Lukas Ruf, TIK April 6th 2000 1 WP3 Presentation, ETH WP 3 -- Security Technology And Multimedia Delivery Computer Engineering and Networks Laboratory,

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
Computer and Network Security Mini Lecture by Milica Barjaktarovic.
Web Security CS-431. HTTP Authentication Protect web content from those who don’t have a “need to know” Require users to authenticate using a userid/password.
Cryptography and Authentication Lab ECE4112 Group4 Joel Davis Scott Allen Quinn.
Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.
A Survey of WAP Security Architecture Neil Daswani
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Principles of Information Security, 2nd edition1 Cryptography.
Java Security Model Lab#1 I. Omaima Al-Matrafi. Safety features built into the JVM Type-safe reference casting Structured memory access (no pointer arithmetic)
Feb 25, 2003Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Cryptography1 CPSC 3730 Cryptography Chapter 10 Key Management.
Apr 22, 2003Mårten Trolin1 Agenda Course high-lights – Symmetric and asymmetric cryptography – Digital signatures and MACs – Certificates – Protocols Interactive.
Key Management public-key encryption helps address key distribution problems have two aspects of this: –distribution of public keys –use of public-key.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Cryptographic Technologies
Mar 5, 2002Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
W O R L D W I D E L E A D E R I N S E C U R I N G T H E I N T E R N E T IKE Tutorial.
Electronic mail security -- Pretty Good Privacy.
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
Introduction to Public Key Cryptography
Pretty Good Privacy by Philip Zimmerman presented by: Chris Ward.
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
.Net Security and Performance -has security slowed down the application By Krishnan Ganesh Madras.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Secure r How do you do it? m Need to worry about sniffing, modifying, end- user masquerading, replaying. m If sender and receiver have shared secret.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
1 TCP/IP Applications. 2 NNTP: Network News Transport Protocol NNTP is a TCP/IP protocol based upon text strings sent bidirectionally over 7 bit ASCII.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
每时每刻 可信安全 1The DES algorithm is an example of what type of cryptography? A Secret Key B Two-key C Asymmetric Key D Public Key A.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Cryptography Chapter 14. Learning Objectives Understand the basics of algorithms and how they are used in modern cryptography Identify the differences.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
© Oxford University Press 2011 DISTRIBUTED COMPUTING Sunita Mahajan Sunita Mahajan, Principal, Institute of Computer Science, MET League of Colleges, Mumbai.
Key Management. Session and Interchange Keys  Key management – distribution of cryptographic keys, mechanisms used to bind an identity to a key, and.
Cryptography and Network Security (CS435) Part Eight (Key Management)
PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 23/10/2015 | pag. 2.
1 Information Security Practice I Lab 5. 2 Cryptography and security Cryptography is the science of using mathematics to encrypt and decrypt data.
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
Virtual Private Network Benefits Classification Tunneling technique, PPTP, L2TP, IPSec Encryption Technology Key Management Technology Authentication Settings.
Key Exchange Methods Diffie-Hellman and RSA CPE 701 Research Case Study Derek Eiler | April 2012.
Chapter 7: Cryptographic Systems
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
CS 4244: Internet Programming Security 1.0. Introduction Client identification and cookies Basic Authentication Digest Authentication Secure HTTP.
By Sandeep Gadi 12/20/  Design choices for securing a system affect performance, scalability and usability. There is usually a tradeoff between.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Electronic Mail Security Prepared by Dr. Lamiaa Elshenawy
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Lecture 14 Public Key Cryptography and RSA. Summary principles of public-key cryptography principles of public-key cryptography RSA algorithm, implementation,
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Key management issues in PGP
Cryptography Why Cryptography Symmetric Encryption
e-Health Platform End 2 End encryption
Public Key Infrastructure
Install AD Certificate Services
PGP CSC 492 Presentation May 2, 2007 Brandon Skari Ruby Matejcik.
Presentation transcript:

Lukas Ruf, TIK April 6th WP3 Presentation, ETH WP 3 -- Security Technology And Multimedia Delivery Computer Engineering and Networks Laboratory, ETH Zurich Lukas Ruf

Lukas Ruf, TIK April 6th WP3 Presentation, ETH Security Aspects Intellectual Property Rights Value of Information Authentication And Key Exchange Data Administration: Security & Protection Data Delivery

Lukas Ruf, TIK April 6th WP3 Presentation, ETH Value of Information value time value of information value of information time value value of information time value value of information time value Definition of applied security.

Lukas Ruf, TIK April 6th WP3 Presentation, ETH Authentication And Key Exchange Symmetric Encryption –Kerberos 5, IETF Standard, arbitrated protocol (trusted keyserver) Asymmetric Encryption –DASS, DEC, arbitrated protocol with public keys of users.

Lukas Ruf, TIK April 6th WP3 Presentation, ETH Data Administration: Security & Protection Administration –per university in a decentralized platform –per project in a centralized platform Data Protection –user data: privacy, small amount of data, high security-level  strong encryption (IDEA) –lecture data: public but w. IPR, huge amount of data, low security-level  weak encryption (DES)

Lukas Ruf, TIK April 6th WP3 Presentation, ETH Data Delivery Secured network infrastructure –network-access restrictions inter-university  intra-university Insecure network (e.g. Internet) –user authentication and validation

Lukas Ruf, TIK April 6th WP3 Presentation, ETH Data Delivery -- Encryption multimedia data encryption –partial encryption  protocol dependency, high speed. –full encryption  protocol independency, low speed Which is the encrypting Layer ?

Lukas Ruf, TIK April 6th WP3 Presentation, ETH Cryptography in Universal Temporary valid session keys for symmetrical encryption based on an asymmetrical encryption keys. Hierarchical authentication scheme: –ISO: X.509 –Kerberos v. 5 –PGP

Lukas Ruf, TIK April 6th WP3 Presentation, ETH Cryptography in Universal Obscuring technology (partial encryption) for audio/video data. Full encryption for static teaching aids. Algorithms according to the requirements, see presentation Security Techniques for IPR by T. Klobucar at WP1-Meeting

Lukas Ruf, TIK April 6th WP3 Presentation, ETH this page is itentionally left blank

Lukas Ruf, TIK April 6th WP3 Presentation, ETH Multimedia Data Delivery  Processing speed Timely limited usability Full encryption vs. partial encryption Strong vs. weak encryption

Lukas Ruf, TIK April 6th WP3 Presentation, ETH Cryptography Symmetric: –identical key for encryption and decryption –DES, 3DES, IDEA, CAST, RCx, Blowfish –advantage: fast en/decrypting of data, implementation available in hard- and software –disadvantage: key must be known to all participants

Lukas Ruf, TIK April 6th WP3 Presentation, ETH Cryptography Asymmetric: –public- and private-key to encrypt and decrypt –RSA, ElGamal, Rabin –advantage: different keys for encryption and decryption. –disadvantage: very slow

Lukas Ruf, TIK April 6th WP3 Presentation, ETH Key Exchange Required to distribute encryption keys Approaches: –Centralized: Trusted Keyserver stores locally all keys generates session keys upon request must be contacted for every session –Decentralized:Public-Key-Infrastructure (PKI) (e.g. PGP’s Web of Trust)

Lukas Ruf, TIK April 6th WP3 Presentation, ETH Intellectual Property Rights (IPR) Protection schemes –anti-replay –timed validity/usability –digital watermarks, digital signatures Scope of IPR application Scope of data distribution