Security and Protection of Information, Brno 9.-11.5.2001 1 Using quasigroups for secure encoding of file system Eliška Ochodková, Václav Snášel

Slides:



Advertisements
Similar presentations
Chapter Matrices Matrix Arithmetic
Advertisements

Cryptography and Network Security
Information and Coding Theory
Computer Science 101 Data Encryption And Computer Networks.
Transitive Closure Theorem 1. Let R be a relation on a set A. Then R  is the transitive closure of R. the reachability relation R * of a relation R on.
Cryptography and Network Security Chapter 3
Foundations of Network and Computer Security J J ohn Black Lecture #10 Sep 18 th 2009 CSCI 6268/TLEN 5550, Fall 2009.
Session 6: Introduction to cryptanalysis part 2. Symmetric systems The sources of vulnerabilities regarding linearity in block ciphers are S-boxes. Example.
Ref. Cryptography: theory and practice Douglas R. Stinson
Foundations of Network and Computer Security J J ohn Black Lecture #3 Aug 28 th 2009 CSCI 6268/TLEN 5550, Fall 2009.
Orthogonality and Least Squares
Copyright © Cengage Learning. All rights reserved.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Computer Security CS 426 Lecture 3
Section 2.9 The Hill Cipher; Matrices
MATRICES. Matrices A matrix is a rectangular array of objects (usually numbers) arranged in m horizontal rows and n vertical columns. A matrix with m.
L1.1. An Introduction to Classical Cryptosystems Rocky K. C. Chang, February 2013.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Cryptography Week-6.
Cryptography and Network Security
An Efficient Identity-based Cryptosystem for
Chapter 3: The Fundamentals: Algorithms, the Integers, and Matrices
One-Time Pad Or Vernam Cipher Sayed Mahdi Mohammad Hasanzadeh Spring 2004.
THE FAMILY OF BLOCK CIPHERS “SD-(n,k)” S. Markovski D. Gligoroski V. Dimitrova A. Mileva.
Groups Definition A group  G,  is a set G, closed under a binary operation , such that the following axioms are satisfied: 1)Associativity of  :
Public key ciphers 2 Session 6.
1 Network Coding and its Applications in Communication Networks Alex Sprintson Computer Engineering Group Department of Electrical and Computer Engineering.
Introduction to Ciphers Breno de Medeiros. Cipher types From “Cipher”, Wikipedia article.
Some Number Theory Modulo Operation: Question: What is 12 mod 9?
Cryptography Lynn Ackler Southern Oregon University.
Cryptography Part 1: Classical Ciphers Jerzy Wojdyło May 4, 2001.
Traditional Symmetric-Key Ciphers
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
Regular Expressions and Languages A regular expression is a notation to represent languages, i.e. a set of strings, where the set is either finite or contains.
Vigenere Cipher For example, choose a word “GOLD” for a key. And, add “GOLDGOLDGOLD….” to your plaintext Plaintext: t o o m u c h h y p e Key : GOLDGOLDGOLD.
Security School of Business Eastern Illinois University © Abdou Illia, Fall 2002 (Week 12, Wednesday 11/13/2002)
Lecture 23 Symmetric Encryption
Word : Let F be a field then the expression of the form a 1, a 2, …, a n where a i  F  i is called a word of length n over the field F. We denote the.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
The RC5 Encryption Algorithm: Two Years On Lisa Yin RC5 Encryption –Ron Rivest, December 1994 –Fast Block Cipher –Software and Hardware Implementations.
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
Math 344 Winter 07 Group Theory Part 1: Basic definitions and Theorems.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
UNIT - 2.  A binary operation on a set combines two elements of the set to produce another element of the set. a*b  G,  a, b  G e.g. +, -, ,  are.
The Pennsylvania State University CSE597B: Special Topics in Network and Systems Security The Miscellaneous Instructor: Sencun Zhu.
Module :MA3036NI Symmetric Encryption -3 Lecture Week 4.
NATO ARW, 6-9 October, 2008, Veliko Tarnovo, Bulgaria Error Correcting Cryptcodes Based on Quasigroups SMILE MARKOVSKI “Ss Cyril and Methodius” University.
1 Cryptography Troy Latchman Byungchil Kim. 2 Fundamentals We know that the medium we use to transmit data is insecure, e.g. can be sniffed. We know that.
Table of Contents Matrices - Definition and Notation A matrix is a rectangular array of numbers. Consider the following matrix: Matrix B has 3 rows and.
Foundations of Network and Computer Security J J ohn Black CSCI 6268/TLEN 5550, Spring 2014.
Information and Network Security Lecture 2 Dr. Hadi AL Saadi.
拉丁方陣 交大應數系 蔡奕正. Definition A Latin square of order n with entries from an n-set X is an n * n array L in which every cell contains an element of X such.
Information and Computer Security CPIS 312 Lab 6 & 7 1 TRIGUI Mohamed Salim Symmetric key cryptography.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Cracking Encrypted Systems
Triple DES.
Cryptography Lecture 2.
ADVANCED ENCRYPTION STANDARD
Cryptography and Network Security Chapter 3
AES Objectives ❏ To review a short history of AES
Cryptography and Network Security
Copyright © Cengage Learning. All rights reserved.
Cryptography Lecture 5.
Automatic Test Generation for N-way Combinatorial Testing
Florida State University
Stream Cipher Structure
Presentation transcript:

Security and Protection of Information, Brno Using quasigroups for secure encoding of file system Eliška Ochodková, Václav Snášel Department of Computer Science Faculty of Electrical Engineering and Computer Science VŠB Technical University of Ostrava Ostrava / Czech Republic

Security and Protection of Information, Brno Contents Some necessary concepts Constructing a stream cipher based upon quasigroups Properties of the method Installable File Systems Conclusions

Security and Protection of Information, Brno Some necessary concepts Let A={a 1,a 2,...,a n }, n  1 be an alphabet, a k x n Latin rectangle is a matrix with entries a ij  A, i=1,2,…k, j=1,2,…,n, such that each row and each column consists of different elements of A. If k=n we say a Latin square instead of a Latin rectangle.

Security and Protection of Information, Brno A grupoid (Q, *) is said to be a quasigroup satisfying the law: (  u, v  Q) (  x, y  Q) (u * x = v  y * u = v) We can associate to the operation * a new operation \ on Q, called right inverse of *, by x * y = z  x \ z = y

Security and Protection of Information, Brno We say that (Q, \) is inverse quasigroup to (Q, *). The quasigroup (Q, *, \) satisfies the following identities: x \ (x * y) = y, x * (x \ y) = y

Security and Protection of Information, Brno Constructing a stream cipher Let a finite set A={a 1,a 2,...,a n }, n  1 be an alphabet and let (A, *, \) be the quasigroup. Let A + is the set of all nonempty words formed by elements of A. The elements of A + will be denoted by elements of A.

Security and Protection of Information, Brno Definition: Let u i  A, k  1. Then f * (u 1 u 2...u k ) = v 1 v 2...v k v 1 = l * u 1, v i+1 = v i * u i+1, i=1,2,…,k-1, f \ (u 1 u 2...u k ) = v 1 v 2...v k v 1 = l \ u 1, v i+1 = u i \ u i+1, i=1,2,…,k-1. We say that the sextuple (A,*,\,l, f *, f \ ) is a quasigroup cipher over the alphabet A. A fixed element l is called leader.

Security and Protection of Information, Brno Properties of the method

Security and Protection of Information, Brno It is resist to the brute force attack. The Hall algorithm: there is at least n! (n – 1)!…2! Latin squares. Let A={0,…,255} (i.e. data are represented by 8 bits), there are at least 256! 255! …2!> quasigroups. Suppose that intruder knows a cipher text v=v 1 v 2 …v k, he has to recover the quasigroup (A,*). But there is no algorithm of the exhaustive search of all quasigroups that can be generated.

Security and Protection of Information, Brno Numbers of reduced Latin rectangles n L n ,408 n L n 7 16,942, ,281,401, ,597,570,964,258, ,580,721,483,160,132,811,489,280

Security and Protection of Information, Brno It is resist to the statistical attack. Let (Q, *) be a quasigroup of q elements. Among the set of all possible cipher of certain length, all possible element of Q occurs with equal probability, i.e., each element of quasigroup Q should occur as often as any other in each position.

Security and Protection of Information, Brno It is proved that each element occurs exactly q times among the products of two elements of Q, q 2 times among the products of three elements of Q and, generally q t-1 among the products of t elements of Q.

Security and Protection of Information, Brno Distribution of characters In a common plaintext. In a plaintext that contains only ‘a’, ‘b’ and “a new line”.

Security and Protection of Information, Brno A common text

Security and Protection of Information, Brno Just ‘a’ and ‘b’ and new line

Security and Protection of Information, Brno It produces a cipher text with the same length as the plaintext and encryption is of a stream nature.

Security and Protection of Information, Brno Example Table 1. The quasigroup (A, *, \) * a b c\ a b c a b c aa c a b b c a bb b c ac a b c Example 1. Let A={a, b, c} and let the quasigroup (A,*), i.e. (A, \) be defined by Tab.1. Let l=a and u=bbcaacba. Then the cipher text of u is v=f * (u)=cbbcaaca. Applying of decoding function on v we get f \ (v)=bbcaacba=u.

Security and Protection of Information, Brno It is also robust on errors.

Security and Protection of Information, Brno Proposed method, being very simple, offers very fast implementation of encrypting and decrypting procedures.

Security and Protection of Information, Brno Installable file system Example: Windows 9x and Windows NT directly support a variety of file systems, such as hard disks, CD-ROMs, floppy disks and network redirectors, and in addition permit third parties to create their own so-called installable file systems - - file system that can be installed in place of the usual file allocation table file system. Figure: Windows98 file system architecture

Security and Protection of Information, Brno

Security and Protection of Information, Brno Installable File System allows complete protection of data, thus it seems to be very useful complete presented method as a new feature of it. It appears to be especially convenient for laptops.

Security and Protection of Information, Brno Conclusions Quasigroups, in spite of their simplicity, have various applications. Many other encrypting algorithms can be formed on the basis of quasigroups.

Security and Protection of Information, Brno In future works we’ll continue with applications of non-associative algebraic systems in cryptography. Such algebraic systems exist for higher orders, they offer simple construction and implementation and very fast procedures of encrypting and decrypting, too.