Slides accompanying 2WC12 Sebastiaan de Hoogh. MD5 Compression function.

Slides:



Advertisements
Similar presentations
MD5 Considered Harmful Today Creating a rogue CA certificate Alexander Sotirov Marc Stevens Jacob Appelbaum Arjen Lenstra David Molnar Dag Arne Osvik Benne.
Advertisements

Web security: SSL and TLS
CS5204 – Operating Systems 1 Authentication. CS 5204 – Operating Systems2 Authentication Digital signature validation proves:  message was not altered.
“Defeating SSL” Impact of Hash collisions on cyber security By vaibhav.
By: Hassan Waqar.  A PROTOCOL for securely transmitting data via the internet.  NETWORK LAYER application.  Developed by NETSCAPE.
Csci5233 Computer Security1 Bishop: Chapter 10 (Cont.) Key Management: Certificates.
Resource Certificate Profile Geoff Huston, George Michaelson, Rob Loomans APNIC IETF 67.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
APNIC Trial of Certification of IP Addresses and ASes RIPE 52 Plenary George Michaelson Geoff Huston.
An Introduction to Security Concepts and Public Key Infrastructure (PKI) Mary Thompson.
Copyright Justin Klein Keane InfoSec Training Encryption.
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
Network Security – Part 2 V.T. Raja, Ph.D., Oregon State University.
Cryptography and Network Security Chapter 15 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
TLS/SSL Review. Transport Layer Security A 30-second history Secure Sockets Layer was developed by Netscape in 1994 as a protocol which permitted persistent.
Hash Functions and Message Authentication Codes Sebastiaan de Hoogh, TU/e Cryptography 1 September 12, 2013.
Computer Science Public Key Management Lecture 5.
Chapter 31 Network Security
Digital Signatures Slides by Kent Seamons and Tim van der Horst Last Updated: Oct 7, 2013.
Lecture 15 Lecture’s outline Public algorithms (usually) that are each other’s inverse.
Presentation Saffi Keisari M ARC S TEVENS, A LEXANDER S OTIROV, J ACOB A PPELBAUM, A RJEN L ENSTRA, D AVID M OLNAR, D AG A RNE O SVIK AND B ENNE DE W EGER.
Secure Socket Layer (SSL)
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
 Technology  6 th Grade  Ms. Silvia Ocampo  Write your name:  Choose the correct answer for the following statements.
Telecommunication, Internet, and E-Commerce. Communication hardware Communication channel Communication devices.
Information Security Fundamentals Major Information Security Problems and Solutions Department of Computer Science Southern Illinois University Edwardsville.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Symmetric Encryption Mom’sSecretApplePieRecipe Mom’sSecretApplePieRecipe The same key is used to encrypt and decrypt the data. DES is one example. Pie.
1 Securing Data and Communication. 2 Module - Securing Data and Communication ♦ Overview Data and communication over public networks like Internet can.
Cryptography and Network Security (CS435) Part Twelve (Electronic Mail Security)
A Brief Summary and Demonstration of Hash functions Collisions July
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 Module 3 City College of San.
1 DCS 835 – Computer Networking and the Internet Digital Certificate and SSL (rev ) Team 1 Rasal Mowla (project leader) Alvaro Restrepo, Carlos.
Network Security7-1 CIS3360: Chapter 8: Cryptography Application of Public Cryptography Cliff Zou Spring 2012 TexPoint fonts used in EMF. Read the TexPoint.
Chapter 8 – Network Security Two main topics Cryptographic algorithms and mechanisms Firewalls Chapter may be hard to understand if you don’t have some.
URL’s Anatomy 1.02 Understand how to validate, authenticate, and legally use information from the Internet.
IST E-infrastructure shared between Europe and Latin America ULAGrid Certification Authority Vanessa Hamar Universidad de Los.
A Brief Summary and Demonstration of Hash functions Collisions June
Certificate Requests to HIP Jani Pellikka 80 th IETF Mar 27 th – Apr 1 st 2011 Prague, Czech Republic.
Understanding Cryptography – A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl Chapter 11 – Hash Functions.
Chapter 4 - X.509 Authentication TE-405 Network Security and Management Fall Dr. Faisal Kakar
A Simple Traceable Pseudonym Certificate System for RSA-based PKI SCGroup Jinhae Kim.
Web 2.0 Applications. Tasks that can be completed with Dropbox.
1 APNIC Trial of Certification of IP Addresses and ASes RIPE October 2005 Geoff Huston.
1 SSL/TLS. 2 Web security Security requirements Secrecy to prevent eavesdroppers to learn sensitive information Entity authentication Message authentication.
ECE Prof. John A. Copeland fax Office: GCATT Bldg.
1 Certification Issue : how do we confidently know the public key of a given user? Authentication : a process for confirming or refuting a claim of identity.
CCSDS Security Working Group Fall 2015 Meeting Certificate Management 9 November – 13 November 2015 Darmstadt Germany Charles Sheehe NASA/Glenn.
Agenda Last class: Internet browsers, searching Today: Internet Literacy Lab –Computer Lab.
August 2001 Slide 1 Extensions to TLS Simon Blake-Wilson Certicom David Hopwood Independent Consultant Jan Mikkelsen Transactionware Magnus Nystrom RSA.
The Hexadecimal System is base 16. It is a shorthand method for representing the 8-bit bytes that are stored in the computer system. This system was chosen.
SCEP Simple Certificate Enrollment Protocol.
Trusted Organizations In the grid world one single CA usually covers a predefined geographic region or administrative domain: – Organization – Country.
GRID-FR French CA Alice de Bignicourt.
NECTEC-GOC CA A Brief Status Report 13 th APGrid PMA Face-to-Face meeting March 24 th, 2014 Large-Scale Simulation Research Laboratory Information Communications.
Slide 1 Insert your own content.. Slide 2 Insert your own content.
第五章 电子邮件安全. Security is one of the most widely used and regarded network services currently message contents are not secure –may be inspected.
ASN.1: Cryptographic files
Security is one of the most widely used and regarded network services
Secure Sockets Layer and the SSLiverse
APNIC Trial of Certification of IP Addresses and ASes
Public-Key Certificates
Data Representation Bits
Slide 1 Insert your own content.. Slide 1 Insert your own content.
Slide 1 Insert your own content.. Slide 1 Insert your own content.
Slide 1 Insert your own content.. Slide 1 Insert your own content.
Cryptography and Network Security
8/23/
Presentation transcript:

Slides accompanying 2WC12 Sebastiaan de Hoogh

MD5 Compression function

Extra slides, if time permits

Website Certificates Source:

MD5 considered Harmful today Source:

Creating an intermediate CA serial number validity period real cert domain name real cert RSA key X.509 extensions signature rogue CA cert rogue CA RSA key rogue CA X.509 extensions Netscape Comment Extension (contents ignored by browsers) signature identical bytes (copied from real cert) collision bits (computed) chosen prefix (difference) CA bit! Source:

Computing Recources: ”Playstation Lab” “The birthdaying takes about 18 hours on the 200 PS3s using 30GB of memory that was equally divided over the PS3s” Source: