SlideShare uma empresa Scribd logo
1 de 20
Network & Application Security
(NAS)
AUTHENTICATED ENCRYPTION
S AM A N T K H AJ U R I A
A S S I S T A N T P R O F E S S O R , C M I
S K H @ C M I . A A U . D K
Computer security objectives
• Confidentiality
• Data Confidentiality: Assures that private or confidential information is not made
available or disclosed to unauthorized users.
• Privacy: Assures that individuals control or influence what information related to them
may be collected and stored and by whom and to whom that information may be disclosed.
• Integrity
• Data integrity: Assures that information and programs are changed only in a specified and
authorized manner
• System integrity: Assures that a system performs its intended function in an unimpaired
manner, free from deliberate or inadvertent unauthorized manipulation of the system
• Availability
• Assures that the system work promptly and service is not denied to authorized users
Additional Concepts / Objectives
• Authenticity
• Property of being genuine ; able to be verified and trusted
• Confidence in the validity of a message or message originator
• Meaning – Verifying that the users are who they say they are and each
transmission arriving at the system came from a trusted party.
• Accountability
• The security goal that generates the requirements for actions of an entity to be
traced uniquely to that entity
• Supports – nonrepudiation, fault isolation, intrusion detection and prevention,
and after action recovery and legal action
Symmetric Encryption
• Also referred to as conventional encryption, secret-key, or single-key
encryption.
• Only type of encryption in use prior to the development of public-key
encryption in the late 1970’s.
• Symmetric encryption remains by far the most widely used of the two
types of encryption.
• All classical encryption algorithms are private-key
• Common key is used by sender and recipient
Simplified Model of Symmetric Encryption
Requirements
• Two requirements for secure use of algorithm
• A STRONG Encryption algorithm
• Both the parties i.e., Sender and the receiver have obtained the copy of the secret key in a secure
fashion and must keep the key secure
• IMPORTANT !!! The security of symmetric encryption depends on the secrecy of
the key, not the secrecy of the algorithm
• Practical reasons – makes it feasible for widespread use.
• Manufacturers can and have developed low-cost chip implementations of data encryption
algorithms.
• These chips are widely available and incorporated into a number of products.
Cryptography
• Cryptographic systems are generically classified along three independent dimensions:
• The type of operations used for transforming plaintext to ciphertext
• Substitution - Each element in the plaintext is mapped into another element
• Transposition - Elements in the plaintext are rearranged ; Fundamental requirement is that no information be lost
• Product systems - Involve multiple stages of substitutions and transpositions
• The number of keys used
• Referred to as symmetric, single-key, secret-key, or conventional encryption if both sender and receiver use the same
key
• Referred to as asymmetric, two-key, or public-key encryption if the sender and receiver each use a different key
• The way in which the plaintext is processed
• Block cipher processes the input one block of elements at a time, producing an output block for each input block
• Stream cipher processes the input elements continuously, producing output one element at a time, as it goes along
Advanced Encryption Standard (AES)
AES
• Symmetric, block cipher
• Key size: 128, 192, or 256 bits
• Block size: 128
• Processed as 4 groups of 4 bytes (state)
• Operates on the entire block in every round
• Number of rounds depending on key size:
• Key=128 -> 9 rounds
• Key=192 -> 11 rounds
• Key=256 -> 13 rounds
Cipher Block Modes of Operation
Cipher block Modes of Operation
• A symmetric block cipher processes one block of data at a time
• In the case of DES and 3DES, the block length is b=64 bits
• For AES, the block length is b=128
• For longer amounts of plaintext, it is necessary to break the plaintext into b-
bit blocks, padding the last block if necessary
• Five modes of operation have been defined by NIST
• Intended to cover virtually all of the possible applications of encryption for
which a block cipher could be used
• Intended for use with any symmetric block cipher, including triple DES and
AES
Cipher Feedback (CFB)
Block Cipher Block Cipher Block Cipher
Plaintext 1 Plaintext 2 Plaintext n
Ciphertext 1 Ciphertext 2 Ciphertext n
Initialization Vector (IV)
Block Cipher Block Cipher Block Cipher
Plaintext 1
Ciphertext 2Ciphertext 1
Plaintext 2 Plaintext n
Initialization Vector (IV)
Ciphertext n
DECRYPTENCRYPT
ASC-1 : An Authenticated Encryption Stream
Cipher
Algorithm Analysis & Development
• Authenticated Encryption
• Generic Composition
• Two Pass Combined mode
• One pass Combined mode
• Cryptographic schemes that provide both confidentiality and
authenticity are called authenticated encryption schemes.
• AE consists of a key generation, an encryption and a decryption
algorithm.
Generic Composition
• Traditional approach to solve both privacy and authenticity problems has been to combine them
in a straightforward manner.
• Results – Not very efficient, twice as slow as either encryption or authentication.
• Pitfalls –
• Use of non-cryptographic non-keyed hash function and good encryption scheme
• Use of same key for encryption scheme and the MAC scheme .
• To analyze the security of the Authenticated Encryption Scheme three “Generic Composition”
methods are considered.
• Black Box use of a given symmetric encryption scheme and a given MAC
• Each case uses two different keys i.e., K1 and K2
ASC-1 : An Authenticated Encryption Stream
Cipher
• To achieve faster encryption and message authentication by performing
both in a single pass as opposed to the traditional encrypt-then-mac
approach
• Similar to LEX (Leak EXtraction) stream cipher selected to phase 3 of the
eSTREAM competition, ASC-1 uses leak extraction
• Bits are extracted from intermediate rounds to generate the key that is
XOR-ed with the message to compute the ciphertext.
• Operates in a Cipher Feedback (CFB) fashion
Leak Positions in ASC-1
• Crucial part – location of the four bytes of the internal state
• Frequency of outputs (every round, every second round etc.)
b0,0 b0,1 b0,2 b0,3
b1,0 b1,1 b1,2 b1,3
b2,0 b2,1 b2,2 b2,3
b3,0 b3,1 b3,2 b3,3
b0,0 b0,1 b0,2 b0,3
b1,0 b1,1 b1,2 b1,3
b2,0 b2,1 b2,2 b2,3
b3,0 b3,1 b3,2 b3,3
b0,0 b0,1 b0,2 b0,3
b1,0 b1,1 b1,2 b1,3
b2,0 b2,1 b2,2 b2,3
b3,0 b3,1 b3,2 b3,3
Odd Rounds Even Rounds
ASC-1 Specification (2/4)
ASC-1 DecryptionASC-1 Encryption
),100(
),010(
),000(
70
0,2
70
0,1
70
0
CntrEK
CntrEK
CntrEX
K
K
K



