SlideShare a Scribd company logo
Using Timed-Release Cryptography to
  Mitigate The Preservation Risk of
          Embargo Periods


         Rabia Haq, Michael L. Nelson
           Old Dominion University
                 Norfolk VA
         www.cs.odu.edu/~{rhaq,mln}




      2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19   1
Overview
• Embargo Periods
  – associated preservation risk interval
• Time-Locked Puzzle / Time Release
  Cryptography
• System Evaluation using mod_oai (resource
  harvesting using OAI-PMH)
  – Optimization Using Chunked Encryption
• Future Considerations
• Conclusion


            2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19   2
Journal Access Models –
                Romeo Colors*

• Red: Traditional subscription-based Access
   – Purchase-own model
• Yellow: Embargoed Access
   – Hybrid of traditional and open access
• Green: Self-authored Open Access
  – e.g., arVix.org, institutional repositories
• Gold: Free and Open Access Journals
  – e.g., PLoS Journals, www.doaj.org

                 * “Old” Romeo Colors, now green/blue/yellow/white;
                 see: http://www.sherpa.ac.uk/romeoinfo.html

              2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19   3
Embargoed Access
• Paid access (red) for some time interval,
  then the content becomes open (gold)
  – current issue(s) cost $
  – previous issues are free
• We’ll assume: gold >= green > yellow > red
• Note: inverse of typical online newspaper
  model of: current is free, archived content
  costs $.

          2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19   4
Who Uses Embargoes?
• 24% of PubMed Central (PMC) titles
  embargoed
• The New England Journal of Medicine
  – embargoed for 6 months
• EBMO Journal
  – embargoed for 12 months




         2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19   5
Preservation Risk Interval:
          (A Hypothetical, Non-Topical Example)

• Journal of UT Football Non-Conference
  Scheduling is embargoed for 6 months
  – sample article “Why scheduling Florida Atlantic, UTEP, Rice &
    Arkansas is not a national championship schedule”
  – previous volumes (e.g., 2008, 2007) are freely available
  – issues 1--6 of current volume are currently for subscribers only
  – 6 month “sliding window”: when issue 7 comes out on July1,
    issue 1 becomes freely available
• Now imagine Mack Brown issues a cease &
  desist order to JUTFNS on June 30
  – what happens to volume 2009, issues 1-6? Will they
    ever be available to non-subscribers?

              2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19   6
Current Solutions
• LOCKSS (CLOCKSS): www.lockss.org
  – local, cooperating caches between
    subscribers (i.e., libraries)
  – http://www.clockss.org/clockss/Triggered_Content
• Portico: www.portico.org
  – trusted third party archive (i.e., neither library
    nor publisher)
  – http://www.portico.org/news/trigger.html


            2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19   7
Can We Use Lazy Preservation?
• We’ve already shown by using IA, search
  engine caches, etc. we can reconstruct
  public web sites after they’ve been lost
  (McCown, 2007)
• For embargoed content, we could expose
  encrypted content that is embargoed
  – but how can we prevent bad guys™ from
   using zombie farms to break the encryption
   before the embargo period is up?
          2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19   8
Timed-Release Cryptology

• Time-Lock Puzzle (TLP) Creation
  – Data decryption non-parallelizable
  – Serial computation required to break puzzle
  – Data locked for predetermined time-period
      • not self-unlocking -- still requires computation to unlock
• Used in MIT/LCS35 Time Lock Puzzle
  – http://people.csail.mit.edu/rivest/lcs35-puzzle-description.txt
  – idea: you could have started in 1999 (with your 1999 computer)
    and worked for 35 years… OR you can wait until 2033, buy a
    new computer and work for 1 year

                           rewards procrastination!
              2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19   9
“Regular” RSA
Picking values:                                          “Brute Force” Attacks:

•   n=p*q                                                •     need to factor n (which is easier
•   φ(n)=(p-1)(q-1), then                                      than trying all values of d)
    “throw away” p & q                                   •     simple soln: try all primes from 1 .. √n
•   pick e coprime to φ(n)
•   pick d s.t. d*e≡1 mod(φ(n))                          helping the attacker:
                                                            - adding k computers reduces the time
public key = (n,e)                                            to break by 1/k
private key = (n,d)                                         - they might get lucky and get it on their
                                                              first shot!
Encryption
   c = me (mod n)                                        more info:
                                                         http://www.cl.cam.ac.uk/users/rnc1/brute.html
Decryption                                               http://axion.physics.ubc.ca/pgp-attack.html
  m = cd (mod n)

                  2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19             10
Time Lock Puzzle
Picking values:                                                  Attacking:

•    n=p*q                                                       •      repeated squarings of a is faster than
•    φ(n)=(p-1)(q-1), then                                              factoring n -- also not known to be
     “throw away” p & q                                                 parallelizable! (Rivest, 1996)
• t=TS
                                                                 • demo: n=253 (i.e., p=11,q=23), t=10,
• pick some random key k,                                        w=
  cm = RC5(k,m)                                                        1
                                                                     2(2 ) = 22 = 4 (mod 253)
• pick random a, 1<a<n                                                  2
                                                                     2(2 ) = 42 = 16 (mod 253)
                                                                        3
                                                                     2(2 ) = 162 = 3 (mod 253)
• w= a2t (mod n)                                                        4
                                                                     2(2 ) = 32 = 9 (mod 253)
• ck = k ⊕ w                                                            5
                                                                     2(2 ) = 92 = 81 (mod 253)
                                                                        6
puzzle = (n,a,t,ck,cm)                                               2(2 ) = 812 = 236 (mod 253)
                                                                        7
                                                                     2(2 ) = 2362 = 36 (mod 253)
                                                                        8
actually, in our version we skip step 4                              2(2 ) = 362 = 31 (mod 253)
                                                                        9
and define step 7 as: z = m ⊕ w                                      2(2 ) = 312 = 202 (mod 253)
puzzle = (n,t,z)                                                        10
                                                                     2(2 ) = 2022 = 71 (mod 253)
                          2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19        11
Implementation: mod_oai, CRATE
• Both based on (Smith, 2008)
• mod_oai
  – an Apache module providing OAI-PMH functionality
    for an entire web site not just, for example, records in
    an institutional repository
• CRATE
  – a model for encoding resource + associated metadata
  – implemented using MPEG-21 DIDL complex object
    format


            2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19   12
mod_oai mechanics
 Integrate OAI-PMH functionality into the web server itself…
         1.       Use mod_oai
                   •    an Apache 2.0 module
                   •    automatically answers OAI-PMH requests for an http server
                   •    written in C
                   •    respects values in .htaccess, httpd.conf
         2.       Install mod_oai on http://www.foo.edu/
         3.       Define baseURL: http://www.foo.edu/modoai

 →       Result: web harvesting with OAI-PMH semantics (e.g., from, until, sets)



http://www.foo.edu/modoai?verb=ListRecords&metdataPrefix=oai_didl&from=2004-09-15&set=mime:video:mpeg



From site foo,                                                                                dating from 9/15/2004 through today
                                     Give me all resources
                 Using OAI-PMH
                                                            And their preservation metadata                        that are MIME type video-MPEG




                                 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19                                13
OAI-PMH Data Model




 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19   14
MPEG-21 DIDL Resource Structure




      2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19   15
An Active Repository




 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19   16
A Dying Repository




Records e1, f2, g3 are recoverable; record h is lost.
            2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19   17
Dynamic Time-Locked Record
        Embargo within mod_oai
• Identification
   – Calculation of remaining record embargo period
• Encryption
   – Calculating record time-lock puzzle complexity
   – Time-Lock Puzzle creation
• Encapsulation
   – exploiting flexibility of MPEG-21 DIDL format to
     encapsulate encrypted resources and related
     information



             2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19   18
Identification



                                                                             update OAI-PMH datestamp
                                                                             as time lock becomes weaker




2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19                                 19
Encryption
• Modification of LCS35 Time Capsule Crypto-Puzzle to
  use time lock on entire resource (not just the key)
   – as per code provided at: http://people.csail.mit.edu/rivest/lcs35-
     puzzle-description.txt
• Input: timeUnit (controls puzzle complexity)
• Compute:
   u = 2t mod((p-1)(q-1))
   w = (2u) mod(n)
   z = resource ⊕ w
• Output: n, t, z


               2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19   20
Encapsulation
This version of the record is 7 of 12 separate encryptions, each of which is
successively easier to break. It will take approximately 3650 hours of
computation to break this time-lock.
The next update will be available on 2008-01-16T20:56:15Z.
Crypto-Puzzle for LCS35 Time Capsule.
Puzzle parameters (all in decimal): n = 398399 t = 264600000.
z =
313239174518025552773909388461801735302388...
893375562056859914777144518879488573607906...
742437030171894184996228671834511813009803...
(many lines deleted for space)
To solve the puzzle, first compute w = 2*2*t (mod n).
Then exclusive-or the result with z.
(Right-justify the two strings first).
The result is the secret message (8 bits per character).




            2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19   21
Selecting Appropriate Values of t
• Time required to break puzzle dependent on processor
  speed
• Given our projected short embargo period (6-24
  months), we made a simplifying assumption that Moore’s
  law increases linearly (not exponentially)
   – idea: in the next few months, you’re more likely to see something
     like: 2Ghz→2.2Ghz, not 2Ghz→4Ghz
• recall: t = number of squarings
   –   t=T*S
   –   S=3000 squarings/second, T=1800 seconds *tU,
   –   tU = f(machine speed) * embargolength
   –   t=3000*1800*tU


               2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19   22
Effect of Computation Speed on
                       embargolength

• We broke time lock
  puzzles on four
  class of machines
  (in GHz):
  –   1.8 (5 nodes)
  –   1.6 (26 nodes)
  –   1 (1 node)
  –   0.75 (1 node)




                2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19   23
Picking t With Empirical Data



using 1Ghz machine as baseline,
projecting for a 2.5 Ghz machine,
and locking for 2 years (63115200 seconds):
   • tU = 63115200 * 2.5 / (1727.61) = 9133
   • t = 3000 * 1800 * 9133
        2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19   24
Experimental Evaluation
• Embargolength = 365 days
• Embargodecrement = 12
• Test website
  – 525 files
  – 17.3 MB data
  – 63% text files
  – Average file size = 33KB


          2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19   25
Harvesting Time: Locked & Unlocked




       2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19   26
O(n2) time to create time-lock puzzle




       2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19   27
Solution: Break Files Into “Chunks”
• Size of file exponentially increases lock-time
• Idea: break file into series of small chunks
   – still O(n2), but with a much more favorable constant
• Lock-time on a 1.8 GHz machine
     time_to_lock(200 KB) = 13 sec
     time_to_lock(100 KB) = 3 sec

     200 KB = 100 KB + 100 KB
            = 3 sec + 3 sec
            = 6 sec
             2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19   28
10 KB Chunked Encryption in mod_oai




      2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19   29
MPEG-21 DIDL document With Chunks




  This record has been split into 10000-byte
  chunks for faster processing.
  This is part 1 of 7 chunks, with unlocked
  chunks to be reassembled in the specified order.




          2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19   30
Future Considerations
• Chunk size performance dependency
• Other optimization methods:
  – Parallel time-locking of resources
  – Data pre-locking
  – only time-lock encryption key, use other
    encryption methods on the original resource
    (as per original Rivest (1996), not as per
    http://people.csail.mit.edu/rivest/lcs35-puzzle-
    description.txt)


           2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19   31
Conclusions
• Suggest the use of time lock puzzles for
  dissemination of embargoed records
  – complement to other methods such as LOCKSS,
    Poritco, etc.
• Implemented and evaluated time lock puzzles in
  the mod_oai & CRATE environment
• Full paper:
  – http://doi.acm.org/10.1145/1555400.1555430
  – http://www.cs.odu.edu/~mln/pubs/jcdl09/jcdl09-time-lock.pdf



             2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19   32

More Related Content

What's hot

Homomorphic Encryption
Homomorphic EncryptionHomomorphic Encryption
Homomorphic Encryption
Göktuğ Serez
 
Proofs of Work
Proofs of WorkProofs of Work
Proofs of Work
David Evans
 
Bitcoin Script
Bitcoin ScriptBitcoin Script
Bitcoin Script
David Evans
 
Engineering fast indexes (Deepdive)
Engineering fast indexes (Deepdive)Engineering fast indexes (Deepdive)
Engineering fast indexes (Deepdive)
Daniel Lemire
 
To Swift 2...and Beyond!
To Swift 2...and Beyond!To Swift 2...and Beyond!
To Swift 2...and Beyond!
Scott Gardner
 
Coscup2021-rust-toturial
Coscup2021-rust-toturialCoscup2021-rust-toturial
Coscup2021-rust-toturial
Wayne Tsai
 
Cryptography
CryptographyCryptography
Cryptography
David Evans
 
Partial Homomorphic Encryption
Partial Homomorphic EncryptionPartial Homomorphic Encryption
Partial Homomorphic Encryption
securityxploded
 
VRP2013 - Comp Aspects VRP
VRP2013 - Comp Aspects VRPVRP2013 - Comp Aspects VRP
VRP2013 - Comp Aspects VRPVictor Pillac
 
Building a Big Data Machine Learning Platform
Building a Big Data Machine Learning PlatformBuilding a Big Data Machine Learning Platform
Building a Big Data Machine Learning Platform
Cliff Click
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
David Evans
 
Coscup2021 - useful abstractions at rust and it's practical usage
Coscup2021 - useful abstractions at rust and it's practical usageCoscup2021 - useful abstractions at rust and it's practical usage
Coscup2021 - useful abstractions at rust and it's practical usage
Wayne Tsai
 
ASFWS 2012 - Hash-flooding DoS reloaded: attacks and defenses par Jean-Philip...
ASFWS 2012 - Hash-flooding DoS reloaded: attacks and defenses par Jean-Philip...ASFWS 2012 - Hash-flooding DoS reloaded: attacks and defenses par Jean-Philip...
ASFWS 2012 - Hash-flooding DoS reloaded: attacks and defenses par Jean-Philip...
Cyber Security Alliance
 
同態加密
同態加密同態加密
同態加密
峻豪 呂
 
Intro to Rust from Applicative / NY Meetup
Intro to Rust from Applicative / NY MeetupIntro to Rust from Applicative / NY Meetup
Intro to Rust from Applicative / NY Meetup
nikomatsakis
 
The Effect of Hierarchical Memory on the Design of Parallel Algorithms and th...
The Effect of Hierarchical Memory on the Design of Parallel Algorithms and th...The Effect of Hierarchical Memory on the Design of Parallel Algorithms and th...
The Effect of Hierarchical Memory on the Design of Parallel Algorithms and th...
David Walker
 
Scala meetup - Intro to spark
Scala meetup - Intro to sparkScala meetup - Intro to spark
Scala meetup - Intro to spark
Javier Arrieta
 
Grand Central Dispatch - iOS Conf SG 2015
Grand Central Dispatch - iOS Conf SG 2015Grand Central Dispatch - iOS Conf SG 2015
Grand Central Dispatch - iOS Conf SG 2015
Ben Asher
 
Rust: Reach Further (from QCon Sao Paolo 2018)
Rust: Reach Further (from QCon Sao Paolo 2018)Rust: Reach Further (from QCon Sao Paolo 2018)
Rust: Reach Further (from QCon Sao Paolo 2018)
nikomatsakis
 

What's hot (20)

Homomorphic Encryption
Homomorphic EncryptionHomomorphic Encryption
Homomorphic Encryption
 
Proofs of Work
Proofs of WorkProofs of Work
Proofs of Work
 
Bitcoin Script
Bitcoin ScriptBitcoin Script
Bitcoin Script
 
Engineering fast indexes (Deepdive)
Engineering fast indexes (Deepdive)Engineering fast indexes (Deepdive)
Engineering fast indexes (Deepdive)
 
To Swift 2...and Beyond!
To Swift 2...and Beyond!To Swift 2...and Beyond!
To Swift 2...and Beyond!
 
Coscup2021-rust-toturial
Coscup2021-rust-toturialCoscup2021-rust-toturial
Coscup2021-rust-toturial
 
Cryptography
CryptographyCryptography
Cryptography
 
Partial Homomorphic Encryption
Partial Homomorphic EncryptionPartial Homomorphic Encryption
Partial Homomorphic Encryption
 
VRP2013 - Comp Aspects VRP
VRP2013 - Comp Aspects VRPVRP2013 - Comp Aspects VRP
VRP2013 - Comp Aspects VRP
 
Building a Big Data Machine Learning Platform
Building a Big Data Machine Learning PlatformBuilding a Big Data Machine Learning Platform
Building a Big Data Machine Learning Platform
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Coscup2021 - useful abstractions at rust and it's practical usage
Coscup2021 - useful abstractions at rust and it's practical usageCoscup2021 - useful abstractions at rust and it's practical usage
Coscup2021 - useful abstractions at rust and it's practical usage
 
ASFWS 2012 - Hash-flooding DoS reloaded: attacks and defenses par Jean-Philip...
ASFWS 2012 - Hash-flooding DoS reloaded: attacks and defenses par Jean-Philip...ASFWS 2012 - Hash-flooding DoS reloaded: attacks and defenses par Jean-Philip...
ASFWS 2012 - Hash-flooding DoS reloaded: attacks and defenses par Jean-Philip...
 
同態加密
同態加密同態加密
同態加密
 
Intro to Rust from Applicative / NY Meetup
Intro to Rust from Applicative / NY MeetupIntro to Rust from Applicative / NY Meetup
Intro to Rust from Applicative / NY Meetup
 
The Effect of Hierarchical Memory on the Design of Parallel Algorithms and th...
The Effect of Hierarchical Memory on the Design of Parallel Algorithms and th...The Effect of Hierarchical Memory on the Design of Parallel Algorithms and th...
The Effect of Hierarchical Memory on the Design of Parallel Algorithms and th...
 
Scala meetup - Intro to spark
Scala meetup - Intro to sparkScala meetup - Intro to spark
Scala meetup - Intro to spark
 
Grand Central Dispatch - iOS Conf SG 2015
Grand Central Dispatch - iOS Conf SG 2015Grand Central Dispatch - iOS Conf SG 2015
Grand Central Dispatch - iOS Conf SG 2015
 
Sha3
Sha3Sha3
Sha3
 
Rust: Reach Further (from QCon Sao Paolo 2018)
Rust: Reach Further (from QCon Sao Paolo 2018)Rust: Reach Further (from QCon Sao Paolo 2018)
Rust: Reach Further (from QCon Sao Paolo 2018)
 

Viewers also liked

Can’t Find Your 404s?
Can’t Find Your 404s?Can’t Find Your 404s?
Can’t Find Your 404s?
Michael Nelson
 
Memento: TimeGates, TimeBundles, and TimeMaps
Memento: TimeGates, TimeBundles, and TimeMapsMemento: TimeGates, TimeBundles, and TimeMaps
Memento: TimeGates, TimeBundles, and TimeMaps
Michael Nelson
 
Memento: Time Travel for the Web
Memento: Time Travel for the WebMemento: Time Travel for the Web
Memento: Time Travel for the Web
Michael Nelson
 
Memento: Time Travel for the Web
Memento: Time Travel for the WebMemento: Time Travel for the Web
Memento: Time Travel for the Web
Michael Nelson
 
(Re-) Discovering Lost Web Pages
(Re-) Discovering Lost Web Pages(Re-) Discovering Lost Web Pages
(Re-) Discovering Lost Web Pages
Michael Nelson
 
Memento: Time Travel for the Web
Memento: Time Travel for the WebMemento: Time Travel for the Web
Memento: Time Travel for the Web
Michael Nelson
 
My Point of View: Michael L. Nelson Web Archiving Cooperative
My Point of View: Michael L. Nelson  Web Archiving CooperativeMy Point of View: Michael L. Nelson  Web Archiving Cooperative
My Point of View: Michael L. Nelson Web Archiving Cooperative
Michael Nelson
 
Synchronicity: Just-In-Time Discovery of Lost Web Pages
Synchronicity: Just-In-Time Discovery of Lost Web PagesSynchronicity: Just-In-Time Discovery of Lost Web Pages
Synchronicity: Just-In-Time Discovery of Lost Web Pages
Michael Nelson
 
Music Video Redundancy and Half-Life in YouTube
Music Video Redundancy and Half-Life in YouTubeMusic Video Redundancy and Half-Life in YouTube
Music Video Redundancy and Half-Life in YouTube
Michael Nelson
 
A Research Agenda for "Obsolete Data or Resources"
A Research Agenda for "Obsolete Data or Resources"A Research Agenda for "Obsolete Data or Resources"
A Research Agenda for "Obsolete Data or Resources"
Michael Nelson
 
Review of Web Archiving
Review of Web ArchivingReview of Web Archiving
Review of Web Archiving
Michael Nelson
 
Tools for A Preservation Ready Web
Tools for A Preservation Ready WebTools for A Preservation Ready Web
Tools for A Preservation Ready Web
Michael Nelson
 
(Re-)Discovering Lost Web Pages
(Re-)Discovering Lost Web Pages(Re-)Discovering Lost Web Pages
(Re-)Discovering Lost Web Pages
Michael Nelson
 
The Open Archives Initiative
The Open Archives InitiativeThe Open Archives Initiative
The Open Archives Initiative
Michael Nelson
 
OAI-ORE: The Open Archives Initiative Object Reuse and Exchange Project
OAI-ORE:  The Open Archives Initiative  Object Reuse and Exchange ProjectOAI-ORE:  The Open Archives Initiative  Object Reuse and Exchange Project
OAI-ORE: The Open Archives Initiative Object Reuse and Exchange Project
Michael Nelson
 
Why Care About the Past?
Why Care About the Past?Why Care About the Past?
Why Care About the Past?
Michael Nelson
 

Viewers also liked (16)

Can’t Find Your 404s?
Can’t Find Your 404s?Can’t Find Your 404s?
Can’t Find Your 404s?
 
Memento: TimeGates, TimeBundles, and TimeMaps
Memento: TimeGates, TimeBundles, and TimeMapsMemento: TimeGates, TimeBundles, and TimeMaps
Memento: TimeGates, TimeBundles, and TimeMaps
 
Memento: Time Travel for the Web
Memento: Time Travel for the WebMemento: Time Travel for the Web
Memento: Time Travel for the Web
 
Memento: Time Travel for the Web
Memento: Time Travel for the WebMemento: Time Travel for the Web
Memento: Time Travel for the Web
 
(Re-) Discovering Lost Web Pages
(Re-) Discovering Lost Web Pages(Re-) Discovering Lost Web Pages
(Re-) Discovering Lost Web Pages
 
Memento: Time Travel for the Web
Memento: Time Travel for the WebMemento: Time Travel for the Web
Memento: Time Travel for the Web
 
My Point of View: Michael L. Nelson Web Archiving Cooperative
My Point of View: Michael L. Nelson  Web Archiving CooperativeMy Point of View: Michael L. Nelson  Web Archiving Cooperative
My Point of View: Michael L. Nelson Web Archiving Cooperative
 
Synchronicity: Just-In-Time Discovery of Lost Web Pages
Synchronicity: Just-In-Time Discovery of Lost Web PagesSynchronicity: Just-In-Time Discovery of Lost Web Pages
Synchronicity: Just-In-Time Discovery of Lost Web Pages
 
Music Video Redundancy and Half-Life in YouTube
Music Video Redundancy and Half-Life in YouTubeMusic Video Redundancy and Half-Life in YouTube
Music Video Redundancy and Half-Life in YouTube
 
A Research Agenda for "Obsolete Data or Resources"
A Research Agenda for "Obsolete Data or Resources"A Research Agenda for "Obsolete Data or Resources"
A Research Agenda for "Obsolete Data or Resources"
 
Review of Web Archiving
Review of Web ArchivingReview of Web Archiving
Review of Web Archiving
 
Tools for A Preservation Ready Web
Tools for A Preservation Ready WebTools for A Preservation Ready Web
Tools for A Preservation Ready Web
 
(Re-)Discovering Lost Web Pages
(Re-)Discovering Lost Web Pages(Re-)Discovering Lost Web Pages
(Re-)Discovering Lost Web Pages
 
The Open Archives Initiative
The Open Archives InitiativeThe Open Archives Initiative
The Open Archives Initiative
 
OAI-ORE: The Open Archives Initiative Object Reuse and Exchange Project
OAI-ORE:  The Open Archives Initiative  Object Reuse and Exchange ProjectOAI-ORE:  The Open Archives Initiative  Object Reuse and Exchange Project
OAI-ORE: The Open Archives Initiative Object Reuse and Exchange Project
 
Why Care About the Past?
Why Care About the Past?Why Care About the Past?
Why Care About the Past?
 

Similar to Using timed-release cryptography to mitigate the preservation risk of embargo periods

Coq to Rubyによる証明駆動開発@名古屋ruby会議02
Coq to Rubyによる証明駆動開発@名古屋ruby会議02Coq to Rubyによる証明駆動開発@名古屋ruby会議02
Coq to Rubyによる証明駆動開発@名古屋ruby会議02Hiroki Mizuno
 
On-Homomorphic-Encryption-and-Secure-Computation.ppt
On-Homomorphic-Encryption-and-Secure-Computation.pptOn-Homomorphic-Encryption-and-Secure-Computation.ppt
On-Homomorphic-Encryption-and-Secure-Computation.ppt
ssuser85a33d
 
Elliptic curve cryptography and zero knowledge proof
Elliptic curve cryptography and zero knowledge proofElliptic curve cryptography and zero knowledge proof
Elliptic curve cryptography and zero knowledge proof
Nimish Joseph
 
Elliptic Curve Cryptography and Zero Knowledge Proof
Elliptic Curve Cryptography and Zero Knowledge ProofElliptic Curve Cryptography and Zero Knowledge Proof
Elliptic Curve Cryptography and Zero Knowledge Proof
Arunanand Ta
 
Paris data-geeks-2013-03-28
Paris data-geeks-2013-03-28Paris data-geeks-2013-03-28
Paris data-geeks-2013-03-28
Ted Dunning
 
TIM: Large-scale Energy Forecasting in Julia
TIM: Large-scale Energy Forecasting in JuliaTIM: Large-scale Energy Forecasting in Julia
TIM: Large-scale Energy Forecasting in Julia
GapData Institute
 
lec16-memory.ppt
lec16-memory.pptlec16-memory.ppt
lec16-memory.ppt
AshokRachapalli1
 
Challenging Web-Scale Graph Analytics with Apache Spark with Xiangrui Meng
Challenging Web-Scale Graph Analytics with Apache Spark with Xiangrui MengChallenging Web-Scale Graph Analytics with Apache Spark with Xiangrui Meng
Challenging Web-Scale Graph Analytics with Apache Spark with Xiangrui Meng
Databricks
 
Challenging Web-Scale Graph Analytics with Apache Spark
Challenging Web-Scale Graph Analytics with Apache SparkChallenging Web-Scale Graph Analytics with Apache Spark
Challenging Web-Scale Graph Analytics with Apache Spark
Databricks
 
Fast Single-pass K-means Clusterting at Oxford
Fast Single-pass K-means Clusterting at Oxford Fast Single-pass K-means Clusterting at Oxford
Fast Single-pass K-means Clusterting at Oxford
MapR Technologies
 
Python for Chemistry
Python for ChemistryPython for Chemistry
Python for Chemistrybaoilleach
 
Python for Chemistry
Python for ChemistryPython for Chemistry
Python for Chemistryguest5929fa7
 
Lecture6 rsa
Lecture6 rsaLecture6 rsa
Lecture6 rsa
Nghique Nguyen
 
IOEfficientParalleMatrixMultiplication_present
IOEfficientParalleMatrixMultiplication_presentIOEfficientParalleMatrixMultiplication_present
IOEfficientParalleMatrixMultiplication_presentShubham Joshi
 
Oxford 05-oct-2012
Oxford 05-oct-2012Oxford 05-oct-2012
Oxford 05-oct-2012
Ted Dunning
 
LCS35
LCS35LCS35
ACM 2013-02-25
ACM 2013-02-25ACM 2013-02-25
ACM 2013-02-25
Ted Dunning
 
Web-Scale Graph Analytics with Apache® Spark™
Web-Scale Graph Analytics with Apache® Spark™Web-Scale Graph Analytics with Apache® Spark™
Web-Scale Graph Analytics with Apache® Spark™
Databricks
 
Common Crypto Pitfalls
Common Crypto PitfallsCommon Crypto Pitfalls
Common Crypto Pitfalls
Amirali Sanatinia
 

Similar to Using timed-release cryptography to mitigate the preservation risk of embargo periods (20)

Class3
Class3Class3
Class3
 
Coq to Rubyによる証明駆動開発@名古屋ruby会議02
Coq to Rubyによる証明駆動開発@名古屋ruby会議02Coq to Rubyによる証明駆動開発@名古屋ruby会議02
Coq to Rubyによる証明駆動開発@名古屋ruby会議02
 
On-Homomorphic-Encryption-and-Secure-Computation.ppt
On-Homomorphic-Encryption-and-Secure-Computation.pptOn-Homomorphic-Encryption-and-Secure-Computation.ppt
On-Homomorphic-Encryption-and-Secure-Computation.ppt
 
Elliptic curve cryptography and zero knowledge proof
Elliptic curve cryptography and zero knowledge proofElliptic curve cryptography and zero knowledge proof
Elliptic curve cryptography and zero knowledge proof
 
Elliptic Curve Cryptography and Zero Knowledge Proof
Elliptic Curve Cryptography and Zero Knowledge ProofElliptic Curve Cryptography and Zero Knowledge Proof
Elliptic Curve Cryptography and Zero Knowledge Proof
 
Paris data-geeks-2013-03-28
Paris data-geeks-2013-03-28Paris data-geeks-2013-03-28
Paris data-geeks-2013-03-28
 
TIM: Large-scale Energy Forecasting in Julia
TIM: Large-scale Energy Forecasting in JuliaTIM: Large-scale Energy Forecasting in Julia
TIM: Large-scale Energy Forecasting in Julia
 
lec16-memory.ppt
lec16-memory.pptlec16-memory.ppt
lec16-memory.ppt
 
Challenging Web-Scale Graph Analytics with Apache Spark with Xiangrui Meng
Challenging Web-Scale Graph Analytics with Apache Spark with Xiangrui MengChallenging Web-Scale Graph Analytics with Apache Spark with Xiangrui Meng
Challenging Web-Scale Graph Analytics with Apache Spark with Xiangrui Meng
 
Challenging Web-Scale Graph Analytics with Apache Spark
Challenging Web-Scale Graph Analytics with Apache SparkChallenging Web-Scale Graph Analytics with Apache Spark
Challenging Web-Scale Graph Analytics with Apache Spark
 
Fast Single-pass K-means Clusterting at Oxford
Fast Single-pass K-means Clusterting at Oxford Fast Single-pass K-means Clusterting at Oxford
Fast Single-pass K-means Clusterting at Oxford
 
Python for Chemistry
Python for ChemistryPython for Chemistry
Python for Chemistry
 
Python for Chemistry
Python for ChemistryPython for Chemistry
Python for Chemistry
 
Lecture6 rsa
Lecture6 rsaLecture6 rsa
Lecture6 rsa
 
IOEfficientParalleMatrixMultiplication_present
IOEfficientParalleMatrixMultiplication_presentIOEfficientParalleMatrixMultiplication_present
IOEfficientParalleMatrixMultiplication_present
 
Oxford 05-oct-2012
Oxford 05-oct-2012Oxford 05-oct-2012
Oxford 05-oct-2012
 
LCS35
LCS35LCS35
LCS35
 
ACM 2013-02-25
ACM 2013-02-25ACM 2013-02-25
ACM 2013-02-25
 
Web-Scale Graph Analytics with Apache® Spark™
Web-Scale Graph Analytics with Apache® Spark™Web-Scale Graph Analytics with Apache® Spark™
Web-Scale Graph Analytics with Apache® Spark™
 
Common Crypto Pitfalls
Common Crypto PitfallsCommon Crypto Pitfalls
Common Crypto Pitfalls
 

More from Michael Nelson

Web Archiving in the Year eaee1902f186819154789ee22ca30035
Web Archiving in the Year eaee1902f186819154789ee22ca30035Web Archiving in the Year eaee1902f186819154789ee22ca30035
Web Archiving in the Year eaee1902f186819154789ee22ca30035
Michael Nelson
 
Uncertainty in replaying archived Twitter pages
Uncertainty in replaying archived Twitter pagesUncertainty in replaying archived Twitter pages
Uncertainty in replaying archived Twitter pages
Michael Nelson
 
Web Archives at the Nexus of Good Fakes and Flawed Originals
Web Archives at the Nexus of Good Fakes and Flawed OriginalsWeb Archives at the Nexus of Good Fakes and Flawed Originals
Web Archives at the Nexus of Good Fakes and Flawed Originals
Michael Nelson
 
Web Archives at the Nexus of Good Fakes and Flawed Originals
Web Archives at the Nexus of Good Fakes and Flawed OriginalsWeb Archives at the Nexus of Good Fakes and Flawed Originals
Web Archives at the Nexus of Good Fakes and Flawed Originals
Michael Nelson
 
