Environmental Key Generation towards Clueless Agents James Riordan School of Mathematics University of Minnesota. Bruce Schneier Counterpane Systems. Published:

Slides:



Advertisements
Similar presentations
Security attacks. - confidentiality: only authorized parties have read access to information - integrity: only authorized parties have write access to.
Advertisements

Operating System Security
Secure Multiparty Computations on Bitcoin
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Data Integrity Proofs in Cloud Storage Sravan Kumar R, Ashutosh Saxena Communication Systems and Networks (COMSNETS), 2011 Third International Conference.
1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Protecting Mobile Agents from Malicious Host Nathan Balon.
Cryptography and Network Security
Security Definitions in Computational Cryptography
Digital Signatures and Hash Functions. Digital Signatures.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
Efficient Private Techniques for Verifying Social Proximity Michael J. Freedman and Antonio Nicolosi Discussion by: A. Ziad Hatahet.
Authentication Cristian Solano. Cryptography is the science of using mathematics to encrypt and decrypt data. Public Key Cryptography –Problems with key.
Computer Security Key Management
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Online Security Tuesday April 8, 2003 Maxence Crossley.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Kerberos Authenticating Over an Insecure Network.
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Cryptographic Technologies
ITIS 6200/8200. time-stamping services Difficult to verify the creation date and accurate contents of a digital file Required properties of time-stamping.
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
CSE331: Introduction to Networks and Security Lecture 24 Fall 2002.
Freenet A Distributed Anonymous Information Storage and Retrieval System I Clarke O Sandberg I Clarke O Sandberg B WileyT W Hong.
CMSC 414 Computer and Network Security Lecture 17 Jonathan Katz.
CMSC 414 Computer (and Network) Security Lecture 24 Jonathan Katz.
Building an Encrypted and Searchable Audit Log 11th Annual Network and Distributed Security Symposium (NDSS '04); 2004 February 5-6; San Diego; CA. Presented.
Chapter 20: Network Security Business Data Communications, 4e.
CSE 597E Fall 2001 PennState University1 Digital Signature Schemes Presented By: Munaiza Matin.
Key Management in Cryptography
1 Authentication Protocols Celia Li Computer Science and Engineering York University.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
Page 1 Secure Communication Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
Bob can sign a message using a digital signature generation algorithm
14.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 14 Entity Authentication.
Secure Electronic Transaction (SET)
1 Anonymous Roaming Authentication Protocol with ID-based Signatures Lih-Chyau Wuu Chi-Hsiang Hung Department of Electronic Engineering National Yunlin.
Hash Functions A hash function H accepts a variable-length block of data M as input and produces a fixed-size hash value h = H(M) Principal object is.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
569 Semantic Web. Dr. J. Lu University of windsor, Project Presentation Encrypted Web service application Encrypted Web Application Presented by:
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Chapter 3: Basic Protocols Dulal C. Kar. Key Exchange with Symmetric Cryptography Session key –A separate key for one particular communication session.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
A Quick Tour of Cryptographic Primitives Anupam Datta CMU Fall A: Foundations of Security and Privacy.
1 Common Secure Index for Conjunctive Keyword-Based Retrieval over Encrypted Data Peishun Wang, Huaxiong Wang, and Josef Pieprzyk: SDM LNCS, vol.
Lecture 16: Security CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9.
14.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 14 Entity Authentication.
1 Needham-Schroeder A --> S: A,B, N A S --> A: {N A,B,K AB,{K AB,A} KBS } KAS A --> B:{K AB,A} KBS B --> A:{N B } KAB A --> B:{N B -1} KAB.
Cryptographic Hash Functions and Protocol Analysis
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Authenticated Key Exchange I. Definitions I. MAP I. matching conversations II. oracles II. (I)KA II. AKEP2 III. AKEP2 Security I. Session Keys II. Perfect.
Data Integrity Proofs in Cloud Storage Author: Sravan Kumar R and Ashutosh Saxena. Source: The Third International Conference on Communication Systems.
Deck 10 Accounting Information Systems Romney and Steinbart Linda Batch March 2012.
Private key
Mar 28, 2003Mårten Trolin1 This lecture Certificates and key management Non-interactive protocols –PGP SSL/TLS –Introduction –Phases –Commands.
Section #9: Bitcoins. Digital currency Unique string of bits Use cryptography for security and privacy Not tied to names: hard to trace Finite set of.
Fall 2006CS 395: Computer Security1 Key Management.
Second Price Auctions A Case Study of Secure Distributed Computing Bart De Decker Gregory Neven Frank Piessens Erik Van Hoeymissen.
Chapter 8 E-Commerce Technologies Introduction to Business Information Systems by Mark Huber, Craig Piercy, Patrick McKeown, and James Norrie.
PPP – Point to Point Protocol
eVoting System Proposal
CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9
CDK: Chapter 7 TvS: Chapter 9
Electronic Payment Security Technologies
Presentation transcript:

Environmental Key Generation towards Clueless Agents James Riordan School of Mathematics University of Minnesota. Bruce Schneier Counterpane Systems. Published: Mobile Agents and Security, G. Vigna, ed., Springer-Verlag, 1998, pp Presented by Chinchi,Lo

Outline Introduction Basic constructions Time constructions Further constructions Conclusions

Introduction Environmental Key Generation: Keying material that is constructed from certain classes of environmental data. Clueless agent: Without the environmentally supplied input, the agent cannot decrypt its own message. The difficulty is that attacker has complete control over the environment.

Basic Constructions Usenet news groups Web pages Mail messages File systems Local network resources

Time Constructions (1/) The time-based constructions allow key generation based on the time. These constructions rely upon the presence of a minimally trusted third party to prevent a date based dictionary attack. The third party does not need to know either of the two parties nor the nature of the material to generate keys.

Time Constructions (2/) These protocols have three distinct stages: The programmer-server interaction The programmer-agent interaction The agent-server interaction

Notations N: an integer corresponding to an environmental observation. H: a one way hash function. M: the hash H of the observation N needed for activation. It is carried by agent. R: a nonce. K: a key. S: a secret belonging to the server. T * : the target time. T i : the current time.

Time Constructions (3/) Forward-Time Hash Function  The programmer sends to the server.  The server sets T to the current time and returns to the programmer T and  The programmer set and. The programmer uses K to encrypt the message to the agent, and gives the agent a copy of P.  The agent continuously requests the current time’s secret from the server.  The server returns.  The agent tries to use to decrypt its instructions when where

Time Constructions (4/) Forward-Time Public Key For each time, the server has a method of generating a public/secret key pair. The server can either store these key pairs, or regenerate them as required.  The programmer sends a to the server.  The server returns the public key,,for that time.  The programmer uses to encrypt the message to the agent.  The agent continuously requests the current time’s private key from the server.  The server returns.  The agent tries to use to decrypt its instructions, when where

Time Constructions (5/) Backward-Time Hash Function  The programmer sends the to the server.  The server returns if and only if is in the future.  The programmer sets K to the returned value and gives the agent a copy of and.  At time T, the agent sends the to the server. It will receive the valid key K in return if and only if is later than T.

General Server Constructions  The programmer sends the server a program P and the hash of a particular possible output of the program P.  The server returns and.  The programmer sets and uses it to encrypt the message to the agent. The programmer then gives to the agent.  The agent gives to the server.  The server decrypts the program, executes it, and sets M = H(P’s output). It then return H(S,P,M) to the agent.  The agent tries to use the returned value as it key. It will succeed precisely when the output of the run program matches the programmer’s expectations.

Further Constructions Thresholding Nesting  Forward-time + Backward-time = time interval.  Forward-time + Basic = Forward time, but only if a specific event has occurred.

Conclusions Cryptographic key constructions built from environmental data that are resistant to adversarial analysis and deceit. The primary envisioned use of these constructions is in the creation of mobile agents whose analysis does not reveal their exact purpose.