SlideShare a Scribd company logo
1 of 21
Cryptographic Protocols
Presented By :
Vrushali T.Lanjewar
ME 1st yr CSIT, PG.
Department of SGBAU
Contents
1. The Origins
2. Information Policies
3. Some concepts
 Primitive and protocols
 Definitions
 The Protocol as a Language
 Provability
 Modeling the Adversary
 The Problem of Protocol Composition
4. Protocol Failures
5. Heuristics
6. Tools for Automated Security Analysis
Origins
 Classical model of Crypto-System involves only sender and
receiver
- One way transmission
 IFF protocols started in 1952 by Feistel Group at Air Force
Research Center
 Roger Needham solve the problem of protecting password
by applying the concept of protocols.
 Public-key cryptography inventor Whitfield Diffie solve the
problem of authentication.
 Zero-knowledge interactive protocols
Information Policies
The following list indicates a classification of some concerns
that may arise:
 Release of Information
- Maintain private information.
- Prove the possession of secrets without releasing more
information.
- Exclusive sharing of information.
- Gradual release of information.
- Oblivious release of information.
- Exchange of secret information.
- Anonymity of sender and receiver.
 Preservation of information:
- Maintain correct and complete information among two or more
parties.
- Correct senders and receivers.
- Correct time and complete sequence of events.
We will find all these concerns in various application areas of
networked communications. For example, e-commerce,
transactions, financial trading, on-line auctions.
Some Concepts
Primitives and protocols
 Cryptographic Primitives: The mathematical operations and
functions in local cryptographic transformations are computed
by communicating parties (e.g. encryption, hash function, public
key trapdoor function ,secret key stream, block cipher)
 Cryptographic Protocols : The communication procedures that
use cryptographic primitives in achieving some goals (e.g. key
distribution entity authentication, confidential information
sharing. )
- Small programs designed to secure communication (various
security goals)
 Definitions
- Communication protocol is a set of rules that controls the
interaction of communicating parties.
Two party case, n=2
Multi-party case n>=3(single sender and multiple recipients)
- Cryptographic protocol is a communication protocol that
includes one or more cryptographic primitives.
- Communication channel is the communication medium
enabling the message exchange between communicating parties.
Protocol as a Language
 A language consist of an alphabet of symbols, the syntax of
acceptable words of language and grammar of acceptable
sentences.
 The service provided to communicating parties by the protocol.
 The vocabulary of messages that can be used in the exchange.
Provability
 Correctness – For all possible input values when all parties behave
according to protocol rules.
 Soundness – The security of the protocol principals relative to
adversary.
Modeling of Adversary
 We may assume weak adversary with limited power, or
stronger adversary with extended power over
communication and participants.
 The weakest adversary model is the passive eavesdropping
model of Shannon.
 In even stronger attack model, Malice can also be
acknowledged the power to take over(“corrupt”) other
principals, making the opportunity for collusion attacks by
all “maliced” principals on remaining principals.
Problem of Protocol Composition
 Security of arbitrary cryptographic protocol composition is a
grand challenge.
 One concern is interdependencies between security requirement
and execution environment.
Types of protocol composition:
 Sequential composition of runs of one or more protocols.
 Parallel composition of runs of one or more protocols.
 Concurrent protocol composition allowing arbitrary message
interleaving of simultaneous runs of one or more protocols.
Protocol Failure
 Reasons for Failure
It can come from:
1. Incorrect design of the cryptographic primitives
2. Incorrect design of the cryptographic protocol
3. Incorrect implementation
4. Incorrect environment
5. Incorrect operational management
All these concerns must be observed to ensure the correctness
and soundness of operational cryptographic protocol as
part of larger system.
Heuristics
 Simmons's principle
Principle1- Enumerate all of the properties of all of quantities
involved.
Principle2- 1. Go through the list of properties assuming that
none of them are as they are claimed or tacitly assumed to be
unless a proof technique exist to either or verify their nature.
2. For each possible violation of property, critically examine the
protocol to see if this makes any difference in the outcome of
execution of the protocol.
3. Consider combinations of parameters as well as single
parameters.
Principle 3-
 If the outcome of protocol can be influenced as a result of
a violation of one or more of the assumed properties, it is
essential to determine whether this can be exploited to
advance some meaningful deception.
 Protocol failure occur whenever the function of protocol
can be subverted as consequence of violations.
Separation of concerns
 Divide and conquer is a useful principle in
algorithmic design.
 A direct and natural problem partitioning attempt
for cryptographic protocol is to separate the concern
of crypto-primitives and cryptographic protocols.
 An encryption of message m under secret key k
becomes abstracted and an ideal with [m]k, though a
detailed definition of what this notation means in
terms of security must be made too.
 A simple approach to cryptographic protocol
specification between an initiator I and responder R,
based on initialization of crypto-primitives c an go
like this:
1. I --> R: [NI, I] pk(R)
2. R--> I: [NI, NR] pk(I)
3. I --> R: [NR] pk(R)
This describes Needham -Schroeder public based
mutual authentication protocol.
ResponderInitiator
Nonce NI
[NI, I] pk(R)
[NI, NR] pk(I) Nonce NR
R authenticated
NI , NR Secret [NR] pk(R) I authenticated
NI , NR Secret
Fig. Needham –Schroder public key based authentication protocol
More prudent engineering advice
 Basic principle1: Explicit communication
Every message should say what it means : its
interpretation depends on its content.
 Basic principle2: Appropriate Conditions for Actions
The conditions for [received] message to be acted upon
should be clearly set out so that someone receiving a
design may see whether they are acceptable or not.
Tools for Automated Security Analysis
 Scyther is a formal analysis method tool .
 Scyther is a tool for the automatic verification of
security protocols.
 It is a specialized model checker for authentication
protocol that emulate simple theorem proving
methods.
 Scyther tool illustrates the attack scenarios found by
graphical diagram.
Summary
 Cryptographic protocols are used to provide security
guarantees for the exchanged data when multiple
parties are communicating in an insecure
environment.
 The need for such security guarantees arises because
there are malicious parties who have interest in
obtaining or tampering with the exchanged
information.
 In this we studied information policies, protocol
failures, heuristics ,tools for automated security.
Questions ?
 Explain Cryptographic protocol and primitives.
 State and explain reasons for protocol failure.
 Short note on-
1.Protocol as language,
2.Simmons principle ,
3. Problem of protocol composition,
4.Modeling adversary.
Thank you!

