Presentation is loading. Please wait.

Presentation is loading. Please wait.

Advanced Block Cipher Characteristic. Introduction Published by NIST in 2001 Developed to overcome bottleneck of 3DES Block length is of 128 bits Key.

Similar presentations


Presentation on theme: "Advanced Block Cipher Characteristic. Introduction Published by NIST in 2001 Developed to overcome bottleneck of 3DES Block length is of 128 bits Key."— Presentation transcript:

1 Advanced Block Cipher Characteristic

2 Introduction Published by NIST in 2001 Developed to overcome bottleneck of 3DES Block length is of 128 bits Key length is of 128,192 and 256 bits Standard Symmetric Key Block Cipher Algo.

3 Characteristics General Security Uses S-Box as a nonlinear Components Software Implementations High performance due to parallelism Executes on variety of platform No of round decrease so speed is incresed Restricted-space Environments For S-Boxes pre-computation or Boolean representation is used Very Low ROM and RAM requirement

4 Cont… Hardware Implementations Throughput is unaffected with highest Key size Attacks on Implementations Masking technique is used to defend timing attack and power attack Encryption versus Decryptions Key setup performance is slower than encryption for decryption Key ability One time execution of the key schedule to generate all subkeys

5 Conventional Encryption Issues Traffic Distribution Random Number Generation Key Distribution

6 Traffic Distribution Traffic Analysis is require Two ways to Analyze Traffic Traffic Analysis Attack Knowledge about message length Covert Channel

7 Traffic Analysis Attack Identities of Partners ( Authentication of Partners) Frequency of Communication between Partners Message Pattern Message Length Quantity of Message Identify special conversion between sender and receiver

8 Covert Channel Identify traffic by Traffic patter which is responsible to create covert channel Unwanted Channel and not designed by network designer Responsible for Security attack Example: Unwanted message passing by employee to outside person and management do not get identity about this communication

9 Link Encryption Approach Network layer headers are encrypted (packet header is encrypted) which reduced opportunities for traffic analysis End to end traffic is still unprotected To avoid above attack Traffic pading is used

10 Traffic Padding Encryption Encryption Algorithm Continuous random data generator Discontinuous Plain Text Input Continuous Cipher Text

11 End to End Encryption Approach Encryption implemented at Transport layer or Application layer Network layer traffic is unprotected and attacker can access it To avoid above attack padding is used Padding is apply to data units to maintain uniformity at either transport layer or application layer Null message can be inserted randomly into stream

12 Key Distribution If A is Sender and B is receiver then A can select key and physically deliver to B A third-party can select the key and physically deliver it to A and B If A and B have previously and recently used a key, one party can transmit the new key to the other, encrypted using the old key If A and B each has an encrypted connection to a third party C, then C can deliver a key on the encrypted links to A and B.

13 Key Hierarchy Model DATA Session Key Master Key

14 Key Distribution Scenario KDC Initiator A Responder B ID A ||ID B ||N 1 E(Ka,[Ks||ID A ||ID B ||N 1 ])||E(Kb,[Ks, ID A ]) E(Kb,[Ks, ID A ]) E(Ks,N2) E(Ks,f(N2))

15 Transparent Key Control Known as automatic key distribution scheme Provide end-to-end encryption at a network layer and transport layer Used for connection-oriented end to end protocol (TCP) SSM (Session Security Module) is responsible for key control

16 Automatic Key Distribution Scheme Sender host Transmits a connection request packet to SSM SSM saves packet and applies to KDC for Permission to create connection Communication between KDC and SSM is encrypted by Master Key, If KDC approved connection request it generates session key and delivers it to Two appropriate SSM The Requesting SSM can now release connection request packet and connection is set up between two end systems

17 Automatic Key Distribution Scheme KDC Application SSM Application SSM HOST

18 Decentralized Key Control Sender request to Receiver for a session Key and includes nonce N1 Receiver responds with encrypted message by shared master key which includes session key selected by receiver, an identifier of receiver and F(N1), and another nonce N2. Using the New session key Sender returns F(N2) to B.

19 Decentralized Key Control Sender A Receiver B IDA || N1 E(Km,[Ks||ID A ||ID B ||f(N 1 ) ||N2]) E(Ks, f(N2))

20 Controlling Key Usage Key Usage controlled by two techniques Automated key distribution Key distribution done according to application Data encrypting key for general communication in network PIN encrypting key for Personal Identification numbers File encrypting key for file storage and public accessible locations Control vector Encryption and Decryption More flexible scheme Control vector coupled with key at the time of key generation

21 Control Vector Encryption Control Vector Hash function Master Key Session Key + Encryption Function Encrypted Session Key

22 Control Vector Encryption Control Vector Hash function Master Key Encrypted Session Key + Decryption Function Session Key

23 Random Number Generator Random Number is used Reciprocal authentication schemes as a feedback in form of nonces (nonces are used for handshaking) Used for session key generation Two type of Generator Randomness Two Criterai Uniform distribution Indepedence Unpredictability Each number is statistically independent to other

24 Pseudorandom Number Generators The algorithm which is responsible to generate sequence of numbers which are not statistically random are known as pseudorandom number generator For this type of numbers different tests are performed for randomness

25 Linear Congruential Generators Pseudorandom number generator technique Proposed by Lehmer The sequence of random number is generated by ; X n+1 = (a X n + c) mod m Where, X 0 – starting value0<= X 0 <m a - the multiplier0<a<m c - the increment0<=c <m m – the modulusm>0

26 Pseudorandom Number Generator from a counter C C + 1 Encryption algo Xi = E[Km, C+1] Master Key Km Counter with N increment


Download ppt "Advanced Block Cipher Characteristic. Introduction Published by NIST in 2001 Developed to overcome bottleneck of 3DES Block length is of 128 bits Key."

Similar presentations


Ads by Google