Fault attack on the DVB Common Scrambling Algorithm
|
|
|
- Merilyn Ellis
- 10 years ago
- Views:
Transcription
1 Fault attack on the DVB Common Scrambling Algorithm Kai Wirt Technical University Darmstadt Department of Computer Science Darmstadt, Germany Abstract. The Common Scrambling Algorithm (CSA) is used to encrypt streams of video data in the Digital Video Broadcasting (DVB) system. The algorithm uses a combination of a stream and a block, apparently for a larger security margin. However these two algorithms share a common key. In this paper we present a fault attack on the block which can be launched without regarding the stream part. This attack allows us to reconstruct the common key and thus breaks the complete Algorithm. Keywords: block, cryptanalysis, fault attack, dvb, paytv 1 Introduction The DVB Common Scrambling Algorithm is used to secure MPEG-2 transport streams. These are used for example for digitally transmitted Pay-TV in Europe. The algorithm was specified by ETSI and adopted by the DVB consortium in May However the exact origin and date of the design is unclear. Interestingly, licensees were not allowed to implement the algorithm in software and it was only available under a Non-Disclosure Agreement from an ETSI custodian. As was pointed out, this was due to security reasons. Only very little information like an ETSI Technical Report [Eur96] and patent applications [Bew98], [WAJ98] were available to the public until In the fall of 2002 a Windows program called FreeDec which implemented the CSA in software was released and quickly reverse engineered. The results were published on a web site [Pse03] and details on the algorithm became available to the public. For keying the CSA, so called control words are used. These control words are generated from encrypted control messages contained in the DVB transport stream by a conditional access mechanism. Examples for these mechanisms are Irdeto, Betacrypt, Nagravision, Cryptoworks and many others. They vary between broadcasters and are usually implemented on a smart card which is required to view encrypted pay tv transmissions. The actual key for the CSA is called common key and is usually changed every seconds. The great relevance of CSA lies in the fact, that every encrypted
2 digital Pay-TV transmission in Europe is secured using CSA. A practical break of CSA would thus affect all broadcasters which would have to exchange the hardware used to decrypt the transport streams. The scrambling algorithm is a combination of two cryptographic primitives: a 64-bit block and a stream which both are keyed with the same common key. Thus a key recovery attack on one of the two primitives would break the complete algorithm. In this paper we present a fault attack on the block part which allows the recovery of the key. The rest of this paper is organized as follows. In Section 2 we present the notation used in this paper, section 3 gives a short overview over side-channel attacks and sections 4 and 5 describe CSA resp. the block part. Our Attack is presented in section 6 and final remarks are given in section 7. Tables and figures are combined in an appendix. 2 Definitions In the rest of this paper we use the following notation: K the common key. A 64 bit key used for both the stream and the block k i denotes the i-th bit of K K E denotes the running key which is derived through the key schedule of the block s i denotes the value held in register i s j i is the value held in register i at round j p i, c i denote a plain text resp. text byte x is the faulted value x 3 Side-Channel attacks Conventional attacks try to find weaknesses in a construction itself. There are various methods to do so, like observing the distribution of texts or attacking the structure of a with algebraic methods. In contrast, side channel attacks are used to find weaknesses in an actual implementation of a system. They are more powerful than conventional attacks, because of the fact, that the attacker can get additional information by observing side channels like the time required to encrypt certain plaintexts or the power usage of the encryption device. One certain type of side channel attacks are so called fault attacks, where the attacker introduces errors in the encryption or decryption process. The attacker then gains informations on the Key by observing the difference between the
3 actual and the faulty result. There are various results showing, that these attacks are very powerful and feasible like [BDJ97] and [ABF + 02]. Fault attacks are often combined with observations on other side channels, because the faults have to be introduced at specific points in the encryption/ decryption process or at a specific register value. To simplify things one specifies what values can be affected when by the attacker. This type of side channel attacks was first applied to symmetric crypto systems by Eli Biham and Adi Shamir in [BS97]. Our attack is a variant using a slightly different setting, than in [BS97] and [BDJ97]. In the setting we investigate in this paper, the attacker is capable of changing the value of a specific register to a random value in one specific round. However, we will show, that if the attacker is only able to introduce a random error, where the exact error location is evenly distributed over the whole decryption process (i.e. the setting used by Boneh et. al) our attack still works. One possibility to inject such errors is to do it by laser. It is possible to target at a specific part of the device performing the cryptographic operations and thus affect for example a certain register. We believe that changing the value stored in such a register to a random value is possible. Moreover we believe that using short flashes of the laser and precise equipment it is possible to do so in a certain round. We therefor believe, that the presented attack is an actual threat to the common scrambling algorithm. An overview and further references on how to realize fault attacks can be found in [BS03] where the first fault attack on the Advanced Encryption Standard is given. 4 Overview over CSA The common scrambling algorithm can be seen as a cascade of two different cryptographic primitives, namely a block and a stream. Both s use the same 64-bit key K, which is called the common key. In this section we will describe how the block and the stream are combined, whereas the next section is focussing on the block. In the encryption process a m-byte packet is first divided into blocks (DB i ) of 8 bytes each. It is possible that the length of the packet is not a multiple of 8 bytes. If so, the last block is called residue. The sequence of 8-byte blocks is encrypted in reverse order with the block in CBC mode. The initialization vector is always equal to zero. Note, that the residue is left untouched in this encryption step. The last output of the chain IB 0 is then used as a nonce for the stream. The first m 8 bytes of keystream generated by the stream are XORed to the encrypted blocks (IB i ) i 1 followed by the residue to produce the scrambled blocks SB i. Figure 1 on page 8 depicts the descrambling process. Note, that since we are interested in introducing errors in the decryption process of the block and in comparing the actual decrypted output with
