Lukas Ruf, TIK April 6th WP3 Presentation, ETH WP 3 -- Security Technology And Multimedia Delivery Computer Engineering and Networks Laboratory, ETH Zurich Lukas Ruf
Lukas Ruf, TIK April 6th WP3 Presentation, ETH Security Aspects Intellectual Property Rights Value of Information Authentication And Key Exchange Data Administration: Security & Protection Data Delivery
Lukas Ruf, TIK April 6th WP3 Presentation, ETH Value of Information value time value of information value of information time value value of information time value value of information time value Definition of applied security.
Lukas Ruf, TIK April 6th WP3 Presentation, ETH Authentication And Key Exchange Symmetric Encryption –Kerberos 5, IETF Standard, arbitrated protocol (trusted keyserver) Asymmetric Encryption –DASS, DEC, arbitrated protocol with public keys of users.
Lukas Ruf, TIK April 6th WP3 Presentation, ETH Data Administration: Security & Protection Administration –per university in a decentralized platform –per project in a centralized platform Data Protection –user data: privacy, small amount of data, high security-level strong encryption (IDEA) –lecture data: public but w. IPR, huge amount of data, low security-level weak encryption (DES)
Lukas Ruf, TIK April 6th WP3 Presentation, ETH Data Delivery Secured network infrastructure –network-access restrictions inter-university intra-university Insecure network (e.g. Internet) –user authentication and validation
Lukas Ruf, TIK April 6th WP3 Presentation, ETH Data Delivery -- Encryption multimedia data encryption –partial encryption protocol dependency, high speed. –full encryption protocol independency, low speed Which is the encrypting Layer ?
Lukas Ruf, TIK April 6th WP3 Presentation, ETH Cryptography in Universal Temporary valid session keys for symmetrical encryption based on an asymmetrical encryption keys. Hierarchical authentication scheme: –ISO: X.509 –Kerberos v. 5 –PGP
Lukas Ruf, TIK April 6th WP3 Presentation, ETH Cryptography in Universal Obscuring technology (partial encryption) for audio/video data. Full encryption for static teaching aids. Algorithms according to the requirements, see presentation Security Techniques for IPR by T. Klobucar at WP1-Meeting
Lukas Ruf, TIK April 6th WP3 Presentation, ETH this page is itentionally left blank
Lukas Ruf, TIK April 6th WP3 Presentation, ETH Multimedia Data Delivery Processing speed Timely limited usability Full encryption vs. partial encryption Strong vs. weak encryption
Lukas Ruf, TIK April 6th WP3 Presentation, ETH Cryptography Symmetric: –identical key for encryption and decryption –DES, 3DES, IDEA, CAST, RCx, Blowfish –advantage: fast en/decrypting of data, implementation available in hard- and software –disadvantage: key must be known to all participants
Lukas Ruf, TIK April 6th WP3 Presentation, ETH Cryptography Asymmetric: –public- and private-key to encrypt and decrypt –RSA, ElGamal, Rabin –advantage: different keys for encryption and decryption. –disadvantage: very slow
Lukas Ruf, TIK April 6th WP3 Presentation, ETH Key Exchange Required to distribute encryption keys Approaches: –Centralized: Trusted Keyserver stores locally all keys generates session keys upon request must be contacted for every session –Decentralized:Public-Key-Infrastructure (PKI) (e.g. PGP’s Web of Trust)
Lukas Ruf, TIK April 6th WP3 Presentation, ETH Intellectual Property Rights (IPR) Protection schemes –anti-replay –timed validity/usability –digital watermarks, digital signatures Scope of IPR application Scope of data distribution