CCMP Advanced Encryption Standard Cipher For Wireless Local Area Network (IEEE i): A Comparison with DES and RSA
|
|
|
- Lesley Crawford
- 10 years ago
- Views:
Transcription
1 Journal of Computer Science Original Research Paper CCMP Advanced Encryption Standard Cipher For Wireless Local Area Network (IEEE i): A Comparison with DES and RSA 1 Velayutham, R. and 2 D. Manimegalai 1 Einstein College of Engineering, Tirunelveli, Tamilnadu, India 2 Department of IT, National Engineering College, Kovilpatti, Tamilnadu, India Article history Received: Revised: Accepted: Corresponding Author: Velayutham, R., Einstein College of Engineering, Tirunelveli, Tamilnadu, India [email protected] Abstract: The comparative analysis of the renowned cryptographic algorithms AES, DES and RSA. The Rijndael algorithm was adapted as Advanced Encryption Standard (AES) algorithm, to Data Encryption algorithm (DES), which have been in the security standards since long time. The comparative analysis is implemented in IEEE i wireless platform. Compared to DES, AES contains CCMP which is a security standard that provides the highest level of security to encrypt and authenticate the data simultaneously. CCMP protocol is to provide robust security. The CCMP protocol is based on Advanced Encryption Standard (AES) encryption algorithm. It uses the Counter Mode with CBC-MAC (CCM) mode of operation. The CCM mode combines Counter (CTR) mode for privacy and Cipher Block Chaining Message Authentication Code (CBC-MAC) for authentication. The implementation is done on the NS-2 platform to compare and analyzes the performance of this with DES and RSA algorithms, based on the following three criteria: (a) Bit rate; (b) Packet delay; and (c) The number of packets. Thus the motivation is to provide a secure data transfer in the wireless medium in IEEE i. Keywords: AES-CCMP, DES, RSA, IEEE i Introduction Various cryptographic algorithms have been put forth to provide security for the sensitive information across internet. RSA is an algorithm for public-key cryptography. It is vulnerable to the chosen plaintext attacks. The DES algorithm was used to protect sensitive information, but DES is vulnerable to brute force attack because of its relatively short key length. As the key length is only 56 bits there are only 2 56 possible keys. Earlier AES was proposed as a substitute for DES. AES is symmetric block cipher. It accepts 128 bits size block and the key size can be 128, 192 and 256 bits. The operations are performed in a certain number of rounds, which varies between 10, 12 and 14 depending on the size of key length. For both its cipher and Inverse cipher, the AES algorithm uses a round function that is composed of four different byte-oriented transformations. Mobility support is a salient feature of wireless networks that grant the users anytime anywhere network access. Despite their promising feature, security has become one major concern in wireless networks. Wireless Local Area Networks (WLANs) are groups of wireless networking nodes within a limited geographic area, such as an office building or campus that are capable of having radio communication. WLANs are usually implemented as extensions to the existing wired Local Area Networks (LAN) to provide enhanced user mobility and network access. As Wireless Local Area Networks become more widely deployed, wireless security has become a serious concern for an increasing number of organizations. CCMP is based on the Advanced 2015 The Velayutham, R. and D. Manimegalai. This open access article is distributed under a Creative Commons Attribution (CC-BY) 3.0 license.