4 the faulty output we can completly ignore the chaining mode and the stream part taking only the decryption process of the last block application into account. For more details on the overall design and an analysis of the stream as well as an overview of properties of the block we refer to [WW04]. 5 The DVB CSA block CSA uses an iterated block that operates bytewise on 64-bit blocks of data. In each round of the the same round transformation is applied to the internal state. We will denote this transformation by φ. φ takes the 8-byte vector representing the current internal state, along with a single byte of the running key, to produce the next internal state. This round transformation is applied 56 times. The key schedule Let ρ be the bit permutation on 64-bit strings as defined in table 2 on page 8. The 448-bit running key K E = (k E 0,..., k E 447) is recursively computed as follows: k E 0,...,63 = k 0,...,63 k64i,...,64i+63 E = ρ(k64(i 1),...,64i 1 E ) 0x0i0i0i0i0i0i0i0i for all 1 i 6 where the expression 0x0i0i0i0i0i0i0i0i is to be interpreted as a hexadecimal constant. The round function The round transformation uses two non-linear permutations on the set of all byte values π and π. These permutations are related by another permutation σ, i.e. π = σ π. The bit permutation σ maps bit 0 to 1, bit 1 to 7, bit 2 to 5, bit 3 to 4, bit 4 to 2, bit 5 to 6, bit 6 to 0 and bit 7 to 3. See table 4 on page 9 for the actual values described by π. Let S = (s 0,..., s 7 ) be the vector of bytes representing the internal state of the block in an arbitrary round. The function φ taking the internal state S from round i to round i + 1 is given by φ(s 0,..., s 7, k) = (s 1, s 2 s 0, s 3 s 0, s 4 s 0, s 5, s 6 π (k s 7 ), s 7, s 0 π(k s 7 )). The inverse round transformation for the decryption of a message block is then φ 1 (s 0,..., s 7, k) = (s 7 π(s 6 k), s 0, s 7 s 1 π(s 6 k), s 7 s 2 π(s 6 k), s 7 s 3 π(s 6 k), s 4, s 5 π (s 6 k), s 6 )
5 Encryption/Decryption A plaintext P = (p 0,..., p 7 ) is encrypted according to S 0 = P S r = φ(s r 1, (k 8r,..., k 8r+7 )) for all 1 r 56 C = S 56 which yields the text C = (c 0,..., c 7 ). For decrypting this text the inverse round transformation is used and therefor the following operations have to be carried out: S 0 = C S r = φ 1 (S r 1, (k 448 8r,..., k 455 8r )) for all 1 r 56 P = S 56 6 Fault attack on the block Our attack consists of two steps which we will describe in this section. The first step is a fault attack on the decryption of the last block from the block part of CSA which yields the last eight round keys i.e. the bits k E k E 447. The second step is the reconstruction of the common key K = k E 0... k E 63 from these keybits. Note, that since we are only interested in the decryption of the last block from the block part the stream and the chaining mode used with the block are irrelevant as pointed out before. 6.1 Step 1 The attacker starts by introducing a random error in the last round of the decryption process in s 55 6 which changes this value to s Since these two values appear unchanged in the decrypted plaintext the attacker can calculate s 55 6 = s 56 7 = p 7 s 55 6 = s 56 7 = p 7 g(k ) E := π(s 55 6 k ) E π(s 55 6 k ) E = s 56 0 s 56 0 = p 0 p 0 from the faulted and the actual output. Now we verify for every possible round key k if g(k ) = g(k E ). Table 1 on the next page shows, how many possible round keys are expected to fulfill this equation. As we can see, we can expect that the number of possible round keys is approximately two for every introduced error. Therefor if we repeat the attack for two or three different errors, the round key can be uniquely determined.
6 After recovery of the round keys for the rounds i the attacker introduces an error at round i 1 of the decryption process and uses the known round keys to perform i rounds of the encryption process with the plaintext and the faulted plaintext. Doing so, the attacker gets the values s i 1 6 = s i 7 s i 1 6 = s i 7 g(k8(i 1) E... ke 8(i 1)+7 ) := π(si 1 6 k8(i 1) E... ke 8(i 1)+7 ) π(s i 1 6 k E 8(i 1)... ke 8(i 1)+7 ) = si 0 s i 0 He can thus retrieve the keybits k8(i 1) E... ke 8(i 1)+7 as pointed out above and therefor iteratively recover the required 8 round keys. To perform this basic version of our attack, the attacker has to introduce approximately two errors per round key, that sums up to a total of 16 errors. Additionally to uniquely determine one round key the attacker has to evaluate g(k ) for all 256 different values of k for every introduced error. Therefor the overall complexity is 16 error introductions and = 4096 evaluations of g. Another possibility to recover the round keys is, that the attacker takes every possible key retrieved through the equation g(k ) = g(k8(i 1) E... ke 8(i 1)+7 ) into account. With this method, the attacker does not have to repeat the error introduction. From table 1 we conclude, that the attack is only little more expensive. The wrong round keys can then be either discovered in the second step of the attack, or by testing all calculated common keys for the correct one. In this version the number of required error introductions decreases to 8. However the attacker now has to evalute the g-function approximately 7 i=0 2i 256 = times which leaves him with 256 possible keys. Table 1. Probability for the number of round keys for the attack Possible number of keys > 8 Probability Step 2 The second step of the attack is the recovery of the common key from the key bits k E k E 447. This is a straightforward task, because of the simple key schedule. The attacker can reconstruct the unknown bits according to k E 64(i 1),...,64i 1 = ρ 1 (k E 64i,...,64i+63 0x0i0i0i0i0i0i0i0i) for all 6 i 1 where ρ 1 is the inverse key bit permutation which is given in Table 3 on page 9 and the value 0x0i0i0i0i0i0i0i0i has to be interpreted as a hexadecimal constant.
7 The common key K is then given by K = k E Since the stream and the block parts of CSA share the common key this attack breaks the complete CSA - Cipher. 6.3 Improvements The presented attack allows a time-memory tradeoff. It is possible to calculate a table which contains all the possible round keys for every combination of s 6, s 6 and g(k). This table uses approximately = 2 25 bytes. Using this improvement the attack requires only one table lookup per introduced error, resp. per possible round key in the above scenarios. One additional possibility is, that the adversary does not calculate all 8 round keys. He can also retrieve only some of the last round keys and then perform an exhaustive search on the missing bits. Since 64 bits are enough to reconstruct the common key the costs of an exhaustive search can be reduced to j, where j is the number of round keys calculated. Clearly, this variant requires 2 j introduced errors and j evaluations of the g-function in the basic setting. 6.4 Evenly distributed errors In the case that the attacker is not able to introduce errors at a specific register at a certain round, but only an error evenly distributed over the whole decryption process, i.e. the error can affect either register at either round, the presented attack still works. This is due to the fact, that the attacker can determine if the error has affected the desired value by comparing the values s i 7 and s i 7. If these values are not equal and s i 1 = s i 1, s i 5 = s i 5 and s i 2 s i 2 = s i 3 s i 3 = s i 4 s i 4 = s i 0 s i 0 the correct register and the correct round have been modified. Assuming that the errors are evenly distributed this should occur every 56 8 tries. Therefor the costs for the attack in terms of the number of introduced errors only increase by a constant factor. One further improvement would be, that the attacker records all the faulted outputs, even if the wrong round and/or register have been altered. Before introducing an error targeting the next round key, the attacker then checks if one of the recorded values is a modification of the correct register in this round. With this method the number of required faults can be decreased. 7 Conclusion In this paper we presented a fault attack on the DVB common scrambling algorithm. Although the overall design, especially the combination of the stream and
8 the block makes simple attacks difficult [WW04] it is possible to easily break the using a fault attack. This again proves, that it is important to include countermeasures against fault attacks like the verification of the result of the encryption respectively decryption process in an implementation of a cryptographic system. Additional countermeasures against the presented attack should include different keys for the stream and the block part, a nonlinear key schedule and modifications on the round function of the block to make the recovery of the round key more difficult. A Appendix Header SB 0 SB 1 SB 2 SB 3... SB n-1 Residue Stream init CB 1 CB 2 CB 3 CB n-1 CB n IB 0 IB 1 IB 2 IB 3... IB n-1 IV Block decry ption Block decry ption Block decry ption Block decry ption Block decry ption DB 0 DB 1 DB 2... DB n-2 DB n-1 Residue Fig. 1. Combination of block- and stream Table 2. Key bit permutation i ρ(i) i ρ(i) i ρ(i) i ρ(i)
