Analyzing Word and Excel Encryption An operational solution
|
|
|
- Gordon Watson
- 9 years ago
- Views:
Transcription
1 Analyzing Word and Excel Encryption An operational solution Eric Filiol, ESIEA - Laval Operational Cryptology and Virology Lab (C + V ) O Rescue Keynote - Hack.lu 2009 Rescue Keynote - Hack.lu /
2 Microsoft Office Market Microsoft Office represents 90 % of office suites for home use. 80 % of office suites for professional use. Most of the versions in use are Office versions up 2003 releases (version 11). Office still represents a small part of the market. Companies and users are reluctant at migrating to Office Compatibility and easy-to-useness issues. Rescue Keynote - Hack.lu /
3 Microsoft Office Encryption Office provides password-based document encryption for every application of the suite. Different levels of encryption available sometimes. The default level is weak lame xor encryption. What about the so-called most secure levels? Use of 128-bit key RC4 (up to Office 2003). Really strong? What the impact of the Windows operating system on the overall cryptographic security? Let us broaden the debate : how to hide a decrypting trap? Without loss of generality, we focus on the Word application. Rescue Keynote - Hack.lu /
4 Our results Based on theoretical works of Hongju Wu (2004) that have never been practically proved. We manage to decrypt operationally any Office documents protected with embedded encryption. Any security level, including 128-bit key RC4. Up to Office The practical attack relies both on cryptographic and forensic techniques that must be combined. Ideal combination for forensics purpose that can be envisaged as a trap. The cryptanalysis can be performed within a couple of minutes. Implemented in C language with Franck Bonnard s help. Rescue Keynote - Hack.lu /
5 Summary of the talk 1 Introduction 2 Office Encryption General Description xor Encryption RC4 Encryption Word Document Critical Fields 3 Principle of Cryptanalysis General Description Detecting Parallel Texts The Cryptanalysis 4 Refinements Key Parameters Refinements and Optimization 5 Experimental Results 6 The Excel Case Excel Specific Features Detecting Excel Parallel Files Excel Cryptanalysis 7 Conclusion Rescue Keynote - Hack.lu /
6 General Description Password-based Protection Usually through the Tools Options menu. Use the Security Advanced tab. Different level of cryptographic security : from lame to supposedly high level. Rescue Keynote - Hack.lu /
7 xor Encryption xor Encryption It is the default setting unless you use the Advanced tab. Essentially to ensure the backward compatibility with former Microsoft Office suites. It is the lamest encryption method ever. Mask the text with a constant pattern. Plaintext T E X T E X E M P L E Key A B C D A B C D A B C D = Ciphertext(hex) B B 1 C Easy to detect (basic statistical test). Easier to break. Rescue Keynote - Hack.lu /
8 xor Encryption xor Encryption (2) Very characteristic to detect. Very weak key management. The 32-bit hash of the password is stored at offset 0x20E. Immediate to break with dedicated software. Easy to break with classical cryptanalysis techniques. Rescue Keynote - Hack.lu /
9 RC4 Encryption RC4 Encryption All other Office encryption methods are using RC4. RC4 is a 2048-bit key stream cipher. The key is limited to 40 bits in Office 97/Office The key is extended to 128 bits in later Office suites (up to Office 2003). A pseudo-random sequence σ is expanded by RC4 from the key and combined to the text. The sequence σ is as long as the text C i = σ i P i where C i, σ i and P i are the ciphertext, pseudo-random and plaintext sequences respectively. Rescue Keynote - Hack.lu /
10 RC4 Encryption RC4 Encryption (2) The application builds the key K from the user password : K = F (H(IV password)) where F is a 128-bit derivation function, H is a hash function (SHA-1) and IV is a 128-bit random initialization vector. The IV is located after the marker (offset 0x147C). Rescue Keynote - Hack.lu /
11 RC4 Encryption RC4 Encryption (3) This encryption is supposed to be secure provided that : The sequence is unique to every different document (even up to one byte). The key does not depend on the password only. The key space is large enough. In this respect, RC4-based Office encryption seems to be secure. In fact, this encryption is weak and can be operationally broken (see further). Rescue Keynote - Hack.lu /
12 Word Document Critical Fields Word Document Critical Fields To conduct the cryptanalysis, it is necessary to identify a few internals of Office documents (e.g. Word here). We need to know where the text begins and its size (in other words where it ends). Text has variable length by nature. The text (encrypted or not) always begins at offset 0xA00. To calculate the text length, look at offsets 0x21C and 0x21D. Let be x and y the values respectively found here. The text length L is then given by L = (y 8) x Rescue Keynote - Hack.lu /
13 General Description Office Encryption Vulnerability Theoretically identified by Hongju Wu in Never verified on an practical/operational basis. Based on the fact that Office uses the same IV for every different version (revision) of a given document. The user generally does not change the password from revision to revision. So the key K remains the same. This flaw cannot be exploited with a single text. A revision is supposed to overwrite the previous one. No so obvious to implement a cryptanalysis using it. It supposes also a weakness at the operating system level. Interesting issue : can we consider the combination of two (suitable) flaws as a trap? We will call parallel (encrypted) texts, two (or more) versions of a same encrypted document. Rescue Keynote - Hack.lu /
14 General Description Weakness of Parallel (encrypted) Texts Let us consider two parallel encrypted texts c 1 = c 0 1, c1 1, c2 1, c and c 2 = c 0 2, c1 2, c2 2, c Since they are parallel, they are encrypted with the same pseudo-running sequence σ = σ 0, σ 1, σ 2, σ 3... (RC4-expansion of K). Let be m 1 = m 0 1, m1 1, m2 1, m and m 2 = m 0 2, m1 2, m2 2, m the corresponding plaintext. We have c j i = σj p j i for all i = 1, 2 and j N where N is the size of the two texts (common part). Rescue Keynote - Hack.lu /
15 General Description Weakness of Parallel (encrypted) Texts (2) Let us bitwise xor the two encrypted texts c 1 and c 2. Then we have : c j 1 cj 2 = pj 1 σj p j 2 σj for all j N Then, we have a quantity which no longer depends on the secret key (or equivalently the pseudo-running sequence) : c j 1 cj 2 = pj 1 pj 2 for all j N Since it is the bitwise xor of two plaintexts, they have a very particular stastitical profile. Rescue Keynote - Hack.lu /
16 General Description Illustrative Example We slightly modify a Word document (one-word insertion ; e.g. changing the date). Original text : Ceci est un essai de construction de messages parallèles afin de montrer la vulnérabilité du chiffrement de Microsoft Word. Modified text : Ceci est un essai de construction de deux messages parallèles afin de montrer la vulnérabilité du chiffrement de Microsoft Word. Rescue Keynote - Hack.lu /
17 Detecting Parallel Texts Detecting Parallel (encrypted) Texts Under this assumption of parallelism, detecting parallel texts among a large amount of texts is very easy : Equivalent to detect random files from non random files. Very basic statistical test. Bitwise xor every pair of texts and count Z the number of null bits in the resulting sequence. Then If the two texts are not parallel (e.g. encrypted with different keys) then Z has a normal distribution law N ( N 2, N 2 ). Otherwise, Z has a has a normal distribution law N (np, p(1 p)) where p > 1 2 is the probability for a bit to be zero. The test can explore thousands of text within a hour. To detect a complete set of parallel texts, just use the fact that parallelism is an equivalence relation. Rescue Keynote - Hack.lu /
18 Detecting Parallel Texts Detecting Parallel (encrypted) Texts (2) Compute Z = N i=1 (ci 1 ci 2 1). Look for extremal values of Z. Here texts 1, 2, 3, 4 and 5 are parallel. Rescue Keynote - Hack.lu /
19 Detecting Parallel Texts Detecting Parallel (encrypted) Texts (3) Equivalent statistical test. Choose according to the value of Z with respect to a decision threshold S. This step is (plaintext) language independent! Rescue Keynote - Hack.lu /
20 The Cryptanalysis Statistical Model of the Target Language First establish a n-grams corpus for the target language (set of n-grams with frequency). English is the easiest one to model. Optimal values are n = 4 or n = 5 (n = 3 works well if you have at least four parallel texts). You can specialize your corpus (level of language, technical language...). A forensic and intelligence initial step is useful. Rescue Keynote - Hack.lu /
21 The Cryptanalysis Statistical Model of the Target Language (2) The n-grams corpus must be : representative of the language level, context and nature used. must be statistically admissible. must describe a large enough character space. For most of the use, a 4-grams corpus built on modern language is sufficient. We have used a 96-character space Far easier for English texts. Rescue Keynote - Hack.lu /
22 The Cryptanalysis Statistical Model of the Target Language (3) Language level and its impact on the corpus (qualitative aspect). Fig.: Corpus built respectively on non-modern (left), modern (center) and modern military texts (right). Use of hash table to limit memory/time ressources. Rescue Keynote - Hack.lu /
23 The Cryptanalysis Cryptanalysis Principle Let us suppose that we have at least three parallel texts C 1, C 2, C 3. It works for only two but the attack is more tricky to implement (must include a semantic analysis step). For every n-gram T i = (Ti 1, T i 2,..., T i n) in the corpus of frequency f i (in other words, first n-gram plaintext candidate from C 1 ), Xor it to the first ciphertext n-gram (index 1 in the text) (C 1 1, C2 1, C3 1, C4 1 ) in ciphertext C 1. It gives a ciphering n-gram candidate σ 1 such as σ j 1 = Ci 1 T j i for i = 1, 2,... n Rescue Keynote - Hack.lu /
24 The Cryptanalysis Cryptanalysis Principle (2) Xor this n-gram candidate σ 1 to the first ciphertext n-gram in ciphertext C 2 and C 3 respectively. It gives two potential plaintext n-grams corresponding in the corpus to (plaintext) n-grams T k and T l, with respective frequencies f k and f l. Compute a function of the three resulting frequencies Z i = F (f i, f k, f l ) where is a positive increasing function. Keep the best Z i. Go the next ciphertext n-gram in C 1 and repeat until the end of the common parts between C 1, C 2, C 3. Rescue Keynote - Hack.lu /
25 The Cryptanalysis General Algorithm Input: m encrypted texts C 1,..., C m. Each C j is a sequence of n-grams Tj k. A corpus T = {(T i, f i )} Output: m plaintexts P 1,..., P m (sequence of n-grams Pj k) For every n-gram T i in T do Z 0 For every n-gram T1 k de C 1 do Compute σ k = T i T1 k. For j from 2 to m do Compute Mj k = σ k Cj k Recover frequencies fj k in T End For If F (f1 k,..., f m k ) > Z Then Z = F (f1 k,..., f m) k For j from 1 to m do Pj k = M j k End For End If End For End For Rescue Keynote - Hack.lu /
26 The Cryptanalysis Basic Illustrative Example C 1 t 3 X ; t 3 X ; T 1 A r m y f 1 D p q i f 1 K 0x35 0x41 0x35 0x42 0x30 0x43 0x29 0x52 C 2 f $ V 0 f $ V 0 K 0x35 0x41 0x35 0x42 0x30 0x43 0x29 0x52 T 2 S e c r f 2 V 9? b f 2 C 3 { 4 { 4 K 0x35 0x41 0x35 0x42 0x30 0x43 0x29 0x52 T 2 N u K e f 3 K w W u f 3 Fig.: Correct (left) and wrong plaintext guess (? means non printable) We obviously see that F (f 1, f 2, f 3 ) > F (f 1, f 2, f 3 ). Then the left part corresponds to the correct guess. Rescue Keynote - Hack.lu /
27 Key Parameters Key Parameters A few parameters have a significant impact on the final probability of success : the frequency function F, the decrypting mode, the decision mode. A number of refinements enable to drastically speed up the cryptanalysis and increase the final probability of success to recover the whole texts. Rescue Keynote - Hack.lu /
28 Key Parameters Frequency Function F It must a positive increasing function. Either additive Or multiplicative F (f 1, f 2,..., f k ) = F (f 1, f 2,..., f k ) = k i=1 f i k (fi a + 1) The multiplicative one is far more efficient since it amplifies the impact of frequent n-grams while limiting the effect of marginal frequencies of rare (but correct) plaintext n-grams. The value a = 0.3 is optimal. i=1 Rescue Keynote - Hack.lu /
29 Key Parameters Decrypting Mode It depends on the way n-grams are taken in the ciphertext. Either normal mode : n-grams have void intersection (consecutive). This mode is the less efficient one. Or overlapping mode : n-grams share (n 1) characters. The overlapping mode allows a large number of optimizations and algorithmic tricks. It is therefore the most efficient. The non empty intersection enables to greatly increase the confidence in the final plaintext n-gram we keep. Rescue Keynote - Hack.lu /
30 Key Parameters Decrypting Mode : Basic Example S W E E W H E R E R E S E T N I T O N I N I G E I G H B G H O S H T A T I I S W E E T N I G H T I Somehow a mix of maximum-likelyhood decoding (quantitative aspect) and coherence decoding (qualitative aspect). Optimize the decrypting success at the end of the texts (common part). Rescue Keynote - Hack.lu /
31 Key Parameters Decision Mode This cryptanalysis consists somehow in performing a decoding. It is then possible to use ECC techniques. Either hard decision : for every n-gram index, we keep only the best candidate. Any trigram error will be difficult to recover and the final plaintext may contain a significant number of holes. Problematic when the plaintext contains rare n-grams (proper name, technical terms...). Or soft decision : for every n-gram index, we keep up to the p best candidates. Can prevent a bad decision at previous index (the correct n-gram has the second best score). A little bit more tricky to implement but far more efficient. Rescue Keynote - Hack.lu /
32 Refinements and Optimization Refinements and Optimization The best approach consists in combining all the previous key elements. multiplicative frequency function F with a = 0.3, overlapping mode with all optimizations enabled, soft decision (5 p 10). It is however possible to increase the efficiency of the cryptanalysis by considering a few other refinements. Rescue Keynote - Hack.lu /
33 Refinements and Optimization Refinements and Optimization (2) Reject guesses which produce n-grams containing characters that are not in the character space chosen (e.g. non printable character). Performs semantic analysis on-the-fly of the m plaintext candidate when guessing a new n-grams. It is necessary when having only two parallel ciphertexts. There is an additional degree of freedom to deal with : THER EISA ROTA TING EFFE CT, WHEN DEAL INGW ITHT WOTE XTS and THER DEAL ROTA TING WOTE XTS WHEN EISA INGW ITHT EFFE CT, are statistically identical solutions but semantically different. Semantic step has a local effect only. Can be combined by considering languages as Markov process (French language is a 19-Markov process). Rescue Keynote - Hack.lu /
34 Refinements and Optimization Exploiting Another Weakness The main problem lies in the fact that normally each new version of a text should overwrite the previous one. Then in an ideal operating system, the parallism depth (number of parallel encrypted documents) should be equal to 1. The cryptanalysis is therefore not possible. Perfection lies elsewhere. There is another weakness in Windows system which looks innocent in itself : temporary files + unsecure erasing. It is then possible to increase the parallelism depth (sometimes in a very important way). Combining the two gives a powerful ability for any forensic analysis. Rescue Keynote - Hack.lu /
35 Refinements and Optimization Increasing Parallelism Depth Temporary files (one per revision!). They are unsecurely deleted : use a recovery software! In average, the parallelism depth is about 4 to 6. It is very easy to steal all these versions with a simple (malicious) USB key. It then goes beyond simple forensic aspects. Rescue Keynote - Hack.lu /
36 Experimental Results We have performed a lot of experiments on different languages (from different linguistic groups). Test group 1 : Common language/non modern texts. Test group 2 : Common language/modern texts. Test group 1 : Technical language/modern texts. With full optimization enabled, the probability of success if very close to 100 %. Just require a final check by human operator to manage proper names or very rare terms. Rescue Keynote - Hack.lu /