More Related Content

What's hot

Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network SecurityClassical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Securitybabak danyal
 
Substitution techniques
Substitution techniquesSubstitution techniques
Substitution techniquesvinitha96
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographyMd. Afif Al Mamun
 
PGP S/MIME
PGP S/MIMEPGP S/MIME
PGP S/MIMESou Jana
 
Network Security Issues
Network Security IssuesNetwork Security Issues
Network Security IssuesAfreenYousaf
 
Topic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesTopic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesMdFazleRabbi18
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Fabiha Shahzad
 
Information security
Information security Information security
Information security razendar79
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniquesDr.Florence Dayana
 
Network security cryptographic hash function
Network security  cryptographic hash functionNetwork security  cryptographic hash function
Network security cryptographic hash functionMijanur Rahman Milon
 
Information and network security 13 playfair cipher
Information and network security 13 playfair cipherInformation and network security 13 playfair cipher
Information and network security 13 playfair cipherVaibhav Khanna
 
MAC-Message Authentication Codes
MAC-Message Authentication CodesMAC-Message Authentication Codes
MAC-Message Authentication CodesDarshanPatil82
 
Security Attacks.ppt
Security Attacks.pptSecurity Attacks.ppt
Security Attacks.pptZaheer720515
 
Message authentication
Message authenticationMessage authentication
Message authenticationCAS
 

What's hot (20)

Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network SecurityClassical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Security
 
