pr protocol design challeng l design challenge zebranet
play

Pr Protocol Design Challeng l Design Challenge Zebranet Monitor - PowerPoint PPT Presentation

Pr Protocol Design Challeng l Design Challenge Zebranet Monitor zebras: Vitals Loca2on Movement pa6erns Challenges: Large living area Ba6ery has to last long 2me Zebranet Z2Z DATA DATA DATA Z2R A5acker(s) Collar


  1. Pr Protocol Design Challeng l Design Challenge

  2. Zebranet Monitor zebras: • Vitals • Loca2on • Movement pa6erns Challenges: • Large living area • Ba6ery has to last long 2me

  3. Zebranet Z2Z DATA DATA DATA Z2R

  4. A5acker(s)

  5. Collar • Stores the zebra’s own data (1 KB each 15 minutes) of the last month • Can store last month’s data of 99 other zebras (will overwrite the oldest data)

  6. Some possible a5ack vector Hunter shoots a zebra and opens up the collar: • Gets all data stored on the collar including cryptographic keys Hunter pushes false data to collar to mislead the rangers

  7. Challenge • Assump2ons • A6acker model/what should the protocols protect against • Z2Z protocol • Z2R protocol • Mo2vate your design choices

  8. Bonus points APer the ranger has read out the collar of a zebra, the data on it are no longer relevant and hence wiped from the collar. Bonus: extend the Z2R protocol to authorize this wipe Bonus: a protocol to propagate the removal of these data to other zebras.

  9. Bonus points (2) Bonus: Draw the nicest zebra.

  10. Bonus points (3) Bonus: if you manage to incorporate a digital encoding of the zebra’s pa6ern.

  11. Rules • Teams up to 3 people (maybe team up with someone from another university) • Handwri6en, please do an effort to ensure readability J • Maximum 2 pages (4 sides) A4 (+1 if going for one of the bonuses) • Give some intui2on, no excessive formalism • S2ck with the nota2on on the next slide and introduce any addi2onal nota2on

  12. NotaCon Subscipt zebra: i,j,k,l … subscript ranger: r Symmetric key: K_i Private key: priv_i public key: Pub_i Message to encrypt/authen2cate/sign/… : M Encryp2on: C = E(K, M) or E(Pub,M) Decryp2on: D(K,C) or D(priv,C) Authen2cated encryp2on: AC = AE(K,M) and AD(K,AC) Hash: H(M) Key deriva2on func2on: KDF(M) MAC: MAC(K,M) Signature: S = SIGN(priv,M) and VER(Pub,S) Ellip2c curves: A = aP with P the generator aB = bA = abP A+B = (a+b)P

  13. Next steps • Form teams and sit together • We are here for addi2onal general ques2ons • Deadline: Thursday 18:59:59 (before the dinner) • Feedback + prizes: Friday • Write down your names together with a RANDOM 6 digit number (one for each name)

  14. And the winners are … 3e64f08887e11b69cea5ee29e7bf8c1 5944b04cd86b08c401eb4c299d60e7 919ad1b8ada945e754e82f34ceb839 a3232374a4f4fd78c7422b70afdcc73 9a776f

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend