SlideShare a Scribd company logo
SESSION ID:
#RSAC
Adam Shull
CRYPTOGRAPHIC PROTOCOLS:
PRACTICAL REVOCATION AND KEY
ROTATION
CRYP-W04
Recent Ph.D. Graduate
Indiana University
#RSAC
π‘ π‘˜
π‘ π‘˜
Access revocation on the cloud
2
π„π§πœ π‘π‘˜
Pub
π‘˜1 , π„π§πœ π‘˜1
Sym
𝑓1
π„π§πœ π‘π‘˜
Pub
π‘˜2 , π„π§πœ π‘˜2
Sym
𝑓2
π„π§πœ π‘π‘˜
Pub
π‘˜3 , π„π§πœ π‘˜3
Sym
𝑓3
π‘ π‘˜
#RSAC
π‘ π‘˜β€²
π‘ π‘˜β€²
Access revocation on the cloud
2
π„π§πœ π‘π‘˜
Pub
π‘˜1 , π„π§πœ π‘˜1
Sym
𝑓1
π„π§πœ π‘π‘˜
Pub
π‘˜2 , π„π§πœ π‘˜2
Sym
𝑓2
π„π§πœ π‘π‘˜
Pub
π‘˜3 , π„π§πœ π‘˜3
Sym
𝑓3
#RSAC
Revocation using proxy re-encryption
3
π„π§πœ π‘π‘˜
Pub
π‘˜1 , π„π§πœ π‘˜1
Sym
𝑓1
π„π§πœ π‘π‘˜
Pub
π‘˜2 , π„π§πœ π‘˜2
Sym
𝑓2
π„π§πœ π‘π‘˜
Pub
π‘˜3 , π„π§πœ π‘˜3
Sym
𝑓3
π„π§πœ π‘π‘˜β€²
Pub
π‘˜1 , π„π§πœ π‘˜1
Sym
𝑓1
π„π§πœ π‘π‘˜β€²
Pub
π‘˜2 , π„π§πœ π‘˜2
Sym
𝑓2
π„π§πœ π‘π‘˜β€²
Pub
π‘˜3 , π„π§πœ π‘˜3
Sym
𝑓3
Proxy re-encrypt
from π‘π‘˜ to π‘π‘˜β€²
#RSAC
Key-scraping attack
4
π„π§πœ π‘π‘˜
Pub
π‘˜1 , π„π§πœ π‘˜1
Sym
𝑓1
π„π§πœ π‘π‘˜
Pub
π‘˜2 , π„π§πœ π‘˜2
Sym
𝑓2
π„π§πœ π‘π‘˜
Pub
π‘˜3 , π„π§πœ π‘˜3
Sym
𝑓3
π„π§πœ π‘π‘˜β€²
Pub
π‘˜1 , π„π§πœ π‘˜1
Sym
𝑓1
π„π§πœ π‘π‘˜β€²
Pub
π‘˜2 , π„π§πœ π‘˜2
Sym
𝑓2
π„π§πœ π‘π‘˜β€²
Pub
π‘˜3 , π„π§πœ π‘˜3
Sym
𝑓3
The symmetric
keys for the files
are not changed!
A revoked user
may have stored
π‘˜1, π‘˜2, and π‘˜3
#RSAC
The symmetric key must be changed!
5
Decrypt with old key, encrypt with new key
Requires trusted re-encryptor and takes two full passes for re-encryption
Encrypt existing ciphertext with new key
Decryption takes one full pass for each previous re-encryption
Key-homomorphic pseudorandom functions
Allow untrusted party to re-encrypt to fresh key
Existing key-homomorphic pseudorandom functions are extremely slow
#RSAC
Security model
6
#RSAC
Security model
6
#RSAC
1010110000111111101001010101110100111011000101010001010100111000
All-or-nothing transform (AONT)
0111101100101111010010011100100011001110001111010100010010010111
𝑇
π‘‡βˆ’1
0111101100101111010010011100100011001110001111010100010010010111
7
#RSAC
All-or-nothing transform (AONT)
1010110000111111101001010101110100111011000101010001010100111000
0111101100101111010010011100100011001110001111010100010010010111
𝑇
π‘‡βˆ’1
?
7
#RSAC
1010110000111111101001010101110100111011000101010001010100111000
Our approach using an AONT
0111101100101111010010011100100011001110001111010100010010010111
𝑇
1010110100111101101001010101110100111011000101011001010100011000
XOR with a pseudorandom string
8
#RSAC
Security intuition
1010110000111111101001010101110100111011000101010001010100111000
10101100001111111010010101011101
1010110100111101101001010101110100111011000101011001010100011000
10101100001111111010010101011101
+
1010110000111111101001010101110100111011000101011001010100011000
9
#RSAC
Initial ciphertext: π„π§πœ π‘π‘˜ π‘˜0 , 𝑇 π„π§πœ π‘˜0
Sym
𝑓
Once re-encrypted ciphertext:
π„π§πœ π‘π‘˜β€² π‘˜0 , π„π§πœ π‘π‘˜β€² 𝑠1, π‘˜1 , 𝑇 π„π§πœ π‘˜0
Sym
𝑓
Ind 𝑠1 ,Ctr π‘˜1
Twice re-encrypted ciphertext:
π„π§πœ π‘π‘˜β€²β€² π‘˜0 , π„π§πœ π‘π‘˜β€²β€² 𝑠1, π‘˜1 , π„π§πœ π‘π‘˜β€²β€² 𝑠2, π‘˜2 ,
𝑇 π„π§πœ π‘˜0
Sym
𝑀
Ind 𝑠1 ,Ctr π‘˜1
Ind 𝑠2 ,Ctr π‘˜2
Proxy re-encryption construction
10
#RSAC
Result: Much faster re-encryption
11
64
512
4,096
32,768
262,144
2,097,152
1 8 64 512 4,096 32,768
InstancesofAESblockcipher
File size (in KiB)
Full re-encryption
50% downloaded
75% downloaded
90% downloaded
#RSAC
Result: Much faster decryption
12
0
200,000
400,000
600,000
800,000
1,000,000
1,200,000
1,400,000
0 20 40 60 80 100
InstancesofAESblockcipher
Number of re-encryptions
Full 8 KiB
Full 40 KiB
Full 200 KiB
Ours 8 KiB
Ours 40 KiB
Ours 200 KiB
#RSAC
Summary
13
In scenarios such as access revocation and key rotation, symmetric-
key ciphertexts may need to be re-encrypted
Existing solutions are either insecure or too slow to be used in
practice
Using an all-or-nothing transform, we can re-encrypt efficiently while
achieving provable security under a reasonable model
We provide constructions for updatable symmetric-key encryption,
public-key and identity-based proxy re-encryption, and revocable-
storage attribute-based encryption
#RSAC
Apply What You Have Learned
14
Realize the need to update the symmetric key
Many papers on public-key revocation don’t consider hybrid encryption
Realistic security models must address key-scraping attacks
Possible future work:
Produce a general theorem encompassing all uses of symmetric-key
encryption
Assess tradeoffs between streaming efficiency and security
Provide a full implementation of the construction
SESSION ID: CRYP-W04
ASYNCHRONOUS PROVABLY-SECURE
HIDDEN SERVICES
Fernando Krell Philippe Camacho
Problem: how to hide the location of a
server?
β€’ Arbitrary network topology
β€’ One node acts as a server
β€’ Other nodes can be clients
2
Problem: how to hide the location of a
server?
β€’ Arbitrary network topology
β€’ One node acts as a server
β€’ Other nodes can be clients
β€’ Avoid DoS
β€’ Reduce attack surface
β€’ Censorship resistance
β€’ Traffic analysis
2
Naive Solution: Recursive Multicast
β€’ If C contacts S1, the response will
arrive after β‰ˆ 2T
β€’ If C contacts S2, the response will
arrive after β‰ˆ 6T
3
Anonymity: Synchronous Solutions
Mix-nets [Chaum ’81]
