Transmission Security via Fast Time-Frequency Hopping

Slides:



Advertisements
Similar presentations
Transmission Security via Fast Time-Frequency Hopping PI: Eli Yablanovich Co-PIs: Rick Wesel Ingrid Verbauwhede Ming Wu Bahram Jalali UCLA Electrical.
Advertisements

“Advanced Encryption Standard” & “Modes of Operation”
Spread Spectrum Chapter 7.
Spread Spectrum Chapter 7. Spread Spectrum Input is fed into a channel encoder Produces analog signal with narrow bandwidth Signal is further modulated.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
Point-to-Point Privacy Protect the privacy of a point-to-point communication between Alice and Bob assuming that an eavesdropper (Eve) has access to the.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 5 Wenbing Zhao Department of Electrical and Computer Engineering.
Computer Networking Lecture 21: Security and Cryptography Thanks to various folks from , semester’s past and others.
1 CMPT 371 Data Communications and Networking Spread Spectrum.
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Practical Techniques for Searches on Encrypted Data Yongdae Kim Written by Song, Wagner, Perrig.
Techniques for Transmission Security via Fast Hopping in the Time-Frequency Grid PI’s: Eli Yablanovich Rick Wesel Ingrid Verbauwhede Ming Wu Bahram Jalali.
Códigos y Criptografía Francisco Rodríguez Henríquez A Short Introduction to Stream Ciphers.
A Unified Understanding of the Many Forms of Optical Code Division Multiplexing Eli Yablonovitch Rick Wesel Bahram Jalali Ming Wu Ingrid Verbauwhede Can.
One-Time Pad Or Vernam Cipher Sayed Mahdi Mohammad Hasanzadeh Spring 2004.
Chapter 20 Symmetric Encryption and Message Confidentiality.
1 A Randomized Space-Time Transmission Scheme for Secret-Key Agreement Xiaohua (Edward) Li 1, Mo Chen 1 and E. Paul Ratazzi 2 1 Department of Electrical.
Network Security David Lazăr.
CRYPTANALYSIS OF STREAM CIPHER Bimal K Roy Cryptology Research Group Indian Statistical Institute Kolkata.
Public / Private Keys was a big year… DES: Adopted as an encryption standard by the US government. It was an open standard. The NSA calls it “One.
Uncoordinated Optical Multiple Access using IDMA and Nonlinear TCM PIs: Eli Yablanovitch, Rick Wesel, Ingrid Verbauwhede, Bahram Jalali, Ming Wu Students.
Transmission Security via Fast Time-Frequency Hopping PI: Eli Yablanovich Co-PIs: Rick Wesel Ingrid Verbauwhede Ming Wu Bahram Jalali UCLA Electrical.
Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Spread Spectrum Chapter.
Design of OCDMA Demonstrator Yun Ping Yang, Alireza Hodjat, Herwin Chan, Eric Chen, Josh Conway.
PROJECT DOMAIN : NETWORK SECURITY Project Members : M.Ananda Vadivelan & E.Kalaivanan Department of Computer Science.
Modes of Operation block ciphers encrypt fixed size blocks – eg. DES encrypts 64-bit blocks with 56-bit key need some way to en/decrypt arbitrary amounts.
IT-101 Section 001 Lecture #15 Introduction to Information Technology.
CS480 Cryptography and Information Security
Public Key Cryptography
Computer and Network Security
IT443 – Network Security Administration Instructor: Bo Sheng
40Gb/s & 100Gb/s Transport in the WAN October 10, 2007
KOMUNIKASI DATA Materi Pertemuan 10.
DIRECT SEQUENCE SPREAD SPECTRUM WITH FREQUENCY HOPPING
UCLA Progress Report OCDMA Channel Coding
Basic Encryption Methods
Spread Spectrum Chapter 7.
Vernam Cipher Group Members: Muhammad Awais Muhammad Hasnain khan
Cryptography.
Unit -1.
Chapter 4: Digital Transmission
Interleaver-Division Multiple Access on the OR Channel
Spread Spectrum L.Tahani Aljehani.
Quantum Key Distribution
Lecture 4 Continuation of transmission basics Chapter 3, pages 75-96
Cryptography Lecture 4.
مروري برالگوريتمهاي رمز متقارن(كليد پنهان)
Security through Encryption
PART VII Security.
UCLA Electrical Engineering Department
UCLA Electrical Engineering Department
STREAM CIPHERS by Jennifer Seberry.
Algorithm Types & Algorithm Modes
Security Of Wireless Sensor Networks
Block vs Stream Ciphers
Chapter Nine: Data Transmission
ADVANCED ENCRYPTION STANDARDADVANCED ENCRYPTION STANDARD
Cryptography and Network Security Chapter 7
Spread Spectrum Chapter 7.
SYMMETRIC ENCRYPTION.
Block Ciphers (Crypto 2)
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
Security of Wireless Sensor Networks
Uncoordinated Optical Multiple Access using IDMA and Nonlinear TCM
Slide design: Dr. Mark L. Hornick
Cryptography Lecture 3.
40Gb/s & 100Gb/s Transport in the WAN October 10, 2007
Security in Wide Area Networks
Presentation transcript:

Transmission Security via Fast Time-Frequency Hopping PI: Eli Yablanovich Co-PIs: Rick Wesel Ingrid Verbauwhede Ming Wu Bahram Jalali UCLA Electrical Engineering Department

Four users, each with four bits Alice’s Data: A1, A2, A3, A4 Bob’s Data: B1, B2, B3, B4 Carol’s Data: C1, C2, C3, C4 Dave’s Data: D1, D2, D3, D4

Random Hopping on a Time-Wavelength Grid A user appears on zero, one, or more wavelengths each symbol. Users select positions in grid in an unpredictable fashion. A1 D2 C1 D4 Wavelength 1 A2 C2 C3 B1 Wavelength 2 D1 A4 D3 B2 Wavelength 3 C4 A3 B3 B4 Wavelength 4 Time

Grid-to-Grid Mapping is a Switch 1616 Switch A1 A2 A3 A4 B1 B2 B3 B4 C1 C2 C3 C4 D1 D2 D3 D4 A1 D2 C1 D4 A2 C2 C3 B1 D1 A4 D3 B2 C4 A3 B3 B4 User Wavelength Bit Index Time There are 16! possible configurations of this switch. The switch configuration may be specified by log2(16!)=44.25 bits

Grid-to-Grid Mapping is a Switch 1616 Switch 16 Users (A-P) Wavelength Switch also supports 16 users on 16 wavelengths with wavelength-only hopping at a total rate of 10 Gbps.

A Pipelined Switch There are 16! possible configurations (44.25 bits). Code bit = 0 Code bit = 1 There are 16! possible configurations (44.25 bits). There are 56 switches, but four can be fixed so that 52 bits specify the configuration. Thinking about future feasibility, for a 100100 switch, not all switch positions need to be randomized.

Four Switches Taking Turns 155MHz 2.5Gbps 2.5Gbps 1:16 16X16 Switch 16:1 User 1 Modulator Each 16X16 switch (the blue box) runs at 155 MHz, which is ¼ times 1/16 times 10 GHz. l1 1:16 16X16 Switch 16:1 User 2 Modulator l2 4:1 1:16 16X16 Switch 16:1 User 3 Modulator l3 1:16 16X16 Switch 16:1 User 4 Modulator l4 Pat. Gen 1:16 16:1 Serializer de-Serializer

The Big Picture 1616 Switch Advanced Encryption Standard User Wavelength Bit Index Time We need 52 bits or 9 Gbits/sec (We can do about 20 Gbits/sec) Advanced Encryption Standard Random bit generator (initially just a linear feedback shift register)

What Kinds of Security Are Possible? Security by Obscurity This is no security at all. Obscurity is fleeting. Security by computational difficulty Standardized systems like DES and AES rely on this. Must consider attacks where plain-text is known. The one-time pad that nobody else knows Perfect as long as the pad remains secret.

Hopping versus Spreading Our technique focuses on the addition of cryptographic security in the context of relatively straightforward frequency-hopped CDMA. Certainly, similar techniques could be applied to the other OCDMA techniques described during this meeting. However, in every case, the real security comes from (high speed) cryptographic security rather than obscure optical techniques.

Network Security Most sophisticated security techniques add security at the source only (application layer). Our technique adds security at the physical layer (or at the network layer).

Why Have Network Security? Increase the difficulty of attack, even with plaintext available. (The ciphertext of an individual stream is now difficult to receive.) Adds security with minimal latency (the latency inherent in the timespan of the permutation) because AES processing is not in the real-time path..

Synchronous vs. Asynchronous Our original vision was for a system with 100% spectral efficiency (assuming dense wavelength packing), but with synchronous operation (and a universally known key) as a requirement. However, our system concept can easily trade spectral efficiency to operate asynchronously. In this case each transmitter can have it’s own key. When overhead is low, collisions are rare, and may be handled by a light error correction code. In one scenario 5% spectral efficiency yields a 1% bit error rate.