1 / 6

PCSP: A Probable Concurrent Secure and Portable Peer-to-Peer Protocol

PCSP: A Probable Concurrent Secure and Portable Peer-to-Peer Protocol. Authors: Graciela Perera and Robert Gilliland Source: 2009 Ninth Annual International Symposium on Applications and the Internet, pp. 275-277, 2009 Speaker: Shu-Fen Chiou ( 邱淑芬 ). Problem.

amity
Download Presentation

PCSP: A Probable Concurrent Secure and Portable Peer-to-Peer Protocol

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. PCSP: A Probable Concurrent Secure and PortablePeer-to-Peer Protocol Authors: Graciela Perera and Robert Gilliland Source: 2009 Ninth Annual International Symposium on Applications and the Internet, pp. 275-277, 2009 Speaker: Shu-Fen Chiou (邱淑芬)

  2. Problem • Gnutella protocol does not provide security.

  3. Requirements • Authentication • Confidentiality and Integrity (Using DH protocol) • Portable (Implement by Java)

  4. Proposed method Alice Bob 1.Generate a Compute ga 1.Generate b Compute gb 2. Bloom filter with IP address 2. Bloom filter with IP address 3. Hiding <bloom filter, IP after bloom filter, ga> in the first four bytes in an image by LSB 3. Hiding <bloom filter, IP after bloom filter, gb> in the first four bytes in an image by LSB Stego-image 4. Extract <bloom filter, IP after bloom filter, gb> 5. Authentication by IP 6. Generate session key K=(gb mod p)a mod p 4. Extract <bloom filter, IP after bloom filter, gb> 5. Authentication by IP 6. Generate session key K=(gb mod p)a mod p

  5. paper之優缺點 • 優點: • 加入影像來隱藏更加確保安全性 • 缺點: • 沒有相互驗證 • 影像容易被破壞 • 會有main-in-middle attack的問題

  6. 可能研究方向 • 加入相互驗證 • 隨機隱藏,並藏多份

More Related