studi dan implementasi keamanan user privacy menggunakan cp-abe

Post on 15-Apr-2017

412 Views

Category:

Technology

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Studi & Implementasi Keamanan User Privacy menggunakan CP-ABESamsul Huda, Amang Sudarsono and Tri Harsono

Politeknik Elektronika Negeri Surabaya

Profil

Name : Samsul HudaInstitution : Politeknik Elektronika Negeri Surabaya

Achievements :• Potential Paper on National Cryptography

Competition in Sekolah Tinggi Sandi Negara (2014)

• Samsul huda, amang sudarsono and mike yuliana, “Implementasi sistem pengamanan e-commerce,” in Indonesia Security Conference 2014 (IDSECCONF2014), 2014.

• Sritrusta sukaridhoto, yahya adi setiawan, edi wahyu widodo, samsul huda and nurul fahmi, “Development of MiniPhooBot for small medium business,” in Knowledge Creation and Intelligent Computing 2015 (KCIC2015), 2015, pp. 84-89.

Road map

Background and Problems

Overview CP-ABE

System Overview

Implementation

Conclusion

Background and Problems

Low Cost Long Distance

Fast Enough

unsecure from

interception.Cryptography • User----------- one to one

• Strength on complexity of algorithm and confidentiality of key

Ciphertext-Policy Attribute-Based Encryption (CP-ABE)

CP-ABE was designed by Bethencourt, Waters, and Sahai as a means of allowing expressive and controlled access to encrypted files by defining a user’s key as a set of attributes, and authorizing decryption if these attributes satisfy an access tree.

Private key assigned to Attributes Chipertext assosiated with access policy Can decrypt only when attributes satisfy policy

Overview CP-ABE

Setup

Decrypt

Keygen Encrypt

Delegate

PKMSK

SKSamsul :“manager”“IT dept.”

SKHuda :“manager”“sales”

OR

IT dept. AND

manager marketing

Illustration

OR

ANDIT Dept

Manager Marketing

Message

Enc

Access Policy

Message

DecCiphertext PK

SK

PK

Specification of H/W

Specifiction RemarksSoftware GCC-4.7, gmp-5.1.1, pbc-lib-0.5.14,

glib2.34, openssl-1.0.1c

O/S Debian Linux kernel-3.5.0-17

CPU Intel core i3-370M 2.4 GHz

RAM 4GB DDR3

WiFi Acer InviLink™ Nplify™ 802.11b/g/n

Results

Pre-processing phase

Processing phase

Process Time (ms)Setup 32.34KeyGen 26.02

 Process

Time(ms)

Sender Encryption 80.04Medium Transmission 99.64Receiver Decryption 100.12

Total time process 279,8

Thank You

Samsul.eepis@gmail.com

top related