SlideShare uma empresa Scribd logo
1 de 30
CBC Mode and Initial Vector for the AES algorithm in WIMAX Protocol Stack JAN 2, 2012 AJALA.AJ [email_address] AJAL.A.J ASST PROF – METS SCHOOL OF ENGG , MALA; KERALA  MOB: 0- 8907305642
OBJECTIVE  ,[object Object],WIMAX MOBILE WIMAX FIXED WIMAX AJAL.A.J ASST PROF – METS SCHOOL OF ENGG , MALA; KERALA  MOB: 0- 8907305642
MOTIVATION  ( SECURITY ISSUES ) ,[object Object],[object Object],[object Object],[object Object],AJAL.A.J ASST PROF – METS SCHOOL OF ENGG , MALA; KERALA  MOB: 0- 8907305642
Review of the Block Cipher Plaintext data byte  p AJAL.A.J ASST PROF – METS SCHOOL OF ENGG , MALA; KERALA  MOB: 0- 8907305642 Pseudo-random number generator “ key stream” byte  b  Ciphertext data byte   c  =  p      b
Encryption Algorithms AJAL.A.J ASST PROF – METS SCHOOL OF ENGG , MALA; KERALA  MOB: 0- 8907305642   3key TDES  2key TDES TDES     256   192    128 AES Top Secret Secret After 2010 Through 2010 Suite B Unclassified use
WiMAX Protocol Stack ,[object Object],[object Object],[object Object],[object Object]
Authentication
Data Key Exchange
Data Encryption
WIMAX  –  FEATURES ,[object Object],[object Object],[object Object],[object Object]
OFDMA System Architecture 2008 Spectrum Frequency User A User B User C Frequency Time User A User B User C 01/02/12 BS User A User B User C
  WiMAX  Security Architecture
System Architecture ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Subsystem design    (Data Privacy Subsystem) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Security Suite Specification ,[object Object],[object Object],[object Object],[object Object],AJAL.A.J ASST PROF – METS SCHOOL OF ENGG , MALA; KERALA  MOB: 0- 8907305642
CBC Mode AJAL.A.J ASST PROF – METS SCHOOL OF ENGG , MALA; KERALA  MOB: 0- 8907305642 P1 IV E K C1 P2 E K C2 C1 D K P1 IV C2 D K P2 Pn E K Cn Cn D K Pn ENCRYPT DECRYPT
Counter Mode (a stream cipher mode) AJAL.A.J ASST PROF – METS SCHOOL OF ENGG , MALA; KERALA  MOB: 0- 8907305642 ENCRYPT DECRYPT C1 E K CTR1 1 P1 P2 E K C2 CTR2 C2 E K P2 CTR2 Pn E K Cn Cn E K Pn CTRn CTRn • • • • • • P1 E K C1 CTR1 Keystream
CCM Mode Overview ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Header Payload MIC Authenticated Encrypted AJAL.A.J ASST PROF – METS SCHOOL OF ENGG , MALA; KERALA  MOB: 0- 8907305642
BI-SOVA BLOCK DIAGRAM
[object Object]
SYSTOLIC ARRAY
 
[object Object],AJAL.A.J ASST PROF – METS SCHOOL OF ENGG , MALA; KERALA  MOB: 0- 8907305642
 
 
TRANCEIVER OF MIMO OFDM
 
SUMMARY ,[object Object],[object Object],[object Object],AJAL.A.J ASST PROF – METS SCHOOL OF ENGG , MALA; KERALA  MOB: 0- 8907305642
REFERENCES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],AJAL.A.J ASST PROF – METS SCHOOL OF ENGG , MALA; KERALA  MOB: 0- 8907305642
Feedback? AJAL.A.J ASST PROF – METS SCHOOL OF ENGG , MALA; KERALA  MOB: 0- 8907305642

Mais conteúdo relacionado

Mais procurados

Netmanias.2013.08.05 lte security i-concept and authentication.eng
Netmanias.2013.08.05 lte security i-concept and authentication.engNetmanias.2013.08.05 lte security i-concept and authentication.eng
Netmanias.2013.08.05 lte security i-concept and authentication.eng
son6971
 
