Adopting the Noise Key Exchange in Tox Integration Des Noise

Total Page:16

File Type:pdf, Size:1020Kb

Adopting the Noise Key Exchange in Tox Integration Des Noise Adopting the Noise key exchange in Tox Integration des Noise Schlüsselaustauschprotokolls in Tox Master Thesis Submitted in partial fulfillment of the requirements for the degree of Master of Science in Engineering to the University of Applied Sciences FH Campus Wien Master Degree Program: IT-Security Author: Tobias Buchberger Student identification number: c1810537022 Supervisor: DI Mathias Tausig Date: 04.07.2020 Declaration of authorship: I declare that this Master Thesis has been written by myself. I have not used any other than the listed sources, nor have I received any unauthorized help. I hereby certify that I have not submitted this Master Thesis in any form (to a reviewer for assessment) either in Austria or abroad. Furthermore, I assure that the (printed and electronic) copies I have submitted are iden- tical. Date: Signature: Preface First of all I would like to take the time to thank my supervisor, Mathias Tausig, for all the help. You were the one who inspired me to choose this topic which combined my already- existing interest in Tox and cryptography. During the practical part of this thesis you guided me in the right directions and in our regular feedback sessions you always encouraged me. Moreover I want to thank zoff, iphy, zugz and nurupo from TokTok (Tox’ development organization) for valuable discussions and help in understanding Tox and its implementation. I look forward to further improve Tox together with these interesting people. Beer’s on me at the next ToxCon! ;-) I also want to thank Jason A. Donenfeld for intially raising the KCI issue in Tox’ handshake. Last but not least I want to thank my partner Hannah for all her help and endurance during the ups and downs while working on this thesis. She always kept calm and managed not to break up with me ;-). i Abstract Tox is a peer-to-peer instant messaging protocol that aims to provide secure messaging. The development of Tox started in the wake of Edward Snowden’s leaks regarding the US National Security Agencies’ (NSA) surveillance of most internet communications. It’s in- tended as a end-to-end encrypted (E2EE) and distributed Skype replacement. Tox features include instant messaging, audio and video calls. The implementation of the Tox protocol is written in C and the library is called "c-toxcore". Tox’ cryptography is based on the NaCl library from Daniel J. Bernstein. The cryptographic primitives for the key exchange (X25519), authentication (Poly1305) and symmetric encryption (XSalsa20) are state of the art peer-reviewed algorithms. Although Tox’ authenticated key exchange (AKE) during the handshake works, it is a "home-brewed" cryptographic protocol. Until now there was no full security analysis conducted on either the Tox protocol or its implementation in C, but the AKE is known to be vulnerable to key compromise impersonation (KCI) attacks. KCI is a vulnerability of AKE protocols, which in this case enables an attacker, who compromised the static long-term private X25519 key of a Tox party Alice, to impersonate any other Tox party (with certain qualifications) to Alice ("reverse impersonation"). This enables an attacker to perform a Man-in-the-Middle (MitM) attack. The cryptographic handshake of the Tox pro- tocol, including the AKE, is described in detail. Based on the analysis of the Tox handshake multiple KCI-attack scenarios are outlined. The Noise Protocol Framework (hereafter referred to as "Noise") is a framework created by Trevor Perrin intended to use by protocol designers to create secure channel protocols based on Diffie-Hellman key agreement. Noise provides different handshake patterns for different use cases. The security properties of these patterns are formally verified. These