Real-time Streaming Encryption Algorithm. G. Margarov, M.Markosyan, Y. Alaverdyan

Similar documents
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

CS 348: Computer Networks. - Security; 30 th - 31 st Oct Instructor: Sridhar Iyer IIT Bombay

CRYPTOGRAPHY IN NETWORK SECURITY

Table of Contents. Bibliografische Informationen digitalisiert durch

Public Key Cryptography. c Eli Biham - March 30, Public Key Cryptography

Chapter 23. Database Security. Security Issues. Database Security

Chapter 23. Database Security. Security Issues. Database Security

Lecture Note 5 PUBLIC-KEY CRYPTOGRAPHY. Sourav Mukhopadhyay

Elliptic Curve Cryptography

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket

Lukasz Pater CMMS Administrator and Developer

Practice Questions. CS161 Computer Security, Fall 2008

CSE/EE 461 Lecture 23

A SOFTWARE COMPARISON OF RSA AND ECC

Computer Security: Principles and Practice

Advanced Cryptography

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

A Factoring and Discrete Logarithm based Cryptosystem

A NOVEL STRATEGY TO PROVIDE SECURE CHANNEL OVER WIRELESS TO WIRE COMMUNICATION

Symmetric Key cryptosystem

Lecture 6 - Cryptography

Cryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g.

FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

CSCE 465 Computer & Network Security

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Public Key Cryptography in Practice. c Eli Biham - May 3, Public Key Cryptography in Practice (13)

The Mathematics of the RSA Public-Key Cryptosystem

Software Implementation of Gong-Harn Public-key Cryptosystem and Analysis

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Efficient and Robust Secure Aggregation of Encrypted Data in Wireless Sensor Networks

How To Encrypt With A 64 Bit Block Cipher

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES

Principles of Public Key Cryptography. Applications of Public Key Cryptography. Security in Public Key Algorithms

A New Efficient Digital Signature Scheme Algorithm based on Block cipher

SAMPLE EXAM QUESTIONS MODULE EE5552 NETWORK SECURITY AND ENCRYPTION ECE, SCHOOL OF ENGINEERING AND DESIGN BRUNEL UNIVERSITY UXBRIDGE MIDDLESEX, UK

Software Tool for Implementing RSA Algorithm

Network Security Technology Network Management

Cryptography and Network Security Chapter 9

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution.

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Karagpur

Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Associate Prof. Dr. Victor Onomza Waziri

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer. February 3, 1999

Elements of Applied Cryptography Public key encryption

White Paper. Enhancing Website Security with Algorithm Agility

CS 758: Cryptography / Network Security

EXAM questions for the course TTM Information Security May Part 1

Techniques of Asymmetric File Encryption. Alvin Li Thomas Jefferson High School For Science and Technology Computer Systems Lab

Outline. CSc 466/566. Computer Security. 8 : Cryptography Digital Signatures. Digital Signatures. Digital Signatures... Christian Collberg

Lecture 3: One-Way Encryption, RSA Example

Internetwork Security

A hard problem: Disclosing how to break public key cryptosystems

Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Cryptography and Network Security

Cryptography and Network Security

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Weighted Total Mark. Weighted Exam Mark

Security Sensor Network. Biswajit panja

Development of Secure Multikeyword Retrieval Methodology for Encrypted Cloud Data

Lecture 9 - Network Security TDTS (ht1)

CRYPTOGRAPHY AND NETWORK SECURITY

CUNSHENG DING HKUST, Hong Kong. Computer Security. Computer Security. Cunsheng DING, HKUST COMP4631

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN

SFWR ENG 4C03 - Computer Networks & Computer Security

Cryptography and Network Security Chapter 10

Fighting product clones through digital signatures

Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human

Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography

Secure data storage. André Zúquete Security 1

Introduction. Digital Signature

Midterm. Name: Andrew user id:

7! Cryptographic Techniques! A Brief Introduction

Quantum Key Distribution as a Next-Generation Cryptographic Protocol. Andrew Campbell

How To Use Pretty Good Privacy (Pgp) For A Secure Communication

Cryptographic Algorithms and Key Size Issues. Çetin Kaya Koç Oregon State University, Professor

VoteID 2011 Internet Voting System with Cast as Intended Verification

Modeling and verification of security protocols

7. Public Key Cryptosystems and Digital Signatures, 8. Firewalls, 9. Intrusion detection systems, 10. Biometric Security Systems, 11.