2 Encryption Standard (AES), a Federal Information Processing Standard (FIPS-197) certified algorithm approved by National Institute of Standards and Technology (NIST). AES (128 bits key length) operates in a Counter Mode (AES-128-CM) within i with CBC-MAC (CCM). It has been created to replace two predecessors: TKIP and WEP. The implementation of AES-CCMP protocol and it is analyzed with the DES and RSA algorithm. The comparative analysis took part in the Wireless medium (Daemen and Rijmen, 1998; Doomun and Soyjaudah, 2008; Islam et al., 2008; NIST, 1993; Samiah et al., 2007; Sanchez-Avila and Sanchez-Reillo, 2001; Schneier and Whiting, 2000; Sivakumar and Velmurugan, 2007; Smyth et al., 2006; Stallings, 2013). IEEE i is designed to provide enhanced security in the Medium Access Control (MAC) layer for networks. IEEE i addresses the security flaws in the original IEEE standard with built-in features providing robust wireless communications security, including support for FIPS validated cryptographic algorithms. The i specification defines two classes of security algorithms: Robust Security Network Association (RSNA) and Pre-RSNA. Pre-RSNA security consists of Wired Equivalent Privacy (WEP) and entity authentication. Advanced Encryption Standards AES is symmetric block cipher encryption converts data to an unintelligible form called cipher text; decrypting the cipher text which converts the data back into its original form, called plain text. Important characteristics of this algorithm include security, performance, efficiency, ease of implementation and flexibility. The AES block diagram is shown in the Fig. 1. The AES algorithm has four basic transformations. Sub Byte Transformation A nonlinear transformation is applied to the elements of the matrix. This first step in each round is a simple substitution that operates independently on each byte of state using S-box. Fig. 1. AES block diagram 284
3 Shift Rows Transformation In the Shift Rows transformation, the bytes in the last three rows of the state are cyclically shifted over different numbers of bytes. Mix Column Transformation Mix Columns is a 32-bit operation that transforms four bytes of each column in the state. The Mix Columns transformation operates on the state column-by-column, treating each column as a four-term polynomial. Add Round Key Transformation During each round of an AES process, a separate 128-bit round key is used. This performs XOR operation on the round key, which is obtained from the initial key by a key expansion procedure. CCM Protocol Network connectivity is becoming an increasingly integral part of computing environments. Wireless Networks offers users anytime network access. WEP the first security protocol was introduced based on RC4. Due to some security issues it was replaced with TKIP. TKIP was based on same security algorithm i.e., RC4. It was better than Wired Equivalent Privacy (WEP) but still same security challenges were faced again. To overcome these security issues CCMP was adopted. Counter Mode Counter mode operates by encrypting the initial counter and the resulting output is XORed with the plaintext to produce the cipher text. The initial counter is constructed from the flags field, length of the payload and the nonce. The nonce is constructed from the Packet Number (PN), MAC layer A2 Address field (A2) and MAC layer priority field. CBC-MAC Mode In Cipher-Block Chaining Message Authentication Code (CBC-MAC) mode, each block of plaintext is XORed with the previous cipher text block before being encrypted. Implementation of the CCMP block can be viewed as a single process with inputs and outputs. The decryption phase has the same inputs as the encryption phase (except that the input MPDU is encrypted). This is because the header information, including the CCMP header, is transmitted across the link in the clear and can therefore be extracted by the receiver prior to decryption. The computation occurs in two stages: First, the MIC is calculated and appended to the MPDU (MAC Protocol Data Unit) and then the entire MPDU (including MIC) is encrypted as shown in the Fig. 2. The implementation of CCMP (as a block ) use a sequence counter called the Packet Number (PN), which it increments for each packet processed. This prevents an attacker trying to reuse a packet that has previously been sent. The PN is 48 bits long; large enough to ensure it never overflows. The first important point is that CCMP encrypts data at the MPDU level. There is one MPDU for each frame transmitted and the MPDU itself might be the result of fragmenting larger packets passed from a higher layer. An overview of the steps in encrypting an MPDU is described below: It start with an unencrypted MPDU, completely with IEEE MAC header. The header includes the source and destination address, but the values of some fields will not be known until later and are set to 0 for now The MAC header is separated from the MPDU and put aside. Information from the header is extracted and used while creating the 8-byte Message Integrity Code (MIC) value. At this stage the 8-byte CCMP header is constructed for later inclusion into the MPDU The MIC value is now computed so as to protect the CCMP header, the data and parts of the IEEE header. Liveness is ensured by the inclusion of a nonce value. The MIC is appended to the data The combination of data and MIC is encrypted. After encryption the CCMP header is prepended Finally the MAC header is restored onto the front of the new MPDU and the MPDU is ready to the queue for transmission. The transmission logic needs to have no knowledge of the CCMP header. From here until transmission, only the MAC header will be updated. The CCMP header must be prepended to the encrypted data and transmitted in the clear (that is unencrypted). The CCMP header has two purposes. First, it provides the 48-bit Packet Number (PN) that provides replay protection and enables the receiver to derive the value of the nonce that is used in the encryption. Second, in the case of multicasts, it tells the receiver in which group key has been used. The format is shown in the Fig. 3. In CCMP the first block of the CBC-MAC computation is not taken directly from the MPDU but is formed in a special way using a 285