37 Excel Specific Features The Excel Case This case is less easy to solve but the principle remains the same. We manage to recover data from parallel texts as efficiently as for Word. The offset of data beginning is variable. The data structure are quite different (cells instead of text). The nature of data are different (numbers rather than letters). Modifications of cells are stored at the end of the sheet data. But to bypass the problems, we observed and use the fact that Data are always beginning 31 bytes after the 0x8C pattern. The end marker depends on the number of cells in the sheet. Data are ending right before the 0xFF α pattern where α = (8 p) 256 Hence we have this marker equal to 0xFF000a00, 0xFF001200, 0xFF1a Rescue Keynote - Hack.lu /
38 Excel Specific Features Excel Modifications Let us consider a text and its revision. Viewing modifications Rescue Keynote - Hack.lu /
39 Excel Specific Features The Encryption Flaw in Excel Let us consider an encrypted text and its encrypted revision. Identifying the flaw. Rescue Keynote - Hack.lu /
40 Detecting Excel Parallel Files Detecting Excel Parallel Files The principle remains exactly the same. No significant difference with Word. Rescue Keynote - Hack.lu /
41 Excel Cryptanalysis Excel Cryptanalysis The principle remains exactly the same as well. Two additional constraints however to deal with. Data include specific (cell) separator fields which have the form XX In fact this constraint turns to be a very interesting feature since it is very probable plaintext AND it enables to regularly recover from wrong n-gram guesses. Use a specific n-gram corpus (no sentences, different space character, very few verbs, mainly numbers...). The parallelism depth is generally higher than for Word. Decrypting Excel proved to be efficient and operationally feasible. Rescue Keynote - Hack.lu /
42 Work Summary We have designed a fully operational technique/tools to decrypt Microsoft Office documents up to Office Mainly concern forensics needs. However applicable through an attack to steal the parallel texts (malicious USB key, spy malware...). This attacks for every misuse of secret keys (reuse of key without truly different IV) in stream ciphers or stream cipher-like modes of block ciphers. Existing cases more numerous than expected and/or suspected. Rescue Keynote - Hack.lu /
43 Trap or not Trap? This is precisely a good question! What is flaw can become an (intended) trap when combined to another flaw. Especially when the two flaws are maintained thoughout time and version (of Office AND Windows). Give a very interesting insight on how to build such traps. Just use more than two innocent looking flaws. Use secret-sharing schemes or threshold scheme. Can be interestingly extended to cryptosystems themselves (e.g. block ciphers) to produce trapped encryption. Research under way. Rescue Keynote - Hack.lu /
44 Questions Thanks to Franck Bonnard for his help and his friendship! Many thanks for your attention. Questions... (there is no stupid questions!)... and Answers...(there are eventually just stupid answers). Rescue Keynote - Hack.lu 2009 /
The Misuse of RC4 in Microsoft Word and Excel
The Misuse of RC4 in Microsoft Word and Excel Hongjun Wu Institute for Infocomm Research, Singapore [email protected] Abstract. In this report, we point out a serious security flaw in Microsoft
Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards
White Paper Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards By Dr. Wen-Ping Ying, Director of Software Development, February 2002 Introduction Wireless LAN networking allows the
6.857 Computer and Network Security Fall Term, 1997 Lecture 4 : 16 September 1997 Lecturer: Ron Rivest Scribe: Michelle Goldberg 1 Conditionally Secure Cryptography Conditionally (or computationally) secure
Common Pitfalls in Cryptography for Software Developers. OWASP AppSec Israel July 2006. The OWASP Foundation http://www.owasp.org/
Common Pitfalls in Cryptography for Software Developers OWASP AppSec Israel July 2006 Shay Zalalichin, CISSP AppSec Division Manager, Comsec Consulting [email protected] Copyright 2006 - The OWASP
CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives
CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash
CSE331: Introduction to Networks and Security. Lecture 20 Fall 2006
CSE331: Introduction to Networks and Security Lecture 20 Fall 2006 Announcements Homework 2 has been assigned: **NEW DUE DATE** It's now due on Friday, November 3rd. Midterm 2 is Friday, November 10th
Victor Shoup Avi Rubin. fshoup,[email protected]. Abstract
Session Key Distribution Using Smart Cards Victor Shoup Avi Rubin Bellcore, 445 South St., Morristown, NJ 07960 fshoup,[email protected] Abstract In this paper, we investigate a method by which smart
Fundamentals of Computer Security
Fundamentals of Computer Security Spring 2015 Radu Sion Intro Encryption Hash Functions A Message From Our Sponsors Fundamentals System/Network Security, crypto How do things work Why How to design secure
SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 13
Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Network Security Chapter 13 Some More Secure Channel Issues Outline In the course we have yet only seen catastrophic
1 Step 1: Select... Files to Encrypt 2 Step 2: Confirm... Name of Archive 3 Step 3: Define... Pass Phrase
Contents I Table of Contents Foreword 0 Part I Introduction 2 1 What is?... 2 Part II Encrypting Files 1,2,3 2 1 Step 1: Select... Files to Encrypt 2 2 Step 2: Confirm... Name of Archive 3 3 Step 3: Define...
Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010
CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Introduction to Cryptography What is cryptography?
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No. # 11 Block Cipher Standards (DES) (Refer Slide
Cryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g.
Cryptography: Motivation Many areas have sensitive information, e.g. Data Structures and Algorithms Cryptography Goodrich & Tamassia Sections 3.1.3 & 3.1.4 Introduction Simple Methods Asymmetric methods:
CPSC 467b: Cryptography and Computer Security
CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 1 January 9, 2012 CPSC 467b, Lecture 1 1/22 Course Overview Symmetric Cryptography CPSC 467b, Lecture 1 2/22 Course Overview CPSC
VoteID 2011 Internet Voting System with Cast as Intended Verification
VoteID 2011 Internet Voting System with Cast as Intended Verification September 2011 VP R&D Jordi [email protected] Index Introduction Proposal Security Conclusions 2. Introduction Client computers could
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
Hill s Cipher: Linear Algebra in Cryptography
Ryan Doyle Hill s Cipher: Linear Algebra in Cryptography Introduction: Since the beginning of written language, humans have wanted to share information secretly. The information could be orders from a
Solutions to Problem Set 1
YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467b: Cryptography and Computer Security Handout #8 Zheng Ma February 21, 2005 Solutions to Problem Set 1 Problem 1: Cracking the Hill cipher Suppose
Message Authentication Codes
2 MAC Message Authentication Codes : and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 28 October 2013 css322y13s2l08, Steve/Courses/2013/s2/css322/lectures/mac.tex,
Network Security. Modes of Operation. Steven M. Bellovin February 3, 2009 1
Modes of Operation Steven M. Bellovin February 3, 2009 1 Using Cryptography As we ve already seen, using cryptography properly is not easy Many pitfalls! Errors in use can lead to very easy attacks You
Password-based encryption in ZIP files
Password-based encryption in ZIP files Dmitri Gabbasov December 15, 2015 Abstract In this report we give an overview of the encryption schemes used in the ZIP file format. We first give an overview of
CSC474/574 - Information Systems Security: Homework1 Solutions Sketch
CSC474/574 - Information Systems Security: Homework1 Solutions Sketch February 20, 2005 1. Consider slide 12 in the handout for topic 2.2. Prove that the decryption process of a one-round Feistel cipher
Effective Secure Encryption Scheme [One Time Pad] Using Complement Approach Sharad Patil 1 Ajay Kumar 2
Effective Secure Encryption Scheme [One Time Pad] Using Complement Approach Sharad Patil 1 Ajay Kumar 2 Research Student, Bharti Vidyapeeth, Pune, India [email protected] Modern College of Engineering,
Block encryption. CS-4920: Lecture 7 Secret key cryptography. Determining the plaintext ciphertext mapping. CS4920-Lecture 7 4/1/2015
CS-4920: Lecture 7 Secret key cryptography Reading Chapter 3 (pp. 59-75, 92-93) Today s Outcomes Discuss block and key length issues related to secret key cryptography Define several terms related to secret
Cryptography and Network Security
Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 3: Block ciphers and DES Ion Petre Department of IT, Åbo Akademi University January 17, 2012 1 Data Encryption Standard
Application of Automatic Variable Password Technique in Das s Remote System Authentication Scheme Using Smart Card
Application of Automatic Variable Password Technique in Das s Remote System Authentication Scheme Using Smart Card C. Koner, Member, IACSIT, C. T. Bhunia, Sr. Member, IEEE and U. Maulik, Sr. Member, IEEE
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 02 Overview on Modern Cryptography
CS 758: Cryptography / Network Security
CS 758: Cryptography / Network Security offered in the Fall Semester, 2003, by Doug Stinson my office: DC 3122 my email address: [email protected] my web page: http://cacr.math.uwaterloo.ca/~dstinson/index.html
Introduction to Encryption
Computers and Society Introduction to Encryption Chris Brooks Department of Computer Science University of San Francisco Department of Computer Science University of San Francisco p.1/35 3-0: Terminology
Network Security - ISA 656 Introduction to Cryptography
Network Security - ISA 656 Angelos Stavrou September 18, 2007 Codes vs. K = {0, 1} l P = {0, 1} m C = {0, 1} n, C C E : P K C D : C K P p P, k K : D(E(p, k), k) = p It is infeasible to find F : P C K Let
Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the
Error oracle attacks and CBC encryption. Chris Mitchell ISG, RHUL http://www.isg.rhul.ac.uk/~cjm
Error oracle attacks and CBC encryption Chris Mitchell ISG, RHUL http://www.isg.rhul.ac.uk/~cjm Agenda 1. Introduction 2. CBC mode 3. Error oracles 4. Example 1 5. Example 2 6. Example 3 7. Stream ciphers
USB Portable Storage Device: Security Problem Definition Summary
USB Portable Storage Device: Security Problem Definition Summary Introduction The USB Portable Storage Device (hereafter referred to as the device or the TOE ) is a portable storage device that provides
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Karagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Karagpur Lecture No. #06 Cryptanalysis of Classical Ciphers (Refer
Counter Expertise Review on the TNO Security Analysis of the Dutch OV-Chipkaart. OV-Chipkaart Security Issues Tutorial for Non-Expert Readers
Counter Expertise Review on the TNO Security Analysis of the Dutch OV-Chipkaart OV-Chipkaart Security Issues Tutorial for Non-Expert Readers The current debate concerning the OV-Chipkaart security was
Hash Functions. Integrity checks
Hash Functions EJ Jung slide 1 Integrity checks Integrity vs. Confidentiality! Integrity: attacker cannot tamper with message! Encryption may not guarantee integrity! Intuition: attacker may able to modify
Developing and Investigation of a New Technique Combining Message Authentication and Encryption
Developing and Investigation of a New Technique Combining Message Authentication and Encryption Eyas El-Qawasmeh and Saleem Masadeh Computer Science Dept. Jordan University for Science and Technology P.O.
