Random Encryption Program Patrick Lowe EKU - Department of Technology CEN.

Slides:



Advertisements
Similar presentations
PROGRAMMING LANGUAGE (JAVA) UNIT 42 BY ROBERT BUTTERFIELD TELEPHONE Data Structures and Algorithms.
Advertisements

A Fast Data Protection Technique for Mobile Agents to Avoid Attacks in Malicious Hosts Jesús Arturo Pérez Díaz Darío Álvarez Gutiérrez Department of Informatics.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
White-Box Cryptography
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
Block Ciphers and the Data Encryption Standard
Cryptography and Network Security
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
It’s always better live. MSDN Events Security Best Practices Part 2 of 2 Reducing Vulnerabilities using Visual Studio 2008.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown and edited by Archana Chidanandan Cryptographic Tools.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
An Introduction to Cryptology and Coding Theory Discrete Math 2006.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 5 Wenbing Zhao Department of Electrical and Computer Engineering.
Introduction to Modern Cryptography Lecture 7 1.RSA Public Key CryptoSystem 2.One way Trapdoor Functions.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Lecture 13 Message Signing
Topic 1: Introduction to Computers and Programming
Bit-level based secret sharing for image encryption Rastislav Lukac, Konstantinos N. Plataniotis Presented by Du-Shiau Tsai Pattern Recognition 38 (2005)
Feb 19, 2002Mårten Trolin1 Previous lecture Practical things about the course. Example of cryptosystem — substitution cipher. Symmetric vs. asymmetric.
On Error Preserving Encryption Algorithms for Wireless Video Transmission Ali Saman Tosun and Wu-Chi Feng The Ohio State University Department of Computer.
Network Security Chapter
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Informatics and Control Systems Faculty. Student: Levan Julakidze Informatics and Control Systems Faculty Doctorate II year Leader: Zurab Kochladze TSU.
Block and Stream Ciphers1 Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
Cryptography and Network Security Chapter 11 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
PLC HOME SECURITY SYSTEM Wesley Roe EKU, Department of Technology Computer Electronic Networking.
© Neeraj Suri EU-NSF ICT March 2006 DEWSNet Dependable Embedded Wired/Wireless Networks MUET Jamshoro Computer Security: Principles and Practice Slides.
ECE453 – Introduction to Computer Networks Lecture 18 – Network Security (I)
Lecture 2 Overview.
Dr. Khalid A. Kaabneh Amman Arab University
Cryptography Lecture 1: Introduction Piotr Faliszewski.
Copyright © 2012 Pearson Education, Inc. Chapter 1: Introduction to Computers and Programming 1.
Homeland Security System Danny Butler EKU, Dept. of Technology.
GROUP POLICIES AND SECURITY USING WINDOWS SERVER 2008 Raymond Ross EKU, Dept. of Technology, CEN.
Lec. 5 : History of Cryptologic Research II
Cryptography By, Anthony Lonigro & Valentine Mbah.
LOGO Hardware side of Cryptography Anestis Bechtsoudis Patra 2010.
The Beauty and Joy of Computing Lecture #3 : Creativity & Abstraction UC Berkeley EECS Lecturer Gerald Friedland.
Network Security Section 1: Introduction to security.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Chapter 31 Cryptography And Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Bowling Alley Communications Mark Patterson EKU Dept. of Technology, CEN.
MOVIE TERMINAL APPLICATION Michael Disney EKU, Dept. of Technology, CEN/CET.
CISC Machine Learning for Solving Systems Problems Presented by: Alparslan SARI Dept of Computer & Information Sciences University of Delaware
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
Shambhu Upadhyaya Security – AES-CCMP Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 13)
30 October Agenda for Today Introduction and purpose of the course Introduction and purpose of the course Organization of a computer system Organization.
Sandrine AGAGLIATE, FTFC Power Consumption Analysis and Cryptography S. Agagliate Canal+Technologies P. Guillot Canal+Technologies O. Orcières Thalès.
Chapter 7 – Confidentiality Using Symmetric Encryption.
Construction Planning and Prerequisite
Lecture 2: Introduction to Cryptography
A paper by: Paul Kocher, Joshua Jaffe, and Benjamin Jun Presentation by: Michelle Dickson.
Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.
Wireless Security: The need for WPA and i By Abuzar Amini CS 265 Section 1.
HOME SECURITY USING PLC Ryan Badgett EKU, Dept. of Technology, CEN.
Breaking RSA Encryption Nick Manners. History of Cryptography  Used to be strictly in the domain of governments… state secrets.  Particularly important.
Computer Security coursework 3 Dr Alexei Vernitski.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
Chapter 7 – Confidentiality Using Symmetric Encryption.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Raspberry Pi Garage Door Mark Barron NET 499 Eastern Kentucky University.
Introduction to Programming By: Prof. Muhammad Abu Baker Siddique 2 nd Lecture 1.
PART VII Security.
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
Hashing Hash are the auxiliary values that are used in cryptography.
Presentation transcript:

Random Encryption Program Patrick Lowe EKU - Department of Technology CEN

2 OUTLINE Motivation for developing program Introduction to Basic Concepts Research Information Problem Statement Proposed Solution for program Verifying Results/Results Conclusion/ Future Work

3 MOTIVATION Modern computer security relies on various forms of encryption Chance to experiment with a theoretically unbreakable cipher Familiarize myself with cryptography concepts Practice programming

4 INTRODUCTION Cryptography is needed in a computer environment to protect private digital data. Many block ciphers (AES,DES,triple- DES) today use algorithms that limit the unpredictability of the resulting encrypted file.

5 CIPHER TYPES Software-based ciphers are predictable and breakable however infeasible. Many Software-based ciphers use complex mixing functions to encrypt data. Hardware-based ciphers typically sample real world sources of random data and encrypt file(s) with this random data.

6 SAMPLING RANDOM DATA Photons, Static, Thermal Noise, and Cosmic radiation are known sources of random data. Audio lines can be used to sample static and thermal noise (electrical). Audio lines are very common on computers.

7 PROBLEM STATEMENT With increasing security demands, stronger encryption techniques are needed.

8 PROPOSED SOLUTION Brainstorming Sample sound from sound card/motherboard Write application to combine random sound data and a specified file Implement statistical tests of randomness of encrypted file

9 ARRANGING FOR SOFTWARE/HARDWARE Hardware: Computer with audio ports FM receiver Software: AutoItv3 Script Editor Sound Recording Software Visual Studio 2005

10 ASSEMBLY Record audio file for random data with no mic plugged in Write code to combine random data via XOR method of bit/byte manipulation

11 TESTING & TROUBLESHOOTING The AutoItv3 scripting language was not robust enough to support bit-level manipulation of files Switched to VB.NET 2005 to manipulate and read/write bytes to a file Switched from reading thermal noise to FM static

12 VERIFYING RESULTS Encrypted file and verified file size along with a quick check for randomness Viewed files through hex editor to confirm XOR operation

13 RESULTS Application successfully performed encryption Encrypted files slightly smaller than source file

14 RESULTS Recorded FM Static

15 RESULTS Binary view of resulting encrypted file

16 CONCLUSIONS While not quite perfect, this could provide a good source of random data to produce one-time pads to ensure security of data and communications This project allowed me to plan, design, and construct a program that will add to my knowledge of computer security

17 FUTURE WORK Resolving the file size disparities by researching possible causes Implement full error handling Add statistical tests to check encrypted files for statistical randomness Develop graphics/charts for statistical test results