Kasumi Block Cipher Data Encryptors Darshan Gandhi Rushabh Pasad.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

6.1.2 Overview DES is a block cipher, as shown in Figure 6.1.
1 KCipher-2 KDDI R&D Laboratories Inc.. ©KDDI R&D Laboratories Inc. All rights Reserved. 2 Introduction LFSR-based stream ciphers Linear recurrence between.
Symmetric Encryption Prof. Ravi Sandhu.
Encryption.
DES The Data Encryption Standard (DES) is a classic symmetric block cipher algorithm. DES was developed in the 1970’s as a US government standard The block.
Block Cipher Modes of Operation and Stream Ciphers
ECE454/CS594 Computer and Network Security
Random Number Generation & Testing Juan Soto 301/
Energy-efficient cryptography: application of KATAN Sergey Sergey ANCUD Ltd.
Scalable Involutional PP-1 Block Cipher for Limited Resources K. Chmiel, A. Grocholewska-Czuryło, J. Stokłosa Poznan University of Technology Institute.
International Data Encryption Algorithm
From Crypto-Theory to Crypto-Practice 1 CHAPTER 14: From Crypto-Theory to Crypto-Practice SHIFT REGISTERS The first practical approach to ONE-TIME PAD.
Kasumi Block Cipher Data Encryptors Darshan Gandhi Rushabh Pasad.
Lecture 5: Cryptographic Hashes
Syed Safi Uddin Qadri BETL/F07/0112 GSM Stream Cipher Algorithm Presented To Sir Adnan Ahmed Siddiqui.
Dan Boneh Stream ciphers Real-world Stream Ciphers Online Cryptography Course Dan Boneh.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
1 CIS 5371 Cryptography 5b. Pseudorandom Objects in Practice Block Ciphers.
1 A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Application This contribution discusses some aspects of testing.
Digital Kommunikationselektroink TNE027 Lecture 6 (Cryptography) 1 Cryptography Algorithms Symmetric and Asymmetric Cryptography Algorithms Data Stream.
Cryptography and Network Security Chapter 3
Block Ciphers and the Data Encryption Standard
Cryptography and Network Security
Block Ciphers: Workhorses of Cryptography COMP 1721 A Winter 2004.
Cryptography and Network Security, resuming some notes Dr. M. Sakalli.
Stream cipher diagram + + Recall: One-time pad in Chap. 2.
Session 6: Introduction to cryptanalysis part 1. Contents Problem definition Symmetric systems cryptanalysis Particularities of block ciphers cryptanalysis.
Lecture 23 Symmetric Encryption
Decryption Algorithms Characterization Project ECE 526 spring 2007 Ravimohan Boggula,Rajesh reddy Bandala Southern Illinois University Carbondale.
Network Security Chapter
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
AES Proposal: Rijndael Joan Daemen Vincent Rijmen “Rijndael is expected, for all key and block lengths defined, to behave as good as can be expected from.
KAIS T A lightweight secure protocol for wireless sensor networks 윤주범 ELSEVIER Mar
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
1 Chapter 3 Ciphers Mechanism that decides the process of encryption/decryption Stream Cipher: Bit-by-bit encryption / decryption Block Cipher: Block-by-block.
9/17/15UB Fall 2015 CSE565: S. Upadhyaya Lec 6.1 CSE565: Computer Security Lecture 6 Advanced Encryption Standard Shambhu Upadhyaya Computer Science &
Chapter 20 Symmetric Encryption and Message Confidentiality.
CS555Spring 2012/Topic 51 Cryptography CS 555 Topic 5: Pseudorandomness and Stream Ciphers.
Resynchronization Attacks on WG and LEX Hongjun Wu and Bart Preneel Katholieke Universiteit Leuven ESAT/COSIC.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Cryptographic Attacks on Scrambled LZ-Compression and Arithmetic Coding By: RAJBIR SINGH BIKRAM KAHLON.
Cryptography Team Presentation 2
Dr. Reuven Aviv, Nov 2008 Conventional Encryption 1 Conventional Encryption & Message Confidentiality Acknowledgements for slides Henric Johnson Blekinge.
Modes of Usage Dan Fleck CS 469: Security Engineering These slides are modified with permission from Bill Young (Univ of Texas) 11 Coming up: Modes of.
CRYPTANALYSIS OF STREAM CIPHER Bimal K Roy Cryptology Research Group Indian Statistical Institute Kolkata.
Description of a New Variable-Length Key, 64-Bit Block Cipher (BLOWFISH) Bruce Schneier BY Sunitha Thodupunuri.
Chapter 7 – Confidentiality Using Symmetric Encryption.
Lecture 23 Symmetric Encryption
Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.
The RC5 Encryption Algorithm: Two Years On Lisa Yin RC5 Encryption –Ron Rivest, December 1994 –Fast Block Cipher –Software and Hardware Implementations.
Intro to Cryptography Lesson Introduction
DES Analysis and Attacks CSCI 5857: Encoding and Encryption.
Block Cipher- introduction
Block Ciphers and the Data Encryption Standard. Modern Block Ciphers  One of the most widely used types of cryptographic algorithms  Used in symmetric.
Chapter 7 – Confidentiality Using Symmetric Encryption.
CSE 5/7353 – January 25 th 2006 Cryptography. Conventional Encryption Shared Key Substitution Transposition.
CST 312 Pablo Breuer. A block of plaintext is treated as a whole and used to produce a ciphertext block of equal length Typically a block size of 64 or.
1 CPCS425: Information Security (Topic 5) Topic 5  Symmetrical Cryptography  Understand the principles of modern symmetric (conventional) cryptography.
@Yuan Xue Announcement Project Release Team forming Homework 1 will be released next Tuesday.
Classical Encryption techniques
A cryptographically secure pseudorandom number generator for Julia
Fundamentals of Python: First Programs
Chapter -3 ADVANCED ENCRYPTION STANDARD & BLOCK CIPHER OPERATION
Randomness and Statistical Tests
Cryptography Lecture 17.
Pseudorandom Numbers Network Security.
Presentation transcript:

Kasumi Block Cipher Data Encryptors Darshan Gandhi Rushabh Pasad

Introduction Used in 3GPP Confidentiality and Integrity Algorithms. Technical Specifications: – Key Size: 128 bits – Block Size: 64 bits (64 bit output from a 64 bit input). – Number of Rounds: 8

Block Diagram

Statistical Test Suite NIST – Developed to test randomness of binary sequences produced by hardware or software based cryptographic random or pseudorandom number generators. – Focuses on variety of different types of non-randomness that could exist in a sequence. – Consists of 15 sub-tests.

Random Number Generation Tests 1.Frequency Test 2.Frequency Test within a block 3.Runs Test 4.Longest Run of Ones in a block 5.Binary Matrix Rank Test 6.Discrete Fourier Transform Test 7.Non-overlapping Template Matching Test 8.Overlapping Template Matching Test 9.Universal Statistical Test 10.Linear Complexity Test 11.Serial Test 12.Approximate Entropy Test 13.Cumulative Sums Test 14.Random Excursions Test 15.Random Excursions Variant Test

Random Input Data Program Generic Program. Can be used with any Block Cipher. Operates in Output Feedback Mode Output is in binary format. Usage: % java GenerateRandomInput – : Name of the implementing Block Cipher Class. – : A Hex String equivalent to block size of cipher. – : Key to be used for Encryption. A Hex string equivalent to key size of cipher. – : Number of Rounds for encryption. – : Generates ( *block size) bits in output.(i.e. Number of iterations to be performed) – : Path to the file in which the output should be saved. Eg. % java GenerateRandomInput Kasumi 62A540981BA6F9B7 8CE33E2CC3C0B5FC1F3DE8A6DC66B1F output.txt

Test Suite Results Tests were run on 10 streams of 100,000 bits long data sequences for each reduced rounds. Universal Test requires 1,000 million bits of data for best accuracy. So the test was run only once on the cipher reduced to round 1. The recorded P-Value was:

Test Suite Results

Literature Search ETSI SAGE 3GPP Standard Algorithms Task Force – Performed 12 statistical tests. – S9 does not show the avalanche effect. – No other statistical weaknesses. Evaluator 1 – Found a key attack when reduced to 5 rounds. – Found a structural attack on the cipher when reduced to 6 rounds.

Literature Search Evaluator 2 – Performed cryptanalytic attacks. – Could not detect any weaknesses in the cipher. Evaluator 3 – No practical attack possible on the reduced 5 round version. – Theoretically, when reduced to 6 rounds, found a weakness.

Analysis and Conclusion Analysis On observing the P-Values, we conclude that, If Kasumi Cipher is reduced to Round 1, non-randomness is detected (P-Value is less than 0.01). For further Rounds, non-randomness was detected only in one of the binary rank matrix test (Reduced to 7 Rounds). Conclusion Kasumi Cipher is strong cipher that generates pseudo random data in which non-randomness is not being detected. No practical attacks have been found and the algorithm is well-fitted for the intended use.

Lessons Learned Principles of Cryptography Implementing Cryptographic Primitives Bit level data manipulation and code optimization Encrypting and Decrypting Data using Cipher Algorithms

Future Work Testing using other test suites such as – TestU01 – DieHard Perform cryptanalysis to detect any other weaknesses

Questions/Comments/Suggestions?