Cryptographic Techniques for Physical Security (seminar Notes) Cryptographic Techniques for Physical Security (seminar Notes)

نویسنده

  • Daniel A. Nagy
چکیده

Preface The goal of this course is to familiarize participating students with the most important cryptographic techniques and design principles in the context of RFID (Radio Frequency IDentification) security. Unlike most courses and texts on cryptography, our primary focus is not the most traditional application of cryptography — enciphering of (possibly very large) textual messages. Instead, we will study in detail several aspects of authentication, identification and authorization. In such applications, we will be typically dealing with short messages in low quantities. Instead of the usual long-distance point-to-point communication channel model, we will often assume short-distance broadcasts. Another important distinguishing feature of the security systems we will be studying is the fact that the computational resources of certain elements are severely constrained. Nevertheless, most principles and techniques studied in this course have applications far beyond RFID and are generally applicable in security system design. The language of course notes is English, as most of the literature on cryptography and information security is available in this language and it is important that students of this subject become familiar with English terminology. 2 1 Introduction to Security " Many counting rods is victorious over few counting rods, How much more so over no counting rods. " — Sun Tzu: Ping Fa (" The Art of War " , Denma Translation) 1.1 What is Security Engineering? Security considerations always arise in the context of conflicting interests. Specifically, when there is a possibility (or threat) of such an action (called attack) that is beneficial for the initiating party, the attacker, but harmful to some other party, the victim. While reasoning about security, we often assume the point of view of the potential victim, referring to potential attackers as adversaries. Yet, it is very important to keep in mind that the interests of providers and consumers of security are not perfectly aligned either. We are primarily concerned with rational adversaries (in the economic sense), who attack if they prefer the gains from the attack to the cost of performing the attack. While these are often difficult to quantify, using the usual micro-economic axioms about preferences, it is always possible to assign a scalar utility function to these gains and costs (see Debreu's Lemma in the supplement). In practice, we usually express them in terms of monetary value. The matter is further complicated by the fact that we can only guess the preferences of the adversaries …

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Comparison between Different Meta-Heuristic Techniques in Power Allocation for Physical Layer Security

Node cooperation can protect wireless networks from eavesdropping by using the physical characteristics of wireless channels rather than cryptographic methods. Allocating the proper amount of power to cooperative nodes is a challenging task. In this paper, we use three cooperative nodes, one as relay to increase throughput at the destination and two friendly jammers to degrade eavesdropper&rsqu...

متن کامل

Privacy-oriented Cryptography 1 Executive Summary Creative Commons By-nc-nd 3.0 Unported License

This report documents the program of the Dagstuhl Seminar 12381 “Privacy-Oriented Cryptography”, which took place at Schloss Dagstuhl in September 16-21, 2012. Being the first Dagstuhl seminar that explicitly aimed to combine cryptography and privacy research communities, it attracted a high number of participants, many of whom were new to Dagstuhl. In total, the seminar was attended by 39 inte...

متن کامل

Design of cybernetic metamodel of cryptographic algorithms and ranking of its supporting components using ELECTRE III method

Nowadays, achieving desirable and stable security in networks with national and organizational scope and even in sensitive information systems, should be based on a systematic and comprehensive method and should be done step by step. Cryptography is the most important mechanism for securing information. a cryptographic system consists of three main components: cryptographic algorithms, cryptogr...

متن کامل

Cryptographic Voting - A Gentle Introduction

These lecture notes survey some of the main ideas and techniques used in cryptographic voting systems. The write-up is geared towards readers with little knowledge of cryptography and it focuses on the broad principles that guide the design and analysis of cryptographic systems, especially the need for properly designed security models. We use a system proposed by Fujioka, Okamoto and Ohta as s...

متن کامل

Real-or-random Key Secrecy of the Otway-Rees Protocol via a Symbolic Security Proof

We present the first cryptographically sound security proof of the well-known Otway-Rees protocol. More precisely, we show that the protocol is secure against arbitrary active attacks including concurrent protocol runs if it is implemented using provably secure cryptographic primitives. We prove secrecy of the exchanged keys with respect to the accepted cryptographic definition of real-or-rando...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007