The Polymorphic Medley Cipher: 128 bit block length, bit key length
|
|
|
- Alexia Norris
- 10 years ago
- Views:
Transcription
1 The Polymorphic Medley Cipher: 128 bit block length, bit key length C. B. Roellgen, PMC Ciphers, Inc Abstract Ever since the invention of the Polymorphic Cipher, the highly variable concept has caused a noticeable amount of fear in the publically financed security sector which reacted hastily and violently through commentators who tried to shrug the concept off. The underlying idea of - at minimum - selecting a cipher from a set of conceptually different ciphers in a keyed operation, is although as simple as it is effective and a similar and undisputed concept has even been implemented in very popular encryption products since at least 20 years. So far the goal of PMC Ciphers was to create ultimate ciphers that could not be broken at all. For that reason, block sizes need to be excessively big and preferentially variable. So far a Polymorphic Cipher that is designed sufficiently close to keyed cipher selection and that utilizes widely used royalty-free cipher primitives like Anubis or the commonly known AES Rijndael encryption functions was missing. In order to make a demonstration of a cipher of ciphers available, the royalty-free 128 bit Polymorphic Medley Cipher is from now on available for cryptanalysis and for use by everybody who wishes to implement the cipher in any product for civil use. Key words: polymorphic, encryption, cipher, cascade, block, size, key, plaintext, ciphertext, cipher block chaining, CBC, electronic codebook, ECB, initialization vector, AES, Rijndael, Twofish, Serpent, Cast-256, RC6, SEED, Camellia, Anubis, hash, compression, SHA-256, Whirlpool, RIPEMD, Tiger, HAVAL-256, combined secrecy system, pseudorandom number generator, PRNG. 1. Introduction In 1999 I've invented a cipher that was compiled from the user-supplied key and I called the idea "Polymorphic Cipher" as the different ciphers always came with the same interface, but with different code to perform the task to encrypt data. If a polymorphic cipher cannot be compiled - which today is prevented by many microprocessor platforms though DEP (Data Execution Prevention) in order to prevent viruses from doing malicious things, it is still possible to use totally variable round functions or to simply select a cipher from a set of base ciphers and to cascade a number of encryption operations. The latter concept is widely known to be a real useful feature in data encryption software. As an example, a popular open-source Disk Encryption Software named TrueCrypt allows users to select the cipher from a set of three ciphers with a similar interface: - AES Rijndael - Serpent - Twofish It is further possible to select the following cascades: - AES-Twofish - AES-Twofish-Serpent - Serpent-AES - Serpent-Twofish-AES - Twofish-Serpent The fact that the user selects the cipher or the cascade of ciphers makes the selection operation a so-called "keyed operation". Due to high amount of entropy in ciphertexts produced by commonly used encryption algorithms like Serpent, an attacker cannot distinguish ciphers by analyzing large amounts of ciphertext. An attacker thus needs to try each cipher if he doesn't know the keyphrase. 1
2 Cascades of ciphers may consume a bit more CPU time, but an attacker can as well not distinguish between a single cipher or a cascade of ciphers. C.E. Shannon [1] provides the background for this. TrueCrypt although only allows to choose from eight different ciphers (ciphers and cascades) and only two combinations of triple encryption are provided. According to [3] and [4], single and double encryption feature almost the same attack security. Wouldn't it make sense to always cascade - let's say - eight ciphers from a set of (e.g.) eight ciphers like AES Rijndael, Serpent or Anubis? Of course it this would make sense, simply because the math looks challenging for attackers and cryptanalysts! Having to try 8 encryption functions is certainly a difficult task (TrueCrypt), but the need to make a guess between e.g for a cascade of 8 ciphers (every base cipher is guaranteed to be used once in the cascade) or even 16 million encryption functions (arbitrary selection of base ciphers) is a task that is more difficult by several orders of magnitude and even if half of the "cipher primitives" were considered as being "weak" or "broken", the cascade would still provide for a good safety margin. It is evident that the sequence in the cascade cannot be set in a dropdown menu any more. It makes much more sense to include this operation in the key setup function. Actually the cascade provides for at least 15 additional password bits (8!). The key setup function is actually the decisive weakness of ciphers like AES Rijndael as this function executes very fast (850 clock cycles for 128 bit keys on a Pentium Pro microprocessor [2]). Twofish needs ten times longer - from the standpoint of an attacker a disaster. What if key setup took hundreds of millions of clock cycles? For a smart card chip application, a cipher with such characteristics would be useless, but a billion instructions are crunched by CPUs of modern smartphones or desktop PCs within a second or less. The average user would probably feel a slight delay until a data connection was established, but an attacker would suddenly be deprived of the most common attack - the brute force attack using a dictionary. It is logical that the performance of a 128 bit cipher of ciphers is limited by the comparably small and fixed block size. Cascade block ciphers can although very well increase attack security over any of the implemented base ciphers (AES Rijndael, Twofish, Serpent, Cast-256, RC6, SEED, Camellia and Anubis) [3] and [4]. Attack security is finally what it's all about. 2
3 2. The cipher Recent work [3] proves that "for the wide class of block ciphers with smaller key space than message space, a reasonable increase in the length of the cascade improves the encryption security". By using base ciphers with identical key space and message space, encryption security is likely to be very high. The cipher is a cascade block cipher with eight 128 bit base ciphers all operated in 128 bit key length mode. The minimum key length is 128 bit in 8-bit words (16 bytes). Maximum key length is 1024 bit. Block size is exactly 128 bit in 8-bit words (16 bit). All base ciphers feature an identical interface through the use of wrapper functions. As an example, here's the wrapper function for the Anubis encryption function: void CIPHER_PRIMITIVE_ENCRYPT_Anubis128(void * pcc,uint8 * p128bit_plaintext,uint8 * p128bit_ciphertext) struct crypto_primitives::nessiestruct_anubis * panubis_cc; panubis_cc=(crypto_primitives::nessiestruct_anubis *)pcc; crypto_primitives::nessieencrypt(panubis_cc,p128bit_plaintext,p128bit_ciphertext); The interface of the Polymorphic Medley Cipher consists of a key setup function, a basic encryption function, a corresponding decryption function and a function that frees the random access memory that holds the Internal State of the cipher. An alternative ECB mode encryption function as well as an encryption function for CBC mode is provided as well. The key setup function int PMCMED_keysetup(uint8 * pkey,void * ppmcmed_cc,uint32 key_length_in_bits,uint32 complexity) initializes the crypto context (pointer ppmcmed_cc to the struct supplied as the second parameter with the key (pointer pkey supplied as first parameter). The key length as well as a