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
Content Teaching Academy at James Madison University
Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect
SecureDoc Disk Encryption Cryptographic Engine
SecureDoc Disk Encryption Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy Abstract: This document specifies Security Policy enforced by SecureDoc Cryptographic Engine compliant with the
Overview of Symmetric Encryption
CS 361S Overview of Symmetric Encryption Vitaly Shmatikov Reading Assignment Read Kaufman 2.1-4 and 4.2 slide 2 Basic Problem ----- ----- -----? Given: both parties already know the same secret Goal: send
Network Security: Cryptography CS/SS G513 S.K. Sahay
Network Security: Cryptography CS/SS G513 S.K. Sahay BITS-Pilani, K.K. Birla Goa Campus, Goa S.K. Sahay Network Security: Cryptography 1 Introduction Network security: measure to protect data/information
How To Understand And Understand The History Of Cryptography
CSE497b Introduction to Computer and Network Security - Spring 2007 - Professors Jaeger Lecture 5 - Cryptography CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/
How To Attack A Block Cipher With A Key Key (Dk) And A Key (K) On A 2Dns) On An Ipa (Ipa) On The Ipa 2Ds (Ipb) On Pcode)
Cryptography and Network Security Chapter 6 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 6 Block Cipher Operation Many savages at the present day regard
Overview/Questions. What is Cryptography? The Caesar Shift Cipher. CS101 Lecture 21: Overview of Cryptography
CS101 Lecture 21: Overview of Cryptography Codes and Ciphers Overview/Questions What is cryptography? What are the challenges of data encryption? What factors make an encryption strategy successful? What
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
PGP - Pretty Good Privacy
I should be able to whisper something in your ear, even if your ear is 1000 miles away, and the government disagrees with that. -- Philip Zimmermann PGP - Pretty Good Privacy - services - message format
IT Networks & Security CERT Luncheon Series: Cryptography
IT Networks & Security CERT Luncheon Series: Cryptography Presented by Addam Schroll, IT Security & Privacy Analyst 1 Outline History Terms & Definitions Symmetric and Asymmetric Algorithms Hashing PKI
Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur
Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Module No. # 01 Lecture No. # 05 Classic Cryptosystems (Refer Slide Time: 00:42)
File System Forensics FAT and NTFS. Copyright Priscilla Oppenheimer 1
File System Forensics FAT and NTFS 1 FAT File Systems 2 File Allocation Table (FAT) File Systems Simple and common Primary file system for DOS and Windows 9x Can be used with Windows NT, 2000, and XP New
Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 [email protected] Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室
Network Security 孫 宏 民 [email protected] Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室 Security Attacks Normal flow: sender receiver Interruption: Information source Information destination
Authentication requirement Authentication function MAC Hash function Security of
UNIT 3 AUTHENTICATION Authentication requirement Authentication function MAC Hash function Security of hash function and MAC SHA HMAC CMAC Digital signature and authentication protocols DSS Slides Courtesy
Wireless LAN Security Mechanisms
Wireless LAN Security Mechanisms Jingan Xu, Andreas Mitschele-Thiel Technical University of Ilmenau, Integrated Hard- and Software Systems Group [email protected], [email protected] Abstract.
Network Security. Security of Wireless Local Area Networks. Chapter 15. Network Security (WS 2002): 15 Wireless LAN Security 1 Dr.-Ing G.
