Alternate Representations of the Public Key Cryptography Standards (PKCS) Using S-Expressions, S-PKCS Matthew WoodCarl Ellison Intel Corporation 1999 PKCS.

Slides:



Advertisements
Similar presentations
XML Encryption and Derived Keys: Suggestion For a Minor Addition Magnus Nyström RSA.
Advertisements

UPnP Security Vic Lortz Chair, Security WC Intel Corporation.
FIPS 201 Framework: Special Pubs ,76,78 Jim Dray HSPD-12 Workshop May 4/5, 2005.
A Profile Of PKCS #11 V2.11 For Mobile Devices Magnus Nyström PKCS Workshop 2002.
CSCE 815 Network Security Lecture 10 KerberosX.509 February 13, 2003.
The Future of HTML Lachlan Hunt HTML Timeline vs. HTML 1.0 SGML RFC XHTML 2.0 Begins…
Web security: SSL and TLS
PKCS #9 v2.0 Magnus Nyström RSA Laboratories PKCS Workshop, 1999.
SSL Implementation Guide Onno W. Purbo
Welcome to PKCS ’99 Royal Institute of Technology, Stockholm 29 September – 1 October 1999.
Security Technology Lab The CSSM PKCS #11 Adaptation Layer Adapting the Technologies and Obtaining Module Integrity Using the CDSA Infrastructure Matthew.
Core Web Service Security Patterns
Code Shape III Booleans, Relationals, & Control flow Copyright 2003, Keith D. Cooper, Ken Kennedy & Linda Torczon, all rights reserved. Students enrolled.
Sharing Knowledge in Adaptive Learning Systems Miloš Kravčík Dragan Gašević Fraunhofer FIT, GermanySimon Fraser University, Canada
1 New Ways of Querying the Web by Eliahu Brodsky and Alina Blizhovsky.
Cryptography and Network Security Chapter 11 Fourth Edition by William Stallings Lecture slides by Lawrie Brown/Mod. & S. Kondakci.
Cryptography1 CPSC 3730 Cryptography Chapter 11, 12 Message Authentication and Hash Functions.
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
TLS/SSL Review. Transport Layer Security A 30-second history Secure Sockets Layer was developed by Netscape in 1994 as a protocol which permitted persistent.
VDA Security Services Freeware Libraries Update IETF S/MIME WG 29 March 2000 John Pawling J.G. Van Dyke & Associates (VDA), Inc;
Digital Signatures Slides by Kent Seamons and Tim van der Horst Last Updated: Oct 7, 2013.
Requirements for DSML 2.0. Summary RFC 2251 fidelity Represent existing directory protocols with new transport syntax Backwards compatibility with DSML.
Leveraging UICC with Open Mobile API for Secure Applications and Services Ran Zhou.
OSLC ALM-PLM interoperability Discussion. OSLC PLM extensions Product Product, Version isVersionOf AMG54556_002 Product, View hasView AMG54556/001-View.
August 20, 2003 Slide 1 A Middleware Service for Policy Based Authorization Presentation at Nordunet 2003 by Roland Hedberg.
SOA in Higher Education Workshop Service-Oriented Architecture with Thomas Erl, SOA Systems Inc. University of British Columbia Vancouver BC Canada |
Lukas Ruf, TIK April 6th WP3 Presentation, ETH WP 3 -- Security Technology And Multimedia Delivery Computer Engineering and Networks Laboratory,
San Diego Supercomputer CenterUniversity of California, San Diego Preservation Research Roadmap Reagan W. Moore San Diego Supercomputer Center
S/MIME Freeware Library IETF S/MIME WG 13 December 2000 Getronics Government Solutions.
Trusted Computing Platform Alliance
Software Models (Cont.) 9/22/2015ICS 413 – Software Engineering1 -Component-based software engineering -Formal Development Model.
Ad Hoc Networks Curtis Bolser Miguel Turner Kiel Murray.
Case Studies on Design Patterns Design Refinements Examples.
Java Security Pingping Ma Nov 2 nd, Overview Platform Security Cryptography Authentication and Access Control Public Key Infrastructure (PKI)
Key Management Workshop November 1-2, Cryptographic Algorithms, Keys, and other Keying Material  Approved cryptographic algorithms  Security.
Abstract Syntax Notation ASN.1 Week-5 Ref: “SNMP…” by Stallings (Appendix B)
