Advanced Analogue and Digital Encryption Methods. Presented by: Dr. S. Sarpal

Similar documents
Network Security. Omer Rana

Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

IT Networks & Security CERT Luncheon Series: Cryptography

CSCE 465 Computer & Network Security

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Overview of Public-Key Cryptography

7! Cryptographic Techniques! A Brief Introduction

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

Applied Cryptography Public Key Algorithms

CSCI-E46: Applied Network Security. Class 1: Introduction Cryptography Primer 1/26/16 CSCI-E46: APPLIED NETWORK SECURITY, SPRING

Computer Security: Principles and Practice

CRYPTOGRAPHY IN NETWORK SECURITY

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES

Public Key (asymmetric) Cryptography

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

Discrete logarithms within computer and network security Prof Bill Buchanan, Edinburgh Napier

Lecture 9: Application of Cryptography

Lecture 6 - Cryptography

Network Security. Security. Security Services. Crytographic algorithms. privacy authenticity Message integrity. Public key (RSA) Message digest (MD5)

Introduction to Encryption

Introduction to Cryptography

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Cryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g.

Lukasz Pater CMMS Administrator and Developer

CS 758: Cryptography / Network Security

Mathematics of Internet Security. Keeping Eve The Eavesdropper Away From Your Credit Card Information

Network Security. Chapter 2 Basics 2.2 Public Key Cryptography. Public Key Cryptography. Public Key Cryptography

Cryptography & Digital Signatures

SPC5-CRYP-LIB. SPC5 Software Cryptography Library. Description. Features. SHA-512 Random engine based on DRBG-AES-128

Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography

CS Computer Security Third topic: Crypto Support Sys

The Mathematics of the RSA Public-Key Cryptosystem

An Introduction to Cryptography as Applied to the Smart Grid

Techniques of Asymmetric File Encryption. Alvin Li Thomas Jefferson High School For Science and Technology Computer Systems Lab

Elements of Applied Cryptography Public key encryption

Number Theory. Proof. Suppose otherwise. Then there would be a finite number n of primes, which we may

Center for Internet Security. INTEGRATED INTELLIGENCE CENTER Technical White Paper William F. Pelgrin, CIS President and CEO

Chapter 8. Cryptography Symmetric-Key Algorithms. Digital Signatures Management of Public Keys Communication Security Authentication Protocols

Public Key Cryptography and RSA. Review: Number Theory Basics

Common Pitfalls in Cryptography for Software Developers. OWASP AppSec Israel July The OWASP Foundation

An Introduction to RSA Public-Key Cryptography

Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc.

Principles of Public Key Cryptography. Applications of Public Key Cryptography. Security in Public Key Algorithms

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

Public Key Cryptography Overview

Notes on Network Security Prof. Hemant K. Soni

AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES

Chapter 8. Network Security

Analysis of Security Algorithms in Cloud Computing

A SOFTWARE COMPARISON OF RSA AND ECC

How To Encrypt Data With Encryption

PGP (Pretty Good Privacy) INTRODUCTION ZHONG ZHAO

Cryptography and Network Security

Cryptography: Authentication, Blind Signatures, and Digital Cash

Software Tool for Implementing RSA Algorithm

Introduction to Hill cipher

Basic Algorithms In Computer Algebra

Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST

Outline. CSc 466/566. Computer Security. 8 : Cryptography Digital Signatures. Digital Signatures. Digital Signatures... Christian Collberg

Cryptography Lecture 8. Digital signatures, hash functions

Split Based Encryption in Secure File Transfer

Cryptography & Network Security

Evaluation of the RC4 Algorithm for Data Encryption

Cryptography and Network Security Block Cipher

Cryptography and Network Security Chapter 9

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt

Table of Contents. Bibliografische Informationen digitalisiert durch

CrypTool Claudia Eckert / Thorsten Clausius Bernd Esslinger / Jörg Schneider / Henrik Koy

Discrete Mathematics, Chapter 4: Number Theory and Cryptography

DRAFT Standard Statement Encryption

EXAM questions for the course TTM Information Security May Part 1

An Introduction to the RSA Encryption Method

Cryptographic Services Guide

The science of encryption: prime numbers and mod n arithmetic

CS 348: Computer Networks. - Security; 30 th - 31 st Oct Instructor: Sridhar Iyer IIT Bombay

Introduction to Network Security. 1. Introduction. And People Eager to Take Advantage of the Vulnerabilities

Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human

RSA and Primality Testing

Symantec Corporation Symantec Enterprise Vault Cryptographic Module Software Version:

IMPROVED SECURITY MEASURES FOR DATA IN KEY EXCHANGES IN CLOUD ENVIRONMENT

An Efficient Data Security in Cloud Computing Using the RSA Encryption Process Algorithm

Properties of Secure Network Communication

Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

Network Security. HIT Shimrit Tzur-David

A New Efficient Digital Signature Scheme Algorithm based on Block cipher

Public Key Cryptography: RSA and Lots of Number Theory

Secure File Transfer Appliance Security Policy Document Version 1.9. Accellion, Inc.