complexity parameter are as well provided. key length is the number of key bits (must be a multiple of 8). The complexity parameter is provided to allow key setup to be considerably fast, but also very slow. Values in the range of make the function execute fast and values up to slow the function down. In the latter case, a multitude of keyed operations involving all base ciphers and hash functions are called many times in order to compute the Internal State of the Polymorphic Medley Cipher. Three sets of encryption/decryption functions - two for data encryption in ECB (Electronic Code Book) mode and one data encryption in CBC (Cipher Block Chaining) mode exist: The encryption function void PMCMED_encrypt_cascade(void * ppmcmed_cc,uint8 * pplaintext,uint8 * pciphertext) executes all base ciphers one after the other with different keys in an order that is set by the key setup function. The sequence of eight ciphers is set by the key setup function. Each base cipher is guaranteed to be used exactly one time in the cascade. The number of possible cipher combinations is exactly The decryption function void PMCMED_decrypt_cascade(void * ppmcmed_cc,uint8 * pciphertext,uint8 * pplaintext) executes the cascade in reverse order. The encryption function void PMCMED_encrypt_max_var_cascade(void * ppmcmed_cc,uint8 * pplaintext,uint8 * pciphertext) executes eight base ciphers that operate with different keys one after the other in an order that is set by the key setup function. It is very well possible (with a probability of exactly 1/ ) that the very same base cipher (e.g. AES Rijndael) is executed eight times in a row with different keys, but there is nothing wrong about that. There exist exactly 2 24 = different and equally probable cipher combinations. The decryption function void PMCMED_decrypt_max_var_cascade(void * ppmcmed_cc,uint8 * pciphertext,uint8 * pplaintext) executes the cascade in reverse order. Developers can either use the functions PMCMED_encrypt_cascade() / PMCMED_decrypt_cascade() OR 3
4 PMCMED_encrypt_max_var_cascade() / PMCMED_decrypt_max_var_cascade(). The advantage of the first set of encryption/decryption functions is that all base ciphers are executed one after the other. The disadvantage is the limited number of combinations for the cascade. The second set of encryption/decryption functions is likely to be advantageous due to optimum attack security as approximately 24 bit of variability are present rather than only 14 bit. The encryption function void PMCMED_CBC_encrypt_cascade(void * ppmcmed_cc,uint8 * pplaintext,uint8 * pciphertext) performs CBC encryption of any number of consecutive blocks of data. It executes eight base ciphers that operate with different keys one after the other in an order that is set by the key setup function and that is modified for each block through the use of a scheduler encryption function. There exist exactly 2 24 = different and equally probable cipher combinations for each encrypted block. The decryption function void PMCMED_CBC_decrypt_cascade(void * ppmcmed_cc,uint8 * pciphertext,uint8 * pplaintext) executes the base ciphers in reverse order. In order to be able to use the CBC encryption functions properly, CBC mode MUST be initialized once and at any point of time when synchronization to a stream of data is required - e.g. once per video frame, by calling the function void PMCMED_init_CBC_mode(void * ppmcmed_cc,word64 CBC_block_counter_start_value=0LL) The unsigned 64 bit integer number CBC_block_counter_start_value can be initialized with any value that identifies a certain section of a data stream in order to further increase attack security. The function int PMCMED_free_memory(void * ppmcmed_cc) must be called as soon as the cipher is not needed any more in an application software in order to deallocate the Internal State of the cipher. 2.1 Key Setup During the key setup phase is the key expanded for all eight base ciphers multiple times. In addition to this, function pointers to the base ciphers and hash functions are initialized and permutated. The following data is derived from the user-provided key: - Sequence of function pointers to base hash functions - Sequence of function pointers to base cipher functions - 16 different Internal States for the base cipher functions - Initialization Vector for Cipher Block Chaining (CBC) mode - Selection of a base cipher that is used as scheduler and Initialization Vector for the scheduler The 16 different Internal States for the eight base ciphers requires approximately 154 kbytes of RAM, which forces an attacker to provide this costly hardware multiple times in order to mount a distributed attack. The key setup function uses the compression functions SHA-256, Whirlpool, RIPEMD, Tiger and HAVAL- 256 to compute a pseudorandom sequence of these hash functions as well as a pseudorandom sequence of all eight base ciphers, then to compute hash results, to further swap function pointers to the base ciphers, to initialize the scheduler for CBC operations and finally to initialize a set of cipher contexts for the base ciphers - 16 for each base cipher. 2.2 Encryption/Decryption in ECB mode with cascades consisting of the entire set of base ciphers For the encryption and decryption in ECB (Electronic Code Book) mode, one set of cipher contexts is selected at the end of the key setup function. The same function determines the sequence of ciphers that are later executed in a cascade by the EBC mode encryption and decryption functions PMCMED_encrypt_cascade() and PMCMED_decrypt_cascade(). Each base cipher is executed exactly once in 4
5 the cascade at any position in the queue. Eight base ciphers are thus executed one after the other. The ciphertext of the first base cipher is the plaintext of the next base cipher in the queue and so on. This is the source code of the encryption function: void PMCMED_encrypt_cascade(void * ppmcmed_cc,uint8 * pplaintext,uint8 * pciphertext) int i,j; struct PMCMED_cipher_context * ppmcmed_cipher_ctx; ppmcmed_cipher_ctx=(struct PMCMED_cipher_context *)ppmcmed_cc; j=ppmcmed_cipher_ctx->ciphertext_scheduler[0] & (NUM_OF_CRYPTO_CONTEXTS_PER_CIPHER_DELEGATE-1); // let's select a certain set of contexts for (i=0;i<num_of_cipher_function_delegates;i++) ppmcmed_cipher_ctx->encryption_func_delegates[i]( (void *)&ppmcmed_cipher_ctx->pcc[((i*num_of_crypto_contexts_per_cipher_delegate)+j) *MAX_SIZE_OF_CRYPTO_CONTEXT_IN_BYTES],pPlaintext,pCiphertext); i++; ppmcmed_cipher_ctx->encryption_func_delegates[i]( (void *)&ppmcmed_cipher_ctx->pcc[((i*num_of_crypto_contexts_per_cipher_delegate)+j) *MAX_SIZE_OF_CRYPTO_CONTEXT_IN_BYTES],pCiphertext,pPlaintext); memcpy(pciphertext,pplaintext,16); memset(pplaintext,0xaa,16); The function looks up the set of cipher contexts to use and subsequently encrypts the plaintext repeatedly with all available base ciphers. There exist n! cipher combinations (8 * 7 * 6 * 5 * 4 * 3 * 2 * 1 = ). The advantage of executing all available base ciphers in an arbitrary sequence is that the entire set of base ciphers is definitely being used. There exist although only possible combinations for cascades. The decryption function executes the ciphers in reverse order. 