1 A secure broadcasting cryptosystem and its application to grid computing Eun-Jun Yoon, Kee-Young Yoo Future Generation Computer Systems (2010),doi:10.1016/j.future.2010.09.012.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Public Key Cryptography Nick Feamster CS 6262 Spring 2009.
By Md Emran Mazumder Ottawa University Student no:
A Survey of Key Management for Secure Group Communications Celia Li.
Further improvement on the modified authenticated key agreement scheme Authors: N.Y. Lee and M.F. Lee Source: Applied Mathematics and Computation, Vol.157,
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Digital Signatures and Hash Functions. Digital Signatures.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
Dr. Lo’ai Tawalbeh Summer 2007 Chapter 9 – Public Key Cryptography and RSA Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus INCS.
Wireless Security In wireless networks. Security and Assurance - Goals Integrity Modified only in acceptable ways Modified only by authorized people Modified.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
An Authentication Scheme for Mobil Satellite Communication Systems Advisor: Prof. Jen-Chang Liu Graduate Student: Yi-Ching Chen( 陳怡靜 ) Date: 2004/05/26.
Cryptography1 CPSC 3730 Cryptography Chapter 10 Key Management.
8.1 Learning Objectives To become familiar with the range of security threats faced by networked and distributed systems (DSs); To examine various cryptographic.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Analysis of Key Agreement Protocols Brita Vesterås Supervisor: Chik How Tan.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Scalable Secure Bidirectional Group Communication Yitao Duan and John Canny Berkeley Institute of Design Computer Science.
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender and receiver if this key is disclosed communications.
1 Pertemuan 08 Public Key Cryptography Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Cryptography and Network Security Chapter 10. Chapter 10 – Key Management; Other Public Key Cryptosystems No Singhalese, whether man or woman, would venture.
CSE 597E Fall 2001 PennState University1 Digital Signature Schemes Presented By: Munaiza Matin.
Encryption Methods By: Michael A. Scott
Network Security Essentials Fifth Edition by William Stallings Fifth Edition by William Stallings.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Introduction to Public Key Cryptography
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Efficient remote mutual authentication and key agreement Improvement of Chien et al. ’ s remote user authentication scheme using smart cards An efficient.
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Cryptography and Network Security (CS435) Part Eight (Key Management)
1 Public-Key Cryptography and Message Authentication.
Computer and Network Security Rabie A. Ramadan Lecture 6.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
Secure Authentication Scheme with Anonymity for Wireless Communications Speaker : Hong-Ji Wei Date :
Encryption.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Enhanced secure anonymous authentication scheme for roaming service in global mobility networks Hyeran Mun, Kyusuk Han, Yan Sun Lee, Chan Yeob Yeun, Hyo.
Authentication of Signaling in VoIP Applications Authors: Srinivasan et al. (MIT Campus of Anna University, India) Source: IJNS review paper Reporter:
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
Department of Computer Engineering, Kyungpook National University Author : Eun-Jun Yoon, Wan-Soo Lee, Kee-Young Yoo Speaker : Wan-Soo Lee
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
NEW DIRECTIONS IN CRYPTOGRAPHY Made Harta Dwijaksara, Yi Jae Park.
1 Chapter 10: Key Management in Public key cryptosystems Fourth Edition by William Stallings Lecture slides by Lawrie Brown (Modified by Prof. M. Singhal,
When DRM Meets Restricted Multicast A Content Encryption Key Scheme for Restricted Multicast and DRM Min FENG and Bin ZHU Microsoft Research Asia.
Ch 13 Trustworthiness Myungchul Kim
Secure Messenger Protocol using AES (Rijndael) Sang won, Lee
Private key
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
SPEAKER: HONG-JI WEI DATE: Efficient and Secure Anonymous Authentication Scheme with Roaming Used in Mobile Networks.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Cryptography and Network Security Chapter 10 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
Fall 2006CS 395: Computer Security1 Key Management.
Copyright 2004 MayneStay Consulting Group Ltd. - All Rights Reserved Jan-041 Security using Encryption Security Features Message Origin Authentication.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
6.033 Quiz3 Review Spring How can we achieve security? Authenticate agent’s identity Verify the integrity of the request Check the agent’s authorization.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Section 4.6: Digital Signatures
Cryptography.
Presentation transcript:

1 A secure broadcasting cryptosystem and its application to grid computing Eun-Jun Yoon, Kee-Young Yoo Future Generation Computer Systems (2010),doi: /j.future Received date: 25 February 2010 Revised date: 13 September 2010 Accepted date: 24 September /10/14 廖俊威

2 Broadcasting Cryptosystem The main purpose of a broadcasting cryptosystem is to –establish a secure communication channel from a sender to a group of legal receivers. In the broadcasting cryptosystem, –a sender can broadcast an encrypted message to a group of legal receivers. –Then, only legal receivers can decrypt the message, –and illegal receivers cannot acquire any important information from the broadcast message.

3

4 The disadvantages of previous researches: –Need many broadcasting messages for a group of legal receivers. –Hard to add new users into the previous constructed groups Liaw [21] proposed a secure broadcasting cryptosystem with fewer broadcasting messages based on the RSA cryptosystem and symmetric cryptosystem, which allows easy addition of new users into the active groups. Sun [22] showed that Liaw’s broadcasting cryptosystem becomes actually infeasible since a prohibitively large amount of information must be kept by each user, and be sent as the rekey message for each broadcast. Tseng and Jan [23] also pointed out the several security weaknesses in the Liaw’s cryptosystem in To remedy this attack, Tseng and Jan also proposed a modification broadcasting cryptosystem. in 2006, Masque and Peinado [24] pointed out that Tseng and Jan’s broadcasting cryptosystem [23] actually does not work due to incorrect arithmetic and then presented a redefined Liaw’s broadcasting cryptosystem, in 2008, Zhu-Wu [29] showed that the redefined Liaw’s scheme [24] is still insecure in that an unauthorized user is able to obtain the shared secret, which is only intended for certain privileged users. Zhu-Wu did not provide an improvement. This paper found that the redefined Liaw’s broadcasting cryptosystem has another security problems, and proposed a new secure authenticated broadcasting cryptosystem.

5 The redefined Liaw’s broadcasting cryptosystem System setup phase

6 Broadcasting phase a sender S = U 1 wants to broadcast a message M to a group of users G = {U i } a i =2

7 Decryption phase Zhu-Wu’s cryptanalysis: unauthorized user U j can get sk

8 Future cryptanalysis 1.Integrity violence of the session key from illegal modification

9 2.Session key modification attack

10 3.Message modification attack This message modification attack can be succeed by the attacker because the legitimate receivers do not verify the integrity of the decrypted message.

11 Proposed authenticated broadcasting cryptosystem System setup phase

12 Broadcasting phase a sender S = U 1 wants to broadcast a message M to a group of users G = {U i } a i =2

13 Decryption phase

14 Application to grid computing environments

15

16 Conclusions This research presents a new secure broadcasting cryptosystem. It is suitable for grid computing environments. It provides strong security compared with related cryptosystems. It provides secure authentication and secure session key establishment.