Lecture 17: Re-encryption

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Elliptic Curve Cryptography Methods Debbie Roser Math\CS 4890

Lecture Note 5 PUBLIC-KEY CRYPTOGRAPHY. Sourav Mukhopadhyay

Ky Vu DeVry University, Atlanta Georgia College of Arts & Science

Symmetric Key cryptosystem

Transcription:

Advanced Analogue and Digital Encryption Methods Presented by: Dr. S. Sarpal

Background Term given to a mathematical algorithm OR a set of known sequences. Mixed with message to hide the meaning of content. Needed for personal privacy or security applications. Many analogue and digital encryption methods available. Earliest Ciphers Vedic scriptures, the Egyptians, Julius Caesar. Infamous example: Military communications (Enigma). Copyright Advanced Solutions Nederland 2009. ASN09-PPT001 Page: 2

Cryptographic Jargon Crypto system. Plaintext (data to be encrypted). Ciphertext (encrypted data). Key. Alice, Bob, Carol and Dave. Eve (the eavesdropper!) Copyright Advanced Solutions Nederland 2009. ASN09-PPT001 Page: 3

Types of analogue crypto systems Spectrum inversion: AM modulation concept (inverted lower sideband) Variable split band (VSB) and rolling codes used for greater security. Spectrum shift (AM concept, upper sideband). Cut and rotate (much more effective!) General comments : Cheap to implement, does not require specialised hardware but offers limited security. Encrypted speech is discenable in some configurations. Copyright Advanced Solutions Nederland 2009. ASN09-PPT001 Page: 4

Spectrum Inversion Example Using trigonometric identities Analogue multiplier used. Hilbert transform can be used to remove upper sideband (DSP or computer implementation). Copyright Advanced Solutions Nederland 2009. ASN09-PPT001 Page: 5

Audio VSB Spectrum Inversion Example Magnitude Rolling code used to determine split point frequency (VSB). Split point frequency updated every 500ms. Freq Original Encrypted Increased security than single carrier frequency. Low cost ASIC implementation available. Copyright Advanced Solutions Nederland 2009. ASN09-PPT001 Page: 6

Types of digital crypto systems Symmetric (or secret key) encryption: Same key used for encryption and decryption. Fast operation on computer, DSP or micro-controller. Examples: PRBS, DES, triple DES, RC2, IDEA, Blowfish, CAST-128, Skipjack, AES Asymmetric (or public key) encryption: Different keys for encryption and decryption. Slow operation, best suited to a DSP or ASIC. Examples: PGP, RSA, Diffie-Hellman, DSA, Elgamal General comments: Usually more expensive to implement than analogue methods. High level of security at much greater computation expense. Copyright Advanced Solutions Nederland 2009. ASN09-PPT001 Page: 7

Simple digital encryption (PRBS) 1 0 1 0 1 0 = xor A B Q 0 0 0 0 1 1 1 0 1 1 1 0 Copyright Advanced Solutions Nederland 2009. ASN09-PPT001 Page: 8

Asymmetric encryption (the RSA algorithm) Introduced in 1977. Named after its creators Rivest, Shamir and Adleman. Used for secure encryption and digital signatures. Patented in 1983, but released into the public domain in September 2000. Commonly used PGP, SSH, SSL, SET (Visa, Mastercard). Gets its security from the difficulty of factorizing large numbers. 1024-bit key is considered as the smallest key for secure communication. Many references have demonstrated that 300-bit or shorter keys can be broken in few hours using a simple laptop and freely available software! Copyright Advanced Solutions Nederland 2009. ASN09-PPT001 Page: 9

Overview of the RSA algorithm Key Generation Two random large prime numbers, p and q are chosen. For maximum security, p and q should be of equal length. Calculate product n=p q Calculate random encryption key, e such that e and (p-1) (q-1) are relatively prime. Finally, extended Euclidean algorithm is used for computing the decryption key d, such that: e d = 1 mod (p-1) (q-1) PUBLIC KEY: e, n PRIVATE KEY: d Copyright Advanced Solutions Nederland 2009. ASN09-PPT001 Page: 10

Overview of the RSA algorithm Encryption/decryption Encryption To encrypt our plaintext message m using our public key, e: c = m e mod n Example: m = 123, p = 29, q = 31, e = 13, d = 517 c = 123 13 (mod [29 31]) = 402 Decryption To decrypt the ciphertext c using our private key, d: m = c d mod n m = 402 517 (mod [29 31]) = 123 Copyright Advanced Solutions Nederland 2009. ASN09-PPT001 Page: 11

Thank you for your attention, please feel free to ask any questions. Copyright Advanced Solutions Nederland 2009. ASN09-PPT001 Page: 12