Secret Sharing and CIDR. Secret Sharing  Threshold Scheme (t,n)( 門檻式 ) Master key (mK) Sub key (sK) Threshold Value t N0. of sub keys n Object: any one.

Slides:



Advertisements
Similar presentations
TCOM 509 – Internet Protocols (TCP/IP) Lecture 06_b Subnetting,Supernetting, CIDR IPv6 Instructor: Dr. Li-Chuan Chen Date: 10/06/2003 Based in part upon.
Advertisements

IP Addressing Introductory material.
Chapter 19 Network Layer: Logical Addressing Stephen Kim.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 VLSM and CIDR Routing Protocols and Concepts – Chapter 6.
1 Computer Communication & Networks Lecture 17 & 18 Network Layer: Logical Addressing Waleed Ejaz.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 VLSM and CIDR Routing Protocols and Concepts – Chapter 6.
Network Layer: Logical Addressing. 4-1 IPv4 ADDRESSES An IPv4 address is a 32-bit address that uniquely and universally defines the connection of a device.
Andrew Smith 1 VLSM and CIDR Variable Length Subnet Masking and Classless inter-domain routing.
Chapter 18. IP: Internet Protocol Addresses
1 IP: Internet Protocol Addresses. 2 Internet Protocol (IP) Only protocol at Layer 3 Fundamental in suite Defines –Internet addressing –Internet packet.
Computer Networks: Global Internet Global Internet.
TCP/IP Protocol Suite 1 Chapter 5 Objectives Upon completion you will be able to: IP Addresses: Classless Addressing Understand the concept of classless.
1 K. Salah Module 5.1: Internet Protocol TCP/IP Suite IP Addressing ARP RARP DHCP.
Understanding IP Addressing Chuck Semeria Presented by Benyuan Liu for Internet Routing Seminar Sep 19, 2000.
Subnetting the subnet RD-CSY /09.  Company with 200 hosts  Assigned class C network /24  Want 6 different LANs  Subnet class C network.
Chapter 21 IP Addressing “If we all did the things we are capable of doing, we would literally astound ourselves” - Thomas Alva Edison,
1 Chapter Overview Subnet. What is a subnet When you break a network into a few smaller networks, you have created several subnets Like IP address where.
Variable Length Subnet Mask (VLSM)
Spring Ch 18 IP Addresses. 2 Internet Protocol  Only protocol at Layer 3  Defines Internet addressing Internet packet format Internet routing.
Types of Addresses in IPv4 Network Range
2 © 2003, Cisco Systems, Inc. All rights reserved. RST-2002 IP Addressing.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 4: Addressing in an Enterprise Network Introducing Routing and Switching in the.
Classless and Subnet Address Extensions (CIDR)
IP Addressing Introductory material. An entire module devoted to IP addresses.
Unit 24 Network Design IP Addressing (Part 3). Objectives to date… Classes of IP addresses (A, B and C) Using Subnetting and Subnet Masks The Limitations.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Addressing in an Enterprise Network Introducing Routing and Switching in the.
IP Addressing & Subnetting
1 Kyung Hee University Chapter 5 IP addresses Classless Addressing.
Variable-Length Subnet Masking (VLSM)
Copyright © Lopamudra Roychoudhuri
Chapter 18 IP: Internet Protocol Addresses
Chapter 4, slide: 1 CS 372 – introduction to computer networks* Friday July 23, 2010 Announcements: r Midterms are graded. r Lab 4 is posted. Acknowledgement:
Chapter 6 VLSM and CIDR.
Chapter 6 VLSM and CIDR CIS 82 Routing Protocols and Concepts Rick Graziani Cabrillo College Last Updated: 3/30/2008.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 VLSM and CIDR Routing Protocols and Concepts – Chapter 6 05/07/2009.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Addressing in an Enterprise Network Introducing Routing and Switching in the.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 4: Addressing in an Enterprise Network Introducing Routing and Switching in the.
21-IP addressing Dr. John P. Abraham Professor UTPA.
1 Kyung Hee University Prof. Choong Seon HONG Subnetting/ Supernetting and Classless Addressing.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 VLSM and CIDR Routing Protocols and Concepts – Chapter 6.
IP Addressing Introductory material.
IP Internet Protocol Fundamental packet format that computers use to exchange information. Is a set of technical rules that defines how computers communicate.
Presentation_ID 1 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Classful Addressing Classful Network Addressing.
21-IP addressing Dr. John P. Abraham Professor UTPA.
1 Lecture, November 20, 2002 Message Delivery to Processes Internet Addressing Address resolution protocol (ARP) Dynamic host reconfiguration protocol.
1 Variable Length Subnet Masks ( VLSM ) “ Classful Route” Means if a route to a network starting with is received, it is a class A => mask length.
Introduction to Internetworking. 2 The IP Addressing Scheme (IPv4) (psu.edu) Dotted Decimal Notation: A notation more convenient for humans.
IP Addressing. A 32-bit logical naming convention A dotted-decimal notation is used: – –Each number represents 8 bits. Number is Part.
19.1 Chapter 19 Network Layer: Logical Addressing Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
IP Addressing, Sub-netting & VLSM
IP Addressing Introductory material.
Instructor Materials Chapter 8: Subnetting IP Networks
Chapter 8: Subnetting IP Networks
IPV4.
An IPv4 address is a 32-bit address that uniquely and universally defines the connection of a device (for example, a computer or a router) to the Internet.
Chapter 2 Easy Subnetting
The IP addresses are unique. The address space of IPv4 is 2 32 or 4,294,967,296.
IP Addressing Introductory material.
Chapter 8: Subnetting IP Networks
IP Addressing Introductory material.
IP Addressing Introductory material
Introduction to Networking (Yarnfield)
Dr. John P. Abraham Professor UTRGV
Planning the Addressing Structure
Routing Protocols and Concepts – Chapter 6
Chapter 2 Easy Subnetting
Routing Protocols and Concepts – Chapter 6
Routing Protocols and Concepts – Chapter 6
IP Addressing & Subnetting
Presentation transcript:

Secret Sharing and CIDR

Secret Sharing  Threshold Scheme (t,n)( 門檻式 ) Master key (mK) Sub key (sK) Threshold Value t N0. of sub keys n Object: any one of n if gathered the t members would construct the master key.

 Order t-1 polynomial h(x)=a t-1 x t-1 + a t-2 x t-2 … +a 1 x 1 +a 0 (a 0 =mK) mod p  Each partial secret holder i with an IDi, and find h(IDi) to obtain the holder h(IDi). e.g., mK=237, p=257, and h(x)= 37x 2 +29x Assume n=5, t=3 i.e., (3,5) For secret holder 1,with ID1=1, get h(1)=46, [1,46] For 2~5, get [2,186], [3,143], [4,174], [5,22]

 How to obtain the value mK? Find t members to construct the polynomial and therefore, get the mK. Method: Lagrange interpolation method Assumed [2,186], [3,143], [5,22]

n to n+1  how to increase n to n+1: h(x)=a t-1 x t-1 + a t-2 x t-2 … +a 1 x 1 +a 0 (a 0 =mK) mod p  Find the new ID n+1 and put into the polynomial to find h(ID n+1 ) to obtain the new holder [ID n+1,h(ID n+1 ) ].  What will that be if the dealer can not exist.

Problems with proposed scheme  One refinement: Hold mk expose g mk as a secret Assume gather t and multiply the above value can get g mk

CIDR  Classless Inter-Domain Routing (CIDR, pronounced "cider"), introduced starting in 1993, It replaced the previous generation of IP address syntax, classful networks. It allowed increased flexibility when dividing ranges of IP addresses into separate networks. It thereby promoted:1993classful networks More efficient use of increasingly scarce IPv4 addresses.IPv4 Greater use of hierarchy in address assignments (prefix aggregation), lowering the overhead of the Internet- wide routing.hierarchyInternetrouting

IPv4 CIDR  IPv4 CIDR blocks are identified using a syntax similar to that of IPv4 addresses: a four-part dotted-decimal address, followed by a slash, then a number from 0 to 32: A.B.C.D/N. The number following the slash is the prefix length, the number of shared initial bits, counting from the left- hand side of the address..

/27

 For example /11, MCI. Automation Research Systems, a Virginia VAR, leased an Internet connection from MCI and was assigned the /22 block, capable of addressing just over 1000 devices. ARS used a /24 block for its publicly accessible servers, of which was one.MCIVirginiaVAR

Subnet  A subnet mask is a bitmask that encodes the prefix length in a form similar to an IP address - 32 bits, starting with a number of 1 bits equal to the prefix length, ending with 0 bits, and encoded in four-part dotted-decimal format. A subnet mask encodes the same information as a prefix length, but predates the advent of CIDR.subnet maskbitmask  CIDR uses variable length subnet masks (VLSM) to allocate IP addresses to subnets according to individual need, rather than some general network-wide rule. Thus the network/host division can occur at any bit boundary in the address. The process can be recursive, with a portion of the address space being further divided into even smaller portions, through the use of masks which cover more bits.recursive

See IPv4 subnetting reference.IPv4 subnetting reference CIDR ClassHostsMask /321/256 C /311/128 C /301/64 C /291/32 C