security properties can include forward secrecy, key confirmation, identity hiding and most notably KCI-resistance. Noise protocols are already used in some applications, like WireGuard VPN and WhatsApp. By using the Noise framework, a new KCI-resistant AKE for the Tox handshake is designed. Tox’ Noised-based AKE uses the "IK" pattern. The name of the resulting Noise protocol is Noise_IK_25519_ChaChaPoly_SHA512. This means the new AKE is also based on X25519 for the key exchange, but encryption during the AKE is performed using the ChaCha20-Poly1305 stream cipher instead of XSalsa20 (which is not supported by Noise). The Noise-C library from Rhys Weatherley is used to implement the new AKE in c-toxcore. Two functions are added to Noise-C to be able to retrieve to the symmetric encryption keys after a successful handshake. These keys are then used with the already-existing XSalsa20-Poly1305 encryption in c-toxcore to send encrypted messages. In future work, instead of using the Noise-C library, which supports most of Noise’ hand- shake patterns and all cryptographic primitives, only the Noise protocol used in the Tox handshake can be implemented in c-toxcore. This would remove Noise-C as a dependency (i.e the only other dependency is NaCl/libsodium), reduce source lines of code and therefore reduce the attack surface. Noise also provides functions to further improve security, like ses- sion re-keying, which could also be adopted in Tox. Future work could also include further security analysis of the Tox protocol and its implementation in C. ii Kurzfassung Tox ist ein Peer-to-Peer Instant-Messaging Protokoll, das zum Ziel hat sichere Kommu- nikation zu ermöglichen. Die Entwicklung von Tox hat im Anschluss an Edward Snowdens Veröffentlichungen hinsichtlich der Überwachung der internetbasierten Kommunikation durch die US National Security Agency (NSA) begonnen. Es ist als Ende-zu-Ende verschlüsselte und verteilte Alternative zu Skype gedacht. Tox ermöglicht unter anderem Instant-Messaging und Sprach- bzw. Videotelefonie. Das Tox-Protokoll ist in C implementiert und die Pro- grammbibliothek heißt „c-toxcore“. Die in Tox verwendete Kryptographie basiert auf der NaCl-Programmbibliothek von Daniel J. Bernstein. Die kryptographischen Verfahren für den Schlüsselaustausch (X25519), die Authentifizierung (Poly1305) und die symmetrische Verschlüsselung (XSalsa20) sind aktueller Stand der Technik. Tox’ authentifizierter Schlüs- selaustausch während des Handshakes funktioniert, ist aber ein selbsterstelltes kryptographis- ches Protokoll. Bisher wurde noch keine vollständige Sicherheitsanalyse des Tox-Protokolls oder der Implementierung in C durchgeführt. Es ist jedoch bekannt, dass der Schlüsselaus- tausch für "Key Compromise Impersonation"-Angriffe (KCI) anfällig ist. Im Fall von Tox kann dies einem Angreifer, der den privaten Langzeit-X25519-Schlüssel einer Tox-Benutzerin Alice kompromittiert hat, unter bestimmten Voraussetzungen ermöglichen, sich gegenüber Alice als beliebiger Tox-Benutzer auszugeben. Dies befähigt einen Angreifer Man-in-the- Middle-Attacken durchzuführen. Der kryptographische Handshake des Tox-Protokolls, ein- schließlich des Schlüsselaustausches, wird im Detail beschrieben. Basierend auf der Analyse des Handshakes werden mehrere KCI-Angriffs-Szenarien erläutert. Das Noise Protocol Framework (Noise) wurde von Trevor Perrin entworfen und ist dazu gedacht, von Entwicklern für den Entwurf von Protokollen zum Aufbau sicherer Kommu- nikationskanäle basierend auf dem Diffie-Hellman-Schlüsselaustausch, verwendet zu werden. Noise stellt sogenannte Handshake-Patterns für unterschiedliche Anwendungsfälle zur Ver- fügung. Die Sicherheits-Eigenschaften dieser Patterns sind formal verifziert und sind unter anderem Forward Secrecy, glaubhafte Abstreitbarkeit und am Wichtigsten Resistenz gegen KCI. Noise-Protokolle werden bereits in