An Intrusion Tolerant Threshold Cryptographic System Kamran Riaz - - PowerPoint PPT Presentation

an intrusion tolerant threshold cryptographic system
SMART_READER_LITE
LIVE PREVIEW

An Intrusion Tolerant Threshold Cryptographic System Kamran Riaz - - PowerPoint PPT Presentation

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions An Intrusion Tolerant Threshold Cryptographic System Kamran Riaz Khan <krkhan@inspirated.com> March 2, 2010 Kamran Riaz Khan


slide-1
SLIDE 1

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions

An Intrusion Tolerant Threshold Cryptographic System

Kamran Riaz Khan <krkhan@inspirated.com> March 2, 2010

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-2
SLIDE 2

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions

Outline

1

Problem Statement Background Fail Well Systems The Basic Model

2

Proposed Solution (k, n) Threshold Scheme

3

Project Goals Statement Approaches Implementation

4

Deliverables

5

Related Work

6

References

7

Questions

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-3
SLIDE 3

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions Background

Symmetric-Key Cryptography

Alice calculates: c := E(K, m) (1) Alice sends c to Bob Bob calculates: m := D(K, c) (2) How to communicate K?

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-4
SLIDE 4

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions Background

Symmetric-Key Cryptography

Alice calculates: c := E(K, m) (1) Alice sends c to Bob Bob calculates: m := D(K, c) (2) How to communicate K?

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-5
SLIDE 5

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions Background

Symmetric-Key Cryptography

Alice calculates: c := E(K, m) (1) Alice sends c to Bob Bob calculates: m := D(K, c) (2) How to communicate K?

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-6
SLIDE 6

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions Background

Symmetric-Key Cryptography

Alice calculates: c := E(K, m) (1) Alice sends c to Bob Bob calculates: m := D(K, c) (2) How to communicate K?

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-7
SLIDE 7

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions Background

Symmetric-Key Cryptography

Alice calculates: c := E(K, m) (1) Alice sends c to Bob Bob calculates: m := D(K, c) (2) How to communicate K?

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-8
SLIDE 8

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions Background

Public-Key Cryptography

Bank generates a pair of keys (Sbank, Pbank) such that D(Sbank, E(Pbank, m)) = m (3) for all values of m Pbank is published

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-9
SLIDE 9

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions Background

Public-Key Cryptography

Bank generates a pair of keys (Sbank, Pbank) such that D(Sbank, E(Pbank, m)) = m (3) for all values of m Pbank is published

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-10
SLIDE 10

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions Background

Public-Key Cryptography

Bank generates a pair of keys (Sbank, Pbank) such that D(Sbank, E(Pbank, m)) = m (3) for all values of m Pbank is published

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-11
SLIDE 11

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions Background

Public-Key Cryptography

For credit card number m, client calculates: c := E(Pbank, m) (4) Client sends c to bank Bank receives c and calculates: m := D(Sbank, c) (5) Equation (3) ensures m is recovered from c ∗

∗N. Ferguson and B. Schneier, Practical Cryptography. New York, NY, USA:

John Wiley & Sons, Inc., 2003 [1]

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-12
SLIDE 12

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions Background

Public-Key Cryptography

For credit card number m, client calculates: c := E(Pbank, m) (4) Client sends c to bank Bank receives c and calculates: m := D(Sbank, c) (5) Equation (3) ensures m is recovered from c ∗

∗N. Ferguson and B. Schneier, Practical Cryptography. New York, NY, USA:

John Wiley & Sons, Inc., 2003 [1]

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-13
SLIDE 13

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions Background

Public-Key Cryptography

For credit card number m, client calculates: c := E(Pbank, m) (4) Client sends c to bank Bank receives c and calculates: m := D(Sbank, c) (5) Equation (3) ensures m is recovered from c ∗

∗N. Ferguson and B. Schneier, Practical Cryptography. New York, NY, USA:

John Wiley & Sons, Inc., 2003 [1]

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-14
SLIDE 14

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions Background

Public-Key Cryptography

For credit card number m, client calculates: c := E(Pbank, m) (4) Client sends c to bank Bank receives c and calculates: m := D(Sbank, c) (5) Equation (3) ensures m is recovered from c ∗

∗N. Ferguson and B. Schneier, Practical Cryptography. New York, NY, USA:

John Wiley & Sons, Inc., 2003 [1]

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-15
SLIDE 15

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions Background

Public-Key Cryptography

For credit card number m, client calculates: c := E(Pbank, m) (4) Client sends c to bank Bank receives c and calculates: m := D(Sbank, c) (5) Equation (3) ensures m is recovered from c ∗

