Uploaded on

keyless Signature

keyless Signature

More in: Technology , Business
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
96
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
3
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Keyless Signature InfrastructureKSI Motivation: - Complexities and cost of management for PKI Keys.Service Provided by KSI: - Data Integrity - Time of Signature - Verification of the origin.Summary of the KSI: Alice Cloud Storage Alice Transfer her data to Cloud (ex. Joyent) Guardtime Service An hash value is generated GT per second and transferred to GT service Calender Database GT sign the has value and publish it in the calender db. Publication in public A summary of hash values in newspaper the calender is published per month month duration. Fig: KSI workflow.
  • 2. To check the integrity of data, Alice need to: i. Keep track of last hash value. & before next update of the data, she will check if stored hash value matches with the current hash value.Attack Models: 1. Simultaneous update Attack: Alice can detect corruption if made at time t3 but not at time t4 which happened simultaneously with her own update. h3 h4 Hash values over Time h1 h2 Data over Time Time t3 t4 t1 t2 Attempt to Change by attacker Alice changes her own data  This data alteration can be changed by analyzing tamper-proof log data. In this case, only KSI cannot provide data integrity. The risk becomes high when data is changed very frequently.  KSI can potentially detect integrity violation, when Alice hardly changes her own data. 2. Known Signature Attack:  The adversary can change the data & generate corresponding root hash value and attack/persuade the print media to print the forged publication value. o Thus, besides trusting Cloud provider and Guardtime, Alice also needs to trust the print media.Why do we need keyless Signature? - If PKI is costly to manage key, can we make PKI key management more efficient?
  • 3. Week Points of PSI: - High computational cost for generating Hash value per second from large volume of Data (GB Range).