9 Table 3. Inverse key bit permutation i ρ(i) i ρ(i) i ρ(i) i ρ(i) Table 4. S-Box of the block. Output arranged row-wise; lower nibble on horizonal, upper on vertical 0x00 0x01 0x02 0x03 0x04 0x05 0x06 0x07 0x08 0x09 0x0A 0x0B 0x0C 0x0D 0x0E 0x0F 0x00 0x3A 0xEA 0x68 0xFE 0x33 0xE9 0x88 0x1A 0x83 0xCF 0xE1 0x7F 0xBA 0xE2 0x38 0x12 0x01 0xE8 0x27 0x61 0x95 0x0C 0x36 0xE5 0x70 0xA2 0x06 0x82 0x7C 0x17 0xA3 0x26 0x49 0x02 0xBE 0x7A 0x6D 0x47 0xC1 0x51 0x8F 0xF3 0xCC 0x5B 0x67 0xBD 0xCD 0x18 0x08 0xC9 0x03 0xFF 0x69 0xEF 0x03 0x4E 0x48 0x4A 0x84 0x3F 0xB4 0x10 0x04 0xDC 0xF5 0x5C 0xC6 0x04 0x16 0xAB 0xAC 0x4C 0xF1 0x6A 0x2F 0x3C 0x3B 0xD4 0xD5 0x94 0xD0 0xC4 0x63 0x62 0x05 0x71 0xA1 0xF9 0x4F 0x2E 0xAA 0xC5 0x56 0xE3 0x39 0x93 0xCE 0x65 0x64 0xE4 0x58 0x06 0x6C 0x19 0x42 0x79 0xDD 0xEE 0x96 0xF6 0x8A 0xEC 0x1E 0x85 0x53 0x45 0xDE 0xBB 0x07 0x7E 0x0A 0x9A 0x13 0x2A 0x9D 0xC2 0x5E 0x5A 0x1F 0x32 0x35 0x9C 0xA8 0x73 0x30 0x08 0x29 0x3D 0xE7 0x92 0x87 0x1B 0x2B 0x4B 0xA5 0x57 0x97 0x40 0x15 0xE6 0xBC 0x0E 0x09 0xEB 0xC3 0x34 0x2D 0xB8 0x44 0x25 0xA4 0x1C 0xC7 0x23 0xED 0x90 0x6E 0x50 0x00 0x0A 0x99 0x9E 0x4D 0xD9 0xDA 0x8D 0x6F 0x5F 0x3E 0xD7 0x21 0x74 0x86 0xDF 0x6B 0x05 0x0B 0x8E 0x5D 0x37 0x11 0xD2 0x28 0x75 0xD6 0xA7 0x77 0x24 0xBF 0xF0 0xB0 0x02 0xB7 0x0C 0xF8 0xFC 0x81 0x09 0xB1 0x01 0x76 0x91 0x7D 0x0F 0xC8 0xA0 0xF2 0xCB 0x78 0x60 0x0D 0xD1 0xF7 0xE0 0xB5 0x98 0x22 0xB3 0x20 0x1D 0xA6 0xDB 0x7B 0x59 0x9F 0xAE 0x31 0x0E 0xFB 0xD3 0xB6 0xCA 0x43 0x72 0x07 0xF4 0xD8 0x41 0x14 0x55 0x0D 0x54 0x8B 0xB9 0x0F 0xAD 0x46 0x0B 0xAF 0x80 0x52 0x2C 0xFA 0x8C 0x89 0x66 0xFD 0xB2 0xA9 0x9B 0xC0
10 References [ABF + 02] Christian Aumueller, Peter Bier, Wieland Fischer, Peter Hofreiter, and Jean-Pierre Seifert. Fault attacks on rsa with crt: Concrete results and practical countermeasures. In B. Kaliski, editor, Cryptographic Hardware and Embedded Systems CHES 2002, volume 2523 of Lecture Notes in Computer Science, pages Springer-Verlag, [BDJ97] Dan Boneh, Richard A. DeMillo, and Richard J.Lipton. On the importance of checking cryptographic protocols for faults. In W. Furny, editor, Advances in Cryptology Eurocrypt 1997, volume 1233 of Lecture Notes in Computer Science, pages Springer-Verlag, [Bew98] Simon Bewick. Descrambling DVB data according to ETSI common scrambling specification. UK Patent Applications GB A / GB A, [BS97] Eli Biham and Adi Shamir. Differential fault analysis of secret key cryptosystems. In B. Kaliski, editor, Advances in Cryptology Crypto 1997, volume 1294 of Lecture Notes in Computer Science, pages Springer-Verlag, [BS03] Johannes Bloemer and Jean-Pierre Seifert. Fault based cryptanalysis of the advanced encryption standard (aes). In R. Wright, editor, Financial Cryptography, volume 2742 of Lecture Notes in Computer Science, pages Springer-Verlag, [Eur96] European Telecommunications Standards Institute. ETSI Technical Report 289: Support for use of scrambling and Conditional Access (CA) within digital broadcasting systems, [Pse03] Pseudononymous authors. CSA known facts and speculations, [WAJ98] Davies Donald Watts, Rix Simon Paul Ashley, and Kuehn Gideon Jacobus. System and apparatus for blockwise encryption and decryption of data. US Patent Application US , [WW04] Ralf-Phillip Weinmann and Kai Wirt. Analysis of the dvb common scrambling algorithm. In Eighth IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, CMS Proceedings. Kluwer Academic Publishers, 2004.
On the Security of Digital Video Broadcast Encryption
On the Security of Digital Video Broadcast Encryption Markus Diett October 26, 2007 Diploma Thesis Ruhr-Universität Bochum Chair for Communication Security (COSY) Prof. Dr.-Ing. Christof Paar Dipl.-Inf.
The Misuse of RC4 in Microsoft Word and Excel
The Misuse of RC4 in Microsoft Word and Excel Hongjun Wu Institute for Infocomm Research, Singapore [email protected] Abstract. In this report, we point out a serious security flaw in Microsoft
TCG Algorithm Registry. Family 2.0" Level 00 Revision 01.15. April 17, 2014. Published. Contact: [email protected].