4 nonce value. The nonce guarantees freshness by ensuring that each encryption uses data that has never been used before (under a given key). However, one should remember that the key is shared between at least two communicating parties (more for the group key) and these parties may, each at some point, use a PN that has already been used by another party, violating the use once per key rule. To avoid this problem, the nonce is formed by combining the PN with the MAC address of the sender. The CCMP process gives protection against forgery, eavesdropping and copy/replay attacks. This study is implemented in NS2 and the performance is compared with DES and RSA. The methodology of the proposed is as follows (Fig. 4). Fig. 2. CCMP encryption block Fig. 3. CCMP header 286
5 Table 1. Bit rate analysis values Time (sec) RSA DES AES with CCMP Table 2. Packet delay analysis values Time (sec) RSA DES AES with CCMP Results Fig. 4. Methodology In this study, there are three primary performance measures are taken using the route-driven methods (Table 1-3). Encryption methods have been established in two separate levels, one for the data transmission from sensor nodes to the cluster head and another from cluster heads to base station. By this encryption levels, the malicious data from sensor nodes and data congestion to base station is reduced, further additional encryption is provided from cluster head to base station in the similar manner. For the sensor nodes and cluster head encryption, key generation parameters are distributed dynamically within the cluster itself rather than getting common key from the base station. This reduces the unnecessary overhead of the base station. The values obtained during the execution of the simulation environment are tabulated and the graphical analysis is shown. The sample values obtained for the bit rate, packet delay and Packet transfer rate between these algorithms are as follows. Based on the obtained values AES algorithm combined with the CCM Protocol shows a clear advantage over the DES and RSA algorithms. Table 3. Packet transfer rate analysis values Time (sec) RSA DES AES with CCMP The first graphical representation analyzed between the time and the number of bits transferred at a particular time period in second s similarly number of packets delayed at the certain interval of time also the number of packets transferred analyzed between the times in seconds. These values are obtained through the NS2 simulation environment. Discussion The result analysis of the most existing system are based on the data transfer rate, in this proposed scheme the analysis take part for the Bit rate transfer and the Packet delay. Based on the results, the discussions are as follows. The bit rate performance in the Fig. 5 shows that in the case of RSA, DES and AES with CCMP algorithms are compared. The performance results show that the AES with CCMP shows better results 287
6 than the other two algorithms. With the security implementations, all the data are being encrypted both in cluster head and base station that is represented in the graphical analysis. The performance results in the Fig. 6 shows that the AES with CCMP shows reduced delay results than the other two algorithms. The data transmission between adjacent packets is considered as delay based on the encryption standards. The performance results in the Fig. 7 show that the AES with CCMP shows good packet reception than the other two algorithms. Fig. 5. Dynamic key management-bit rate Fig. 6. Dynamic key management-packet delay 288
7 Fig. 7. Dynamic key management-no of packets Conclusion In this study, we have implemented AES with CCMP in IEEE i and compared the performance of this with the other two algorithms namely DES and RSA. The proposed work also presented a dynamic key management strategy for cluster-based Heterogeneous Sensor Networks (HSN) to maintain required security and service quality levels consisting of three attributes, which are bit rate, packet delay and number of packets. The implementation is done in the NS-2 and through simulations; we have compared the performances of RSA, DES and AES with CCMP algorithms. The results show that AES with CCMP shows better performance with respect to the Quality Of Service (QOS)-bit rate, packet delay and number of packets. This computation has done by using the randomized file selection for dynamic key management level both in cluster head and base station. As a further process, we plan to extend the proposed strategy to control security and service quality for multiple clusters of various wireless networks such as WLAN and MANET in addition to the heterogeneous sensor networks. Funding Information The authors have no support or funding to report. Author s Contributions All authors equally contributed in this work. Ethics This article is original and contains unpublished material. The corresponding author confirms that all of the other authors have read and approved the manuscript and no ethical issues involved. References Daemen, J. and V. Rijmen, AES Proposal: Rijndael. 