Lukas Ruf, TIK April 6th 2000 1 WP3 Presentation, ETH WP 3 -- Security Technology And Multimedia...

15
1 WP3 Presentation, ETH Lukas Ruf, TIK April 6th 2000 WP 3 -- Security Technology And Multimedia Delivery Computer Engineering and Networks Laboratory, ETH Zurich Lukas Ruf

Transcript of Lukas Ruf, TIK April 6th 2000 1 WP3 Presentation, ETH WP 3 -- Security Technology And Multimedia...

Page 1: Lukas Ruf, TIK April 6th 2000 1 WP3 Presentation, ETH WP 3 -- Security Technology And Multimedia Delivery Computer Engineering and Networks Laboratory,

1WP3 Presentation, ETH

Lukas Ruf, TIK April 6th 2000

WP 3 -- Security Technology And Multimedia Delivery

Computer Engineering and Networks Laboratory, ETH Zurich

Lukas Ruf

Page 2: Lukas Ruf, TIK April 6th 2000 1 WP3 Presentation, ETH WP 3 -- Security Technology And Multimedia Delivery Computer Engineering and Networks Laboratory,

2WP3 Presentation, ETH

Lukas Ruf, TIK April 6th 2000

Security Aspects

• Intellectual Property Rights

• Value of Information

• Authentication And Key Exchange

• Data Administration: Security & Protection

• Data Delivery

Page 3: Lukas Ruf, TIK April 6th 2000 1 WP3 Presentation, ETH WP 3 -- Security Technology And Multimedia Delivery Computer Engineering and Networks Laboratory,

3WP3 Presentation, ETH

Lukas Ruf, TIK April 6th 2000

Value of Informationvalue

time

value of

information

value of

information

time

value

value of

information

time

value

value of

information

time

value

Definition of applied security.

Page 4: Lukas Ruf, TIK April 6th 2000 1 WP3 Presentation, ETH WP 3 -- Security Technology And Multimedia Delivery Computer Engineering and Networks Laboratory,

4WP3 Presentation, ETH

Lukas Ruf, TIK April 6th 2000

Authentication And Key Exchange

• Symmetric Encryption– Kerberos 5, IETF Standard, arbitrated protocol

(trusted keyserver)

• Asymmetric Encryption– DASS, DEC, arbitrated protocol with public

keys of users.

Page 5: Lukas Ruf, TIK April 6th 2000 1 WP3 Presentation, ETH WP 3 -- Security Technology And Multimedia Delivery Computer Engineering and Networks Laboratory,

5WP3 Presentation, ETH

Lukas Ruf, TIK April 6th 2000

Data Administration: Security & Protection

• Administration– per university in a decentralized platform– per project in a centralized platform

• Data Protection– user data: privacy, small amount of data, high

security-level strong encryption (IDEA)– lecture data: public but w. IPR, huge amount of

data, low security-level weak encryption (DES)

Page 6: Lukas Ruf, TIK April 6th 2000 1 WP3 Presentation, ETH WP 3 -- Security Technology And Multimedia Delivery Computer Engineering and Networks Laboratory,

6WP3 Presentation, ETH

Lukas Ruf, TIK April 6th 2000

Data Delivery

• Secured network infrastructure– network-access restrictions

• inter-university intra-university

• Insecure network (e.g. Internet)– user authentication and validation

Page 7: Lukas Ruf, TIK April 6th 2000 1 WP3 Presentation, ETH WP 3 -- Security Technology And Multimedia Delivery Computer Engineering and Networks Laboratory,

7WP3 Presentation, ETH

Lukas Ruf, TIK April 6th 2000

Data Delivery -- Encryption

• multimedia data encryption– partial encryption protocol dependency, high

speed.– full encryption protocol independency, low

speed

Which is the encrypting Layer ?

Page 8: Lukas Ruf, TIK April 6th 2000 1 WP3 Presentation, ETH WP 3 -- Security Technology And Multimedia Delivery Computer Engineering and Networks Laboratory,

8WP3 Presentation, ETH

Lukas Ruf, TIK April 6th 2000

Cryptography in Universal

• Temporary valid session keys for symmetrical encryption based on an asymmetrical encryption keys.

• Hierarchical authentication scheme:– ISO: X.509– Kerberos v. 5– PGP

Page 9: Lukas Ruf, TIK April 6th 2000 1 WP3 Presentation, ETH WP 3 -- Security Technology And Multimedia Delivery Computer Engineering and Networks Laboratory,

9WP3 Presentation, ETH

Lukas Ruf, TIK April 6th 2000

Cryptography in Universal

• Obscuring technology (partial encryption) for audio/video data.

• Full encryption for static teaching aids.

• Algorithms according to the requirements,see presentation Security Techniques for IPR by T. Klobucar at WP1-Meeting

Page 10: Lukas Ruf, TIK April 6th 2000 1 WP3 Presentation, ETH WP 3 -- Security Technology And Multimedia Delivery Computer Engineering and Networks Laboratory,

10WP3 Presentation, ETH

Lukas Ruf, TIK April 6th 2000

this page is itentionally left blank

Page 11: Lukas Ruf, TIK April 6th 2000 1 WP3 Presentation, ETH WP 3 -- Security Technology And Multimedia Delivery Computer Engineering and Networks Laboratory,

11WP3 Presentation, ETH

Lukas Ruf, TIK April 6th 2000

Multimedia Data DeliveryProcessing speed

• Timely limited usability

• Full encryption vs. partial encryption

• Strong vs. weak encryption

Page 12: Lukas Ruf, TIK April 6th 2000 1 WP3 Presentation, ETH WP 3 -- Security Technology And Multimedia Delivery Computer Engineering and Networks Laboratory,

12WP3 Presentation, ETH

Lukas Ruf, TIK April 6th 2000

Cryptography

• Symmetric:– identical key for encryption and decryption– DES, 3DES, IDEA, CAST, RCx, Blowfish– advantage: fast en/decrypting of data,

implementation available in hard- and software– disadvantage: key must be known to all

participants

Page 13: Lukas Ruf, TIK April 6th 2000 1 WP3 Presentation, ETH WP 3 -- Security Technology And Multimedia Delivery Computer Engineering and Networks Laboratory,

13WP3 Presentation, ETH

Lukas Ruf, TIK April 6th 2000

Cryptography

• Asymmetric:– public- and private-key to encrypt and decrypt– RSA, ElGamal, Rabin– advantage: different keys for encryption and

decryption.– disadvantage: very slow

Page 14: Lukas Ruf, TIK April 6th 2000 1 WP3 Presentation, ETH WP 3 -- Security Technology And Multimedia Delivery Computer Engineering and Networks Laboratory,

14WP3 Presentation, ETH

Lukas Ruf, TIK April 6th 2000

Key Exchange

• Required to distribute encryption keys

• Approaches:– Centralized: Trusted Keyserver

• stores locally all keys

• generates session keys upon request

• must be contacted for every session

– Decentralized:Public-Key-Infrastructure (PKI)(e.g. PGP’s Web of Trust)

Page 15: Lukas Ruf, TIK April 6th 2000 1 WP3 Presentation, ETH WP 3 -- Security Technology And Multimedia Delivery Computer Engineering and Networks Laboratory,

15WP3 Presentation, ETH

Lukas Ruf, TIK April 6th 2000

Intellectual Property Rights (IPR)

• Protection schemes– anti-replay– timed validity/usability– digital watermarks, digital signatures

• Scope of IPR application

• Scope of data distribution