Exchanging Database Writes with modern Cryptography

Andreas Happe (Author and Speaker), Thomas Lorünser

Research output: Chapter in Book or Conference ProceedingsConference Proceedings with Oral Presentationpeer-review

Abstract

Modern cryptography provides for new ways of
solving old problems. This paper details how Keyed-Hash Message Authentication Codes (HMACs) or Authenticated Encryption with Associated Data (AEAD) can be employed as an
alternative to a traditional server-side temporal session store.
This cryptography-based approach reduces the server-side need
for state. When applied to database-based user-management
systems it removes all database alteration statements needed for
confirmed user sign-up and greatly removes database alteration
statements for typical “forgot password” use-cases. As there is
no temporary data stored within the server database system,
there is no possibility of creating orphaned or abandoned data
records. However, this new approach is not generic and can only
be applied if implemented use-cases fulfill requirements. This
requirements and implications are also detailed within this paper.
Index Terms—Internet, Network security, Web services
Original languageEnglish
Title of host publicationThe First International Conference on Advances in Cyber-Technologies and Cyber-Systems CYBER2016
Pages50-53
Volume1
Publication statusPublished - 2016
EventThe First International Conference on Advances in Cyber-Technologies and Cyber-Systems 2016: CYBER 2016 - Venice, Venice, Italy
Duration: 9 Oct 201613 Oct 2016

Conference

ConferenceThe First International Conference on Advances in Cyber-Technologies and Cyber-Systems 2016
Country/TerritoryItaly
CityVenice
Period9/10/1613/10/16

Research Field

  • Cyber Security

Keywords

  • Internet
  • Network security
  • Web services

Fingerprint

Dive into the research topics of 'Exchanging Database Writes with modern Cryptography'. Together they form a unique fingerprint.

Cite this