1st Edn., Springer-Verlag, Berlin Heidelberg. Doomun, M.R. and K.M.S. Soyjaudah, Resource saving AES-CCMP design with hybrid counter mode block chaining-mac. Int. J. Comput. Sci. Netw. Security, 8: Islam, M.N., M. Mia, M. Chowdhury and M.A. Matin, Effect of security increment to symmetric data encryption through AES methodology. Proceedings of the 9th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, Aug. 6-8, IEEE Xplore Press, Phuket, DOI: /SNPD NIST, Data encryption standard, FIPS. National Institute of Standards and Technology. Samiah, A., A. Aziz and N. Ikram, An efficient software implementation of AES-CCM for IEEE i wireless st. Proceedings of the 31st Annual International Computer Software and Applications Conference, Jul , IEEE Xplore Press, Beijing, pp: DOI: /COMPSAC Sanchez-Avila, C. and R. Sanchez-Reillo, The rijndael block cipher (AES Proposal): A comparison with DES. Proceedings of the 35th International Carnahan Conference on Security Technology, Oct , IEEE Xplore Press, London, pp: DOI: / Schneier and D. Whiting, A performance comparison of the five AES finalist. Proceedings of the 3rd AES Candidate Conference, Mar
8 Sivakumar, C. and A. Velmurugan, High speed VLSI design CCMP AES cipher for WLAN (IEEE i). Proceedings of the International Conference on Signal Processing, Communications and Networking, Feb , IEEE Xplore Press, Chennai, pp: DOI: /ICSCN Smyth, N., M. McLoone and J.V. McCanny, WLAN security processor. IEEE Trans. Circuits Syst. I: Regular Papers, 53: DOI: /TCSI Stallings, W., Cryptography and Network Security: Principles and Practice. 6th Edn., Pearson Education, Limited, London, ISBN-10: , pp:
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security Objectives Overview of IEEE 802.11 wireless security Define vulnerabilities of Open System Authentication,
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
Implementation of Full -Parallelism AES Encryption and Decryption
Implementation of Full -Parallelism AES Encryption and Decryption M.Anto Merline M.E-Commuication Systems, ECE Department K.Ramakrishnan College of Engineering-Samayapuram, Trichy. Abstract-Advanced Encryption
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
802.11 Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi [email protected]
802.11 Security (WEP, WPA\WPA2) 19/05/2009 Giulio Rossetti Unipi [email protected] 802.11 Security Standard: WEP Wired Equivalent Privacy The packets are encrypted, before sent, with a Secret Key
CS 356 Lecture 29 Wireless Security. Spring 2013
CS 356 Lecture 29 Wireless Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter
Network Security. Chapter 3 Symmetric Cryptography. Symmetric Encryption. Modes of Encryption. Symmetric Block Ciphers - Modes of Encryption ECB (1)
Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Network Security Chapter 3 Symmetric Cryptography General Description Modes of ion Data ion Standard (DES)
Network Security. Security of Wireless Local Area Networks. Chapter 15. Network Security (WS 2003): 15 Wireless LAN Security 1. Dr.-Ing G.
Network Security Chapter 15 Security of Wireless Local Area Networks Network Security (WS 2003: 15 Wireless LAN Security 1 IEEE 802.11 IEEE 802.11 standardizes medium access control (MAC and physical characteristics
Design and Implementation of Asymmetric Cryptography Using AES Algorithm
Design and Implementation of Asymmetric Cryptography Using AES Algorithm Madhuri B. Shinde Student, Electronics & Telecommunication Department, Matoshri College of Engineering and Research Centre, Nashik,
IJESRT. [Padama, 2(5): May, 2013] ISSN: 2277-9655
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY Design and Verification of VLSI Based AES Crypto Core Processor Using Verilog HDL Dr.K.Padama Priya *1, N. Deepthi Priya 2 *1,2
AStudyofEncryptionAlgorithmsAESDESandRSAforSecurity
Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 15 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY
CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY Varun Gandhi 1 Department of Computer Science and Engineering, Dronacharya College of Engineering, Khentawas,
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS)
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS) Ashraf Odeh 1, Shadi R.Masadeh 2, Ahmad Azzazi 3 1 Computer Information Systems Department, Isra University,
Wireless security. Any station within range of the RF receives data Two security mechanism
802.11 Security Wireless security Any station within range of the RF receives data Two security mechanism A means to decide who or what can use a WLAN authentication A means to provide privacy for the
Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key
Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key Julia Juremi Ramlan Mahmod Salasiah Sulaiman Jazrin Ramli Faculty of Computer Science and Information Technology, Universiti Putra
Chapter 6 CDMA/802.11i
Chapter 6 CDMA/802.11i IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Some material copyright 1996-2012 J.F Kurose and K.W. Ross,
Secret File Sharing Techniques using AES algorithm. C. Navya Latha 200201066 Garima Agarwal 200305032 Anila Kumar GVN 200305002
Secret File Sharing Techniques using AES algorithm C. Navya Latha 200201066 Garima Agarwal 200305032 Anila Kumar GVN 200305002 1. Feature Overview The Advanced Encryption Standard (AES) feature adds support
Design and Analysis of Parallel AES Encryption and Decryption Algorithm for Multi Processor Arrays
IOSR Journal of VLSI and Signal Processing (IOSR-JVSP) Volume 5, Issue, Ver. III (Jan - Feb. 205), PP 0- e-issn: 239 4200, p-issn No. : 239 497 www.iosrjournals.org Design and Analysis of Parallel AES
Keywords Web Service, security, DES, cryptography.
