DOC PREVIEW
Purdue CS 59000 - Intrusion Fault-Tolerance using Threshold Cryptography

This preview shows page 1-2-3-4-5-6 out of 17 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 17 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 17 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 17 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 17 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 17 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 17 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 17 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

IntrusionFault-Tolerance usingThreshold CryptographyRahim SewaniSarvjeet SinghAbhilasha BhargavCS590D - Intrusion Fault-Toleranceusing Threshold Cryptography24/27/2004OutlineOutlinen Introductionn Motivationn Threshold Cryptography Basicsn Threshold Cryptography Functionalityn Library Demon Analysisn AchievementsCS590D - Intrusion Fault-Toleranceusing Threshold Cryptography34/27/2004IntroductionIntroductionnnGoalGoal – To develop an intrusion fault-tolerantgroup communication system usingthreshold cryptography to exchangemessagesn TCP-IP supports point to pointcommunicationn Need multi-point to multi-pointcommunication – “Group Communication”CS590D - Intrusion Fault-Toleranceusing Threshold Cryptography44/27/2004MotivationMotivationnnSpreadSpread – Provides group communication withreliability and availability in presence of networkpartitions or component failuresn Server:® Receives, processes and forwards messages® Needs location of all potential spread servers® Exchanges messages to generate a consistent view ofthe systemn Client:® The group members that communicate with the serverto send and receive messagesCS590D - Intrusion Fault-Toleranceusing Threshold Cryptography54/27/2004MotivationMotivation……n How to achieve authenticated group communication inSpread?n Adversary tries to disrupt the consistent view of the systemn Two extremes of agreement® Trust everyone® Trust no onen Servers can trust their own subnetn Servers trust a threshold of servers belonging to anothersubnetn Proposed Solution: Integrating Threshold Signature LibraryThreshold Signature Libraryinto the serversCS590D - Intrusion Fault-Toleranceusing Threshold Cryptography64/27/2004MotivationMotivation……n Did not find any opensource ThresholdSignatures toolkitCS590D - Intrusion Fault-Toleranceusing Threshold Cryptography74/27/2004RSA BasicsRSA Basicsn Public key = (n,e) ; Secret Key = dn Signature: S = Md mod nn Verification: Se mod n = M ?n Threshold RSA distributes secret amongstall membersCS590D - Intrusion Fault-Toleranceusing Threshold Cryptography84/27/2004Threshold CryptographyThreshold Cryptographyn Allows n parties to share the ability ofperforming a cryptographic operation (e.g.creating a digital signature)n Any t parties (t < n) can perform thisoperation jointlyn Infeasible for any t -1 parties (or less) todo so, even by collusionn The secret cannot be recovered by anysubset of partiesCS590D - Intrusion Fault-Toleranceusing Threshold Cryptography94/27/2004n Dealer generates the keysn Dealer distributes the keysn Message is broadcast to members• Members sign the message and send it to thecombiner•Combiner combines the individualsignatures to get a signed messageCS590D - Intrusion Fault-Toleranceusing Threshold Cryptography104/27/2004Threshold Signature Library DemoThreshold Signature Library DemoCS590D - Intrusion Fault-Toleranceusing Threshold Cryptography114/27/2004Threshold Cryptography Implementationn Implemented signature protocol asdescribed in Victor Shoup “PracticalThreshold Signature” papern Uses OpenSSL Crypto libraryn Generic® No assumption about the underlying platform® No assumption about the underlyingcommunication mechanismn Open SourceCS590D - Intrusion Fault-Toleranceusing Threshold Cryptography124/27/2004Analysis of TC-RSA with RSAAnalysis of TC-RSA with RSAO(k)O(1)SignatureVerification0 (N/A)O(k)MergingSignaturesO(k)O(k)Generate Ind.SignaturesO(k)k = ThresholdO(1)Size of thesignatureRSATC-RSACS590D - Intrusion Fault-Toleranceusing Threshold Cryptography134/27/20041.14E+073.48E+071.39E+065.49E+054.46E+060 1.98E+021.52E+0405000000100000001500000020000000250000003000000035000000Deal Sign Combine VerifyTC-RSA (1024)RSA (1024)Analysis of TC-RSA with RSAAnalysis of TC-RSA with RSAY-Axis:Numberof MicrosecondsX-Axis:FunctionN = 100K = 67CS590D - Intrusion Fault-Toleranceusing Threshold Cryptography144/27/2004Analysis of TC-RSA with RSAAnalysis of TC-RSA with RSAn Setup cost (PKI):Requires ncertificates for allgroup membersRequires one certificatefor the public key pergroupRSATC-RSACS590D - Intrusion Fault-Toleranceusing Threshold Cryptography154/27/2004Accomplished WorkAccomplished Workn Researching and understanding currentstate of work in group communicationprotocols and threshold cryptographyn Understanding the Spread architecture andthe interaction between its modulesn Implementing and testing the ThresholdCryptography libraryn Threat and run time and complexityanalysis of threshold signaturesCS590D - Intrusion Fault-Toleranceusing Threshold Cryptography164/27/2004Future WorkFuture Workn Integrating the threshold signatures inthe Spread communication systemn Testing and analyzing theperformance of the code implementedCS590D - Intrusion Fault-Toleranceusing Threshold Cryptography174/27/2004QuestionsQuestionsAcknowledgementAcknowledgementProfessor Cristina Nita-Rotaru and CS590D studentsfor insight and helpful


View Full Document

Purdue CS 59000 - Intrusion Fault-Tolerance using Threshold Cryptography

Documents in this Course
Lecture 4

Lecture 4

42 pages

Lecture 6

Lecture 6

38 pages

Load more
Download Intrusion Fault-Tolerance using Threshold Cryptography
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Intrusion Fault-Tolerance using Threshold Cryptography and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Intrusion Fault-Tolerance using Threshold Cryptography 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?