- 4
- 0
- 约7.09千字
- 约 24页
- 2017-03-09 发布于上海
- 举报
ZeroInteraction Authentication零交互认证
Zero-Interaction Authentication April 15, 2003 Mark D.Corner, Brian D. Noble Presented by Seong Oun Hwang Introduction Motivation Identification of Problems Mobile devices (e.g. laptops) are susceptible to loss,theft and contain sensitive data. For securing data on a laptop’s disk, decryption key supplied at login time is retained by the laptop for later use, but still vulnerable. Security requires frequent re-authentication, but this limits usability and encourage users to disable security options. Idea How to provide effective file encryption without degrading both usability and performance? “Zero-Interaction Authentication” Introduction of ‘token’ carried by users For usability, infrequent re-authentication between a user and a token For performance, encryption and decryption of files are made on laptop, not on token. The token keeps key-encrypting keys, and the laptop contains file keys. Architecture of ZIA Architecture of ZIA Architecture of ZIA Design Perspectives of ZIA Trust and Threat Model Protection against attacks involving physical possession of a laptop or proximity to it Protection against exploitation of the wireless link between the laptop and token Support of data sharing within a domain No protection against a trusted but malicious user No protection for remote users Design Perspectives of ZIA Key-Encrypting Keys Administrative authority assigns a user key Ku, to each user; a group key Kg to each group; a world key Kw to each machine. Each laptop encrypts data under some symmetric key, Ke, generated at token. Ke is stored on each machine as Ku(Ke) encrypted under some key-encrypting key, Ku. If a file is accessible by members of its owning group, Kg(Ke) is also stored. Kw(Ke) would be stored for files that are world-accessible. Design Perspectives of ZIA Token Vulnerabilities Since the token is worn by a user, it is more physically secure than a laptop. In case of token loss, possible extraction of key-encrypting keys should be avoided
您可能关注的文档
- Words Don’t Work Otago话不工作奥塔哥.ppt
- Word Project 1 Brooklyn College字项目1 布鲁克林学院.ppt
- WORDMASTERSwordmasters.ppt
- Words floating on the surface of sound change声音的表面浮动.ppt
- WORK ATTITUDES University of Kentucky工作态度肯塔基大学.ppt
- Words with Short and Long Vowels Gage Middle School短而长的元音计的中学.ppt
- Work Habits that influence job Success影响工作成功的工作习惯.ppt
- Word Recognition and Fluency in 4th and 5th Grade第四、第五级单词的识别和流利性.ppt
- Work Measurement University of San Diego Home 工作测量圣地亚哥大学主页.ppt
- Work Measurement Wiley Home工作测量威利家.ppt
- 广东省广州省实验中学教育集团2025-2026学年八年级上学期期中考试物理试题(解析版).docx
- 广东省广州大学附属中学2025-2026学年八年级上学期奥班期中物理试题(解析版).docx
- 广东省广州市第八十六中学2025-2026学年八年级上学期期中物理试题(含答案).docx
- 广东省广州市第八十九中学2025-2026学年八年级上学期期中考试物理试题(解析版).docx
- 广东省广州市第二中学2025-2026学年八年级上学期期中考试物理试题(含答案).docx
- 广东省广州市第八十六中学2025-2026学年八年级上学期期中物理试题(解析版).docx
- 广东省广州市第八十九中学2025-2026学年八年级上学期期中考试物理试题(含答案).docx
- 广东省广州市第二中学2025-2026学年八年级上学期期中考试物理试题(解析版).docx
- 2026《中国人寿上海分公司营销员培训体系优化研究》18000字.docx
- 《生物探究性实验教学》中小学教师资格模拟试题.docx
最近下载
- 医院医养结合功能区设计方案.docx
- 老年人防诈骗宣传案例分析报告.docx VIP
- 聚羧酸减水剂msds报告.docx
- 个人信用报告模板简版带水印可编辑2025年9月新版.pdf VIP
- QBNM-PS-0001—2019 汽车车身油漆涂层标准.pdf VIP
- 2025铁路旅客列车餐饮服务卫生规范.pdf VIP
- 奉节脐橙电子商务发展中存在的问题及对策研究.docx VIP
- 城中村改造建设项目可行性研究报告.docx VIP
- 2024党员围绕“学习贯彻党的创新理论、党性修养提高、联系服务群众、党员发挥先锋模范作用、铸牢中华民族共同体意识方面”5个方面组织生活会发言材料多篇.docx VIP
- 《养老之女性篇》课件.pptx VIP
原创力文档

文档评论(0)