Project 2.A Extending NS-2 to support encryption/decryption Date: 04/07/2005 Course: CSCI 5931 Name: Sam Tran Tuan Nguyen.

Slides:



Advertisements
Similar presentations
Lecture 7 Overview. Advanced Encryption Standard 10, 12, 14 rounds for 128, 192, 256 bit keys – Regular Rounds (9, 11, 13) – Final Round is different.
Advertisements

Network Security: Lab#2 J. H. Wang Apr. 28, 2011.
Spring 2012: CS419 Computer Security Vinod Ganapathy SSL, etc.
CIS 193A – Lesson6 CRYPTOGRAPHY RAPELCGRQ. CIS 193A – Lesson6 Focus Question Which cryptographic methods help computer users maintain confidentiality,
Security at the Network Layer: IPSec
Chapter 13 IPsec. IPsec (IP Security)  A collection of protocols used to create VPNs  A network layer security protocol providing cryptographic security.
1 MD5 Cracking One way hash. Used in online passwords and file verification.
Cryptography and Authentication Lab ECE4112 Group4 Joel Davis Scott Allen Quinn.
Java Security Model Lab#1 I. Omaima Al-Matrafi. Safety features built into the JVM Type-safe reference casting Structured memory access (no pointer arithmetic)
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
HASH ALGORITHMS - Chapter 12
Wired Equivalent Privacy (WEP)
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
Encapsulation Security Payload Protocol Lan Vu. OUTLINE 1.Introduction and terms 2.ESP Overview 3.ESP Packet Format 4.ESP Fields 5.ESP Modes 6.ESP packet.
Wireless Security Presentation by Paul Petty and Sooner Brooks-Heath.
Network Security Secure hypertext transfer protocol (https) Cookies Public Key Cryptography.
Lecture 13 Message Signing
Chapter 3 Encryption Algorithms & Systems (Part C)
Feb 19, 2002Mårten Trolin1 Previous lecture Practical things about the course. Example of cryptosystem — substitution cipher. Symmetric vs. asymmetric.
Decryption Algorithms Characterization Project ECE 526 spring 2007 Ravimohan Boggula,Rajesh reddy Bandala Southern Illinois University Carbondale.
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
Encryption Methods By: Michael A. Scott
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Csci5233 Computer Security1 GS: Chapter 5 Asymmetric Encryption in Java.
Hybrid Cipher encryption Plain Text Key Cipher Text Key Plain Text IV Hybrid Cipher decryption Hybrid Cipher Note: IV used in encryption is not used in.
Creating an IPsec VPN using IOS command syntax. What is IPSec IPsec, Internet Protocol Security, is a set of protocols defined by the IETF, Internet Engineering.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
.Net Security and Performance -has security slowed down the application By Krishnan Ganesh Madras.
By: Kirti Chawla. Introduction Classification Algorithms Vis-à-Vis Looking back What is a Cipher or Crypto-algorithm ? A method or system for transforming.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
Dan Johnson. What is a hashing function? Fingerprint for a given piece of data Typically generated by a mathematical algorithm Produces a fixed length.
S. Muftic Computer Networks Security 1 Lecture 4: Message Confidentiality and Message Integrity Prof. Sead Muftic.
Feistel Model Last Updated: Aug 27, Feistel Cipher Structure Described by Horst Feistel (IBM) in 1973 Many symmetric encryption algorithms use this.
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
Review of basic cryptographically algorithm Asymmetric encoding (Private and Public Keys), Hash Function, Digital Signatures and Certification.
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
Improving Encryption Algorithms Betty Huang Computer Systems Lab
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 Module 3 City College of San.
WEP AND WPA by Kunmun Garabadu. Wireless LAN Hot Spot : Hotspot is a readily available wireless connection.  Access Point : It serves as the communication.
Network Security David Lazăr.
Feb 17, 2003Mårten Trolin1 Previous lecture Practical things about the course. Example of cryptosystem — substitution cipher. Symmetric vs. asymmetric.
DRKH: A Power Efficient Encryption Protocol for Wireless Devices El Shibani Omar Hamdan Alzahrani.
Public Key Encryption.
TinySec : Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof :: Naveen Sastry :: David Wagner Presented by Anil Karamchandani 10/01/2007.
無線網路安全 WEP. Requirements of Network Security Information Security Confidentiality Integrity Availability Non-repudiation Attack defense Passive Attack.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 29 Internet Security.
TCP/IP Protocol Suite 1 Chapter 30 Security Credit: most slides from Forouzan, TCP/IP protocol suit.
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
By Sandeep Gadi 12/20/  Design choices for securing a system affect performance, scalability and usability. There is usually a tradeoff between.
FPGA Implementation of RC6 including key schedule Hunar Qadir Fouad Ramia.
Network Security. Three tools Hash Function Block Cipher Public Key / Private Key.
Computer Security coursework 3 Dr Alexei Vernitski.
Network Security Celia Li Computer Science and Engineering York University.
System Security: Cryptography Technologies CPE Operating Systems
Network Security: Lab#2 J. H. Wang Oct. 9, Objectives To learn to use message digests –MD5 To learn to use secure hash functions –SHA-1, SHA-2 To.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
Encryption and Security Tools for IA Management Nick Hornick COSC 481 Spring 2007.
CENG 3331 Introduction to Telecommunications and Networks.
Maninda Edirisooriya. Introduction Extension for Google Chrome. Privacy protection system for online chat. Encrypts chat text using 128 bit AES. Decrypts.
VPNs and IPSec Review VPN concepts Encryption IPSec Lab.
Encryption. Encryption Basics • Plaintext - the original message ABCDEFG • Ciphertext - the coded message DFDFSDFSD • Cipher - algorithm for.
Data Encryption Standard
An N-tier web application
MIDP Application Security
VPNs and IPSec Review VPN concepts Encryption IPSec Lab.
Analysis of the RSA Encryption Algorithm
Hashing Hash are the auxiliary values that are used in cryptography.
Presentation transcript:

Project 2.A Extending NS-2 to support encryption/decryption Date: 04/07/2005 Course: CSCI 5931 Name: Sam Tran Tuan Nguyen

Extending NS-2 to support encryption/decryption 1.Abstract 2.Approach 3.How to add new security features in NS-2 4.General design encryption/decryption in NS-2 5.Implementation 6.Simple demonstration 7.Conclusion 8.References

1. Abstract Implementation of security on NS-2 is necessary in network simulation. However, currently, NS-2 does not support these features. Our project will aim to solve this issue.

2. Approach NS-2 is open source network simulation application. NS-2 currently supports IP protocol suite and various standard routing protocols for wire and wireless network. To add security functions. We have to modify/build new packet formats.

3. Add new security features in NS-2 Define a new packet format. Derive new class from Agent class for processing this new packet format. Processing includes: –Encrypting function. –Decrypting function. –Message digest generation function. –E.t.c

4. General design flow for security packet in NS-2 Figure1: Steps to add new packet to NS-2 and testing results

5. Implementation Figure 2: Logical design of the encryption/decryption system

Hash function –Polynomial Algorithm. Encryption function –Input: String of plain text –Algorithm: CESAR cipher with pre-shared key of 3 –Output: Encrypted text. Decryption function –Input: string of encrypted text –Algorithm: CESAR cipher with pre-shared key of 3 –Output: decrypted text. 5. Implementation (cont.)

6. Simple demonstration Figure 3: Outcome of simple demonstration script.

7. Conclusion The project shows a method to add security functions into NS-2. With this approach, we can build standard security components into NS-2 using industrial standard algorithm such as SHA- 1, MD5 for hash function and DES,3DES and AES for encryption/decryption. Project can be extended to support asymmetric key encryption/decryption.

8. References Marc Greis (2005). Tutorial for the network simulator ns. Retrieved 3/28/05 from: Free Information Society (2005). Hash Table Class. Retrieved 4/4/05 from: ams/cpp/hashtable.h ams/cpp/hashtable.h Jess Garms, Daniel Somerfield (2001). Professional Java Security. ISBN Hash function implemented in C++ with polynomial algorithm. Retrieved 4/14/05 from ion ion