Substitution techniques
Substitution techniquesSubstitution techniques
Substitution techniques
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
PGP S/MIME
PGP S/MIMEPGP S/MIME
PGP S/MIME
 
Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Network Security Issues
Network Security IssuesNetwork Security Issues
Network Security Issues
 
Security threats
Security threatsSecurity threats
Security threats
 
Topic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesTopic1 substitution transposition-techniques
Topic1 substitution transposition-techniques
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Information security
Information security Information security
Information security
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
Network security cryptographic hash function
Network security  cryptographic hash functionNetwork security  cryptographic hash function
Network security cryptographic hash function
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
Information and network security 13 playfair cipher
Information and network security 13 playfair cipherInformation and network security 13 playfair cipher
Information and network security 13 playfair cipher
 
MAC-Message Authentication Codes
MAC-Message Authentication CodesMAC-Message Authentication Codes
MAC-Message Authentication Codes
 
Security Attacks.ppt
Security Attacks.pptSecurity Attacks.ppt
Security Attacks.ppt
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
 
Message authentication
Message authenticationMessage authentication
Message authentication
 

Similar to Cryptographic protocols

Chaos Based Direct Public Verifiable Signcryption Scheme
Chaos Based Direct Public Verifiable Signcryption SchemeChaos Based Direct Public Verifiable Signcryption Scheme
Chaos Based Direct Public Verifiable Signcryption SchemeIOSR Journals
 
Survey of universal authentication protocol for mobile communication
Survey of universal authentication protocol for mobile communicationSurvey of universal authentication protocol for mobile communication
Survey of universal authentication protocol for mobile communicationAhmad Sharifi
 
security lecture and final powepoint presentation
security lecture and final powepoint presentationsecurity lecture and final powepoint presentation
security lecture and final powepoint presentationsrajece
 
RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and TextRSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and TextYekini Nureni
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsDamien Magoni
 
Cryptography and Network Lecture Notes
Cryptography and Network Lecture NotesCryptography and Network Lecture Notes
Cryptography and Network Lecture NotesFellowBuddy.com
 
MSc CS - I - 19PCSC203 - Cryptography and Network Security.pdf
MSc CS - I - 19PCSC203 - Cryptography and Network Security.pdfMSc CS - I - 19PCSC203 - Cryptography and Network Security.pdf
MSc CS - I - 19PCSC203 - Cryptography and Network Security.pdfSelvakanmani S
 
CNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdfCNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdfAdiseshaK
 
CNS Solutions-Adi.pdf
CNS Solutions-Adi.pdfCNS Solutions-Adi.pdf
CNS Solutions-Adi.pdfAdiseshaK
 
Formal Modeling and Verification of Trusted OLSR Protocol Using I-SPIN Model...
Formal Modeling and Verification of Trusted OLSR Protocol  Using I-SPIN Model...Formal Modeling and Verification of Trusted OLSR Protocol  Using I-SPIN Model...
Formal Modeling and Verification of Trusted OLSR Protocol Using I-SPIN Model...IOSR Journals
 
Cryptography introduction
Cryptography introductionCryptography introduction
Cryptography introductionVasuki Ramasamy
 
Cryptographic Protocol is and isn't like LEGO.
Cryptographic Protocol is and isn't like LEGO.Cryptographic Protocol is and isn't like LEGO.
Cryptographic Protocol is and isn't like LEGO.Shin'ichiro Matsuo
 
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ijcseit
 
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ijcseit
 
E-Commerce security
E-Commerce security E-Commerce security
E-Commerce security Tawhid Rahman
 
Bt0088 cryptography and network security1
Bt0088 cryptography and network security1Bt0088 cryptography and network security1
Bt0088 cryptography and network security1Techglyphs
 

Similar to Cryptographic protocols (20)

Chaos Based Direct Public Verifiable Signcryption Scheme
Chaos Based Direct Public Verifiable Signcryption SchemeChaos Based Direct Public Verifiable Signcryption Scheme
Chaos Based Direct Public Verifiable Signcryption Scheme
 