Volume 3, Issue 10, October 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Provide the
An Evaluation of Security Services schemes For IEEE 802.11 Wireless LAN s Using Qualnet
An Evaluation of Security Services schemes For IEEE 802.11 Wireless LAN s Using Qualnet Richa Gupta 1, Hamid Ali 2, munendra kumar das 3, Shalini Chaudhary 4 P.G. Student, Department of Electronics and
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,
White paper. Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points. http://www.veryxtech.com
White paper Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points http://www.veryxtech.com White Paper Abstract Background The vulnerabilities spotted in the Wired Equivalent Privacy (WEP) algorithm
WI-FI SECURITY: A LITERATURE REVIEW OF SECURITY IN WIRELESS NETWORK
IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 3, Issue 5, May 2015, 23-30 Impact Journals WI-FI SECURITY: A LITERATURE
chap18.wireless Network Security
SeoulTech UCS Lab 2015-1 st chap18.wireless Network Security JeongKyu Lee Email: [email protected] Table of Contents 18.1 Wireless Security 18.2 Mobile Device Security 18.3 IEEE 802.11 Wireless
A Study of New Trends in Blowfish Algorithm
A Study of New Trends in Blowfish Algorithm Gurjeevan Singh*, Ashwani Kumar**, K. S. Sandha*** *(Department of ECE, Shaheed Bhagat Singh College of Engg. & Tech. (Polywing), Ferozepur-152004) **(Department
A Comparative Study Of Two Symmetric Encryption Algorithms Across Different Platforms.
A Comparative Study Of Two Symmetric Algorithms Across Different Platforms. Dr. S.A.M Rizvi 1,Dr. Syed Zeeshan Hussain 2 and Neeta Wadhwa 3 Deptt. of Computer Science, Jamia Millia Islamia, New Delhi,
Security in IEEE 802.11 WLANs
Security in IEEE 802.11 WLANs 1 IEEE 802.11 Architecture Extended Service Set (ESS) Distribution System LAN Segment AP 3 AP 1 AP 2 MS MS Basic Service Set (BSS) Courtesy: Prashant Krishnamurthy, Univ Pittsburgh
Vulnerabilities of Wireless Security protocols (WEP and WPA2)
Vulnerabilities of Wireless Security protocols (WEP and WPA2) Vishal Kumkar, Akhil Tiwari, Pawan Tiwari, Ashish Gupta, Seema Shrawne Abstract - Wirelesses Local Area Networks (WLANs) have become more prevalent
EVOLUTION OF WIRELESS LAN SECURITY ARCHITECTURE TO IEEE 802.11i (WPA2)
EVOLUTION OF WIRELESS LAN SECURITY ARCHITECTURE TO IEEE 802.11i (WPA2) Moffat Mathews, Ray Hunt Department of Computer Science and Software Engineering, University of Canterbury, New Zealand {[email protected]}
EXAM questions for the course TTM4135 - Information Security May 2013. Part 1
EXAM questions for the course TTM4135 - Information Security May 2013 Part 1 This part consists of 5 questions all from one common topic. The number of maximal points for every correctly answered question
WiFi Security: WEP, WPA, and WPA2
WiFi Security: WEP, WPA, and WPA2 - security requirements in wireless networks - WiFi primer - WEP and its flaws - 802.11i - WPA and WPA2 (RSN) Why security is more of a concern in wireless? no inherent
Design and Verification of Area-Optimized AES Based on FPGA Using Verilog HDL
Design and Verification of Area-Optimized AES Based on FPGA Using Verilog HDL 1 N. Radhika, 2 Obili Ramesh, 3 Priyadarshini, 3 Asst.Profosser, 1,2 M.Tech ( Digital Systems & Computer Electronics), 1,2,3,
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
Network Security Part II: Standards
Network Security Part II: Standards Raj Jain Washington University Saint Louis, MO 63131 [email protected] These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse473-05/ 18-1 Overview
AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES
HYBRID RSA-AES ENCRYPTION FOR WEB SERVICES AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES Kalyani Ganesh
(C) Global Journal of Engineering Science and Research Management
DEPENDABLE STORAGE FOR VEHICLE INSURANCE MANAGEMENT THROUGH SECURED ENCRYPTION IN CLOUD COMPUTING Prof.Abhijeet A.Chincholkar *1, Ms.Najuka Todekar 2 *1 M.E. Digital Electronics, JCOET Yavatmal, India.
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, J.D. Tygar, Victor Wen, and David Culler Department of Electrical Engineering & Computer Sciences, University of California
Network Security. Security of Wireless Local Area Networks. Chapter 15. Network Security (WS 2002): 15 Wireless LAN Security 1 Dr.-Ing G.