2.3 Encryption/Decryption in ECB mode with cascades consisting of an arbitrary combination of base ciphers For the encryption and decryption in ECB (Electronic Code Book) mode, one set of cipher contexts is selected at the end of the key setup function. The same function determines the sequence of ciphers that are later executed in a cascade by the EBC mode encryption and decryption functions PMCMED_encrypt_cascade() and PMCMED_decrypt_cascade(). Any base cipher can be selected for any position in the queue. Eight base ciphers are thus executed one after the other and the probability for a single base cipher being selected for all positions in the queue is 1/ = The ciphertext of the first base cipher is the plaintext of the next base cipher in the queue and so on. This is the source code of the encryption function: void PMCMED_encrypt_max_var_cascade(void * ppmcmed_cc,uint8 * pplaintext,uint8 * pciphertext) int i,j; struct PMCMED_cipher_context * ppmcmed_cipher_ctx; int index_arr[num_of_cipher_function_delegates]; ppmcmed_cipher_ctx=(struct PMCMED_cipher_context *)ppmcmed_cc; for (i=0;i<num_of_cipher_function_delegates;i++) index_arr[i]=( ppmcmed_cipher_ctx->ciphertext_scheduler[i]>>4) & (NUM_OF_CIPHER_FUNCTION_DELEGATES-1); j=ppmcmed_cipher_ctx->ciphertext_scheduler[ppmcmed_cipher_ctx->ciphertext_scheduler[0] & 0x0f] & (NUM_OF_CRYPTO_CONTEXTS_PER_CIPHER_DELEGATE-1); for (i=0;i<num_of_cipher_function_delegates;i++) ppmcmed_cipher_ctx->encryption_func_delegates[index_arr[i]]( (void *)&ppmcmed_cipher_ctx->pcc[((index_arr[i] *NUM_OF_CRYPTO_CONTEXTS_PER_CIPHER_DELEGATE)+j) *MAX_SIZE_OF_CRYPTO_CONTEXT_IN_BYTES],pPlaintext,pCiphertext); i++; 5
6 ppmcmed_cipher_ctx->encryption_func_delegates[index_arr[i]]( (void *)&ppmcmed_cipher_ctx->pcc[((index_arr[i] *NUM_OF_CRYPTO_CONTEXTS_PER_CIPHER_DELEGATE)+j) *MAX_SIZE_OF_CRYPTO_CONTEXT_IN_BYTES],pCiphertext,pPlaintext); memcpy(pciphertext,pplaintext,16); memset(pplaintext,0xaa,16) The function looks up the set of cipher contexts that are to be used, initializes an array that contains indexes that point to certain base cipher functions and subsequently it encrypts the plaintext repeatedly with the previously selected base ciphers. There exist 2 24 = cipher combinations. The advantage of selecting base ciphers without any restriction is the large number of equally probably combinations for the cascade. The decryption function executes the ciphers in reverse order. 2.4 Encryption/Decryption in CBC mode with cascades consisting of an arbitrary combination of base ciphers In Cipher Block Chaining mode, blocks of data are encrypted/decrypted one after the other with each data block depending on the ciphertext of the previously encrypted block. It is thus possible to further add variability for the cipher during encryption/decryption. CBC mode requires the initialization of a data buffer which holds the ciphertext generated by the previous encryption of a data block with an Initialization Vector IV as there is no previously generated ciphertext available in the first place. Additionally, a block counter can be initialized, e.g. with the frame number of an encrypted video stream or a timestamp in an audio file, etc. This mechanism allows to randomize encryption operations so that the encryption of static data, but with different values for the block counter, result in (ideally) indistinguishable ciphertext. The CBC encryption/decryption functions utilize this block counter value internally to alter the selection of base ciphers prior to each and every block encryption. The default value is 0 when CBC mode is initialized using this function: void PMCMED_init_CBC_mode(void * ppmcmed_cc,word64 CBC_block_counter_start_value=0LL) struct PMCMED_cipher_context * ppmcmed_cipher_ctx; if (!ppmcmed_cc) return; ppmcmed_cipher_ctx=(struct PMCMED_cipher_context *)ppmcmed_cc; ppmcmed_cipher_ctx->cbc_block_counter=cbc_block_counter_start_value; memcpy(ppmcmed_cipher_ctx->last_block_cbc,ppmcmed_cipher_ctx->iv_for_cbc,16); Encryption in CBC mode of any number of consecutive data blocks of data is performed through this encryption function: void PMCMED_CBC_encrypt_cascade(void * ppmcmed_cc,uint8 * pplaintext,uint8 * pciphertext) struct PMCMED_cipher_context * ppmcmed_cipher_ctx; word64 w64buf; int i,j; int index_arr[num_of_cipher_function_delegates]; if (!ppmcmed_cc) return; ppmcmed_cipher_ctx=(struct PMCMED_cipher_context *)ppmcmed_cc; w64buf=ppmcmed_cipher_ctx->cbc_block_counter; ppmcmed_cipher_ctx->cbc_block_counter++; memcpy(ppmcmed_cipher_ctx->plaintext_scheduler,ppmcmed_cipher_ctx->initial_plaintext_scheduler,16); ppmcmed_cipher_ctx->plaintext_scheduler[7]^=(uint8)(w64buf & 0xff); ppmcmed_cipher_ctx->plaintext_scheduler[1]^=(uint8)((w64buf>>8) & 0xff); ppmcmed_cipher_ctx->plaintext_scheduler[5]^=(uint8)((w64buf>>16) & 0xff); ppmcmed_cipher_ctx->plaintext_scheduler[4]^=(uint8)((w64buf>>24) & 0xff); ppmcmed_cipher_ctx->plaintext_scheduler[3]^=(uint8)((w64buf>>32) & 0xff); ppmcmed_cipher_ctx->plaintext_scheduler[2]^=(uint8)((w64buf>>40) & 0xff); 6
7 ppmcmed_cipher_ctx->plaintext_scheduler[6]^=(uint8)((w64buf>>48) & 0xff); ppmcmed_cipher_ctx->plaintext_scheduler[0]^=(uint8)((w64buf>>56) & 0xff); // let's now generate 128 bit that are impossible to guess. We'll derive from that data the sequence // of the ciphers ppmcmed_cipher_ctx->encryption_func_of_scheduler( ppmcmed_cipher_ctx->crypto_context_of_scheduler, ppmcmed_cipher_ctx->plaintext_scheduler,ppmcmed_cipher_ctx->ciphertext_scheduler); for (i=0;i<num_of_cipher_function_delegates;i++) index_arr[i]= (ppmcmed_cipher_ctx->ciphertext_scheduler[i]>>4) & (NUM_OF_CIPHER_FUNCTION_DELEGATES-1); for (i=0;i<num_of_cipher_function_delegates+(ppmcmed_cipher_ctx->ciphertext_scheduler[0] & 0x000f);i++) j=index_arr[0]; index_arr[0]=index_arr[(i+ppmcmed_cipher_ctx->ciphertext_scheduler[i & 0x0f]) & (NUM_OF_CIPHER_FUNCTION_DELEGATES-1)]; index_arr[(i+ppmcmed_cipher_ctx->ciphertext_scheduler[i & 0x0f]) & (NUM_OF_CIPHER_FUNCTION_DELEGATES-1)]=j; j=ppmcmed_cipher_ctx->ciphertext_scheduler[0] & (NUM_OF_CRYPTO_CONTEXTS_PER_CIPHER_DELEGATE-1); // perform CBC now for (i=0;i<16;i++) pplaintext[i]^=ppmcmed_cipher_ctx->last_block_cbc[i]; // encrypt with unknown sequence of ciphers for (i=0;i<num_of_cipher_function_delegates;i++) ppmcmed_cipher_ctx->encryption_func_delegates[index_arr[i]]( (void *)&ppmcmed_cipher_ctx->pcc[((index_arr[i] *NUM_OF_CRYPTO_CONTEXTS_PER_CIPHER_DELEGATE)+j) *MAX_SIZE_OF_CRYPTO_CONTEXT_IN_BYTES],pPlaintext,pCiphertext); i++; ppmcmed_cipher_ctx->encryption_func_delegates[index_arr[i]]( (void *)&ppmcmed_cipher_ctx->pcc[((index_arr[i] *NUM_OF_CRYPTO_CONTEXTS_PER_CIPHER_DELEGATE)+j) *MAX_SIZE_OF_CRYPTO_CONTEXT_IN_BYTES],pCiphertext,pPlaintext); memcpy(pciphertext,pplaintext,16); memcpy(ppmcmed_cipher_ctx->last_block_cbc,pciphertext,16); memset(pplaintext,0xaa,16); // let's disguise our last intermediate result The function first modifies a 128 bit pseudorandom number with the block counter and encrypts this number through one of the base ciphers that is used as a "scheduler". The resulting ciphertext is nothing but a stream of pseudorandom numbers that determine which of the eight base ciphers is executed at what time in the queue of eight cipher slots. Above of this, a set of cipher contexts is selected once per function call from the result of the "scheduler" encryption operation. This function allows for optimum attack security as almost any operation is influenced by a keyed operation. The decryption function void PMCMED_CBC_decrypt_cascade(void * ppmcmed_cc,uint8 * pciphertext,uint8 * pplaintext) performs the same steps, but it executes the base ciphers in reverse order and performs the CBC operation (as a matter of logic) at the end. 7