Blockchain Can Not Be Used To Verify Replayed Archived Web Pages
Blockchain Can Not Be Used To Verify Replayed Archived Web PagesBlockchain Can Not Be Used To Verify Replayed Archived Web Pages
Blockchain Can Not Be Used To Verify Replayed Archived Web Pages
Michael Nelson
 
Blockchain Can Not Be Used To Verify Replayed Archived Web Pages
Blockchain Can Not Be Used To Verify Replayed Archived Web PagesBlockchain Can Not Be Used To Verify Replayed Archived Web Pages
Blockchain Can Not Be Used To Verify Replayed Archived Web Pages
Michael Nelson
 
Weaponized Web Archives: Provenance Laundering of Short Order Evidence
Weaponized Web Archives: Provenance Laundering of Short Order Evidence Weaponized Web Archives: Provenance Laundering of Short Order Evidence
Weaponized Web Archives: Provenance Laundering of Short Order Evidence
Michael Nelson
 
Weaponized Web Archives: Provenance Laundering of Short Order Evidence
Weaponized Web Archives: Provenance Laundering of Short Order Evidence Weaponized Web Archives: Provenance Laundering of Short Order Evidence
Weaponized Web Archives: Provenance Laundering of Short Order Evidence
Michael Nelson
 
Weaponized Web Archives: Provenance Laundering of Short Order Evidence
Weaponized Web Archives: Provenance Laundering of Short Order Evidence Weaponized Web Archives: Provenance Laundering of Short Order Evidence
Weaponized Web Archives: Provenance Laundering of Short Order Evidence
Michael Nelson
 
Web Archiving Activities of ODU’s Web Science and Digital Library Research G...
Web Archiving Activities of ODU’s Web Science and Digital Library Research G...Web Archiving Activities of ODU’s Web Science and Digital Library Research G...
Web Archiving Activities of ODU’s Web Science and Digital Library Research G...
Michael Nelson
 
Summarizing archival collections using storytelling techniques
Summarizing archival collections using storytelling techniquesSummarizing archival collections using storytelling techniques
Summarizing archival collections using storytelling techniques
Michael Nelson
 
The Memento Protocol and Research Issues With Web Archiving
The Memento Protocol and Research Issues With Web ArchivingThe Memento Protocol and Research Issues With Web Archiving
The Memento Protocol and Research Issues With Web Archiving
Michael Nelson
 
We Need Multiple, Independent Web Archives
We Need Multiple, Independent Web ArchivesWe Need Multiple, Independent Web Archives
We Need Multiple, Independent Web Archives
Michael Nelson
 
Combining Heritrix and PhantomJS for Better Crawling of Pages with Javascript
Combining Heritrix and PhantomJS for Better Crawling of Pages with JavascriptCombining Heritrix and PhantomJS for Better Crawling of Pages with Javascript
Combining Heritrix and PhantomJS for Better Crawling of Pages with Javascript
Michael Nelson
 
Storytelling for Summarizing Collections in Web Archives
Storytelling for Summarizing Collections in Web ArchivesStorytelling for Summarizing Collections in Web Archives
Storytelling for Summarizing Collections in Web Archives
Michael Nelson
 
Why We Need Multiple Archives
Why We Need Multiple ArchivesWhy We Need Multiple Archives
Why We Need Multiple Archives
Michael Nelson
 
Combining Storytelling and Web Archives
Combining Storytelling and Web ArchivesCombining Storytelling and Web Archives
Combining Storytelling and Web Archives
Michael Nelson
 
@WebSciDL PhD Student Project Reviews August 5&6, 2015
@WebSciDL PhD Student Project Reviews August 5&6, 2015@WebSciDL PhD Student Project Reviews August 5&6, 2015
@WebSciDL PhD Student Project Reviews August 5&6, 2015
Michael Nelson
 
Evaluating the Temporal Coherence of Archived Pages
Evaluating the Temporal Coherence of Archived PagesEvaluating the Temporal Coherence of Archived Pages
Evaluating the Temporal Coherence of Archived Pages
Michael Nelson
 
When Should I Make Preservation Copies of Myself?
When Should I Make Preservation Copies of Myself?�When Should I Make Preservation Copies of Myself?�
When Should I Make Preservation Copies of Myself?
Michael Nelson
 

More from Michael Nelson (20)

Web Archiving in the Year eaee1902f186819154789ee22ca30035
Web Archiving in the Year eaee1902f186819154789ee22ca30035Web Archiving in the Year eaee1902f186819154789ee22ca30035
Web Archiving in the Year eaee1902f186819154789ee22ca30035
 
Uncertainty in replaying archived Twitter pages
Uncertainty in replaying archived Twitter pagesUncertainty in replaying archived Twitter pages
Uncertainty in replaying archived Twitter pages
 
Web Archives at the Nexus of Good Fakes and Flawed Originals
Web Archives at the Nexus of Good Fakes and Flawed OriginalsWeb Archives at the Nexus of Good Fakes and Flawed Originals
Web Archives at the Nexus of Good Fakes and Flawed Originals
 
Web Archives at the Nexus of Good Fakes and Flawed Originals
Web Archives at the Nexus of Good Fakes and Flawed OriginalsWeb Archives at the Nexus of Good Fakes and Flawed Originals
Web Archives at the Nexus of Good Fakes and Flawed Originals
 
Blockchain Can Not Be Used To Verify Replayed Archived Web Pages
Blockchain Can Not Be Used To Verify Replayed Archived Web PagesBlockchain Can Not Be Used To Verify Replayed Archived Web Pages
Blockchain Can Not Be Used To Verify Replayed Archived Web Pages
 
Blockchain Can Not Be Used To Verify Replayed Archived Web Pages
Blockchain Can Not Be Used To Verify Replayed Archived Web PagesBlockchain Can Not Be Used To Verify Replayed Archived Web Pages
Blockchain Can Not Be Used To Verify Replayed Archived Web Pages
 
Weaponized Web Archives: Provenance Laundering of Short Order Evidence
Weaponized Web Archives: Provenance Laundering of Short Order Evidence Weaponized Web Archives: Provenance Laundering of Short Order Evidence
Weaponized Web Archives: Provenance Laundering of Short Order Evidence
 
Weaponized Web Archives: Provenance Laundering of Short Order Evidence
Weaponized Web Archives: Provenance Laundering of Short Order Evidence Weaponized Web Archives: Provenance Laundering of Short Order Evidence
Weaponized Web Archives: Provenance Laundering of Short Order Evidence
 
Weaponized Web Archives: Provenance Laundering of Short Order Evidence
Weaponized Web Archives: Provenance Laundering of Short Order Evidence Weaponized Web Archives: Provenance Laundering of Short Order Evidence
Weaponized Web Archives: Provenance Laundering of Short Order Evidence
 
Web Archiving Activities of ODU’s Web Science and Digital Library Research G...
Web Archiving Activities of ODU’s Web Science and Digital Library Research G...Web Archiving Activities of ODU’s Web Science and Digital Library Research G...
Web Archiving Activities of ODU’s Web Science and Digital Library Research G...
 