Unit 1: Protection and Security for Grid Computing Part 2
EIDE Design Considerations 1 EIDE Design Considerations Brian Wright Portland General Electric.
Communications-Electronics Security Group. PKI interoperability issues for UK Government Richard Lampard
RSA Data Security, Inc. PKCS #1 : RSA Cryptography Standard Jessica Staddon RSA Laboratories PKCS Workshop October 7, 1998.
Ocean Observatories Initiative Data Management (DM) Subsystem Overview Michael Meisinger September 29, 2009.
Leveraging UICC with Open Mobile API for Secure Applications and Services.
Some Perspectives on Smart Card Cryptography
Module 12 Integrating Exchange Server 2010 with Other Messaging Systems.
Middleware for Secure Environments Presented by Kemal Altıntaş Hümeyra Topcu-Altıntaş Osman Şen.
This material was developed by Duke University, funded by the Department of Health and Human Services, Office of the National Coordinator for Health Information.
Alternative Architecture for Information in Digital Libraries Onno W. Purbo
CNI, 4th April 2006 Slide 1 Key Standards Update: SRU (“Technical” Details) Dr. Robert Sanderson Dept. of Computer Science University of Liverpool
PKCS #5: Password-Based Cryptography Standard
Mendel’s Theory Section 2. Explaining Mendel’s Results Mendelian theory of heredity explains simple patterns of inheritance. In these patterns, two of.
Prime Numbers and Factoring. Which expression is equal to 4x6? (a) 2 × 2 x 2 (b) 2 × 3 × 4 (c) 4 × 5 × 3 (d) 6 × 6.
Differences and distinctions: metadata types and their uses Stephen Winch Information Architecture Officer, SLIC.
STEP MANAGEMENT OVERVIEW STEP ARCHITECTURE Module 4 Estimated Viewing Time: 60 Minutes.
Implementation of Ontology Based Context-awareness Framework Ki-Chul Lee, Jung-Hoon Kim International Conference on Multimedia and Ubiquitous Engineering.
PKCS #5 v2.0: Password-Based Cryptography Standard
© 2010 IBM Corporation What’s New in RSA 8.0 Beta 1 – Visual Basic modeling March, 2010.
SCEP Simple Certificate Enrollment Protocol.
Reinventing research and education Linköping University Mikael Nyström Department of Biomedical Engineering, Linköping University SNOMED CT Implementation.
BER ENCODING Basic Encoding Rules. Basic Encoding Rules What is it?  BER is the original rules laid out by the ASN.1 standard for encoding information.
RSA Laboratories’ PKCS Series - a Tutorial
Secure Sockets Layer and the SSLiverse
Dept. of Computer Science and Engineering
PI: Michael Richardson
דיני חברות ד"ר ויקטור ח. בוגנים
Code Shape III Booleans, Relationals, & Control flow
XCBF - XML Common Biometric Format
Name __________________ Class ___________________
Name __________________ Class ___________________
Name __________________ Class ___________________
Presentation transcript:

Alternate Representations of the Public Key Cryptography Standards (PKCS) Using S-Expressions, S-PKCS Matthew WoodCarl Ellison Intel Corporation 1999 PKCS Workshop, Stockholm, Sweden

Why Define Data Encodings? 4 Cross-platform data exchange 4 Persistent storage 4 Interoperability of independently implemented modules

Drawbacks of ASN.1 and BER/DER 4 BER often includes several different, but equally valid encodings of the same data. 4 Identity of data structures is assumed based on the context where it is found... –within other data structures –position within a higher level structure 4 Parsing engine is large and complicated

Benefits of S-expressions 4 Single encoding for any value 4 Identity of all data structures is explicit 4 Small, simple parsing engine 4 Encoded structures are often shorter than their DER encoded versions

Examples: PKCS #1 4 (sha1 #F47D…#) 4 (public-key (rsa (n #…#) (e #010001#) ) )

Examples: PKCS #5 4 (pbes2-params (pkcs5-pbkdf2 (pbkdf2-params (specified #...#) #03E8# (hmac-sha1) ) ) (des-cbc (iv # ABCDEF#) ) )

Questions?