8 3. Attack security and performance The security of cascades has been an open question until 2006/2009. The security of cascades of l 3 block ciphers improves significantly over single or double encryption ( l = 1 or l = 2 ) [3]. Gazi and Maurer write in [3]: "In a recent paper [4], Bellare and Rogaway have claimed a lower bound on the security of triple encryption in the ideal cipher model. Their bound implies that for a block cipher with key length k and block length n, triple encryption is indistinguishable from a random permutation as long as the distinguisher is allowed to make not more than roughly 2 k + 1/ 2 min[ n, k ] queries." 3 / 2 k In our case k equals n, which yields for the advantage 2, which is significant! Cascading only three ideal 128 bit block ciphers with 128 bit key length can be as secure as a 192 bit block cipher. AES Rijndael, Twofish, etc. are certainly not ideal ciphers, but they are certainly still a good choice to realize a cipher cascade. Gazi and Maurer [3] continue with "This bound is significantly higher than the known upper bound on the security of single and double encryption, proving that triple encryption is the shortest cascade that provides a reasonable security improvement over single encryption. Since a longer cascade is at least as secure as a shorter one, their bound applies also to longer cascades. They formulate as an interesting open problem to determine whether the security improves with the length of the cascade also for lengths l > 3." Due to the fact that the Polymorphic Medley Cipher always makes 8 calls to several ciphers out of a set of 128 bit encryption functions, the time that it takes to encrypt one block of 16 bytes (128 bit) is roughly 8 times longer than the average time it takes to encrypt a single block with AES Rijndael, Anubis, Twofish, Serpent, etc. Attack security is tightly linked to speed - especially to the key setup time. This is typically the weak point of ciphers that are heavily promoted by government organizations whose mission is to spy on people. Key setup for AES only "costs" several hundred instructions. A single core on a modern microprocessor can perform 2.89 million key setups per second! The Polymorphic Medley Cipher is although designed for a long and adjustable key setup time. Key setup on a single core of a modern microprocessor can take between milliseconds, which allows for fast, as well as very secure operation. The longer the key setup time, the more computer power is required by an attacker to apply Brute Force or a Dictionary Attack or both. Cipher Type of machine code Encryption speed on an Intel Core i7 950 clocked at 3.06GHz [Mbit/s] Minimum key setup rate on an Intel Core i7 950 clocked at 3.06GHz [key setups/s] Maximum key setup rate on an Intel Core i7 950 clocked at 3.06GHz [key setups/s] Encryption speed on an Intel Core 2 Duo T5750 CPU, clocked at 2.0GHz [Mbit/s] Minimum key setup rate on an Intel Core 2 Duo T5750 CPU, clocked at 2.0GHz [key setups/s] Maximum key setup rate on an Intel Core 2 Duo T5750 CPU, clocked at 2.0GHz [key setups/s] Polymorphic Polymorphic AES (tablebased) AES (table-based) Medley Cipher Medley Cipher 32 bit C++ x86 64 bit C++ x64 32 bit C++ x86 64 bit C++ x64 code code code code n/a 394 n/a 79 n/a n/a 7 n/a n/a Table 1: Encryption speed comparison: The Polymorphic Medley Cipher vs. AES, desktop PC and laptop computer, compiler: Microsoft Visual C
9 4. Comparison of AES vs. Polymorphic Medley Cipher vs. The Polymorphic Giant Block Encryption Algorithm Design goal Polymorphic Giant Block Size Cipher Polymorphic Medley Cipher AES Rijndael Large and variable block size No padding to reach block granularity shall be necessary Block size is only limited by the resources of the target computer(s). Target systems should run at 500MHz or higher and more than 10Mbyte free RAM should be available. The Strict Avalanche Criterion is thus met perfectly. Block size is totally variable and blocks keep their length => no padding required, which results in no information being transmitted in vein. Not supported at all, but the approx. 10 times larger machine code and required RAM of 154kByte make the design more complex than AES alone. Like AES: 16 byte block granularity Padding required Not supported at all. Ciphers like AES need little more than 1Kbyte of machine code and a microcontroller typically used in cheap smart cards and washing machines (approx transistors) to run. It is conceivable that such conventional ciphers could have been hardened against all kinds of attacks if more complex implementations would have been the target. DES: 8 byte block granularity, AES: 16 byte block granularity Padding required A 2048 bit conventional block cipher would require padding to 256 byte blocks resulting in dramatic increase in data traffic if used for the encryption of TCP or UDP data packets. Partitioning of extremely big blocks at arbitrary position Resistance against all known attacks Resistance to future attacks that may cut effective key size by ½ or even 2/3 Extremely long key setup time Runs on any 8-, 16-, 32- and 64 bit microprocessor and microcontroller. Classic ciphers are static and can thus be thoroughly reverseengineered and analyzed. Cryptanalysis of a mechanism that does always exactly the same is somewhat easier than for a mechanism that never executes the same operation twice. Less than transistor functions are required to build an AES block. Approx AES blocks can run in parallel on an 8 wafer to try and break a code using Brute Force. Platform independenc e Polymorphism and data dependent selection of functions Use of large amounts of resources Attacks need to be Blocks that are too big to handle are truncated into sub-blocks with block sizes that are determined by the key as well as the length of the original block. Due to its variable nature are Polymorphic Ciphers not susceptible to typical attacks that target specific characteristics and/or known weaknesses of fixed ciphers. Brute Force is although applicable to any cipher. Cutting of effective key size by ¾ would result in still extremely high complexity of O(2 256 ) or higher, which is regarded as totally safe for the next trillion years. > 100ms on a modern microprocessor make comparably short keys safe against Brute Force attacks conducted on a few machines. Extremely long key setup time increases energy consumption multiplied by the time needed for Brute Force by factor Runs on any 32 or 64 bit microprocessor or microcontroller. The cipher is not only completely variable, but also is the block size huge and unpredictable if truncation is performed. No static weakness is exhibited. 1 Mbit internal state requires at least approx. 8 million transistor equivalents to run. This alone makes Brute Force Attack more difficult and much more expensive compared with conventional ciphers. The proposed cipher requires a lot of resources and extremely Not supported at all. Block size is fixed to 16 bytes just like AES. Design is more resistant than AES to Dictionary Attacks due to a long and irreducible key setup time (more than 100 million machine instructions). The cipher is bit more resistant against DPA (Differential Power Attack), but only because the complexity of the design. Cutting of effective key size by ¾ would result in still extremely high complexity of O(2 256 ), but only if long keys (1024 bit) are actually used ms on a modern microprocessor make medium-sized keys quite safe against Brute Force attacks if the attacks are conducted on a few machines. Runs on any 32 or 64 bit microprocessor or microcontroller. The cipher is variable, and there are no static weaknesses. The Cipher-Block-Chaining encryption function is even data dependent. 154 Mbyte of internal state need to be provided by an attacker. Mounting a Brute Force Attack on a large number of code breaker cores is much more expensive compared with conventional ciphers. The proposed cipher requires a lot of resources and extremely Not supported at all. AES, DES and all other well-known block ciphers feature fixed block sizes. AES can be broken easily by DPA (Differential Power Attack) on small microprocessors and microcontrollers [5]. Cutting of effective key size by ½ results in an extremely low complexity of The cipher would be regarded as being broken. [6] <1µs help attackers to try each and every password combination. This is highly dangerous if short passwords are being used to protect data. Trying different AES keys requires transistor equivalents and 9