∗N. Ferguson and B. Schneier, Practical Cryptography. New York, NY, USA:

John Wiley & Sons, Inc., 2003 [1]

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-16
SLIDE 16

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions Background

Postal Analogy

Symmetric-Key: Alice buys PadlockAlice and KeyAlice Alice puts the secret message in a box Alice locks the box using PadlockAlice Alice sends the box to Bob Alice gives Bob the KeyAlice through some other channel Bob receives the box Bob unlocks the box using KeyAlice

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-17
SLIDE 17

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions Background

Postal Analogy

Symmetric-Key: Alice buys PadlockAlice and KeyAlice Alice puts the secret message in a box Alice locks the box using PadlockAlice Alice sends the box to Bob Alice gives Bob the KeyAlice through some other channel Bob receives the box Bob unlocks the box using KeyAlice

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-18
SLIDE 18

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions Background

Postal Analogy

Symmetric-Key: Alice buys PadlockAlice and KeyAlice Alice puts the secret message in a box Alice locks the box using PadlockAlice Alice sends the box to Bob Alice gives Bob the KeyAlice through some other channel Bob receives the box Bob unlocks the box using KeyAlice

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-19
SLIDE 19

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions Background

Postal Analogy

Symmetric-Key: Alice buys PadlockAlice and KeyAlice Alice puts the secret message in a box Alice locks the box using PadlockAlice Alice sends the box to Bob Alice gives Bob the KeyAlice through some other channel Bob receives the box Bob unlocks the box using KeyAlice

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-20
SLIDE 20

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions Background

Postal Analogy

Symmetric-Key: Alice buys PadlockAlice and KeyAlice Alice puts the secret message in a box Alice locks the box using PadlockAlice Alice sends the box to Bob Alice gives Bob the KeyAlice through some other channel Bob receives the box Bob unlocks the box using KeyAlice

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-21
SLIDE 21

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions Background

Postal Analogy

Symmetric-Key: Alice buys PadlockAlice and KeyAlice Alice puts the secret message in a box Alice locks the box using PadlockAlice Alice sends the box to Bob Alice gives Bob the KeyAlice through some other channel Bob receives the box Bob unlocks the box using KeyAlice

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-22
SLIDE 22

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions Background

Postal Analogy

Symmetric-Key: Alice buys PadlockAlice and KeyAlice Alice puts the secret message in a box Alice locks the box using PadlockAlice Alice sends the box to Bob Alice gives Bob the KeyAlice through some other channel Bob receives the box Bob unlocks the box using KeyAlice

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-23
SLIDE 23

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions Background

Postal Analogy

Symmetric-Key: Alice buys PadlockAlice and KeyAlice Alice puts the secret message in a box Alice locks the box using PadlockAlice Alice sends the box to Bob Alice gives Bob the KeyAlice through some other channel Bob receives the box Bob unlocks the box using KeyAlice

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-24
SLIDE 24

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions Background

Postal Analogy

Asymmetric-Key: Bob buys PadlockBob and KeyBob Bob sends PadlockBob to Alice Alice puts the secret message in a box Alice locks the box using PadlockBob Alice sends the box to Bob Bob receives the box Bob unlocks the box using KeyBob

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-25
SLIDE 25

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions Background

Postal Analogy

Asymmetric-Key: Bob buys PadlockBob and KeyBob Bob sends PadlockBob to Alice Alice puts the secret message in a box Alice locks the box using PadlockBob Alice sends the box to Bob Bob receives the box Bob unlocks the box using KeyBob

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-26
SLIDE 26

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions Background

Postal Analogy

Asymmetric-Key: Bob buys PadlockBob and KeyBob Bob sends PadlockBob to Alice Alice puts the secret message in a box Alice locks the box using PadlockBob Alice sends the box to Bob Bob receives the box Bob unlocks the box using KeyBob

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-27
SLIDE 27

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions Background

Postal Analogy

Asymmetric-Key: Bob buys PadlockBob and KeyBob Bob sends PadlockBob to Alice Alice puts the secret message in a box Alice locks the box using PadlockBob Alice sends the box to Bob Bob receives the box Bob unlocks the box using KeyBob

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-28
SLIDE 28

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions Background

Postal Analogy

Asymmetric-Key: Bob buys PadlockBob and KeyBob Bob sends PadlockBob to Alice Alice puts the secret message in a box Alice locks the box using PadlockBob Alice sends the box to Bob Bob receives the box Bob unlocks the box using KeyBob

