1/17 Bluetooth Security Ain Shams University Faculty of Engineering Integrated Circuits Lab Presented by: Mohammed Abdelsattar Ismail Sameh Talal Magd-El-Din.

Slides:



Advertisements
Similar presentations
Ain Shams University Faculty of Engineering Integrated Circuits Lab VLSI Design and Implementation of ASICs for the Security Core of BLUETOOTH Wireless.
Advertisements

Siyang Tian. TOPIC 1.SIM CARD card embedded with subscriber identity module 2. 3G network 3rd generation mobile telecommunications.
“Advanced Encryption Standard” & “Modes of Operation”
GSM network and its privacy Thomas Stockinger. Overview Why privacy and security? GSM network‘s fundamentals Basic communication Authentication Key generation.
CS470, A.SelcukStream Ciphers1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Modern Symmetric-Key Ciphers
Syed Safi Uddin Qadri BETL/F07/0112 GSM Stream Cipher Algorithm Presented To Sir Adnan Ahmed Siddiqui.
Dan Boneh Stream ciphers Real-world Stream Ciphers Online Cryptography Course Dan Boneh.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
1 CIS 5371 Cryptography 5b. Pseudorandom Objects in Practice Block Ciphers.
Digital Kommunikationselektroink TNE027 Lecture 6 (Cryptography) 1 Cryptography Algorithms Symmetric and Asymmetric Cryptography Algorithms Data Stream.
Cryptography and Network Security Chapter 3
Block Ciphers and the Data Encryption Standard
Cryptography and Network Security
Rachana Y. Patil 1 Data Encryption Standard (DES) (DES)
1 The AES block cipher Niels Ferguson. 2 What is it? Block cipher: encrypts fixed-size blocks. Design by two Belgians. Chosen from 15 entries in a competition.
1 Pertemuan 07 Enkripsi Simetrik Kontemporer Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Chapter 5 Cryptography Protecting principals communication in systems.
Akelarre 1 Akelarre Akelarre 2 Akelarre  Block cipher  Combines features of 2 strong ciphers o IDEA — “mixed mode” arithmetic o RC5 — keyed rotations.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 5 Wenbing Zhao Department of Electrical and Computer Engineering.
1 Chapter 3 – Block Ciphers and the Data Encryption Standard Modern Block Ciphers  now look at modern block ciphers  one of the most widely used types.
1 Chapter 3 – Block Ciphers and the Data Encryption Standard Modern Block Ciphers  now look at modern block ciphers  one of the most widely used types.
Secure Systems Design Ramesh Karri Office Hours: Tues/Wed/Thurs: 12:00- 1:30 in LC 001
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 5 Wenbing Zhao Department of Electrical and Computer Engineering.
J. Wang. Computer Network Security Theory and Practice. Springer 2008 Chapter 6 Wireless Network Security Part II.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Lecture 23 Symmetric Encryption
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Chapter 2 (D) – Contemporary Symmetric Ciphers "I am fairly familiar with all the forms of secret writings, and am myself the author of a trifling monograph.
Encryption Schemes Second Pass Brice Toth 21 November 2001.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Data Encryption Standard (DES). Symmetric Cryptography  C = E(P,K)  P = D(C,K)  Requirements  Given C, the only way to obtain P should be with  the.
Dr. Khalid A. Kaabneh Amman Arab University
University of Virginia 1 Gregory LammGerlando Falauto Jorge EstradaJag Gadiyaram November 29, 2000 Identifying and Assessing Security Issues related to.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Chapter 20 Symmetric Encryption and Message Confidentiality.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
Cryptography and Network Security
Cryptography Team Presentation 2
Chapter 9: Algorithms Types and Modes Dulal C. Kar Based on Schneier.
Data Encryption Standard (DES) © 2000 Gregory Kesden.
Dr. Reuven Aviv, Nov 2008 Conventional Encryption 1 Conventional Encryption & Message Confidentiality Acknowledgements for slides Henric Johnson Blekinge.
Modes of Usage Dan Fleck CS 469: Security Engineering These slides are modified with permission from Bill Young (Univ of Texas) 11 Coming up: Modes of.
Modes of Operation INSTRUCTOR: DANIA ALOMAR. Modes of Operation A block cipher can be used in various methods for data encryption and decryption; these.
Stream Ciphers and Block Ciphers A stream cipher is one that encrypts a digital data stream one bit or one byte at a time. Examples of classical stream.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Lecture 23 Symmetric Encryption
Overview of the security weaknesses in Bluetooth Dave Singelée COSIC seminar 11/06/2003.
Chapter 2 Symmetric Encryption.
Homework #1 J. H. Wang Oct. 2, 2013.
Dr. Lo’ai Tawalbeh summer 2007 Chapter 6: Contemporary Symmetric Ciphers Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus INCS.
Cipher Transmission and Storage Modes Part 2: Stream Cipher Modes CSCI 5857: Encoding and Encryption.
Module :MA3036NI Symmetric Encryption -3 Lecture Week 4.
Block Ciphers and the Data Encryption Standard. Modern Block Ciphers  One of the most widely used types of cryptographic algorithms  Used in symmetric.
CST 312 Pablo Breuer. A block of plaintext is treated as a whole and used to produce a ciphertext block of equal length Typically a block size of 64 or.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
1 CPCS425: Information Security (Topic 5) Topic 5  Symmetrical Cryptography  Understand the principles of modern symmetric (conventional) cryptography.
หัวข้อบรรยาย Stream cipher RC4 WEP (in)security LFSR CSS (in)security.
Implementation of IDEA on a Reconfigurable Computer
Unit 2 “Implementation of a RC5 block cipher algorithm and implementing an attack on it”
Cryptography Team Presentation 1
ADVANCED ENCRYPTION STANDARDADVANCED ENCRYPTION STANDARD
Block Ciphers: DES and AES
Block Ciphers (Crypto 2)
Information and Computer Security CPIS 312 Lab 4 & 5
Presentation transcript:

1/17 Bluetooth Security Ain Shams University Faculty of Engineering Integrated Circuits Lab Presented by: Mohammed Abdelsattar Ismail Sameh Talal Magd-El-Din Sameh Assem Ibrahim Ahmed Abdelhamid Saleh

Bluetooth Security 2/17 5-February Overview -Blocks used -Weakness -Authentication -E 1 algorithm -Key handling -E 3 -E 2 -SAFER+ -Round -Key Schedule -Implementation -Encryption -modes -Key Reduction -Engine (E 0 ) -Timing -PRNG EncryptionAuthentication Challenge-Response Scheme SAFER+ Needed for encryption Optional Symmetric Stream Cipher Negotiable Key Size (8-128 bits)

Bluetooth Security 3/17 5-February-2001 E 21 E 22 E2E2 PIN or Random Number Random number K init or K master K unit or K combination Link Keys E0E0 E3E3 E1E1 Authentication KcKc K cipher Encryption -Overview -Blocks used -Blocks used -Weakness -Authentication -E 1 algorithm -Key handling -E 3 -E 2 -SAFER+ -Round -Key Schedule -Implementation -Encryption -modes -Key Reduction -Engine (E 0 ) -Timing -PRNG

Bluetooth Security 4/17 5-February-2001 PIN Number Initialization Key Unit Key User Tracking -Overview -Blocks used -Weakness -Weakness -Authentication -E 1 algorithm -Key handling -E 3 -E 2 -SAFER+ -Round -Key Schedule -Implementation -Encryption -modes -Key Reduction -Engine (E 0 ) -Timing -PRNG

Bluetooth Security 5/17 5-February-2001 Challenge-Response Scheme: -Overview -Blocks used -Weakness-Authentication -E 1 algorithm -Key handling -E 3 -E 2 -SAFER+ -Round -Key Schedule -Implementation -Encryption -modes -Key Reduction -Engine (E 0 ) -Timing -PRNG

Bluetooth Security 6/17 5-February-2001 The authentication function E 1 : -Overview -Blocks used -Weakness-Authentication -E 1 algorithm -E 1 algorithm -Key handling -E 3 -E 2 -SAFER+ -Round -Key Schedule -Implementation -Encryption -modes -Key Reduction -Engine (E 0 ) -Timing -PRNG

Bluetooth Security 7/17 5-February-2001 E 3 -Key generation function for encryption: -Overview -Blocks used -Weakness -Authentication -E 1 algorithm -Key handling -E 3 -E 3 -E 2 -SAFER+ -Round -Key Schedule -Implementation -Encryption -modes -Key Reduction -Engine (E 0 ) -Timing -PRNG

