AES-GCM for Efficient Authenticated Encryption Ending the Reign of HMAC-SHA-1?
|
|
|
- Rosalind Bryan
- 10 years ago
- Views:
Transcription
1 Workshop on Real-World Cryptography Stanford University Jan. 9-11, 2013 AES-GCM for Efficient Authenticated Encryption Ending the Reign of HMAC-SHA-1? Shay Gueron University of Haifa Department of Mathematics, Faculty of Natural Sciences, University of Haifa, Israel Intel Corporation Intel Corporation, Israel Development Center, Haifa, Israel 1
2 Agenda Why is the ecosystem using HMAC SHA-1 for authenticated encryption? What can be done to change this? AES-GCM dirty secrets and how to optimize it ( and save the honor of AES-GCM after Adam s talk) S. Gueron. RWC
3 Optimizing cryptographic primitives Why care? Who cares? The need for end-to-end security in the internet, constantly increases the world-wide number (and percentage) of SSL/TLS connections. Why aren t all connections Overheads costs Cryptographic algorithms for secure communications = computational overhead Mainly on the servers side Any latency client side influences (indirectly) the ecosystem Authenticated Encryption: a fundamental cryptographic primitive Is the ecosystem using an efficient AE scheme? Apparently no a better alternative exists S. Gueron. RWC
4 Ciphers in use in SSL/TLS connections Today s most frequently used AE in browser/server connections RC4 + HMAC-MD5 (don t care) RC4 + HMAC-SHA-1 AES + HMAC-SHA-1 RC4-MD % RC4-SHA-128 3% DES-CBC3- SHA-168 2% authentication: mostly HMAC SHA-1 Is it the best AE (performance wise)? AES128-SHA-1 36% ASE256-SHA-1 44% No a faster alternative exists We already know that HMAC is not an efficient MAC scheme, and as an ingredient in AE it makes an inefficient AE Akamai serves service millions of requests per sec. for secure content over HTTPS/SSL Observed the client-side SSL ciphers in popular use Statistics for SSLv3 and TLSv1 AES-GCM is a more efficient Authenticated Encryption scheme S. Gueron. RWC
5 AES-GCM Authenticated Encryption AES-GCM Authenticated Encryption (D. McGrew & J. Viega) Designed for high performance (Mainly with a HW viewpoint) A NIST standard FIPS D (since 2008) Included in the NSA Suite B Cryptography. Also in: IPsec (RFC 4106) IEEE P1619 Security in Storage Working Group TLS 1.2 How it works: Encryption is done with AES in CTR mode Authentication tag computations - Galois Hash : A Carter-Wegman-Shoup universal hash construction: polynomial evaluation over a binary field Uses GF(2 128 ) defined by the lowest irreducible polynomial Computations based on GF(2 128 ) arithmetic g = g(x) = x x 7 + x 2 + x + 1 But not really the standard GF(2 128 ) arithmetic S. Gueron. RWC
6 AES-GCM and Intel s AES-NI / PCLMULQDQ Intel introduced a new set of instructions (2010) AES-NI: Facilitate high performance AES encryption and decryption PCLMULQDQ 64 x (carry-less) Binary polynomial multiplication; speeds up computations in binary fields Has several usages --- AES-GCM is one To use it for the GHASH computations: GF(2 128 ) multiplication: 1. Compute 128 x via carry-less multiplication (of 64-bit operands) 2. Reduction: modulo x x 7 + x 2 + x + 1 (done efficiently via software) It ain t necessarily so AES-NI and PCLMULQDQ can be used for speeding up AES-GCM Authenticated Encryption S. Gueron. RWC
7 Cycles per Byte - lower is better Some Authenticated Encryption performance PRE AES-NI / CLMUL(lookup tables) RC4 + HMAC SHA-1 AES + HMAC SHA-1 AES-GCM POST AES-NI / CLMUL 2 nd Generation; 3 rd Generation Core 25 The performance order is reversed! AES-NI accelerate the encryption PCLMULQDQ GF(2 128 ) stuff (w/o tables) 15 AES-GCM AES-SHA RC4-SHA pre-aes NI Core i7-2600k Core i S. Gueron. RWC
8 If AES-GCM is so good, why everyone is still using SHA-1 HMAC? Inertia: If is works don t upgrade it Migration costs and effort Problem is not painful enough / Painful but to whom? Legacy : RC4/AES + HMAC-SHA1 is all over the place Ecosystem awareness: performance benefit & progression - not fully understood Kickoff latency AES-GCM is a relatively new standard (2008); Part of TLS -- only from TLS 1.2 (which is not proliferated yet) Superior performance: only from 2010 (emergence of AES-NI & PCLMULQDQ) The chicken and the egg problem: Browsers (client) will not upgrade (TLS1.2) and implement (GCM) before all servers support TLS 1.2 Servers will not upgrade/implement before all browsers have TLS1.2 and offer GCM as an option In an ideal world: all servers and clients support TLS 1.2, clients offer AES-GCM at handshake And the ecosystem would see performance gain But how can we get there? S. Gueron. RWC
