Salsa20/8 and Salsa20/12
|
|
|
- Baldric Fletcher
- 10 years ago
- Views:
Transcription
1 Salsa20/8 and Salsa20/12 Daniel J. Bernstein Department of Mathematics, Statistics, and Computer Science (M/C 249) The University of Illinois at Chicago Chicago, IL Introduction. This document formally proposes two variants of the Salsa20 stream cipher: Salsa20/8, which is Salsa20 reduced from 20 rounds to 8 rounds; and Salsa20/12, which is Salsa20 reduced from 20 rounds to 12 rounds. There are no known attacks on Salsa20/8, Salsa20/12, or the original Salsa20/20. Paul Crowley has published an attack (taking operations) on Salsa20/5, so the security margin in Salsa20/8 is obviously not huge; but the other estream submissions generally have no security margin at all. The sole purpose of reducing the number of rounds is to save time. Salsa20/8 is spectacularly fast in software; see below for detailed timings of Salsa20/8 in various situations. One can also expect Salsa20/8 to perform very well in hardware; no timings are available at this point, but this document discusses the resources required for a Salsa20/8 hardware implementation. Do Salsa20/8 and Salsa20/12 replace Salsa20/20? No. This issue was already covered in the original Salsa20 design document: Should there be fewer rounds? I m comfortable with the 20 rounds of Salsa20 as being far beyond what I m able to break. Perhaps it will turn out that, after more extensive attempts at cryptanalysis, the community is comfortable with a smaller number of rounds; I can imagine using a smaller number of rounds for the sake of speed. On the other hand, Salsa20 will still have its place as a conservative design that is fast enough for practically all applications. I d be utterly astonished to see a successful attack on Salsa20/20, the original 20-round Salsa20. I can t express the same confidence about the other ciphers submitted to estream, or about AES/10, or about Salsa20/8. The literature has many examples of ciphers that weren t designed with large security margins, that seemed to withstand cryptanalysis for a while, and that were finally broken by a slight advance in cryptanalysis. On the other hand, 10-round AES has survived without a large security margin. Perhaps cryptography doesn t need large security margins. Perhaps The author carried out this work while visiting Denmark Technical University. The author was also supported by the Alfred P. Sloan Foundation. Date of this document: Permanent ID of this document: c50783e7d4d93229a58305aa6. This document is final and may be freely cited.
2 Salsa20/8 will survive too. Even if Salsa20/8 is broken, I wouldn t be surprised to see Salsa20/12 withstanding all attacks. One can draw an analogy here between Salsa20 and Serpent. The original 20- round Salsa20, like the original 32-round Serpent, was designed to achieve the maximum possible confidence subject to specified performance goals. In both cases, it s interesting to consider reduced-round variants that don t inspire as much confidence but that provide better performance. One flaw in the analogy is that Salsa20/20 is, in absolute terms, more than twice as fast as Serpent/32. (It s clear to me that Serpent suffers from being a 16-byte block cipher; Salsa20 diffuses changes through a much larger block.) For example, on the Pentium III, Salsa20/8 streams at about 6 cycles per byte; Salsa20/20 and Serpent/13 stream at about 14 cycles per byte; Serpent/32 streams at about 35 cycles per byte. Some applications are unable to afford 35 cycles per byte; fewer applications are unable to afford 14 cycles per byte. What about Salsa20/9, Salsa20/10, Salsa20/11, etc.? I don t think there s any point in taking such tiny steps, except to mark advances in cryptanalysis. Assume, for example, that Salsa20/r is secure for all r 10. What application would notice the slowdown from Salsa20/10 to Salsa20/12? Salsa20/10 would also annoy software and hardware implementors who want to unroll 4 rounds for the sake of speed. How fast is Salsa20/8 in software? I added a Salsa20/8 implementation to version 156 of ECRYPT s stream-cipher timing suite. I timed Salsa20/8 in several different situations: 40k : set up key, set up nonce, and encrypt 40-byte packet. 40 : set up nonce and encrypt 40-byte packet. 576 : set up nonce and encrypt 576-byte packet : set up nonce and encrypt 1500-byte packet. long : encrypt one long stream. agility : encrypt many parallel streams in 256-byte blocks. The following table shows the results, all expressed in cycles per encrypted byte, as in [1]: 40k long agility For example, to set up a nonce and encrypt a 576-byte packet, Salsa20/8 takes 2.1 cycles per encrypted byte (about 1200 cycles overall) on a PowerPC G4, and 8.4 cycles per encrypted byte on a Pentium 4 f29.