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-29
SLIDE 29

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions Background

Postal Analogy

Asymmetric-Key: Bob buys PadlockBob and KeyBob Bob sends PadlockBob to Alice Alice puts the secret message in a box Alice locks the box using PadlockBob Alice sends the box to Bob Bob receives the box Bob unlocks the box using KeyBob

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-30
SLIDE 30

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions Background

Postal Analogy

Asymmetric-Key: Bob buys PadlockBob and KeyBob Bob sends PadlockBob to Alice Alice puts the secret message in a box Alice locks the box using PadlockBob Alice sends the box to Bob Bob receives the box Bob unlocks the box using KeyBob

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-31
SLIDE 31

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions Background

Postal Analogy

Asymmetric-Key: Bob buys PadlockBob and KeyBob Bob sends PadlockBob to Alice Alice puts the secret message in a box Alice locks the box using PadlockBob Alice sends the box to Bob Bob receives the box Bob unlocks the box using KeyBob

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-32
SLIDE 32

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions Background

Public-Key Cryptography

Sbank is never communicated Single point of failure

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-33
SLIDE 33

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions Background

Public-Key Cryptography

Sbank is never communicated Single point of failure

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-34
SLIDE 34

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions Background

Public-Key Cryptography

Sbank is never communicated Single point of failure

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-35
SLIDE 35

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions Fail Well Systems

The Most Criticial Aspect of any Security Measure †

Not how well it works But how well it fails

I: Secret key can be lost S: Secret key can be compromised

†C. C. Mann, “Homeland insecurity,” The Atlantic Monthly, vol. 290,

  • pp. 81–102, September 2002 [2]

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-36
SLIDE 36

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions Fail Well Systems

The Most Criticial Aspect of any Security Measure †

Not how well it works But how well it fails

I: Secret key can be lost S: Secret key can be compromised

†C. C. Mann, “Homeland insecurity,” The Atlantic Monthly, vol. 290,

  • pp. 81–102, September 2002 [2]

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-37
SLIDE 37

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions Fail Well Systems

The Most Criticial Aspect of any Security Measure †

Not how well it works But how well it fails

I: Secret key can be lost S: Secret key can be compromised

†C. C. Mann, “Homeland insecurity,” The Atlantic Monthly, vol. 290,

  • pp. 81–102, September 2002 [2]

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-38
SLIDE 38

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions Fail Well Systems

The Most Criticial Aspect of any Security Measure †

Not how well it works But how well it fails

I: Secret key can be lost S: Secret key can be compromised

†C. C. Mann, “Homeland insecurity,” The Atlantic Monthly, vol. 290,

  • pp. 81–102, September 2002 [2]

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-39
SLIDE 39

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions Fail Well Systems

The Most Criticial Aspect of any Security Measure †

Not how well it works But how well it fails

I: Secret key can be lost S: Secret key can be compromised

†C. C. Mann, “Homeland insecurity,” The Atlantic Monthly, vol. 290,

  • pp. 81–102, September 2002 [2]

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-40
SLIDE 40

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions The Basic Model

Divergent Goals ‡

Data Integrity

S: Duplication of data among n parties would prevent coalitions of up to n − 1 parties from erasing the secret I: Any of the n parties could disclose the secret to an adversary

Data Secrecy

S: Splitting the data into n pieces would prevent full-disclosure from any single party I: Destruction of any one piece could erase the secret

‡P. S. Gemmell, “An introduction to threshold cryptography,” CryptoBytes,

  • vol. 2, pp. 7–12, Winter 1997 [3]

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-41
SLIDE 41

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions The Basic Model

Divergent Goals ‡

Data Integrity

S: Duplication of data among n parties would prevent coalitions of up to n − 1 parties from erasing the secret I: Any of the n parties could disclose the secret to an adversary

Data Secrecy

S: Splitting the data into n pieces would prevent full-disclosure from any single party I: Destruction of any one piece could erase the secret

‡P. S. Gemmell, “An introduction to threshold cryptography,” CryptoBytes,

  • vol. 2, pp. 7–12, Winter 1997 [3]

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-42
SLIDE 42

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions The Basic Model

Divergent Goals ‡

Data Integrity

S: Duplication of data among n parties would prevent coalitions of up to n − 1 parties from erasing the secret I: Any of the n parties could disclose the secret to an adversary

Data Secrecy

S: Splitting the data into n pieces would prevent full-disclosure from any single party I: Destruction of any one piece could erase the secret