9 What needs to happen? Clients (browsers): add TLS 1.2, as well as GCM support. The client will then offer that as one of their ciphers Server: support TLS 1.2 and GCM (today ~9% of the servers) Servers with AES-NI/CLMUL would enjoy the faster cipher What happens now? OpenSSL already has GCM and TLS 1.2. (and that is slowly deploying) Internet Explorer and MSFT server support TLS 1.2 AES-GCM (version 8 on Win 7) Safari (?) (announced TLS 1.2 and AES-GCM) The next big move: --- NSS to add support (NSS is the stack behind Firefox and Chrome) There is ongoing work there on both GCM and TLS 1.2 Wan-Teh Chang (Google), Bob Relyea (Red Hat), Brian Smith (Mozilla), Eric Rescorla, Shay Gueron (Intel) S. Gueron. RWC
10 What did we contribute to this? The new AES-GCM patches (2012) Sept./Oct. 2012: We published two patches for two popular open source distributions: OpenSSL and NSS Authors: S. Gueron and V. Krasnov Inherently side channel protected constant time in the strict definition Fast on the current x86_64 processors (2 nd and 3 rd Generation Core) Fastest we know of And also ready to boost performance on the coming processors generation (4 th Generation Core) Let s review how this was done S. Gueron. RWC
11 AES-GCM optimization 1. The encryption 2. The Galois Hash 3. Putting them together S. Gueron. RWC
12 AESENC data, key0 AESENC data, key1 AESENC data, key2 AESENC data0, key0 AESENC data1, key0 AESENC data2, key0 AESENC data3, key0 AESENC data4, key0 AESENC data5, key0 AESENC data6, key0 AESENC data7, key0 AESENC data0, key1 AES-NI: Throughput vs. Latency Parallelizable modes (CTR, CBC decryption, XTS) can interleave processing of multiple messages They become much faster with AES-NI S. Gueron. RWC
13 How much to parallelize? The effect of the parallelization parameter Encryption of 8 blocks in parallel vs. encryption of 4 blocks in parallel 4 blocks AES ECB on 1KB buffer (in CPU cycles per Byte, Intel Core i7-2600k) 8 blocks We found the 8 blocks in parallel is a sweat point S. Gueron. RWC
14 CPU Cycles/Byte AES-CTR performance Previous Generation Core, Second Generation Core, Thirds Generation Core Intel Core i7-2600k vs. Intel Core i7-880 Processor (1KB buffer; performance in CPU cycles per Byte) Performance on Intel Core i7-880 Processor bit Legacy SSE AES instructions 0.60 VEX encoded AES instructions AES-128 AES-192 AES-256 Key Size S. Gueron. RWC
15 128-bit Carry-less Multiplication using PCLMULQDQ This is fixed (Gueron Kounavis, 2009) Multiply 128 x A 1 : A 0 B 1 : B 0 Schoolbook (4 PCLMULQDQ invocations) A 0 B 0 = C 1 : C 0, A 1 B 1 = D 1 : D 0 A 0 B 1 = E 1 : E 0, A 1 B 0 = F 1 : F 0 A 1 : A 0 B 1 : B 0 = [D 1 : D 0 E 1 F 1 : C 1 E 0 F 0 : C 0 ] So this is also fixed Carry-less Karatsuba (3 PCLMULQDQ invocations) A 1 B 1 = C 1 : C 0, A 0 B 0 = D 1 : D 0 A 1 A 0 B 1 B 0 = [E 0 : E 1 ] A 1 : A 0 B 1 : B 0 = [C 1 : C 0 C 1 D 1 E 1 : D 1 C 0 D 0 E 0 : D 0 ] S. Gueron. RWC
16 AES-GCM dirty secrets revealed A new interpretation to GHASH operations Not what you expected: GHASH does not use GF(2 128 ) computations At least not in the usual polynomial representation convention The bits inside the 128-bit operands are reflected Actually - it is an operation on a permutation of the elements of GF(2 128 No need ) to reflect T1 = reflect (A) the data T2 = reflect (B) T3 = T1 T2 modulo x x 7 + x 2 + x + 1 (a GF(2 128 ) multiplication) Reflect (T3) We can prove (a new interpretation) that this operation is: A B x -127 mod x x 127 +x 126 +x i.e., a weird Montgomery Multiplication in GF(2 128 ) modulo a reversed poly Better written as A B x x -128 mod x x 127 +x 126 +x S. Gueron. RWC
17 The Shift-XOR reflected reduction (Gueron Kounavis 2009) CipherText HKey X 3 X 2 X 1 X 0 1 X 3 X 2 X 1 X 0 S. Gueron. RWC
18 X 1 A B C X 0 X 0 X 0 D X 0 1 E 0 E 0 D X 0 2 F 0 F 0 D X 0 7 G 0 G 0 S. Gueron. RWC
19 E 0 E 0 F 0 F 0 G 0 G 0 X 3 X 2 H 0 H 0 Voila S. Gueron. RWC
20 Fast reduction modulo x 128 +x 127 +x 126 +x (Gueron 2012) Algorithm 4: Montgomery reduction Input 256-bit operand [X 3 :X 2 :X 1 :X 0 ] [A 1 :A 0 ] = X 0 0xc [B 1 :B 0 ] = [X 0 A 1 :X 1 A 0 ] [C 1 :C 0 ] = B 0 0xc [D 1 :D 0 ] = [B 0 C 1 :B 1 C 0 ] Output: [D 1 X 3 :D 0 X 2 ] The cost: 2 x PCLMULQDQ 3 x shift/xor Ideal with fast PCLMULQDQ ; Input is in T1:T7 vmovdqa T3, [W] vpclmulqdq T2, T3, T7, 0x01 vpshufd T4, T7, 78 vpxor T4, T4, T2 vpclmulqdq T2, T3, T4, 0x01 vpshufd T4, T4, 78 vpxor T4, T4, T2 vpxor T1, T4 ; result in T1 S. Gueron. RWC