einigen Applikationen eingesetzt, wie z.B. Wire- Guard VPN und WhatsApp. Mit der Anwendung von Noise wird ein neuer Schlüsselaus- tausch mit Resistenz gegen KCI für das Tox-Protokoll konzipiert. Der Noise-basierte Schlüs- selaustausch verwendet das "IK" Pattern. Der Name des resultierenden Noise-Protokolls ist Noise_IK_25519_ChaChaPoly_SHA512. Daher basiert auch der neue Schlüsselaustausch auf X25519, aber die Verschlüsselung während dem Schlüsselaustausch wird anstelle von XSalsa20 (welches von Noise nicht unterstützt wird) mit ChaCha20 durchgeführt. Die Noise- C Programmbibliothek von Rhys Weatherley wird verwendet, um den neuen Schlüsselaus- tausch in c-toxcore umzusetzen. Zwei Funktionen werden zu Noise-C hinzugefügt, um die Schlüssel für symmetrische Verschlüsselung nach einem erfolgreichen Handshake abzufra- gen. Diese Schlüssel werden anschließend mit der bereits existierenden XSalsa20-Poly1305- Verschlüsselung verwendet, um Nachrichten zu senden. Als nächster Schritt ist angedacht das in Tox verwendete Noise-Protokoll explizit für Tox zu entwickeln, anstatt die Noise-C Programmbibliothek zu verwenden, die die meis- ten Noise-Handshake-Patterns und kryptographischen Verfahren unterstützt. Dies würde die Abhängigkeit von Noise-C für c-toxcore entfernen und durch eine reduzierte Anzahl von Quellcodezeilen die Angriffsoberfläche verringern. Außerdem stellt Noise weitere Funktionen, wie z.B. Session-Rekeying, zur Verfügung, die in Tox übernommen werden könnten, um die Kommunikationssicherheit weiter zu erhöhen. Ebenfalls könnte für das Tox-Protokoll und seine Implementierung in C eine tiefgehende Sicherheitsanalyse durchgeführt werden. iii List of Abbreviations ACCE Authenticated and Confidential Channel Establishment AEAD Authenticated Encryption with Associated Data AES Advanced Encryption Standard AKE Authenticated Key Exchange ATHiCC Asynchronous Tor Hidden Chat Communication DAKE Deniable Authenticated Key Exchange DH Diffie-Hellman DHT Distributed
Recommended publications
  • MASTERCLASS GNUPG MASTERCLASS You Wouldn’T Want Other People Opening Your Letters and BEN EVERARD Your Data Is No Different
    MASTERCLASS GNUPG MASTERCLASS You wouldn’t want other people opening your letters and BEN EVERARD your data is no different. Encrypt it today! SECURE EMAIL WITH GNUPG AND ENIGMAIL Send encrypted emails from your favourite email client. our typical email is about as secure as a The first thing that you need to do is create a key to JOHN LANE postcard, which is good news if you’re a represent your identity in the OpenPGP world. You’d Ygovernment agency. But you wouldn’t use a typically create one key per identity that you have. postcard for most things sent in the post; you’d use a Most people would have one identity, being sealed envelope. Email is no different; you just need themselves as a person. However, some may find an envelope – and it’s called “Encryption”. having separate personal and professional identities Since the early 1990s, the main way to encrypt useful. It’s a personal choice, but starting with a single email has been PGP, which stands for “Pretty Good key will help while you’re learning. Privacy”. It’s a protocol for the secure encryption of Launch Seahorse and click on the large plus-sign email that has since evolved into an open standard icon that’s just below the menu. Select ‘PGP Key’ and called OpenPGP. work your way through the screens that follow to supply your name and email address and then My lovely horse generate the key. The GNU Privacy Guard (GnuPG), is a free, GPL-licensed You can, optionally, use the Advanced Key Options implementation of the OpenPGP standard (there are to add a comment that can help others identify your other implementations, both free and commercial – key and to select the cipher, its strength and set when the PGP name now refers to a commercial product the key should expire.
