Introduction Applications: Pay-TV, Confidential video conferencing,

Slides:



Advertisements
Similar presentations
Relations, Functions, and Matrices Mathematical Structures for Computer Science Chapter 4 Copyright © 2006 W.H. Freeman & Co.MSCS SlidesThe Mighty Mod.
Advertisements

1 KCipher-2 KDDI R&D Laboratories Inc.. ©KDDI R&D Laboratories Inc. All rights Reserved. 2 Introduction LFSR-based stream ciphers Linear recurrence between.
“Advanced Encryption Standard” & “Modes of Operation”
Digital Kommunikationselektroink TNE027 Lecture 6 (Cryptography) 1 Cryptography Algorithms Symmetric and Asymmetric Cryptography Algorithms Data Stream.
Cryptography and Network Security Chapter 3
Block Ciphers and the Data Encryption Standard
Cryptography and Network Security
Introduction to Cryptography and Security Mechanisms: Unit 5 Theoretical v Practical Security Dr Keith Martin McCrea
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
Lecture 23 Symmetric Encryption
Computer Security CS 426 Lecture 3
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
1 Chapter 3 Ciphers Mechanism that decides the process of encryption/decryption Stream Cipher: Bit-by-bit encryption / decryption Block Cipher: Block-by-block.
Network Security Lecture 14 Presented by: Dr. Munam Ali Shah.
One-Time Pad Or Vernam Cipher Sayed Mahdi Mohammad Hasanzadeh Spring 2004.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Lec. 5 : History of Cryptologic Research II
Cryptanalysis of a Chaotic Neural Network Based Multimedia Encryption Scheme Chengqing Li a, Shujun Li b, Dan Zhang a and Guanrong Chen b a Zhejiang University,
Chapter 20 Symmetric Encryption and Message Confidentiality.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Hashing Algorithms: Basic Concepts and SHA-2 CSCI 5857: Encoding and Encryption.
1 Embedding Compression in Chaos- Based Cryptography 嵌入壓縮功能到混亂加密法 IEEE Transactions on Circuits and Systems—II: Express Briefs, VOL. 55, NO. 11, NOV
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
PRBG Based on Couple Chaotic Systems & its Applications in Stream- Cipher Cryptography Li Shujun, Mou Xuanqin, Cai Yuanlong School of Electronics & Information.
Lecture 23 Symmetric Encryption
Chapter 2 Symmetric Encryption.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
Lecture 3 Overview. Ciphers The intent of cryptography is to provide secrecy to messages and data Substitutions – ‘hide’ letters of plaintext Transposition.
Block Ciphers and the Data Encryption Standard. Modern Block Ciphers  One of the most widely used types of cryptographic algorithms  Used in symmetric.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
Statistical Properties of Digital Piecewise Linear Chaotic Maps and Their Roles in Cryptography & Pseudo-Random Coding Li ShujunLi Shujun 1, Li Qi 2, Li.
หัวข้อบรรยาย Stream cipher RC4 WEP (in)security LFSR CSS (in)security.
Lecture 4 Data Encryption Standard (DES) Dr. Nermin Hamza
Virtual memory.
Attacks on Public Key Encryption Algorithms
Provides Confidentiality
Chapter3: Block Ciphers and the Data Encryption Standard
Classical Encryption techniques
Encryption
STRATEGIC ENCRYPTION
Cryptography after DES
Cryptography and Network Security Chapter 3
Security through Encryption
PART VII Security.
Unit 2 “Implementation of a RC5 block cipher algorithm and implementing an attack on it”
Cryptography Team Presentation 1
ICS 454: Principles of Cryptography
Introduction to Modern Symmetric-key Ciphers
Block Ciphers and the Data Encryption Standard (DES)
Cryptography and Network Security Chapter 7
Chapter -2 Block Ciphers and the Data Encryption Standard
Analysis of Algorithms
SYMMETRIC ENCRYPTION.
BlowFish Algorithm.
International Data Encryption Algorithm
Cryptography Lecture 16.
Florida State University
ICS 555: Block Ciphers & DES Sultan Almuhammadi.
Cryptography Lecture 15.
Stream Cipher Structure
Feistel Cipher Structure
Presentation transcript:

Introduction Applications: Pay-TV, Confidential video conferencing, secure VOD service via network, Medical imaging systems, etc. Problems: 1) The well-developed modern ciphers cannot be directly used, because most of them run so slow (especially in software implementation). 2) Compression algorithms make it more difficult to incorporate the ciphers into the video system. State of the Art: Many different video encryption scheme have been proposed, but some of them are not secure and most of them are dependent of specific video format (chiefly MPEG-1 and 2).

Our New Scheme - CVES CVES – Chaotic Video Encryption Scheme. CVES is independent of any video compression algorithms; CVES can provide high security for real-time digital video with fast encryption speed; CVES can be simply realized both by hardware and software. CVES can be extended to support random retrieval of cipher- video with considerable maximal time-out (RRS-CVES: Random Retrieval Supported CVES). Essentially speaking, CVES is a universal fast cipher .

CVES – A General View

Chaotic Cryptography Chaos vs. Cryptography: Many fundamental characteristics of chaos, such as the mixing property and the sensitivity to initial conditions, can be connected with “confusion” and “diffusion” property in good ciphers. Three facts about presented chaotic ciphers: 1) Most chaotic block ciphers require to iterate the employed chaotic systems for many times to make the ciphertext independent of the plaintext, which will markedly reduce the encryption speed. 2) Most chaotic stream ciphers employ one single chaotic system to generate pseudo-random numbers to mask the plaintext, which may weaken the capability to resist potential attacks. 3) Generally, chaotic stream ciphers run much faster than chaotic block ciphers.

How to Realize Digital Chaotic Systems in Finite Precision? Problems: It has been found that the dynamical properties of digital chaotic systems are far different from the theoretical ones. The related problems include short cycle length, non- ideal distribution and correlation, etc. Remedies: In CVES, we use the perturbation-based algorithm presented in [24] to avoid this flaw: Use a simple pseudo-random number generator (PRNG) to make a small signal pt(i). The l lowest bits of the chaotic orbits are perturbed by pt(i) with fixed interval Δ.

CVES - Components ECS Pool: The kernel part of the whole CVES. 2n digital chaotic systems, which are called Encryption Chaotic Systems (ECS): ECS (1)~ECS(2n). All 2n ECS-es are based on a same one-dimensional chaotic map Fe(xe,pe) defined on I=[0,1], with different control parameters pe(1)~pe(2n). All ECS-es are realized in finite precision L (bits) with perturbation-based algorithm, and one maximal length LFSR (m-LFSR1, whose degree is L1) is used as the perturbing PRNG. The perturbing intervals are Δe(1)~ Δe(2n) respectively. The current states of the 2n ECS-es are denoted as xe(1)~xe(2n).

CVES - Components CCS: One digital chaotic systems (called Control Chaotic System) is used to control the 2n ECS-es. CCS is based on another chaotic map Fc(xc,pc) defined on I=[0,1]. CCS is also realized in finite precision L with perturbation-based algorithm, and m-LFSR2 with degree L2 is used as the perturbing PRNG. The perturbing interval is Δc. CIT: A Control Information Table (CIT) stores the required information of CVES. Stream Sub-Cipher: A 2n×1 MUX controlled by CCS is used to select an ECS to generate a L-bit chaotic key, which is used to XOR the plain-cluster L-bit block by L-bit block. Block Sub-Cipher: A 2n×2n L-bit sorter and 2n n-bit memory units compose a Pseudo-Random S-Box Generator (PRSBG). Then generate a pseudo-random n×n S-Box, which is used to substitute the pre-masked plain-cluster n-bit block by n-bit block.

