160 likes | 257 Views
Beyond Fixed Key Size: Classifications Toward a Balance Between Security and Performance by Abdullah Almuhaideb,Mohammed Alhabeeb,Phu Dung Le, Bala Srinivasan Presented by: Anirudh Rao Vasudeva Rao Abha Chaudhary Varshinee Krishnamurthy. INTRODUCTION. Motivation:
E N D
Beyond Fixed Key Size: Classifications Toward a Balance Between Security and PerformancebyAbdullah Almuhaideb,MohammedAlhabeeb,Phu Dung Le, BalaSrinivasanPresented by:AnirudhRaoVasudevaRaoAbhaChaudharyVarshinee Krishnamurthy
INTRODUCTION • Motivation: • Number of Mobile Devices increase exponentially every year. • Advancement in mobile technology opens up new opportunities in different fields which might compromise on security. • Current Technology -4G aims at providing higher data rates. • Primary goal - maintain a balance between security and performance.
Problem Statement: There are three main challenges: • Mobile Device performance capabilities • Mobile Network issues • Security protocol issues
RELATED WORK • Portmann et al: • Proposed a simple extension of TLS protocol that involves selectively encrypting a message stream. • 2 levels of security: • 1stLevel - involves encrypting sensitive parts of data stream • 2nd Level – non-sensitive parts of data stream are left unprotected. • This paper’s approach: • Classifies information security in 4 levels of security.
Tak and Park: • Classified 4 security classes based on information sensitivity and Network congestion. • Aimed at providing a trade off between security and performance. • Increase the number of keys used for increasing security. • Drawbacks: • They concentrate only on e-commerce and they did not consider m-commerce. • Mobile power supply gap was not taken into account. • This paper’s approach: • Increase the key length to increase security.
Song et al: • Proposed an extension of SSL protocol called the Multiple Channel SSL(MC-SSL). • Idea involves different channels for data with different sensitivity. • Communication between client and server either happens directly or through proxy servers. • Drawbacks: • Confined to a single protocol (SSL) • This paper’s approach: • Its offers 4 levels of Information security leveland 7 levels of capability performance levels.
THE PROPOSED TECHNIQUE • DKS- Dynamic Key Size • DKS architecture supports security protocol by selecting the appropriate key size
A. Capability performance Levels: • Has 7 performance levels.(0-6) • Based on 3 categories: • Category 1: Processing Power and Memory Capacity • Category 2: Power Supply • Category 3: Communication System
B. Information Security Levels: • 4 levels of information security levels. • None Critical • Least Critical • Critical • Most Critical • As information sensitivity increases key size increases (DKS) • Provides balance between security and performance.
C. Key Management: • Generates and maintains key that are used in encryption. • Contains identifiers for Authentication and encryption algorithms. • D. Policy Management: • Important component of DKS Approach • Describes the policies that has to be followed in each level of capability performance
POSSIBLE APPLICATIONS This paper supports SSL protocol dealing with its drawbacks : • Limitaion -1 : leak of capability negotiation and selective information security • Limitation -2 : use of full handshake more than once This approach provides : • 4 keys for different levels of security • The above is provided once for a single handshake • So every message will be associated with a key
SECURE CONNECTION OF DKS OVER SSL • Step 1 : after the initiation of handshake, the user sends the MD capability status and other supporting information • Step 2 : based on step 1, the MD is classified into the appropriate categories ; the largest PKI key size is generated. • Step 3 : the PKI key size is verified and the premaster keys and are generated. • Step 4 : check if the above generated keys matches with the information and capability levels. • Step 5 : the various communication links are secured properly. • Step 6&7 : end the session.
DISCUSSIONS • Need for a balance between performance and security • Though the balance is a challenging task , a practical balance is achieved • The functioning and processing of the MD and its capabilities need to be studied. • Hence the MD is classified as seven capability levels. • This approach provides selective security by classifying various (7) security levels. • A balance is achieved by combining the appropriate performance level and information sensitivity level. • The dynamic key approach provides a different key for different message hence avoiding leakage of information to attackers.
CONCLUSION • DKS approach is a practical solution to an effective balance between efficiency and security. • DKS approach different performance and security levels for various heterogeneous environment. • It provides more flexibility to security protocols.