Cybersecurity Remote Education Access Toolkits CREAT - PowerPoint PPT Presentation

1 / 44
About This Presentation
Title:

Cybersecurity Remote Education Access Toolkits CREAT

Description:

E-Cash system. 11. Main Menus. Primitives: Advanced crypto-protocols ... E-Cash System (Fugerson's scheme) Environment. Key generation. Token withdrawal ... – PowerPoint PPT presentation

Number of Views:65
Avg rating:3.0/5.0
Slides: 45
Provided by: rtdsC
Category:

less

Transcript and Presenter's Notes

Title: Cybersecurity Remote Education Access Toolkits CREAT


1
Cyber-security Remote Education Access Toolkits
(CREAT)
  • Real-Time System Lab
  • Department of Computer Science
  • Texas AM university
  • August, 2008

2
Overview
  • An educational tool for learning classic and
    modern cryptographic tools
  • Remote registration and coordination of
    crypto-protocol executions for users from
    different affiliations
  • Demonstration of crypto-protocols with source
    code displayed and explained step by step
  • Easy programming practice with pre-defined
    questions/blanks

3
Major Components
  • User-Interface for Remote Control and
    Coordination
  • Cryptography Modules

4
User-Interface for Remote Control and Coordination
  • Overview of User-Interface
  • CREAT Server
  • CREAT Client
  • Matching Database

5
Overview of User-Interface
6
CREAT Server
  • CREAT server plays a role as the clearance house
    to match users for chatting and exercise of the
    security protocols. It provides three
    functionalities
  • Authentication
  • Registration
  • Group Matching

7
CREAT Client
  • CREAT client provides users an communication tool
    to send and receive message

8
Matching Database
  • The MySQL database stores all information of
    users and provides a matching function between
    suitable users

9
Cryptography Modules
  • Introduction
  • Software Stack
  • Main Menus
  • Implemented Modules
  • Primitives
  • Classic Protocols
  • Advanced Crypto-Protocols
  • Demo

10
Software Stack
Chat
E-Cash system
Blind Signature
Secret Sharing
Zero Knowledge Proof
Secret Handshake
RSA
ECC
Key Exchange Protocol
Secure Hash Function
Greatest Common Divisor (GCD)
Chinese Remainder Theory (CRT)
Random Number Generation
Prime Number Test
Factorization
Big Integer Tutorial
Caesar Cipher
Vigenere Cipher
C Tutorial
11
Main Menus
  • Primitives
  • Advanced crypto-protocols
  • Asymmetric key protocols
  • Real System Demo
  • Symmetric key protocols

12
Number Theory Primitives
  • (1)GCD
  • (2)CRT
  • (3)Facatorization
  • (4)Prime number test
  • (5)Random Number generation
  • (6) Secure Hash Function

13
Primitives - GCD
  • Use Euclidean algorithm to compute a greatest
    common divisor.

14
Primitives - CRT
  • CRT uses extended Euclidean algorithm to
    calculate results.

15
Primitives - Factorization
  • Pollard's rho algorithm

16
Primitives Prime Test
  • strong pseudoprime test

17
Primitives Random Number Generator
  • X9.17 pseudorandom generation.

18
Primitives Secure Hash Function
  • SHA1 protocol.

19
Classic Protocols
  • Symmetric Protocols
  • Caesar Cipher
  • Vigenere cipher
  • Asymmetric Protocols
  • RSA
  • Key Exchange
  • ECC

20
Caesar Cipher
21
Vigenere Cipher
22
RSA(key generation, encryption and decryption)
Show source code
Key generation
Public key
Private key
Encryption
Decryption
23
Diffie-Hellman Key Exchange
Shared Key
24
Elliptic Curve encryption (ECC)(Point addition
and multiplication)
Point doubling
Point addition
Point multiplication
25
Advanced Crypto-Protocols
  • Secret Handshaking scheme
  • Blind signature scheme
  • Zero Knowledge Authentication

26
Secret Handshaking(Pairing based scheme)
Membership Credential
Non-Membership Credential
Verification result
27
Blind Signature(Chaums scheme)
Original message
Verification
28
Zero Knowledge Proof(Fiat-Shamirs scheme)
Alice proves knowledge (s) to Bob
Verification
29
Demonstrations
  • E-Cash System
  • Secure Chat

30
E-Cash System(Fugersons scheme)
  • Environment
  • Key generation
  • Token withdrawal
  • Delegation (from grantor to grantee)
  • Double spending Detection

31
Environment
I. Get Public Keys Public Information II.
Withdraw Token
Delegation
Deposit
CA
Double Spending Identification (9)
(7)
(6)
(1)
(1)
(1)
(1)
(1)
(4)
(3)
(2)
(5)
Initiator
32
Key generation
Certificate Administrator (CA) Generate and
display keys and public information
33
Token Withdrawal
Host after withdrawing a token
Intermediate computed information
34
Delegation
Grantee (Ui1) after delegation
35
Double Spending Detection
CA receives the deposits from clients and detects
double spending.
The one (ID99) spent its token twice.
36
Demo Secure Chat
  • Registration users register in CREAT Chatting
    Program
  • Communication users talk to each other via
    encrypted messages
  • Matching find a person having the same interests
    through CREAT

37
Secure Chat - Registration
Server Side
Registration Request
Client Side
38
Registration Operation
Register Form The register form allow users
connect to server, register interesting and
personal information to server
39
CREAT Database Client Table
40
Secure Chat Communication
Message
41
Client Chatting Operation
  • The users can also talk to server via selected
    server IP address and send message to server site.

42
Secure Chat Matching Operation
  • Users are free to talk to anyone has similar
    interesting.

43
CREAT Database Client Interest Table
44
CREAT Database Client Matching Table
Write a Comment
User Comments (0)
About PowerShow.com