Summarizing archival collections using storytelling techniques
Summarizing archival collections using storytelling techniquesSummarizing archival collections using storytelling techniques
Summarizing archival collections using storytelling techniques
 
The Memento Protocol and Research Issues With Web Archiving
The Memento Protocol and Research Issues With Web ArchivingThe Memento Protocol and Research Issues With Web Archiving
The Memento Protocol and Research Issues With Web Archiving
 
We Need Multiple, Independent Web Archives
We Need Multiple, Independent Web ArchivesWe Need Multiple, Independent Web Archives
We Need Multiple, Independent Web Archives
 
Combining Heritrix and PhantomJS for Better Crawling of Pages with Javascript
Combining Heritrix and PhantomJS for Better Crawling of Pages with JavascriptCombining Heritrix and PhantomJS for Better Crawling of Pages with Javascript
Combining Heritrix and PhantomJS for Better Crawling of Pages with Javascript
 
Storytelling for Summarizing Collections in Web Archives
Storytelling for Summarizing Collections in Web ArchivesStorytelling for Summarizing Collections in Web Archives
Storytelling for Summarizing Collections in Web Archives
 
Why We Need Multiple Archives
Why We Need Multiple ArchivesWhy We Need Multiple Archives
Why We Need Multiple Archives
 
Combining Storytelling and Web Archives
Combining Storytelling and Web ArchivesCombining Storytelling and Web Archives
Combining Storytelling and Web Archives
 
@WebSciDL PhD Student Project Reviews August 5&6, 2015
@WebSciDL PhD Student Project Reviews August 5&6, 2015@WebSciDL PhD Student Project Reviews August 5&6, 2015
@WebSciDL PhD Student Project Reviews August 5&6, 2015
 
Evaluating the Temporal Coherence of Archived Pages
Evaluating the Temporal Coherence of Archived PagesEvaluating the Temporal Coherence of Archived Pages
Evaluating the Temporal Coherence of Archived Pages
 
When Should I Make Preservation Copies of Myself?
When Should I Make Preservation Copies of Myself?�When Should I Make Preservation Copies of Myself?�
When Should I Make Preservation Copies of Myself?
 

Recently uploaded

zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 

Recently uploaded (20)

zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 

Using timed-release cryptography to mitigate the preservation risk of embargo periods