10 expensive for an attacker much time for key setup, an attacker requires a time x resources product of approx times compared with AES Rijndael when using keys with a similar length. High speed 1500 Mbit/s on an Intel Core i7 950 (3.06GHz) (64 bit C++ code, 1024 byte block length) Proven security Three round Luby Rackoff features proven security. Polymorphic encryption is increasingly popular among experts but it s probably impossible to prove security of the entire cipher. much time for key setup, an attacker requires a time x resources product of approx times compared with AES Rijndael when using keys with a similar length. 135 Mbit/s on an Intel Core i7 950 (3.06GHz) (64 bit C++ code) Due to a relatively large number of conceptually different base ciphers like Anubis or Serpent or AES, known weaknesses of these base ciphers play no role. Cascades actually improve attack security noticeably [3] and [4]. This alone is sufficient to assume a higher attack security than for AES alone. Licensing Cipher is NOT open source and a license needs to be bought from PMC Ciphers, Inc. Cipher is open source and royalty-free. Table 2: Comparison of key features of different ciphers less than 1µs. This isn t really all that much. This is a REAL weakness Mbit/s on an Intel Core Core i7 950 (3.06GHz) (64 bit C++ code) Security is not proven. Extensive peer review indicates that the cipher could be broken in the future: For 128-bit Rijndael, the problem of recovering the secret key from one single plaintext can be written as a system of 8000 quadratic equations with 1600 binary unknowns. [8] Recently has a new related-key boomerang attack on the full AES- 192 and the full AES-256 been found by. Biryukov and Khovratovich [7]. A 256 bit key is reduced to a 119bit key when using AES-256. The attack is not applicable to 128 bit keys. Cipher is open source and royaltyfree. 5. Conclusion The proposed Polymorphic Medley Cipher is probably the first implementation of a cascaded cipher based on eight conceptually different and widely discussed base ciphers in order to increase attack security over single or double encryption. The base ciphers as well as the sequence of their execution is determined during key setup or even at runtime of the CBC encryption/decryption functions. The cipher is a Polymorphic Encryption Algorithm that gives an attacker no chance to know which base cipher has actually been used in an encryption operation and where in the queue. Attackers are deprived of constants and exhaustive sieve (Brute Force Attack) is impeded by a key setup procedure that consumes a lot of time. Parallelization of exhaustive sieve is hampered through the sheer amount of space on a silicon wafer required to implement the cipher. As the cipher is royalty-free, open source, based on well-analyzed base ciphers and hash functions and as it's easy to use, it certainly makes sense to implement it in commercial software. 10
11 References: [1] C.E. Shannon. Communication theory of secrecy systems. Bell System Technical Journal, 1949 [2] B. Schneier, J. Kelsey, D. Whiting, D. Wagner, C. Hall, N. Ferguson. Performance Comparison of the AES Submissions. (1999) [3] P. Gazi, U. Maurer. Cascade Encryption Revisited. ASIACRYPT 2009, LNCS 5912, pp (2009) [4] M. Bellare, P. Rogaway. Code-Based Game-Playing Proofs and the Security of Triple Encryption. Eurocrypt LNCS, vol. 4004, pp Springer, Heidelberg (2006), [5] S. Chari, C. Jutla, J.R. Rao, P. Rohatgi. A cautionary Note Regarding Evaluation of AES Candidates on Smart-Cards [6] Orr Dunkelman, Nathan Keller. A New Criterion for Nonlinearity of Block Ciphers [7] A. Biryukov, D. Khovratovich, Related-key Cryptanalysis of the Full AES-192 and AES-256, [8] Nicolas T. Courtois, Josef Pieprzyk. Cryptanalysis of Block Ciphers with Overdefined Systems of Equations
12 For more information: This is a preliminary document and may be changed substantially prior to final commercial release. This document is provided for informational purposes only and PMC Ciphers & Global IP Telecommunications make no warranties, either express or implied, in this document. Information in this document is subject to change without notice. The entire risk of the use or the results of the use of this document remains with the user. The example companies, organizations, products, people and events depicted herein are fictitious. No association with any real company, organization, product, person or event is intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of PMC Ciphers or Global IP Telecommunications. PMC Ciphers or Global IP Telecommunications may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from PMC Ciphers or Global IP Telecommunications, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property PMC Ciphers, Inc. & Global IP Telecommunications, Ltd.. All rights reserved. Microsoft, the Office logo, Outlook, Windows, Windows NT, Windows 2000, Windows XP, Windows Vista, Windows 7 and Windows 8 are either registered trademarks or trademarks of Microsoft Corporation in the U.S.A. and/or other countries. Company and product names mentioned herein may be the trademarks of their respective owners. 12
Visualisation of potential weakness of existing cipher engine implementations in commercial on-the-fly disk encryption software
Visualisation of potential weakness of existing cipher engine implementations in commercial on-the-fly disk encryption software C. B. Roellgen Global IP Telecommunications, Ltd. & PMC Ciphers, Inc. August
Software License Management using the Polymorphic Encryption Algorithm White Paper
pmc-ciphers.com Software License Management using the Polymorphic Encryption Algorithm White Paper Published: May 2007, first published in January 2003 PMC Software License Management 1 Software License
The Misuse of RC4 in Microsoft Word and Excel
The Misuse of RC4 in Microsoft Word and Excel Hongjun Wu Institute for Infocomm Research, Singapore [email protected] Abstract. In this report, we point out a serious security flaw in Microsoft
1 Data Encryption Algorithm
Date: Monday, September 23, 2002 Prof.: Dr Jean-Yves Chouinard Design of Secure Computer Systems CSI4138/CEG4394 Notes on the Data Encryption Standard (DES) The Data Encryption Standard (DES) has been
Network Security. Chapter 3 Symmetric Cryptography. Symmetric Encryption. Modes of Encryption. Symmetric Block Ciphers - Modes of Encryption ECB (1)
Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Network Security Chapter 3 Symmetric Cryptography General Description Modes of ion Data ion Standard (DES)
Cryptography and Network Security Block Cipher