21 The optimized reflected reduction CipherText Hkey X 3 X 2 X 1 X 0 0xc X 0 0xc B 0 A 1 A 0 C 1 C 0 X 0 X 1 B 0 B 1 B 1 B 0 D 1 D 0 X 3 X 2 Voila S. Gueron. RWC 2013 H 1 H 0 21
22 The Ghash operation is: Aggregated Reduction MM (CT 1, Hx m ) + MM (CT 2, Hx m-1 ) + + MM (CT m, Hx) mod x x 127 +x 126 +x In a Horner form (facilitating iterative computation) Y i = MM [(X i + Y i-1 ), Hx] everything mod Q= x x x x way expanded Horner form (aggregate results & defer the reduction step) Yi = MM [(X i + Y i-1 ), Hx] = MM [(X i, Hx) ] + MM [(Y i-1, Hx)] = MM [(X i, Hx)] + MM [(X i-1 + Y i-2 ), Hx 2 ] = = MM [(X i, H)] + MM [(X i-1, Hx 2 )] + MM [(X i-2 +Y i-3 ), Hx 3 ] = MM [(X i, Hx)] + MM [(X i-1, Hx 2 )] + MM [(X i-2, Hx 3 )] + MM [(X i-3 +Y i-4 ), Hx 4 ] Can be expanded further The gain: reduction deferred to once per N blocks Overhead: pre-calculate the powers of H (amortized for reasonably long buffer) S. Gueron. RWC
23 Interleaving CTR and GHASH There are two approaches to GCM Use dedicated AES-CTR function for the encryption and another GHASH function to generate the MAC Gain additional performance by interleaving the calculation of CTR and GHASH in a single function The first approach can only achieve the performance of CTR+GHASH The second approach achieves a better performance Filling the execution pipe more efficiently. S. Gueron. RWC
24 The new AES-GCM patches (2012) putting it (and more ) all together Sept./Oct. 2012: We published two patches for two popular open source distributions: OpenSSL and NSS NSS patch to be committed into version Both patches share similar code and use : Carry-less Karatsuba multiplication Reduce using Montgomery Encrypt 8 counter blocks Deferred reduction (using 8 block aggregation) Fixed elements outside the brackets Interleave CTR and GHASH Inherently side channel protected constant time in the strict definition Fast on current processors (2 nd and 3 rd Generation Core) And also ready to boost on the coming processors (4 th Generation Core) S. Gueron. RWC
25 Results The performance of AES-128 GCM Encryption on 4KB buffer in CPU cycles per Byte, Intel Core i7-2600k vs. Intel Core i7-880 Processor, Lower is better Performance on Intel Core i7-2600k Processor 2.53 Performance on Intel Core i7-880 Processor 3.90 Best known AES-GCM without AES-NI* on i7-2600k Processor * E. Käsper, P. Schwabe, Faster and Timing-Attack Resistant AES-GCM, S. Gueron. RWC
26 Some breakdown AES-GCM: 4KB message: 2.53 C/B 16KB message: 2.47 C/B Breakdown CTR performance for 16KB: 0.79 C/B The cost of the GHASH is ~1.68 C/B ~68% of the computations The performance of standalone GHASH is 1.75 C/B The delta is the gain from interleaving GHASH with CTR. Notes: the MAC computations are still significant Limited by the current performance of PCLMULQDQ Ultimate goal: achieve AES-GCM at the performance of CTR+ ε S. Gueron. RWC
27 The NSS patch (2012) The performance of NSS AES GCM Encryption on 8KB buffer in CPU cycles per Byte, Intel Core i7-2600k and Intel Core i Processors, Lower is better NSS 3.14 RC0 Our patch Core i7-2600k Core i Ready to boost performance on the coming processors generation (4 th Generation Core) S. Gueron. RWC
28 The OpenSSL patch (2012) 3.50 The performance of OpenSSL AES GCM Encryption on 8KB buffer in CPU cycles per Byte, Intel Core i7-2600k and Intel Core i Processors, Lower is better OpenSSL 1.0.1c Our patch Core i7-2600k Core i Ready to boost performance on the coming processors generation (4 th Generation Core) S. Gueron. RWC
29 18.00 What does it give? AES-GCM vs. other (NIST standard) Authenticated Encryption The performance of NSS AES GCM Encryption on 32KB buffer in CPU cycles per Byte, Intel Core i7-2600k and Intel Core i Processors, Lower is better AES CBC+HMAC-SHA256 (serial) RC4-SHA1 AES CBC+HMAC-SHA1 AES GCM Core i7-2600k Core i S. Gueron. RWC
30 Summary AES-GCM is the best performing Authenticated Encryption combination among the NIST standard options (esp. compared to using HMAC SHA-1) SE on x Performance keeps improving across CPU generations Just wait for the coming 4 th Generation Core (2013) We try to actively help the eco-system move to the more efficient AE With some luck, we might see significant deployment already in 2013 Optimized algorithms & implementations released as patches for Open Source Thanks to Google/Mozilla/RedHat colleagues Review and commit to NSS; add TLS1.2; enable Firefox / Chrome support The ultimate goal: achieve AES-GCM at the performance of CTR+ ε All the codes and papers are publicly available (see reference) S. Gueron. RWC
