DRKH: A Power Efficient Encryption Protocol for Wireless Devices El Shibani Omar Hamdan Alzahrani.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
An Introduction to Secure Sockets Layer (SSL). Overview Types of encryption SSL History Design Goals Protocol Problems Competing Technologies.
IEEE i IT443 Broadband Communications Philip MacCabe October 5, 2005
Transport Layer Security (TLS) Protocol Introduction to networks and communications(CS555) Prof : Dr Kurt maly Student:Abhinav y.
Encryption/Decyprtion using RC4 Vivek Ramachandran.
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
Wireless Security Ryan Hayles Jonathan Hawes. Introduction  WEP –Protocol Basics –Vulnerability –Attacks –Video  WPA –Overview –Key Hierarchy –Encryption/Decryption.
Implementation of a Two-way Authentication Protocol Using Shared Key with Hash CS265 Sec. 2 David Wang.
Public-key based. Public-key Techniques based Protocols –may use either weak or strong passwords –high computation complexity (Slow) –high deployment.
Wireless LAN Security Jerry Usery CS 522 December 6 th, 2006.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
Intercepting Mobiles Communications: The Insecurity of Danny Bickson ACNS Course, IDC Spring 2007.
Wired Equivalent Privacy (WEP)
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
Wireless Security Presentation by Paul Petty and Sooner Brooks-Heath.
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J.D. Tygar Research Topics in Security in the context.
15 November Wireless Security Issues Cheyenne Hollow Horn SFS Presentation 2004.
Hash Functions Nathanael Paul Oct. 9, Hash Functions: Introduction Cryptographic hash functions –Input – any length –Output – fixed length –H(x)
Network Security – Part 2 V.T. Raja, Ph.D., Oregon State University.
Cryptography1 CPSC 3730 Cryptography Chapter 11, 12 Message Authentication and Hash Functions.
Feb 19, 2002Mårten Trolin1 Previous lecture Practical things about the course. Example of cryptosystem — substitution cipher. Symmetric vs. asymmetric.
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
Computer Science CSC 774Dr. Peng Ning1 CSC 774 Advanced Network Security Topic 2. Review of Cryptographic Techniques.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
KAIS T A lightweight secure protocol for wireless sensor networks 윤주범 ELSEVIER Mar
Network Security – Part 2 (Continued) Lecture Notes for May 8, 2006 V.T. Raja, Ph.D., Oregon State University.
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
Intercepting Mobile Communications: The Insecurity of Nikita Borisov Ian Goldberg David Wagner UC Berkeley Zero-Knowledge Sys UC Berkeley Presented.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Stream Cipher July 2011.
NSRI1 Security of Wireless LAN ’ Seongtaek Chee (NSRI)
Implementing the RC4 Algorithm
CWSP Guide to Wireless Security Chapter 2 Wireless LAN Vulnerabilities.
WEP Protocol Weaknesses and Vulnerabilities
WEP AND WPA by Kunmun Garabadu. Wireless LAN Hot Spot : Hotspot is a readily available wireless connection.  Access Point : It serves as the communication.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Wireless LAN Security. Security Basics Three basic tools – Hash function. SHA-1, SHA-2, MD5… – Block Cipher. AES, RC4,… – Public key / Private key. RSA.
Network Security David Lazăr.
Wired Equivalent Privacy (WEP): The first ‘confidentiality’ algorithm for the wireless IEEE standard. PRESENTED BY: Samuel Grush and Barry Preston.
無線網路安全 WEP. Requirements of Network Security Information Security Confidentiality Integrity Availability Non-repudiation Attack defense Passive Attack.
Secure Communication between Set-top Box and Smart Card in DTV Broadcasting Authors: T. Jiang, Y. Hou and S. Zheng Source: IEEE Transactions on Consumer.
National Institute of Science & Technology WIRELESS LAN SECURITY Swagat Sourav [1] Wireless LAN Security Presented By SWAGAT SOURAV Roll # EE
1 Symmetric key cryptography: DES DES: Data Encryption Standard US encryption standard [NIST 1993] 56-bit symmetric key, 64 bit plaintext input How secure.
Encryption Protocols used in Wireless Networks Derrick Grooms.
Your Wireless Network has No Clothes* William A. Arbaugh, Narendar Shankar Y.C. Justin Wan University of Maryland Presentation by Eddy Purnomo,
Wireless Security John Himmelein Erick Andrew Christian Adam Varun Bapna.
Interleaving and Collusion Attacks on a Dynamic Group Key Agreement Scheme for Low-Power Mobile Devices * Junghyun Nam 1, Juryon Paik 2, Jeeyeon Kim 2,
Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 11 September 23, 2004.
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
IEEE Security Specifically WEP, WPA, and WPA2 Brett Boge, Presenter CS 450/650 University of Nevada, Reno.
Wired Equivalent Privacy (WEP) Chris Overcash. Contents What is WEP? What is WEP? How is it implemented? How is it implemented? Why is it insecure? Why.
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
Cryptography CSS 329 Lecture 13:SSL.
1. Introduction In this presentation, we will review ,802.1x and give their drawbacks, and then we will propose the use of a central manager to replace.
Wireless Protocols WEP, WPA & WPA2.
WEP & WPA Mandy Kershishnik.
IEEE i Dohwan Kim.
Wireless Network Security
Counter Mode, Output Feedback Mode
Presentation transcript:

DRKH: A Power Efficient Encryption Protocol for Wireless Devices El Shibani Omar Hamdan Alzahrani

DRKH Dynamic Re-keying Key Hopping is a simple lightweight security protocol that’s suitable for solar and battery powered devices. It implements RC4 in a way that doesn’t require intensive computations to preserve power also it insures high security in addition to low execution cost. It uses a Hash function to generate session keys. Baraka, Eissa, Fayek, and Kholaif. “DRKH: A Power Efficient Encryption Protocol for Wireless Devices” Local Computer Networks, Sydney, NSW. IEEE /3/2016DRKH/ Hamdan and El Shibani 2

Shared Parameters Secret Keys [1..4] Authentication Key Hopping Sequence [1..4] Broadcast key Session counter Initialization Vector [1..4] Nonce 6/3/2016DRKH/ Hamdan and El Shibani 3

Important Notions Session Duration: It represents the start and the end of a session. 1. Indicates session expiration. 2. The four session keys are no longer valid and four different ones have to be generated. 6/3/2016DRKH/ Hamdan and El Shibani 4

Important Notions (con’t) Session Keys: Session Keys are the keys used to generate the cipher stream that’s used in an XOR operation with the plaintext to generate the cipher text. 1. Generated at the beginning of each new session. 2. A hash function is used to generate them using the four secret keys and the session counter. 6/3/2016DRKH/ Hamdan and El Shibani 5

Link-Layer Authentication 1. STA initiate a request AP. 2. AP challenge message E(X, N1) STA. 3. STA encrypted message E(X, (N1, N2, SSID)) AP. 4. Access point decrypts the message and check the validity of nonce 1 (N1) and Service Set Identifier (SSID) if they match what access point has then it’s considered that station authenticated. 6/3/2016DRKH/ Hamdan and El Shibani 6

Link-Layer Authentication (con’t) 5. AP E(X, N2, Hopping sequence, N3, Broadcast key) STA 6. STA after receiving the message it decrypts it and verify N2. After verification is done it’s only now that AP is considered authenticated by the STA. 7. STA E( positive ACK) AP 6/3/2016DRKH/ Hamdan and El Shibani 7

The Road to Session Keys Generation 1. The first step is to generate the four secret keys. 2. Mixing them with the session counter. 3. Using a strong one-way hash function such as SHA-1 (Secure Hash Algorithm) to generate the four session keys. 6/3/2016DRKH/ Hamdan and El Shibani 8

The Encryption and the Decryption of a Message Choose the session key based on the hopping sequence. The IV corresponding to the chosen session key is then incremented by one and mixed with the corresponding session key using a non-linear lookup based-table substitution. The output form the previous step is then used to reinitialize RC4 state (Not KSA). Then station runs the initialized RC4-PRNA(pseudo-random generation algorithm) to produce cipher stream. The final step is to XOR the resulted cipher stream with the plaintext to generate the cipher text. 6/3/2016DRKH/ Hamdan and El Shibani 9

Conclusion In this paper a lightweight wireless security protocol, DRKH, was presented. DRKH is suitable for solar and battery powerd devices. The focus was mostly on the steps to generate the session keys using a one-way hash function. These session keys are used for data encryption and decryption in DRKH. 6/3/2016DRKH/ Hamdan and El Shibani 10

References [1] Baraka, Eissa, Fayek, and Kholaif. “DRKH: A Power Efficient Encryption Protocol for Wireless Devices” Local Computer Networks, Sydney, NSW. IEEE [2] Jones, P. The Internet Engineering Task Force (IETF). September Web. 16 April [3] Wade, and Lawrence Washington. Introduction to Cryptography with Coding Theory. New Jersey: Pearson Education, print. 6/3/2016DRKH/ Hamdan and El Shibani 11