, Xianfeng Li , Wenjun Li Publisher: 2013.
Sindhusha Doddapaneni
Encryption
Cryptography Lecture 26.
Parallel Processing Priority Trie-based IP Lookup Approach
2018/12/29 A Novel Approach for Prefix Minimization using Ternary trie (PMTT) for Packet Classification Author: Sanchita Saha Ray, Abhishek Chatterjee,
CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9
Cryptography: an overview
Memory-Efficient Regular Expression Search Using State Merging
Best Digital Signature Service in Noida. Electronic Record 1.Very easy to make copies 2.Very fast distribution 3.Easy archiving and retrieval 4.Copies.
Lecture 6: Digital Signature
A New String Matching Algorithm Based on Logical Indexing
CDK: Chapter 7 TvS: Chapter 9
Handbook of Applied Cryptography - CH11, from 11.5~11.8
Cryptography Lecture 22.
Public Key Encryption Systems
A Hybrid IP Lookup Architecture with Fast Updates
Cryptography Lecture 25.
Introduction to Encryption Technology
Lightweight Security Scheme for Vehicle Tracking System Using CoAP
Towards TCAM-based Scalable Virtual Routers
How to Use Charm Crypto Lib
LAB 3: Digital Signature
Presentation transcript:

Forward/Backward Unforgeable Digital Signature Scheme Using Symmetric-Key Crypto-System Published in 2016 International Computer Symposium (ICS) Authors Tzonelih Hwang , Prosanta Gope , Yi-Ping Luo , Zhi-Rou Liu Presenter: Chao-Chun, Sung Date: 107/12/19 Department of Computer Science and Information Engineering, National Cheng Kung University, Tainan, Taiwan, R.O.C.

Computer & Internet Architecture Lab Introduction(1/) A secure digital signature scheme should satisfy the following requirements: Authentication: Through the verified signature, the signature receiver can verify the identity of signer and the integrity of the message. Non-repudiation: A signer who has sent a valid signature to a receiver cannot later deny having provided that signature. Computer & Internet Architecture Lab CSIE NCKU

Computer & Internet Architecture Lab Introduction(2/) Unforgeability: Neither the signature receiver nor an attacker can forge a signature or change the content of a signature. The signature should not be reproducible by any other person. Forward Unforgeability: Even if the signature key used in the scheme is compromised, then any previous signature will not be forged. Backward Unforgeability: Even if the signature key used in the scheme is compromised, then the attacker will not be able to forge any future signature. Computer & Internet Architecture Lab CSIE NCKU

Computer & Internet Architecture Lab background Digital signatures employ asymmetric cryptography. Computer & Internet Architecture Lab CSIE NCKU

Proposed Signature Schemes(1/) Computer & Internet Architecture Lab CSIE NCKU

Proposed Signature Schemes(2/) Computer & Internet Architecture Lab CSIE NCKU

Computer & Internet Architecture Lab Security Analysis In the proposed forward unforgeable signature scheme, since the encryption key is updated in every signature transmission by using a secret random number, therefore, an attacker cannot forge any previous signature without knowing the random number. Computer & Internet Architecture Lab CSIE NCKU

Computer & Internet Architecture Lab Security Analysis the security backbone of the proposed backward unforgeable signature scheme is based on the one-way hash function. That is, anyone cannot reconstruct the input of hash function from its hash value alone. Therefore, if the current signature key (i.e., the one-time signature key) is compromised, then the attacker will not be able to forge any future signature. Computer & Internet Architecture Lab CSIE NCKU