Family 2.0" Level 00 Revision 01.15 April 17, 2014 Published Contact: [email protected] TCG TCG Published Copyright TCG 2014 Disclaimers, Notices, and License Terms THIS SPECIFICATION IS
Soft-Starter SSW-06 V1.6X
Motors Energy Automation Coatings Soft-Starter SSW-06 V1.6X Serial Communication Manual Language: English Document: 0899.5731 / 04 Serial Communication Manual Series: SSW-06 V1.6X Language: English Document
Security of EnOcean Radio Networks
V1.9 / Page 1 / 37 V1.1 Content 1... 6 1.1 Terms & Abbreviations... 6 2 Introduction... 6 3 Scenarios... 6 3.1 Attacker scenarios... 7 3.2 System Architecture... 10 4 Specification... 10 4.1 Security for
CTNET Field Protocol Specification November 19, 1997 DRAFT
CTNET Field Protocol Specification November 19, 1997 DRAFT Introduction Version 1.0 of CTNET will support the AB3418 protocol for communication to field controllers. AB3418 is a point-topoint protocol
1 Data Encryption Algorithm
Date: Monday, September 23, 2002 Prof.: Dr Jean-Yves Chouinard Design of Secure Computer Systems CSI4138/CEG4394 Notes on the Data Encryption Standard (DES) The Data Encryption Standard (DES) has been
CMUX User Guide 30268ST10299A Rev. 3 19/01/09
This document is referred to the following products: APPLICABILITY TABLE PRODUCT PART NUMBER (1) GT864-QUAD 4990150069 GT864-PY 4990150070 GM862-GPS GM862-QUAD-PY GM862-QUAD GC864-QUAD GC864-PY GC864-QUAD-C2
CS 758: Cryptography / Network Security
CS 758: Cryptography / Network Security offered in the Fall Semester, 2003, by Doug Stinson my office: DC 3122 my email address: [email protected] my web page: http://cacr.math.uwaterloo.ca/~dstinson/index.html
How To Encrypt With A 64 Bit Block Cipher
The Data Encryption Standard (DES) As mentioned earlier there are two main types of cryptography in use today - symmetric or secret key cryptography and asymmetric or public key cryptography. Symmetric
Network Security. Chapter 3 Symmetric Cryptography. Symmetric Encryption. Modes of Encryption. Symmetric Block Ciphers - Modes of Encryption ECB (1)
Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Network Security Chapter 3 Symmetric Cryptography General Description Modes of ion Data ion Standard (DES)
Cryptography and Network Security
Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 3: Block ciphers and DES Ion Petre Department of IT, Åbo Akademi University January 17, 2012 1 Data Encryption Standard
Counter Expertise Review on the TNO Security Analysis of the Dutch OV-Chipkaart. OV-Chipkaart Security Issues Tutorial for Non-Expert Readers
Counter Expertise Review on the TNO Security Analysis of the Dutch OV-Chipkaart OV-Chipkaart Security Issues Tutorial for Non-Expert Readers The current debate concerning the OV-Chipkaart security was
APC APPLICATION NOTE #156
#156 StruxureWare Data Center Expert v7.2.0 Building Management System Integration By Kevin Kosko Abstract Building Management Systems (BMS) are implemented in a building's infrastructure to collect data
SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES
www.arpapress.com/volumes/vol8issue1/ijrras_8_1_10.pdf SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES Malek Jakob Kakish Amman Arab University, Department of Computer Information Systems, P.O.Box 2234,
Error oracle attacks and CBC encryption. Chris Mitchell ISG, RHUL http://www.isg.rhul.ac.uk/~cjm
Error oracle attacks and CBC encryption Chris Mitchell ISG, RHUL http://www.isg.rhul.ac.uk/~cjm Agenda 1. Introduction 2. CBC mode 3. Error oracles 4. Example 1 5. Example 2 6. Example 3 7. Stream ciphers
6.857 Computer and Network Security Fall Term, 1997 Lecture 4 : 16 September 1997 Lecturer: Ron Rivest Scribe: Michelle Goldberg 1 Conditionally Secure Cryptography Conditionally (or computationally) secure
Lecture Note 8 ATTACKS ON CRYPTOSYSTEMS I. Sourav Mukhopadhyay
Lecture Note 8 ATTACKS ON CRYPTOSYSTEMS I Sourav Mukhopadhyay Cryptography and Network Security - MA61027 Attacks on Cryptosystems Up to this point, we have mainly seen how ciphers are implemented. We
Side Channel Analysis and Embedded Systems Impact and Countermeasures
Side Channel Analysis and Embedded Systems Impact and Countermeasures Job de Haas Agenda Advances in Embedded Systems Security From USB stick to game console Current attacks Cryptographic devices Side
CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives
CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash
CSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Secret Key Cryptography (I) 1 Introductory Remarks Roadmap Feistel Cipher DES AES Introduction
Network Configuration Example
Network Configuration Example OSPF Version 3 for IPv6 Feature Guide Published: 2014-01-10 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net
Secret File Sharing Techniques using AES algorithm. C. Navya Latha 200201066 Garima Agarwal 200305032 Anila Kumar GVN 200305002
Secret File Sharing Techniques using AES algorithm C. Navya Latha 200201066 Garima Agarwal 200305032 Anila Kumar GVN 200305002 1. Feature Overview The Advanced Encryption Standard (AES) feature adds support
Brunata Optuna W (171)
Brunata Optuna W (171) Communication description Edition 1.1 UK-QB101414 / 26.02.2013 Brunata a/s is a Danish owned company. We have more than 90 years of experience within developing and producing meters,
802.11 Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi [email protected]
802.11 Security (WEP, WPA\WPA2) 19/05/2009 Giulio Rossetti Unipi [email protected] 802.11 Security Standard: WEP Wired Equivalent Privacy The packets are encrypted, before sent, with a Secret Key
How To Understand And Understand The History Of Cryptography
CSE497b Introduction to Computer and Network Security - Spring 2007 - Professors Jaeger Lecture 5 - Cryptography CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/
Network Security Technology Network Management
COMPUTER NETWORKS Network Security Technology Network Management Source Encryption E(K,P) Decryption D(K,C) Destination The author of these slides is Dr. Mark Pullen of George Mason University. Permission
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key
Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key Julia Juremi Ramlan Mahmod Salasiah Sulaiman Jazrin Ramli Faculty of Computer Science and Information Technology, Universiti Putra
Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur
Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Module No. # 01 Lecture No. # 05 Classic Cryptosystems (Refer Slide Time: 00:42)
Properties of Secure Network Communication
Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able to understand the contents of the transmitted message. Because eavesdroppers may intercept the message,
Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the
Ky Vu DeVry University, Atlanta Georgia College of Arts & Science
Ky Vu DeVry University, Atlanta Georgia College of Arts & Science Table of Contents - Objective - Cryptography: An Overview - Symmetric Key - Asymmetric Key - Transparent Key: A Paradigm Shift - Security
Developing and Investigation of a New Technique Combining Message Authentication and Encryption
Developing and Investigation of a New Technique Combining Message Authentication and Encryption Eyas El-Qawasmeh and Saleem Masadeh Computer Science Dept. Jordan University for Science and Technology P.O.
