KHAP: Using Keyed Hard AI Problems to Secure Human Interfaces

ثبت نشده
چکیده

Suppose Alice is a on a trip to a computer security conference. Her coworker, Bob, stays behind to watch over their cubicles. Suddenly, Alice remembers that she forgot to send an important memo to Bob. No problem, she thinks – there are computers available at the conference, and she can just fire off an email to Bob. Because it’s so important, Alice is going to want to sign the memo. Because Alice always carries a smartcard that has her private key, she can sign the memo. She sits down at a conference computer, plugs her smartcard into the computer’s reader, and types out the memo. She presses the send button, and the memo is sent to her card for signing; the signature comes back to the computer and is emailed with the memo to Bob. Or is it? What did the smartcard really sign? How does Alice know it’s the same thing that was on her screen? How does Alice even know if anything was sent to her card? When humans interact with computing systems, the human often wants to know that data has reached the intended system, and that it has not been modified in transit. Traditionally, this issue has been dealt with by making one of two assumptions: 1. there is a direct channel between the human and the system; the human identifies the system by its ability to transmit on the channel, and it is assumed that an attacker is not able to tamper with data on the channel. Examples include Automated Teller Machines (ATM) and programs running locally on Personal Computers (PCs). 2. the human has a direct channel to a computing platform that he trusts at least as much as the destination system. This trusted platform communicates with the destination system over an untrusted channel; it uses cryptography to verify the system’s identity and the integrity of the data. An example is using a PC to browse a web page through an encrypted tunnel[10]. In our example, Alice assumed that she had a direct, secure link to her smartcard. In reality, she was trusting the computer she was sitting at to accurately relay the information. If the computer was acting maliciously, it could easily have displayed one memo on screen and sent another to the smartcard to be signed; Alice has no way of directly communicating with the smartcard. There are many cases where a computing system is not accessible by a direct, trusted link. The system may be physically located far away. It may be incapable of direct interaction, as with a typical smartcard. Likewise, the assumption that an intermediate platform can be trusted is often false. The platform may be a public

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Molecular dynamics simulation of a binary mixture lubricant for use in hard disk interfaces

In Hard Disk Drives (HDD), it is necessary to decrease the Flying Height (FH) between the head and the disk (currently, FH is around 3-5 nm) so as to increase recording densities. Retaining the solid lubricant has become a difficult proposition owing to intermittent contact between the surfaces. ZTMD and Z are used as solid lubricant to lubricate these interfaces. In this paper, the behavior of...

متن کامل

AI-Complete, AI-Hard, or AI-Easy - Classification of Problems in AI

The paper contributes to the development of the theory of AI-Completeness by formalizing the notion of AIComplete and AI-Hard problems. The intended goal is to provide a classification of problems in the field of General Artificial Intelligence. We prove Turing Test to be an instance of an AI-Complete problem and further show numerous AI problems to be AI-Complete or AI-Hard via polynomial time...

متن کامل

Neither Here nor There: Inference Research Bridges the Gaps between Cognitive Science and AI

Cognitive Science (CogSci) and AI are addressed from the perspective of inductive inference research, specifically as applied to language learning. Language so represents intelligence that results bridge gaps between the fields. We give examples of rigorous results intractable for AI machines and humans; AI results humans find satisfactory; and AI-Hard problems with “good enough” solutions, ada...

متن کامل

Enhanced secure key exchange systems based on the Johnson-noise scheme

We introduce seven new versions of the Kirchhoff-Law-Johnson-(like)-Noise (KLJN) classical physical secure key exchange scheme. While these practical improvements offer progressively enhanced security and/or speed for the non-ideal conditions, the fundamental physical laws providing the security remain the same. In the "intelligent" KLJN (iKLJN) scheme, Alice and Bob utilize the fact that they ...

متن کامل

Molecular dynamics simulation of a binary mixture lubricant for use in hard disk interfaces

In Hard Disk Drives (HDD), it is necessary to decrease the Flying Height (FH) between the head and the disk (currently, FH is around 3-5 nm) so as to increase recording densities. Retaining the solid lubricant has become a difficult proposition owing to intermittent contact between the surfaces. ZTMD and Z are used as solid lubricant to lubricate these interfaces. In this paper, the behavior of...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003