Download Date 24/09/2021 12:36:34

Download Date 24/09/2021 12:36:34

Cryptography and Computer Communications Security. Extending the Human Security Perimeter through a Web of Trust Item Type Thesis Authors Adeka, Muhammad I. Rights <a rel="license" href="http://creativecommons.org/licenses/ by-nc-nd/3.0/"><img alt="Creative Commons License" style="border-width:0" src="http://i.creativecommons.org/l/by- nc-nd/3.0/88x31.png" /></a><br />The University of Bradford theses are licenced under a <a rel="license" href="http:// creativecommons.org/licenses/by-nc-nd/3.0/">Creative Commons Licence</a>. Download date 24/09/2021 12:36:34 Link to Item http://hdl.handle.net/10454/11380 University of Bradford eThesis This thesis is hosted in Bradford Scholars – The University of Bradford Open Access repository. Visit the repository for full metadata or to contact the repository team © University of Bradford. This work is licenced for reuse under a Creative Commons Licence. CRYPTOGRAPHY AND COMPUTER COMMUNICATIONS SECURITY M.I. ADEKA PHD UNIVERSITY OF BRADFORD 2015 CRYPTOGRAPHY AND COMPUTER COMMUNICATIONS SECURITY Extending the Human Security Perimeter through a Web of Trust Muhammad Ibn-Umar ADEKA BSc., MSc. Submitted for the Degree of Doctor of Philosophy Faculty of Engineering and Informatics University of Bradford 2015 Abstract Muhammad Ibn-Umar Adeka CRYPTOGRAPHY AND COMPUTER COMMUNICATIONS SECURITY Extending the Human Security Perimeter through a Web of Trust Keywords Human Factor; Cryptology; Cybersecurity; Communication; Risk; Authentication; Security Perimeter; Web of Trust; Secret Sharing; Cloud Data Repository This work modifies Shamir’s algorithm by sharing a random key that is used to lock up the secret data; as against sharing the data itself. This is significant in cloud computing, especially with homomorphic encryption. Using web design, the resultant scheme practically globalises secret sharing with authentications and inherent secondary applications. The work aims at improving cybersecurity via a joint exploitation of human factors and technology; a human-centred cybersecurity design as opposed to technology-centred. The completed functional scheme is tagged CDRSAS. The literature on secret sharing schemes is reviewed together with the concepts of human factors, trust, cyberspace/cryptology and an analysis on a 3-factor security assessment process. This is followed by the relevance of passwords within the context of human factors. The main research design/implementation and system performance are analysed, together with a proposal for a new antidote against 419 fraudsters. Two twin equations were invented in the investigation process; a pair each for secret sharing and a risk-centred security assessment technique. The building blocks/software used for the CDRSAS include Shamir’s algorithm, MD5, HTML5, PHP, Java, Servlets, JSP, Javascript, MySQL, JQuery, CSS, MATLAB, MS Excel, MS Visio, and Photoshop. The codes are developed in Eclipse IDE, and the Java-based system runs on Tomcat and Apache, using XAMPP Server. Its code units have passed JUnit tests. The system compares favourably with SSSS. Defeating socio-cryptanalysis in cyberspace requires strategies that are centred on human trust, trust-related human attributes, and technology. The PhD research is completed but there is scope for future work. i Acknowledgements In the words of Isaac Newton (5 February 1657), if one does not stand on the shoulders of giants, one would not achieve greater heights. Since I could not have been exempted from this golden rule, let me expend some lines to recognise a few of those who made it possible for me to be talking of a PhD Thesis at this stage of my earthly struggle. From the home base, Nigeria, I am greatly indebted to the former Chief of Army Staff (COAS), Nigerian Army (NA), Lieutenant General AB Dambazau (PhD, retired), as well as his Director of Military Intelligence (DMI), Major General AT Umaru (retired) for their moral, psychological and other supports till date. I would also like to acknowledge the roles of the Petroleum Technology Development Fund (PTDF), Abuja, Nigeria, for its scholarship, and the NA for releasing me. Specifically, mention must be made of the Executive Secretaries, PTDF, Dr Muttaqha Rabe Darma, Dr Oluwole Oluleye, Mr Femi Ajayi, Mr Aminu Ahmed Galadima and their staffs at all levels from the various departments; especially training, finance, protocol and security departments. I must also mention the former Chief of Defence Staff, Air Chief Marshal O Petinrin, former COAS, Lieutenant General OA Ihejirika and his Principal Staff Officers; especially Major General LP Ngubane (Training and Operations) and Major General SY Audu ( former DMI). I am also greatly indebted to the current COAS, Lieutenant General TY Buratai, for his interventions at critical moments. Here in the UK, I am greatly