    [Show full text]
  • Symmetric Asynchronous Ratcheted Communication with Associated Data
    Symmetric Asynchronous Ratcheted Communication with Associated Data B Hailun Yan( ) and Serge Vaudenay Ecole´ Polytechnique F´ed´erale de Lausanne (EPFL), Lausanne, Switzerland {hailun.yan,serge.vaudenay}@epfl.ch Abstract. Following up mass surveillance and privacy issues, modern secure communication protocols now seek strong security, such as forward secrecy and post-compromise security, in the face of state exposures. To address this problem, ratcheting was thereby introduced, widely used in real-world messaging protocols like Signal. However, ratcheting comes with a high cost. Recently, Caforio et al. proposed pragmatic construc- tions which compose a weakly secure “light” protocol and a strongly secure “heavy” protocol, in order to achieve the so-called ratcheting on demand. The light protocol they proposed has still a high complexity. In this paper, we prove the security of the lightest possible proto- col we could imagine, which essentially encrypts then hashes the secret key. We prove it without any random oracle by introducing a new secu- rity notion in the standard model. Our protocol composes well with the generic transformation techniques by Caforio et al. to offer high security and performance at the same time. 1 Introduction A classic communication model usually assumes that the endpoints are secure while the adversary is on the communication channel. However, protocols in recent messaging applications are secured with end-to-end encryption due to the prevalence of malware and system vulnerabilities. They attempt to enable secure communication services by regularly updating (ratcheting) the encryption key. One notable example of ratcheting is the Signal protocol [14] by Open Whisper Systems with its double-ratchet algorithm.
    [Show full text]
  • 2012 07 26 Letter to Skype
    ! Privacy International 46 Bedford Row London WC1R 4LR United Kingdom +44 (0) 20 7242 2836 @privacyint UK Charity No. 1147471 Friday, 27 July 2012 Dear Mr Bates, I am writing to request further information about the privacy implications of recent developments at Skype, as reported in the Washington Post.1 We were delighted to read that you believe these reports are “inaccurate” and“could mislead the Skype community”, and that you want to “clear this up”. 2 The growth of Skype since its launch in 2003 to become the world's leading VoIP provider has been driven by service that is affordable, high quality and, above all, secure. From an early stage in its development, Skype has assured its customers of the security of their communications. Press releases and product descriptions from 2005 boast of "end-to-end encryption for superior privacy" that "nobody can intercept".3 In 2008, a spokesperson reassured users that “[w]e have not received any subpoenas or court orders asking us to perform a live interception or wiretap of Skype-to-Skype communications” and “[i]n any event, because of Skype's peer-to-peer architecture and encryption techniques, Skype would not be able to comply with such a request”.4 In short, a promise was made to Skype customers that the privacy of their conversations and file transfers would be protected. As I'm sure you know, among Skype's 663 million registered users across the world are human rights defenders and pro-democracy activists living under autocratic regimes. In an environment where most channels of communication
    [Show full text]
  • Secure Messaging1
    SoK: Secure Messaging1 Nik Unger∗, Sergej Dechandy Joseph Bonneauzx, Sascha Fahl{, Henning Perl{ Ian Goldberg∗, Matthew Smithy ∗ University of Waterloo, y University of Bonn, z Stanford University, x Electronic Frontier Foundation, { Fraunhofer FKIE Abstract—Motivated by recent revelations of widespread state insecure ways. However, as will become clear over the course surveillance of personal communication, many products now of this paper, the academic research community is also failing claim to offer secure and private messaging. This includes both a to learn some lessons from tools in the wild. large number of new projects and many widely adopted tools that have added security features. The intense pressure in the past two Furthermore, there is a lack of coherent vision for the future years to deliver solutions quickly has resulted in varying threat of secure messaging. Most solutions focus on specific issues models, incomplete objectives, dubious security claims, and a lack and have different goals and threat models. This is com- of broad perspective on the existing cryptographic literature on pounded by differing security vocabularies and the absence of secure communication. a unified evaluation of prior work. Outside of academia, many In this paper, we evaluate and systematize current secure messaging solutions and propose an evaluation framework for products mislead users by advertising with grandiose claims their security, usability, and ease-of-adoption properties. We con- of “military grade encryption” or by promising impossible sider solutions from academia, but also identify innovative and features such as self-destructing messages [7]–[10]. The recent promising approaches used “in the wild” that are not considered EFF Secure Messaging Scorecard evaluated tools for basic by the academic literature.
