Title: Cybersecurity Remote Education Access Toolkits CREAT
1Cyber-security Remote Education Access Toolkits
(CREAT)
- Real-Time System Lab
- Department of Computer Science
- Texas AM university
- August, 2008
2Overview
- An educational tool for learning classic and
modern cryptographic tools - Remote registration and coordination of
crypto-protocol executions for users from
different affiliations - Demonstration of crypto-protocols with source
code displayed and explained step by step - Easy programming practice with pre-defined
questions/blanks
3Major Components
- User-Interface for Remote Control and
Coordination - Cryptography Modules
4User-Interface for Remote Control and Coordination
- Overview of User-Interface
- CREAT Server
- CREAT Client
- Matching Database
5Overview of User-Interface
6CREAT Server
- CREAT server plays a role as the clearance house
to match users for chatting and exercise of the
security protocols. It provides three
functionalities - Authentication
- Registration
- Group Matching
7CREAT Client
- CREAT client provides users an communication tool
to send and receive message
8Matching Database
- The MySQL database stores all information of
users and provides a matching function between
suitable users
9Cryptography Modules
- Introduction
- Software Stack
- Main Menus
- Implemented Modules
- Primitives
- Classic Protocols
- Advanced Crypto-Protocols
- Demo
10Software Stack
Chat
E-Cash system
Blind Signature
Secret Sharing
Zero Knowledge Proof
Secret Handshake
RSA
ECC
Key Exchange Protocol
Secure Hash Function
Greatest Common Divisor (GCD)
Chinese Remainder Theory (CRT)
Random Number Generation
Prime Number Test
Factorization
Big Integer Tutorial
Caesar Cipher
Vigenere Cipher
C Tutorial
11Main Menus
- Advanced crypto-protocols
12Number Theory Primitives
- (1)GCD
- (2)CRT
- (3)Facatorization
- (4)Prime number test
- (5)Random Number generation
- (6) Secure Hash Function
13Primitives - GCD
- Use Euclidean algorithm to compute a greatest
common divisor.
14Primitives - CRT
- CRT uses extended Euclidean algorithm to
calculate results.
15Primitives - Factorization
16Primitives Prime Test
17Primitives Random Number Generator
- X9.17 pseudorandom generation.
18Primitives Secure Hash Function
19Classic Protocols
- Symmetric Protocols
- Caesar Cipher
- Vigenere cipher
- Asymmetric Protocols
- RSA
- Key Exchange
- ECC
20Caesar Cipher
21Vigenere Cipher
22RSA(key generation, encryption and decryption)
Show source code
Key generation
Public key
Private key
Encryption
Decryption
23Diffie-Hellman Key Exchange
Shared Key
24 Elliptic Curve encryption (ECC)(Point addition
and multiplication)
Point doubling
Point addition
Point multiplication
25Advanced Crypto-Protocols
- Secret Handshaking scheme
- Blind signature scheme
- Zero Knowledge Authentication
26Secret Handshaking(Pairing based scheme)
Membership Credential
Non-Membership Credential
Verification result
27Blind Signature(Chaums scheme)
Original message
Verification
28Zero Knowledge Proof(Fiat-Shamirs scheme)
Alice proves knowledge (s) to Bob
Verification
29Demonstrations
- E-Cash System
- Secure Chat
30 E-Cash System(Fugersons scheme)
- Environment
- Key generation
- Token withdrawal
- Delegation (from grantor to grantee)
- Double spending Detection
31Environment
I. Get Public Keys Public Information II.
Withdraw Token
Delegation
Deposit
CA
Double Spending Identification (9)
(7)
(6)
(1)
(1)
(1)
(1)
(1)
(4)
(3)
(2)
(5)
Initiator
32Key generation
Certificate Administrator (CA) Generate and
display keys and public information
33Token Withdrawal
Host after withdrawing a token
Intermediate computed information
34Delegation
Grantee (Ui1) after delegation
35Double Spending Detection
CA receives the deposits from clients and detects
double spending.
The one (ID99) spent its token twice.
36Demo Secure Chat
- Registration users register in CREAT Chatting
Program - Communication users talk to each other via
encrypted messages - Matching find a person having the same interests
through CREAT
37Secure Chat - Registration
Server Side
Registration Request
Client Side
38Registration Operation
Register Form The register form allow users
connect to server, register interesting and
personal information to server
39CREAT Database Client Table
40Secure Chat Communication
Message
41Client Chatting Operation
- The users can also talk to server via selected
server IP address and send message to server site.
42Secure Chat Matching Operation
- Users are free to talk to anyone has similar
interesting.
43CREAT Database Client Interest Table
44CREAT Database Client Matching Table