Secure Systems Design Ramesh Karri Office Hours: Tues/Wed/Thurs: 12:00- 1:30 in LC 001

Slides:



Advertisements
Similar presentations
DES The Data Encryption Standard (DES) is a classic symmetric block cipher algorithm. DES was developed in the 1970’s as a US government standard The block.
Advertisements

Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
“Advanced Encryption Standard” & “Modes of Operation”
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
1 CIS 5371 Cryptography 5b. Pseudorandom Objects in Practice Block Ciphers.
Digital Kommunikationselektroink TNE027 Lecture 6 (Cryptography) 1 Cryptography Algorithms Symmetric and Asymmetric Cryptography Algorithms Data Stream.
Computer Science CSC 474By Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.1 Introduction to Cryptography.
Symmetric Encryption Example: DES Weichao Wang. 2 Overview of the DES A block cipher: – encrypts blocks of 64 bits using a 64 bit key – outputs 64 bits.
Block Ciphers: Workhorses of Cryptography COMP 1721 A Winter 2004.
Chapter 5 Cryptography Protecting principals communication in systems.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Introduction to Symmetric Block Cipher Jing Deng Based on Prof. Rick Han’s Lecture Slides Dr. Andreas Steffen’s Security Tutorial.
Cryptography April 20, 2010 MIS 4600 – MBA © Abdou Illia.
Dr Alejandra Flores-Mosri Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the.
Lecture 23 Symmetric Encryption
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Scan Based Attack on Dedicated Hardware Implementation of Data Encryption Standard Bo Yang ECE Dept Polytechnic Univ Kaijie Wu ECE Dept Univ of Illinois.
Decryption Algorithms Characterization Project ECE 526 spring 2007 Ravimohan Boggula,Rajesh reddy Bandala Southern Illinois University Carbondale.
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
Network Security Chapter
Encryption Methods By: Michael A. Scott
Network Security Sorina Persa Group 3250 Group 3250.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
Dr. Khalid A. Kaabneh Amman Arab University
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (1) Information Security.
Introduction to Stream Cipher Sayed Mahdi Mohammad Hasanzadeh Spring 2004.
每时每刻 可信安全 1The DES algorithm is an example of what type of cryptography? A Secret Key B Two-key C Asymmetric Key D Public Key A.
Chapter 20 Symmetric Encryption and Message Confidentiality.
LOGO Hardware side of Cryptography Anestis Bechtsoudis Patra 2010.
TE/CS 536 Network Security Spring 2006 – Lectures 6&7 Secret Key Cryptography.
Chapter 20 Symmetric Encryption and Message Confidentiality.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Cryptography Chapter 7 Part 2 Pages 781 to 812. Symmetric Cryptography Secret Key Figure 7-10 on page 782 Key distribution problem – Secure courier Many.
Network Security David Lazăr.
Chapter 9: Algorithms Types and Modes Dulal C. Kar Based on Schneier.
BLOCK CIPHER SYSTEMS OPERATION MODES OF DATA ENCRYPTION STANDARD (DES)
Dr. Reuven Aviv, Nov 2008 Conventional Encryption 1 Conventional Encryption & Message Confidentiality Acknowledgements for slides Henric Johnson Blekinge.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
Modes of Usage Dan Fleck CS 469: Security Engineering These slides are modified with permission from Bill Young (Univ of Texas) 11 Coming up: Modes of.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
Lecture 2: Introduction to Cryptography
Lecture 23 Symmetric Encryption
TCP/IP Protocol Suite 1 Chapter 30 Security Credit: most slides from Forouzan, TCP/IP protocol suit.
1 Symmetric key cryptography: DES DES: Data Encryption Standard US encryption standard [NIST 1993] 56-bit symmetric key, 64 bit plaintext input How secure.
Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.
Security fundamentals Topic 4 Encryption. Agenda Using encryption Cryptography Symmetric encryption Hash functions Public key encryption Applying cryptography.
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Chapter 2 Symmetric Encryption.
Cipher Transmission and Storage Modes Part 2: Stream Cipher Modes CSCI 5857: Encoding and Encryption.
Wired Equivalent Privacy (WEP) Chris Overcash. Contents What is WEP? What is WEP? How is it implemented? How is it implemented? Why is it insecure? Why.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
CST 312 Pablo Breuer. A block of plaintext is treated as a whole and used to produce a ciphertext block of equal length Typically a block size of 64 or.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
1 CPCS425: Information Security (Topic 5) Topic 5  Symmetrical Cryptography  Understand the principles of modern symmetric (conventional) cryptography.
Symmetric Cryptography
Cryptography Basics and Symmetric Cryptography
مروري برالگوريتمهاي رمز متقارن(كليد پنهان)
Presentation transcript:

Secure Systems Design Ramesh Karri Office Hours: Tues/Wed/Thurs: 12:00- 1:30 in LC 001

Security and Privacy Data confidentiality Data confidentiality Data integrity Data integrity Authentication Authentication Non-repudiation Non-repudiation Applications Applications smartcards, securid, smart tokens, GSM SIM etc… smartcards, securid, smart tokens, GSM SIM etc… VPN Gateways, Secure Routers, …. VPN Gateways, Secure Routers, …. Cryptography is the fundamental building block Cryptography is the fundamental building block

Data confidentiality Symmetric block ciphers Symmetric block ciphers Encrypt (plaintext block, key)= ciphertext block Encrypt (plaintext block, key)= ciphertext block Decrypt (ciphertext block, key)= plaintext block Decrypt (ciphertext block, key)= plaintext block Encryption key = Decryption key Encryption key = Decryption key Advanced Encryption Standard (AES)Advanced Encryption Standard (AES) 128-bit plaintext block, 128-bit secret key 128-bit plaintext block, 128-bit secret key Stream ciphers Stream ciphers Key stream generator; encryption is a simple xor operationKey stream generator; encryption is a simple xor operation Cipher feedback mode of AES etc..Cipher feedback mode of AES etc.. Output feedback mode of AES etc..Output feedback mode of AES etc..

Symmetric Block Cipher

Data Integrity Message authentication code Message authentication code Detect modification to messagesDetect modification to messages Cipher block chaining mode of AES,DESCipher block chaining mode of AES,DES

Design of High Speed Encryption Devices Message Authentication Codes Message Authentication Codes Previous: 600 MbpsPrevious: 600 Mbps Our research: GbpsOur research: Gbps 2004 IEEE DAC/ISSSC Best Design Contest, 3 rd Prize2004 IEEE DAC/ISSSC Best Design Contest, 3 rd Prize Ongoing research: Encryption and its various modes of operation Ongoing research: Encryption and its various modes of operation Arbitrary Block LengthArbitrary Block Length Authenticated EncryptionAuthenticated Encryption Opportunity to make a dramatic impactOpportunity to make a dramatic impact

Testing of Encryption Devices Are secure against mathematics based attacks Are secure against mathematics based attacks Differential CryptanalysisDifferential Cryptanalysis Linear CryptanalysisLinear Cryptanalysis Are not secure against implementation attacks Are not secure against implementation attacks Differential Power analysisDifferential Power analysis Differential Timing analysisDifferential Timing analysis Differential Fault analysisDifferential Fault analysis Our research: Design against DFA Our research: Design against DFA Developed a patented techniqueDeveloped a patented technique Alexander Von Humboldt FellowshipAlexander Von Humboldt Fellowship Working on several new techniques (extremely low cost)Working on several new techniques (extremely low cost)

Reverse Engineering Encryption Device Implementations Scan chains based attack Scan chains based attack DES, AES, etc… DES, AES, etc… Secure hardware design methodology Secure hardware design methodology Break AES encryption algorithm using a combination of mathematical analysis and side channel information Break AES encryption algorithm using a combination of mathematical analysis and side channel information Become famous Become famous

Contact Bo Yang, Nikhil Joshi or Ramesh Karri in LC 001 (basement) Contact Bo Yang, Nikhil Joshi or Ramesh Karri in LC 001 (basement)