Network Security Chapter 15 Security of Wireless Local Area Networks Network Security WS 2002: 15 Wireless LAN Security 1 IEEE 802.11 IEEE 802.11 standardizes medium access control MAC and physical characteristics
best practices for encryption in android
best practices for encryption in android SUBHEADER VALUE PROPOSTION STATEMENT GOES HERE developer.motorola.com/enterprise WHITE PAPER BEST PRACTICES FOR ENCRYPTION IN ANDROID 2 introduction Android has
Methods to increase search performance for encrypted databases
Available online at www.sciencedirect.com Procedia Economics and Finance 3 ( 2012 ) 1063 1068 Emerging Markets Queries in Finance and Business Methods to increase search performance for encrypted databases
Evaluation of the RC4 Algorithm for Data Encryption
Evaluation of the RC4 Algorithm for Data Encryption Allam Mousa (1) and Ahmad Hamad (2) (1) Electrical Engineering Department An-Najah University, Nablus, Palestine (2) Systems Engineer PalTel Company,
SAMPLE EXAM QUESTIONS MODULE EE5552 NETWORK SECURITY AND ENCRYPTION ECE, SCHOOL OF ENGINEERING AND DESIGN BRUNEL UNIVERSITY UXBRIDGE MIDDLESEX, UK
SAMPLE EXAM QUESTIONS MODULE EE5552 NETWORK SECURITY AND ENCRYPTION September 2010 (reviewed September 2014) ECE, SCHOOL OF ENGINEERING AND DESIGN BRUNEL UNIVERSITY UXBRIDGE MIDDLESEX, UK NETWORK SECURITY
Advanced Cryptography
Family Name:... First Name:... Section:... Advanced Cryptography Final Exam July 18 th, 2006 Start at 9:15, End at 12:00 This document consists of 12 pages. Instructions Electronic devices are not allowed.
Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015
Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015 Chapter 2: Introduction to Cryptography What is cryptography? It is a process/art of mangling information in such a way so as to make it
Cryptographic mechanisms
General Secretariat for National Defence Central Directorate for Information Systems Security PRIME MINISTER Paris, 2007 september 14 No. 1904/SGDN/DCSSI/SDS/LCR Cryptographic mechanisms Rules and recommendations
802.11 Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi [email protected]
802.11 Security (WEP, WPA\WPA2) 19/05/2009 Giulio Rossetti Unipi [email protected] 802.11 Security Standard: WEP Wired Equivalent Privacy The packets are encrypted, before sent, with a Secret Key
Forensic Decryption of FAT BitLocker Volumes
Forensic Decryption of FAT BitLocker Volumes P. Shabana Subair, C. Balan (&), S. Dija, and K.L. Thomas Centre for Development of Advanced Computing, PO Box 6520, Vellayambalam, Thiruvananthapuram 695033,
www.vmpcrypt.com User s manual Table of content
www.vmpcrypt.com User s manual Table of content 1. INTRODUCTION... 3 2. INSTALLATION OF VMPCRYPT... 3 3. GENERAL IDEA OF CRYPTOGRAPHY AND CRITICAL ROLE OF KEY... 3 4. ENCRYPTION OF FILES AND FOLDERS...
Chapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
Chapter 6 CDMA/802.11i
Chapter 6 CDMA/802.11i IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Some material copyright 1996-2012 J.F Kurose and K.W. Ross,
SECURITY EVALUATION OF EMAIL ENCRYPTION USING RANDOM NOISE GENERATED BY LCG
SECURITY EVALUATION OF EMAIL ENCRYPTION USING RANDOM NOISE GENERATED BY LCG Chung-Chih Li, Hema Sagar R. Kandati, Bo Sun Dept. of Computer Science, Lamar University, Beaumont, Texas, USA 409-880-8748,
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
159.334 Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology
Network Security 1 Professor Richard Harris School of Engineering and Advanced Technology Presentation Outline Overview of Identification and Authentication The importance of identification and Authentication
How To Encrypt Data With A Power Of N On A K Disk
Towards High Security and Fault Tolerant Dispersed Storage System with Optimized Information Dispersal Algorithm I Hrishikesh Lahkar, II Manjunath C R I,II Jain University, School of Engineering and Technology,
IPsec Details 1 / 43. IPsec Details
Header (AH) AH Layout Other AH Fields Mutable Parts of the IP Header What is an SPI? What s an SA? Encapsulating Security Payload (ESP) ESP Layout Padding Using ESP IPsec and Firewalls IPsec and the DNS
SSL A discussion of the Secure Socket Layer
www.harmonysecurity.com [email protected] SSL A discussion of the Secure Socket Layer By Stephen Fewer Contents 1 Introduction 2 2 Encryption Techniques 3 3 Protocol Overview 3 3.1 The SSL Record
Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code
1 Data Encryption Algorithm
Date: Monday, September 23, 2002 Prof.: Dr Jean-Yves Chouinard Design of Secure Computer Systems CSI4138/CEG4394 Notes on the Data Encryption Standard (DES) The Data Encryption Standard (DES) has been
Wireless Networks. Welcome to Wireless
Wireless Networks 11/1/2010 Wireless Networks 1 Welcome to Wireless Radio waves No need to be physically plugged into the network Remote access Coverage Personal Area Network (PAN) Local Area Network (LAN)
How To Encrypt With A 64 Bit Block Cipher
The Data Encryption Standard (DES) As mentioned earlier there are two main types of cryptography in use today - symmetric or secret key cryptography and asymmetric or public key cryptography. Symmetric
Lecture 9 - Message Authentication Codes
