An Efficient and Secure Event Signature (EASES) Protocol for Peer-to-Peer Massively Multiplayer Online Games Mo-Che Chan, Shun-Yun Hu and Jehn-Ruey Jiang.

Slides:



Advertisements
Similar presentations
Hash Functions A hash function takes data of arbitrary size and returns a value in a fixed range. If you compute the hash of the same data at different.
Advertisements

E W H A W U New Nominative Proxy Signature Scheme for Mobile Communication April Seo, Seung-Hyun Dept. of Computer Science and.
MAC Raushan. DES simple fiestel network 3131 PlainText Blocks 2*4=8bits 31 f f =0011 xor 0011=0000 = 0 f(r,k)=(2*r+k^2)%8 f(1,5)=(2*1+5^2)%8=3 xor 3 3.
Network Security: Lab#2 J. H. Wang Apr. 28, 2011.
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
Cryptography and Network Security
Digital Signatures and Hash Functions. Digital Signatures.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
Authentication and Digital Signatures CSCI 5857: Encoding and Encryption.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
Security Chapters 14,15. The Security Environment Threats Security goals and threats.
Security Chapters 14,15. The Security Environment Threats Security goals and threats.
Secure Poker Post PC project Motivation Games have been pushing computer industry Many people carry gadgets, but hardly a pack of cards. (even during.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
Introduction to Signcryption November 22, /11/2004 Signcryption Public Key (PK) Cryptography Discovering Public Key (PK) cryptography has made.
Chapter 3 Encryption Algorithms & Systems (Part C)
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
CSE 597E Fall 2001 PennState University1 Digital Signature Schemes Presented By: Munaiza Matin.
E- Business Digital Signature Varna Free University Prof. Teodora Bakardjieva.
Overview of Digital Signatures Introduction To Networks and Communications (CS 555) Presented by Bharath Kongara.
Cryptographic Security Cryptographic Mechanisms 1Mesbah Islam– Operating Systems.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Csci5233 Computer Security1 Bishop: Chapter 10 Key Management: Digital Signature.
Information Security and Management 13. Digital Signatures and Authentication Protocols Chih-Hung Wang Fall
Lecture 8 Digital Signatures. This lecture considers techniques designed to provide the digital counterpart to a handwritten signature. A digital signature.
Bob can sign a message using a digital signature generation algorithm
Rennes, 15/10/2014 Cristina Onete Message authenticity: Digital Signatures.
CS555Topic 211 Cryptography CS 555 Topic 21: Digital Schemes (1)
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
02/22/2005 Joint Seminer Satoshi Koga Information Technology & Security Lab. Kyushu Univ. A Distributed Online Certificate Status Protocol with Low Communication.
Topic 22: Digital Schemes (2)
Chapter 16 Security Introduction to CS 1 st Semester, 2012 Sanghyun Park.
Signcryption Parshuram Budhathoki Department of Mathematical Sciences Florida Atlantic University April 18, 2013
Internet-security.ppt-1 ( ) 2000 © Maximilian Riegel Maximilian Riegel Kommunikationsnetz Franken e.V. Internet Security Putting together the.
Chapter 4 Using Encryption in Cryptographic Protocols & Practices (Part B)
Lecture 8 Overview. Secure Hash Algorithm (SHA) SHA SHA SHA – SHA-224, SHA-256, SHA-384, SHA-512 SHA-1 A message composed of b bits.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
1 Number Theory and Advanced Cryptography 6. Digital Signature Chih-Hung Wang Sept Part I: Introduction to Number Theory Part II: Advanced Cryptography.
Lecture 16: Security CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9.
Digital Signatures, Message Digest and Authentication Week-9.
Cryptographic Hash Functions and Protocol Analysis
Cryptography: Digital Signatures Message Digests Authentication
Efficient AOI-Cast for Peer-to-Peer Networked Virtual Environments.
Prepared by Dr. Lamiaa Elshenawy
Cryptographic Hash Functions Prepared by Dr. Lamiaa Elshenawy
1 Signature Protocol for Peer-to- peer Massively Multiplayer Online Games Speaker: Shu-Fen Chiou ( 邱淑芬 )
Secure Messenger Protocol using AES (Rijndael) Sang won, Lee
Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 11 September 23, 2004.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
1 An Ordered Multi-Proxy Multi-Signature Scheme Authors: Min-Shiang Hwang, Shiang-Feng Tzeng, Shu-Fen Chiou Speaker: Shu-Fen Chiou.
Hashes Lesson Introduction ●The birthday paradox and length of hash ●Secure hash function ●HMAC.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
Encryption and Security Tools for IA Management Nick Hornick COSC 481 Spring 2007.
Cryptography and Network Security Chapter 13
Information Security message M one-way hash fingerprint f = H(M)
CSCE 715: Network Systems Security
Chapters 14,15 Security.
Information Security message M one-way hash fingerprint f = H(M)
NET 311 Information Security
ICS 454 Principles of Cryptography
Information Security message M one-way hash fingerprint f = H(M)
Enabling Technology1: Cryptography
ICS 454 Principles of Cryptography
Chapters 14,15 Security.
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
Digital Signatures Reference: Pfleeger , Charles P., Security in Computing, 2nd Edition, Prentice Hall, /7/2019 Ref: Pfleeger96, Ch.4.
Hashing Hash are the auxiliary values that are used in cryptography.
Presentation transcript:

An Efficient and Secure Event Signature (EASES) Protocol for Peer-to-Peer Massively Multiplayer Online Games Mo-Che Chan, Shun-Yun Hu and Jehn-Ruey Jiang Adaptive Computing and Networking Lab. National Central University 1

Outline Background Related work – NEO – SEA The proposed scheme – EASES Evaluation Conclusion 2

Background - MMOG Multiplayer online game Massively multiplayer online game (MMOG) 3

Background - architectures Client-server 4

Background - architectures Server-cluster 5

Background - architectures Peer-to-peer (P2P) network Efficiently maintain the topology – Virtual environment 6

Background – game logic In client-server and server-cluster – Server maintains game states – Users send event to server – Server sends information to player 77 time round

Background – cheat problem Game logic is maintained by peers in P2P environments. Some players may gain advantages unfairly. 8

Background - commitment Play the paper, scissors, rock game remotely without arbiter 9

Background – hash function Cryptographic hash function Strength depends on the following infeasibilities – For any given hashed value, to find M or M’ – For any given message M, to find H(M) = H(M’) – To find any pair (M, M’) such that H(M) = H(M’) 10 Hash function

Background - commitment No one can get unfair advantages if the hash function is secure. 11 First send H(Choice | Random) Then send (Choice | Random) H(Choice | Random) Choice | Random H(Choice | Random) Choice | Random

Background – digital signature Concept 12 A documentTo sign it No one can forge Signer can’t repudiate that he executed the algorithm for this document Authenticity of the document …….. Signature algorithm A digital signature ……..

Background – digital signature To sign a message 13 message 0101… …110 message 1011…110 Hash function To sign by sender’s private key

Background – digital signature To verify a signature 14 message 1011… …101 ? Hash function To inverse the signature by signer’s public key To check they are the same or not

Related work - NEO 15 Player i Every updating message Signing event updating message Encrypting the signed message After, send decrypting key

Related work - SEA 16 Player i Every updating message Signed hash value of event updating message After, send the plain message

The problem that we observed Digital signature algorithms are too slow. 17 Single Document Hash algorithm Signature algorithm Signature Original message To produce the message digest To sign the message digest

The objective To efficiently sign many discrete messages 18 Message 1 Message 2 …… Message n

The proposed EASES Initialization phase – Every player prepares the keys for signing. Signing phase – Every player signs his messages. Verification phase – Every receiver verifies the authenticity. Re-initialization phase – Re-generate new signing keys. 19

EASES – initialization phase 20 …… …110

EASES – signing & verification 21 ……. Send out j j j-1 j j j+1 j+2 j-1 j-2 j-3

EASES – re-initialization phase Re-execute initialization phase A more efficient way – Reserve the last two keys 22 …… …110 ……..

Evaluation - performance Computational cost – Hash replaces signature function Memory consumption – 1,000 * 192 bits = 24,000 bytes, when n = 1,000 Bandwidth consumption – Length of Hash value is short than signature’s 23 EASESTraditional Signature ComputationBetter MemoryBetter BandwidthBetter

Evaluation - security Unforgeability – No one can claim that he signed M, unless he show the OSK of M. – This requirement is secure if adopted cryptographic hash function is secure. Verifiability – Hash function is public. 24

Conclusion and discussion EASES is proposed to sign many discrete messages at once efficiently Security of EASES is as strong as those of traditional signature schemes ESAES implies the commitment property 25