β€’ Provably secure
4
Anonymity: Synchronous Solutions
Mix-nets [Chaum ’81]
β€’ Provably secure
DC-nets [Chaum ’88]
β€’ Provably secure
4
Anonymity: Asynchronous Alternatives
Crowds [Reiter & Rubin ’98]
β€’ Asynchronous
β€’ Several attacks
5
Anonymity: Asynchronous Alternatives
Crowds [Reiter & Rubin ’98]
β€’ Asynchronous
β€’ Several attacks
Tor [Dingledine & Mathewson &
Syverson ’04]
β€’ Asynchronous
β€’ Several attacks
β€’ Most popular
5
Intersection attack
β‡’ lower bound on communication
Thus all the nodes must participate in order to hide the server’s location.
6
Can we get the best of both worlds
(Provably Secure and Asynchronous)?
Asynchronous Synchronous
Provably Secure This work DC-nets/ mix-nets, DO’00
Heuristic Security Tor,Crowds Herbivore [GRPS ’03]
7
Model
β€’ Simulation based security definition.
β€’ Communication restricted to use FNetwork
β€’ Pi is allowed to send message to Pj, if they are directly connected.
8
Overview of our solution
Participant’s behavior is indistinguishable from server’s.
1 Client. Broadcast the request
2 Player Pi. Upon seeing a request message, send a random value si to the server
(broadcast)
3 Player Pi. Upon seeing everybody’s values {sj}:
β€’ If Pi = Server. Secret share response r using {sj}.
Send share r βˆ’ sj to client.
β€’ Else. Submit si to client.
4 Client. Upon receiving all shares, reconstruct the server’s response r.
9
Overview of our solution
Participant’s behavior is indistinguishable from server’s.
1 Client. Broadcast the request
2 Player Pi. Upon seeing a request message, send a random value si to the server
(broadcast)
3 Player Pi. Upon seeing everybody’s values {sj}:
β€’ If Pi = Server. Secret share response r using {sj}.
Send share r βˆ’ sj to client.
β€’ Else. Submit si to client.
4 Client. Upon receiving all shares, reconstruct the server’s response r.
Naive implementation has O(n2) communication complexity.
9
Efficient Implementation
β€’ Avoid recursive multicast on every message.
β€’ Combine encrypted shares on intermediate nodes.
10
Efficient Implementation
β€’ Avoid recursive multicast on every message.
β€’ Combine encrypted shares on intermediate nodes.
Extra Tools:
β€’ Homomorphic Encryption
β€’ Encpk(m1) + Encpk(m2) = Encpk(m1 + m2)
β€’ Spanning Tree
10
Communication Pattern
Avoiding quadratic complexity:
11
Phase 1: Broadcast the Request
12
Phase 2.a): Shares UP to root
Shares are encrypted for the server, and sent up the tree.
All shares are added using homomorphic encryption:
EncpkS (y) Β· EncpkS (z) = EncpkS (y + z) = EncpkS (y )
13
Phase 2.b): Shares’ sum DOWN to server
The encrypted sum Ni=C shareNi
is sent down the tree so that the server S can
decrypt it.
14
Phase 3: Server change its share
β€’ The response to req is computed by the server S:
res := F(req)
β€’ The server recomputes its own share:
sharenew
S := res βˆ’ (
Ni=C
shareNi
βˆ’ shareold
S )
β€’ The new share of the server and the share of the other nodes add up to res:
15
Phase 4.a): Response shares sent to root
β€’ All Ni = C (including S) send their share sharei to C.
β€’ S will send sharenew
S instead of shareold
S .
β€’ All shares are added using homomorphic encryption (using C’s public key): EncpkC (y) Β· EncpkC (z) = EncpkC (y + z) = EncpkC (y )
16
Phase 4.b) Encrypted response sent to
client
The encrypted response res = Ni=C shareNi
is sent down the tree so that the client
C can decrypt it.
17
Security based on simulation
REAL β‰ˆ SIMULATED
β€’ When client is not corrupted: just simulate protocol under fake messages.
β€’ When client is corrupted:
β€’ Simulator S gets response from ideal functionality.
β€’ S changes honest parties shares so that they reconstruct the correct response.
18
Linear Complexity
β€’ O(1) messages per Spanning Tree Edge.
β€’ O(1) homomorphic encryption operations.
Although a node can have O(n) worst case complexity.
19
Malicious Adversaries (Overview)
Adversary’s strategies:
β€’ Drop messages. DoS.
β€’ Change shares. DoS.
New Protocol:
β€’ Messages are signed.
β€’ Use recursive multicast for all messages (O(n2) Comm. complexity).
β€’ Append zero-knowledge proof that ciphertexts encrypt same share. Allow
identification of malicious players.
20
Zero-knowledge proof
β€’ Prove that two ciphertexts encrypt same message, except...
21
Zero-knowledge proof
β€’ Prove that two ciphertexts encrypt same message, except...
β€’ Server actually changes the share.
β€’ Proof needs to convince that
β€’ [1] The two ciphertexts encrypt same message OR
β€’ [2] The issuer is the server
21
Zero-knowledge proof
β€’ Prove that two ciphertexts encrypt same message, except...
β€’ Server actually changes the share.
β€’ Proof needs to convince that
β€’ [1] The two ciphertexts encrypt same message OR
β€’ [2] The issuer is the server
β€’ Do not reveal whether which of [1] , [2] is true.
β€’ Reduces to simple Ξ£-protocol for relation
Rg1,g2 = {(A, B; r) : A = gr
1 ∧ B = gr
2}
[1]
{(D; s) : D = gs
}
[2]
21
Future work
β€’ Resilience. Protocol needs to succeed even if some players disappears
β€’ Improve communication complexity of second protocol
β€’ Empirical Study
β€’ Find trade-offs to scale current solution
β€’ Server anonymity
Questions?
22

