Advanced Block Cipher Characteristic. Introduction Published by NIST in 2001 Developed to overcome bottleneck of 3DES Block length is of 128 bits Key.

Slides:



Advertisements
Similar presentations
“Advanced Encryption Standard” & “Modes of Operation”
Advertisements

An Introduction to Secure Sockets Layer (SSL). Overview Types of encryption SSL History Design Goals Protocol Problems Competing Technologies.
Network Security. Confidentiality Using Symmetric Encryption John wrote the letters of the alphabet under the letters in its first lines and tried it.
1 Digital Signatures & Authentication Protocols. 2 Digital Signatures have looked at message authentication –but does not address issues of lack of trust.
1 Pertemuan 07 Enkripsi Simetrik Kontemporer Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Confidentiality using Symmetric Encryption traditionally symmetric encryption is used to provide message confidentiality consider typical scenario –workstations.
Cryptography1 CPSC 3730 Cryptography Chapter 7 Confidentiality Using Symmetric Encryption.
Lecture 23 Symmetric Encryption
Cryptography and Network Security Chapter 7
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
Cryptography and Network Security Chapter 7 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Modified – Tom Noack, UPRM.
Network Security Sorina Persa Group 3250 Group 3250.
1 Confidentiality Cryptography & Network Security H. Yoon Confidentiality Using Conventional Encryption Where should cryptographic functionality be located?
Cryptography and Network Security (CS435)
Computer Networks with Internet Technology William Stallings Network Security.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Chapter 20 Symmetric Encryption and Message Confidentiality.
IT 221: Conventional Encryption Algorithms and Ensuring Confidentiality Lecture 3: Conventional Encryption Algorithms and Ensuring Confidentiality For.
Information Security Lab. Dept. of Computer Engineering 182/203 PART I Symmetric Ciphers CHAPTER 7 Confidentiality Using Symmetric Encryption 7.1 Placement.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Stream Cipher July 2011.
Network Security Lecture 20 Presented by: Dr. Munam Ali Shah.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Network Security David Lazăr.
Dr. Reuven Aviv, Nov 2008 Conventional Encryption 1 Conventional Encryption & Message Confidentiality Acknowledgements for slides Henric Johnson Blekinge.
Chapter 7 – Confidentiality Using Symmetric Encryption.
Chapter 7 Confidentiality Using Symmetric Encryption.
Cryptography and Network Security Key Distribution for Symmetric Encryption.
Lecture 23 Symmetric Encryption
PRNGs Pseudo-random number generation. Randomness and Cryptography Randomness and pseudo-randomness are useful in cryptography: –To generate random and.
Fall 2006CS 395: Computer Security1 Confidentiality Using Symmetric Encryption.
Chapter 2 Symmetric Encryption.
Chapter 7 Confidentiality Using Symmetric Encryption.
CONFIDENTIALY USING CONVENTIONAL ENCRYPTION – Chapter 7 Historically – Conventional Encryption Recently – Authentication, Integrity, Signature, Public-key.
CONFIDENTIALY USING CONVENTIONAL ENCRYPTION – Chapter 7 CONFIDENTIALY USING CONVENTIONAL ENCRYPTION – Chapter 7 Historically – Conventional Encryption.
Chapter 7 – Confidentiality Using Symmetric Encryption.
Key Management and Distribution Anand Seetharam CST 312.
Cryptography CSS 329 Lecture 13:SSL.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
PRESENTATION ON SECURE SOCKET LAYER (SSL) BY: ARZOO THAKUR M.E. C.S.E (REGULAR) BATCH
Network Security Confidentiality Using Symmetric Encryption Chapter 7.
Network security Presentation AFZAAL AHMAD ABDUL RAZAQ AHMAD SHAKIR MUHAMMD ADNAN WEB SECURITY, THREADS & SSL.
Message Authentication Code
VPNs and IPSec Review VPN concepts Encryption IPSec Lab.
THE OSI MODEL By: Omari Dasent.
Cryptography Why Cryptography Symmetric Encryption
Network Security.
Secure Sockets Layer (SSL)
Chapter 7: Confidentiality Using Symmetric Encryption
Unit -1.
Cryptography and Network Security
Presented by: Dr. Munam Ali Shah
Confidentiality using Symmetric Encryption
Security through Encryption
Network Security – Kerberos
Confidentiality using Symmetric Encryption
Security Of Wireless Sensor Networks
Tutorial on Network Security: Sep 2003
ADVANCED ENCRYPTION STANDARDADVANCED ENCRYPTION STANDARD
Cryptography and Network Security Chapter 7
SOFTWARE IMPLEMENTATION OF OCB MODE
Security of Wireless Sensor Networks
New York Institute of Technology- Amman Campus
Pseudorandom Numbers Network Security.
Symmetric Key Distribution
Elect. Codebook, Cipher Block Chaining
By: Anthony Gervasi & Adam Dickinson
Presentation transcript:

Advanced Block Cipher Characteristic

Introduction Published by NIST in 2001 Developed to overcome bottleneck of 3DES Block length is of 128 bits Key length is of 128,192 and 256 bits Standard Symmetric Key Block Cipher Algo.

