1 Project Proposals for MAI from COSIC Oct. 6th, 2004. 2.20pm.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Security and Privacy over the Internet Chan Hing Wing, Anthony Mphil Yr. 1, CSE, CUHK Oct 19, 1998.
Topic 7: Using cryptography in mobile computing. Cryptography basics: symmetric, public-key, hash function and digital signature Cryptography, describing.
Digital Signatures and Hash Functions. Digital Signatures.
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
The Physically Observable Security of Signature Schemes Alexander W. Dent Joint work with John Malone-Lee University of Bristol.
FIT3105 Smart card based authentication and identity management Lecture 4.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Henric Johnson1 Chapter3 Public-Key Cryptography and Message Authentication Henric Johnson Blekinge Institute of Technology, Sweden
CMSC 414 Computer and Network Security Lecture 9 Jonathan Katz.
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
Radu Muresan CODES+ISSS'04, September 8-10, 2004, Stockholm, Sweden1 Current Flattening in Software and Hardware for Security Applications Authors: R.
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
IT 221: Classical and Modern Encryption Techniques Lecture 2: Classical and Modern Encryption Techniques For Educational Purposes Only Revised: September.
ASYMMETRIC CIPHERS.
Project supported by YESS 2009 Young Engineering Scientist Symposium « Identity Management » Cryptography for the Security of Embedded Systems Ambient.
Cryptography Week-6.
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
1 Public-Key Cryptography and Message Authentication Ola Flygt Växjö University, Sweden
© Neeraj Suri EU-NSF ICT March 2006 DEWSNet Dependable Embedded Wired/Wireless Networks MUET Jamshoro Computer Security: Principles and Practice Slides.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Cryptology By Greg Buss Pat Shields Barry Burke. What is Cryptology? Cryptology is the study of “secret writing.” Modern cryptology combines the studies.
Agenda Definitions Why cryptography is important? Available technologies Benefits & problems.
Cryptography, Authentication and Digital Signatures
CSCE 201 Introduction to Information Security Fall 2010 Data Protection.
LOGO Hardware side of Cryptography Anestis Bechtsoudis Patra 2010.
Network Security Section 1: Introduction to security.
Applying White-Box Cryptography SoBeNet user group meeting October 8, 2004 Brecht Wyseur.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
1 Public-Key Cryptography and Message Authentication.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
Shambhu Upadhyaya Security – AES-CCMP Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 13)
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Public Key Encryption.
TinySec : Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof :: Naveen Sastry :: David Wagner Presented by Anil Karamchandani 10/01/2007.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
Lecture 2: Introduction to Cryptography
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
The First Ten Years of Public-Key Cryptography Paper by: Whitfield Diffie Presentation by Taotao Zhao.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
ICOM 5995 (crypto) - Noack Crypto - Administrivia Prontuario - Please time-share and ask questions Info is in my homepage amadeus.uprm.edu/~noack/ Make.
Intro to Cryptography Lesson Introduction
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
Copyright 2012, Toshiba Corporation. A Survey on the Algebraic Surface Cryptosystems Koichiro Akiyama ( TOSHIBA Corporation ) Joint work with Prof. Yasuhiro.
1.1 Introduction to Cryptography. 1.2 Basic Cryptography Cryptography is a deep mathematical subject. Cryptographic protocols provide a cornerstone for.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
Week-14 (Lecture-1) Malicious software and antivirus: 1. Malware A user can be tricked or forced into downloading malware comes in many forms, Ex. viruses,
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
(Principles of Informatioan security)
Overview on Hardware Security
USAGE OF CRYPTOGRAPHY IN NETWORK SECURITY
Cryptography.
Chapter 3:Cryptography (16M)
Provable Security at Implementation-level
Unit 2: Cryptography & Cryptographic Algorithm
Cryptanalysis Network Security.
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

1 Project Proposals for MAI from COSIC Oct. 6th, pm

2 COSIC: who are we? COmputer Security & Industrial Cryptography COmputer Security & Industrial Cryptography –Mobile security and protocols –Fast and secure implementations –Security architectures (XML,... ) –Design & analysis of cryptographic algorithms (Advanced Encryption Standard, RIPEMD) Interdisciplinary and international research group: 35 researchers from engineering, computer science, mathematics, MAI,... and from 12 countries. Interdisciplinary and international research group: 35 researchers from engineering, computer science, mathematics, MAI,... and from 12 countries.

3 COSIC: project proposals Full text of our project proposals can be found at Full text of our project proposals can be found at We will now present these proposals briefly We will now present these proposals briefly Feel free to contact the daily supervisor if you have any further questions Feel free to contact the daily supervisor if you have any further questions

4 1. Java-implementation of Multivariate Public-key Cryptosystems Multivariate Public Key schemes can be used in the context of mobile agents for authentication and encryption of sensitive data. Multivariate Public Key schemes can be used in the context of mobile agents for authentication and encryption of sensitive data. Goal of the project: implementation of a known algorithm in Java. Goal of the project: implementation of a known algorithm in Java. The purpose of this thesis is to contribute to a Java crypto- provider, i.e., to produce an open source implementation of such an algorithm. The purpose of this thesis is to contribute to a Java crypto- provider, i.e., to produce an open source implementation of such an algorithm. The finite-field routines - needed for this implementation - are already available. Hence, the students can concentrate on the cryptographic algorithms alone. The finite-field routines - needed for this implementation - are already available. Hence, the students can concentrate on the cryptographic algorithms alone. Office: ESAT Office: ESAT 02.22

5 2. Software security through diversity Software on entrusted hosts has to be protected against attacks. Software on entrusted hosts has to be protected against attacks. A software agent, for example, travels from host to host. Therefore, it needs adequate protection. A software agent, for example, travels from host to host. Therefore, it needs adequate protection. To avoid a global, automated attack disabling the whole agent system, diversity is introduced. Hence, each agent implementations differs on an implementation level, while preserving its functionality. To avoid a global, automated attack disabling the whole agent system, diversity is introduced. Hence, each agent implementations differs on an implementation level, while preserving its functionality. Code transformations could be used to replicate agents, while a genetic algorithms could monitor their evolution. Code transformations could be used to replicate agents, while a genetic algorithms could monitor their evolution. Office: ESAT Office: ESAT 02.20

6 3. Breaking the Grille Cipher 16th century transposition cipher 16th century transposition cipher –Invented by Girolamo Cardano. –Used by Cardinal Richelieu in 17th century –Used by Germans in WWI.

7 3. Breaking the Grille Cipher (cont.) Broken by French cryptanalysts (up to 10x10, 4 months of work) Broken by French cryptanalysts (up to 10x10, 4 months of work) Large secret key: Large secret key: –10x10 -> 2^50 possibilities –16x16 -> 2^128 possibilities Goal: Design clever heuristic algorithm to break arbitrary sizes in real time on a computer. Goal: Design clever heuristic algorithm to break arbitrary sizes in real time on a computer. Office: ESAT Office: ESAT 01.58

8 Mathematical security Physical security?? Side-channels: Timing Power consumption Electromagnetic radiation INPUT SECRET OUTPUT CRYPTODEVICE SECRET KEY 4. Modelling and simulating timing attacks on RSA using search methods

9 input output t t = f(input,secret key) Input 1 t1 Input 2 t2 … Input N tN Find key using search methods (sequence analysis, markov models) … Office: ESAT 01.62