‡P. S. Gemmell, “An introduction to threshold cryptography,” CryptoBytes,

  • vol. 2, pp. 7–12, Winter 1997 [3]

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-43
SLIDE 43

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions The Basic Model

Divergent Goals ‡

Data Integrity

S: Duplication of data among n parties would prevent coalitions of up to n − 1 parties from erasing the secret I: Any of the n parties could disclose the secret to an adversary

Data Secrecy

S: Splitting the data into n pieces would prevent full-disclosure from any single party I: Destruction of any one piece could erase the secret

‡P. S. Gemmell, “An introduction to threshold cryptography,” CryptoBytes,

  • vol. 2, pp. 7–12, Winter 1997 [3]

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-44
SLIDE 44

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions The Basic Model

Divergent Goals ‡

Data Integrity

S: Duplication of data among n parties would prevent coalitions of up to n − 1 parties from erasing the secret I: Any of the n parties could disclose the secret to an adversary

Data Secrecy

S: Splitting the data into n pieces would prevent full-disclosure from any single party I: Destruction of any one piece could erase the secret

‡P. S. Gemmell, “An introduction to threshold cryptography,” CryptoBytes,

  • vol. 2, pp. 7–12, Winter 1997 [3]

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-45
SLIDE 45

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions The Basic Model

Divergent Goals ‡

Data Integrity

S: Duplication of data among n parties would prevent coalitions of up to n − 1 parties from erasing the secret I: Any of the n parties could disclose the secret to an adversary

Data Secrecy

S: Splitting the data into n pieces would prevent full-disclosure from any single party I: Destruction of any one piece could erase the secret

‡P. S. Gemmell, “An introduction to threshold cryptography,” CryptoBytes,

  • vol. 2, pp. 7–12, Winter 1997 [3]

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-46
SLIDE 46

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions The Basic Model

Divergent Goals ‡

Data Integrity

S: Duplication of data among n parties would prevent coalitions of up to n − 1 parties from erasing the secret I: Any of the n parties could disclose the secret to an adversary

Data Secrecy

S: Splitting the data into n pieces would prevent full-disclosure from any single party I: Destruction of any one piece could erase the secret

‡P. S. Gemmell, “An introduction to threshold cryptography,” CryptoBytes,

  • vol. 2, pp. 7–12, Winter 1997 [3]

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-47
SLIDE 47

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions (k, n) Threshold Scheme

Implementation §

Divide D into n pieces D1, ..., Dn in such a way that:

Knowledge of any k or more Di pieces makes D easily computable Knowledge of any k − 1 or fewer Di pieces leaves D completely undetermined

Example: (3, n) threshold scheme for signatures on a check

An unfaithful executive must have at least two accomplices in order to forge a valid signature

§A. Shamir, “How to share a secret,” Communications of the Association for

Computing Machinery, vol. 22, pp. 612–613, Nov. 1979 [4]

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-48
SLIDE 48

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions (k, n) Threshold Scheme

Implementation §

Divide D into n pieces D1, ..., Dn in such a way that:

Knowledge of any k or more Di pieces makes D easily computable Knowledge of any k − 1 or fewer Di pieces leaves D completely undetermined

Example: (3, n) threshold scheme for signatures on a check

An unfaithful executive must have at least two accomplices in order to forge a valid signature

§A. Shamir, “How to share a secret,” Communications of the Association for

Computing Machinery, vol. 22, pp. 612–613, Nov. 1979 [4]

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-49
SLIDE 49

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions (k, n) Threshold Scheme

Implementation §

Divide D into n pieces D1, ..., Dn in such a way that:

Knowledge of any k or more Di pieces makes D easily computable Knowledge of any k − 1 or fewer Di pieces leaves D completely undetermined

Example: (3, n) threshold scheme for signatures on a check

An unfaithful executive must have at least two accomplices in order to forge a valid signature

§A. Shamir, “How to share a secret,” Communications of the Association for

Computing Machinery, vol. 22, pp. 612–613, Nov. 1979 [4]

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-50
SLIDE 50

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions (k, n) Threshold Scheme

Implementation §

Divide D into n pieces D1, ..., Dn in such a way that:

Knowledge of any k or more Di pieces makes D easily computable Knowledge of any k − 1 or fewer Di pieces leaves D completely undetermined

Example: (3, n) threshold scheme for signatures on a check

An unfaithful executive must have at least two accomplices in order to forge a valid signature

§A. Shamir, “How to share a secret,” Communications of the Association for

Computing Machinery, vol. 22, pp. 612–613, Nov. 1979 [4]