Network Security Chapter 15 Security of Wireless Local Area Networks Network Security WS 2002: 15 Wireless LAN Security 1 IEEE 802.11 IEEE 802.11 standardizes medium access control MAC and physical characteristics
CS 336/536 Computer Network Security. Summer Term 2010. Wi-Fi Protected Access (WPA) compiled by Anthony Barnard
CS 336/536 Computer Network Security Summer Term 2010 Wi-Fi Protected Access (WPA) compiled by Anthony Barnard 2 Wi-Fi Protected Access (WPA) These notes, intended to follow the previous handout IEEE802.11
AES Cipher Modes with EFM32
AES Cipher Modes with EFM32 AN0033 - Application Note Introduction This application note describes how to implement several cryptographic cipher modes with the Advanced ion Standard (AES) on the EFM32
UNIK4250 Security in Distributed Systems University of Oslo Spring 2012. Part 7 Wireless Network Security
UNIK4250 Security in Distributed Systems University of Oslo Spring 2012 Part 7 Wireless Network Security IEEE 802.11 IEEE 802 committee for LAN standards IEEE 802.11 formed in 1990 s charter to develop
Key Management (Distribution and Certification) (1)
Key Management (Distribution and Certification) (1) Remaining problem of the public key approach: How to ensure that the public key received is really the one of the sender? Illustration of the problem
Huawei WLAN Authentication and Encryption
Huawei WLAN Authentication and Encryption The Huawei integrated Wireless Local Area Network (WLAN) solution can provide all-round services for municipalities at various levels and enterprises and institutions
Network Security Technology Network Management
COMPUTER NETWORKS Network Security Technology Network Management Source Encryption E(K,P) Decryption D(K,C) Destination The author of these slides is Dr. Mark Pullen of George Mason University. Permission
XIV. Title. 2.1 Schematics of the WEP. 21. 2.2 Encryption in WEP technique 22. 2.3 Decryption in WEP technique. 22. 2.4 Process of TKIP 25
XIV LIST OF FIGURES Figure Title Page 2.1 Schematics of the WEP. 21 2.2 Encryption in WEP technique 22 2.3 Decryption in WEP technique. 22 2.4 Process of TKIP 25 2.5 IEEE 802.1x Structure 30 2.6 RSNA Architecture
Recommended 802.11 Wireless Local Area Network Architecture
NATIONAL SECURITY AGENCY Ft. George G. Meade, MD I332-008R-2005 Dated: 23 September 2005 Network Hardware Analysis and Evaluation Division Systems and Network Attack Center Recommended 802.11 Wireless
The Advanced Encryption Standard (AES)
The Advanced Encryption Standard (AES) All of the cryptographic algorithms we have looked at so far have some problem. The earlier ciphers can be broken with ease on modern computation systems. The DES
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) PPP-based remote access using dial-in PPP encryption control protocol (ECP) PPP extensible authentication protocol (EAP) 13.2 Layer 2/3/4
Wireless Networks. Welcome to Wireless
Wireless Networks 11/1/2010 Wireless Networks 1 Welcome to Wireless Radio waves No need to be physically plugged into the network Remote access Coverage Personal Area Network (PAN) Local Area Network (LAN)
Cryptography and Network Security. Prof. D. Mukhopadhyay. Department of Computer Science and Engineering. Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 12 Block Cipher Standards
How To Analyze The Security On An Ipa Wireless Sensor Network
Throughput Analysis of WEP Security in Ad Hoc Sensor Networks Mohammad Saleh and Iyad Al Khatib iitc Stockholm, Sweden {mohsaleh, iyad}@iitc.se ABSTRACT This paper presents a performance investigation
[email protected] [email protected]
S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India [email protected] 2 School of Computing Sciences, VIT University, Vellore-632 014,
A SURVEY OF WIRELESS NETWORK SECURITY PROTOCOLS
A SURVEY OF WIRELESS NETWORK SECURITY PROTOCOLS Jose Perez Texas A&M University Corpus Christi Email: [email protected] Fax Number: (361) 825-2795 Faculty Advisor: Dr. Ahmed Mahdy, Texas A&M University
Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the
Authentication requirement Authentication function MAC Hash function Security of