BAIT2164 Tutorial 4
BAIT2164 Tutorial 4BAIT2164 Tutorial 4
BAIT2164 Tutorial 4
limsh
 
A zigbee wireless sensor network and multiple way bus communication meduim ca...
A zigbee wireless sensor network and multiple way bus communication meduim ca...A zigbee wireless sensor network and multiple way bus communication meduim ca...
A zigbee wireless sensor network and multiple way bus communication meduim ca...
ranjitha mudhiraj
 

Mais procurados (16)

Netmanias.2013.08.05 lte security i-concept and authentication.eng
Netmanias.2013.08.05 lte security i-concept and authentication.engNetmanias.2013.08.05 lte security i-concept and authentication.eng
Netmanias.2013.08.05 lte security i-concept and authentication.eng
 
Zigbee 802-15-4
Zigbee 802-15-4Zigbee 802-15-4
Zigbee 802-15-4
 
Ipsec vpn v0.1
Ipsec vpn v0.1Ipsec vpn v0.1
Ipsec vpn v0.1
 
Megaplexer Ip implementation in Enode B
Megaplexer Ip implementation in Enode BMegaplexer Ip implementation in Enode B
Megaplexer Ip implementation in Enode B
 
Ch3
Ch3Ch3
Ch3
 
Vpn site to site
Vpn site to siteVpn site to site
Vpn site to site
 
N828 specification-www.ttbvs.com
N828 specification-www.ttbvs.comN828 specification-www.ttbvs.com
N828 specification-www.ttbvs.com
 
CCNAv5 - S3: Chapter 7 EIGRP
CCNAv5 - S3: Chapter 7 EIGRPCCNAv5 - S3: Chapter 7 EIGRP
CCNAv5 - S3: Chapter 7 EIGRP
 
World Connect Training
World Connect TrainingWorld Connect Training
World Connect Training
 
Zigbee based two way wireless chatting system
Zigbee based two way wireless chatting systemZigbee based two way wireless chatting system
Zigbee based two way wireless chatting system
 
Vpn(4)
Vpn(4)Vpn(4)
Vpn(4)
 
CCNA Icnd110 s02l03
CCNA Icnd110 s02l03CCNA Icnd110 s02l03
CCNA Icnd110 s02l03
 
BAIT2164 Tutorial 4
BAIT2164 Tutorial 4BAIT2164 Tutorial 4
BAIT2164 Tutorial 4
 
Set review 1
Set review 1Set review 1
Set review 1
 
A zigbee wireless sensor network and multiple way bus communication meduim ca...
A zigbee wireless sensor network and multiple way bus communication meduim ca...A zigbee wireless sensor network and multiple way bus communication meduim ca...
A zigbee wireless sensor network and multiple way bus communication meduim ca...
 
CCNA Icnd110 s02l08
 CCNA Icnd110 s02l08 CCNA Icnd110 s02l08
CCNA Icnd110 s02l08
 

Semelhante a Ajal jose

TELE25892-4.3 802.11 MAC Architecture.pptx
TELE25892-4.3 802.11 MAC Architecture.pptxTELE25892-4.3 802.11 MAC Architecture.pptx
TELE25892-4.3 802.11 MAC Architecture.pptx
WangRoof
 
Mngn2005 wireless security
Mngn2005 wireless securityMngn2005 wireless security
Mngn2005 wireless security
Arpan Pal
 

Semelhante a Ajal jose (20)

Securing Wireless Cellular Systems
Securing Wireless Cellular SystemsSecuring Wireless Cellular Systems
Securing Wireless Cellular Systems
 
K43066774
K43066774K43066774
K43066774
 
WLAN SECURITY BY SAIKIRAN PANJALA
WLAN SECURITY BY SAIKIRAN PANJALAWLAN SECURITY BY SAIKIRAN PANJALA
WLAN SECURITY BY SAIKIRAN PANJALA
 
TELE25892-4.3 802.11 MAC Architecture.pptx
TELE25892-4.3 802.11 MAC Architecture.pptxTELE25892-4.3 802.11 MAC Architecture.pptx
TELE25892-4.3 802.11 MAC Architecture.pptx
 