    [Show full text]
  • Cisco SCA BB Protocol Reference Guide
    Cisco Service Control Application for Broadband Protocol Reference Guide Protocol Pack #60 August 02, 2018 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at www.cisco.com/go/offices. THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]
  • Horizontal PDF Slides
    1 2 The first 10 years of Curve25519 Abstract: “This paper explains the design and implementation Daniel J. Bernstein of a high-security elliptic-curve- University of Illinois at Chicago & Diffie-Hellman function Technische Universiteit Eindhoven achieving record-setting speeds: e.g., 832457 Pentium III cycles 2005.05.19: Seminar talk; (with several side benefits: design+software close to done. free key compression, free key validation, and state-of-the-art 2005.09.15: Software online. timing-attack protection), 2005.09.20: Invited talk at ECC. more than twice as fast as other authors’ results at the same 2005.11.15: Paper online; conjectured security level (with submitted to PKC 2006. or without the side benefits).” 1 2 3 The first 10 years of Curve25519 Abstract: “This paper explains Elliptic-curve computations the design and implementation Daniel J. Bernstein of a high-security elliptic-curve- University of Illinois at Chicago & Diffie-Hellman function Technische Universiteit Eindhoven achieving record-setting speeds: e.g., 832457 Pentium III cycles 2005.05.19: Seminar talk; (with several side benefits: design+software close to done. free key compression, free key validation, and state-of-the-art 2005.09.15: Software online. timing-attack protection), 2005.09.20: Invited talk at ECC. more than twice as fast as other authors’ results at the same 2005.11.15: Paper online; conjectured security level (with submitted to PKC 2006. or without the side benefits).” 1 2 3 The first 10 years of Curve25519 Abstract: “This paper explains Elliptic-curve computations the design and implementation Daniel J. Bernstein of a high-security elliptic-curve- University of Illinois at Chicago & Diffie-Hellman function Technische Universiteit Eindhoven achieving record-setting speeds: e.g., 832457 Pentium III cycles 2005.05.19: Seminar talk; (with several side benefits: design+software close to done.
    [Show full text]
  • CCIA Comments in ITU CWG-Internet OTT Open Consultation.Pdf
    CCIA Response to the Open Consultation of the ITU Council Working Group on International Internet-related Public Policy Issues (CWG-Internet) on the “Public Policy considerations for OTTs” Summary. The Computer & Communications Industry Association welcomes this opportunity to present the views of the tech sector to the ITU’s Open Consultation of the CWG-Internet on the “Public Policy considerations for OTTs”.1 CCIA acknowledges the ITU’s expertise in the areas of international, technical standards development and spectrum coordination and its ambition to help improve access to ICTs to underserved communities worldwide. We remain supporters of the ITU’s important work within its current mandate and remit; however, we strongly oppose expanding the ITU’s work program to include Internet and content-related issues and Internet-enabled applications that are well beyond its mandate and core competencies. Furthermore, such an expansion would regrettably divert the ITU’s resources away from its globally-recognized core competencies. The Internet is an unparalleled engine of economic growth enabling commerce, social development and freedom of expression. Recent research notes the vast economic and societal benefits from Rich Interaction Applications (RIAs), a term that refers to applications that facilitate “rich interaction” such as photo/video sharing, money transferring, in-app gaming, location sharing, translation, and chat among individuals, groups and enterprises.2 Global GDP has increased US$5.6 trillion for every ten percent increase in the usage of RIAs across 164 countries over 16 years (2000 to 2015).3 However, these economic and societal benefits are at risk if RIAs are subjected to sweeping regulations.
    [Show full text]
  • Wiretapping End-To-End Encrypted Voip Calls Real-World Attacks on ZRTP
    Institute of Operating Systems and Computer Networks Wiretapping End-to-End Encrypted VoIP Calls Real-World Attacks on ZRTP Dominik Schürmann, Fabian Kabus, Gregor Hildermeier, Lars Wolf, 2017-07-18 wiretapping difficulty End-to-End Encryption SIP + DTLS-SRTP (SIP + Datagram Transport Layer Security-SRTP) End-to-End Encryption & Authentication SIP + SRTP + ZRTP Introduction Man-in-the-Middle ZRTP Attacks Conclusion End-to-End Security for Voice Calls Institute of Operating Systems and Computer Networks No End-to-End Security PSTN (Public Switched Telephone Network) SIP + (S)RTP (Session Initiation Protocol + Secure Real-Time Transport Protocol) 2017-07-18 Dominik Schürmann Wiretapping End-to-End Encrypted VoIP Calls Page 2 of 13 wiretapping difficulty End-to-End Encryption & Authentication SIP + SRTP + ZRTP Introduction Man-in-the-Middle ZRTP Attacks Conclusion End-to-End Security for Voice Calls Institute of Operating Systems and Computer Networks No End-to-End Security PSTN (Public Switched Telephone Network) SIP + (S)RTP (Session Initiation Protocol + Secure Real-Time Transport Protocol) End-to-End Encryption SIP + DTLS-SRTP (SIP + Datagram Transport Layer Security-SRTP) 2017-07-18 Dominik Schürmann Wiretapping End-to-End Encrypted VoIP Calls Page 2 of 13 wiretapping difficulty Introduction Man-in-the-Middle ZRTP Attacks Conclusion End-to-End Security for Voice Calls Institute of Operating Systems and Computer Networks No End-to-End Security PSTN (Public Switched Telephone Network) SIP + (S)RTP (Session Initiation Protocol + Secure Real-Time
    [Show full text]
  • CS 255: Intro to Cryptography 1 Introduction 2 End-To-End
    Programming Assignment 2 Winter 2021 CS 255: Intro to Cryptography Prof. Dan Boneh Due Monday, March 1st, 11:59pm 1 Introduction In this assignment, you are tasked with implementing a secure and efficient end-to-end encrypted chat client using the Double Ratchet Algorithm, a popular session setup protocol that powers real- world chat systems such as Signal and WhatsApp. As an additional challenge, assume you live in a country with government surveillance. Thereby, all messages sent are required to include the session key encrypted with a fixed public key issued by the government. In your implementation, you will make use of various cryptographic primitives we have discussed in class—notably, key exchange, public key encryption, digital signatures, and authenticated encryption. Because it is ill-advised to implement your own primitives in cryptography, you should use an established library: in this case, the Stanford Javascript Crypto Library (SJCL). We will provide starter code that contains a basic template, which you will be able to fill in to satisfy the functionality and security properties described below. 2 End-to-end Encrypted Chat Client 2.1 Implementation Details Your chat client will use the Double Ratchet Algorithm to provide end-to-end encrypted commu- nications with other clients. To evaluate your messaging client, we will check that two or more instances of your implementation it can communicate with each other properly. We feel that it is best to understand the Double Ratchet Algorithm straight from the source, so we ask that you read Sections 1, 2, and 3 of Signal’s published specification here: https://signal.
    [Show full text]
  • Adv Forensic
    Oklahoma State University School of Forensic Sciences Non-Thesis Creative Component Spring 2019 FRNS 5980 12-Week Course I. Course Description: This course is a 3 unit graduate level course focusing on the Forensic Sciences in relation to Fire Investigation and Explosives/Explosion Investigation. Each student will submit a topic that will further their understanding of one of the above areas of study. This class builds off of the Ethical Writing and Research Course as you use the same topic from that course. Method of Teaching: This course will utilize a variety of instructional methods, including assigned readings. In addition to assigned reading, students will research topics in current literature and provide their opinion on the matter, supported by references. Course Goals and Objectives: The goal of this course is to further understand the particular discipline each student is responsible in their professional occupation. However, an additional goal of this graduate level course is to prepare you for forensic investigations where you may be confronted by an original problem and be tasked with developing a solution. Therefore, your submitted assignments will be based on researching topics in current literature and applying your discoveries. Competencies: Students are required to demonstrate an appropriate level of accomplishment to include: Critical Thinking: The ability to analyze and support information. Writing: The ability to organize and communicate ideas efficiently and effectively through writing skills. Information Literacy: Demonstrate the ability to search, locate, access, and assess appropriate research materials/sources pertinent to course requirements. Students need to be able to use the best and most current information in writing their research papers for this course.