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-51
SLIDE 51

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions (k, n) Threshold Scheme

Implementation §

Divide D into n pieces D1, ..., Dn in such a way that:

Knowledge of any k or more Di pieces makes D easily computable Knowledge of any k − 1 or fewer Di pieces leaves D completely undetermined

Example: (3, n) threshold scheme for signatures on a check

An unfaithful executive must have at least two accomplices in order to forge a valid signature

§A. Shamir, “How to share a secret,” Communications of the Association for

Computing Machinery, vol. 22, pp. 612–613, Nov. 1979 [4]

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-52
SLIDE 52

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions (k, n) Threshold Scheme

Implementation §

Divide D into n pieces D1, ..., Dn in such a way that:

Knowledge of any k or more Di pieces makes D easily computable Knowledge of any k − 1 or fewer Di pieces leaves D completely undetermined

Example: (3, n) threshold scheme for signatures on a check

An unfaithful executive must have at least two accomplices in order to forge a valid signature

§A. Shamir, “How to share a secret,” Communications of the Association for

Computing Machinery, vol. 22, pp. 612–613, Nov. 1979 [4]

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-53
SLIDE 53

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions (k, n) Threshold Scheme

Previous Solutions

Data Integrity

S: Duplication of data among n parties would prevent coalitions of up to n − 1 parties from erasing the secret T V: (1, n)

Data Secrecy

S: Splitting the data into n pieces would prevent full-disclosure from any single party T V: (n, n)

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-54
SLIDE 54

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions (k, n) Threshold Scheme

Previous Solutions

Data Integrity

S: Duplication of data among n parties would prevent coalitions of up to n − 1 parties from erasing the secret T V: (1, n)

Data Secrecy

S: Splitting the data into n pieces would prevent full-disclosure from any single party T V: (n, n)

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-55
SLIDE 55

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions (k, n) Threshold Scheme

Previous Solutions

Data Integrity

S: Duplication of data among n parties would prevent coalitions of up to n − 1 parties from erasing the secret T V: (1, n)

Data Secrecy

S: Splitting the data into n pieces would prevent full-disclosure from any single party T V: (n, n)

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-56
SLIDE 56

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions (k, n) Threshold Scheme

Previous Solutions

Data Integrity

S: Duplication of data among n parties would prevent coalitions of up to n − 1 parties from erasing the secret T V: (1, n)

Data Secrecy

S: Splitting the data into n pieces would prevent full-disclosure from any single party T V: (n, n)

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-57
SLIDE 57

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions (k, n) Threshold Scheme

Previous Solutions

Data Integrity

S: Duplication of data among n parties would prevent coalitions of up to n − 1 parties from erasing the secret T V: (1, n)

Data Secrecy

S: Splitting the data into n pieces would prevent full-disclosure from any single party T V: (n, n)

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-58
SLIDE 58

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions (k, n) Threshold Scheme

Previous Solutions

Data Integrity

S: Duplication of data among n parties would prevent coalitions of up to n − 1 parties from erasing the secret T V: (1, n)

Data Secrecy

S: Splitting the data into n pieces would prevent full-disclosure from any single party T V: (n, n)

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-59
SLIDE 59

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions (k, n) Threshold Scheme

Previous Solutions

Data Integrity

S: Duplication of data among n parties would prevent coalitions of up to n − 1 parties from erasing the secret T V: (1, n)

Data Secrecy

S: Splitting the data into n pieces would prevent full-disclosure from any single party T V: (n, n)

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-60
SLIDE 60

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions (k, n) Threshold Scheme

Implementation

By properly choosing k and n parameters we can give: Any sufficiently large majority (k) the authority to do some action Any sufficiently large minority (n − k + 1) the power to block it

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-61
SLIDE 61

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions (k, n) Threshold Scheme

Implementation

By properly choosing k and n parameters we can give: Any sufficiently large majority (k) the authority to do some action Any sufficiently large minority (n − k + 1) the power to block it

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-62
SLIDE 62

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions (k, n) Threshold Scheme

Implementation

By properly choosing k and n parameters we can give: Any sufficiently large majority (k) the authority to do some action Any sufficiently large minority (n − k + 1) the power to block it

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-63
SLIDE 63

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions (k, n) Threshold Scheme

Advantages

By using a (k, n) threshold scheme with n = 2k − 1: We can recover the original key even when [n

2 ] = k − 1 of

the n pieces are destroyed. Opponents cannot reconstruct the key even when a security breach exposes [n

2 ] = k − 1 of the remaining k

pieces.