More Related Content

What's hot

Class Project Showcase: DNS Spoofing
Class Project Showcase: DNS SpoofingClass Project Showcase: DNS Spoofing
Class Project Showcase: DNS Spoofing
Beibei Yang
Β 
Time-based DDoS Detection and Mitigation for SDN Controller
Time-based DDoS Detection and Mitigation for SDN ControllerTime-based DDoS Detection and Mitigation for SDN Controller
Time-based DDoS Detection and Mitigation for SDN Controller
Lippo Group Digital
Β 
BADCamp 2017 - Anatomy of DDoS
BADCamp 2017 - Anatomy of DDoSBADCamp 2017 - Anatomy of DDoS
BADCamp 2017 - Anatomy of DDoS
Suzanne Aldrich
Β 
Recover A RSA Private key from a TLS session with perfect forward secrecy
Recover A RSA Private key from a TLS session with perfect forward secrecyRecover A RSA Private key from a TLS session with perfect forward secrecy
Recover A RSA Private key from a TLS session with perfect forward secrecy
Priyanka Aash
Β 
232 md5-considered-harmful-slides
232 md5-considered-harmful-slides232 md5-considered-harmful-slides
232 md5-considered-harmful-slides
Dan Kaminsky
Β 
CNIT 141: 1. Encryption
CNIT 141: 1. EncryptionCNIT 141: 1. Encryption
CNIT 141: 1. Encryption
Sam Bowne
Β 
A study of cryptography for satellite applications
A study of cryptography for satellite applicationsA study of cryptography for satellite applications
A study of cryptography for satellite applications
Rajesh Ishida
Β 
Water Torture: A Slow Drip DNS DDoS Attack on QTNet by Kei Nishida [APRICOT 2...
Water Torture: A Slow Drip DNS DDoS Attack on QTNet by Kei Nishida [APRICOT 2...Water Torture: A Slow Drip DNS DDoS Attack on QTNet by Kei Nishida [APRICOT 2...
Water Torture: A Slow Drip DNS DDoS Attack on QTNet by Kei Nishida [APRICOT 2...
APNIC
Β 
Bh us-02-kaminsky-blackops
Bh us-02-kaminsky-blackopsBh us-02-kaminsky-blackops
Bh us-02-kaminsky-blackops
Dan Kaminsky
Β 
DrupalCon Vienna 2017 - Anatomy of DDoS
DrupalCon Vienna 2017 - Anatomy of DDoSDrupalCon Vienna 2017 - Anatomy of DDoS
DrupalCon Vienna 2017 - Anatomy of DDoS
Suzanne Aldrich
Β 
Hacking Blind
Hacking BlindHacking Blind
Hacking Blind
NikitaAndhale
Β 
BSides Algiers - Layer7 DoS Attacks - Oussama Elhamer
BSides Algiers - Layer7 DoS Attacks - Oussama ElhamerBSides Algiers - Layer7 DoS Attacks - Oussama Elhamer
BSides Algiers - Layer7 DoS Attacks - Oussama Elhamer
Shellmates
Β 
Common Dos and DDoS
Common Dos and DDoSCommon Dos and DDoS
Common Dos and DDoS
Jayesh Patel
Β 
Black ops of tcp2005 japan
Black ops of tcp2005 japanBlack ops of tcp2005 japan
Black ops of tcp2005 japan
Dan Kaminsky
Β 
Dnssec tutorial-crypto-defs
Dnssec tutorial-crypto-defsDnssec tutorial-crypto-defs
Dnssec tutorial-crypto-defs
AFRINIC
Β 
Ricardo de Oliveria Schmidt - DDoS Attacks on the Root DNS
Ricardo de Oliveria Schmidt - DDoS Attacks on the Root DNSRicardo de Oliveria Schmidt - DDoS Attacks on the Root DNS
Ricardo de Oliveria Schmidt - DDoS Attacks on the Root DNS
Michiel Cazemier
Β 
CNIT 141 6. Hash Functions
CNIT 141 6. Hash FunctionsCNIT 141 6. Hash Functions
CNIT 141 6. Hash Functions
Sam Bowne
Β 
GopherCon 2017 - Writing Networking Clients in Go: The Design & Implementati...
GopherCon 2017 -  Writing Networking Clients in Go: The Design & Implementati...GopherCon 2017 -  Writing Networking Clients in Go: The Design & Implementati...
GopherCon 2017 - Writing Networking Clients in Go: The Design & Implementati...
wallyqs
Β 
CNIT 141: 1. Encryption
CNIT 141: 1. EncryptionCNIT 141: 1. Encryption
CNIT 141: 1. Encryption
Sam Bowne
Β 

