HSC: Building Stream Cipher from Secure Hash Functions Juncao Li Nov. 29 th 2007 Department of Computer Science Portland State University.

Slides:



Advertisements
Similar presentations
Block Cipher Modes of Operation and Stream Ciphers
Advertisements

Lecture 5: Cryptographic Hashes
“Advanced Encryption Standard” & “Modes of Operation”
1 Introduction to Practical Cryptography Lectures 3/4 Stream Ciphers.
An Introduction to Stream Ciphers Zahra Ahmadian Electrical Engineering Department Sahrif University of Technology
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
CIS 5371 Cryptography 3b. Pseudorandomness.
Block Ciphers and the Data Encryption Standard
Cryptography and Network Security
CS457 – Introduction to Information Systems Security Cryptography 1b Elias Athanasopoulos
 Stream ciphers o Encrypt chars/bits one at a time o Assume XOR w the key, need long key to be secure  Keystream generators (pseudo-random key) o Synchronous.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown and edited by Archana Chidanandan Cryptographic Tools.
CMSC 456 Introduction to Cryptography
CMSC 414 Computer and Network Security Lecture 4 Jonathan Katz.
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 5 Wenbing Zhao Department of Electrical and Computer Engineering.
1 Constructing Pseudo-Random Permutations with a Prescribed Structure Moni Naor Weizmann Institute Omer Reingold AT&T Research.
Hash Functions Nathanael Paul Oct. 9, Hash Functions: Introduction Cryptographic hash functions –Input – any length –Output – fixed length –H(x)
Lecture 23 Symmetric Encryption
Computer Security CS 426 Lecture 3
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Block and Stream Ciphers1 Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
Lecture 3: Cryptographic Tools modified from slides of Lawrie Brown.
© Neeraj Suri EU-NSF ICT March 2006 DEWSNet Dependable Embedded Wired/Wireless Networks MUET Jamshoro Computer Security: Principles and Practice Slides.
Códigos y Criptografía Francisco Rodríguez Henríquez A Short Introduction to Stream Ciphers.
Slide 1 Stream Ciphers uBlock ciphers generate ciphertext Ciphertext(Key,Message)=Message  Key Key must be a random bit sequence as long as message uIdea:
One-Time Pad Or Vernam Cipher Sayed Mahdi Mohammad Hasanzadeh Spring 2004.
Chapter 20 Symmetric Encryption and Message Confidentiality.
CS555Spring 2012/Topic 51 Cryptography CS 555 Topic 5: Pseudorandomness and Stream Ciphers.
Stream Ciphers Making the one-time pad practical.
Chapter 20 Symmetric Encryption and Message Confidentiality.
1 Hashes and Message Digests. 2 Hash Also known as –Message digest –One-way function Function: input message -> output One-way: d=h(m), but not h’(d)
Hashing Algorithms: Basic Concepts and SHA-2 CSCI 5857: Encoding and Encryption.
Stream Cipher July 2011.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
3DES and Block Cipher Modes of Operation CSE 651: Introduction to Network Security.
Chapter 9: Algorithms Types and Modes Dulal C. Kar Based on Schneier.
Encryption Types & Modes Chapter 9 Encryption Types –Stream Ciphers –Block Ciphers Encryption Modes –ECB - Electronic Codebook –CBC - Cipher Block Chaining.
Part 9, Basic Cryptography 1. Introduction A cryptosystem is a tuple: ( M,K,C, E,D) where M is the set of plaintexts K the set of keys C the set of ciphertexts.
Dr. Reuven Aviv, Nov 2008 Conventional Encryption 1 Conventional Encryption & Message Confidentiality Acknowledgements for slides Henric Johnson Blekinge.
Modes of Usage Dan Fleck CS 469: Security Engineering These slides are modified with permission from Bill Young (Univ of Texas) 11 Coming up: Modes of.
1 Symmetric-Key Encryption CSE 5351: Introduction to Cryptography Reading assignment: Chapter 3 Read sections first (skipping 3.2.2)
15-499Page :Algorithms and Applications Cryptography I – Introduction – Terminology – Some primitives – Some protocols.
Class 3 Cryptography Refresher II CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman
Lecture 23 Symmetric Encryption
1 Symmetric-Key Encryption CSE 5351: Introduction to Cryptography Reading assignment: Chapter 2 Chapter 3 (sections ) You may skip proofs, but are.
Giuseppe Bianchi Warm-up example WEP. Giuseppe Bianchi WEP lessons  Good cipher is far from being enough  You must make good USAGE of cipher.
Wired Equivalent Privacy (WEP) Chris Overcash. Contents What is WEP? What is WEP? How is it implemented? How is it implemented? Why is it insecure? Why.
University of Malawi, Chancellor College
1 A New Weakness in the RC4 Keystream Generator and an Approach to Improve the Security of the Cipher Souradyuti Paul and Bart Preneel K.U. Leuven, ESAT/COSIC.
Lecture 9 Overview. RSA Invented by Cocks (GCHQ), independently, by Rivest, Shamir and Adleman (MIT) Two keys e and d used for Encryption and Decryption.
Slide 1 Vitaly Shmatikov CS 378 Stream Ciphers. slide 2 Stream Ciphers uRemember one-time pad? Ciphertext(Key,Message)=Message  Key Key must be a random.
Wireless LAN Security Daniel Reichle Seminar Security Protocols and Applications SS2003.
หัวข้อบรรยาย Stream cipher RC4 WEP (in)security LFSR CSS (in)security.
Block Cipher Modes Last Updated: Aug 25, ECB Mode Electronic Code Book Divide the plaintext into fixed-size blocks Encrypt/Decrypt each block independently.
Wireless Security Ian Bodley.
Cryptography Lecture 16.
STREAM CIPHERS by Jennifer Seberry.
Symmetric-Key Encryption
Stream Cipher Structure
Secret-Key Encryption
By: Anthony Gervasi & Adam Dickinson
Presentation transcript:

HSC: Building Stream Cipher from Secure Hash Functions Juncao Li Nov. 29 th 2007 Department of Computer Science Portland State University

Portland State University Nov. 29th Agenda Introduction to the Stream Cipher Security of the Stream Cipher Construction of the Hashing Stream Cipher Analysis of the HSC

Portland State University Nov. 29th Agenda Introduction to the Stream Cipher Security of the Stream Cipher Construction of the Hashing Stream Cipher Analysis of the HSC

Portland State University Nov. 29th Introduction: Stream Cipher Symmetric Cipher Encryption/Decryption Scheme –Take a Key and an IV (optional) –Generate a pseudorandom keystream(pad) –XOR the pad with the plaintext like onetime pad

Portland State University Nov. 29th Stream Cipher: types State Cipher –Maintains an internal state –Based on which, the keystream is generated –Usually, the internal state is kept secrete –As large as possible

Portland State University Nov. 29th Stream Cipher: types Synchronous –The state changes independently of the plaintext or ciphertext –RC4 –Non-error-propagation –Keep synchronized Self-synchronizing stream ciphers –Previous ciphertext digits are used to compute the keystream –CFB: a block cipher in cipher-feedback mode (CFB) –Input to the generator is partially exposed –Limitation of the analyzability: keystream depends on the messages

Portland State University Nov. 29th Agenda Introduction to the Stream Cipher Security of the Stream Cipher Construction of the Hashing Stream Cipher Analysis of the HSC

Portland State University Nov. 29th Security analysis: goal Hard to guess next bit of the keystream generator with some probability: better than random guessing –About the appearance of the keystream –Noticeable more 1s than 0s in the keystream Hard to reproduce the keystream from the keystream that we already have –About the inherent complexity of the keystream –Existence of the short period

Portland State University Nov. 29th Formal security support Theoretical support –Yao’s work: a pseudo-random generator could be 'effciently' predicted if, and only if, the generator could be 'effciently' distinguished from a perfectly random source.

