Show simple item record

dc.contributor.advisorGreen, Matthew D.
dc.creatorGarman, Christina
dc.date.accessioned2018-05-22T03:41:29Z
dc.date.available2018-05-22T03:41:29Z
dc.date.created2017-12
dc.date.issued2017-09-21
dc.date.submittedDecember 2017
dc.identifier.urihttp://jhir.library.jhu.edu/handle/1774.2/58656
dc.description.abstractIn 2015 more than 150 million records and $400 billion were lost due to publicly-reported criminal and nation-state cyberattacks in the United States alone. The failure of our existing security infrastructure motivates the need for improved technologies, and cryptography provides a powerful tool for doing this. There is a misperception that the cryptography we use today is a "solved problem" and the real security weaknesses are in software or other areas of the system. This is, in fact, not true at all, and over the past several years we have seen a number of serious vulnerabilities in the cryptographic pieces of systems, some with large consequences. This thesis will discuss three aspects of securing deployed cryptographic systems. We will first explore the evaluation of systems in the wild, using the example of how to efficiently and effectively recover user passwords submitted over TLS encrypted with RC4, with applications to many methods of web authentication as well as the popular IMAP protocol for email. We will then address my work on developing tools to design and create cryptographic systems and bridge the often large gap between theory and practice by introducing AutoGroup+, a tool that automatically translates cryptographic schemes from the mathematical setting used in the literature to that typically used in practice, giving both a secure and optimal output. We will conclude with an exploration of how to actually build real world deployable systems by discussing my work on developing decentralized anonymous credentials in order to increase the security and deployability of existing anonymous credentials systems.
dc.format.mimetypeapplication/pdf
dc.language.isoen_US
dc.publisherJohns Hopkins University
dc.subjectApplied cryptography
dc.subjectprotocol security
dc.titleSecuring Deployed Cryptographic Systems
dc.typeThesis
thesis.degree.disciplineComputer Science
thesis.degree.grantorJohns Hopkins University
thesis.degree.grantorWhiting School of Engineering
thesis.degree.levelDoctoral
thesis.degree.namePh.D.
dc.date.updated2018-05-22T03:41:29Z
dc.type.materialtext
thesis.degree.departmentComputer Science
dc.contributor.committeeMemberRubin, Aviel D.
dc.contributor.committeeMemberHeninger, Nadia
dc.publisher.countryUSA


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record