  • 1. Using Timed-Release Cryptography to Mitigate The Preservation Risk of Embargo Periods Rabia Haq, Michael L. Nelson Old Dominion University Norfolk VA www.cs.odu.edu/~{rhaq,mln} 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19 1
  • 2. Overview • Embargo Periods – associated preservation risk interval • Time-Locked Puzzle / Time Release Cryptography • System Evaluation using mod_oai (resource harvesting using OAI-PMH) – Optimization Using Chunked Encryption • Future Considerations • Conclusion 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19 2
  • 3. Journal Access Models – Romeo Colors* • Red: Traditional subscription-based Access – Purchase-own model • Yellow: Embargoed Access – Hybrid of traditional and open access • Green: Self-authored Open Access – e.g., arVix.org, institutional repositories • Gold: Free and Open Access Journals – e.g., PLoS Journals, www.doaj.org * “Old” Romeo Colors, now green/blue/yellow/white; see: http://www.sherpa.ac.uk/romeoinfo.html 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19 3
  • 4. Embargoed Access • Paid access (red) for some time interval, then the content becomes open (gold) – current issue(s) cost $ – previous issues are free • We’ll assume: gold >= green > yellow > red • Note: inverse of typical online newspaper model of: current is free, archived content costs $. 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19 4
  • 5. Who Uses Embargoes? • 24% of PubMed Central (PMC) titles embargoed • The New England Journal of Medicine – embargoed for 6 months • EBMO Journal – embargoed for 12 months 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19 5
  • 6. Preservation Risk Interval: (A Hypothetical, Non-Topical Example) • Journal of UT Football Non-Conference Scheduling is embargoed for 6 months – sample article “Why scheduling Florida Atlantic, UTEP, Rice & Arkansas is not a national championship schedule” – previous volumes (e.g., 2008, 2007) are freely available – issues 1--6 of current volume are currently for subscribers only – 6 month “sliding window”: when issue 7 comes out on July1, issue 1 becomes freely available • Now imagine Mack Brown issues a cease & desist order to JUTFNS on June 30 – what happens to volume 2009, issues 1-6? Will they ever be available to non-subscribers? 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19 6
  • 7. Current Solutions • LOCKSS (CLOCKSS): www.lockss.org – local, cooperating caches between subscribers (i.e., libraries) – http://www.clockss.org/clockss/Triggered_Content • Portico: www.portico.org – trusted third party archive (i.e., neither library nor publisher) – http://www.portico.org/news/trigger.html 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19 7
  • 8. Can We Use Lazy Preservation? • We’ve already shown by using IA, search engine caches, etc. we can reconstruct public web sites after they’ve been lost (McCown, 2007) • For embargoed content, we could expose encrypted content that is embargoed – but how can we prevent bad guys™ from using zombie farms to break the encryption before the embargo period is up? 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19 8
  • 9. Timed-Release Cryptology • Time-Lock Puzzle (TLP) Creation – Data decryption non-parallelizable – Serial computation required to break puzzle – Data locked for predetermined time-period • not self-unlocking -- still requires computation to unlock • Used in MIT/LCS35 Time Lock Puzzle – http://people.csail.mit.edu/rivest/lcs35-puzzle-description.txt – idea: you could have started in 1999 (with your 1999 computer) and worked for 35 years… OR you can wait until 2033, buy a new computer and work for 1 year rewards procrastination! 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19 9
  • 10. “Regular” RSA Picking values: “Brute Force” Attacks: • n=p*q • need to factor n (which is easier • φ(n)=(p-1)(q-1), then than trying all values of d) “throw away” p & q • simple soln: try all primes from 1 .. √n • pick e coprime to φ(n) • pick d s.t. d*e≡1 mod(φ(n)) helping the attacker: - adding k computers reduces the time public key = (n,e) to break by 1/k private key = (n,d) - they might get lucky and get it on their first shot! Encryption c = me (mod n) more info: http://www.cl.cam.ac.uk/users/rnc1/brute.html Decryption http://axion.physics.ubc.ca/pgp-attack.html m = cd (mod n) 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19 10
  • 11. Time Lock Puzzle Picking values: Attacking: • n=p*q • repeated squarings of a is faster than • φ(n)=(p-1)(q-1), then factoring n -- also not known to be “throw away” p & q parallelizable! (Rivest, 1996) • t=TS • demo: n=253 (i.e., p=11,q=23), t=10, • pick some random key k, w= cm = RC5(k,m) 1 2(2 ) = 22 = 4 (mod 253) • pick random a, 1<a<n 2 2(2 ) = 42 = 16 (mod 253) 3 2(2 ) = 162 = 3 (mod 253) • w= a2t (mod n) 4 2(2 ) = 32 = 9 (mod 253) • ck = k ⊕ w 5 2(2 ) = 92 = 81 (mod 253) 6 puzzle = (n,a,t,ck,cm) 2(2 ) = 812 = 236 (mod 253) 7 2(2 ) = 2362 = 36 (mod 253) 8 actually, in our version we skip step 4 2(2 ) = 362 = 31 (mod 253) 9 and define step 7 as: z = m ⊕ w 2(2 ) = 312 = 202 (mod 253) puzzle = (n,t,z) 10 2(2 ) = 2022 = 71 (mod 253) 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19 11
  • 12. Implementation: mod_oai, CRATE • Both based on (Smith, 2008) • mod_oai – an Apache module providing OAI-PMH functionality for an entire web site not just, for example, records in an institutional repository • CRATE – a model for encoding resource + associated metadata – implemented using MPEG-21 DIDL complex object format 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19 12
  • 13. mod_oai mechanics Integrate OAI-PMH functionality into the web server itself… 1. Use mod_oai • an Apache 2.0 module • automatically answers OAI-PMH requests for an http server • written in C • respects values in .htaccess, httpd.conf 2. Install mod_oai on http://www.foo.edu/ 3. Define baseURL: http://www.foo.edu/modoai → Result: web harvesting with OAI-PMH semantics (e.g., from, until, sets) http://www.foo.edu/modoai?verb=ListRecords&metdataPrefix=oai_didl&from=2004-09-15&set=mime:video:mpeg From site foo, dating from 9/15/2004 through today Give me all resources Using OAI-PMH And their preservation metadata that are MIME type video-MPEG 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19 13
  • 14. OAI-PMH Data Model 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19 14
  • 15. MPEG-21 DIDL Resource Structure 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19 15
  • 16. An Active Repository 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19 16
  • 17. A Dying Repository Records e1, f2, g3 are recoverable; record h is lost. 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19 17
  • 18. Dynamic Time-Locked Record Embargo within mod_oai • Identification – Calculation of remaining record embargo period • Encryption – Calculating record time-lock puzzle complexity – Time-Lock Puzzle creation • Encapsulation – exploiting flexibility of MPEG-21 DIDL format to encapsulate encrypted resources and related information 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19 18
  • 19. Identification update OAI-PMH datestamp as time lock becomes weaker 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19 19
  • 20. Encryption • Modification of LCS35 Time Capsule Crypto-Puzzle to use time lock on entire resource (not just the key) – as per code provided at: http://people.csail.mit.edu/rivest/lcs35- puzzle-description.txt • Input: timeUnit (controls puzzle complexity) • Compute: u = 2t mod((p-1)(q-1)) w = (2u) mod(n) z = resource ⊕ w • Output: n, t, z 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19 20
  • 21. Encapsulation This version of the record is 7 of 12 separate encryptions, each of which is successively easier to break. It will take approximately 3650 hours of computation to break this time-lock. The next update will be available on 2008-01-16T20:56:15Z. Crypto-Puzzle for LCS35 Time Capsule. Puzzle parameters (all in decimal): n = 398399 t = 264600000. z = 313239174518025552773909388461801735302388... 893375562056859914777144518879488573607906... 742437030171894184996228671834511813009803... (many lines deleted for space) To solve the puzzle, first compute w = 2*2*t (mod n). Then exclusive-or the result with z. (Right-justify the two strings first). The result is the secret message (8 bits per character). 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19 21
  • 22. Selecting Appropriate Values of t • Time required to break puzzle dependent on processor speed • Given our projected short embargo period (6-24 months), we made a simplifying assumption that Moore’s law increases linearly (not exponentially) – idea: in the next few months, you’re more likely to see something like: 2Ghz→2.2Ghz, not 2Ghz→4Ghz • recall: t = number of squarings – t=T*S – S=3000 squarings/second, T=1800 seconds *tU, – tU = f(machine speed) * embargolength – t=3000*1800*tU 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19 22
  • 23. Effect of Computation Speed on embargolength • We broke time lock puzzles on four class of machines (in GHz): – 1.8 (5 nodes) – 1.6 (26 nodes) – 1 (1 node) – 0.75 (1 node) 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19 23
  • 24. Picking t With Empirical Data using 1Ghz machine as baseline, projecting for a 2.5 Ghz machine, and locking for 2 years (63115200 seconds): • tU = 63115200 * 2.5 / (1727.61) = 9133 • t = 3000 * 1800 * 9133 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19 24
  • 25. Experimental Evaluation • Embargolength = 365 days • Embargodecrement = 12 • Test website – 525 files – 17.3 MB data – 63% text files – Average file size = 33KB 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19 25
  • 26. Harvesting Time: Locked & Unlocked 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19 26
  • 27. O(n2) time to create time-lock puzzle 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19 27
  • 28. Solution: Break Files Into “Chunks” • Size of file exponentially increases lock-time • Idea: break file into series of small chunks – still O(n2), but with a much more favorable constant • Lock-time on a 1.8 GHz machine time_to_lock(200 KB) = 13 sec time_to_lock(100 KB) = 3 sec 200 KB = 100 KB + 100 KB = 3 sec + 3 sec = 6 sec 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19 28
  • 29. 10 KB Chunked Encryption in mod_oai 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19 29
  • 30. MPEG-21 DIDL document With Chunks This record has been split into 10000-byte chunks for faster processing. This is part 1 of 7 chunks, with unlocked chunks to be reassembled in the specified order. 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19 30
  • 31. Future Considerations • Chunk size performance dependency • Other optimization methods: – Parallel time-locking of resources – Data pre-locking – only time-lock encryption key, use other encryption methods on the original resource (as per original Rivest (1996), not as per http://people.csail.mit.edu/rivest/lcs35-puzzle- description.txt) 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19 31
  • 32. Conclusions • Suggest the use of time lock puzzles for dissemination of embargoed records – complement to other methods such as LOCKSS, Poritco, etc. • Implemented and evaluated time lock puzzles in the mod_oai & CRATE environment • Full paper: – http://doi.acm.org/10.1145/1555400.1555430 – http://www.cs.odu.edu/~mln/pubs/jcdl09/jcdl09-time-lock.pdf 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19 32