Unit-1.pptx
Unit-1.pptxUnit-1.pptx
Unit-1.pptx
 
Survey of universal authentication protocol for mobile communication
Survey of universal authentication protocol for mobile communicationSurvey of universal authentication protocol for mobile communication
Survey of universal authentication protocol for mobile communication
 
security lecture and final powepoint presentation
security lecture and final powepoint presentationsecurity lecture and final powepoint presentation
security lecture and final powepoint presentation
 
Ijtra150171
Ijtra150171Ijtra150171
Ijtra150171
 
RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and TextRSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Cryptography and Network Lecture Notes
Cryptography and Network Lecture NotesCryptography and Network Lecture Notes
Cryptography and Network Lecture Notes
 
MSc CS - I - 19PCSC203 - Cryptography and Network Security.pdf
MSc CS - I - 19PCSC203 - Cryptography and Network Security.pdfMSc CS - I - 19PCSC203 - Cryptography and Network Security.pdf
MSc CS - I - 19PCSC203 - Cryptography and Network Security.pdf
 
CNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdfCNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdf
 
CNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdfCNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdf
 
CNS Solutions-Adi.pdf
CNS Solutions-Adi.pdfCNS Solutions-Adi.pdf
CNS Solutions-Adi.pdf
 
Formal Modeling and Verification of Trusted OLSR Protocol Using I-SPIN Model...
Formal Modeling and Verification of Trusted OLSR Protocol  Using I-SPIN Model...Formal Modeling and Verification of Trusted OLSR Protocol  Using I-SPIN Model...
Formal Modeling and Verification of Trusted OLSR Protocol Using I-SPIN Model...
 
Cryptography introduction
Cryptography introductionCryptography introduction
Cryptography introduction
 
Cryptographic Protocol is and isn't like LEGO.
Cryptographic Protocol is and isn't like LEGO.Cryptographic Protocol is and isn't like LEGO.
Cryptographic Protocol is and isn't like LEGO.
 
A Secure Proxy Signature Scheme with Fault Tolerance Based On Discrete Logari...
A Secure Proxy Signature Scheme with Fault Tolerance Based On Discrete Logari...A Secure Proxy Signature Scheme with Fault Tolerance Based On Discrete Logari...
A Secure Proxy Signature Scheme with Fault Tolerance Based On Discrete Logari...
 
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
 
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
 
E-Commerce security
E-Commerce security E-Commerce security
E-Commerce security
 
Bt0088 cryptography and network security1
Bt0088 cryptography and network security1Bt0088 cryptography and network security1
Bt0088 cryptography and network security1
 

More from Vrushali Lanjewar

Best performance evaluation metrics for image Classification.docx
Best performance evaluation metrics for image Classification.docxBest performance evaluation metrics for image Classification.docx
Best performance evaluation metrics for image Classification.docxVrushali Lanjewar
 
Studies based on Deep learning in recent years.pptx
Studies based on Deep learning in recent years.pptxStudies based on Deep learning in recent years.pptx
Studies based on Deep learning in recent years.pptxVrushali Lanjewar
 
Comparison of thresholding methods
Comparison of thresholding methodsComparison of thresholding methods
Comparison of thresholding methodsVrushali Lanjewar
 
Software Engineering Testing & Research
Software Engineering Testing & Research Software Engineering Testing & Research
Software Engineering Testing & Research Vrushali Lanjewar
 
Performance Anaysis for Imaging System
Performance Anaysis for Imaging SystemPerformance Anaysis for Imaging System
Performance Anaysis for Imaging SystemVrushali Lanjewar
 
Advance Computer Architecture
Advance Computer ArchitectureAdvance Computer Architecture
Advance Computer ArchitectureVrushali Lanjewar
 
Wireless Communication Network Communication
Wireless Communication Network CommunicationWireless Communication Network Communication
Wireless Communication Network CommunicationVrushali Lanjewar
 
Distributed Database practicals
Distributed Database practicals Distributed Database practicals
Distributed Database practicals Vrushali Lanjewar
 

More from Vrushali Lanjewar (13)