31 References S. Gueron. RWC
32 References AES-GCM (The algorithms and methods that underlie the AES-GCM patches codes are detailed in references [1-4]) 1. S. Gueron, Michael E. Kounavis: Intel Carry-Less Multiplication Instruction and its Usage for Computing the GCM Mode (Rev. 2.01) 2. S. Gueron, M. E. Kounavis: Efficient Implementation of the Galois Counter Mode Using a Carry-less Multiplier and a Fast Reduction Algorithm. Information Processing Letters 110: 549û553 (2010). 3. S. Gueron: AES Performance on the 2nd Generation Intel Core Processor Family (to be posted) (2012). 4. S. Gueron: Fast GHASH computations for speeding up AES-GCM (to be published soon) (2012). AES-NI 5. S. Gueron. Intel Advanced Encryption Standard (AES) Instructions Set, Rev Intel Software Network S. Gueron. Intel's New AES Instructions for Enhanced Performance and Security. Fast Software Encryption, 16th International Workshop (FSE 2009), Lecture Notes in Computer Science: 5665, p (2009). OpenSSL patch: S. Gueron, V. Krasnov, [PATCH] Efficient implementation of AES-GCM, using Intel's AES-NI, PCLMULQDQ instruction, and the Advanced Vector Extension (AVX). (2012) NSS patch: S. Gueron, V. Krasnov, Efficient AES-GCM implementation that uses Intel's AES and PCLMULQDQ instructions (AES-NI), and the Advanced Vector Extension (AVX) architecture. For the NSS library, Attachment Details for Bug , [PATCH] (2012) S. Gueron. RWC
AES-GCM software performance on the current high end CPUs as a performance baseline for CAESAR competition
Directions in Authenticated Ciphers DIAC 2013, 11 13 August 2013, Chicago, USA AES-GCM software performance on the current high end CPUs as a performance baseline for CAESAR competition Shay Gueron University
GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte. Yehuda Lindell Bar-Ilan University
GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte Shay Gueron Haifa Univ. and Intel Yehuda Lindell Bar-Ilan University Appeared at ACM CCS 2015 How to Encrypt with
Encrypting the Internet
Encrypting the Internet Michael E. Kounavis Intel Architecture Group 2111 NE 25th Avenue Hillsboro, OR 97124 [email protected] Mathew Eszenyi Intel Labs 2111 NE 25th Avenue Hillsboro, OR 97124
Haswell Cryptographic Performance
White Paper Sean Gulley Vinodh Gopal IA Architects Intel Corporation Haswell Cryptographic Performance July 2013 329282-001 Executive Summary The new Haswell microarchitecture featured in the 4 th generation
Secure Socket Layer (SSL) and Transport Layer Security (TLS)
Secure Socket Layer (SSL) and Transport Layer Security (TLS) Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available
Cryptography and Network Security Chapter 12
Cryptography and Network Security Chapter 12 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 12 Message Authentication Codes At cats' green on the Sunday he
The Impact of Cryptography on Platform Security
The Impact of Cryptography on Platform Security Ernie Brickell Intel Corporation 2/28/2012 1 Security is Intel s Third Value Pillar Intel is positioning itself to lead in three areas: energy-efficient
Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)
Security Protocols Security Protocols Necessary to communicate securely across untrusted network Provide integrity, confidentiality, authenticity of communications Based on previously discussed cryptographic
Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the
Vulnerabilità dei protocolli SSL/TLS
Università degli Studi di Milano Facoltà di Scienze Matematiche, Fisiche e Naturali Dipartimento di Informatica e Comunicazione Vulnerabilità dei protocolli SSL/TLS Andrea Visconti Overview Introduction
Improving OpenSSL* Performance
White Paper Vinodh Gopal Jim Guilford Erdinc Ozturk Sean Gulley Wajdi Feghali IA Architects Intel Corporation Improving OpenSSL* Performance October 2011 326232-001 Executive Summary The SSL/TLS protocols
Breakthrough AES Performance with. Intel AES New Instructions
White Paper Breakthrough AES Performance with Intel AES New Instructions Kahraman Akdemir, Martin Dixon, Wajdi Feghali, Patrick Fay, Vinodh Gopal, Jim Guilford, Erdinc Ozturk, Gil Wolrich, Ronen Zohar
1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies
1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies Dave Corbett Technical Product Manager Implementing Forward Secrecy 1 Agenda Part 1: Introduction Why is Forward Secrecy important?