Application of cube attack to block and stream ciphers
Application of cube attack to block and stream ciphers Janusz Szmidt joint work with Piotr Mroczkowski Military University of Technology Military Telecommunication Institute Poland 23 czerwca 2009 1. Papers
Cryptography and Network Security. Prof. D. Mukhopadhyay. Department of Computer Science and Engineering. Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 12 Block Cipher Standards
On the Key Schedule Strength of PRESENT
On the Key Schedule Strength of PRESENT Julio Cesar Hernandez-Castro 1, Pedro Peris-Lopez 2 Jean-Philippe Aumasson 3 1 School of Computing, Portsmouth University, UK 2 Information Security & Privacy Lab,
WINTER SCHOOL ON COMPUTER SECURITY. Prof. Eli Biham
WINTR SCHOOL ON COMPUTR SCURITY Prof. li Biham Computer Science Department Technion, Haifa 3200003, Israel January 27, 2014 c li Biham c li Biham - January 27, 2014 1 Cryptanalysis of Modes of Operation
Introduction. Where Is The Threat? Encryption Methods for Protecting Data. BOSaNOVA, Inc. Phone: 866-865-5250 Email: [email protected] Web: www.theq3.
Introduction Within the last ten years, there has been a vast increase in the accumulation and communication of digital computer data in both the private and public sectors. Much of this information has
CPSC 467b: Cryptography and Computer Security
CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 1 January 9, 2012 CPSC 467b, Lecture 1 1/22 Course Overview Symmetric Cryptography CPSC 467b, Lecture 1 2/22 Course Overview CPSC
Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code
Command Param1 Param2 Return1 Return2 Description. 0xE9 0..0x7F (id) speed pos_high pos_low Set servo #id speed & read position
set Description 0..0x7F (id) Set servo #id target position 0xE1 Read EEPROM 0xE2 Write EEPROM 0xE3 Read memory 0xE4 Write memory 0xE5 Read position 0xE6 Set target position 0xE7 version id Read version
Cryptographic hash functions and MACs Solved Exercises for Cryptographic Hash Functions and MACs
Cryptographic hash functions and MACs Solved Exercises for Cryptographic Hash Functions and MACs Enes Pasalic University of Primorska Koper, 2014 Contents 1 Preface 3 2 Problems 4 2 1 Preface This is a
Block encryption. CS-4920: Lecture 7 Secret key cryptography. Determining the plaintext ciphertext mapping. CS4920-Lecture 7 4/1/2015
CS-4920: Lecture 7 Secret key cryptography Reading Chapter 3 (pp. 59-75, 92-93) Today s Outcomes Discuss block and key length issues related to secret key cryptography Define several terms related to secret
Chapter 6 CDMA/802.11i
Chapter 6 CDMA/802.11i IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Some material copyright 1996-2012 J.F Kurose and K.W. Ross,
Technical Specification Digital Video Broadcasting (DVB); Content Scrambling Algorithms for DVB-IPTV Services using MPEG2 Transport Streams
TS 103 127 V1.1.1 (2013-05) Technical Specification Digital Video Broadcasting (DVB); Content Scrambling Algorithms for DVB-IPTV Services using MPEG2 Transport Streams 2 TS 103 127 V1.1.1 (2013-05) Reference
ANR INSTRUCTION MANUAL ELECTRICAL MULTIFUNCTION ANALYZER RECORDER COMMUNICATION PROTOCOL. ASCII standard ANR MODBUS-RTU
INSTRUCTION MANUAL IM145-U-A v5.8 ANR ELECTRICAL MULTIFUNCTION ANALYZER RECORDER COMMUNICATION PROTOCOL ASCII standard ANR MODBUS-RTU INSTRUCTION MANUAL IM 145-U-A v. 5.8 Firmware Vers. X.11.1E ANR protocol
Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010
CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Introduction to Cryptography What is cryptography?
Cryptography and Network Security Block Cipher
Cryptography and Network Security Block Cipher Xiang-Yang Li Modern Private Key Ciphers Stream ciphers The most famous: Vernam cipher Invented by Vernam, ( AT&T, in 1917) Process the message bit by bit
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No. # 11 Block Cipher Standards (DES) (Refer Slide
Network Security. Security. Security Services. Crytographic algorithms. privacy authenticity Message integrity. Public key (RSA) Message digest (MD5)
Network Security Security Crytographic algorithms Security Services Secret key (DES) Public key (RSA) Message digest (MD5) privacy authenticity Message integrity Secret Key Encryption Plain text Plain
CSEE 4840. 128-bit AES decryption
CSEE 4840 Project Report May 2008 CSEE 4840 128-bit AES decryption Shrivathsa Bhargav Larry Chen Abhinandan Majumdar Shiva Ramudit CSEE 4840 Embedded System Design Spring 2008, Columbia University 128-bit
A New 128-bit Key Stream Cipher LEX
A New 128-it Key Stream Cipher LEX Alex Biryukov Katholieke Universiteit Leuven, Dept. ESAT/SCD-COSIC, Kasteelpark Arenerg 10, B 3001 Heverlee, Belgium http://www.esat.kuleuven.ac.e/~airyuko/ Astract.
