Transmission Security via Fast Time-Frequency Hopping PI: Eli Yablanovich Co-PIs: Rick Wesel Ingrid Verbauwhede Ming Wu Bahram Jalali UCLA Electrical.

Slides:



Advertisements
Similar presentations
CSE 413: Computer Networks
Advertisements

Chapter Thirteen: Multiplexing and Multiple- Access Techniques.
“Advanced Encryption Standard” & “Modes of Operation”
Spread Spectrum Chapter 7. Spread Spectrum Input is fed into a channel encoder Produces analog signal with narrow bandwidth Signal is further modulated.
An Introduction to Stream Ciphers Zahra Ahmadian Electrical Engineering Department Sahrif University of Technology
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
TIE Extensions for Cryptographic Acceleration Charles-Henri Gros Alan Keefer Ankur Singla.
1 CIS 5371 Cryptography 5b. Pseudorandom Objects in Practice Block Ciphers.
Computer Science CSC 474By Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.1 Introduction to Cryptography.
FHSS vs. DSSS Presented by Ali Alhajhouj. Presentation Outline Introduce the issues involved in the system behaviors for FHSS and DSSS systems used in.
Cryptography1 CPSC 3730 Cryptography Chapter 6 Triple DES, Block Cipher Modes of Operation.
Introduction to Cryptography and Security Mechanisms: Unit 5 Theoretical v Practical Security Dr Keith Martin McCrea
Point-to-Point Privacy Protect the privacy of a point-to-point communication between Alice and Bob assuming that an eavesdropper (Eve) has access to the.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 5 Wenbing Zhao Department of Electrical and Computer Engineering.
Computer Networking Lecture 21: Security and Cryptography Thanks to various folks from , semester’s past and others.
Lecture 23 Symmetric Encryption
1 CMPT 371 Data Communications and Networking Spread Spectrum.
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
On Error Preserving Encryption Algorithms for Wireless Video Transmission Ali Saman Tosun and Wu-Chi Feng The Ohio State University Department of Computer.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Practical Techniques for Searches on Encrypted Data Yongdae Kim Written by Song, Wagner, Perrig.
Techniques for Transmission Security via Fast Hopping in the Time-Frequency Grid PI’s: Eli Yablanovich Rick Wesel Ingrid Verbauwhede Ming Wu Bahram Jalali.
Lecture 2 Overview.
Dr. Khalid A. Kaabneh Amman Arab University
CS 640: Introduction to Computer Networks Aditya Akella Lecture 5 - Encoding and Data Link Basics.
Network Security. Cryptography Cryptography functions Secret key (e.g., DES) Public key (e.g., RSA) Message digest (e.g., MD5) Security services Privacy:
Códigos y Criptografía Francisco Rodríguez Henríquez A Short Introduction to Stream Ciphers.
A Unified Understanding of the Many Forms of Optical Code Division Multiplexing Eli Yablonovitch Rick Wesel Bahram Jalali Ming Wu Ingrid Verbauwhede Can.
One-Time Pad Or Vernam Cipher Sayed Mahdi Mohammad Hasanzadeh Spring 2004.
Chapter 20 Symmetric Encryption and Message Confidentiality.
DNA Computing BY DIVYA TADESERA. Contents  Introduction  History and its origin  Relevancy of DNA computing in 1. Hamilton path problem(NP problem)
Information Security Lab. Dept. of Computer Engineering 182/203 PART I Symmetric Ciphers CHAPTER 7 Confidentiality Using Symmetric Encryption 7.1 Placement.
Chapter 20 Symmetric Encryption and Message Confidentiality.
1 A Randomized Space-Time Transmission Scheme for Secret-Key Agreement Xiaohua (Edward) Li 1, Mo Chen 1 and E. Paul Ratazzi 2 1 Department of Electrical.
Network Security David Lazăr.
V0.0CPSC415 Biometrics and Cryptography1 Placement of Encryption Function Lecture 3.
Data Encryption Standard (DES) © 2000 Gregory Kesden.
CRYPTANALYSIS OF STREAM CIPHER Bimal K Roy Cryptology Research Group Indian Statistical Institute Kolkata.
Public / Private Keys was a big year… DES: Adopted as an encryption standard by the US government. It was an open standard. The NSA calls it “One.
NEW DIRECTIONS IN CRYPTOGRAPHY Made Harta Dwijaksara, Yi Jae Park.
1 Security for distributed wireless sensor nodes Ingrid Verbauwhede Department of Electrical Engineering University of California Los Angeles
Lecture 23 Symmetric Encryption
DES Analysis and Attacks CSCI 5857: Encoding and Encryption.
Uncoordinated Optical Multiple Access using IDMA and Nonlinear TCM PIs: Eli Yablanovitch, Rick Wesel, Ingrid Verbauwhede, Bahram Jalali, Ming Wu Students.
Transmission Security via Fast Time-Frequency Hopping PI: Eli Yablanovich Co-PIs: Rick Wesel Ingrid Verbauwhede Ming Wu Bahram Jalali UCLA Electrical.
Module :MA3036NI Symmetric Encryption -3 Lecture Week 4.
Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Spread Spectrum Chapter.
Block Ciphers and the Data Encryption Standard. Modern Block Ciphers  One of the most widely used types of cryptographic algorithms  Used in symmetric.
Cluster Computers. Introduction Cluster computing –Standard PCs or workstations connected by a fast network –Good price/performance ratio –Exploit existing.
Chapter Nine: Data Transmission. Introduction Binary data is transmitted by either by serial or parallel methods Data transmission over long distances.
Design of OCDMA Demonstrator Yun Ping Yang, Alireza Hodjat, Herwin Chan, Eric Chen, Josh Conway.
หัวข้อบรรยาย Stream cipher RC4 WEP (in)security LFSR CSS (in)security.
PROJECT DOMAIN : NETWORK SECURITY Project Members : M.Ananda Vadivelan & E.Kalaivanan Department of Computer Science.
Computer and Network Security
UCLA Progress Report OCDMA Channel Coding
Transmission Security via Fast Time-Frequency Hopping
Chapter 4: Digital Transmission
Interleaver-Division Multiple Access on the OR Channel
Lec 5 Layers Computer Networks Al-Mustansiryah University
مروري برالگوريتمهاي رمز متقارن(كليد پنهان)
UCLA Electrical Engineering Department
UCLA Electrical Engineering Department
STREAM CIPHERS by Jennifer Seberry.
Security Of Wireless Sensor Networks
Block vs Stream Ciphers
Security of Wireless Sensor Networks
Uncoordinated Optical Multiple Access using IDMA and Nonlinear TCM
Presentation transcript:

Transmission Security via Fast Time-Frequency Hopping PI: Eli Yablanovich Co-PIs: Rick Wesel Ingrid Verbauwhede Ming Wu Bahram Jalali UCLA Electrical Engineering Department

Four users, each with four bits Alice’s Data: A1, A2, A3, A4 Bob’s Data:B1, B2, B3, B4 Carol’s Data:C1, C2, C3, C4 Dave’s Data:D1, D2, D3, D4

Wavelength 1 Wavelength 2 Wavelength 3 Wavelength 4 A1D2C1D4 A2C2C3B1 D1A4D3B2 C4A3B3B4 Time Random Hopping on a Time- Wavelength Grid A user appears on zero, one, or more wavelengths each symbol. Users select positions in grid in an unpredictable fashion.

Grid-to-Grid Mapping is a Switch 16  16 Switch There are 16! possible configurations of this switch. The switch configuration may be specified by log 2 (16!)=44.25 bits A1A2A3A4 B1B2B3B4 C1C2C3C4 D1D2D3D4 Bit Index Time User Wavelength A1D2C1D4 A2C2C3B1 D1A4D3B2 C4A3B3B4

Grid-to-Grid Mapping is a Switch 16  16 Switch Switch also supports 16 users on 16 wavelengths with wavelength-only hopping at a total rate of 10 Gbps. 16 Users (A-P) Wavelength

A Pipelined Switch There are 16! possible configurations (44.25 bits). There are 56 switches, but four can be fixed so that 52 bits specify the configuration. Thinking about future feasibility, for a 100  100 switch, not all switch positions need to be randomized. Code bit = 0 Code bit = 1

Four Switches Taking Turns Pat. Gen 16X16 Switch 155MHz 2.5Gbps User 1 User 2 User 3 User 4 4:1 Modulator   1:16 16:1 2.5Gbps 16X16 Switch   16X16 Switch 16X16 Switch de-Serializer Serializer 1:16 16:1 Each 16X16 switch (the blue box) runs at 155 MHz, which is ¼ times 1/16 times 10 GHz.

The Big Picture Advanced Encryption Standard Random bit generator (initially just a linear feedback shift register) We need 52 bits or 9 Gbits/sec (We can do about 20 Gbits/sec) 16  16 Switch A1A2A3A4 B1B2B3B4 C1C2C3C4 D1D2D3D4 Bit Index Time User Wavelength A1D2C1D4 A2C2C3B1 D1A4D3B2 C4A3B3B4

What Kinds of Security Are Possible? Security by Obscurity –This is no security at all. Obscurity is fleeting. Security by computational difficulty –Standardized systems like DES and AES rely on this. –Must consider attacks where plain-text is known. The one-time pad that nobody else knows –Perfect as long as the pad remains secret.

Hopping versus Spreading Our technique focuses on the addition of cryptographic security in the context of relatively straightforward frequency-hopped CDMA. Certainly, similar techniques could be applied to the other OCDMA techniques described during this meeting. However, in every case, the real security comes from (high speed) cryptographic security rather than obscure optical techniques.

Network Security Most sophisticated security techniques add security at the source only (application layer). Our technique adds security at the physical layer (or at the network layer).

Why Have Network Security? Increase the difficulty of attack, even with plaintext available. (The ciphertext of an individual stream is now difficult to receive.) Adds security with minimal latency (the latency inherent in the timespan of the permutation) because AES processing is not in the real-time path..

Synchronous vs. Asynchronous Our original vision was for a system with 100% spectral efficiency (assuming dense wavelength packing), but with synchronous operation (and a universally known key) as a requirement. However, our system concept can easily trade spectral efficiency to operate asynchronously. In this case each transmitter can have it’s own key. When overhead is low, collisions are rare, and may be handled by a light error correction code. In one scenario 5% spectral efficiency yields a 1% bit error rate that is easily handled with error correction.

Improving Multicast Throughput with Network Coding Consider a Multicast of b1 and b2 from S to R1 & R2.. Conventional “ Replicate & Forward ” Routing needs at least 2 transmission times. Linear Combination of Data at intermediate Nodes requires only one transmission time. b1b2 b1 B1` + b2 b1 + b2 R1R2 S