All rights reserved. Copyright (c) 1999, Hitachi, Ltd. Slide 1 Internet/Marks Hitachi, Ltd. 1999.4.15,16 - Visual Marks for Cyber World -

Slides:



Advertisements
Similar presentations
Chapter 14 – Authentication Applications
Advertisements

Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
PIS: Unit III Digital Signature & Authentication Sanjay Rawat PIS Unit 3 Digital Sign Auth Sanjay Rawat1 Based on the slides of Lawrie.
Public Key Infrastructure Alex Bardas. What is Cryptography ? Cryptography is a mathematical method of protecting information –Cryptography is part of,
Cryptography and Network Security Chapter 14
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Watermarking 3D Objects for Verification Boon-Lock Yeo Minerva M. Yeung.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
 A public-key infrastructure ( PKI ) is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store,
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Http Web Authentication Web authentication is used to verify a users identity before allowing access to certain web pages On web browsers you get a login.
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
Online Security Tuesday April 8, 2003 Maxence Crossley.
Security Chapters 14,15. The Security Environment Threats Security goals and threats.
Watermarking Technology Ishani Vyas CS590 Winter 2008.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
Cryptography1 CPSC 3730 Cryptography Chapter 10 Key Management.
Key Management public-key encryption helps address key distribution problems have two aspects of this: –distribution of public keys –use of public-key.
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Public Key Distribution and X.509 Wade Trappe. Distribution of Public Keys There are several techniques proposed for the distribution of public keys:
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Digital Watermarking Parag Agarwal
Chapter 5 Digital Signatures MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI 1.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
©Copyrights 2011 Eom, Hyeonsang All Rights Reserved Distributed Information Processing 20 th Lecture Eom, Hyeonsang ( 엄현상 ) Department of Computer Science.
Secure Electronic Transaction (SET)
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
Cryptography Encryption/Decryption Franci Tajnik CISA Franci Tajnik.
Cryptography, Authentication and Digital Signatures
Digital Watermarking Simg-786 Advanced Digital Image Processing Team 1.
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
Chapter 21 Distributed System Security Copyright © 2008.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
23-1 Last time □ P2P □ Security ♦ Intro ♦ Principles of cryptography.
Cryptography and Network Security Chapter 13 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Network Security7-1 CIS3360: Chapter 8: Cryptography Application of Public Cryptography Cliff Zou Spring 2012 TexPoint fonts used in EMF. Read the TexPoint.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Network Security Lecture 27 Presented by: Dr. Munam Ali Shah.
DIGITAL SIGNATURE.
Electronic signature Validity Model 1. Shell model Certificate 1 Certificate 2 Certificate 3 Signed document Generate valid signature validCheck invalidCheck.
1 Chapter 10: Key Management in Public key cryptosystems Fourth Edition by William Stallings Lecture slides by Lawrie Brown (Modified by Prof. M. Singhal,
Cryptography and Network Security Chapter 14
Key Management Network Systems Security Mort Anvari.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Multimedia Security. “Everything” is digital these days - a copy of a digital media element is identical to the original. How can an owner protect their.
DIGITAL SIGNATURE(DS) IN VIDEO. Contents  What is Digital Signature(DS)?  General Signature Vs. Digital Signatures  How DS is Different from Encryption?
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
E-Authentication October Objectives Provide a flexible, easy to implement authentication system that meets the needs of AES and its clients. Ensure.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Key Management and Distribution Anand Seetharam CST 312.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
Mar 18, 2003Mårten Trolin1 Agenda Parts that need to be secured Card authentication Key management.
#SummitNow Introducing CounterSign Nathan McMinn Technical Consultant - Alfresco.
Cryptography and Network Security Chapter 13
Key management issues in PGP
Unit 3 Section 6.4: Internet Security
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
DONE BY S.MURALIRAJAN M.NIRMAL
NET 311 Information Security
Digital Certificates and X.509
Parag Agarwal Digital Watermarking Parag Agarwal
Chapter -8 Digital Signatures
Presentation transcript:

All rights reserved. Copyright (c) 1999, Hitachi, Ltd. Slide 1 Internet/Marks Hitachi, Ltd ,16 - Visual Marks for Cyber World -

All rights reserved. Copyright (c) 1999, Hitachi, Ltd. Slide 2 Basic Concept of Cyber-World Marks Marks (e.g., traffic signals) are extremely useful in real world. Convey information briefly and clearly Familiar to non-professionals Marks (e.g., blue-ribbon marks) are useful BUT insecure in cyber world. Easy to forge and tamper Easy to copy-paste on unauthorized data Useful and Secure marks are desired for cyber world.

All rights reserved. Copyright (c) 1999, Hitachi, Ltd. Slide 3 Internet/Marks (IMs) Internet/Marks (IMs) Material Image Data ( JPEG, bitmap, etc ) Internet/Marks ( JPEG, bitmap, etc ) Water- marking Embedded digital signature Recommend for School Education SCIENCE Recommend for School Education SCIENCE Digital Signature for - Material image data - WWW page contents - URL of WWW site - Certificate of IMs issuer

All rights reserved. Copyright (c) 1999, Hitachi, Ltd. Slide 4 Structure of Internet/Marks Data on which IMs is pasted IMs Hash Digital signature Secret key Embed by Digital Watermarking Paste Digital signature detects - Forge and tamper of IMs - IMs copied on unauthorized data - Forge and tamper of data

All rights reserved. Copyright (c) 1999, Hitachi, Ltd. Slide 5 IMs Application to WWW Authentication WWW page on which IMs is pasted IMs Hash Digital signature Secret key Embed by Digital Watermarking Paste Digital signature detects - Forge and tamper of IMs - IMs copied on unauthorized data - Forge and tamper of data and - IMs and WWW page copied on unauthorized site URL Hash

All rights reserved. Copyright (c) 1999, Hitachi, Ltd. Slide 6 Structure of IMs-Based WWW Authentication CA IMs Issuer WWW Page Owner 1. Application for IMs with URL and WWW page contents IMs WWW page with IMs 2. Make sign, issue IMs 3. Paste IMs on WWW page 4. Read IMs, Verify signature when needed Register public key Public Key for signature verification* *This process can be eliminated by embedding public key and its certificate in IMs. WWW Page User 5. Verify current validation when needed

All rights reserved. Copyright (c) 1999, Hitachi, Ltd. Slide 7 Alternative Methods Digital Signature Digital Signature 1. Simple mark 2. Digital signature 3. Simple mark + Digital signature 4. Internet/Marks

All rights reserved. Copyright (c) 1999, Hitachi, Ltd. Slide 8 Comparison with Alternative Methods - Performance Summary -

All rights reserved. Copyright (c) 1999, Hitachi, Ltd. Slide 9 Comparison with Alternative Methods - Operations -

All rights reserved. Copyright (c) 1999, Hitachi, Ltd. Slide 10 Requirements for Internet/Marks WWW page on which IMs is pasted IMs Hash Digital signature Secret key Embed by Digital Watermarking Paste URL Hash Requirements Function - Hash - Sign/Verify using public-key cryptography - Embed/Detect data by watermarking technique Inclusion of signature (basic) - Visual Marks (IMs) - WWW page - URL of legitimate WWW site/page Inclusion of signature (option) - URL of IMs issuer etc.

All rights reserved. Copyright (c) 1999, Hitachi, Ltd. Slide 11 Relation between Signed XML and IMs Signed XML … … … … … … … … IMs … sample.jpg