)110))(( 6
0,3 CntrMlEK K
ASC-1Specification(4/4)

Mais conteúdo relacionado

Mais procurados

CNIT 141: 13. TLS
CNIT 141: 13. TLSCNIT 141: 13. TLS
CNIT 141: 13. TLSSam Bowne
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYKathirvel Ayyaswamy
 
CNIT 123 12: Cryptography
CNIT 123 12: CryptographyCNIT 123 12: Cryptography
CNIT 123 12: CryptographySam Bowne
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network SecurityKathirvel Ayyaswamy
 
Cracking wep and wpa wireless networks
Cracking wep and wpa wireless networksCracking wep and wpa wireless networks
Cracking wep and wpa wireless networksMaghan Das
 
The Security layer
The Security layerThe Security layer
The Security layerSwetha S
 
IP Protocol Security
IP Protocol SecurityIP Protocol Security
IP Protocol SecurityDavid Barker
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network SecurityKathirvel Ayyaswamy
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network SecurityKathirvel Ayyaswamy
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYKathirvel Ayyaswamy
 
CNIT 125 Ch 4. Security Engineering (Part 2)
CNIT 125 Ch 4. Security Engineering (Part 2)CNIT 125 Ch 4. Security Engineering (Part 2)
CNIT 125 Ch 4. Security Engineering (Part 2)Sam Bowne
 
Wi fi protected-access
Wi fi protected-accessWi fi protected-access
Wi fi protected-accessbhanu4ugood1
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network SecurityKathirvel Ayyaswamy
 

Mais procurados (20)

Cryptography
CryptographyCryptography
Cryptography
 
Ip sec
Ip secIp sec
Ip sec
 
CS6004 CYBER FORENSICS
CS6004 CYBER FORENSICS CS6004 CYBER FORENSICS
CS6004 CYBER FORENSICS
 
WEP
WEPWEP
WEP
 
CNIT 141: 13. TLS
CNIT 141: 13. TLSCNIT 141: 13. TLS
CNIT 141: 13. TLS
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
CNIT 123 12: Cryptography
CNIT 123 12: CryptographyCNIT 123 12: Cryptography
CNIT 123 12: Cryptography
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
Cracking wep and wpa wireless networks
Cracking wep and wpa wireless networksCracking wep and wpa wireless networks
Cracking wep and wpa wireless networks
 
CS6004 CYBER FORENSICS
CS6004 CYBER FORENSICS CS6004 CYBER FORENSICS
CS6004 CYBER FORENSICS
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cryptography
CryptographyCryptography
Cryptography
 
The Security layer
The Security layerThe Security layer
The Security layer
 
IP Protocol Security
IP Protocol SecurityIP Protocol Security
IP Protocol Security
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
CNIT 125 Ch 4. Security Engineering (Part 2)
CNIT 125 Ch 4. Security Engineering (Part 2)CNIT 125 Ch 4. Security Engineering (Part 2)
CNIT 125 Ch 4. Security Engineering (Part 2)
 
Wi fi protected-access
Wi fi protected-accessWi fi protected-access
Wi fi protected-access
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 

Destaque

Skmbt 42313121713040
Skmbt 42313121713040Skmbt 42313121713040
Skmbt 42313121713040oubinamillan
 
Do noi-that-bang-bia-cung
Do noi-that-bang-bia-cungDo noi-that-bang-bia-cung
Do noi-that-bang-bia-cungdigivision123
 
Relaciones públicas. 2.0 el uso de los medios sociales...
Relaciones públicas. 2.0 el uso de los medios sociales...Relaciones públicas. 2.0 el uso de los medios sociales...
Relaciones públicas. 2.0 el uso de los medios sociales...José Arenas
 
Enerji Konferansı Sunum
Enerji Konferansı SunumEnerji Konferansı Sunum
Enerji Konferansı SunumPinar AKKAYA
 
Para formaturas de crianças simone helen drumond
Para formaturas de crianças simone helen drumondPara formaturas de crianças simone helen drumond
Para formaturas de crianças simone helen drumondSimoneHelenDrumond
 
УПРАВЛЕНИЕ ИННОВАЦИЯМИ (Тен3 микро-курс)
УПРАВЛЕНИЕ ИННОВАЦИЯМИ (Тен3 микро-курс)УПРАВЛЕНИЕ ИННОВАЦИЯМИ (Тен3 микро-курс)
УПРАВЛЕНИЕ ИННОВАЦИЯМИ (Тен3 микро-курс)Vadim Kotelnikov
 
Servizi e Best Practice hotel-LAB.com
Servizi e Best Practice hotel-LAB.comServizi e Best Practice hotel-LAB.com
Servizi e Best Practice hotel-LAB.comGiulia Zanin
 
7 Functions of GEA Network
7 Functions of GEA Network7 Functions of GEA Network
7 Functions of GEA NetworkVal Slastnikov
 
Adição[1] simone helen drumond
Adição[1] simone helen drumondAdição[1] simone helen drumond
Adição[1] simone helen drumondSimoneHelenDrumond
 
Wiki Planning Sheet
Wiki Planning SheetWiki Planning Sheet
Wiki Planning Sheetmpgreene
 
Web UI/UX in the Multi device & Multi Screen Environment
Web UI/UX in the Multi device & Multi Screen EnvironmentWeb UI/UX in the Multi device & Multi Screen Environment
Web UI/UX in the Multi device & Multi Screen EnvironmentJonathan Jeon
 

Destaque (20)

GEA Leads
GEA LeadsGEA Leads
GEA Leads
 
BTH
BTHBTH
BTH
 
MAPA SEGUNDA GUERRA
MAPA SEGUNDA GUERRAMAPA SEGUNDA GUERRA
MAPA SEGUNDA GUERRA
 
Diplomas 3 professores
Diplomas 3 professoresDiplomas 3 professores
Diplomas 3 professores
 
Skmbt 42313121713040
Skmbt 42313121713040Skmbt 42313121713040
Skmbt 42313121713040
 
Do noi-that-bang-bia-cung
Do noi-that-bang-bia-cungDo noi-that-bang-bia-cung
Do noi-that-bang-bia-cung
 
Cq01
Cq01Cq01
Cq01
 
Relaciones públicas. 2.0 el uso de los medios sociales...
Relaciones públicas. 2.0 el uso de los medios sociales...Relaciones públicas. 2.0 el uso de los medios sociales...
Relaciones públicas. 2.0 el uso de los medios sociales...
 