Best performance evaluation metrics for image Classification.docx
Best performance evaluation metrics for image Classification.docxBest performance evaluation metrics for image Classification.docx
Best performance evaluation metrics for image Classification.docx
 
Studies based on Deep learning in recent years.pptx
Studies based on Deep learning in recent years.pptxStudies based on Deep learning in recent years.pptx
Studies based on Deep learning in recent years.pptx
 
Word art1
Word art1Word art1
Word art1
 
My Dissertation 2016
My Dissertation 2016My Dissertation 2016
My Dissertation 2016
 
Comparison of thresholding methods
Comparison of thresholding methodsComparison of thresholding methods
Comparison of thresholding methods
 
Software Engineering Testing & Research
Software Engineering Testing & Research Software Engineering Testing & Research
Software Engineering Testing & Research
 
Real Time Embedded System
Real Time Embedded SystemReal Time Embedded System
Real Time Embedded System
 
Performance Anaysis for Imaging System
Performance Anaysis for Imaging SystemPerformance Anaysis for Imaging System
Performance Anaysis for Imaging System
 
Advance Computer Architecture
Advance Computer ArchitectureAdvance Computer Architecture
Advance Computer Architecture
 
Wireless Communication Network Communication
Wireless Communication Network CommunicationWireless Communication Network Communication
Wireless Communication Network Communication
 
Distributed Database practicals
Distributed Database practicals Distributed Database practicals
Distributed Database practicals
 
Pmgdisha
PmgdishaPmgdisha
Pmgdisha
 
Distributed system
Distributed systemDistributed system
Distributed system
 

Recently uploaded

University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 

Recently uploaded (20)

Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 

Cryptographic protocols

  • 1. Cryptographic Protocols Presented By : Vrushali T.Lanjewar ME 1st yr CSIT, PG. Department of SGBAU
  • 2. Contents 1. The Origins 2. Information Policies 3. Some concepts  Primitive and protocols  Definitions  The Protocol as a Language  Provability  Modeling the Adversary  The Problem of Protocol Composition 4. Protocol Failures 5. Heuristics 6. Tools for Automated Security Analysis
  • 3. Origins  Classical model of Crypto-System involves only sender and receiver - One way transmission  IFF protocols started in 1952 by Feistel Group at Air Force Research Center  Roger Needham solve the problem of protecting password by applying the concept of protocols.  Public-key cryptography inventor Whitfield Diffie solve the problem of authentication.  Zero-knowledge interactive protocols
  • 4. Information Policies The following list indicates a classification of some concerns that may arise:  Release of Information - Maintain private information. - Prove the possession of secrets without releasing more information. - Exclusive sharing of information. - Gradual release of information. - Oblivious release of information. - Exchange of secret information. - Anonymity of sender and receiver.
  • 5.  Preservation of information: - Maintain correct and complete information among two or more parties. - Correct senders and receivers. - Correct time and complete sequence of events. We will find all these concerns in various application areas of networked communications. For example, e-commerce, transactions, financial trading, on-line auctions.
  • 6. Some Concepts Primitives and protocols  Cryptographic Primitives: The mathematical operations and functions in local cryptographic transformations are computed by communicating parties (e.g. encryption, hash function, public key trapdoor function ,secret key stream, block cipher)  Cryptographic Protocols : The communication procedures that use cryptographic primitives in achieving some goals (e.g. key distribution entity authentication, confidential information sharing. ) - Small programs designed to secure communication (various security goals)
  • 7.  Definitions - Communication protocol is a set of rules that controls the interaction of communicating parties. Two party case, n=2 Multi-party case n>=3(single sender and multiple recipients) - Cryptographic protocol is a communication protocol that includes one or more cryptographic primitives. - Communication channel is the communication medium enabling the message exchange between communicating parties.
  • 8. Protocol as a Language  A language consist of an alphabet of symbols, the syntax of acceptable words of language and grammar of acceptable sentences.  The service provided to communicating parties by the protocol.  The vocabulary of messages that can be used in the exchange. Provability  Correctness – For all possible input values when all parties behave according to protocol rules.  Soundness – The security of the protocol principals relative to adversary.
  • 9. Modeling of Adversary  We may assume weak adversary with limited power, or stronger adversary with extended power over communication and participants.  The weakest adversary model is the passive eavesdropping model of Shannon.  In even stronger attack model, Malice can also be acknowledged the power to take over(“corrupt”) other principals, making the opportunity for collusion attacks by all “maliced” principals on remaining principals.
  • 10. Problem of Protocol Composition  Security of arbitrary cryptographic protocol composition is a grand challenge.  One concern is interdependencies between security requirement and execution environment. Types of protocol composition:  Sequential composition of runs of one or more protocols.  Parallel composition of runs of one or more protocols.  Concurrent protocol composition allowing arbitrary message interleaving of simultaneous runs of one or more protocols.
  • 11. Protocol Failure  Reasons for Failure It can come from: 1. Incorrect design of the cryptographic primitives 2. Incorrect design of the cryptographic protocol 3. Incorrect implementation 4. Incorrect environment 5. Incorrect operational management All these concerns must be observed to ensure the correctness and soundness of operational cryptographic protocol as part of larger system.
  • 12. Heuristics  Simmons's principle Principle1- Enumerate all of the properties of all of quantities involved. Principle2- 1. Go through the list of properties assuming that none of them are as they are claimed or tacitly assumed to be unless a proof technique exist to either or verify their nature. 2. For each possible violation of property, critically examine the protocol to see if this makes any difference in the outcome of execution of the protocol. 3. Consider combinations of parameters as well as single parameters.
  • 13. Principle 3-  If the outcome of protocol can be influenced as a result of a violation of one or more of the assumed properties, it is essential to determine whether this can be exploited to advance some meaningful deception.  Protocol failure occur whenever the function of protocol can be subverted as consequence of violations.
  • 14. Separation of concerns  Divide and conquer is a useful principle in algorithmic design.  A direct and natural problem partitioning attempt for cryptographic protocol is to separate the concern of crypto-primitives and cryptographic protocols.  An encryption of message m under secret key k becomes abstracted and an ideal with [m]k, though a detailed definition of what this notation means in terms of security must be made too.
  • 15.  A simple approach to cryptographic protocol specification between an initiator I and responder R, based on initialization of crypto-primitives c an go like this: 1. I --> R: [NI, I] pk(R) 2. R--> I: [NI, NR] pk(I) 3. I --> R: [NR] pk(R) This describes Needham -Schroeder public based mutual authentication protocol.
  • 16. ResponderInitiator Nonce NI [NI, I] pk(R) [NI, NR] pk(I) Nonce NR R authenticated NI , NR Secret [NR] pk(R) I authenticated NI , NR Secret Fig. Needham –Schroder public key based authentication protocol
  • 17. More prudent engineering advice  Basic principle1: Explicit communication Every message should say what it means : its interpretation depends on its content.  Basic principle2: Appropriate Conditions for Actions The conditions for [received] message to be acted upon should be clearly set out so that someone receiving a design may see whether they are acceptable or not.
  • 18. Tools for Automated Security Analysis  Scyther is a formal analysis method tool .  Scyther is a tool for the automatic verification of security protocols.  It is a specialized model checker for authentication protocol that emulate simple theorem proving methods.  Scyther tool illustrates the attack scenarios found by graphical diagram.
  • 19. Summary  Cryptographic protocols are used to provide security guarantees for the exchanged data when multiple parties are communicating in an insecure environment.  The need for such security guarantees arises because there are malicious parties who have interest in obtaining or tampering with the exchanged information.  In this we studied information policies, protocol failures, heuristics ,tools for automated security.
  • 20. Questions ?  Explain Cryptographic protocol and primitives.  State and explain reasons for protocol failure.  Short note on- 1.Protocol as language, 2.Simmons principle , 3. Problem of protocol composition, 4.Modeling adversary.