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-64
SLIDE 64

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions (k, n) Threshold Scheme

Advantages

By using a (k, n) threshold scheme with n = 2k − 1: We can recover the original key even when [n

2 ] = k − 1 of

the n pieces are destroyed. Opponents cannot reconstruct the key even when a security breach exposes [n

2 ] = k − 1 of the remaining k

pieces.

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-65
SLIDE 65

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions (k, n) Threshold Scheme

Advantages

By using a (k, n) threshold scheme with n = 2k − 1: We can recover the original key even when [n

2 ] = k − 1 of

the n pieces are destroyed. Opponents cannot reconstruct the key even when a security breach exposes [n

2 ] = k − 1 of the remaining k

pieces.

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-66
SLIDE 66

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions (k, n) Threshold Scheme

Disadvantages

Inconvenience: (1, 9) is convenient but easy to misuse (5, 9) is safe but inconvenient

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-67
SLIDE 67

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions (k, n) Threshold Scheme

Disadvantages

Inconvenience: (1, 9) is convenient but easy to misuse (5, 9) is safe but inconvenient

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-68
SLIDE 68

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions (k, n) Threshold Scheme

Disadvantages

Inconvenience: (1, 9) is convenient but easy to misuse (5, 9) is safe but inconvenient

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-69
SLIDE 69

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions Statement

Threshold Cryptography Software

Create software for implementing a (k, n) threshold scheme in cryptographic aspects of a Certificate Authority and Web Server

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-70
SLIDE 70

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions Statement

Threshold Cryptography Software

Create software for implementing a (k, n) threshold scheme in cryptographic aspects of a Certificate Authority and Web Server

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-71
SLIDE 71

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions Approaches

Single-Secret Sharing

LaGrange Interpolation [4] Intersecting Hyperplanes ¶ Combinations of Families and Committees

¶G. R. Blakley, “Safeguarding cryptographic keys,” in 1979 National

Computer Conference: June 4–7, 1979, New York, New York (R. E. Merwin, J. T. Zanca, and M. Smith, eds.), vol. 48 of AFIPS Conference proceedings, (Montvale, NJ, USA), pp. 313–317, AFIPS Press, 1979 [5]

  • N. Alon, Z. Galil, and M. Yung, “Dynamic re-sharing verifiable secret

sharing against a mobile adversary,” in Algorithms — ESA ’95: Third Annual European Symposium, Corfu, Greece, September 25–27, 1995: proceedings (P. G. Spirakis, ed.), vol. 979 of Lecture Notes in Computer Science, (Berlin, Germany / Heidelberg, Germany / London, UK / etc.), pp. 523–537, Springer-Verlag, 1995 [6]

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-72
SLIDE 72

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions Approaches

Single-Secret Sharing

LaGrange Interpolation [4] Intersecting Hyperplanes ¶ Combinations of Families and Committees

¶G. R. Blakley, “Safeguarding cryptographic keys,” in 1979 National

Computer Conference: June 4–7, 1979, New York, New York (R. E. Merwin, J. T. Zanca, and M. Smith, eds.), vol. 48 of AFIPS Conference proceedings, (Montvale, NJ, USA), pp. 313–317, AFIPS Press, 1979 [5]

  • N. Alon, Z. Galil, and M. Yung, “Dynamic re-sharing verifiable secret

sharing against a mobile adversary,” in Algorithms — ESA ’95: Third Annual European Symposium, Corfu, Greece, September 25–27, 1995: proceedings (P. G. Spirakis, ed.), vol. 979 of Lecture Notes in Computer Science, (Berlin, Germany / Heidelberg, Germany / London, UK / etc.), pp. 523–537, Springer-Verlag, 1995 [6]

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-73
SLIDE 73

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions Approaches

Single-Secret Sharing

LaGrange Interpolation [4] Intersecting Hyperplanes ¶ Combinations of Families and Committees

¶G. R. Blakley, “Safeguarding cryptographic keys,” in 1979 National

Computer Conference: June 4–7, 1979, New York, New York (R. E. Merwin, J. T. Zanca, and M. Smith, eds.), vol. 48 of AFIPS Conference proceedings, (Montvale, NJ, USA), pp. 313–317, AFIPS Press, 1979 [5]

  • N. Alon, Z. Galil, and M. Yung, “Dynamic re-sharing verifiable secret

sharing against a mobile adversary,” in Algorithms — ESA ’95: Third Annual European Symposium, Corfu, Greece, September 25–27, 1995: proceedings (P. G. Spirakis, ed.), vol. 979 of Lecture Notes in Computer Science, (Berlin, Germany / Heidelberg, Germany / London, UK / etc.), pp. 523–537, Springer-Verlag, 1995 [6]

