1 / 15

Mobile encryption for laptop data protection (MELP)

Mobile encryption for laptop data protection (MELP). Source: IET Information Security, 2012 , Vol. 6, Iss. 4, pp . 291–298 Authors: Y.-W. Kao,X . Zhang,A . Studer,A . Perrig Speaker : Yeh-Chieh , Chou Date: 2013/06/06. Outline. Introduction Proposed scheme Notation

gyda
Download Presentation

Mobile encryption for laptop data protection (MELP)

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Mobile encryption for laptop data protection (MELP) Source: IET Information Security, 2012, Vol. 6, Iss. 4, pp. 291–298 Authors: Y.-W. Kao,X. Zhang,A. Studer,A. Perrig Speaker: Yeh-Chieh, Chou Date: 2013/06/06

  2. Outline • Introduction • Proposed scheme • Notation • Registration phase • Offline • Analysis • Security Analysis • Performance Analysis • Conclusion

  3. Introduction Encryption files Decryption files Request Get encryption key ID,Password Constrained Channel Protect by password Decryption key

  4. K Symmetric key • EK,DK Asymmetric key • Ea(), Es() Encryption function • Da() Sign function • h() Hash function • Ext Extension function

  5. Select secret key <, > Etmp=Es(, ) Delete Select secret key <, > <, > =<es , Ns> =<ds , Ns> Select secret key <, > Generate =<em ,Nm> =<dm ,Nm> Composed of the exponent part and modulus part

  6. Mobile Phone registration , User =<es , Ns> =<ds , Ns> Mobile Phone =<em ,Nm> =<dm ,Nm> Server ID, Psd Ea(||h(Psd)||ds||(Ext(h(Psd))⊕dm) , ) =Phone#||ID||es||em||Ns||Nm|| Check ID Es(h(h(Psd)),) Eds=Es(ds||Ns,) Edm=Es(Ext(h(Psd))⊕dm,) =Da(||Result,) , es, Ns, em, Nm ds Ext(h(Psd)) ⊕dm =Result ||

  7. Laptop registration User Laptop Server , , ID, Psd’ Es(h(h(Psd)),) Ea(|| ||h(Psd’), ) =ID||Laptop name|| Decrypt h(h(Psd’)) from h(h(Psd’))?=h(h(Psd)) =Result||es||em||Ns||Nm =Da(),) =|| =|| , (mod Nm)mod Ns Delete

  8. , , es, Ns, em, Nm ds Ext(h(Psd)) ⊕dm (mod Nm)mod Ns =((mod Nm)mod Ns =ID||Laptop name|| =Da(h(),) =|| =((mod Nm)mod Ns =Da(h(),) =|| =mod Nm =Laptop name|| =Da(h(), ) =(mod Nm =ID||Laptop name|| =Da(h(), ) =|| =|| =|| =Ea(||h(Psd’), ) =ID|| =Da(h(),) =(mod Nm = =<em ,Nm> =<dm ,Nm> =<es , Ns> =<ds , Ns>

  9. (mod Nm)mod Ns Encrypt by password =<ds , Ns> =<dm ,Nm>

  10. [ 4 ]Studer, A., Perrig, A.: ‘Mobile user location-specific encryption (MULE): using your office as your password’. Proc. ACM Conf. Wireless Network Security (WiSec), March 2010, pp. 151– 162 [12]Corner, M.D., Noble, B.D.: ‘Zero-interaction authentication’. Proc. Eighth Annual Int. Conf. Mobile Computing and Networking (MobiCom’02), 2002, pp. 1 –11 [13]Finkenzeller, K.: ‘RFID handbook: fundamentals and applications in contactless smart cards, radio frequency identification and near-field communication’ (Wiley & Sons, 2010, 3rd edn.), ISBN-10: 0470695064, ISBN-13: 978- 0470695067 [14]Haselsteiner, E., Breitfuss, K.: ‘Security in near field communication (NFC) strengths and weaknesses’. Workshop on RFID Security, 2006, pp. 1– 11 [15]Michahelles, F., Thiesse, F., Schmidt, A., Williams, J.R.: ‘Pervasive RFID and near field communication technology’, IEEE Pervasive Comput., 2007, 6, (3), pp. 94–96

  11. Conclusion • The author proposed a scheme that can protect data. • Offline decryption. • Online to close the decryption function.

More Related