CVES – Encryption/Decryption Secret key: K={xc,pc}. Initialization: 1)Iterate CCS for 2n times to obtain 2n initial conditions xe0(1)~xe0(2n) for all ECS-es. 2)Iterate CCS for 2n times to obtain 2n control parameters pe0(1)~pe0(2n) for all ECS-es. Any two must not be same. 3) Sort xe0(1)~xe0(2n) to generate a rank sequence l(1)~l(2n). Then Δe(i)=Pr(l(i)), where Pr(i) denotes ith prime number larger than 2. Iterate CCS for several times to obtain Δc, which should be a prime number smaller than 2n. 4) Iterate each ECS(i) for η>λ(i) times, where λ(i) is its Lyaponov exponent. Encryption/Decryption Procedure: See Slide 4.

RRS-CVES – Modified CVES Initialization: Three operations are added. 1) Run CCS for 2+2n times to generate two L-bit numbers p+, x+ and 2n m-bit numbers τe(1)~τe(2n). Here, gcd(τe(i),2)=1 and τe(i)≥τmin. 2) Sort pe0(1)~pe0(2n) to generate a sequence re(1)~re(2n). 3) Set the 2·2n L-bit numbers to 0: C1(1)~C1(2n), C2(1)~C2(2n). Encryption Procedure: Only the stream sub-cipher is modified. For jth L-bit plain-block, select ECS(re(j mod 2n)) as the current ECS. ECS(i) runs once, C1(i)++. If C1(i) mod τe(i)=0, reset ECS(i) as follows: C1(i)=0, C2(i)++, xe(i)=xe0(i)=(xe0(i)+x+) mod 2L. If C2(i) mod τe(i)=0, reset ECS(i): C1(i)=C2(i)=0, pe(i)=pe0(i)=(pe0(i)+p+) mod 2L. Reconstruct: Assume the total number of L-bit cipher-blocks Before the cipher-cluster is Il. We can reconstruct all 2n ECS-es within considerable maximal time-out.

CVES/RRS-CVES – Configuration L: Since the key space is 22L, L should be large enough to provide high security. L=32 or 64 is suggested. n: Apparently, the realization complexity has positive relation with n. So n can not be too large, and we suggest n=8. The Cluster Size: It can slightly adjust the speed. m and τmin: We suggest m≤n and τmin≥2n/2 to reduce the maximal time-out of RRS-CVES. The Chaotic Maps: We suggest using the PLCM in [27,28].

CVES – Performance: Speed Assume all ECS-es and CCS are based on the PLCM in [27, 28], and the cluster size is fixed: Pmax·L bits. Hardware - Assume the basic clock frequency is fb MHz and the time consuming by the sorter is τs clock cycles, the speed of CVES will be fb/(1+1/n+τs/(Pmax·L)) Mbps, which is faster than most conventional ciphers. 2) Software - The speed under WindowsTM OS is tested with Visual C++. The speed is about 1/10 of the CPU frequency (60Mbps on a 667MHz Pentium®III PC). Such a speed is rather high for a software cipher. 3) The initialization consumes not too much time, and the maximal time-out of RRS-CVES is not too large.

CVES – Performance: Security Essentially features to avoid potential attacks: a) The independent 2n+1 digital chaotic systems. b) The different pseudo-random S-Box for different cluster. c) The product of the stream cipher and the block cipher. Cryptographic properties: a) Balance; b) Avalanche property. Stream sub-cipher: Huge cycle length; Block sub-cipher: Perfect pseudo-random S-Boxes with equiprobable and symmetric distribution.

CVES – Performance: Realization Complexity and Experiments Realization Complexity: One L-bit digital dividers, a 2n×2n sorter, two perturbing m-LFSR-s, and some memory units (not too many). Experiments: See the following figures. For a uncompressed digital video, we test the practical performance of CVES. In Fig. 2, we give the comparison of one plain-frame and the cipher- frame. We can see the plain-image is encrypted to a cipher-image with uniform histogram, which implies CVES is perfect.