EDA385 Embedded Systems Design. Advanced Course



Similar documents
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

CS 758: Cryptography / Network Security

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Savitribai Phule Pune University

CRYPTOGRAPHY IN NETWORK SECURITY

An Efficient Data Security in Cloud Computing Using the RSA Encryption Process Algorithm

Data Encryption WHITE PAPER ON. Prepared by Mohammed Samiuddin.

First Semester Examinations 2011/12 INTERNET PRINCIPLES

Ky Vu DeVry University, Atlanta Georgia College of Arts & Science

NXP & Security Innovation Encryption for ARM MCUs

CS 348: Computer Networks. - Security; 30 th - 31 st Oct Instructor: Sridhar Iyer IIT Bombay

Properties of Secure Network Communication

Chapter 8. Network Security

Chapter 10. Network Security

CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY

Security in Distributed Systems. Network Security

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

Cryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g.

As enterprises conduct more and more

Network Security Technology Network Management

Table of Contents. Bibliografische Informationen digitalisiert durch

Overview. SSL Cryptography Overview CHAPTER 1

How To Attack A Block Cipher With A Key Key (Dk) And A Key (K) On A 2Dns) On An Ipa (Ipa) On The Ipa 2Ds (Ipb) On Pcode)

Evaluation of the RC4 Algorithm for Data Encryption

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES

BRIEF INTRODUCTION TO CRYPTOGRAPHY. By PAGVAC. February 8, 2004

Cryptography & Network Security. Introduction. Chester Rebeiro IIT Madras

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Three attacks in SSL protocol and their solutions

Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST

CSC474/574 - Information Systems Security: Homework1 Solutions Sketch

Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

Cryptography & Digital Signatures

Security Protocols/Standards

IT Networks & Security CERT Luncheon Series: Cryptography

SubmitedBy: Name Reg No Address. Mirza Kashif Abrar T079 kasmir07 (at) student.hh.se

Designing Hash functions. Reviewing... Message Authentication Codes. and message authentication codes. We have seen how to authenticate messages:

SPC5-CRYP-LIB. SPC5 Software Cryptography Library. Description. Features. SHA-512 Random engine based on DRBG-AES-128

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

How To Use Pretty Good Privacy (Pgp) For A Secure Communication

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Cornerstones of Security

Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key

UM0586 User manual. STM32 Cryptographic Library. Introduction

7! Cryptographic Techniques! A Brief Introduction

CSE/EE 461 Lecture 23

Lecture 9 - Network Security TDTS (ht1)

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Cryptographic Hash Functions Message Authentication Digital Signatures

Cryptography and Network Security Chapter 9

Cryptography and Network Security Chapter 15

Review On Incremental Encrypted Backup For Cloud

SECURITY IN NETWORKS

Overview Keys. Overview

Elements of Applied Cryptography Public key encryption

VoIP Security. Seminar: Cryptography and Security Michael Muncan

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Content Teaching Academy at James Madison University


Security Sensor Network. Biswajit panja

Encryption Libraries

Chapter 7: Network security

CSci 530 Midterm Exam. Fall 2012

CS155. Cryptography Overview

Chapter 23. Database Security. Security Issues. Database Security

PGP Encryption Software

Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography

Chapter 17. Transport-Level Security

Message authentication and. digital signatures

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

EmulexSecure 8Gb/s HBA Architecture Frequently Asked Questions

Information Security

Symmetric Key cryptosystem

Client Server Registration Protocol

AN3270 Application note

SE 4472a / ECE 9064a: Information Security

Lecture 10: CPA Encryption, MACs, Hash Functions. 2 Recap of last lecture - PRGs for one time pads

Network FAX Driver. Operation Guide

Electronic Mail Security. Security. is one of the most widely used and regarded network services currently message contents are not secure

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

HP ProtectTools Embedded Security Guide

Symmetric and Public-key Crypto Due April , 11:59PM

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human

CS 161 Computer Security Spring 2010 Paxson/Wagner MT2

Modes of Operation of Block Ciphers

Introduction. Where Is The Threat? Encryption Methods for Protecting Data. BOSaNOVA, Inc. Phone: Web:

Protocol Rollback and Network Security

Network Security. Modes of Operation. Steven M. Bellovin February 3,

A New Efficient Digital Signature Scheme Algorithm based on Block cipher

Fundamentals of the Internet 2009/ Explain meaning the following networking terminologies:

An Introduction to Key Management for Secure Storage. Walt Hubis, LSI Corporation

Cryptographic hash functions and MACs Solved Exercises for Cryptographic Hash Functions and MACs

Secure Network Communications FIPS Non Proprietary Security Policy

Introduction to Cryptography

Transcription:

EDA385 Embedded Systems Design. Advanced Course Encryption for Embedded Systems Supervised by Flavius Gruian Submitted by Ahmed Mohammed Youssef (aso10ayo) Mohammed Shaaban Ibraheem Ali (aso10mib) Orges Balla (aso10oba) 1

Introduction Nowadays many electronic devices (mobile phones, PDAs, Security Cameras ) need to communicate with other devices via unsecured communication links, using such unsecured communication link is dangerous in case of communicating sensitive data, which may cause economic and/or security damages by illegally knowing it. Figure 1 : overall view Even if the network itself is claimed to be secured, this cannot be taken for granted for communicating sensitive data, so the requirement of securing the data locally on the device level arises. Project Proposal In this project we provide a security system that can be integrated with any electronic device that requires encryption/decryption capabilities for the data it holds. We adopt a hybrid cryptosystem, where we have two cryptosystems included, namely the public-key and the symmetric-key cryptosystem. We use the symmetric-key cryptosystem for encrypting the data to be transmitted using session keys (one key per session), while the public-key cryptosystem is used to encrypt the session keys used in the symmetric-key cryptosystem. 2

For public key cryptosystem each communicating entity should have a key pair: 1. The public key which can be known by all the devices in the network, and 2. The private key which is only known by its owner. By encrypting data with a device public key, only the private key holder can decrypt this message back. This project deals with only providing an encryption/decryption system for embedded systems. The entire necessary infrastructure that makes RSA works, like a public server where someone can find the public key of the receiving party is assumed to exist. It is also assumed that for the purpose of the project, the receiving party is properly authenticated. Also the inner workings of the cryptography system will not be explained in details, for the project we re working is not about how the cryptography works but how we can make use of it. The algorithms that will be used in this project are accepted standards in the cryptography community. Message Life Cycle A typical message life cycle would be as follows: At the sender s side:- 1. Message is divided into blocks (According to the used block cipher-symmetric-key cryptosystem-), where the data is called the Plaintext. 2. A session key is generated for each message transmission, session keys are normally random numbers generated in a secure way. 3

3. Session key is used then to encrypt the data blocks using the block cipher, to produce the Ciphertext. 4. Session key is encrypted using both the sender s private key (for authentication) and the recipient s public key (for confidentiality). 5. Both encrypted session key and the Cipher text are sent over the unsecured communication link to the other device. Figure 2 : Sender Device 4

At the recipient s side:- 1. First the encrypted session key is received and decrypted using the sender s public key and the recipient s private key. 2. Then the decrypted session key is used by the block cipher to decrypt the message and get back the Plaintext. Figure 3 : Receiver Device 5

AES Encryption System We chose for our system the AES-128 operating in the CBC (cipher-block chaining) mode for the symmetric-key encryption of the data and the RSA for the public-key encryption of the AES session keys. Ideally the RSA keys are generated at each device and the public keys are broadcasted through a (network public-keys server), however in this project each communicating entity should request from the other entity its public key and the other entity should provide it whenever requested. We will implement both AES encryption and decryption on hardware, as they are processing on the whole data, so encrypting it should be hardware accelerated, While keys encryption (The public-key cryptosystem RSA ) will be implemented on software as it requires high computational power so implementing it on 6

hardware will use a huge resources however it is used one time per message, so implementing it on software would be more convenient. The used communication link would be initially RS232 link, then we will try to provide to our system a RF and/or Ethernet drivers for more realistic communication links. Work division and time plan Week Ahmed Mohammed Orges 1 Searching + Brainstorming + Reading 2 PPT + Proposal 3 AES Encryption 4 AES Encryption - Decryption Dummy components SW-HW Controller SW-HW Controller SW-HW interface AES Decryption + SW-HW 5 HW integration integration 6 Testing 7 Presentation Random number AES key generator RSA Encryption + Decryption SW integration File operation: Read, Write, Padding, Segmentation 7