UNIT 3 AUTHENTICATION Authentication requirement Authentication function MAC Hash function Security of hash function and MAC SHA HMAC CMAC Digital signature and authentication protocols DSS Slides Courtesy
Split Based Encryption in Secure File Transfer
Split Based Encryption in Secure File Transfer Parul Rathor, Rohit Sehgal Assistant Professor, Dept. of CSE, IET, Nagpur University, India Assistant Professor, Dept. of CSE, IET, Alwar, Rajasthan Technical
Single Sign-On Secure Authentication Password Mechanism
Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,
159.334 Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology
Network Security 1 Professor Richard Harris School of Engineering and Advanced Technology Presentation Outline Overview of Identification and Authentication The importance of identification and Authentication
Security in Wireless Local Area Network
Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June
First Semester Examinations 2011/12 INTERNET PRINCIPLES
PAPER CODE NO. EXAMINER : Martin Gairing COMP211 DEPARTMENT : Computer Science Tel. No. 0151 795 4264 First Semester Examinations 2011/12 INTERNET PRINCIPLES TIME ALLOWED : Two Hours INSTRUCTIONS TO CANDIDATES
CS5490/6490: Network Security- Lecture Notes - November 9 th 2015
CS5490/6490: Network Security- Lecture Notes - November 9 th 2015 Wireless LAN security (Reference - Security & Cooperation in Wireless Networks by Buttyan & Hubaux, Cambridge Univ. Press, 2007, Chapter
Survey on Enhancing Cloud Data Security using EAP with Rijndael Encryption Algorithm
Global Journal of Computer Science and Technology Software & Data Engineering Volume 13 Issue 5 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example
Table of Contents Wi Fi Protected Access 2 (WPA 2) Configuration Example...1 Document ID: 67134...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...2 Conventions...2 Background Information...2
Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1
Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 Goals v understand principles of network security: cryptography and its many uses beyond
Module 8. Network Security. Version 2 CSE IIT, Kharagpur
Module 8 Network Security Lesson 2 Secured Communication Specific Instructional Objectives On completion of this lesson, the student will be able to: State various services needed for secured communication
Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards
White Paper Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards By Dr. Wen-Ping Ying, Director of Software Development, February 2002 Introduction Wireless LAN networking allows the
Upload Traffic over TCP and UDP Protocols in Different Security Algorithms in Wireless Network
Upload Traffic over TCP and UDP Protocols in Different Security Algorithms in Wireless Network Abdalla Gheryani, And Mladen Veinović Abstract This paper studies and measures the outcome of different security
Journal of Mobile, Embedded and Distributed Systems, vol. I, no. 1, 2009 ISSN 2067 4074
Issues in WiFi Networks Nicolae TOMAI Faculty of Economic Informatics Department of IT&C Technologies Babes Bolyai Cluj-Napoca University, Romania [email protected] Abstract: The paper has four sections.
A PPENDIX H RITERIA FOR AES E VALUATION C RITERIA FOR
A PPENDIX H RITERIA FOR AES E VALUATION C RITERIA FOR William Stallings Copyright 20010 H.1 THE ORIGINS OF AES...2 H.2 AES EVALUATION...3 Supplement to Cryptography and Network Security, Fifth Edition
WEP Overview 1/2. and encryption mechanisms Now deprecated. Shared key Open key (the client will authenticate always) Shared key authentication
WLAN Security WEP Overview 1/2 WEP, Wired Equivalent Privacy Introduced in 1999 to provide confidentiality, authentication and integrity Includes weak authentication Shared key Open key (the client will
Cipher Suites and WEP
Cipher Suites and WEP This module describes how to configure the cipher suites required for using Wireless Protected Access (WPA) and Cisco Centralized Key Management (CCKM); Wired Equivalent Privacy (WEP);
Secure File Multi Transfer Protocol Design
Journal of Software Engineering and Applications, 2011, 4, 311-315 doi:10.4236/jsea.2011.45034 Published Online May 2011 (http://www.scirp.org/journal/jsea) 311 Murali Krishna, Pradeep Jamwal, K. S. R.