Cryptography and Network Security Block Cipher Xiang-Yang Li Modern Private Key Ciphers Stream ciphers The most famous: Vernam cipher Invented by Vernam, ( AT&T, in 1917) Process the message bit by bit
CSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Secret Key Cryptography (I) 1 Introductory Remarks Roadmap Feistel Cipher DES AES Introduction
IronKey Data Encryption Methods
IronKey Data Encryption Methods An IronKey Technical Brief November 2007 Information Depth:Technical Introduction IronKey is dedicated to building the world s most secure fl ash drives. Our dedication
The Advanced Encryption Standard: Four Years On
The Advanced Encryption Standard: Four Years On Matt Robshaw Reader in Information Security Information Security Group Royal Holloway University of London September 21, 2004 The State of the AES 1 The
Password-based encryption in ZIP files
Password-based encryption in ZIP files Dmitri Gabbasov December 15, 2015 Abstract In this report we give an overview of the encryption schemes used in the ZIP file format. We first give an overview of
Common Pitfalls in Cryptography for Software Developers. OWASP AppSec Israel July 2006. The OWASP Foundation http://www.owasp.org/
Common Pitfalls in Cryptography for Software Developers OWASP AppSec Israel July 2006 Shay Zalalichin, CISSP AppSec Division Manager, Comsec Consulting [email protected] Copyright 2006 - The OWASP
How To Encrypt With A 64 Bit Block Cipher
The Data Encryption Standard (DES) As mentioned earlier there are two main types of cryptography in use today - symmetric or secret key cryptography and asymmetric or public key cryptography. Symmetric
Lecture 4 Data Encryption Standard (DES)
Lecture 4 Data Encryption Standard (DES) 1 Block Ciphers Map n-bit plaintext blocks to n-bit ciphertext blocks (n = block length). For n-bit plaintext and ciphertext blocks and a fixed key, the encryption
Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key
Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key Julia Juremi Ramlan Mahmod Salasiah Sulaiman Jazrin Ramli Faculty of Computer Science and Information Technology, Universiti Putra
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS)
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS) Ashraf Odeh 1, Shadi R.Masadeh 2, Ahmad Azzazi 3 1 Computer Information Systems Department, Isra University,
Pipeliner CRM Phaenomena Guide Administration & Setup. 2015 Pipelinersales Inc. www.pipelinersales.com
Administration & Setup 05 Pipelinersales Inc. www.pipelinersales.com Administration & Setup Learn how to manage your sales team with Pipeliner Sales CRM Application. CONTENT. Managing Pipeliner s Users
Network Security. Modes of Operation. Steven M. Bellovin February 3, 2009 1
Modes of Operation Steven M. Bellovin February 3, 2009 1 Using Cryptography As we ve already seen, using cryptography properly is not easy Many pitfalls! Errors in use can lead to very easy attacks You
Network Security - ISA 656 Introduction to Cryptography
Network Security - ISA 656 Angelos Stavrou September 18, 2007 Codes vs. K = {0, 1} l P = {0, 1} m C = {0, 1} n, C C E : P K C D : C K P p P, k K : D(E(p, k), k) = p It is infeasible to find F : P C K Let
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No. # 11 Block Cipher Standards (DES) (Refer Slide
Cryptography and Network Security Chapter 3
Cryptography and Network Security Chapter 3 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 3 Block Ciphers and the Data Encryption Standard All the afternoon
Cryptography and Network Security
Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 3: Block ciphers and DES Ion Petre Department of IT, Åbo Akademi University January 17, 2012 1 Data Encryption Standard
AES Cipher Modes with EFM32
AES Cipher Modes with EFM32 AN0033 - Application Note Introduction This application note describes how to implement several cryptographic cipher modes with the Advanced ion Standard (AES) on the EFM32
Cryptographic Algorithms and Key Size Issues. Çetin Kaya Koç Oregon State University, Professor http://islab.oregonstate.edu/koc [email protected].
Cryptographic Algorithms and Key Size Issues Çetin Kaya Koç Oregon State University, Professor http://islab.oregonstate.edu/koc [email protected] Overview Cryptanalysis Challenge Encryption: DES AES Message
Developing and Investigation of a New Technique Combining Message Authentication and Encryption
Developing and Investigation of a New Technique Combining Message Authentication and Encryption Eyas El-Qawasmeh and Saleem Masadeh Computer Science Dept. Jordan University for Science and Technology P.O.
SkyRecon Cryptographic Module (SCM)
SkyRecon Cryptographic Module (SCM) FIPS 140-2 Documentation: Security Policy Abstract This document specifies the security policy for the SkyRecon Cryptographic Module (SCM) as described in FIPS PUB 140-2.
A Comparative Study Of Two Symmetric Encryption Algorithms Across Different Platforms.
A Comparative Study Of Two Symmetric Algorithms Across Different Platforms. Dr. S.A.M Rizvi 1,Dr. Syed Zeeshan Hussain 2 and Neeta Wadhwa 3 Deptt. of Computer Science, Jamia Millia Islamia, New Delhi,
CIS433/533 - Computer and Network Security Cryptography
CIS433/533 - Computer and Network Security Cryptography Professor Kevin Butler Winter 2011 Computer and Information Science A historical moment Mary Queen of Scots is being held by Queen Elizabeth and
Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the
SAS Data Set Encryption Options
Technical Paper SAS Data Set Encryption Options SAS product interaction with encrypted data storage Table of Contents Introduction: What Is Encryption?... 1 Test Configuration... 1 Data... 1 Code... 2
IT Networks & Security CERT Luncheon Series: Cryptography
IT Networks & Security CERT Luncheon Series: Cryptography Presented by Addam Schroll, IT Security & Privacy Analyst 1 Outline History Terms & Definitions Symmetric and Asymmetric Algorithms Hashing PKI
Error oracle attacks and CBC encryption. Chris Mitchell ISG, RHUL http://www.isg.rhul.ac.uk/~cjm
Error oracle attacks and CBC encryption Chris Mitchell ISG, RHUL http://www.isg.rhul.ac.uk/~cjm Agenda 1. Introduction 2. CBC mode 3. Error oracles 4. Example 1 5. Example 2 6. Example 3 7. Stream ciphers
Pipeliner CRM Phaenomena Guide Add-In for MS Outlook. 2015 Pipelinersales Inc. www.pipelinersales.com
Add-In for MS Outlook 205 Pipelinersales Inc. www.pipelinersales.com Add-In for MS Outlook Learn how to use sales lead management with Pipeliner MS Outlook Add-In. CONTENT. Setting up Pipeliner Add-In
Block encryption. CS-4920: Lecture 7 Secret key cryptography. Determining the plaintext ciphertext mapping. CS4920-Lecture 7 4/1/2015
CS-4920: Lecture 7 Secret key cryptography Reading Chapter 3 (pp. 59-75, 92-93) Today s Outcomes Discuss block and key length issues related to secret key cryptography Define several terms related to secret
How To Understand And Understand The History Of Cryptography
CSE497b Introduction to Computer and Network Security - Spring 2007 - Professors Jaeger Lecture 5 - Cryptography CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/
6.857 Computer and Network Security Fall Term, 1997 Lecture 4 : 16 September 1997 Lecturer: Ron Rivest Scribe: Michelle Goldberg 1 Conditionally Secure Cryptography Conditionally (or computationally) secure
Lecture Note 8 ATTACKS ON CRYPTOSYSTEMS I. Sourav Mukhopadhyay
Lecture Note 8 ATTACKS ON CRYPTOSYSTEMS I Sourav Mukhopadhyay Cryptography and Network Security - MA61027 Attacks on Cryptosystems Up to this point, we have mainly seen how ciphers are implemented. We
Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion
Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion By Kerry Maletsky, Business Unit Director Crypto Products Summary There is a growing need for strong hardware security devices
A PPENDIX H RITERIA FOR AES E VALUATION C RITERIA FOR
A PPENDIX H RITERIA FOR AES E VALUATION C RITERIA FOR William Stallings Copyright 20010 H.1 THE ORIGINS OF AES...2 H.2 AES EVALUATION...3 Supplement to Cryptography and Network Security, Fifth Edition
The 2007 R2 Version of Microsoft Office Communicator Mobile for Windows Mobile: Frequently Asked Questions
The 2007 R2 Version of Microsoft Office Communicator Mobile for Windows Mobile: Frequently Asked Questions Published: December 2008 Information in this document, including URL and other Internet Web site
SPC5-CRYP-LIB. SPC5 Software Cryptography Library. Description. Features. SHA-512 Random engine based on DRBG-AES-128
SPC5 Software Cryptography Library Data brief SHA-512 Random engine based on DRBG-AES-128 RSA signature functions with PKCS#1v1.5 ECC (Elliptic Curve Cryptography): Key generation Scalar multiplication
Secure Large-Scale Bingo
Secure Large-Scale Bingo Antoni Martínez-Ballesté, Francesc Sebé and Josep Domingo-Ferrer Universitat Rovira i Virgili, Dept. of Computer Engineering and Maths, Av. Països Catalans 26, E-43007 Tarragona,
Pipeliner CRM Phaenomena Guide Getting Started with Pipeliner. 2015 Pipelinersales Inc. www.pipelinersales.com
Getting Started with Pipeliner 05 Pipelinersales Inc. www.pipelinersales.com Getting Started with Pipeliner Learn How to Get Started with Pipeliner Sales CRM Application. CONTENT. Setting up Pipeliner
Overview of Symmetric Encryption
CS 361S Overview of Symmetric Encryption Vitaly Shmatikov Reading Assignment Read Kaufman 2.1-4 and 4.2 slide 2 Basic Problem ----- ----- -----? Given: both parties already know the same secret Goal: send
Disk encryption... (not only) in Linux. Milan Brož [email protected]
Disk encryption... (not only) in Linux Milan Brož [email protected] FDE - Full Disk Encryption FDE (Full Disk Encryption) whole disk FVE (Full Volume Encryption) just some volumes (dis)advantages? + for
Windows Embedded Security and Surveillance Solutions
Windows Embedded Security and Surveillance Solutions Windows Embedded 2010 Page 1 Copyright The information contained in this document represents the current view of Microsoft Corporation on the issues
A low-cost Alternative for OAEP
A low-cost Alternative for OAEP Peter Schartner University of Klagenfurt Computer Science System Security [email protected] Technical Report TR-syssec-11-02 Abstract When encryption messages by use
The Advanced Encryption Standard (AES)
The Advanced Encryption Standard (AES) All of the cryptographic algorithms we have looked at so far have some problem. The earlier ciphers can be broken with ease on modern computation systems. The DES
SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES
www.arpapress.com/volumes/vol8issue1/ijrras_8_1_10.pdf SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES Malek Jakob Kakish Amman Arab University, Department of Computer Information Systems, P.O.Box 2234,
IPsec Details 1 / 43. IPsec Details
Header (AH) AH Layout Other AH Fields Mutable Parts of the IP Header What is an SPI? What s an SA? Encapsulating Security Payload (ESP) ESP Layout Padding Using ESP IPsec and Firewalls IPsec and the DNS
The Advanced Encryption Standard (AES)
The Advanced Encryption Standard (AES) Conception - Why A New Cipher? Conception - Why A New Cipher? DES had outlived its usefulness Vulnerabilities were becoming known 56-bit key was too small Too slow
Pipeliner CRM Phaenomena Guide Sales Pipeline Management. 2015 Pipelinersales Inc. www.pipelinersales.com
Sales Pipeline Management 2015 Pipelinersales Inc. www.pipelinersales.com Sales Pipeline Management Learn how to manage sales opportunities with Pipeliner Sales CRM Application. CONTENT 1. Configuring
Ky Vu DeVry University, Atlanta Georgia College of Arts & Science
Ky Vu DeVry University, Atlanta Georgia College of Arts & Science Table of Contents - Objective - Cryptography: An Overview - Symmetric Key - Asymmetric Key - Transparent Key: A Paradigm Shift - Security
The 128-bit Blockcipher CLEFIA Design Rationale
The 128-bit Blockcipher CLEFIA Design Rationale Revision 1.0 June 1, 2007 Sony Corporation NOTICE THIS DOCUMENT IS PROVIDED AS IS, WITH NO WARRANTIES WHATSOVER, INCLUDING ANY WARRANTY OF MERCHANTABIL-
Hyper-V Server 2008 Getting Started Guide
Hyper-V Server 2008 Getting Started Guide Microsoft Corporation Published: October 2008 Author: Cynthia Nottingham Abstract This guide helps you become familiar with Microsoft Hyper-V Server 2008 by providing
How To Set Up A Load Balancer With Windows 2010 Outlook 2010 On A Server With A Webmux On A Windows Vista V2.2.5.2 (Windows V2) On A Network With A Server (Windows) On
Load Balancing Exchange 2010 OWA for External Access using WebMux Published: April 2011 Information in this document, including URL and other Internet Web site references, is subject to change without
WINTER SCHOOL ON COMPUTER SECURITY. Prof. Eli Biham
WINTR SCHOOL ON COMPUTR SCURITY Prof. li Biham Computer Science Department Technion, Haifa 3200003, Israel January 27, 2014 c li Biham c li Biham - January 27, 2014 1 Cryptanalysis of Modes of Operation
Message Authentication Codes
2 MAC Message Authentication Codes : and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 28 October 2013 css322y13s2l08, Steve/Courses/2013/s2/css322/lectures/mac.tex,
ELECTRONIC COMMERCE OBJECTIVE QUESTIONS
MODULE 13 ELECTRONIC COMMERCE OBJECTIVE QUESTIONS There are 4 alternative answers to each question. One of them is correct. Pick the correct answer. Do not guess. A key is given at the end of the module
EXAM questions for the course TTM4135 - Information Security May 2013. Part 1
EXAM questions for the course TTM4135 - Information Security May 2013 Part 1 This part consists of 5 questions all from one common topic. The number of maximal points for every correctly answered question
Hardware & Software Requirements for BID2WIN Estimating & Bidding, the BUILD2WIN Product Suite, and BID2WIN Management Reporting
Hardware & Software s for BID2WIN Estimating & Bidding, the BUILD2WIN Product Suite, and BID2WIN Management Reporting BID2WIN Software, Inc. Updated 05/08/2012 Abstract This document describes the hardware
SecureCom Mobile s mission is to help people keep their private communication private.
About SecureCom Mobile SecureCom Mobile s mission is to help people keep their private communication private. We believe people have a right to share ideas with each other, confident that only the intended
SAMPLE EXAM QUESTIONS MODULE EE5552 NETWORK SECURITY AND ENCRYPTION ECE, SCHOOL OF ENGINEERING AND DESIGN BRUNEL UNIVERSITY UXBRIDGE MIDDLESEX, UK
SAMPLE EXAM QUESTIONS MODULE EE5552 NETWORK SECURITY AND ENCRYPTION September 2010 (reviewed September 2014) ECE, SCHOOL OF ENGINEERING AND DESIGN BRUNEL UNIVERSITY UXBRIDGE MIDDLESEX, UK NETWORK SECURITY
1 Step 1: Select... Files to Encrypt 2 Step 2: Confirm... Name of Archive 3 Step 3: Define... Pass Phrase
Contents I Table of Contents Foreword 0 Part I Introduction 2 1 What is?... 2 Part II Encrypting Files 1,2,3 2 1 Step 1: Select... Files to Encrypt 2 2 Step 2: Confirm... Name of Archive 3 3 Step 3: Define...
Introduction. Where Is The Threat? Encryption Methods for Protecting Data. BOSaNOVA, Inc. Phone: 866-865-5250 Email: [email protected] Web: www.theq3.