Split Based Encryption in Secure File Transfer
Split Based Encryption in Secure File Transfer Parul Rathor, Rohit Sehgal Assistant Professor, Dept. of CSE, IET, Nagpur University, India Assistant Professor, Dept. of CSE, IET, Alwar, Rajasthan Technical
Lecture 4 Data Encryption Standard (DES)
Lecture 4 Data Encryption Standard (DES) 1 Block Ciphers Map n-bit plaintext blocks to n-bit ciphertext blocks (n = block length). For n-bit plaintext and ciphertext blocks and a fixed key, the encryption
ETSI TS 102 176-2 V1.2.1 (2005-07)
TS 102 176-2 V1.2.1 (2005-07) Technical Specification Electronic Signatures and Infrastructures (ESI); Algorithms and Parameters for Secure Electronic Signatures; Part 2: Secure channel protocols and algorithms
Computer Networks - CS132/EECS148 - Spring 2013 --------------------------------------------------------------------------
Computer Networks - CS132/EECS148 - Spring 2013 Instructor: Karim El Defrawy Assignment 5 Deadline : May 30th 9:30pm (hard and soft copies required) --------------------------------------------------------------------------
The Advanced Encryption Standard (AES)
The Advanced Encryption Standard (AES) Conception - Why A New Cipher? Conception - Why A New Cipher? DES had outlived its usefulness Vulnerabilities were becoming known 56-bit key was too small Too slow
MAC. SKE in Practice. Lecture 5
MAC. SKE in Practice. Lecture 5 Active Adversary Active Adversary An active adversary can inject messages into the channel Active Adversary An active adversary can inject messages into the channel Eve
Internet Mail Client Control Library SSL Supplement
Codestone Ltd Internet Mail Client Control Library SSL Supplement Codestone Ltd 2004 Page 1 / 22 Welcome to the Internet Mail Client Control Library SSL Supplement we hope you will find the library to
YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE
YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467a: Cryptography and Computer Security Notes 1 (rev. 1) Professor M. J. Fischer September 3, 2008 1 Course Overview Lecture Notes 1 This course is
AVR1318: Using the XMEGA built-in AES accelerator. 8-bit Microcontrollers. Application Note. Features. 1 Introduction
AVR1318: Using the XMEGA built-in AES accelerator Features Full compliance with AES (FIPS Publication 197, 2002) - Both encryption and decryption procedures 128-bit Key and State memory XOR load option
Implementation of Full -Parallelism AES Encryption and Decryption
Implementation of Full -Parallelism AES Encryption and Decryption M.Anto Merline M.E-Commuication Systems, ECE Department K.Ramakrishnan College of Engineering-Samayapuram, Trichy. Abstract-Advanced Encryption
Advanced Cryptography
Family Name:... First Name:... Section:... Advanced Cryptography Final Exam July 18 th, 2006 Start at 9:15, End at 12:00 This document consists of 12 pages. Instructions Electronic devices are not allowed.
RSA Attacks. By Abdulaziz Alrasheed and Fatima
RSA Attacks By Abdulaziz Alrasheed and Fatima 1 Introduction Invented by Ron Rivest, Adi Shamir, and Len Adleman [1], the RSA cryptosystem was first revealed in the August 1977 issue of Scientific American.
Symmetric Key cryptosystem
SFWR C03: Computer Networks and Computer Security Mar 8-11 200 Lecturer: Kartik Krishnan Lectures 22-2 Symmetric Key cryptosystem Symmetric encryption, also referred to as conventional encryption or single
The Mathematics of the RSA Public-Key Cryptosystem
The Mathematics of the RSA Public-Key Cryptosystem Burt Kaliski RSA Laboratories ABOUT THE AUTHOR: Dr Burt Kaliski is a computer scientist whose involvement with the security industry has been through
Chapter 8. Network Security
Chapter 8 Network Security Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic Principles Need for Security Some people who
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS)
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS) Ashraf Odeh 1, Shadi R.Masadeh 2, Ahmad Azzazi 3 1 Computer Information Systems Department, Isra University,
Dialogic DSI Protocol Stacks MAP Programmer's Manual
Dialogic DSI Protocol Stacks MAP Programmer's Manual April 2015 U14SSS www.dialogic.com Section 1 Introduction Copyright and Legal Notice Copyright 1997-2015 Dialogic Corporation. All Rights Reserved.
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. #01 Lecture No. #10 Symmetric Key Ciphers (Refer
ELECTRONIC COMMERCE WORKED EXAMPLES
MODULE 13 ELECTRONIC COMMERCE WORKED EXAMPLES 13.1 Explain B2B e-commerce using an example of a book distributor who stocks a large number of books, which he distributes via a large network of book sellers.
FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION
FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION INTRODUCTION GANESH ESWAR KUMAR. P Dr. M.G.R University, Maduravoyal, Chennai. Email: [email protected] Every day, millions of people
KALE: A High-Degree Algebraic-Resistant Variant of The Advanced Encryption Standard
KALE: A High-Degree Algebraic-Resistant Variant of The Advanced Encryption Standard Dr. Gavekort c/o Vakiopaine Bar Kauppakatu 6, 41 Jyväskylä FINLAND [email protected] Abstract. We have discovered that the
Network Security: Cryptography CS/SS G513 S.K. Sahay
Network Security: Cryptography CS/SS G513 S.K. Sahay BITS-Pilani, K.K. Birla Goa Campus, Goa S.K. Sahay Network Security: Cryptography 1 Introduction Network security: measure to protect data/information
The Stream Cipher HC-128
The Stream Cipher HC-128 Hongjun Wu Katholieke Universiteit Leuven, ESAT/SCD-COSIC Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium [email protected] Statement 1. HC-128 supports 128-bit
AN730. CRC Generating and Checking INTRODUCTION THEORY OF OPERATION EXAMPLE 1: MODULO-2 CALCULATION. Example Calculation. Microchip Technology Inc.
CRC Generating and Checking AN730 Authors: Thomas Schmidt INTRODUCTION This application note describes the Cyclic Redundancy Check (CRC) theory and implementation. The CRC check is used to detect errors
CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY
CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY Varun Gandhi 1 Department of Computer Science and Engineering, Dronacharya College of Engineering, Khentawas,
PSM/SAK Event Log Error Codes
PSM Error Codes PSM/SAK Event Log Error Codes If you experience a problem using Persistent Storage Manager, the following list of event log messages can be used to troubleshoot. Error codes are logged
Evaluation of the RC4 Algorithm for Data Encryption
Evaluation of the RC4 Algorithm for Data Encryption Allam Mousa (1) and Ahmad Hamad (2) (1) Electrical Engineering Department An-Najah University, Nablus, Palestine (2) Systems Engineer PalTel Company,
Outline. CSc 466/566. Computer Security. 8 : Cryptography Digital Signatures. Digital Signatures. Digital Signatures... Christian Collberg
Outline CSc 466/566 Computer Security 8 : Cryptography Digital Signatures Version: 2012/02/27 16:07:05 Department of Computer Science University of Arizona [email protected] Copyright c 2012 Christian
A low-cost Alternative for OAEP
A low-cost Alternative for OAEP Peter Schartner University of Klagenfurt Computer Science System Security [email protected] Technical Report TR-syssec-11-02 Abstract When encryption messages by use
AN RC4 BASED LIGHT WEIGHT SECURE PROTOCOL FOR SENSOR NETWORKS
AN RC4 BASED LIGHT WEIGHT SECURE PROTOCOL FOR SENSOR NETWORKS Chang N. Zhang and Qian Yu Department of Computer Science, University of Regina 3737 Wascana Parkway, Regina, SK S4S 0A2 Canada {zhang, yu209}@cs.uregina.ca
How To Attack A Block Cipher With A Key Key (Dk) And A Key (K) On A 2Dns) On An Ipa (Ipa) On The Ipa 2Ds (Ipb) On Pcode)
Cryptography and Network Security Chapter 6 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 6 Block Cipher Operation Many savages at the present day regard
Security over Cloud Data through Encryption Standards
Security over Cloud Data through Encryption Standards Santhi Baskaran 1, Surya A 2, Stephen Pius C 3, Sudesh Goud G 4 1 Professor, 2,3,4 Student, Department of Information Technology, Pondicherry Engineering
Cryptography and Network Security Chapter 3
Cryptography and Network Security Chapter 3 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 3 Block Ciphers and the Data Encryption Standard All the afternoon
Chapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
Unboxing the White-Box
Unboxing the White-Box Practical attacks against Obfuscated Ciphers Eloi Sanfelix [email protected] Cristofaro Mune [email protected] Job de Haas [email protected] 1 Introduction The use of secret codes
Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering
Network Security Gaurav Naik Gus Anderson, Philadelphia, PA Lectures on Network Security Feb 12 (Today!): Public Key Crypto, Hash Functions, Digital Signatures, and the Public Key Infrastructure Feb 14:
Exercise 1: Set up the Environment
RFID Lab Gildas Avoine, 2014 Contact: [email protected] Objective: Learn how much it is easy to read contactless tags, possibly simulate/clone. Requirement: Hardware: Reader SCL3711 or ACR122, Reader
CRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography
Kommunikationssysteme (KSy) - Block 8 Secure Network Communication Part II II Public Key Cryptography Dr. Andreas Steffen 2000-2001 A. Steffen, 28.03.2001, KSy_RSA.ppt 1 Secure Key Distribution Problem
Lecture 9 - Message Authentication Codes
Lecture 9 - Message Authentication Codes Boaz Barak March 1, 2010 Reading: Boneh-Shoup chapter 6, Sections 9.1 9.3. Data integrity Until now we ve only been interested in protecting secrecy of data. However,
Scalable TCP Session Monitoring with Symmetric Receive-side Scaling
Scalable TCP Session Monitoring with Symmetric Receive-side Scaling Shinae Woo Department of Electrical Engineering KAIST [email protected] KyoungSoo Park Department of Electrical Engineering KAIST
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
Network Security - ISA 656 Introduction to Cryptography
Network Security - ISA 656 Angelos Stavrou September 18, 2007 Codes vs. K = {0, 1} l P = {0, 1} m C = {0, 1} n, C C E : P K C D : C K P p P, k K : D(E(p, k), k) = p It is infeasible to find F : P C K Let