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-74
SLIDE 74

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions Approaches

Single-Secret Sharing

LaGrange Interpolation [4] Intersecting Hyperplanes ¶ Combinations of Families and Committees

¶G. R. Blakley, “Safeguarding cryptographic keys,” in 1979 National

Computer Conference: June 4–7, 1979, New York, New York (R. E. Merwin, J. T. Zanca, and M. Smith, eds.), vol. 48 of AFIPS Conference proceedings, (Montvale, NJ, USA), pp. 313–317, AFIPS Press, 1979 [5]

  • N. Alon, Z. Galil, and M. Yung, “Dynamic re-sharing verifiable secret

sharing against a mobile adversary,” in Algorithms — ESA ’95: Third Annual European Symposium, Corfu, Greece, September 25–27, 1995: proceedings (P. G. Spirakis, ed.), vol. 979 of Lecture Notes in Computer Science, (Berlin, Germany / Heidelberg, Germany / London, UK / etc.), pp. 523–537, Springer-Verlag, 1995 [6]

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-75
SLIDE 75

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions Approaches

Cryptographic Function Sharing

Any k shareholders should be able to collectively compute f. Even after taking part in the computation of f on some inputs, no set of upto k − 1 shareholders should be able to compute f on other inputs [3].

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-76
SLIDE 76

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions Approaches

Cryptographic Function Sharing

Any k shareholders should be able to collectively compute f. Even after taking part in the computation of f on some inputs, no set of upto k − 1 shareholders should be able to compute f on other inputs [3].

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-77
SLIDE 77

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions Approaches

Cryptographic Function Sharing

Any k shareholders should be able to collectively compute f. Even after taking part in the computation of f on some inputs, no set of upto k − 1 shareholders should be able to compute f on other inputs [3].

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-78
SLIDE 78

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions Implementation

RSA Sharing Protocols

  • A. De Santis, Y. Desmedt, Y. Frankel, and M. Yung, “How

to share a function securely,” in Proceedings of the twenty-sixth annual ACM Symposium on the Theory of Computing: Montr´ eal, Qu´ ebec, Canada, May 23–25, 1994 (ACM, ed.), (New York, NY 10036, USA), pp. 522–533, ACM Press, 1994. ACM order no. 508930 [7]

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-79
SLIDE 79

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions Implementation

RSA Sharing Protocols

  • R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin, “Robust

and efficient sharing of RSA functions,” in Advances in cryptology, CRYPTO ’96: 16th annual international cryptology conference, Santa Barbara, California, USA, August 18–22, 1996: proceedings (N. Koblitz, ed.), vol. 1109 of Lecture Notes in Computer Science, (Berlin, Germany / Heidelberg, Germany / London, UK / etc.), pp. 157–172, Springer-Verlag, 1996. Sponsored by the International Association for Cryptologic Research (IACR), in cooperation with the IEEE Computer Society Technical Committee on Security and Privacy and the Computer Science Department of the University of California at Santa Barbara (UCSB) [8]

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-80
SLIDE 80

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions

Deliverables

ITTC Daemon Interface Library (libittc.so) OpenSSL Modifications lighttpd Modifications A production-ready combination of function sharing threshold cryptographic Certificate Authority and Web Server

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-81
SLIDE 81

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions

Deliverables

ITTC Daemon Interface Library (libittc.so) OpenSSL Modifications lighttpd Modifications A production-ready combination of function sharing threshold cryptographic Certificate Authority and Web Server

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-82
SLIDE 82

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions

Deliverables

ITTC Daemon Interface Library (libittc.so) OpenSSL Modifications lighttpd Modifications A production-ready combination of function sharing threshold cryptographic Certificate Authority and Web Server

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-83
SLIDE 83

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions

Deliverables

ITTC Daemon Interface Library (libittc.so) OpenSSL Modifications lighttpd Modifications A production-ready combination of function sharing threshold cryptographic Certificate Authority and Web Server

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-84
SLIDE 84

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions

Deliverables

ITTC Daemon Interface Library (libittc.so) OpenSSL Modifications lighttpd Modifications A production-ready combination of function sharing threshold cryptographic Certificate Authority and Web Server

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-85
SLIDE 85

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions

Deliverables

ITTC Daemon Interface Library (libittc.so) OpenSSL Modifications lighttpd Modifications A production-ready combination of function sharing threshold cryptographic Certificate Authority and Web Server

