Transmission Security via Fast Time-Frequency Hopping PI: Eli Yablanovich Co-PIs: Rick Wesel Ingrid Verbauwhede Ming Wu Bahram Jalali UCLA Electrical.

Slides:



Advertisements
Similar presentations
Transmission Security via Fast Time-Frequency Hopping PI: Eli Yablanovich Co-PIs: Rick Wesel Ingrid Verbauwhede Ming Wu Bahram Jalali UCLA Electrical.
Advertisements

“Advanced Encryption Standard” & “Modes of Operation”
Spread Spectrum Chapter 7.
Spread Spectrum Chapter 7. Spread Spectrum Input is fed into a channel encoder Produces analog signal with narrow bandwidth Signal is further modulated.
Modern Symmetric-Key Ciphers
Modern Symmetric-Key Ciphers
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
1 Lecture 3: Secret Key Cryptography Outline concepts DES IDEA AES.
1 CIS 5371 Cryptography 5b. Pseudorandom Objects in Practice Block Ciphers.
Computer Science CSC 474By Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.1 Introduction to Cryptography.
FHSS vs. DSSS Presented by Ali Alhajhouj. Presentation Outline Introduce the issues involved in the system behaviors for FHSS and DSSS systems used in.
Introduction to Cryptography and Security Mechanisms: Unit 5 Theoretical v Practical Security Dr Keith Martin McCrea
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
Point-to-Point Privacy Protect the privacy of a point-to-point communication between Alice and Bob assuming that an eavesdropper (Eve) has access to the.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 5 Wenbing Zhao Department of Electrical and Computer Engineering.
Computer Networking Lecture 21: Security and Cryptography Thanks to various folks from , semester’s past and others.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Ref: STAL03More Concepts of Cryptography and Cryptanalysis 1 Reference –William Stallings, Cryptography and Network Security, 3rd Edition, Prentice Hall.
Lecture 23 Symmetric Encryption
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
Computer Security CS 426 Lecture 3
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Practical Techniques for Searches on Encrypted Data Yongdae Kim Written by Song, Wagner, Perrig.
DNSSEC Cryptography Review Track 2 Workshop July 3, 2010 American Samoa Hervey Allen.
Techniques for Transmission Security via Fast Hopping in the Time-Frequency Grid PI’s: Eli Yablanovich Rick Wesel Ingrid Verbauwhede Ming Wu Bahram Jalali.
Lecture 2 Overview.
Dr. Khalid A. Kaabneh Amman Arab University
Network Security. Cryptography Cryptography functions Secret key (e.g., DES) Public key (e.g., RSA) Message digest (e.g., MD5) Security services Privacy:
Códigos y Criptografía Francisco Rodríguez Henríquez A Short Introduction to Stream Ciphers.
A Unified Understanding of the Many Forms of Optical Code Division Multiplexing Eli Yablonovitch Rick Wesel Bahram Jalali Ming Wu Ingrid Verbauwhede Can.
One-Time Pad Or Vernam Cipher Sayed Mahdi Mohammad Hasanzadeh Spring 2004.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
IEEE Wireless LAN Standard
Information Security Lab. Dept. of Computer Engineering 182/203 PART I Symmetric Ciphers CHAPTER 7 Confidentiality Using Symmetric Encryption 7.1 Placement.
Lecture 4: Using Block Ciphers
Chapter 20 Symmetric Encryption and Message Confidentiality.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
1 A Randomized Space-Time Transmission Scheme for Secret-Key Agreement Xiaohua (Edward) Li 1, Mo Chen 1 and E. Paul Ratazzi 2 1 Department of Electrical.
Network Security David Lazăr.
1.1 Chapter 8 Encipherment Using Modern Symmetric-Key Ciphers Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
CRYPTANALYSIS OF STREAM CIPHER Bimal K Roy Cryptology Research Group Indian Statistical Institute Kolkata.
Public / Private Keys was a big year… DES: Adopted as an encryption standard by the US government. It was an open standard. The NSA calls it “One.
CRYPTOGRAPHY & NETWORK SECURITY Introduction and Basic Concepts Eng. Wafaa Kanakri Computer Engineering Umm Al-Qura University.
NEW DIRECTIONS IN CRYPTOGRAPHY Made Harta Dwijaksara, Yi Jae Park.
WEP – Wireless Encryption Protocol A. Gabriel W. Daleson CS 610 – Advanced Security Portland State University.
Lecture 23 Symmetric Encryption
Wireless. Wireless hosts: end system devices; may or may not be mobile Wireless links: A host connects to a base station or host through a communication.
DES Analysis and Attacks CSCI 5857: Encoding and Encryption.
Uncoordinated Optical Multiple Access using IDMA and Nonlinear TCM PIs: Eli Yablanovitch, Rick Wesel, Ingrid Verbauwhede, Bahram Jalali, Ming Wu Students.
Network Security Lecture 3 Secret Key Cryptography
Module :MA3036NI Symmetric Encryption -3 Lecture Week 4.
Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Spread Spectrum Chapter.
Block Ciphers and the Data Encryption Standard. Modern Block Ciphers  One of the most widely used types of cryptographic algorithms  Used in symmetric.
Software Security Seminar - 1 Chapter 10. Using Algorithms 발표자 : 이장원 Applied Cryptography.
Design of OCDMA Demonstrator Yun Ping Yang, Alireza Hodjat, Herwin Chan, Eric Chen, Josh Conway.
หัวข้อบรรยาย Stream cipher RC4 WEP (in)security LFSR CSS (in)security.
CS480 Cryptography and Information Security
Computer and Network Security
Transmission Security via Fast Time-Frequency Hopping
Chapter 4: Digital Transmission
Interleaver-Division Multiple Access on the OR Channel
UCLA Electrical Engineering Department
UCLA Electrical Engineering Department
STREAM CIPHERS by Jennifer Seberry.
Block vs Stream Ciphers
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
Uncoordinated Optical Multiple Access using IDMA and Nonlinear TCM
Presentation transcript:

Transmission Security via Fast Time-Frequency Hopping PI: Eli Yablanovich Co-PIs: Rick Wesel Ingrid Verbauwhede Ming Wu Bahram Jalali UCLA Electrical Engineering Department

Four users, each with four bits Alice’s Data: A1, A2, A3, A4 Bob’s Data:B1, B2, B3, B4 Carol’s Data:C1, C2, C3, C4 Dave’s Data:D1, D2, D3, D4

Wavelength 1 Wavelength 2 Wavelength 3 Wavelength 4 A1D2C1D4 A2C2C3B1 D1A4D3B2 C4A3B3B4 Time Random Hopping on a Time- Wavelength Grid A user appears on zero, one, or more wavelengths each symbol. Users select positions in grid in an unpredictable fashion.

Grid-to-Grid Mapping is a Switch 16  16 Switch There are 16! possible configurations of this switch. The switch configuration may be specified by log 2 (16!)=44.25 bits A1A2A3A4 B1B2B3B4 C1C2C3C4 D1D2D3D4 Bit Index Time User Wavelength A1D2C1D4 A2C2C3B1 D1A4D3B2 C4A3B3B4

Grid-to-Grid Mapping is a Switch 16  16 Switch Switch also supports 16 users on 16 wavelengths with wavelength-only hopping at a total rate of 10 Gbps. 16 Users (A-P) Wavelength

A Pipelined Switch There are 16! possible configurations (44.25 bits). There are 56 switches, but four can be fixed so that 52 bits specify the configuration. Thinking about future feasibility, for a 100  100 switch, not all switch positions need to be randomized. Code bit = 0 Code bit = 1

Four Switches Taking Turns Pat. Gen 16X16 Switch 155MHz 2.5Gbps User 1 User 2 User 3 User 4 4:1 Modulator   1:16 16:1 2.5Gbps 16X16 Switch   16X16 Switch 16X16 Switch de-Serializer Serializer 1:16 16:1 Each 16X16 switch (the blue box) runs at 155 MHz, which is ¼ times 1/16 times 10 GHz.

The Big Picture Advanced Encryption Standard Random bit generator (initially just a linear feedback shift register) We need 52 bits or 9 Gbits/sec (We can do about 20 Gbits/sec) 16  16 Switch A1A2A3A4 B1B2B3B4 C1C2C3C4 D1D2D3D4 Bit Index Time User Wavelength A1D2C1D4 A2C2C3B1 D1A4D3B2 C4A3B3B4

What Kinds of Security Are Possible? Security by Obscurity –This is no security at all. Obscurity is fleeting. Security by computational difficulty –Standardized systems like DES and AES rely on this. –Must consider attacks where plain-text is known. The one-time pad that nobody else knows –Perfect as long as the pad remains secret.

Hopping versus Spreading Our technique focuses on the addition of cryptographic security in the context of relatively straightforward frequency-hopped CDMA. Certainly, similar techniques could be applied to the other OCDMA techniques described during this meeting. However, in every case, the real security comes from (high speed) cryptographic security rather than obscure optical techniques.

Network Security Most sophisticated security techniques add security at the source only (application layer). Our technique adds security at the physical layer (or at the network layer).

Why Have Network Security? Increase the difficulty of attack, even with plaintext available. (The ciphertext of an individual stream is now difficult to identify.) Adds security with minimal latency (the latency inherent in the timespan of the permutation) because AES processing is not in the real-time path..

Synchronous vs. Asynchronous Our original vision was for with synchronous operation (and a universally known key) as a requirement. However, our system concept can trade spectral efficiency to operate asynchronously. Example: Sixty wavelengths but still using only sixteen of the two hundred forty available slots, each transmitter can have it’s own key. Collisions lead to a bit error rate of.1%. Reed Solomon error correction brings FER to well below

Effect of Error Control