Introduction Within the last ten years, there has been a vast increase in the accumulation and communication of digital computer data in both the private and public sectors. Much of this information has
GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte. Yehuda Lindell Bar-Ilan University
GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte Shay Gueron Haifa Univ. and Intel Yehuda Lindell Bar-Ilan University Appeared at ACM CCS 2015 How to Encrypt with
Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University
Computer Networks Network Security and Ethics Week 14 College of Information Science and Engineering Ritsumeikan University Security Intro for Admins l Network administrators can break security into two
What users should know about Full Disk Encryption based on LUKS
What users should know about Full Disk Encryption based on LUKS Andrea VISCONTI Department of Computer Science Università degli Studi di Milano BunnyTN15 [email protected] December 17, 2015 1 /
Hash Function JH and the NIST SHA3 Hash Competition
Hash Function JH and the NIST SHA3 Hash Competition Hongjun Wu Nanyang Technological University Presented at ACNS 2012 1 Introduction to Hash Function Hash Function Design Basics Hash function JH Design
Evaluation of the RC4 Algorithm for Data Encryption
Evaluation of the RC4 Algorithm for Data Encryption Allam Mousa (1) and Ahmad Hamad (2) (1) Electrical Engineering Department An-Najah University, Nablus, Palestine (2) Systems Engineer PalTel Company,
Modes of Operation of Block Ciphers
Chapter 3 Modes of Operation of Block Ciphers A bitblock encryption function f: F n 2 Fn 2 is primarily defined on blocks of fixed length n To encrypt longer (or shorter) bit sequences the sender must
CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives
CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash
Software Hardware Binding with Quiddikey
Software Hardware Binding with Quiddikey Mass scale solution against software piracy Secure your digital life Software-Hardware Binding solutions are typically required for Flash-based systems in which
How to Secure a Groove Manager Web Site
How to Secure a Groove Manager Web Site Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the companies, organizations,
Pipeliner CRM Phaenomena Guide Sales Target Tracking. 2015 Pipelinersales Inc. www.pipelinersales.com
Sales Target Tracking 05 Pipelinersales Inc. www.pipelinersales.com Sales Target Tracking Learn how to set up Sales Target with Pipeliner Sales CRM Application. CONTENT. Setting up Sales Dynamic Target
7! Cryptographic Techniques! A Brief Introduction
7! Cryptographic Techniques! A Brief Introduction 7.1! Introduction to Cryptography! 7.2! Symmetric Encryption! 7.3! Asymmetric (Public-Key) Encryption! 7.4! Digital Signatures! 7.5! Public Key Infrastructures
Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards
White Paper Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards By Dr. Wen-Ping Ying, Director of Software Development, February 2002 Introduction Wireless LAN networking allows the
Symantec Corporation Symantec Enterprise Vault Cryptographic Module Software Version: 1.0.0.2
Symantec Corporation Symantec Enterprise Vault Cryptographic Module Software Version: 1.0.0.2 FIPS 140 2 Non Proprietary Security Policy FIPS Security Level: 1 Document Version: 1.1 Prepared for: Prepared
Effective Secure Encryption Scheme [One Time Pad] Using Complement Approach Sharad Patil 1 Ajay Kumar 2
Effective Secure Encryption Scheme [One Time Pad] Using Complement Approach Sharad Patil 1 Ajay Kumar 2 Research Student, Bharti Vidyapeeth, Pune, India [email protected] Modern College of Engineering,
Microsoft Business Solutions Navision 4.0 Development I C/SIDE Introduction Virtual PC Setup Guide. Course Number: 8359B
Microsoft Business Solutions Navision 4.0 Development I C/SIDE Introduction Virtual PC Setup Guide Course Number: 8359B Released: 11/2005 Information in this document, including URL and other Internet
SD12 REPLACES: N19780
ISO/IEC JTC 1/SC 27 N13432 ISO/IEC JTC 1/SC 27 Information technology - Security techniques Secretariat: DIN, Germany SD12 REPLACES: N19780 DOC TYPE: TITLE: Standing document ISO/IEC JTC 1/SC 27 Standing
Authentication and Security in Mobile Phones
Authentication and Security in Mobile Phones Greg Rose QUALCOMM Australia [email protected] ABSTRACT Mobile telephone systems have a checkered reputation regarding security and authentication features after
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles
Citect and Microsoft Windows XP Service Pack 2
Citect and Microsoft Windows XP Service Pack 2 Citect and Windows XP Spk 2 White Paper Page 1 About Citect Citect Pty Ltd is a worldwide leader in industrial automation and information management. Its
The Microsoft Windows Hypervisor High Level Architecture
The Microsoft Windows Hypervisor High Level Architecture September 21, 2007 Abstract The Microsoft Windows hypervisor brings new virtualization capabilities to the Windows Server operating system. Its
Message Authentication
Message Authentication message authentication is concerned with: protecting the integrity of a message validating identity of originator non-repudiation of origin (dispute resolution) will consider the
Encrypting the Private Files on Your Computer Presentation by Eric Moore, CUGG June 12, 2010
Encrypting the Private Files on Your Computer Presentation by Eric Moore, CUGG June 12, 2010 I. File Encryption Basics A. Encryption replaces data within a file with ciphertext which resembles random data
CS155. Cryptography Overview
CS155 Cryptography Overview Cryptography Is n A tremendous tool n The basis for many security mechanisms Is not n The solution to all security problems n Reliable unless implemented properly n Reliable
2007 Microsoft Office System Document Encryption
2007 Microsoft Office System Document Encryption June 2007 Table of Contents Introduction 1 Benefits of Document Encryption 2 Microsoft 2007 Office system Document Encryption Improvements 5 End-User Microsoft
SQL Server Business Intelligence on HP ProLiant DL785 Server
SQL Server Business Intelligence on HP ProLiant DL785 Server By Ajay Goyal www.scalabilityexperts.com Mike Fitzner Hewlett Packard www.hp.com Recommendations presented in this document should be thoroughly
Privacy and Security in Cloud Computing
Réunion CAPPRIS 21 mars 2013 Monir Azraoui, Kaoutar Elkhiyaoui, Refik Molva, Melek Ӧnen Slide 1 Cloud computing Idea: Outsourcing Ø Huge distributed data centers Ø Offer storage and computation Benefit:
SecureDoc Disk Encryption Cryptographic Engine
SecureDoc Disk Encryption Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy Abstract: This document specifies Security Policy enforced by SecureDoc Cryptographic Engine compliant with the
What to do about Fiber Skew?
What to do about Fiber Skew? White Paper July 2008 www.commscope.com A number of years ago there was a good deal of discussion about the problem of fiber skew in high speed optical links, but the issue
APPLICATION NOTE. Atmel AT02333: Safe and Secure Bootloader Implementation for SAM3/4. Atmel 32-bit Microcontroller. Features.
APPLICATION NOTE Atmel AT02333: Safe and Secure Bootloader Implementation for SAM3/4 Atmel 32-bit Microcontroller Features Getting familiar with the conception of in-field upgrading and bootloader Discussing
technical brief Optimizing Performance in HP Web Jetadmin Web Jetadmin Overview Performance HP Web Jetadmin CPU Utilization utilization.
technical brief in HP Overview HP is a Web-based software application designed to install, configure, manage and troubleshoot network-connected devices. It includes a Web service, which allows multiple