3 How does this speed compare to other submissions? The following table shows the speedup factor in switching from ABC version 2 to 40k >10 >10 >10 >10 >10 >10 >10 >10 >10 >10 >10 >10 >10 > long agility 7.19 > > For example, for a 576-byte packet, Salsa20/8 is 2.57 times faster than ABC on a PowerPC G4, but 0.83 times faster (i.e., 1.2 times slower) on a Pentium 4 f29. The table shows that, on most machines, Salsa20/8 is somewhat slower than ABC for long streams (for example, losing 3 cycles per byte on the Pentium 4 f29), but provides better key agility (for example, saving 16 cycles per byte on the Pentium 4 f29) and is much faster at key setup (for example, saving cycles on the Pentium 4 f29). Note that ABC has only a 128-bit key. The following table shows the speedup factor in switching from Dragon to 40k >10 > > long agility The table shows that Salsa20/8 is always faster than Dragon. The following table shows the speedup factor in switching from HC-256 to 40k >10 >10 >10 >10 >10 >10 >10 >10 >10 >10 >10 >10 >10 >10 40 >10 >10 >10 >10 >10 >10 >10 >10 >10 >10 >10 >10 >10 > >10 >10 >10 >10 >10 >10 >10 >10 >10 >10 >10 >10 >10 > >10 >10 >10 >10 > > >10 > long agility > The table shows that Salsa20/8 provides much better performance than HC-256 for small packets, for large packets, and for parallel streams. Performance for long streams may be better or worse, depending on the machine.
4 The following table shows the speedup factor in switching from LEX to 40k long agility The table shows that Salsa20/8 is generally faster than LEX. Note that LEX has only a 128-bit key, although I m told that 256-bit keys are possible with slower setup. The following table shows the speedup factor in switching from NLS to 40k long agility The table shows that Salsa20/8 is generally faster than NLS. Note that NLS has only a 128-bit key and is now believed vulnerable to a 64-bit attack. The following table shows the speedup factor in switching from Phelix to 40k long agility The table shows that Salsa20/8 is always faster than Phelix. Note that Phelix claims only 128-bit security. Beware that the above comparison is unfair to Phelix in one important way: Phelix provides free message authentication. On the other hand, when the goal is to survive a flood of forged packets, Phelix isn t as good as a fast cipher plus a fast authenticator: a separate authenticator allows forged packets to be discarded without being decrypted.
5 The following two tables show the speedup factor in switching from Py and Py6 to 40k >10 >10 >10 >10 >10 > >10 >10 >10 >10 >10 > >10 >10 >10 > > > long agility > k long agility The Py and Py6 tables are comparable to the ABC table. Note that Py and Py6 are now believed vulnerable to a 64-bit attack. The following table shows the speedup factor in switching from Rabbit to 40k long agility The table shows that Salsa20/8 is generally faster than Rabbit. Note that Rabbit has only a 128-bit key. The following table shows the speedup factor in switching from Sosemanuk to 40k long agility
6 The table shows that Salsa20/8 is faster than Sosemanuk for packet encryption, slightly slower for streaming performance on some machines, and slightly faster for streaming performance on other machines. Note that Sosemanuk has a 256- bit key but claims only 128-bit security and has been shown vulnerable to a 224-bit attack. The following table shows the speedup factor in switching from TRIVIUM to 40k long agility The table shows that Salsa20/8 is faster than TRIVIUM except on a few old CPUs. TRIVIUM performs somewhat fewer bit operations than Salsa20/8 (11 xors and 3 ands for each output bit, compared to 8 xors and 9 adds-with-carry), but it doesn t exploit the many fast addition circuits built into modern CPUs. Note that TRIVIUM has only an 80-bit key. How does this speed compare to the official benchmark ciphers? The following table shows the speedup factor in switching from 10-round AES to 40k > > long > agility > The following table shows the speedup factor in switching from RC4 to 40k >10 >10 >10 >10 >10 > > >10 >10 >10 >10 >10 40 >10 >10 >10 >10 >10 > > >10 >10 >10 >10 > > long agility