indebted to Dr M.J. Ngala of Heaton Education, Bradford, for his various facilitating efforts at linking me up with the University of Bradford, and his continuous effort to make me feel at home in Bradford; ditto to our friend, Engr. Bako Wakili, of NCC, Abuja, Nigeria. Rightly or wrongly, the success or failure of a research effort could be a reflection of the quality of supervision and other facilities; in addition to the personal disposition of the research student. It is in this context that I would like to express my profound gratitude to my supervisors, Prof. Simon J. Shepherd and Prof. Raed A. Abd- Alhameed, both of the School of Electrical Engineering and Computer Science (SoEECS), University of Bradford; for their diligence and understanding. Similarly, I am greatly indebted to the Library, ICT, Hub Research and other services of the University of Bradford, just as I am to various colleagues and staff of the SoEECS. To Dr Kelvin O. Anoh and other fellow research students, especially those in B3.26 Labs, Chesham Building, I say thank you for your positive colleagueship. Finally, my wife, Saudat, and all the children/wards – Ayatullah, Saadiq, Mawaddah, Mardiyyah, Raheemah, Muhammad, Ishaq and ‘Uncle’ Dogo; may Allah reward you all for your various supports. Ultimate gratitude is due to Allah, the Creator of His Creation; the only One that makes whatever happens to happen – out of His Wisdom. ii Dedication My wife, children, parents, brothers/sisters, teachers, friends and those who perceive themselves as enemies; those who made positive contributions to the making of Nigeria and the Nigeria Project; those who stand for humanity against the workers of iniquity from the Big Bang till Eternity; and ultimately, the Heir of all inheritors. iii Table of Contents Abstract …………………………………………………………………………………..i Acknowledgements ……. ………………………………………………………………….ii Dedication ………………………………………………………………………………....iii List of Figures …………………………………………………………………………..ix List of Tables …………………………………………………………………………..xii List of Acronyms ………………………………………………………… ……………..xiii Chapter 1 ………………………………………………………………………………….1 Introduction ………………………………………………………………………………….1 1.1 Study Background ............................................................................................ 2 1.2 Motivation and Statement of the Research Problem ........................................ 4 1.3 Aim and Objectives .......................................................................................... 6 1.4 Scope of the Research ..................................................................................... 6 1.5 Research Philosophy ....................................................................................... 7 1.5.1 Pragmatism and Mixed Methods Research Approaches ..................... 10 1.5.2 Research Methodology ........................................................................ 10 1.6 Importance and Contributions of the Research .............................................. 12 1.6.1 Key Contributions ................................................................................. 12 1.6.2 Contributions Relative to the General Research Work ......................... 14 1.7 Layout of the Thesis ....................................................................................... 15 Chapter 2 ………………………………………………………………………………..17 Trusted Secret Sharing within the Framework of Cybersecurity and Cryptology…………………………………………………………………………… …...17 2.1 Requisite Theoretical Background on Secret Sharing Schemes .................... 17 2.1.1 The Theoretical Basis for the (k, n)-Threshold Schemes .................... 17 2.1.2 An Overview of Secret Sharing Schemes ............................................ 26 2.1.3 Cryptographic Key Management .......................................................... 42 2.1.4 Key Recovery in Cryptography ............................................................. 42 2.2 A Comparative Analysis of the Various Secret Sharing Methods ................... 48 2.2.1 Classification of Secret Sharing Schemes ........................................... 49 2.2.2 The Issues Arising from Active Adversarial Models ............................. 50 2.2.3 Schemes Designed to Counter the Effects of Active Adversaries ........ 51 iv 2.2.4 Comparative Performance Analyses of Secret Sharing Schemes ....... 53 2.3 Extending the Human Security Perimeter through a Web of Trust ................. 55 2.3.1 Zimmermann’s Web of Trust ............................................................... 56 2.3.2 Human Factors and Human Infrastructure in the Context of Trust ....... 58 2.3.3 Adeka’s Web of Trust .......................................................................... 62 2.3.4 Other Models for Measuring

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    306 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us