    [Show full text]
  • UNITED STATES BANKRUPTCY COURT DISTRICT of NEW JERSEY Caption in Compliance with D.N.J
    Case 19-30256-VFP Doc 169 Filed 12/31/19 Entered 12/31/19 09:20:50 Desc Main Document Page 1 of 16 UNITED STATES BANKRUPTCY COURT DISTRICT OF NEW JERSEY Caption in Compliance with D.N.J. LBR 9004-19(b) OMNI AGENT SOLUTIONS, LLC 5955 De Soto Ave, Ste 100 Woodland Hills, CA 91367 (818) 906-8300 (818) 783-2737 Facsimile Scott M. Ewing ([email protected]) Case No.: 19-30256-VFP In Re: Chapter: 11 CTE 1 LLC, Judge: Vincent F. Papalia Debtor(s) CERTIFICATION OF SERVICE 1. I, Scott M. Ewing : X represent the Claims and Noticing Agent, in the above-captioned matters am the secretary/paralegal for __________________, who represents in this matter. am the in the above case and am representing myself. I caused the following pleadings and/or documents to be 2. On December 24, 2019 served on the parties listed in the chart below: Notice of Bid Deadline, Auction Date, and Sale Hearing for the Approval of the Sale of Certain Assets of the Debtor Free and Clear of Liens, Claims, and Interests1 Order Approving Sales Procedure Notice and Bidding Procedures [Docket No. 156] 3. I hereby certify under penalty of perjury that the above documents were sent using the mode of service indicated. Dated: December 26, 2019 /s/ Scott M. Ewing Signature: Scott M. Ewing 1 A copy of the Notice is attached as Exhibit D. 3952037 Case 19-30256-VFP Doc 169 Filed 12/31/19 Entered 12/31/19 09:20:50 Desc Main Document Page 2 of 16 Name And Address of Party Served Relationship Of Mode Of Service Party To The Case SEE EXHIBIT A SEE EXHIBIT A Hand-Delivered Regular mail Certified mail/RRR X Other Electronic mail (As authorized by the Court or by rule.
    [Show full text]
  • Fast Elliptic Curve Cryptography in Openssl
    Fast Elliptic Curve Cryptography in OpenSSL Emilia K¨asper1;2 1 Google 2 Katholieke Universiteit Leuven, ESAT/COSIC [email protected] Abstract. We present a 64-bit optimized implementation of the NIST and SECG-standardized elliptic curve P-224. Our implementation is fully integrated into OpenSSL 1.0.1: full TLS handshakes using a 1024-bit RSA certificate and ephemeral Elliptic Curve Diffie-Hellman key ex- change over P-224 now run at twice the speed of standard OpenSSL, while atomic elliptic curve operations are up to 4 times faster. In ad- dition, our implementation is immune to timing attacks|most notably, we show how to do small table look-ups in a cache-timing resistant way, allowing us to use precomputation. To put our results in context, we also discuss the various security-performance trade-offs available to TLS applications. Keywords: elliptic curve cryptography, OpenSSL, side-channel attacks, fast implementations 1 Introduction 1.1 Introduction to TLS Transport Layer Security (TLS), the successor to Secure Socket Layer (SSL), is a protocol for securing network communications. In its most common use, it is the \S" (standing for \Secure") in HTTPS. Two of the most popular open- source cryptographic libraries implementing SSL and TLS are OpenSSL [19] and Mozilla Network Security Services (NSS) [17]: OpenSSL is found in, e.g., the Apache-SSL secure web server, while NSS is used by Mozilla Firefox and Chrome web browsers, amongst others. TLS provides authentication between connecting parties, as well as encryp- tion of all transmitted content. Thus, before any application data is transmit- ted, peers perform authentication and key exchange in a TLS handshake.
    [Show full text]