7 The following table shows the speedup factor in switching from SNOW 2.0 to 40k long agility Is Salsa20/8 suitable for hardware? Yes. Salsa20/8 and Salsa20/12, like the original Salsa20/20, offer a wide range of attractive options for the hardware implementor. They can fit into a very small circuit area; alternatively, they can be parallelized for extremely high throughput; either way, Salsa20/8 and Salsa20/12 offer even better price-performance ratios than Salsa20/20. A hardware implementation of Salsa20/8, like a hardware implementation of Salsa20/20, needs the following resources: Storage for the key, or several keys for a multiple-key chip. This storage has minimal size (for example, 256 bits for the recommended 256-bit keys); Salsa20 does not need space to store, or gates to compute, expanded keys. The key is read only twice for each 512-bit block, once at the beginning and once at the end, so one can save area without much loss of performance by storing the key in RAM rather than registers. Storage for the nonce and block counter, or several nonces and block counters for a multiple-session chip. As above, this storage has minimal size; Salsa20 does not use expanded nonces. Temporary storage used while generating a 512-bit output block. Typical implementations will use 512 flip-flops here. A tiny circuit could instead use 512 bits of RAM. Of course, no storage is required for a large high-throughput low-delay circuit that generates the entire output block combinatorially. 32-bit adders used in generating an output block. Salsa20/20 involves additions per bit of output; Salsa20/8 involves additions per bit of output. There are many options here: a minimum-area circuit using a 32- bit adder 16 times per round (with a simple pattern of RAM access); a circuit performing an entire round combinatorially, with 16 separate 32- bit adders; a 2-combinatorial-round circuit with 32 separate 32-bit adders; a 4-combinatorial-round circuit with 64 separate 32-bit adders; etc. At a lower level, there are many different ASIC adder structures offering various combinations of area and speed. Other gates used in generating an output block and encrypting data. There is some cost here for example, each 32-bit addition is accompanied by a 32-bit xor but Salsa20 does not use expensive operations such as multiplications or accesses to large tables.
8 Wires and other overheads. Salsa20 was designed to allow shorter wires than a typical circuit, potentially saving both space and time, if hardware blocks are placed in Salsa20 s 4 4 pattern. Obviously Salsa20 can achieve reasonable performance in a small circuit, and higher performance in larger circuits. I don t know whether Salsa20/8 is as fast as today s best hardware-oriented ciphers, especially ciphers designed for a lower security level; but it shouldn t be omitted from hardware benchmarks. For applications that need maximum streaming throughput, Salsa20 offers a huge advantage: it can be parallelized across any number of blocks. One can, for example, generate 256 blocks from a single stream in parallel with 256 copies of the Salsa20 hardware, either on a single chip or spread across chips. (This parallelization should also improve price-performance ratio somewhat: one does not need to store 256 copies of the key, for example.) Traditional LFSR-based stream ciphers offer the same feature, but most other stream ciphers don t. References 1. Daniel J. Bernstein, Comparison of 256-bit stream ciphers at the beginning of 2006 (2006). URL: ID eff0eb8eebacda ab97ca48a0. Citations in this paper: 1.
ChaCha, a variant of Salsa20
ChaCha, a variant of Salsa20 Daniel J. Bernstein Department of Mathematics, Statistics, and Computer Science (M/C 249) The University of Illinois at Chicago Chicago, IL 60607 7045 [email protected]
New AES software speed records
New AES software speed records Daniel J. Bernstein and Peter Schwabe 16.12.2008 Indocrypt 2008 The estream project ECRYPT Stream Cipher Project Running from 2004 to 2008 to identify promising new stream
A PPENDIX H RITERIA FOR AES E VALUATION C RITERIA FOR
A PPENDIX H RITERIA FOR AES E VALUATION C RITERIA FOR William Stallings Copyright 20010 H.1 THE ORIGINS OF AES...2 H.2 AES EVALUATION...3 Supplement to Cryptography and Network Security, Fifth Edition
Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards
White Paper Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards By Dr. Wen-Ping Ying, Director of Software Development, February 2002 Introduction Wireless LAN networking allows the
High-speed cryptography and DNSCurve. D. J. Bernstein University of Illinois at Chicago
High-speed cryptography and DNSCurve D. J. Bernstein University of Illinois at Chicago Stealing Internet mail: easy! Given a mail message: Your mail software sends a DNS request, receives a server address,
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
CSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Secret Key Cryptography (I) 1 Introductory Remarks Roadmap Feistel Cipher DES AES Introduction
Failures of secret-key cryptography. D. J. Bernstein University of Illinois at Chicago & Technische Universiteit Eindhoven. http://xkcd.
Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago & Technische Universiteit Eindhoven http://xkcd.com/538/ 2011 Grigg Gutmann: In the past 15 years no one ever lost
A Comparative Study Of Two Symmetric Encryption Algorithms Across Different Platforms.
A Comparative Study Of Two Symmetric Algorithms Across Different Platforms. Dr. S.A.M Rizvi 1,Dr. Syed Zeeshan Hussain 2 and Neeta Wadhwa 3 Deptt. of Computer Science, Jamia Millia Islamia, New Delhi,
The Advanced Encryption Standard (AES)
The Advanced Encryption Standard (AES) Conception - Why A New Cipher? Conception - Why A New Cipher? DES had outlived its usefulness Vulnerabilities were becoming known 56-bit key was too small Too slow
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, J.D. Tygar, Victor Wen, and David Culler Department of Electrical Engineering & Computer Sciences, University of California
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No. # 11 Block Cipher Standards (DES) (Refer Slide
How To Encrypt With A 64 Bit Block Cipher
The Data Encryption Standard (DES) As mentioned earlier there are two main types of cryptography in use today - symmetric or secret key cryptography and asymmetric or public key cryptography. Symmetric
GPU File System Encryption Kartik Kulkarni and Eugene Linkov
GPU File System Encryption Kartik Kulkarni and Eugene Linkov 5/10/2012 SUMMARY. We implemented a file system that encrypts and decrypts files. The implementation uses the AES algorithm computed through
The Advanced Encryption Standard: Four Years On
The Advanced Encryption Standard: Four Years On Matt Robshaw Reader in Information Security Information Security Group Royal Holloway University of London September 21, 2004 The State of the AES 1 The
Cryptography and Network Security
Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 3: Block ciphers and DES Ion Petre Department of IT, Åbo Akademi University January 17, 2012 1 Data Encryption Standard
Cryptographic Algorithms and Key Size Issues. Çetin Kaya Koç Oregon State University, Professor http://islab.oregonstate.edu/koc [email protected].
Cryptographic Algorithms and Key Size Issues Çetin Kaya Koç Oregon State University, Professor http://islab.oregonstate.edu/koc [email protected] Overview Cryptanalysis Challenge Encryption: DES AES Message
Enova X-Wall LX Frequently Asked Questions
Enova X-Wall LX Frequently Asked Questions Q: What is X-Wall LX? A: X-Wall LX is the third generation of Enova real-time hard drive cryptographic gateway ASIC (Application Specific Integrated Circuit)
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
Table of Contents. Bibliografische Informationen http://d-nb.info/996514864. digitalisiert durch
1 Introduction to Cryptography and Data Security 1 1.1 Overview of Cryptology (and This Book) 2 1.2 Symmetric Cryptography 4 1.2.1 Basics 4 1.2.2 Simple Symmetric Encryption: The Substitution Cipher...
High-speed high-security cryptography on ARMs
High-speed high-security cryptography on ARMs Daniel J. Bernstein Research Professor, University of Illinois at Chicago Professor, Cryptographic Implementations, Technische Universiteit Eindhoven Tanja
Implementation of Full -Parallelism AES Encryption and Decryption
Implementation of Full -Parallelism AES Encryption and Decryption M.Anto Merline M.E-Commuication Systems, ECE Department K.Ramakrishnan College of Engineering-Samayapuram, Trichy. Abstract-Advanced Encryption
Chapter 6 CDMA/802.11i
Chapter 6 CDMA/802.11i IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Some material copyright 1996-2012 J.F Kurose and K.W. Ross,
A New 128-bit Key Stream Cipher LEX
A New 128-it Key Stream Cipher LEX Alex Biryukov Katholieke Universiteit Leuven, Dept. ESAT/SCD-COSIC, Kasteelpark Arenerg 10, B 3001 Heverlee, Belgium http://www.esat.kuleuven.ac.e/~airyuko/ Astract.