Portland State University Nov. 29th Security in appearance Security measures in appearance –Long period A keystream generator can be modeled by a finite state machine Eventually some states will repeat which lead to a period –Statistical measures Have the appearance of (periodic) pseudo-random sequences –Complexity

Portland State University Nov. 29th Agenda Definition of the Stream Cipher Security of the Stream Cipher Construction of the Hashing Stream Cipher Analysis of the HSC

Portland State University Nov. 29th HSC It’s a synchronous streamcipher It takes an IV and a random Key as input Define –Original Vector: OV = Key || IV –Increasing Factor:, where is byte accumulation, and i is public. If IF = 0, set IF = 1 –Keystream Block:, where KB n represents n th keystream block

Portland State University Nov. 29th HSC: Framework

Portland State University Nov. 29th Intuitions: why HSC Hash function is easy to find –Easy to implement our scheme based on the existing systems We can prove the security of HSC based on the security of Cryptographic Hash functions

Portland State University Nov. 29th Agenda Introduction to the Stream Cipher Security of the Stream Cipher Construction of the Hashing Stream Cipher Analysis of the HSC

Portland State University Nov. 29th Secure analysis on HSC: Period Period –Ideally, no period if the core hash function is collision-resistant –Assume there’s a m bits period, we can find the collision every m/n iterations

Portland State University Nov. 29th Secure analysis on HSC: Period –But… the inner state has a limitation due to the implementation –Configurable inner state size –The inner state size depends on the limitation of the hash function input size – –Which is huge!

Portland State University Nov. 29th Secure analysis on HSC: Indistinguishability Indistinguishability of the keystream from the random stream –The distribution of the keystream depends on the IV and Key

Portland State University Nov. 29th Secure analysis on HSC: Indistinguishability –Assumption 1: if the input of the hash function is random, the output should be random, or have a random distribution –Every individual keystream block should look random, given the randomness of the key and the security of the hash function. –Otherwise, we can find an easier way to invert the one-way function by analyzing the non- uniform distribution of the output

Portland State University Nov. 29th Secure analysis on HSC: Indistinguishability –Assumption 2: if the inputs of the hash function are different, but correlated, the outputs of a good hash function should at least have a good statistical distribution –Global view of the keystream blocks –Collision-resistance guarantees that keystream blocks are statistically different

Portland State University Nov. 29th Secure analysis on HSC: Indistinguishability –Almost no one can guarantee there’s no correlation in their keystream –That’s why inner state should be kept secrete –That’s why we are using

Portland State University Nov. 29th Secure analysis on HSC: Information theory Information theory -- Entropy –The larger entropy of the keystream the better –Entropy comes from: IV and Key –The hash function will guarantee the entropy of each stream block: min(|key|, |digest|) –IF will spread the key entropy to the whole keystream

Portland State University Nov. 29th Secure analysis on HSC: Statistical analysis Three statistical test from the NIST standard –SHA-1, Key length 64 bytes, IV 16 bytes, and IF 1 byte –1000 times test on 10 MB keystream. Threshold: –1GB HSC costs 92,312ms , RC4 costs 30,047ms HSC Frequency Runs Cumulative RC Frequency . . Runs . . Cumulative . .

Portland State University Nov. 29th References Stream Ciphers, RSA Laboratories Technical Report TR-701, Version 2.0, M.J.B. Robshaw, July 25, 1995 Stream Cipher Design -- An evaluation of the eSTREAM candidate Polar Bear, JOHN MATTSSON, Master of Science Thesis, Stockholm, Sweden 2006 On the Role of the Inner State Size in Stream Ciphers, Erik Zenner, Reihe Informatik Attacks on RC4 and WEP, Scott Fluhrer, Itsik Mantin, Adi Shamir CHOSEN-IV STATISTICAL ATTACKS ON eSTREAM CIPHERS, Markku-Juhani O Saarinen. Yong Zhang, Xiamu Niu, Juncao Li, and Chunming Li. Research on a novel Hashing Stream Cipher. In Proc. of CIS 2006, Guangzhou, China, November 3-6, 2006

Portland State University Nov. 29th Thanks Questions?

Portland State University Nov. 29th Secure analysis on HSC: Information theory Information theory -- Entropy –The larger entropy of the keystream the better –Entropy comes from: IV and Key –But the IF will spread the entropy to the whole keystream –This may lead to a better explanation of our construction

Portland State University Nov. 29th Secure analysis on HSC: Information theory Information theory -- Entropy –Why hash functions? – we want to shrink –The larger entropy of the keystream the better –Entropy come from: IV and Key –If |OV| > |Hash digest|, entropy loses on each keystream block. –But the IF will spread the entropy to the whole keystream –This may lead to a better explanation of our construction