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-86
SLIDE 86

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions

Wu, Malkin and Boneh’s Implementation ∗∗

SSLeay Modifications Apache Modifications

∗∗T. Wu, M. Malkin, and D. Boneh, “Building intrusion tolerant

applications,” in Proceedings of the 8th conference on USENIX Security Symposium, (Berkeley, CA, USA), pp. 7–7, USENIX Association, 1999 [9]

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-87
SLIDE 87

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions

Wu, Malkin and Boneh’s Implementation ∗∗

SSLeay Modifications Apache Modifications

∗∗T. Wu, M. Malkin, and D. Boneh, “Building intrusion tolerant

applications,” in Proceedings of the 8th conference on USENIX Security Symposium, (Berkeley, CA, USA), pp. 7–7, USENIX Association, 1999 [9]

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-88
SLIDE 88

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions

Wu, Malkin and Boneh’s Implementation ∗∗

SSLeay Modifications Apache Modifications

∗∗T. Wu, M. Malkin, and D. Boneh, “Building intrusion tolerant

applications,” in Proceedings of the 8th conference on USENIX Security Symposium, (Berkeley, CA, USA), pp. 7–7, USENIX Association, 1999 [9]

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-89
SLIDE 89

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions

Bibliography I

[1] N. Ferguson and B. Schneier, Practical Cryptography. New York, NY, USA: John Wiley & Sons, Inc., 2003. [2] C. C. Mann, “Homeland insecurity,” The Atlantic Monthly,

  • vol. 290, pp. 81–102, September 2002.

[3] P. S. Gemmell, “An introduction to threshold cryptography,” CryptoBytes, vol. 2, pp. 7–12, Winter 1997. [4] A. Shamir, “How to share a secret,” Communications of the Association for Computing Machinery, vol. 22, pp. 612–613,

  • Nov. 1979.

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-90
SLIDE 90

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions

Bibliography II

[5] G. R. Blakley, “Safeguarding cryptographic keys,” in 1979 National Computer Conference: June 4–7, 1979, New York, New York (R. E. Merwin, J. T. Zanca, and M. Smith, eds.), vol. 48

  • f AFIPS Conference proceedings, (Montvale, NJ, USA),
  • pp. 313–317, AFIPS Press, 1979.

[6] N. Alon, Z. Galil, and M. Yung, “Dynamic re-sharing verifiable secret sharing against a mobile adversary,” in Algorithms — ESA ’95: Third Annual European Symposium, Corfu, Greece, September 25–27, 1995: proceedings (P. G. Spirakis, ed.), vol. 979 of Lecture Notes in Computer Science, (Berlin, Germany / Heidelberg, Germany / London, UK / etc.), pp. 523–537, Springer-Verlag, 1995.

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-91
SLIDE 91

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions

Bibliography III

[7] A. De Santis, Y. Desmedt, Y. Frankel, and M. Yung, “How to share a function securely,” in Proceedings of the twenty-sixth annual ACM Symposium on the Theory of Computing: Montr´ eal, Qu´ ebec, Canada, May 23–25, 1994 (ACM, ed.), (New York, NY 10036, USA), pp. 522–533, ACM Press, 1994. ACM order no. 508930. [8] R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin, “Robust and efficient sharing of RSA functions,” in Advances in cryptology, CRYPTO ’96: 16th annual international cryptology conference, Santa Barbara, California, USA, August 18–22, 1996: proceedings (N. Koblitz, ed.), vol. 1109 of Lecture Notes in Computer Science, (Berlin, Germany / Heidelberg,

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-92
SLIDE 92

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions

Bibliography IV

Germany / London, UK / etc.), pp. 157–172, Springer-Verlag,

  • 1996. Sponsored by the International Association for

Cryptologic Research (IACR), in cooperation with the IEEE Computer Society Technical Committee on Security and Privacy and the Computer Science Department of the University of California at Santa Barbara (UCSB). [9] T. Wu, M. Malkin, and D. Boneh, “Building intrusion tolerant applications,” in Proceedings of the 8th conference on USENIX Security Symposium, (Berkeley, CA, USA), pp. 7–7, USENIX Association, 1999.

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System

slide-93
SLIDE 93

Outline Problem Statement Proposed Solution Project Goals Deliverables Related Work References Questions

Questions

Questions are never indiscreet: answers sometimes are. (Oscar Wilde)

Kamran Riaz Khan <krkhan@inspirated.com> An Intrusion Tolerant Threshold Cryptographic System