Network Security. Modes of Operation. Steven M. Bellovin February 3, 2009 1
Modes of Operation Steven M. Bellovin February 3, 2009 1 Using Cryptography As we ve already seen, using cryptography properly is not easy Many pitfalls! Errors in use can lead to very easy attacks You
MAC. SKE in Practice. Lecture 5
MAC. SKE in Practice. Lecture 5 Active Adversary Active Adversary An active adversary can inject messages into the channel Active Adversary An active adversary can inject messages into the channel Eve
SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
Block encryption. CS-4920: Lecture 7 Secret key cryptography. Determining the plaintext ciphertext mapping. CS4920-Lecture 7 4/1/2015
CS-4920: Lecture 7 Secret key cryptography Reading Chapter 3 (pp. 59-75, 92-93) Today s Outcomes Discuss block and key length issues related to secret key cryptography Define several terms related to secret
Tape Drive Data Compression Q & A
Tape Drive Data Compression Q & A Question What is data compression and how does compression work? Data compression permits increased storage capacities by using a mathematical algorithm that reduces redundant
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS Abstract: The Single sign-on (SSO) is a new authentication mechanism that enables a legal user with a single credential
Cryptography and Network Security. Prof. D. Mukhopadhyay. Department of Computer Science and Engineering. Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 12 Block Cipher Standards
ELECTENG702 Advanced Embedded Systems. Improving AES128 software for Altera Nios II processor using custom instructions
Assignment ELECTENG702 Advanced Embedded Systems Improving AES128 software for Altera Nios II processor using custom instructions October 1. 2005 Professor Zoran Salcic by Kilian Foerster 10-8 Claybrook
CS5490/6490: Network Security- Lecture Notes - November 9 th 2015
CS5490/6490: Network Security- Lecture Notes - November 9 th 2015 Wireless LAN security (Reference - Security & Cooperation in Wireless Networks by Buttyan & Hubaux, Cambridge Univ. Press, 2007, Chapter
Reviving smart card analysis
Reviving smart card analysis Christopher Tarnovsky Karsten Nohl [email protected] [email protected] Executive summary Modern smart cards should be analyzed 1. Smart card chips provide the trust base for
Cryptanalysis of Grain using Time / Memory / Data Tradeoffs
Cryptanalysis of Grain using Time / Memory / Data Tradeoffs v1.0 / 2008-02-25 T.E. Bjørstad The Selmer Center, Department of Informatics, University of Bergen, Pb. 7800, N-5020 Bergen, Norway. Email :
The Misuse of RC4 in Microsoft Word and Excel
The Misuse of RC4 in Microsoft Word and Excel Hongjun Wu Institute for Infocomm Research, Singapore [email protected] Abstract. In this report, we point out a serious security flaw in Microsoft
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS)
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS) Ashraf Odeh 1, Shadi R.Masadeh 2, Ahmad Azzazi 3 1 Computer Information Systems Department, Isra University,
1 Data Encryption Algorithm
Date: Monday, September 23, 2002 Prof.: Dr Jean-Yves Chouinard Design of Secure Computer Systems CSI4138/CEG4394 Notes on the Data Encryption Standard (DES) The Data Encryption Standard (DES) has been
One Time Pad Encryption The unbreakable encryption method
One Time Pad Encryption The unbreakable encryption method One Time Pad The unbreakable encryption method One Time Pad encryption is a very simple, yet completely unbreakable cipher method. It has been
SAS Data Set Encryption Options
Technical Paper SAS Data Set Encryption Options SAS product interaction with encrypted data storage Table of Contents Introduction: What Is Encryption?... 1 Test Configuration... 1 Data... 1 Code... 2
Counter Expertise Review on the TNO Security Analysis of the Dutch OV-Chipkaart. OV-Chipkaart Security Issues Tutorial for Non-Expert Readers
Counter Expertise Review on the TNO Security Analysis of the Dutch OV-Chipkaart OV-Chipkaart Security Issues Tutorial for Non-Expert Readers The current debate concerning the OV-Chipkaart security was
18-731 Midterm. Name: Andrew user id:
18-731 Midterm 6 March 2008 Name: Andrew user id: Scores: Problem 0 (10 points): Problem 1 (10 points): Problem 2 (15 points): Problem 3 (10 points): Problem 4 (20 points): Problem 5 (10 points): Problem
Message Authentication
Message Authentication message authentication is concerned with: protecting the integrity of a message validating identity of originator non-repudiation of origin (dispute resolution) will consider the
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security Objectives Overview of IEEE 802.11 wireless security Define vulnerabilities of Open System Authentication,
Parallel AES Encryption with Modified Mix-columns For Many Core Processor Arrays M.S.Arun, V.Saminathan
Parallel AES Encryption with Modified Mix-columns For Many Core Processor Arrays M.S.Arun, V.Saminathan Abstract AES is an encryption algorithm which can be easily implemented on fine grain many core systems.