Computer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 20 Public-Key Cryptography and Message Authentication First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Public-Key Cryptography
Chapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
Is Your SSL Website and Mobile App Really Secure?
Is Your SSL Website and Mobile App Really Secure? Agenda What is SSL / TLS SSL Vulnerabilities PC/Server Mobile Advice to the Public Hong Kong Computer Emergency Response Team Coordination Centre 香 港 電
Security Protocols/Standards
Security Protocols/Standards Security Protocols/Standards Security Protocols/Standards How do we actually communicate securely across a hostile network? Provide integrity, confidentiality, authenticity
KeyStone Architecture Security Accelerator (SA) User Guide
KeyStone Architecture Security Accelerator (SA) User Guide Literature Number: SPRUGY6B January 2013 Release History www.ti.com Release Date Description/Comments SPRUGY6B January 2013 Added addition engine
EXAM questions for the course TTM4135 - Information Security May 2013. Part 1
EXAM questions for the course TTM4135 - Information Security May 2013 Part 1 This part consists of 5 questions all from one common topic. The number of maximal points for every correctly answered question
CS155. Cryptography Overview
CS155 Cryptography Overview Cryptography Is n A tremendous tool n The basis for many security mechanisms Is not n The solution to all security problems n Reliable unless implemented properly n Reliable
Performance Investigations. Hannes Tschofenig, Manuel Pégourié-Gonnard 25 th March 2015
Performance Investigations Hannes Tschofenig, Manuel Pégourié-Gonnard 25 th March 2015 1 Motivation In we tried to provide guidance for the use of DTLS (TLS) when used in
National Security Agency Perspective on Key Management
National Security Agency Perspective on Key Management IEEE Key Management Summit 5 May 2010 Petrina Gillman Information Assurance (IA) Infrastructure Development & Operations Technical Director National
Table of Contents. Bibliografische Informationen http://d-nb.info/996514864. digitalisiert durch
1 Introduction to Cryptography and Data Security 1 1.1 Overview of Cryptology (and This Book) 2 1.2 Symmetric Cryptography 4 1.2.1 Basics 4 1.2.2 Simple Symmetric Encryption: The Substitution Cipher...
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol
Chapter 2: Security Techniques Background Chapter 3: Security on Network and Transport Layer Network Layer: IPSec Transport Layer: SSL/TLS Chapter 4: Security on the Application Layer Chapter 5: Security
Summary of Results. NGINX SSL Performance
NGINX SSL NGINX is commonly used to terminate encrypted SSL and TLS connections on behalf of upstream web and application servers. SSL termination at the edge of an application reduces the load on internal
Secure Socket Layer (SSL) and Trnasport Layer Security (TLS)
Secure Socket Layer (SSL) and Trnasport Layer Security (TLS) CSE598K/CSE545 - Advanced Network Security Prof. McDaniel - Spring 2008 1 SSL/TLS The Secure Socket Layer (SSL) and Transport Layer Security
Cryptographic Hash Functions Message Authentication Digital Signatures
Cryptographic Hash Functions Message Authentication Digital Signatures Abstract We will discuss Cryptographic hash functions Message authentication codes HMAC and CBC-MAC Digital signatures 2 Encryption/Decryption
Network Security Essentials Chapter 5
Network Security Essentials Chapter 5 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 5 Transport-Level Security Use your mentality Wake up to reality From the song, "I've Got
INF3510 Information Security University of Oslo Spring 2011. Lecture 9 Communication Security. Audun Jøsang
INF3510 Information Security University of Oslo Spring 2011 Lecture 9 Communication Security Audun Jøsang Outline Network security concepts Communication security Perimeter security Protocol architecture
AES-Based Authenticated Encryption Modes in Parallel High-Performance Software
AES-Based Authenticated Encryption Modes in Parallel High-Performance Software Andrey Bogdanov and Martin M. Lauridsen and Elmar Tischhauser Department of Applied Mathematics and Computer Science Technical
Enhancing McAfee Endpoint Encryption * Software With Intel AES-NI Hardware- Based Acceleration
SOLUTION BLUEPRINT IT SECURITY MANAGEMENT Enhancing McAfee Endpoint Encryption * Software With Intel AES-NI Hardware- Based Acceleration Industry IT security management across industries Business Challenge
RSA BSAFE. Crypto-C Micro Edition for MFP SW Platform (psos) Security Policy. Version 3.0.0.1, 3.0.0.2 October 22, 2012
