A Fast Data Protection Technique for Mobile Agents to Avoid Attacks in Malicious Hosts Jesús Arturo Pérez Díaz Darío Álvarez Gutiérrez Department of Informatics.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
The Mobile Code Paradigm and Its Security Issues Anthony Chan and Michael Lyu September 27, 1999.
Feb 25, 2003Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
Spring 2002CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
EECC694 - Shaaban #1 lec #16 Spring Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Lecture 23 Symmetric Encryption
Wireless Security Issues David E. Hudak, Ph.D. Senior Software Architect Karlnet, Inc.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Informatics and Control Systems Faculty. Student: Levan Julakidze Informatics and Control Systems Faculty Doctorate II year Leader: Zurab Kochladze TSU.
Kyle Wesson, Mark Rothlisberger, and Todd Humphreys
SSH Secure Login Connections over the Internet
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
A Cryptography Education Tool Anna Yu Department of Computer Science College of Engineering North Carolina A&T State University June 18, 2009.
.Net Security and Performance -has security slowed down the application By Krishnan Ganesh Madras.
Public-key Cryptography Strengths and Weaknesses Matt Blumenthal.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
WS-Security: SOAP Message Security Web-enhanced Information Management (WHIM) Justin R. Wang Professor Kaiser.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Data and its manifestations. Storage and Retrieval techniques.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Encryption, continued Public Key encryption and Digital Signatures.
Signcryption Parshuram Budhathoki Department of Mathematical Sciences Florida Atlantic University April 18, 2013
COEN 180 Erasure Correcting, Error Detecting, and Error Correcting Codes.
Internet-security.ppt-1 ( ) 2000 © Maximilian Riegel Maximilian Riegel Kommunikationsnetz Franken e.V. Internet Security Putting together the.
Karlstad University IP security Ge Zhang
IPsec IPsec (IP security) Security for transmission over IP networks –The Internet –Internal corporate IP networks –IP packets sent over public switched.
Modes of Operation INSTRUCTOR: DANIA ALOMAR. Modes of Operation A block cipher can be used in various methods for data encryption and decryption; these.
Cosc 513Presentation, Fall Network Security Student: Jianping He Student ID: Instructor: ProfessorAnvari Fall 2000.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
AES Advanced Encryption Standard. Requirements for AES AES had to be a private key algorithm. It had to use a shared secret key. It had to support the.
Sandrine AGAGLIATE, FTFC Power Consumption Analysis and Cryptography S. Agagliate Canal+Technologies P. Guillot Canal+Technologies O. Orcières Thalès.
Based on Bruce Schneier Chapter 8: Key Management Dulal C Kar.
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
NEW DIRECTIONS IN CRYPTOGRAPHY Made Harta Dwijaksara, Yi Jae Park.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
Chapter 9 Public Key Cryptography and RSA. Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender.
P ROTOCOL FOR COLLABORATING MOBILE AGENTS IN THE NETWORK INTRUSION DETECTION SYSTEMS. By Olumide Simeon Ogunnusi Shukor Abd Razak.
Data Integrity Proofs in Cloud Storage Author: Sravan Kumar R and Ashutosh Saxena. Source: The Third International Conference on Communication Systems.
Security March 9, Security What is security?  Techniques that control access to use a shared resource  Uses of shared resource must be authorized.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
BZUPAGES.COM Cryptography Cryptography is the technique of converting a message into unintelligible or non-understandable form such that even if some unauthorized.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
Encryption. The problem 4 It is possible for an unauthorized agent to acquire transmissions 4 The extent of the danger varies: –Listen only -- the intruder.
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Network Security Celia Li Computer Science and Engineering York University.
Wired Equivalent Privacy (WEP) Chris Overcash. Contents What is WEP? What is WEP? How is it implemented? How is it implemented? Why is it insecure? Why.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
Technical Security Issues in Cloud Computing By: Meiko Jensen, Jorg Schwenk, Nils Gruschka, Luigi Lo Lacono Presentation by: Winston Tong 2009 IEEE.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
Cryptography CSS 329 Lecture 13:SSL.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
CS480 Cryptography and Information Security
Security Outline Encryption Algorithms Authentication Protocols
Advanced Computer Networks
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
CSCE 715: Network Systems Security
CSCE 715: Network Systems Security
Presentation transcript:

A Fast Data Protection Technique for Mobile Agents to Avoid Attacks in Malicious Hosts Jesús Arturo Pérez Díaz Darío Álvarez Gutiérrez Department of Informatics University of Oviedo Oviedo, Asturias, Spain Presenter: Chin-chi Lo

Outline A Secure Mobile Agent System Traditional Techniques Encryption Algorithm using Bitmaps & XOR Limitations & Conclusion

A Secure Mobile Agent System Protection of the agent system against attacks from mobile agents. Protection of the agent against agents. Protection of information transmission between agent servers against unauthorized third parties. Protection of the agent against malicious agent systems.

Traditional Techniques Public key cryptography Digital Signatures Implementing Secure Channel Ex: SSL, TLS All of the above are too complex and almost unfeasible in terms of performance.

Data Encryption using Bitmaps & the XOR Operation Bitmaps A random number expressed as a bitmap in a row of a matrix carried by an agent and known only to the source server. XOR Applying XOR operation between data and a random number.

Data Area of the Mobile Agent

Fields HostID: identifier of a server. CW: codeword, used to rotate the data before applying the encryption function. CRC: verifying if the data is altered. The initial value is binary 0 s.

Encryption Algorithm 1. The remote server creates a record with the same fields. 2. The host ID, data to be encrypted in 128-bit blocks form and a generated random CW are put into the record. 3. is rotated to the left,where

Encryption Algorithm (Cont.) 4. Before applying the (3.), the CW is rotated to the right.(7 most-significant bits of CW) Thus, each is not always the same.

Encryption Algorithm (Cont.) 5. The original CW is restored into the corresponding field of the register in order to retrieve the original information using the inverse algorithm in the source server. 6. Computing CRC. 7. The corresponding original bitmap is XOR ed with generated data. 8. The counter indicating the number of lines used in the matrix is incremented.

Limitations of the Method Does not prevent the possible alternation of data from malicious hosts The current server could see and copy the still available rows. The two cooperating malicious servers. There is a fixed maximum number of data that can be protected.

Conclusion That is a trade-off between performance and security.