Ky Vu DeVry University, Atlanta Georgia College of Arts & Science
Ky Vu DeVry University, Atlanta Georgia College of Arts & Science Table of Contents - Objective - Cryptography: An Overview - Symmetric Key - Asymmetric Key - Transparent Key: A Paradigm Shift - Security
6.857 Computer and Network Security Fall Term, 1997 Lecture 4 : 16 September 1997 Lecturer: Ron Rivest Scribe: Michelle Goldberg 1 Conditionally Secure Cryptography Conditionally (or computationally) secure
Let s put together a Manual Processor
Lecture 14 Let s put together a Manual Processor Hardware Lecture 14 Slide 1 The processor Inside every computer there is at least one processor which can take an instruction, some operands and produce
How To Attack A Block Cipher With A Key Key (Dk) And A Key (K) On A 2Dns) On An Ipa (Ipa) On The Ipa 2Ds (Ipb) On Pcode)
Cryptography and Network Security Chapter 6 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 6 Block Cipher Operation Many savages at the present day regard
Wireless Local Area. Network Security
Wireless Local Area Network Security HONORS PROJECT CIS 345/ Section 131 Spring 2005 Mentor: Prof. C.S. Rani The first part of this research paper will answer questions such as: what is wireless, how wireless
The science of encryption: prime numbers and mod n arithmetic
The science of encryption: prime numbers and mod n arithmetic Go check your e-mail. You ll notice that the webpage address starts with https://. The s at the end stands for secure meaning that a process
Lightweight Cryptography From an Engineers Perspective
Lightweight Cryptography From an Engineers Perspective ECC 2007 Acknowledgement Christof Paar A. Bogdanov, L. Knudsen, G. Leander, M. Robshaw, Y. Seurin, C. Vikkelsoe S. Kumar 2 Outline Motivation Hardware
Cryptography & Network Security. Introduction. Chester Rebeiro IIT Madras
Cryptography & Network Security Introduction Chester Rebeiro IIT Madras The Connected World 2 Information Storage 3 Increased Security Breaches 81% more in 2015 http://www.pwc.co.uk/assets/pdf/2015-isbs-executive-summary-02.pdf
HTTPS: Transport-Layer Security (TLS), aka Secure Sockets Layer (SSL)
CSCD27 Computer and Network Security HTTPS: Transport-Layer Security (TLS), aka Secure Sockets Layer (SSL) 11 SSL CSCD27 Computer and Network Security 1 CSCD27F Computer and Network Security 1 TLS (Transport-Layer
EXAM questions for the course TTM4135 - Information Security May 2013. Part 1
EXAM questions for the course TTM4135 - Information Security May 2013 Part 1 This part consists of 5 questions all from one common topic. The number of maximal points for every correctly answered question
SHA3 WHERE WE VE BEEN WHERE WE RE GOING
SHA3 WHERE WE VE BEEN WHERE WE RE GOING Bill Burr May 1, 2013 updated version of John Kelsey s RSA2013 presentation Overview of Talk Where We ve Been: Ancient history 2004 The Competition Where We re Going
CSC474/574 - Information Systems Security: Homework1 Solutions Sketch
CSC474/574 - Information Systems Security: Homework1 Solutions Sketch February 20, 2005 1. Consider slide 12 in the handout for topic 2.2. Prove that the decryption process of a one-round Feistel cipher
Secret File Sharing Techniques using AES algorithm. C. Navya Latha 200201066 Garima Agarwal 200305032 Anila Kumar GVN 200305002
Secret File Sharing Techniques using AES algorithm C. Navya Latha 200201066 Garima Agarwal 200305032 Anila Kumar GVN 200305002 1. Feature Overview The Advanced Encryption Standard (AES) feature adds support
AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES
HYBRID RSA-AES ENCRYPTION FOR WEB SERVICES AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES Kalyani Ganesh
Authentication and Security in Mobile Phones
Authentication and Security in Mobile Phones Greg Rose QUALCOMM Australia [email protected] ABSTRACT Mobile telephone systems have a checkered reputation regarding security and authentication features after
How To Understand And Understand The History Of Cryptography
CSE497b Introduction to Computer and Network Security - Spring 2007 - Professors Jaeger Lecture 5 - Cryptography CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/