RSA BSAFE Crypto-C Micro Edition for MFP SW Platform (psos) Security Policy Version 3.0.0.1, 3.0.0.2 October 22, 2012 Strong encryption technology for C/C++ developers Contact Information See our Web sites
Communication Systems SSL
Communication Systems SSL Computer Science Organization I. Data and voice communication in IP networks II. Security issues in networking III. Digital telephony networks and voice over IP 2 Network Security
How To Understand And Understand The Ssl Protocol (Www.Slapl) And Its Security Features (Protocol)
WEB Security: Secure Socket Layer Cunsheng Ding HKUST, Hong Kong, CHINA C. Ding - COMP581 - L22 1 Outline of this Lecture Brief Information on SSL and TLS Secure Socket Layer (SSL) Transport Layer Security
Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009
16 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009 1 25 Organization Welcome to the New Year! Reminder: Structure of Communication Systems lectures
CS 758: Cryptography / Network Security
CS 758: Cryptography / Network Security offered in the Fall Semester, 2003, by Doug Stinson my office: DC 3122 my email address: [email protected] my web page: http://cacr.math.uwaterloo.ca/~dstinson/index.html
Einführung in SSL mit Wireshark
Einführung in SSL mit Wireshark Chemnitzer Linux-Tage 16. März 2014 Martin Kaiser What? SSL/TLS is the most widely used security protocol on the Internet there's lots of parameters, options, extensions
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
Message Authentication
Message Authentication message authentication is concerned with: protecting the integrity of a message validating identity of originator non-repudiation of origin (dispute resolution) will consider the
SMPTE Standards Transition Issues for NIST/FIPS Requirements v1.1
SMPTE Standards Transition Issues for NIST/FIPS Requirements v1.1 Contents 2010.8.23 DRM inside, Taehyun Kim ETRI, Kisoon Yoon 1 Introduction NIST (National Institute of Standards and Technology) published
Lecture 9 - Network Security TDTS41-2006 (ht1)
Lecture 9 - Network Security TDTS41-2006 (ht1) Prof. Dr. Christoph Schuba Linköpings University/IDA [email protected] Reading: Office hours: [Hal05] 10.1-10.2.3; 10.2.5-10.7.1; 10.8.1 9-10am on Oct. 4+5,
Public Key Cryptography Overview
Ch.20 Public-Key Cryptography and Message Authentication I will talk about it later in this class Final: Wen (5/13) 1630-1830 HOLM 248» give you a sample exam» Mostly similar to homeworks» no electronic
ColdFire Security SEC and Hardware Encryption Acceleration Overview
Freescale Semiconductor Application Note Document Number: AN2788 Rev. 1, 05/2008 ColdFire Security SEC and Hardware Encryption Acceleration Overview by: Melissa Hunter MSG Applications This application
Network Security Part II: Standards
Network Security Part II: Standards Raj Jain Washington University Saint Louis, MO 63131 [email protected] These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse473-05/ 18-1 Overview
SE 4472a / ECE 9064a: Information Security
Western University Faculty of Engineering Department of Electrical and Computer Engineering SE 4472a / ECE 9064a: Information Security Course Outline 2015-16 Description: This course provides an introduction
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) PPP-based remote access using dial-in PPP encryption control protocol (ECP) PPP extensible authentication protocol (EAP) 13.2 Layer 2/3/4
HTTPS: Transport-Layer Security (TLS), aka Secure Sockets Layer (SSL)
CSCD27 Computer and Network Security HTTPS: Transport-Layer Security (TLS), aka Secure Sockets Layer (SSL) 11 SSL CSCD27 Computer and Network Security 1 CSCD27F Computer and Network Security 1 TLS (Transport-Layer
Authenticated encryption
Authenticated encryption Dr. Enigma Department of Electrical Engineering & Computer Science University of Central Florida [email protected] October 16th, 2013 Active attacks on CPA-secure encryption
Secure Socket Layer/ Transport Layer Security (SSL/TLS)
Secure Socket Layer/ Transport Layer Security (SSL/TLS) David Sánchez Universitat Pompeu Fabra World Wide Web (www) Client/server services running over the Internet or TCP/IP Intranets nets widely used
Secure Socket Layer. Carlo U. Nicola, SGI FHNW With extracts from publications of : William Stallings.
Secure Socket Layer Carlo U. Nicola, SGI FHNW With extracts from publications of : William Stallings. Abstraction: Crypto building blocks NS HS13 2 Abstraction: The secure channel 1., run a key-exchange
Security. Learning Objectives. This module will help you...
