Network Traffic Randomness for Cryptographic Purposes

Slides:



Advertisements
Similar presentations
Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
Advertisements

Networks and TCP/IP Part 2. PORTS Ports – What and Why are They?  Typically: Computers usually have only one network access point to the internet 
Random Number Generation Graham Netherton Logan Stelly.
Materials for Lecture 11 Chapters 3 and 6 Chapter 16 Section 4.0 and 5.0 Lecture 11 Pseudo Random LHC.xls Lecture 11 Validation Tests.xls Next 4 slides.
BAYESIAN INFERENCE Sampling techniques
Internet Control Message Protocol (ICMP)
CPSC 441 Tutorial - Network Tools 1 Network Tools CPSC 441 – Computer Communications Tutorial.
Stream cipher diagram + + Recall: One-time pad in Chap. 2.
Evolutionary Feature Extraction for SAR Air to Ground Moving Target Recognition – a Statistical Approach Evolving Hardware Dr. Janusz Starzyk Ohio University.
Genetic Algorithms Can Be Used To Obtain Good Linear Congruential Generators Presented by Ben Sproat.
CPSC 441 TUTORIAL – MARCH 7, 2012 TA: MARYAM ELAHI NETWORK TOOLS.
15-853Page :Algorithms in the Real World Generating Random and Pseudorandom Numbers.
Efficient Pseudo-Random Number Generation for Monte-Carlo Simulations Using GPU Siddhant Mohanty, Subho Shankar Banerjee, Dushyant Goyal, Ajit Mohanty.
1 ICMP : Internet Control Message Protocol Computer Network System Sirak Kaewjamnong.
Connecting Networks © 2004 Cisco Systems, Inc. All rights reserved. Defining the IP Packet Delivery Process INTRO v2.0—4-1.
Pseudorandom Number Generators. Randomness and Security Many cryptographic protocols require the parties to generate random numbers. All the hashing algorithms.
Entropy of Keys and Password Generation Introduction to entropy Entropy and data compression Predictability of random number generation Entropy and system.
1 Linux Networking Lal Paul IP Addressing & Routing By Lal Paul Systems Administrator CIRM, CUSAT IP Addressing & Routing By Lal Paul Systems Administrator.
Traceroute Ping. Shows the path a packet of information takes from your computer to one you specify. Lists all the routers it passes through until it.
CCNA Introduction to Networking 5.0 Rick Graziani Cabrillo College
TCP/IP Protocol Suite 1 Chapter 9 Upon completion you will be able to: Internet Control Message Protocol Be familiar with the ICMP message format Know.
Guide to TCP/IP, Third Edition
21.1 Chapter 21 Network Layer: Address Mapping, Error Reporting, and Multicasting Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Cryptography and Network Security Chapter 7 Fifth Edition by William Stallings.
Random Numbers CSE 331 Section 2 James Daly. Randomness Most algorithms we’ve talked about have been deterministic The same inputs always give the same.
CS 521 Computational Science 1 Random Numbers and Monte Carlo Methods Charles Erwin and Jay Hatcher.
IP Forwarding.
Fall 2005Computer Networks20-1 Chapter 20. Network Layer Protocols: ARP, IPv4, ICMPv4, IPv6, and ICMPv ARP 20.2 IP 20.3 ICMP 20.4 IPv6.
Network Security Lecture 19 Presented by: Dr. Munam Ali Shah.
© Jörg Liebeherr (modified by M. Veeraraghavan) 1 ICMP: A helper protocol to IP The Internet Control Message Protocol (ICMP) is the protocol used for error.
Guide to TCP/IP, Second Edition1 Guide To TCP/IP, Second Edition Chapter 4 Internet Control Message Protocol (ICMP)
Statistical Methods Statistical Methods Descriptive Inferential
1 Towards trapping wily intruders in the large Glenn Mansfield, Kohei Ohta, Yohsuke Takei, Nei Kato, Yoshiaki Nemoto Cyber Solutions Inc., Tohoku University.
1 Internet Control Message Protocol (ICMP) Used to send error and control messages. It is a necessary part of the TCP/IP suite. It is above the IP module.
Hit-and-Miss (or Rejection) Monte Carlo Method: a “brute-force” method based on completely random sampling Then, how do we throw the stones and count them.
Chapter 7 Confidentiality Using Symmetric Encryption.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
1.1 Statistical Analysis. Learning Goals: Basic Statistics Data is best demonstrated visually in a graph form with clearly labeled axes and a concise.
Introduction to Perl October 4, 2004 Class Meeting 7 * Notes on Perl by Lenwood Heath, Virginia Tech © 2004.
INTRODUCTION The Internet has given the opportunity to share findings and distribute knowledge from experts regardless of time and place. Communication.
Network Performance.
Internet Control Message Protocol (ICMP). ICMP Internet Control Message Protocol –IP is the delivery standard at the TCP/IP internet layer –ICMP is the.
EMIS 7300 SYSTEMS ANALYSIS METHODS FALL 2005 Dr. John Lipp Copyright © 2005 Dr. John Lipp.
Bootstrapping James G. Anderson, Ph.D. Purdue University.
WTG – Wireless Traffic Generator Presented by: Lilach Givaty Supervised by: Dr. Yehuda Ben-Shimol, Shlomi Atias.
10.Deterministic Randomness 1.Random Sequences Random Sequences A sequence of numbers r 1, r 2,... is random if there are no discernible patterns.
Lecture#6:Connectivity Verification
Confidence Intervals Cont.
COMPUTER NETWORKS CS610 Lecture-33 Hammad Khalid Khan.
Chapter 13 Created by Bethany Stubbe and Stephan Kogitz.
Lecture#7:Connectivity Verification
STOCHASTIC REGRESSORS AND THE METHOD OF INSTRUMENTAL VARIABLES
Internet Control Message Protocol (ICMP)
Basic Concepts of Audio Watermarking
Quantitative Methods PSY302 Quiz 6 Confidence Intervals
الأستاذ المساعد بقسم المناهج وطرق التدريس
Basic Statistical Terms
NET 536 Network Security Lab 1: TCP IP Attacks
Lecture#6:Connectivity Verification
Homework #5 — Monte Carlo Simulation
Internet Control Message Protocol
Determining Airfoil Self-Noise Levels
 Candidate NCSs  Control Strategies Introduction DCS Structure
Generating Random and Pseudorandom Numbers
Generating Random and Pseudorandom Numbers
Internet Control Message Protocol
Pseudorandom Numbers Network Security.
Stream Cipher Structure
TCP/IP Protocol Suite 1 Chapter 9 Upon completion you will be able to: Internet Control Message Protocol Be familiar with the ICMP message format Know.
Presentation transcript:

Network Traffic Randomness for Cryptographic Purposes Nathaniel Puffer James Madison University CS 627 Dr. Charles Abzug April 30, 2002

Purpose To determine if ICMP Echo Request (PING) RTT can be used as a random seed for One Time Keypads RFC 1750, Randomness Recommendations for Security

Concept The state of the internet is in constant flux Non repeatable states “Best Effort” delivery Unpredictable RTT

Gathering Data 1000 interations Localhost UVa. UCLA RAND() Radio Noise

Raw Data icmp_seq=46 ttl=239 time=85.260 ms 64 bytes from 169.232.33.130: icmp_seq=54 ttl=239 time=88.998 ms 64 bytes from 169.232.33.130: icmp_seq=55 ttl=239 time=81.935 ms 64 bytes from 169.232.33.130: icmp_seq=56 ttl=239 time=82.076 ms 64 bytes from 169.232.33.130: icmp_seq=57 ttl=239 time=90.000 ms

Manipulating Data Excel Data Block 92981853438873251392103622804762327579065952763872556655454478779613905638458471205735266172977805226225029874484188485154752752299143958188366392579234485445865829626511486099011193120554586076832091698122241415205075304171395751384791158849302632

ENT Entropy Compression Chi Square Arithmetic Mean Monte Carlo Pi Approximation Serial Correlation Coefficient

Sample ENT Entropy = 7.980627 bits per character. Optimum compression would reduce the size of this 51768 character file by 0 percent. Chi square distribution for 51768 samples is 1542.26, and randomly would exceed this value 0.01 percent of the times. Arithmetic mean value of data bytes is 125.93 (127.5 = random). Monte Carlo value for Pi is 3.169834647 (error 0.90 percent). Serial correlation coefficient is 0.004249 (totally uncorrelated = 0.0).

Chi Square Targets n < 1% not random 5% < n < 1% suspect almost suspect 90% < n < 10% random 95% < n < 90% 99% < n < 95% n > 99%

ENT Interpretations Entropy; > 5 bits per character Compression; 0 Arithmetic Mean; .5 Monte Carlo Pi Approximation; 3.1415 Serial Correlation Coefficient; 0

ENT Results Data Set Entropy Compression Chi Square Arithmetic Mean Monte Carlo SCC localhost 0.990924 0.00% 0.01 0.444 4 0.016484 UVA 0.991358 0.4453 0.014082 UCLA 0.993697 0.4533 0.007695 RAND() 0.990958 0.4441 0.028486 Random.org

Graphical Analysis Bar chart of each data set to show any possible trends

Discussion ENT results inconclusive Graphical Banding Insufficient data set Byte structure Graphical Banding Further study for correlations in banding

Conclusion Security requires affirmative results ENT results inconclusive Graphical banding suspicious PING cannot be used for One Time Keypad seed

References Haahr, Mads. Random.org. http://www.random.org/essay.html. Last Visited, April 20, 2002. Schiller, Crocker, Eastlake. RFC 1750, Randomness Recommendations for Security. http://www.cis.ohio-state.edu/cgi-bin/rfc/rfc1750.html. Last Visited, April 20, 2002. Walker, John. Pseudorandom Number Sequence Test Program. http://www.fourmilab.ch/random/. Last Visited, April 20, 2002.