Improving Performance of Secure Data Transmission in Communication Networks Using Physical Implementation of AES
Improving Performance of Secure Data Transmission in Communication Networks Using Physical Implementation of AES K Anjaneyulu M.Tech Student, Y.Chalapathi Rao, M.Tech, Ph.D Associate Professor, Mr.M Basha,
Properties of Secure Network Communication
Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able to understand the contents of the transmitted message. Because eavesdroppers may intercept the message,
How To Protect Your Wireless Network From Attack
Securing Your Wireless Devices: Fundamental Principles and Enabling Technologies Vireshwar Kumar, Jung-Min (Jerry) Park Bradley Department of Electrical and Computer Engineering Wireless@VT Symposium May
Analysis of Security Issues and Their Solutions in Wireless LAN 1 Shenam Chugh, 2 Dr.Kamal
Analysis of Security Issues and Their Solutions in Wireless LAN 1 Shenam Chugh, 2 Dr.Kamal 1,2 Department of CSE 1,2,3 BRCM Bahal, Bhiwani 1 [email protected], 2 [email protected] Abstract This paper
Overview of Symmetric Encryption
CS 361S Overview of Symmetric Encryption Vitaly Shmatikov Reading Assignment Read Kaufman 2.1-4 and 4.2 slide 2 Basic Problem ----- ----- -----? Given: both parties already know the same secret Goal: send
Vulnerabilities in WEP Christopher Hoffman Cryptography 2 2011-3
Vulnerabilities in WEP Christopher Hoffman Cryptography 2 2011-3 1. Abstract Wired Equivalent Privacy (WEP) was the first encryption scheme used for protecting wireless traffic. It consisted of a private
Wireless Local Area Network Security Obscurity Through Security
Wireless Local Area Network Security Obscurity Through Security Abstract Since the deployment of infamous Wired Equivalent Privacy (WEP), IEEE and vendors have developed a number of good security mechanisms
FPGA IMPLEMENTATION OF AN AES PROCESSOR
FPGA IMPLEMENTATION OF AN AES PROCESSOR Kazi Shabbir Ahmed, Md. Liakot Ali, Mohammad Bozlul Karim and S.M. Tofayel Ahmad Institute of Information and Communication Technology Bangladesh University of Engineering
Pavithra.S, Vaishnavi.M, Vinothini.M, Umadevi.V
International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 965 OPTIMIZATION OF AES ALGORITHM USING HARDWARE AND SOFTWARE Pavithra.S, Vaishnavi.M, Vinothini.M, Umadevi.V Abstract-In
NETWORK ADMINISTRATION AND SECURITY
NETWORK ADMINISTRATION AND SECURITY Unit I (NAS) (W- 10) Q. 1) What is Security Attack? Explain general categories of attack with examples. 7 Q. 2) List and define the five security services. 5 Q. 3) Define
Introduction to WiFi Security. Frank Sweetser WPI Network Operations and Security [email protected]
Introduction to WiFi Security Frank Sweetser WPI Network Operations and Security [email protected] Why should I care? Or, more formally what are the risks? Unauthorized connections Stealing bandwidth Attacks
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof, Naveen Sastr, David Wagner Presented By: Tristan Brown Outline Motivation Cryptography Overview TinySec Design Implementation
A New Digital Encryption Scheme: Binary Matrix Rotations Encryption Algorithm
International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 2, Issue 2, February 2015, PP 18-27 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) www.arcjournals.org A
Symm ym e m t e r t ic i c cr c yptogr ypt aphy a Ex: RC4, AES 2
Wi-Fi Security FEUP>MIEIC>Mobile Communications Jaime Dias Symmetric cryptography Ex: RC4, AES 2 Digest (hash) Cryptography Input: variable length message Output: a fixed-length bit
Chapter 8. Network Security
Chapter 8 Network Security Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic Principles Need for Security Some people who
The Advanced Encryption Standard (AES)
The Advanced Encryption Standard (AES) Conception - Why A New Cipher? Conception - Why A New Cipher? DES had outlived its usefulness Vulnerabilities were becoming known 56-bit key was too small Too slow
The Misuse of RC4 in Microsoft Word and Excel
The Misuse of RC4 in Microsoft Word and Excel Hongjun Wu Institute for Infocomm Research, Singapore [email protected] Abstract. In this report, we point out a serious security flaw in Microsoft
Network Security Protocols
Network Security Protocols Information Security (bmevihim100) Dr. Levente Buttyán associate professor BME Hálózati Rendszerek és Szolgáltatások Tanszék Lab of Cryptography and System Security (CrySyS)
A COMPARITIVE ANALYSIS OF WIRELESS SECURITY PROTOCOLS (WEP and WPA2)
A COMPARITIVE ANALYSIS OF WIRELESS SECURITY PROTOCOLS (WEP and WPA2) Vipin Poddar Suresh Gyan Vihar School of Engginering And Technology, Jaipur, Rajasthan. Hitesh Choudhary, Poornima University, Jaipur,
Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide
Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead
Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks
Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,
Hardware Implementation of AES Encryption and Decryption System Based on FPGA
Send Orders for Reprints to [email protected] The Open Cybernetics & Systemics Journal, 2015, 9, 1373-1377 1373 Open Access Hardware Implementation of AES Encryption and Decryption System Based