Characteristics General Security Uses S-Box as a nonlinear Components Software Implementations High performance due to parallelism Executes on variety of platform No of round decrease so speed is incresed Restricted-space Environments For S-Boxes pre-computation or Boolean representation is used Very Low ROM and RAM requirement

Cont… Hardware Implementations Throughput is unaffected with highest Key size Attacks on Implementations Masking technique is used to defend timing attack and power attack Encryption versus Decryptions Key setup performance is slower than encryption for decryption Key ability One time execution of the key schedule to generate all subkeys

Conventional Encryption Issues Traffic Distribution Random Number Generation Key Distribution

Traffic Distribution Traffic Analysis is require Two ways to Analyze Traffic Traffic Analysis Attack Knowledge about message length Covert Channel

Traffic Analysis Attack Identities of Partners ( Authentication of Partners) Frequency of Communication between Partners Message Pattern Message Length Quantity of Message Identify special conversion between sender and receiver

Covert Channel Identify traffic by Traffic patter which is responsible to create covert channel Unwanted Channel and not designed by network designer Responsible for Security attack Example: Unwanted message passing by employee to outside person and management do not get identity about this communication

Link Encryption Approach Network layer headers are encrypted (packet header is encrypted) which reduced opportunities for traffic analysis End to end traffic is still unprotected To avoid above attack Traffic pading is used

Traffic Padding Encryption Encryption Algorithm Continuous random data generator Discontinuous Plain Text Input Continuous Cipher Text

End to End Encryption Approach Encryption implemented at Transport layer or Application layer Network layer traffic is unprotected and attacker can access it To avoid above attack padding is used Padding is apply to data units to maintain uniformity at either transport layer or application layer Null message can be inserted randomly into stream

Key Distribution If A is Sender and B is receiver then A can select key and physically deliver to B A third-party can select the key and physically deliver it to A and B If A and B have previously and recently used a key, one party can transmit the new key to the other, encrypted using the old key If A and B each has an encrypted connection to a third party C, then C can deliver a key on the encrypted links to A and B.

Key Hierarchy Model DATA Session Key Master Key

Key Distribution Scenario KDC Initiator A Responder B ID A ||ID B ||N 1 E(Ka,[Ks||ID A ||ID B ||N 1 ])||E(Kb,[Ks, ID A ]) E(Kb,[Ks, ID A ]) E(Ks,N2) E(Ks,f(N2))

Transparent Key Control Known as automatic key distribution scheme Provide end-to-end encryption at a network layer and transport layer Used for connection-oriented end to end protocol (TCP) SSM (Session Security Module) is responsible for key control

Automatic Key Distribution Scheme Sender host Transmits a connection request packet to SSM SSM saves packet and applies to KDC for Permission to create connection Communication between KDC and SSM is encrypted by Master Key, If KDC approved connection request it generates session key and delivers it to Two appropriate SSM The Requesting SSM can now release connection request packet and connection is set up between two end systems

Automatic Key Distribution Scheme KDC Application SSM Application SSM HOST

Decentralized Key Control Sender request to Receiver for a session Key and includes nonce N1 Receiver responds with encrypted message by shared master key which includes session key selected by receiver, an identifier of receiver and F(N1), and another nonce N2. Using the New session key Sender returns F(N2) to B.

Decentralized Key Control Sender A Receiver B IDA || N1 E(Km,[Ks||ID A ||ID B ||f(N 1 ) ||N2]) E(Ks, f(N2))

Controlling Key Usage Key Usage controlled by two techniques Automated key distribution Key distribution done according to application Data encrypting key for general communication in network PIN encrypting key for Personal Identification numbers File encrypting key for file storage and public accessible locations Control vector Encryption and Decryption More flexible scheme Control vector coupled with key at the time of key generation

Control Vector Encryption Control Vector Hash function Master Key Session Key + Encryption Function Encrypted Session Key

Control Vector Encryption Control Vector Hash function Master Key Encrypted Session Key + Decryption Function Session Key

Random Number Generator Random Number is used Reciprocal authentication schemes as a feedback in form of nonces (nonces are used for handshaking) Used for session key generation Two type of Generator Randomness Two Criterai Uniform distribution Indepedence Unpredictability Each number is statistically independent to other

Pseudorandom Number Generators The algorithm which is responsible to generate sequence of numbers which are not statistically random are known as pseudorandom number generator For this type of numbers different tests are performed for randomness

Linear Congruential Generators Pseudorandom number generator technique Proposed by Lehmer The sequence of random number is generated by ; X n+1 = (a X n + c) mod m Where, X 0 – starting value0<= X 0 <m a - the multiplier0<a<m c - the increment0<=c <m m – the modulusm>0

Pseudorandom Number Generator from a counter C C + 1 Encryption algo Xi = E[Km, C+1] Master Key Km Counter with N increment