Security 5-1 Learning Objectives This module will help you... Understand the security infrastructure supported by JXTA Understand JXTA's use of TLS for end-to-end security 5-2 Highlights Desired security
Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213
Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213 UNCLASSIFIED Example http ://www. greatstuf f. com Wants credit card number ^ Look at lock on browser Use https
Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket
IT 4823 Information Security Administration Public Key Encryption Revisited April 5 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles
An Overview of Communication Manager Transport and Storage Encryption Algorithms
An Overview of Communication Manager Transport and Storage Encryption Algorithms Abstract The following paper provides a description of the standard algorithms that are implemented within Avaya Communication
The Misuse of RC4 in Microsoft Word and Excel
The Misuse of RC4 in Microsoft Word and Excel Hongjun Wu Institute for Infocomm Research, Singapore [email protected] Abstract. In this report, we point out a serious security flaw in Microsoft
How to Send Stealth Text From Your Cell Phone
anonymous secure decentralized SMS stealthtext transactions WHITEPAPER STATE OF THE ART 2/8 WHAT IS STEALTHTEXT? stealthtext is a way to send stealthcoin privately and securely using SMS texting. stealthtext
SkyRecon Cryptographic Module (SCM)
SkyRecon Cryptographic Module (SCM) FIPS 140-2 Documentation: Security Policy Abstract This document specifies the security policy for the SkyRecon Cryptographic Module (SCM) as described in FIPS PUB 140-2.
13135 Lee Jackson Memorial Hwy., Suite 220 Fairfax, VA 22033 United States of America
VMware, Inc. VMware Kernel Cryptographic Module Software Version: 1.0 FIPS 140-2 Non-Proprietary Security Policy FIPS Security Level: 1 Document Version: 1.0 Prepared for: Prepared by: VMware, Inc. 3401
SENSE Security overview 2014
SENSE Security overview 2014 Abstract... 3 Overview... 4 Installation... 6 Device Control... 7 Enrolment Process... 8 Authentication... 9 Network Protection... 12 Local Storage... 13 Conclusion... 15 2
Web Security Considerations
CEN 448 Security and Internet Protocols Chapter 17 Web Security Dr. Mostafa Hassan Dahshan Computer Engineering Department College of Computer and Information Sciences King Saud University [email protected]
Message Authentication Codes. Lecture Outline
Message Authentication Codes Murat Kantarcioglu Based on Prof. Ninghui Li s Slides Message Authentication Code Lecture Outline 1 Limitation of Using Hash Functions for Authentication Require an authentic
Lecture 9: Application of Cryptography
Lecture topics Cryptography basics Using SSL to secure communication links in J2EE programs Programmatic use of cryptography in Java Cryptography basics Encryption Transformation of data into a form that
Network Security. Chapter 3 Symmetric Cryptography. Symmetric Encryption. Modes of Encryption. Symmetric Block Ciphers - Modes of Encryption ECB (1)
Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Network Security Chapter 3 Symmetric Cryptography General Description Modes of ion Data ion Standard (DES)
Secret File Sharing Techniques using AES algorithm. C. Navya Latha 200201066 Garima Agarwal 200305032 Anila Kumar GVN 200305002
Secret File Sharing Techniques using AES algorithm C. Navya Latha 200201066 Garima Agarwal 200305032 Anila Kumar GVN 200305002 1. Feature Overview The Advanced Encryption Standard (AES) feature adds support
7! Cryptographic Techniques! A Brief Introduction
7! Cryptographic Techniques! A Brief Introduction 7.1! Introduction to Cryptography! 7.2! Symmetric Encryption! 7.3! Asymmetric (Public-Key) Encryption! 7.4! Digital Signatures! 7.5! Public Key Infrastructures
Security Engineering Part III Network Security. Security Protocols (I): SSL/TLS
Security Engineering Part III Network Security Security Protocols (I): SSL/TLS Juan E. Tapiador [email protected] Department of Computer Science, UC3M Security Engineering 4th year BSc in Computer Science,
SECURITY IN NETWORKS
SECURITY IN NETWORKS GOALS Understand principles of network security: Cryptography and its many uses beyond confidentiality Authentication Message integrity Security in practice: Security in application,
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
As enterprises conduct more and more
Efficiently handling SSL transactions is one cornerstone of your IT security infrastructure. Do you know how the protocol actually works? Wesley Chou Inside SSL: The Secure Sockets Layer Protocol Inside
Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1
Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 Goals v understand principles of network security: cryptography and its many uses beyond
An Introduction to Cryptography as Applied to the Smart Grid
An Introduction to Cryptography as Applied to the Smart Grid Jacques Benoit, Cooper Power Systems Western Power Delivery Automation Conference Spokane, Washington March 2011 Agenda > Introduction > Symmetric
Northrop Grumman M5 Network Security SCS Linux Kernel Cryptographic Services. FIPS Security Policy Version 2.42. www.northropgrumman.