LUC: A New Public Key System

IT Networks & Security CERT Luncheon Series: Cryptography

Encryption, Data Integrity, Digital Certificates, and SSL. Developed by. Jerry Scott. SSL Primer-1-1

An Efficient and Secure Key Management Scheme for Hierarchical Access Control Based on ECC

Notes on Network Security Prof. Hemant K. Soni

The application of prime numbers to RSA encryption

Lecture 15 - Digital Signatures

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Overview. SSL Cryptography Overview CHAPTER 1

A short primer on cryptography

Chapter 10. Network Security

ALGORITHM DESIGN OF SECURE DATA MESSAGE TRANSMISSION BASED ON OPENSSL AND VPN

Cryptography and Network Security. Prof. D. Mukhopadhyay. Department of Computer Science and Engineering. Indian Institute of Technology, Kharagpur

BSc (Hons) Sofware Engineering. Examinations for / Semester 2

Security Strength of RSA and Attribute Based Encryption for Data Security in Cloud Computing

CPSC 467b: Cryptography and Computer Security

Public Key Cryptography Overview

Transcription:

Real-time Streaming Encryption Algorithm G. Margarov, M.Markosyan, Y. Alaverdyan NPUA, YeTRI Armenia, Aghveran, 2015

Specifics of Real-Time Systems (RTS) Timely behavior Real-time domains have deadlines by which control responses must be produced, or catastrophic failure may occur: - nuclear power plant control - medical monitoring - aircraft control - network reactive agents design - speech processing 2

Specifics of Real-Time Systems, cont Provision of proper transactions depending on not only their logical correctness, but also on operability in the required time. Latency makes the RT system useless. Class of a real-time domain under discussion Telephony 3 Need for Algorithms for scheduling tasks such that the system operates in a reliable time and timely fashion

RESEARCH OBJECTIVES Obtain end-to-end security for real-time communication systems. Despite analogue scrambling, modern technologies suggest digital encryption as a stronger method of protecting realtime data, where the kind of data under encryption in general does not matter. Note that speech is especially sensitive toward encryption in that, depending on the length of the transmitted package, pauses may arise due to latency of package encryption.

Peculiarities of IP Telephony In IP Telephony, transmitted packages are supposed to be small and independent Motivation damage/loss of a package does not affect the overall communication due to separate processing This implies disjoint encryption/decryption of packages

Peculiarities of IP Telephony Another requirement The times for encryption/decryption are supposed to be small to provide timeliness of the digital-to-analog conversion. For IP Telephony, pauses are allowed to not exceed several 10 milliseconds. The joint work introduces an asymmetric streaming cipher to encrypt real-time data units produced by an analogue-todigital device.

Issues in Real-Time Systems Information and Communication Security Note that a little work has been done in the area of realtime speech communication to provide a guaranteed level of cryptographic protection: large statistics of vulnerabilities in the area, due to: Internal threats Data unauthorized access Data Leakage Data content/ integrity violation 7 Intrusion of invisible agents to the systems Side channel attacks

Issues in Real-Time Systems Information and Communication Security On the other hand, embedding time and/or resource consuming security mechanisms inevitably slows down the system timely performance. As a result, protective mechanisms are mostly neglected or misused. State of the art Distributed control systems, where PKI is implemented, methods based on the Number theory (RSA, ECC) for information scrambling is applied. The stability of the systems lies on intractability of several trapdoor one way functions (TOWF), such as: Integer factorisation Discrete logarithm problem 8

Issues in Real-Time Systems Information and Communication Security Meanwhile providing the required level of security, the above PKI schemes are not applicable in real-time domain, due to significant latency in computations, latent preliminary work in prime components generation. iterated extended Euclidean algorithms for finding coprimes to As a result, Number theory based cryptographic algorithms are restricted to digital signatures and key exchange protocols. Saturation in developing Number theory based PKI algorithms! 9

NEED for NEWER TOWFs Designed over efficient algebraic structures To ensure real-time computations eliminate preliminary latent generation of embedded components

Real-Time Streaming Mobile System Designated for real - time data (also speech) secure communication, designed at the Yerevan Telecommunication Research Institute.

Real-Time Streaming Mobile System ATS Encryptor/ Decryptor Encryptor/ Decryptor Phone Device Phone Device

Real-Time Streaming Mobile System, cont Applicability in telephony network systems Capability for reconfigurable settings for - the required level of security, and - guaranteed time of security. Timely generation of key pair numerical components Timely procedures for encryption/decryption

Real-Time Streaming Encryption TOWF underlying the encryption method For the given matrix, the are infinite number of other matrices, whose product to the given matrix equals 0. The core notions are adopted from the paper of C.K. Wu and V. Varadharajan. Public Key Cryptosystems Based on Boolean Permutations and Their Applications, International Journal of Computer Mathematics, 1999.

Real-Time Streaming Encryption (mathematical apparatus) Our Contribution Embedding - non commutative and - non associative algebraic structures to ensure the cipher security Whitening tools - initial permutation - session keys (not used in the authorized decryption process) - whitened public key components

Real-Time Streaming Encryption (mathematical apparatus) Specifics of the solution TOWF based on the intractability of factoring matrices and inverting large nonlinear Boolean permutations, Timely generation of the cryptographic key pairs Timely procedures of encryption/decryption Decryption faster than encryption Recall that the product of matrices is not commutative, unlike integer factorization, also inverting nonlinear Boolean functions is a hard problem

Summary A device for real time streaming encryption/decryption has been implemented, that is applicable in various levels of organizations: military, monetary, governmental, or business, where/when timely speech secure processing is required.

THANK YOU