Lecture 9 - Message Authentication Codes Boaz Barak March 1, 2010 Reading: Boneh-Shoup chapter 6, Sections 9.1 9.3. Data integrity Until now we ve only been interested in protecting secrecy of data. However,
IronKey Data Encryption Methods
IronKey Data Encryption Methods An IronKey Technical Brief November 2007 Information Depth:Technical Introduction IronKey is dedicated to building the world s most secure fl ash drives. Our dedication
Designing a Secure Client-Server System Master of Science Thesis in the Programme Software Engineering & Technology
Designing a Secure Client-Server System Master of Science Thesis in the Programme Software Engineering & Technology FREDRIK ANDERSSON Department of Computer Science and Engineering CHALMERS UNIVERSITY
Cryptographic hash functions and MACs Solved Exercises for Cryptographic Hash Functions and MACs
Cryptographic hash functions and MACs Solved Exercises for Cryptographic Hash Functions and MACs Enes Pasalic University of Primorska Koper, 2014 Contents 1 Preface 3 2 Problems 4 2 1 Preface This is a
Cryptography & Network Security
Cryptography & Network Security Lecture 1: Introduction & Overview 2002. 3. 27 [email protected] Common Terms(1) Cryptography: The study of mathematical techniques related to aspects of information security
The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems
The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems Becky Cutler [email protected] Mentor: Professor Chris Gregg Abstract Modern day authentication systems
HP ProtectTools Embedded Security Guide
HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded
CrypTool. www.cryptool.de www.cryptool.com www.cryptool.org. Claudia Eckert / Thorsten Clausius Bernd Esslinger / Jörg Schneider / Henrik Koy
CrypTool A free software program for creating awareness of IT security issues for learning about and obtaining experience of cryptography for demonstrating encryption algorithms and analysis procedures
INTRODUCTION TO CRYPTOGRAPHY
INTRODUCTION TO CRYPTOGRAPHY AUTHOR: ANAS TAWILEH [email protected] Available online at: http://www.tawileh.net/courses/ia This work is released under a Creative Commons Attribution-ShareAlike 2.5 License
Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key
Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key Julia Juremi Ramlan Mahmod Salasiah Sulaiman Jazrin Ramli Faculty of Computer Science and Information Technology, Universiti Putra
Full Drive Encryption Security Problem Definition - Encryption Engine
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 Full Drive Encryption Security Problem Definition - Encryption Engine Introduction for the FDE Collaborative Protection Profiles
1.2 Using the GPG Gen key Command
Creating Your Personal Key Pair GPG uses public key cryptography for encrypting and signing messages. Public key cryptography involves your public key which is distributed to the public and is used to
Digital Rights Management and Code Obfuscation. Amit Sethi
Digital Rights Management and Code Obfuscation by Amit Sethi A thesis presented to the University of Waterloo in fulfilment of the thesis requirement for the degree of Master of Mathematics in Combinatorics
Lecture Note 8 ATTACKS ON CRYPTOSYSTEMS I. Sourav Mukhopadhyay
Lecture Note 8 ATTACKS ON CRYPTOSYSTEMS I Sourav Mukhopadhyay Cryptography and Network Security - MA61027 Attacks on Cryptosystems Up to this point, we have mainly seen how ciphers are implemented. We
Network Security. HIT Shimrit Tzur-David
Network Security HIT Shimrit Tzur-David 1 Goals: 2 Network Security Understand principles of network security: cryptography and its many uses beyond confidentiality authentication message integrity key
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security Objectives Overview of IEEE 802.11 wireless security Define vulnerabilities of Open System Authentication,
Ky Vu DeVry University, Atlanta Georgia College of Arts & Science
Ky Vu DeVry University, Atlanta Georgia College of Arts & Science Table of Contents - Objective - Cryptography: An Overview - Symmetric Key - Asymmetric Key - Transparent Key: A Paradigm Shift - Security
Encryption, Data Integrity, Digital Certificates, and SSL. Developed by. Jerry Scott. SSL Primer-1-1
Encryption, Data Integrity, Digital Certificates, and SSL Developed by Jerry Scott 2002 SSL Primer-1-1 Ideas Behind Encryption When information is transmitted across intranets or the Internet, others can
Office Documents: New Weapons of Cyberwarfare
Office Documents: New Weapons of Cyberwarfare Jonathan Dechaux [email protected], Eric Filiol [email protected], Jean-Paul Fizaine [email protected] Ecole Supérieure en Informatique, Electronique
YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE
YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467a: Cryptography and Computer Security Notes 1 (rev. 1) Professor M. J. Fischer September 3, 2008 1 Course Overview Lecture Notes 1 This course is
Presentation on Black Hat Europe 2003 Conference. Security Analysis of Microsoft Encrypting File System (EFS) http://www.elcomsoft.
Presentation on Black Hat Europe 2003 Conference Security Analysis of Microsoft Encrypting File System (EFS) Microsoft Encrypting File System Encrypting File File System System (EFS) (EFS) is is a a new