Keywords Cloud Computing, CRC, RC4, RSA, Windows Microsoft Azure
Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Cloud Computing
Keywords Web Service, security, DES, cryptography.
Volume 3, Issue 10, October 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Provide the
Performance evaluation of wireless networks speed depending on the encryption
Annales Mathematicae et Informaticae 42 (2013) pp. 45 55 http://ami.ektf.hu Performance evaluation of wireless networks speed depending on the encryption Tamás Krausz, János Sztrik Faculty of Informatics,
RC6. Marcel Felipe Weschenfelder
RC6 Marcel Felipe Weschenfelder Introduction Operations Algorithm Performance Crypto analyse Highlight/lowlight Conclusion References Agenda RC6 Introduction Designed by: Ron Rivest, Matt Robshaw, Ray
AStudyofEncryptionAlgorithmsAESDESandRSAforSecurity
Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 15 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
SIDN Server Measurements
SIDN Server Measurements Yuri Schaeffer 1, NLnet Labs NLnet Labs document 2010-003 July 19, 2010 1 Introduction For future capacity planning SIDN would like to have an insight on the required resources
Password-based encryption in ZIP files
Password-based encryption in ZIP files Dmitri Gabbasov December 15, 2015 Abstract In this report we give an overview of the encryption schemes used in the ZIP file format. We first give an overview of
GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte. Yehuda Lindell Bar-Ilan University
GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte Shay Gueron Haifa Univ. and Intel Yehuda Lindell Bar-Ilan University Appeared at ACM CCS 2015 How to Encrypt with
CRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
Network Security. Chapter 3 Symmetric Cryptography. Symmetric Encryption. Modes of Encryption. Symmetric Block Ciphers - Modes of Encryption ECB (1)
Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Network Security Chapter 3 Symmetric Cryptography General Description Modes of ion Data ion Standard (DES)
The implementation and performance/cost/power analysis of the network security accelerator on SoC applications
The implementation and performance/cost/power analysis of the network security accelerator on SoC applications Ruei-Ting Gu [email protected] Kuo-Huang Chung [email protected]
PIONEER RESEARCH & DEVELOPMENT GROUP
SURVEY ON RAID Aishwarya Airen 1, Aarsh Pandit 2, Anshul Sogani 3 1,2,3 A.I.T.R, Indore. Abstract RAID stands for Redundant Array of Independent Disk that is a concept which provides an efficient way for
SSL A discussion of the Secure Socket Layer
www.harmonysecurity.com [email protected] SSL A discussion of the Secure Socket Layer By Stephen Fewer Contents 1 Introduction 2 2 Encryption Techniques 3 3 Protocol Overview 3 3.1 The SSL Record
Summer Student Project Report
Summer Student Project Report Dimitris Kalimeris National and Kapodistrian University of Athens June September 2014 Abstract This report will outline two projects that were done as part of a three months
Online Backup by Mozy. Common Questions
Online Backup by Mozy Common Questions Document Revision Date: June 29, 2012 Online Backup by Mozy Common Questions 1 What is Online Backup by Mozy? Online Backup by Mozy is a secure online data backup
The mathematics of RAID-6
The mathematics of RAID-6 H. Peter Anvin 1 December 2004 RAID-6 supports losing any two drives. The way this is done is by computing two syndromes, generally referred P and Q. 1 A quick
Technology Update White Paper. High Speed RAID 6. Powered by Custom ASIC Parity Chips
Technology Update White Paper High Speed RAID 6 Powered by Custom ASIC Parity Chips High Speed RAID 6 Powered by Custom ASIC Parity Chips Why High Speed RAID 6? Winchester Systems has developed High Speed
ELECTRONIC COMMERCE WORKED EXAMPLES
MODULE 13 ELECTRONIC COMMERCE WORKED EXAMPLES 13.1 Explain B2B e-commerce using an example of a book distributor who stocks a large number of books, which he distributes via a large network of book sellers.