Bluetooth Security 8/17 5-February-2001 E 2 -Key generation function for authentication: 1)E 21 mode: # Utilized when creating unit key and combination key. #It uses the function A’ r. It has two modes of operation: 2)E 22 mode: # Utilized when creating initialization key and master key. #It also uses the function A’ r. -Overview -Blocks used -Weakness -Authentication -E 1 algorithm -Key handling -E 3 -E 2 -E 2 -SAFER+ -Round -Key Schedule -Implementation -Encryption -modes -Key Reduction -Engine (E 0 ) -Timing -PRNG

Bluetooth Security 9/17 5-February-2001 Secure and Fast Encryption Routine SAFER K-64 (1993) - Cylink Corporation James L. Massay of ETH Zurich SAFER+ was submitted as one of the candidates to AES 1998 Block size = 128 bits, key size = 128, 192 or 256 bits Bluetooth: A r & A r ‘ 128 bits block, 128 bits key, 8 rounds, Encryption only Plaintext Block (16 bytes) Encryption Round 1 Encryption Round 8 Output Transformation Ciphertext Block (16 bytes) 2 16-Byte round subkeys 2 16-Byte round subkeys 1 16-Byte subkey -Overview -Blocks used -Weakness -Authentication -E 1 algorithm -Key handling -E 3 -E 2-SAFER+ -Round -Key Schedule -Implementation -Encryption -modes -Key Reduction -Engine (E 0 ) -Timing -PRNG

Bluetooth Security 10/17 5-February-2001 Confusion Bit wise XOR – exponential – Addition mod 256 Addition mod 256 – logarithmic – Bit wise XOR e: (45 i mod 257) mod 256 l: I=e(j) Diffusion PHT(x,y) = 2x+y mod 256, x+y mod 256) Ar’Ar’ -Overview -Blocks used -Weakness -Authentication -E 1 algorithm -Key handling -E 3 -E 2-SAFER+ -Round -Round -Key Schedule -Implementation -Encryption -modes -Key Reduction -Engine (E 0 ) -Timing -PRNG

Bluetooth Security 11/17 5-February-2001 Bias words B p [I]=((45 (45 17p+I+1 mod 257) mod 257)mod 256) -Overview -Blocks used -Weakness -Authentication -E 1 algorithm -Key handling -E 3 -E 2-SAFER+ -Round -Key Schedule -Key Schedule -Implementation -Encryption -modes -Key Reduction -Engine (E 0 ) -Timing -PRNG

Bluetooth Security 12/17 5-February-2001 Encryption Round KEY Scheduler Controller Register -Overview -Blocks used -Weakness -Authentication -E 1 algorithm -Key handling -E 3 -E 2-SAFER+ -Round -Key Schedule -Implementation -Implementation -Encryption -modes -Key Reduction -Engine (E 0 ) -Timing -PRNG

Bluetooth Security 13/17 5-February Overview -Blocks used -Weakness -Authentication -E 1 algorithm -Key handling -E 3 -E 2 -SAFER+ -Round -Key Schedule -Implementation-Encryption -modes -modes -Key Reduction -Engine (E 0 ) -Timing -PRNG

Bluetooth Security 14/17 5-February Overview -Blocks used -Weakness -Authentication -E 1 algorithm -Key handling -E 3 -E 2 -SAFER+ -Round -Key Schedule -Implementation-Encryption -modes -Key Reduction -Key Reduction -Engine (E 0 ) -Timing -PRNG

Bluetooth Security 15/17 5-February Overview -Blocks used -Weakness -Authentication -E 1 algorithm -Key handling -E 3 -E 2 -SAFER+ -Round -Key Schedule -Implementation-Encryption -modes -Key Reduction -Engine (E 0 ) -Engine (E 0 ) -Timing -PRNG

Bluetooth Security 16/17 5-February Overview -Blocks used -Weakness -Authentication -E 1 algorithm -Key handling -E 3 -E 2 -SAFER+ -Round -Key Schedule -Implementation-Encryption -modes -Key Reduction -Engine (E 0 ) -Timing -Timing -PRNG

Bluetooth Security 17/17 5-February-2001 Pseudo Random Number Generator Non Repeating Randomly Generated Bluetooth Standard Software HardwareLFSR 23 hr 18 min 3.2 kHz 28 bits Serial 128 bits Parallel -Overview -Blocks used -Weakness -Authentication -E 1 algorithm -Key handling -E 3 -E 2 -SAFER+ -Round -Key Schedule -Implementation -Encryption -modes -Key Reduction -Engine (E 0 ) -Timing -PRNG -PRNG