Report on wireless System CDMA security
Report on wireless System CDMA securityReport on wireless System CDMA security
Report on wireless System CDMA security
 
Analysis on Mobile WiMAX Security.pdf
Analysis on Mobile WiMAX Security.pdfAnalysis on Mobile WiMAX Security.pdf
Analysis on Mobile WiMAX Security.pdf
 
MTLS - Securing Microservice Architecture with Mutual TLS Authentication
MTLS - Securing Microservice Architecture with Mutual TLS AuthenticationMTLS - Securing Microservice Architecture with Mutual TLS Authentication
MTLS - Securing Microservice Architecture with Mutual TLS Authentication
 
Megaplex nerc-cip-compliance
Megaplex nerc-cip-complianceMegaplex nerc-cip-compliance
Megaplex nerc-cip-compliance
 
Resilience in the ZigBee Residential Mode
Resilience in the ZigBee Residential ModeResilience in the ZigBee Residential Mode
Resilience in the ZigBee Residential Mode
 
WiMAX Network Security
WiMAX Network SecurityWiMAX Network Security
WiMAX Network Security
 
Intermediate: Security in Mobile Cellular Networks
Intermediate: Security in Mobile Cellular NetworksIntermediate: Security in Mobile Cellular Networks
Intermediate: Security in Mobile Cellular Networks
 
Security Consideration in 5G
Security Consideration in 5GSecurity Consideration in 5G
Security Consideration in 5G
 
Mngn2005 wireless security
Mngn2005 wireless securityMngn2005 wireless security
Mngn2005 wireless security
 
Security Enhancement in Next Generation Networks using Enhanced AES with RC4 ...
Security Enhancement in Next Generation Networks using Enhanced AES with RC4 ...Security Enhancement in Next Generation Networks using Enhanced AES with RC4 ...
Security Enhancement in Next Generation Networks using Enhanced AES with RC4 ...
 
Mobile security
Mobile securityMobile security
Mobile security
 
Security in GSM(2G) and UMTS(3G) Networks
Security in GSM(2G) and UMTS(3G) NetworksSecurity in GSM(2G) and UMTS(3G) Networks
Security in GSM(2G) and UMTS(3G) Networks
 
WLAN and IP security
WLAN and IP securityWLAN and IP security
WLAN and IP security
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
 
CCNAv5 - S1: Chapter 5 - Ethernet
CCNAv5 - S1: Chapter 5 - EthernetCCNAv5 - S1: Chapter 5 - Ethernet
CCNAv5 - S1: Chapter 5 - Ethernet
 
Chapter 05 - Ethernet
Chapter 05 - EthernetChapter 05 - Ethernet
Chapter 05 - Ethernet
 

Mais de AJAL A J

Mais de AJAL A J (20)

KEAM KERALA ENTRANCE EXAM
KEAM KERALA ENTRANCE EXAMKEAM KERALA ENTRANCE EXAM
KEAM KERALA ENTRANCE EXAM
 
Paleontology Career
Paleontology  CareerPaleontology  Career
Paleontology Career
 
CHEMISTRY basic concepts of chemistry
CHEMISTRY  basic concepts of chemistryCHEMISTRY  basic concepts of chemistry
CHEMISTRY basic concepts of chemistry
 
Ecology
EcologyEcology
Ecology
 
Biogeochemical cycles
Biogeochemical cyclesBiogeochemical cycles
Biogeochemical cycles
 
ac dc bridges
ac dc bridgesac dc bridges
ac dc bridges
 
Hays bridge schering bridge wien bridge
Hays bridge  schering bridge  wien bridgeHays bridge  schering bridge  wien bridge
Hays bridge schering bridge wien bridge
 
App Naming Tip
App Naming TipApp Naming Tip
App Naming Tip
 
flora and fauna of himachal pradesh and kerala
flora and fauna of himachal pradesh and keralaflora and fauna of himachal pradesh and kerala
flora and fauna of himachal pradesh and kerala
 
B.Sc Cardiovascular Technology(CVT)
 B.Sc Cardiovascular Technology(CVT)  B.Sc Cardiovascular Technology(CVT)
B.Sc Cardiovascular Technology(CVT)
 