Zeus Traffic Manager VA Performance on vsphere 4
White Paper Zeus Traffic Manager VA Performance on vsphere 4 Zeus. Why wait Contents Introduction... 2 Test Setup... 2 System Under Test... 3 Hardware... 3 Native Software... 3 Virtual Appliance... 3 Benchmarks...
Security in IEEE 802.11 WLANs
Security in IEEE 802.11 WLANs 1 IEEE 802.11 Architecture Extended Service Set (ESS) Distribution System LAN Segment AP 3 AP 1 AP 2 MS MS Basic Service Set (BSS) Courtesy: Prashant Krishnamurthy, Univ Pittsburgh
Chapter 8. Network Security
Chapter 8 Network Security Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic Principles Need for Security Some people who
Cryptography & Network-Security: Implementations in Hardware
Kris Gaj joined ECE GMU in Fall 1998 Cryptography & Network-Security: Implementations in Hardware http://ece.gmu.edu/crypto-text.htm 6 Ph.D. Students Pawel Chodowiec Charikleia Zouridaki Chang Shu Sashisu
Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives
Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives Main Line / Date / Etc. June May 2008 2nd Line 80-11-01583 xx-xx-xxxx Revision 1.0 Tagline Here Table of Contents
FPGA IMPLEMENTATION OF AES ALGORITHM
FPGA IMPLEMENTATION OF AES ALGORITHM S.A. Annadate 1, Nitin Ram Chavan 2 1,2 Electronics and Telecommunication Dept, J N Collage of engineering Aurangabad, (India) ABSTRACT Advanced Encryption Standard
802.11 Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi [email protected]
802.11 Security (WEP, WPA\WPA2) 19/05/2009 Giulio Rossetti Unipi [email protected] 802.11 Security Standard: WEP Wired Equivalent Privacy The packets are encrypted, before sent, with a Secret Key
What is a Firewall? Computer Security. Firewalls. What is a Firewall? What is a Firewall?
What is a Firewall? Computer Security Firewalls fire wall 1 : a wall constructed to prevent the spread of fire 2 usually firewall : a computer or computer software that prevents unauthorized access to
StACC: St Andrews Cloud Computing Co laboratory. A Performance Comparison of Clouds. Amazon EC2 and Ubuntu Enterprise Cloud
StACC: St Andrews Cloud Computing Co laboratory A Performance Comparison of Clouds Amazon EC2 and Ubuntu Enterprise Cloud Jonathan S Ward StACC (pronounced like 'stack') is a research collaboration launched
Lecture 4 Data Encryption Standard (DES)
Lecture 4 Data Encryption Standard (DES) 1 Block Ciphers Map n-bit plaintext blocks to n-bit ciphertext blocks (n = block length). For n-bit plaintext and ciphertext blocks and a fixed key, the encryption
Network Security - ISA 656 Email Security
Network Security - ISA 656 Angelos Stavrou November 13, 2007 The Usual Questions The Usual Questions Assets What are we trying to protect? Against whom? 2 / 33 Assets The Usual Questions Assets Confidentiality
CSci 530 Midterm Exam. Fall 2012
CSci 530 Midterm Exam Fall 2012 Instructions: Show all work. No electronic devices are allowed. This exam is open book, open notes. You have 100 minutes to complete the exam. Please prepare your answers