Northrop Grumman M5 Network Security SCS Linux Kernel Cryptographic Services FIPS Security Policy Version 2.42 www.northropgrumman.com/m5/ SCS Linux Kernel Cryptographic Services Security Policy Version
CSE/EE 461 Lecture 23
CSE/EE 461 Lecture 23 Network Security David Wetherall [email protected] Last Time Naming Application Presentation How do we name hosts etc.? Session Transport Network Domain Name System (DNS) Data
Security Policy for FIPS 140 2 Validation
BitLocker Windows OS Loader Security Policy for FIPS 140 2 Validation BitLocker Windows OS Loader (winload) in Microsoft Windows 8.1 Enterprise Windows Server 2012 R2 Windows Storage Server 2012 R2 Surface
Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc.
Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0 Accellion, Inc. December 24, 2009 Copyright Accellion, Inc. 2009. May be reproduced only in its original entirety
Properties of Secure Network Communication
Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able to understand the contents of the transmitted message. Because eavesdroppers may intercept the message,
UM0586 User manual. STM32 Cryptographic Library. Introduction
User manual STM32 Cryptographic Library Introduction This manual describes the API of the STM32 cryptographic library (STM32-CRYP-LIB) that supports the following cryptographic algorithms: AES-128, AES-192,
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles
Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering
Network Security Gaurav Naik Gus Anderson, Philadelphia, PA Lectures on Network Security Feb 12 (Today!): Public Key Crypto, Hash Functions, Digital Signatures, and the Public Key Infrastructure Feb 14:
TLS all the tubes! TLS Fast Yet? IsWebRTC. It can be. Making TLS fast(er)... the nuts and bolts. +Ilya Grigorik @igrigorik
TLS all the tubes! IsWebRTC TLS Fast Yet? It can be. Making TLS fast(er)... the nuts and bolts. +Ilya Grigorik @igrigorik All communication should be secure, always, and by default! HTTPS everywhere! ...
MAC. SKE in Practice. Lecture 5
MAC. SKE in Practice. Lecture 5 Active Adversary Active Adversary An active adversary can inject messages into the channel Active Adversary An active adversary can inject messages into the channel Eve
HASH CODE BASED SECURITY IN CLOUD COMPUTING
ABSTRACT HASH CODE BASED SECURITY IN CLOUD COMPUTING Kaleem Ur Rehman M.Tech student (CSE), College of Engineering, TMU Moradabad (India) The Hash functions describe as a phenomenon of information security
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Cryptography and Network Security. Prof. D. Mukhopadhyay. Department of Computer Science and Engineering. Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 12 Block Cipher Standards
Network Security. Lecture 3
Network Security Lecture 3 Design and Analysis of Communication Networks (DACS) University of Twente The Netherlands Security protocols application transport network datalink physical Contents IPSec overview
SecureDoc Disk Encryption Cryptographic Engine
SecureDoc Disk Encryption Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy Abstract: This document specifies Security Policy enforced by SecureDoc Cryptographic Engine compliant with the
Technologies to Improve. Ernie Brickell
Technologies to Improve Platform Security Ernie Brickell Intel Corporation 9/29/2011 1 Security is Intel s Third Value Pillar Intel is positioning itself to lead in three areas: energy-efficient efficient
SPC5-CRYP-LIB. SPC5 Software Cryptography Library. Description. Features. SHA-512 Random engine based on DRBG-AES-128
SPC5 Software Cryptography Library Data brief SHA-512 Random engine based on DRBG-AES-128 RSA signature functions with PKCS#1v1.5 ECC (Elliptic Curve Cryptography): Key generation Scalar multiplication
How To Encrypt Data With Encryption
USING ENCRYPTION TO PROTECT SENSITIVE INFORMATION Commonwealth Office of Technology Security Month Seminars Alternate Title? Boy, am I surprised. The Entrust guy who has mentioned PKI during every Security
Block encryption. CS-4920: Lecture 7 Secret key cryptography. Determining the plaintext ciphertext mapping. CS4920-Lecture 7 4/1/2015
CS-4920: Lecture 7 Secret key cryptography Reading Chapter 3 (pp. 59-75, 92-93) Today s Outcomes Discuss block and key length issues related to secret key cryptography Define several terms related to secret
Real-Time Communication Security: SSL/TLS. Guevara Noubir [email protected] CSU610
Real-Time Communication Security: SSL/TLS Guevara Noubir [email protected] CSU610 1 Some Issues with Real-time Communication Session key establishment Perfect Forward Secrecy Diffie-Hellman based PFS
Thanks, But No Thanks
Thanks, But No Thanks Current Cryptographic Standards Are Sufficient for Software Dan Shumow MSR Security and Cryptography Group Microsoft Research Introduction Disclaimer: I am a Software Developer, so
Waspmote Encryption Libraries. Programming guide
Waspmote Encryption Libraries Programming guide Index Document version: v4.3-01/2015 Libelium Comunicaciones Distribuidas S.L. INDEX 1. General Concepts... 4 2. Integrity... 7 2.1. Waspmote Libraries...7