What's hot (19)

Class Project Showcase: DNS Spoofing
Class Project Showcase: DNS SpoofingClass Project Showcase: DNS Spoofing
Class Project Showcase: DNS Spoofing
Β 
Time-based DDoS Detection and Mitigation for SDN Controller
Time-based DDoS Detection and Mitigation for SDN ControllerTime-based DDoS Detection and Mitigation for SDN Controller
Time-based DDoS Detection and Mitigation for SDN Controller
Β 
BADCamp 2017 - Anatomy of DDoS
BADCamp 2017 - Anatomy of DDoSBADCamp 2017 - Anatomy of DDoS
BADCamp 2017 - Anatomy of DDoS
Β 
Recover A RSA Private key from a TLS session with perfect forward secrecy
Recover A RSA Private key from a TLS session with perfect forward secrecyRecover A RSA Private key from a TLS session with perfect forward secrecy
Recover A RSA Private key from a TLS session with perfect forward secrecy
Β 
232 md5-considered-harmful-slides
232 md5-considered-harmful-slides232 md5-considered-harmful-slides
232 md5-considered-harmful-slides
Β 
CNIT 141: 1. Encryption
CNIT 141: 1. EncryptionCNIT 141: 1. Encryption
CNIT 141: 1. Encryption
Β 
A study of cryptography for satellite applications
A study of cryptography for satellite applicationsA study of cryptography for satellite applications
A study of cryptography for satellite applications
Β 
Water Torture: A Slow Drip DNS DDoS Attack on QTNet by Kei Nishida [APRICOT 2...
Water Torture: A Slow Drip DNS DDoS Attack on QTNet by Kei Nishida [APRICOT 2...Water Torture: A Slow Drip DNS DDoS Attack on QTNet by Kei Nishida [APRICOT 2...
Water Torture: A Slow Drip DNS DDoS Attack on QTNet by Kei Nishida [APRICOT 2...
Β 
Bh us-02-kaminsky-blackops
Bh us-02-kaminsky-blackopsBh us-02-kaminsky-blackops
Bh us-02-kaminsky-blackops
Β 
DrupalCon Vienna 2017 - Anatomy of DDoS
DrupalCon Vienna 2017 - Anatomy of DDoSDrupalCon Vienna 2017 - Anatomy of DDoS
DrupalCon Vienna 2017 - Anatomy of DDoS
Β 
Hacking Blind
Hacking BlindHacking Blind
Hacking Blind
Β 
BSides Algiers - Layer7 DoS Attacks - Oussama Elhamer
BSides Algiers - Layer7 DoS Attacks - Oussama ElhamerBSides Algiers - Layer7 DoS Attacks - Oussama Elhamer
BSides Algiers - Layer7 DoS Attacks - Oussama Elhamer
Β 
Common Dos and DDoS
Common Dos and DDoSCommon Dos and DDoS
Common Dos and DDoS
Β 
Black ops of tcp2005 japan
Black ops of tcp2005 japanBlack ops of tcp2005 japan
Black ops of tcp2005 japan
Β 
Dnssec tutorial-crypto-defs
Dnssec tutorial-crypto-defsDnssec tutorial-crypto-defs
Dnssec tutorial-crypto-defs
Β 
Ricardo de Oliveria Schmidt - DDoS Attacks on the Root DNS
Ricardo de Oliveria Schmidt - DDoS Attacks on the Root DNSRicardo de Oliveria Schmidt - DDoS Attacks on the Root DNS
Ricardo de Oliveria Schmidt - DDoS Attacks on the Root DNS
Β 
CNIT 141 6. Hash Functions
CNIT 141 6. Hash FunctionsCNIT 141 6. Hash Functions
CNIT 141 6. Hash Functions
Β 
GopherCon 2017 - Writing Networking Clients in Go: The Design & Implementati...
GopherCon 2017 -  Writing Networking Clients in Go: The Design & Implementati...GopherCon 2017 -  Writing Networking Clients in Go: The Design & Implementati...
GopherCon 2017 - Writing Networking Clients in Go: The Design & Implementati...
Β 
CNIT 141: 1. Encryption
CNIT 141: 1. EncryptionCNIT 141: 1. Encryption
CNIT 141: 1. Encryption
Β 

