an intrusion tolerant threshold cryptographic system
play

An Intrusion Tolerant Threshold Cryptographic System Kamran Riaz - PowerPoint PPT Presentation

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions An Intrusion Tolerant Threshold Cryptographic System Kamran Riaz Khan <krkhan@inspirated.com> March 2, 2010 Kamran Riaz Khan


  1. Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions An Intrusion Tolerant Threshold Cryptographic System Kamran Riaz Khan <krkhan@inspirated.com> March 2, 2010 Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

  2. Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions Outline 1 Problem Statement Background Fail Well Systems The Basic Model 2 Proposed Solution ( k , n ) Threshold Scheme Project Goals 3 Statement Approaches Implementation Deliverables 4 5 Related Work References 6 7 Questions Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

  3. Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions Background Symmetric-Key Cryptography Alice calculates: c := E ( K , m ) (1) Alice sends c to Bob Bob calculates: m := D ( K , c ) (2) How to communicate K ? Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

  4. Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions Background Symmetric-Key Cryptography Alice calculates: c := E ( K , m ) (1) Alice sends c to Bob Bob calculates: m := D ( K , c ) (2) How to communicate K ? Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

  5. Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions Background Symmetric-Key Cryptography Alice calculates: c := E ( K , m ) (1) Alice sends c to Bob Bob calculates: m := D ( K , c ) (2) How to communicate K ? Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

  6. Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions Background Symmetric-Key Cryptography Alice calculates: c := E ( K , m ) (1) Alice sends c to Bob Bob calculates: m := D ( K , c ) (2) How to communicate K ? Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

  7. Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions Background Symmetric-Key Cryptography Alice calculates: c := E ( K , m ) (1) Alice sends c to Bob Bob calculates: m := D ( K , c ) (2) How to communicate K ? Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

  8. Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions Background Public-Key Cryptography Bank generates a pair of keys ( S bank , P bank ) such that D ( S bank , E ( P bank , m )) = m (3) for all values of m P bank is published Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

  9. Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions Background Public-Key Cryptography Bank generates a pair of keys ( S bank , P bank ) such that D ( S bank , E ( P bank , m )) = m (3) for all values of m P bank is published Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

  10. Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions Background Public-Key Cryptography Bank generates a pair of keys ( S bank , P bank ) such that D ( S bank , E ( P bank , m )) = m (3) for all values of m P bank is published Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

  11. Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions Background Public-Key Cryptography For credit card number m , client calculates: c := E ( P bank , m ) (4) Client sends c to bank Bank receives c and calculates: m := D ( S bank , c ) (5) Equation (3) ensures m is recovered from c ∗ ∗ N. Ferguson and B. Schneier, Practical Cryptography . New York, NY, USA: John Wiley & Sons, Inc., 2003 [1] Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

  12. Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions Background Public-Key Cryptography For credit card number m , client calculates: c := E ( P bank , m ) (4) Client sends c to bank Bank receives c and calculates: m := D ( S bank , c ) (5) Equation (3) ensures m is recovered from c ∗ ∗ N. Ferguson and B. Schneier, Practical Cryptography . New York, NY, USA: John Wiley & Sons, Inc., 2003 [1] Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

  13. Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions Background Public-Key Cryptography For credit card number m , client calculates: c := E ( P bank , m ) (4) Client sends c to bank Bank receives c and calculates: m := D ( S bank , c ) (5) Equation (3) ensures m is recovered from c ∗ ∗ N. Ferguson and B. Schneier, Practical Cryptography . New York, NY, USA: John Wiley & Sons, Inc., 2003 [1] Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

  14. Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions Background Public-Key Cryptography For credit card number m , client calculates: c := E ( P bank , m ) (4) Client sends c to bank Bank receives c and calculates: m := D ( S bank , c ) (5) Equation (3) ensures m is recovered from c ∗ ∗ N. Ferguson and B. Schneier, Practical Cryptography . New York, NY, USA: John Wiley & Sons, Inc., 2003 [1] Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

  15. Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions Background Public-Key Cryptography For credit card number m , client calculates: c := E ( P bank , m ) (4) Client sends c to bank Bank receives c and calculates: m := D ( S bank , c ) (5) Equation (3) ensures m is recovered from c ∗ ∗ N. Ferguson and B. Schneier, Practical Cryptography . New York, NY, USA: John Wiley & Sons, Inc., 2003 [1] Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

  16. Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions Background Postal Analogy Symmetric-Key: Alice buys Padlock Alice and Key Alice Alice puts the secret message in a box Alice locks the box using Padlock Alice Alice sends the box to Bob Alice gives Bob the Key Alice through some other channel Bob receives the box Bob unlocks the box using Key Alice Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

  17. Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions Background Postal Analogy Symmetric-Key: Alice buys Padlock Alice and Key Alice Alice puts the secret message in a box Alice locks the box using Padlock Alice Alice sends the box to Bob Alice gives Bob the Key Alice through some other channel Bob receives the box Bob unlocks the box using Key Alice Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

  18. Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions Background Postal Analogy Symmetric-Key: Alice buys Padlock Alice and Key Alice Alice puts the secret message in a box Alice locks the box using Padlock Alice Alice sends the box to Bob Alice gives Bob the Key Alice through some other channel Bob receives the box Bob unlocks the box using Key Alice Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

  19. Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions Background Postal Analogy Symmetric-Key: Alice buys Padlock Alice and Key Alice Alice puts the secret message in a box Alice locks the box using Padlock Alice Alice sends the box to Bob Alice gives Bob the Key Alice through some other channel Bob receives the box Bob unlocks the box using Key Alice Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

  20. Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions Background Postal Analogy Symmetric-Key: Alice buys Padlock Alice and Key Alice Alice puts the secret message in a box Alice locks the box using Padlock Alice Alice sends the box to Bob Alice gives Bob the Key Alice through some other channel Bob receives the box Bob unlocks the box using Key Alice Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

Recommend


More recommend