Implementing the RC4 Algorithm

Slides:



Advertisements
Similar presentations
ECE454/CS594 Computer and Network Security
Advertisements

Modern Symmetric-Key Ciphers
Stream Ciphers Part 1  Cryptography 3 Stream Ciphers.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Encryption/Decyprtion using RC4 Vivek Ramachandran.
WEP 1 WEP WEP 2 WEP  WEP == Wired Equivalent Privacy  The stated goal of WEP is to make wireless LAN as secure as a wired LAN  According to Tanenbaum:
1 MD5 Cracking One way hash. Used in online passwords and file verification.
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Wireless LAN Security Jerry Usery CS 522 December 6 th, 2006.
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
Wired Equivalent Privacy (WEP)
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
Modes of Operation CS 795. Electronic Code Book (ECB) Each block of the message is encrypted with the same secret key Problems: If two identical blocks.
RC4 1 RC4 RC4 2 RC4  Invented by Ron Rivest o “RC” is “Ron’s Code” or “Rivest Cipher”  A stream cipher  Generate keystream byte at a step o Efficient.
EEC 688/788 Secure and Dependable Computing Lecture 4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
IEEE Wireless Local Area Networks (WLAN’s).
Wireless Security Presentation by Paul Petty and Sooner Brooks-Heath.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
1 Day 04- Cryptography Acknowledgements to Dr. Ola Flygt of Växjö University, Sweden for providing the original slides.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 5 Wenbing Zhao Department of Electrical and Computer Engineering.
ORYX 1 ORYX ORYX 2 ORYX  ORYX not an acronym, but upper case  Designed for use with cell phones o To protect confidentiality of voice/data o For “data.
Computer Security CS 426 Lecture 3
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Practical Techniques for Searches on Encrypted Data Yongdae Kim Written by Song, Wagner, Perrig.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
CWNA Guide to Wireless LANs, Second Edition Chapter Eight Wireless LAN Security and Vulnerabilities.
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
One-Time Pad Or Vernam Cipher Sayed Mahdi Mohammad Hasanzadeh Spring 2004.
CS555Spring 2012/Topic 51 Cryptography CS 555 Topic 5: Pseudorandomness and Stream Ciphers.
Wireless Security Presented by: Amit Kumar Singh Instructor : Dr. T. Andrew Yang.
A Survey of Authentication Protocol Literature: Version 1.0 Written by John Clark and Jeremy Jacob Presented by Brian Sierawski.
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
Bit Cipher 1. Example of bit Cipher 2 Practical Stream Cipher 3.
Stream Cipher July 2011.
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
WEP AND WPA by Kunmun Garabadu. Wireless LAN Hot Spot : Hotspot is a readily available wireless connection.  Access Point : It serves as the communication.
Wireless LAN Security. Security Basics Three basic tools – Hash function. SHA-1, SHA-2, MD5… – Block Cipher. AES, RC4,… – Public key / Private key. RSA.
“Implementation of a RC5 block cipher algorithm and implementing an attack on it” Cryptography Team Presentation 1.
Description of a New Variable-Length Key, 64-Bit Block Cipher (BLOWFISH) Bruce Schneier BY Sunitha Thodupunuri.
Wired Equivalent Privacy (WEP): The first ‘confidentiality’ algorithm for the wireless IEEE standard. PRESENTED BY: Samuel Grush and Barry Preston.
Network Security7-1 Today r Reminder Ch7 HW due Wed r Finish Chapter 7 (Security) r Start Chapter 8 (Network Management)
無線網路安全 WEP. Requirements of Network Security Information Security Confidentiality Integrity Availability Non-repudiation Attack defense Passive Attack.
 Advisor: Dr. Quincy Wu  Speaker: Hui - Hsiung Chung  Date:
Encryption Protocols used in Wireless Networks Derrick Grooms.
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
Network Security. Three tools Hash Function Block Cipher Public Key / Private Key.
EE 122: Lecture 24 (Security) Ion Stoica December 4, 2001.
Wired Equivalent Privacy (WEP) Chris Overcash. Contents What is WEP? What is WEP? How is it implemented? How is it implemented? Why is it insecure? Why.
University of Malawi, Chancellor College
WLAN Security1 Security of WLAN Máté Szalay
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
Slide 1 Vitaly Shmatikov CS 378 Stream Ciphers. slide 2 Stream Ciphers uRemember one-time pad? Ciphertext(Key,Message)=Message  Key Key must be a random.
CPIT 425 Chapter Three: Symmetric Key Cryptography.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Problem Set 1: Cryptography.
หัวข้อบรรยาย Stream cipher RC4 WEP (in)security LFSR CSS (in)security.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Wireless Protocols WEP, WPA & WPA2.
Outline Desirable characteristics of ciphers Stream and block ciphers
ANALYSIS OF WIRED EQUIVALENT PRIVACY
IEEE i Dohwan Kim.
PART VII Security.
ADVANCED ENCRYPTION STANDARDADVANCED ENCRYPTION STANDARD
RC4 RC
Chapter -4 STREAM CIPHERS
Information and Computer Security CPIS 312 Lab 4 & 5
The RC4 Algorithm Network Security.
By: Anthony Gervasi & Adam Dickinson
Presentation transcript:

Implementing the RC4 Algorithm

Simple Cryptography . The book, “Codes Ciphers and Computers” (Bosworth) describes modulo 2 addition as binary addition without the carry. It is commonly called an exclusive OR (XOR). The symbol () is used to represent an exclusive OR.

Simple Cryptography The rules for modulo 2 addition () are: 1  1 = 0 1  0 = 1 0  1 = 1 0  0 = 0

Simple Cryptography Using the ASCII character set to represent a plain text message, “Hello!” and a secret key, “Secret” in binary bit strings we can  them together to produce a cipher text message.

Simple Cryptography Message: H e l l o ! 01001000 01100101 01101100 01101100 01101111 00100001  Secret Key: S e c r e t 01010011 01100101 01100011 01110010 01100101 01110100 = Cipher text: 00011011 00000000 00001111 00011110 00001010 01010101

Simple Cryptography To undo the cipher text,  the cipher text with the same secret key and the original message is reproduced.

Simple Cryptography Secret Key: S e c r e t 01010011 01100101 01100011 01110010 01100101 01110100  Cipher text: 00011011 00000000 00001111 00011110 00001010 01010101  = Message: 01001000 01100101 01101100 01101100 01101111 00100001 H e l l o !  

Stream Ciphers A stream cipher starts with a small secret key that is permutated into a cryptographic bit-stream. The bit-stream generator (C) is used to  a plaintext message (M) into a cipher text message (P). The same algorithm is used on the other end to  the cipher text message back into plaintext. M  C = P Encryption P  C = M Decryption

RC4 Dr. Ronald Rivest’s RC4 Stream Cipher has two components. Stream Setup. Byte Generator.

RC4 Stream Setup Two arrays: S[256] and K[256]. S0=0, S1=1, S2=2, …, S255=255. K0= 1st byte of key K1= 2nd byte of key Repeated until end of key Key repeated until K255 is filled

RC4 Stream Setup Counters A and B initialized to 0 for (A = 0; A < 256; A++) B=(B + S[A] + K[A]) mod 256 swap S[A] and S[B]

RC4 Byte Generator Counters I and J both initialized to 0 I = (I + 1) mod 256 J = (J + S[ I ] ) mod 256 swap S[ I ] and S[ J ] K = ( S[ I ] + S [ J ] ) mod 256 return S[ K ]

Initialization Vector (IV) Stream Ciphers produce the exact same cipher stream when the key is identical. To synchronize the stream an IV is used. It represents the number of permutations needed to produce a cipher byte.

RC4 Common Uses IEEE 802.11 Wired Equivalent Privacy (WEP) protocol. Walker, J. (2000). Unsafe at any key size; An analysis of the WEP encapsulation. IEEE Working Group P802.11. Document Number IEE802.11-00/362 [online] http://grouper.ieee.org /groups/802/11/Documents/DT351-400.html

Conclusion RC4 is an easily remembered algorithm RC4 is fast. RC4 can be implemented in most languages using only a few lines of code.