Similar to Cryptographic Protocols: Practical revocation and key rotation

CCNA Security 012- cryptographic systems
CCNA Security 012- cryptographic systemsCCNA Security 012- cryptographic systems
CCNA Security 012- cryptographic systems
Ahmed Habib
Β 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
patisa
Β 
Common crypto attacks and secure implementations
Common crypto attacks and secure implementationsCommon crypto attacks and secure implementations
Common crypto attacks and secure implementations
Trupti Shiralkar, CISSP
Β 
CH02-CompSec4e.pptx
CH02-CompSec4e.pptxCH02-CompSec4e.pptx
CH02-CompSec4e.pptx
ams1ams11
Β 
Defeating the entropy downgrade attack
Defeating the entropy downgrade attackDefeating the entropy downgrade attack
Defeating the entropy downgrade attack
Seth Wahle
Β 
Low latency microservices in java QCon New York 2016
Low latency microservices in java   QCon New York 2016Low latency microservices in java   QCon New York 2016
Low latency microservices in java QCon New York 2016
Peter Lawrey
Β 
Zhiyun Qian-what leaves attacker hijacking USA Today site
Zhiyun Qian-what leaves attacker hijacking USA Today siteZhiyun Qian-what leaves attacker hijacking USA Today site
Zhiyun Qian-what leaves attacker hijacking USA Today site
GeekPwn Keen
Β 
TLS/SSL - Study of Secured Communications
TLS/SSL - Study of Secured  CommunicationsTLS/SSL - Study of Secured  Communications
TLS/SSL - Study of Secured Communications
Nitin Ramesh
Β 
Using hypervisor and container technology to increase datacenter security pos...
Using hypervisor and container technology to increase datacenter security pos...Using hypervisor and container technology to increase datacenter security pos...
Using hypervisor and container technology to increase datacenter security pos...
Black Duck by Synopsys
Β 
Using hypervisor and container technology to increase datacenter security pos...
Using hypervisor and container technology to increase datacenter security pos...Using hypervisor and container technology to increase datacenter security pos...
Using hypervisor and container technology to increase datacenter security pos...
Tim Mackey
Β 
FreeSWITCH as a Microservice
FreeSWITCH as a MicroserviceFreeSWITCH as a Microservice
FreeSWITCH as a Microservice
Evan McGee
Β 
How to hack cryptographic protocols with Formal Methods
How to hack cryptographic protocols with Formal MethodsHow to hack cryptographic protocols with Formal Methods
How to hack cryptographic protocols with Formal Methods
Ofer Rivlin, CISSP
Β 
anti-ddos GNTC based on P4 /BIH
anti-ddos GNTC based on P4 /BIHanti-ddos GNTC based on P4 /BIH
anti-ddos GNTC based on P4 /BIH
Leo Chu
Β 
Crypto 101: Encryption, Codebreaking, SSL and Bitcoin
Crypto 101: Encryption, Codebreaking, SSL and BitcoinCrypto 101: Encryption, Codebreaking, SSL and Bitcoin
Crypto 101: Encryption, Codebreaking, SSL and Bitcoin
Priyanka Aash
Β 
You need Event Mesh, not Service Mesh - Chris Suszynski [WJUG 301]
You need Event Mesh, not Service Mesh - Chris Suszynski [WJUG 301]You need Event Mesh, not Service Mesh - Chris Suszynski [WJUG 301]
You need Event Mesh, not Service Mesh - Chris Suszynski [WJUG 301]
Chris SuszyΕ„ski
Β 
Scaling Ethereum using Zero-Knowledge Proofs
Scaling Ethereum using Zero-Knowledge ProofsScaling Ethereum using Zero-Knowledge Proofs
Scaling Ethereum using Zero-Knowledge Proofs
Hyojun Kim
Β 
Docker Swarm secrets for creating great FIWARE platforms
Docker Swarm secrets for creating great FIWARE platformsDocker Swarm secrets for creating great FIWARE platforms
Docker Swarm secrets for creating great FIWARE platforms
Federico Michele Facca
Β 
Introduction to cryptography part1-final
Introduction to cryptography  part1-finalIntroduction to cryptography  part1-final
Introduction to cryptography part1-final
Taymoor Nazmy
Β 
Emily Stamm - Post-Quantum Cryptography
Emily Stamm - Post-Quantum CryptographyEmily Stamm - Post-Quantum Cryptography
Emily Stamm - Post-Quantum Cryptography
CSNP
Β 
FIWARE Tech Summit - Docker Swarm Secrets for Creating Great FIWARE Platforms
FIWARE Tech Summit - Docker Swarm Secrets for Creating Great FIWARE PlatformsFIWARE Tech Summit - Docker Swarm Secrets for Creating Great FIWARE Platforms
FIWARE Tech Summit - Docker Swarm Secrets for Creating Great FIWARE Platforms
FIWARE
Β 

Similar to Cryptographic Protocols: Practical revocation and key rotation (20)

CCNA Security 012- cryptographic systems
CCNA Security 012- cryptographic systemsCCNA Security 012- cryptographic systems
CCNA Security 012- cryptographic systems
Β 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
Β 
Common crypto attacks and secure implementations
Common crypto attacks and secure implementationsCommon crypto attacks and secure implementations
Common crypto attacks and secure implementations
Β 
CH02-CompSec4e.pptx
CH02-CompSec4e.pptxCH02-CompSec4e.pptx
CH02-CompSec4e.pptx
Β 
Defeating the entropy downgrade attack
Defeating the entropy downgrade attackDefeating the entropy downgrade attack
Defeating the entropy downgrade attack
Β 
Low latency microservices in java QCon New York 2016
Low latency microservices in java   QCon New York 2016Low latency microservices in java   QCon New York 2016
Low latency microservices in java QCon New York 2016
Β 
Zhiyun Qian-what leaves attacker hijacking USA Today site
Zhiyun Qian-what leaves attacker hijacking USA Today siteZhiyun Qian-what leaves attacker hijacking USA Today site
Zhiyun Qian-what leaves attacker hijacking USA Today site
Β 
TLS/SSL - Study of Secured Communications
TLS/SSL - Study of Secured  CommunicationsTLS/SSL - Study of Secured  Communications
TLS/SSL - Study of Secured Communications
Β 
Using hypervisor and container technology to increase datacenter security pos...
Using hypervisor and container technology to increase datacenter security pos...Using hypervisor and container technology to increase datacenter security pos...
Using hypervisor and container technology to increase datacenter security pos...
Β 
Using hypervisor and container technology to increase datacenter security pos...
Using hypervisor and container technology to increase datacenter security pos...Using hypervisor and container technology to increase datacenter security pos...
Using hypervisor and container technology to increase datacenter security pos...
Β 
FreeSWITCH as a Microservice
FreeSWITCH as a MicroserviceFreeSWITCH as a Microservice
FreeSWITCH as a Microservice
Β 
How to hack cryptographic protocols with Formal Methods
How to hack cryptographic protocols with Formal MethodsHow to hack cryptographic protocols with Formal Methods
How to hack cryptographic protocols with Formal Methods
Β 
anti-ddos GNTC based on P4 /BIH
anti-ddos GNTC based on P4 /BIHanti-ddos GNTC based on P4 /BIH
anti-ddos GNTC based on P4 /BIH
Β 
Crypto 101: Encryption, Codebreaking, SSL and Bitcoin
Crypto 101: Encryption, Codebreaking, SSL and BitcoinCrypto 101: Encryption, Codebreaking, SSL and Bitcoin
Crypto 101: Encryption, Codebreaking, SSL and Bitcoin
Β 
You need Event Mesh, not Service Mesh - Chris Suszynski [WJUG 301]
You need Event Mesh, not Service Mesh - Chris Suszynski [WJUG 301]You need Event Mesh, not Service Mesh - Chris Suszynski [WJUG 301]
You need Event Mesh, not Service Mesh - Chris Suszynski [WJUG 301]
Β 
Scaling Ethereum using Zero-Knowledge Proofs
Scaling Ethereum using Zero-Knowledge ProofsScaling Ethereum using Zero-Knowledge Proofs
Scaling Ethereum using Zero-Knowledge Proofs
Β 
Docker Swarm secrets for creating great FIWARE platforms
Docker Swarm secrets for creating great FIWARE platformsDocker Swarm secrets for creating great FIWARE platforms
Docker Swarm secrets for creating great FIWARE platforms
Β 
Introduction to cryptography part1-final
Introduction to cryptography  part1-finalIntroduction to cryptography  part1-final
Introduction to cryptography part1-final
Β 
Emily Stamm - Post-Quantum Cryptography
Emily Stamm - Post-Quantum CryptographyEmily Stamm - Post-Quantum Cryptography
Emily Stamm - Post-Quantum Cryptography
Β 
FIWARE Tech Summit - Docker Swarm Secrets for Creating Great FIWARE Platforms
FIWARE Tech Summit - Docker Swarm Secrets for Creating Great FIWARE PlatformsFIWARE Tech Summit - Docker Swarm Secrets for Creating Great FIWARE Platforms
FIWARE Tech Summit - Docker Swarm Secrets for Creating Great FIWARE Platforms
Β 

More from Priyanka Aash

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Priyanka Aash
Β 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
Priyanka Aash
Β 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
Priyanka Aash
Β 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
Priyanka Aash
Β 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
Priyanka Aash
Β 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
Priyanka Aash
Β 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
Priyanka Aash
Β 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Priyanka Aash
Β 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
Priyanka Aash
Β 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
Priyanka Aash
Β 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
Priyanka Aash
Β 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
Priyanka Aash
Β 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
Priyanka Aash
Β 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
Priyanka Aash
Β 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Priyanka Aash
Β 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Priyanka Aash
Β 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Priyanka Aash
Β 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Priyanka Aash
Β 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
Priyanka Aash
Β 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Priyanka Aash
Β 

More from Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Β 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
Β 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
Β 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
Β 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
Β 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
Β 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
Β 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Β 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
Β 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
Β 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
Β 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
Β 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
Β 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
Β 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Β 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Β 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Β 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Β 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
Β 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Β 

Recently uploaded

A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
ScyllaDB
Β 
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
AlexanderRichford
Β 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving
Β 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
Β 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
Β 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
Β 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
Β 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
Β 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
FilipTomaszewski5
Β 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
Β 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
Β 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
Β 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
Β 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
zjhamm304
Β 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
Β 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
Fwdays
Β 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
Sease
Β 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
Β 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
DanBrown980551
Β 
Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!
Ortus Solutions, Corp
Β 

Recently uploaded (20)

A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
Β 
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
Β 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Β 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Β 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Β 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Β 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
Β 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Β 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Β 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Β 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Β 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Β 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Β 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
Β 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
Β 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
Β 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
Β 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Β 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
Β 
Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!
Β 