Enerji Konferansı Sunum
Enerji Konferansı SunumEnerji Konferansı Sunum
Enerji Konferansı Sunum
 
Para formaturas de crianças simone helen drumond
Para formaturas de crianças simone helen drumondPara formaturas de crianças simone helen drumond
Para formaturas de crianças simone helen drumond
 
CleanfilesVerification.txt
CleanfilesVerification.txtCleanfilesVerification.txt
CleanfilesVerification.txt
 
Copy of health_internet_watch
Copy of health_internet_watchCopy of health_internet_watch
Copy of health_internet_watch
 
УПРАВЛЕНИЕ ИННОВАЦИЯМИ (Тен3 микро-курс)
УПРАВЛЕНИЕ ИННОВАЦИЯМИ (Тен3 микро-курс)УПРАВЛЕНИЕ ИННОВАЦИЯМИ (Тен3 микро-курс)
УПРАВЛЕНИЕ ИННОВАЦИЯМИ (Тен3 микро-курс)
 
Servizi e Best Practice hotel-LAB.com
Servizi e Best Practice hotel-LAB.comServizi e Best Practice hotel-LAB.com
Servizi e Best Practice hotel-LAB.com
 
7 Functions of GEA Network
7 Functions of GEA Network7 Functions of GEA Network
7 Functions of GEA Network
 
Adição[1] simone helen drumond
Adição[1] simone helen drumondAdição[1] simone helen drumond
Adição[1] simone helen drumond
 
Menorca
MenorcaMenorca
Menorca
 
Phonegap for Android
Phonegap for AndroidPhonegap for Android
Phonegap for Android
 
Wiki Planning Sheet
Wiki Planning SheetWiki Planning Sheet
Wiki Planning Sheet
 
Web UI/UX in the Multi device & Multi Screen Environment
Web UI/UX in the Multi device & Multi Screen EnvironmentWeb UI/UX in the Multi device & Multi Screen Environment
Web UI/UX in the Multi device & Multi Screen Environment
 

Semelhante a Slidecast - Workshop

UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4  CRYPTOGRAPHIC SYSTEMS.pptxUNIT 4  CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptxssuserd5e356
 
symmetric cipher model.pptx
symmetric cipher model.pptxsymmetric cipher model.pptx
symmetric cipher model.pptxAjaykumar967485
 
Symmetric ciphermodel
Symmetric ciphermodelSymmetric ciphermodel
Symmetric ciphermodelpriyapavi96
 
Track 5 session 2 - st dev con 2016 - security iot best practices
Track 5   session 2 - st dev con 2016 - security iot best practicesTrack 5   session 2 - st dev con 2016 - security iot best practices
Track 5 session 2 - st dev con 2016 - security iot best practicesST_World
 
Encryption techniques
Encryption techniquesEncryption techniques
Encryption techniquesMohitManna
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network SecurityPa Van Tanku
 
Fundamentals of Information Encryption
Fundamentals of Information EncryptionFundamentals of Information Encryption
Fundamentals of Information EncryptionAmna Magzoub
 
key distribution in network security
key distribution in network securitykey distribution in network security
key distribution in network securitybabak danyal
 
CNIT 141: 1. Encryption
CNIT 141: 1. EncryptionCNIT 141: 1. Encryption
CNIT 141: 1. EncryptionSam Bowne
 
Sql_DG_presentation.pptx
Sql_DG_presentation.pptxSql_DG_presentation.pptx
Sql_DG_presentation.pptxArunRangrej1
 
Cryptographic Chronicles: Unveiling Definitions, Algorithms, Attacks, and App...
Cryptographic Chronicles: Unveiling Definitions, Algorithms, Attacks, and App...Cryptographic Chronicles: Unveiling Definitions, Algorithms, Attacks, and App...
Cryptographic Chronicles: Unveiling Definitions, Algorithms, Attacks, and App...zachdwg
 

Semelhante a Slidecast - Workshop (20)

UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4  CRYPTOGRAPHIC SYSTEMS.pptxUNIT 4  CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
 
CISSP - Chapter 3 - Cryptography
CISSP - Chapter 3 - CryptographyCISSP - Chapter 3 - Cryptography
CISSP - Chapter 3 - Cryptography
 
symmetric cipher model.pptx
symmetric cipher model.pptxsymmetric cipher model.pptx
symmetric cipher model.pptx
 
Symmetric ciphermodel
Symmetric ciphermodelSymmetric ciphermodel
Symmetric ciphermodel
 
Track 5 session 2 - st dev con 2016 - security iot best practices
Track 5   session 2 - st dev con 2016 - security iot best practicesTrack 5   session 2 - st dev con 2016 - security iot best practices
Track 5 session 2 - st dev con 2016 - security iot best practices
 
Encryption techniques
Encryption techniquesEncryption techniques
Encryption techniques
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
CRYPTOGRAPHY
CRYPTOGRAPHYCRYPTOGRAPHY
CRYPTOGRAPHY
 
Encryption algorithms
Encryption algorithmsEncryption algorithms
Encryption algorithms
 
Cryptography cse,ru
Cryptography cse,ruCryptography cse,ru
Cryptography cse,ru
 
Lesson 1
Lesson 1Lesson 1
Lesson 1
 
Fundamentals of Information Encryption
Fundamentals of Information EncryptionFundamentals of Information Encryption
Fundamentals of Information Encryption
 
key distribution in network security
key distribution in network securitykey distribution in network security
key distribution in network security
 
Network security
Network securityNetwork security
Network security
 
lecture 7.pptx
lecture 7.pptxlecture 7.pptx
lecture 7.pptx
 
CNIT 141: 1. Encryption
CNIT 141: 1. EncryptionCNIT 141: 1. Encryption
CNIT 141: 1. Encryption
 
Sql_DG_presentation.pptx
Sql_DG_presentation.pptxSql_DG_presentation.pptx
Sql_DG_presentation.pptx
 
Image Security
Image SecurityImage Security
Image Security
 
Cryptographic Chronicles: Unveiling Definitions, Algorithms, Attacks, and App...
Cryptographic Chronicles: Unveiling Definitions, Algorithms, Attacks, and App...Cryptographic Chronicles: Unveiling Definitions, Algorithms, Attacks, and App...
Cryptographic Chronicles: Unveiling Definitions, Algorithms, Attacks, and App...
 
chapter 1-4.pdf
chapter 1-4.pdfchapter 1-4.pdf
chapter 1-4.pdf
 

Último

TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 

Último (20)

TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 

Slidecast - Workshop

  • 1. Network & Application Security (NAS) AUTHENTICATED ENCRYPTION S AM A N T K H AJ U R I A A S S I S T A N T P R O F E S S O R , C M I S K H @ C M I . A A U . D K
  • 2. Computer security objectives • Confidentiality • Data Confidentiality: Assures that private or confidential information is not made available or disclosed to unauthorized users. • Privacy: Assures that individuals control or influence what information related to them may be collected and stored and by whom and to whom that information may be disclosed. • Integrity • Data integrity: Assures that information and programs are changed only in a specified and authorized manner • System integrity: Assures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system • Availability • Assures that the system work promptly and service is not denied to authorized users
  • 3. Additional Concepts / Objectives • Authenticity • Property of being genuine ; able to be verified and trusted • Confidence in the validity of a message or message originator • Meaning – Verifying that the users are who they say they are and each transmission arriving at the system came from a trusted party. • Accountability • The security goal that generates the requirements for actions of an entity to be traced uniquely to that entity • Supports – nonrepudiation, fault isolation, intrusion detection and prevention, and after action recovery and legal action
  • 4. Symmetric Encryption • Also referred to as conventional encryption, secret-key, or single-key encryption. • Only type of encryption in use prior to the development of public-key encryption in the late 1970’s. • Symmetric encryption remains by far the most widely used of the two types of encryption. • All classical encryption algorithms are private-key • Common key is used by sender and recipient
  • 5. Simplified Model of Symmetric Encryption
  • 6. Requirements • Two requirements for secure use of algorithm • A STRONG Encryption algorithm • Both the parties i.e., Sender and the receiver have obtained the copy of the secret key in a secure fashion and must keep the key secure • IMPORTANT !!! The security of symmetric encryption depends on the secrecy of the key, not the secrecy of the algorithm • Practical reasons – makes it feasible for widespread use. • Manufacturers can and have developed low-cost chip implementations of data encryption algorithms. • These chips are widely available and incorporated into a number of products.
  • 7. Cryptography • Cryptographic systems are generically classified along three independent dimensions: • The type of operations used for transforming plaintext to ciphertext • Substitution - Each element in the plaintext is mapped into another element • Transposition - Elements in the plaintext are rearranged ; Fundamental requirement is that no information be lost • Product systems - Involve multiple stages of substitutions and transpositions • The number of keys used • Referred to as symmetric, single-key, secret-key, or conventional encryption if both sender and receiver use the same key • Referred to as asymmetric, two-key, or public-key encryption if the sender and receiver each use a different key • The way in which the plaintext is processed • Block cipher processes the input one block of elements at a time, producing an output block for each input block • Stream cipher processes the input elements continuously, producing output one element at a time, as it goes along
  • 9. AES • Symmetric, block cipher • Key size: 128, 192, or 256 bits • Block size: 128 • Processed as 4 groups of 4 bytes (state) • Operates on the entire block in every round • Number of rounds depending on key size: • Key=128 -> 9 rounds • Key=192 -> 11 rounds • Key=256 -> 13 rounds
  • 10.
  • 11. Cipher Block Modes of Operation
  • 12. Cipher block Modes of Operation • A symmetric block cipher processes one block of data at a time • In the case of DES and 3DES, the block length is b=64 bits • For AES, the block length is b=128 • For longer amounts of plaintext, it is necessary to break the plaintext into b- bit blocks, padding the last block if necessary • Five modes of operation have been defined by NIST • Intended to cover virtually all of the possible applications of encryption for which a block cipher could be used • Intended for use with any symmetric block cipher, including triple DES and AES
  • 13. Cipher Feedback (CFB) Block Cipher Block Cipher Block Cipher Plaintext 1 Plaintext 2 Plaintext n Ciphertext 1 Ciphertext 2 Ciphertext n Initialization Vector (IV) Block Cipher Block Cipher Block Cipher Plaintext 1 Ciphertext 2Ciphertext 1 Plaintext 2 Plaintext n Initialization Vector (IV) Ciphertext n DECRYPTENCRYPT
  • 14. ASC-1 : An Authenticated Encryption Stream Cipher
  • 15. Algorithm Analysis & Development • Authenticated Encryption • Generic Composition • Two Pass Combined mode • One pass Combined mode • Cryptographic schemes that provide both confidentiality and authenticity are called authenticated encryption schemes. • AE consists of a key generation, an encryption and a decryption algorithm.
  • 16. Generic Composition • Traditional approach to solve both privacy and authenticity problems has been to combine them in a straightforward manner. • Results – Not very efficient, twice as slow as either encryption or authentication. • Pitfalls – • Use of non-cryptographic non-keyed hash function and good encryption scheme • Use of same key for encryption scheme and the MAC scheme . • To analyze the security of the Authenticated Encryption Scheme three “Generic Composition” methods are considered. • Black Box use of a given symmetric encryption scheme and a given MAC • Each case uses two different keys i.e., K1 and K2
  • 17. ASC-1 : An Authenticated Encryption Stream Cipher • To achieve faster encryption and message authentication by performing both in a single pass as opposed to the traditional encrypt-then-mac approach • Similar to LEX (Leak EXtraction) stream cipher selected to phase 3 of the eSTREAM competition, ASC-1 uses leak extraction • Bits are extracted from intermediate rounds to generate the key that is XOR-ed with the message to compute the ciphertext. • Operates in a Cipher Feedback (CFB) fashion
  • 18. Leak Positions in ASC-1 • Crucial part – location of the four bytes of the internal state • Frequency of outputs (every round, every second round etc.) b0,0 b0,1 b0,2 b0,3 b1,0 b1,1 b1,2 b1,3 b2,0 b2,1 b2,2 b2,3 b3,0 b3,1 b3,2 b3,3 b0,0 b0,1 b0,2 b0,3 b1,0 b1,1 b1,2 b1,3 b2,0 b2,1 b2,2 b2,3 b3,0 b3,1 b3,2 b3,3 b0,0 b0,1 b0,2 b0,3 b1,0 b1,1 b1,2 b1,3 b2,0 b2,1 b2,2 b2,3 b3,0 b3,1 b3,2 b3,3 Odd Rounds Even Rounds
  • 19. ASC-1 Specification (2/4) ASC-1 DecryptionASC-1 Encryption ),100( ),010( ),000( 70 0,2 70 0,1 70 0 CntrEK CntrEK CntrEX K K K    )110))(( 6 0,3 CntrMlEK K