Cellular Automata Based Authentication (CAA ) Monalisa Mukherjee 1 Niloy Ganguly 2 P Pal Chaudhuri 1 1 Department of Computer Science & Technology, Bengal Engineering College ( D. U ), Howrah, West Bengal, India Department of Business Administration, Indian Institute of Social Welfare and Business Management, Calcutta, West Bengal, India
CA Research Group (BECDU) Importance 1. Authentication & Verification of data source 2. Protection of copyright & detection of intrusion 3. Prevention of Cyber-Crime Wide Applications E-Commerce, Medical, Technology, Government, Law Authentication
CA Research Group (BECDU) Message Digest Generation Function Message Digest Generation Functions Accepts a message of arbitrary length as the input Transforms a key of fixed length called “fingerprint” or “message digest” as the output One-way hash function with the addition of a secret key forms the basis of this transformation Authentication Compares fingerprint produced at source and destination end Important for the security protocols in Message authentication, Data integrity and Digital signature
CA Research Group (BECDU) SOURCE MessageDigest Cellular Automata (CA) based Authentication (CAA) MessageDigest DESTINATION Digest Hash Private key Hash Private key Compare Same Not Hacked Hacker
CA Research Group (BECDU) Importance of Proposed Method Limitations of the conventional MD5 based message authentication -Not withstand the advanced cryptanalytic attacks -The hash function used is weak In the above background, we propose an efficient message digest generation scheme. The proposed scheme employs a special class of GF(2 p ) Cellular Automata (CA ) 2 p Predecessor Single Attractor Cellular Automata(SACA )
CA Research Group (BECDU) p p p p 1i-1ii+1n 0/1 Input Output Input Output 0/1 An n Cell GF(2 P ) CA W i W i+1 W i-1 Input p - 1
CA Research Group (BECDU) Structure of a 3 Cell GF ( 2 2 ) CA Cell 2 Cell 1 Cell 0 Clock T = S 1 = T S XOR
CA Research Group (BECDU) STATE TRANSITION OF A 3 CELL GF ( 2 2 ) SACA T = Depth = 3, Attractor - 0 No. of predecessors = 2 p = 4 No. of non reachable states = 48
CA Research Group (BECDU) Structure of a 3 Cell GF ( 2 2 ) CA Clock T = S 1 = T S 0 + F Cell 2 Cell 1 Cell 0 XNOR F =
CA Research Group (BECDU) T = DUAL SACA F =
CA Research Group (BECDU) SACA AND ITS DUAL DUAL SACA SACA
CA Research Group (BECDU) HASHING USING SACA AND ITS DUAL SACA DUAL SACA Hashing 300 Hashed value 113
CA Research Group (BECDU) bits Message Hash Function – 2-cell GF(2 2 ) SACA Key Size = Message Authentication Through CAA Matrix from first token Private Key
CA Research Group (BECDU) Matrix from first token Message Authentication Through CAA F = 1 3 SACA DUAL SACA Private Key
CA Research Group (BECDU) Matrix from first token Message Authentication Through CAA F = 1 2 Message Digest
CA Research Group (BECDU) Brute Force Attack Key Size can be increased with minimum cost Attack Changing key Related Key Cryptanalysis Differential Cryptanalysis Security Analysis For CAA
CA Research Group (BECDU) Attack changing Message File Size No of Ones in xored cyphertext Key 128bit Key 256bit 128 P=4P=8P=8P=16MD P1 = C1 = P2 = C2 = XORED = No of 1’s = 4
CA Research Group (BECDU) Attack changing key File Size No of Ones in xored cyphertext Key 128bit Key 256bit 128 P=4P=8P=8P=16MD K1 = C1 = K2 = C2 = XORED = No of 1’s = 4
CA Research Group (BECDU) Differential Cryptanalysis No of 1’s = 5 P1 = C1 = P2 = C2 = XORED= XORED= No of 1’s = 3 P1 = C1 = P2 = C2 = XORED= XORED= No of 1’s = 3No of 1’s = 4
CA Research Group (BECDU) Differential Cryptanalysis No of 1’s = 5 P1 = C1 = P2 = C2 = XORED= XORED= No of 1’s = 3 P1 = C1 = P2 = C2 = XORED= XORED= No of 1’s = 3No of 1’s = 4 P1 P2 = 3 C1 C2 Freq 1 n1n1n1n1 2 n2n2n2n2 3 n3n3n3n3 4 n4n4n4n4 5 n5n5n5n5 6 n6n6n6n6 7 n7n7n7n7 8 n8n8n8n8 Standard Deviation of distribution
CA Research Group (BECDU) Differential Cryptanalysis Avg. Std. Devn. Of XOR Distribution (%) using CAA P=16P=8P=8P=4 Key 256bit Key 128bit File Size
CA Research Group (BECDU) Time Needed for MD5 & CAA File Size CPU Time in Seconds P=1P=2P=4P=8 MD5 n=128n=64n=32n= Speed calculated in WindowsNT , IBM
CA Research Group (BECDU) Watermarking – Its Importance Invisible Fragile Watermarking - Image Authentication / Ownership - Tamper Detection - Verification of Image Integrity Application - Legal matters - News reporting, Medical
CA Research Group (BECDU) Watermarking Existing Tools - MD5 based One-way Hash Function Advantages - Easy Software implementation - License free nature Disadvantages - Non-keyed primitive - Lacks sound & realistic cryptanalysis
CA Research Group (BECDU) Watermark Insertion / Extraction Host Image Watermark Image Watermarked Image Insertion Scheme CA Based Hashing
CA Research Group (BECDU) Watermark Insertion / Extraction Host Image Watermark Image Watermarked Image Insertion Scheme Extraction Scheme Watermarked Image Watermark Image
CA Research Group (BECDU) Proposed Scheme Resists Holliman-Memon Attack Vector Quantization Attack Higher PSNR Watermarking Image Name Data in Bytes PSNR Values in dB unit P = 4P = 8MD5 Lena Concord Rabbit
CA Research Group (BECDU) Current & Future Works on Watermarking Invisible Robust Watermarking - Survives Image Cropping & Compression Audio & Video Watermarking Application - Prevent Unauthorized Access & Forgery - Copyright Protection & Authentication
Thank you Niloy Ganguly