Cryptographic Protocols: Practical revocation and key rotation

  • 1. SESSION ID: #RSAC Adam Shull CRYPTOGRAPHIC PROTOCOLS: PRACTICAL REVOCATION AND KEY ROTATION CRYP-W04 Recent Ph.D. Graduate Indiana University
  • 2. #RSAC π‘ π‘˜ π‘ π‘˜ Access revocation on the cloud 2 π„π§πœ π‘π‘˜ Pub π‘˜1 , π„π§πœ π‘˜1 Sym 𝑓1 π„π§πœ π‘π‘˜ Pub π‘˜2 , π„π§πœ π‘˜2 Sym 𝑓2 π„π§πœ π‘π‘˜ Pub π‘˜3 , π„π§πœ π‘˜3 Sym 𝑓3 π‘ π‘˜
  • 3. #RSAC π‘ π‘˜β€² π‘ π‘˜β€² Access revocation on the cloud 2 π„π§πœ π‘π‘˜ Pub π‘˜1 , π„π§πœ π‘˜1 Sym 𝑓1 π„π§πœ π‘π‘˜ Pub π‘˜2 , π„π§πœ π‘˜2 Sym 𝑓2 π„π§πœ π‘π‘˜ Pub π‘˜3 , π„π§πœ π‘˜3 Sym 𝑓3
  • 4. #RSAC Revocation using proxy re-encryption 3 π„π§πœ π‘π‘˜ Pub π‘˜1 , π„π§πœ π‘˜1 Sym 𝑓1 π„π§πœ π‘π‘˜ Pub π‘˜2 , π„π§πœ π‘˜2 Sym 𝑓2 π„π§πœ π‘π‘˜ Pub π‘˜3 , π„π§πœ π‘˜3 Sym 𝑓3 π„π§πœ π‘π‘˜β€² Pub π‘˜1 , π„π§πœ π‘˜1 Sym 𝑓1 π„π§πœ π‘π‘˜β€² Pub π‘˜2 , π„π§πœ π‘˜2 Sym 𝑓2 π„π§πœ π‘π‘˜β€² Pub π‘˜3 , π„π§πœ π‘˜3 Sym 𝑓3 Proxy re-encrypt from π‘π‘˜ to π‘π‘˜β€²
  • 5. #RSAC Key-scraping attack 4 π„π§πœ π‘π‘˜ Pub π‘˜1 , π„π§πœ π‘˜1 Sym 𝑓1 π„π§πœ π‘π‘˜ Pub π‘˜2 , π„π§πœ π‘˜2 Sym 𝑓2 π„π§πœ π‘π‘˜ Pub π‘˜3 , π„π§πœ π‘˜3 Sym 𝑓3 π„π§πœ π‘π‘˜β€² Pub π‘˜1 , π„π§πœ π‘˜1 Sym 𝑓1 π„π§πœ π‘π‘˜β€² Pub π‘˜2 , π„π§πœ π‘˜2 Sym 𝑓2 π„π§πœ π‘π‘˜β€² Pub π‘˜3 , π„π§πœ π‘˜3 Sym 𝑓3 The symmetric keys for the files are not changed! A revoked user may have stored π‘˜1, π‘˜2, and π‘˜3
  • 6. #RSAC The symmetric key must be changed! 5 Decrypt with old key, encrypt with new key Requires trusted re-encryptor and takes two full passes for re-encryption Encrypt existing ciphertext with new key Decryption takes one full pass for each previous re-encryption Key-homomorphic pseudorandom functions Allow untrusted party to re-encrypt to fresh key Existing key-homomorphic pseudorandom functions are extremely slow
  • 11. #RSAC 1010110000111111101001010101110100111011000101010001010100111000 Our approach using an AONT 0111101100101111010010011100100011001110001111010100010010010111 𝑇 1010110100111101101001010101110100111011000101011001010100011000 XOR with a pseudorandom string 8
  • 13. #RSAC Initial ciphertext: π„π§πœ π‘π‘˜ π‘˜0 , 𝑇 π„π§πœ π‘˜0 Sym 𝑓 Once re-encrypted ciphertext: π„π§πœ π‘π‘˜β€² π‘˜0 , π„π§πœ π‘π‘˜β€² 𝑠1, π‘˜1 , 𝑇 π„π§πœ π‘˜0 Sym 𝑓 Ind 𝑠1 ,Ctr π‘˜1 Twice re-encrypted ciphertext: π„π§πœ π‘π‘˜β€²β€² π‘˜0 , π„π§πœ π‘π‘˜β€²β€² 𝑠1, π‘˜1 , π„π§πœ π‘π‘˜β€²β€² 𝑠2, π‘˜2 , 𝑇 π„π§πœ π‘˜0 Sym 𝑀 Ind 𝑠1 ,Ctr π‘˜1 Ind 𝑠2 ,Ctr π‘˜2 Proxy re-encryption construction 10
  • 14. #RSAC Result: Much faster re-encryption 11 64 512 4,096 32,768 262,144 2,097,152 1 8 64 512 4,096 32,768 InstancesofAESblockcipher File size (in KiB) Full re-encryption 50% downloaded 75% downloaded 90% downloaded
  • 15. #RSAC Result: Much faster decryption 12 0 200,000 400,000 600,000 800,000 1,000,000 1,200,000 1,400,000 0 20 40 60 80 100 InstancesofAESblockcipher Number of re-encryptions Full 8 KiB Full 40 KiB Full 200 KiB Ours 8 KiB Ours 40 KiB Ours 200 KiB
  • 16. #RSAC Summary 13 In scenarios such as access revocation and key rotation, symmetric- key ciphertexts may need to be re-encrypted Existing solutions are either insecure or too slow to be used in practice Using an all-or-nothing transform, we can re-encrypt efficiently while achieving provable security under a reasonable model We provide constructions for updatable symmetric-key encryption, public-key and identity-based proxy re-encryption, and revocable- storage attribute-based encryption
  • 17. #RSAC Apply What You Have Learned 14 Realize the need to update the symmetric key Many papers on public-key revocation don’t consider hybrid encryption Realistic security models must address key-scraping attacks Possible future work: Produce a general theorem encompassing all uses of symmetric-key encryption Assess tradeoffs between streaming efficiency and security Provide a full implementation of the construction
  • 18. SESSION ID: CRYP-W04 ASYNCHRONOUS PROVABLY-SECURE HIDDEN SERVICES Fernando Krell Philippe Camacho
  • 19. Problem: how to hide the location of a server? β€’ Arbitrary network topology β€’ One node acts as a server β€’ Other nodes can be clients 2
  • 20. Problem: how to hide the location of a server? β€’ Arbitrary network topology β€’ One node acts as a server β€’ Other nodes can be clients β€’ Avoid DoS β€’ Reduce attack surface β€’ Censorship resistance β€’ Traffic analysis 2
  • 21. Naive Solution: Recursive Multicast β€’ If C contacts S1, the response will arrive after β‰ˆ 2T β€’ If C contacts S2, the response will arrive after β‰ˆ 6T 3
  • 22. Anonymity: Synchronous Solutions Mix-nets [Chaum ’81] β€’ Provably secure 4
  • 23. Anonymity: Synchronous Solutions Mix-nets [Chaum ’81] β€’ Provably secure DC-nets [Chaum ’88] β€’ Provably secure 4
  • 24. Anonymity: Asynchronous Alternatives Crowds [Reiter & Rubin ’98] β€’ Asynchronous β€’ Several attacks 5