11 business strategies to make profit
11 business strategies to make profit 11 business strategies to make profit
11 business strategies to make profit
 
PCOS Polycystic Ovary Syndrome
PCOS  Polycystic Ovary SyndromePCOS  Polycystic Ovary Syndrome
PCOS Polycystic Ovary Syndrome
 
Courses and Career Options after Class 12 in Humanities
Courses and Career Options after Class 12 in HumanitiesCourses and Career Options after Class 12 in Humanities
Courses and Career Options after Class 12 in Humanities
 
MANAGEMENT Stories
 MANAGEMENT Stories MANAGEMENT Stories
MANAGEMENT Stories
 
NEET PREPRATION TIPS AND STRATEGY
NEET PREPRATION TIPS AND STRATEGYNEET PREPRATION TIPS AND STRATEGY
NEET PREPRATION TIPS AND STRATEGY
 
REVOLUTIONS IN AGRICULTURE
REVOLUTIONS IN AGRICULTUREREVOLUTIONS IN AGRICULTURE
REVOLUTIONS IN AGRICULTURE
 
NRI QUOTA IN NIT'S
NRI QUOTA IN NIT'S NRI QUOTA IN NIT'S
NRI QUOTA IN NIT'S
 
Subjects to study if you want to work for a charity
Subjects to study if you want to work for a charitySubjects to study if you want to work for a charity
Subjects to study if you want to work for a charity
 
IIT JEE A KERALA PERSPECTIVE
IIT JEE A KERALA PERSPECTIVE IIT JEE A KERALA PERSPECTIVE
IIT JEE A KERALA PERSPECTIVE
 
Clat 2020 exam COMPLETE DETAILS
Clat 2020 exam COMPLETE DETAILSClat 2020 exam COMPLETE DETAILS
Clat 2020 exam COMPLETE DETAILS
 

Último

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 

Último (20)

Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 

Ajal jose

  • 1. CBC Mode and Initial Vector for the AES algorithm in WIMAX Protocol Stack JAN 2, 2012 AJALA.AJ [email_address] AJAL.A.J ASST PROF – METS SCHOOL OF ENGG , MALA; KERALA MOB: 0- 8907305642
  • 2.
  • 3.
  • 4. Review of the Block Cipher Plaintext data byte p AJAL.A.J ASST PROF – METS SCHOOL OF ENGG , MALA; KERALA MOB: 0- 8907305642 Pseudo-random number generator “ key stream” byte b  Ciphertext data byte c = p  b
  • 5. Encryption Algorithms AJAL.A.J ASST PROF – METS SCHOOL OF ENGG , MALA; KERALA MOB: 0- 8907305642   3key TDES  2key TDES TDES     256   192    128 AES Top Secret Secret After 2010 Through 2010 Suite B Unclassified use
  • 6.
  • 10.
  • 11. OFDMA System Architecture 2008 Spectrum Frequency User A User B User C Frequency Time User A User B User C 01/02/12 BS User A User B User C
  • 12. WiMAX Security Architecture
  • 13.
  • 14.
  • 15.
  • 16. CBC Mode AJAL.A.J ASST PROF – METS SCHOOL OF ENGG , MALA; KERALA MOB: 0- 8907305642 P1 IV E K C1 P2 E K C2 C1 D K P1 IV C2 D K P2 Pn E K Cn Cn D K Pn ENCRYPT DECRYPT
  • 17. Counter Mode (a stream cipher mode) AJAL.A.J ASST PROF – METS SCHOOL OF ENGG , MALA; KERALA MOB: 0- 8907305642 ENCRYPT DECRYPT C1 E K CTR1 1 P1 P2 E K C2 CTR2 C2 E K P2 CTR2 Pn E K Cn Cn E K Pn CTRn CTRn • • • • • • P1 E K C1 CTR1 Keystream
  • 18.
  • 20.
  • 22.  
  • 23.
  • 24.  
  • 25.  
  • 27.  
  • 28.
  • 29.
  • 30. Feedback? AJAL.A.J ASST PROF – METS SCHOOL OF ENGG , MALA; KERALA MOB: 0- 8907305642