  • 25. Anonymity: Asynchronous Alternatives Crowds [Reiter & Rubin ’98] β€’ Asynchronous β€’ Several attacks Tor [Dingledine & Mathewson & Syverson ’04] β€’ Asynchronous β€’ Several attacks β€’ Most popular 5
  • 26. Intersection attack β‡’ lower bound on communication Thus all the nodes must participate in order to hide the server’s location. 6
  • 27. Can we get the best of both worlds (Provably Secure and Asynchronous)? Asynchronous Synchronous Provably Secure This work DC-nets/ mix-nets, DO’00 Heuristic Security Tor,Crowds Herbivore [GRPS ’03] 7
  • 28. Model β€’ Simulation based security definition. β€’ Communication restricted to use FNetwork β€’ Pi is allowed to send message to Pj, if they are directly connected. 8
  • 29. Overview of our solution Participant’s behavior is indistinguishable from server’s. 1 Client. Broadcast the request 2 Player Pi. Upon seeing a request message, send a random value si to the server (broadcast) 3 Player Pi. Upon seeing everybody’s values {sj}: β€’ If Pi = Server. Secret share response r using {sj}. Send share r βˆ’ sj to client. β€’ Else. Submit si to client. 4 Client. Upon receiving all shares, reconstruct the server’s response r. 9
  • 30. Overview of our solution Participant’s behavior is indistinguishable from server’s. 1 Client. Broadcast the request 2 Player Pi. Upon seeing a request message, send a random value si to the server (broadcast) 3 Player Pi. Upon seeing everybody’s values {sj}: β€’ If Pi = Server. Secret share response r using {sj}. Send share r βˆ’ sj to client. β€’ Else. Submit si to client. 4 Client. Upon receiving all shares, reconstruct the server’s response r. Naive implementation has O(n2) communication complexity. 9
  • 31. Efficient Implementation β€’ Avoid recursive multicast on every message. β€’ Combine encrypted shares on intermediate nodes. 10
  • 32. Efficient Implementation β€’ Avoid recursive multicast on every message. β€’ Combine encrypted shares on intermediate nodes. Extra Tools: β€’ Homomorphic Encryption β€’ Encpk(m1) + Encpk(m2) = Encpk(m1 + m2) β€’ Spanning Tree 10
  • 34. Phase 1: Broadcast the Request 12
  • 35. Phase 2.a): Shares UP to root Shares are encrypted for the server, and sent up the tree. All shares are added using homomorphic encryption: EncpkS (y) Β· EncpkS (z) = EncpkS (y + z) = EncpkS (y ) 13
  • 36. Phase 2.b): Shares’ sum DOWN to server The encrypted sum Ni=C shareNi is sent down the tree so that the server S can decrypt it. 14
  • 37. Phase 3: Server change its share β€’ The response to req is computed by the server S: res := F(req) β€’ The server recomputes its own share: sharenew S := res βˆ’ ( Ni=C shareNi βˆ’ shareold S ) β€’ The new share of the server and the share of the other nodes add up to res: 15
  • 38. Phase 4.a): Response shares sent to root β€’ All Ni = C (including S) send their share sharei to C. β€’ S will send sharenew S instead of shareold S . β€’ All shares are added using homomorphic encryption (using C’s public key): EncpkC (y) Β· EncpkC (z) = EncpkC (y + z) = EncpkC (y ) 16
  • 39. Phase 4.b) Encrypted response sent to client The encrypted response res = Ni=C shareNi is sent down the tree so that the client C can decrypt it. 17
  • 40. Security based on simulation REAL β‰ˆ SIMULATED β€’ When client is not corrupted: just simulate protocol under fake messages. β€’ When client is corrupted: β€’ Simulator S gets response from ideal functionality. β€’ S changes honest parties shares so that they reconstruct the correct response. 18
  • 41. Linear Complexity β€’ O(1) messages per Spanning Tree Edge. β€’ O(1) homomorphic encryption operations. Although a node can have O(n) worst case complexity. 19
  • 42. Malicious Adversaries (Overview) Adversary’s strategies: β€’ Drop messages. DoS. β€’ Change shares. DoS. New Protocol: β€’ Messages are signed. β€’ Use recursive multicast for all messages (O(n2) Comm. complexity). β€’ Append zero-knowledge proof that ciphertexts encrypt same share. Allow identification of malicious players. 20
  • 43. Zero-knowledge proof β€’ Prove that two ciphertexts encrypt same message, except... 21
  • 44. Zero-knowledge proof β€’ Prove that two ciphertexts encrypt same message, except... β€’ Server actually changes the share. β€’ Proof needs to convince that β€’ [1] The two ciphertexts encrypt same message OR β€’ [2] The issuer is the server 21
  • 45. Zero-knowledge proof β€’ Prove that two ciphertexts encrypt same message, except... β€’ Server actually changes the share. β€’ Proof needs to convince that β€’ [1] The two ciphertexts encrypt same message OR β€’ [2] The issuer is the server β€’ Do not reveal whether which of [1] , [2] is true. β€’ Reduces to simple Ξ£-protocol for relation Rg1,g2 = {(A, B; r) : A = gr 1 ∧ B = gr 2} [1] {(D; s) : D = gs } [2] 21
  • 46. Future work β€’ Resilience. Protocol needs to succeed even if some players disappears β€’ Improve communication complexity of second protocol β€’ Empirical Study β€’ Find trade-offs to scale current solution β€’ Server anonymity Questions? 22