33
Tharindu Weerasinghe MSc/EE/08/MSc/24 Supervised by: Dr. Manjula Sandirigama Dr. Disala Uduwawala

Secured algorithm for gsm encryption & decryption

Embed Size (px)

Citation preview

Page 1: Secured algorithm for gsm encryption & decryption

Tharindu WeerasingheMSc/EE/08/MSc/24

Supervised by: Dr. Manjula Sandirigama

Dr. Disala Uduwawala

Page 2: Secured algorithm for gsm encryption & decryption

HYBRID?A

stream cipher & block cipher are

combined together to get

a secured HYBRID cipher text

Page 3: Secured algorithm for gsm encryption & decryption

WHY?

There are many ways to combine cryptographic algorithms to get new algorithms. The impetus behind the combination is increasing security.

When we consider a block or stream cipher alone, we must admit that the strength of security is low.

In this research, the focus was, combining a block cipher with a stream cipher to enhance the strength of the cipher.

Page 4: Secured algorithm for gsm encryption & decryption

WHY?

Combined (Hybrid) ciphers are more secured thanstream or block ciphers alone.

They can be used as encryption algorithms in manysoftware applications used in networks...(e.g. Emailclients, Enterprise applications, etc…

Combining 3DES with RC4 is a new experience as 3DEShas a high complexity and that of RC4 is less.

Page 5: Secured algorithm for gsm encryption & decryption

BACKGROUND

What is a block cipher?

In cryptography, a block cipher is a symmetric keycipher operating on fixed-length groups of bits calledblocks, with an unvarying transformations.

Might take 128 bit input and output 128 bit block ofcipher text. The key can be of any finite size.

Decryption is the inverse function of encryption

Page 6: Secured algorithm for gsm encryption & decryption

Example of a Block Cipher

DES

Data Encryption Standard – commonly used blockcipher , but it is vulnerable to timing attacks . And it isobsolete now. But its enhancements like Triple DES &AES are still in the scene.Designed by IBM and the NSA, standardized in 1977.

Most widespread block cipher used by federal agencies,banks (ATM machines), SSL, ...Key length 56, block length 64.

Page 7: Secured algorithm for gsm encryption & decryption

DES Structure….

Page 8: Secured algorithm for gsm encryption & decryption

Triple DES (3DES)?

3DES is not a group, then the resultant cipher text is much harder to break using exhaustive search: 2112

attempts instead of 256 attempts.This is like having 3 DES blocks with 3 keys (or one key)in between the input and output.

Three-key 3DES has an effective key length of 168 bits and is defined as follows:

C = E(K3, D(K2, E(K1, P)))

Page 9: Secured algorithm for gsm encryption & decryption

BACKGROUND (Contd.)

What is a stream cipher?

In cryptography, a stream cipher is a symmetric key cipherwhere plaintext bits are combined with a pseudorandom cipherbit stream (key stream), typically by an exclusive-or (XOR)operation.

In a stream cipher the plaintext digits are encrypted one at atime, and the transformation of successive digits varies duringthe encryption. An alternative name is a state cipher, as theencryption of each digit is dependent on the current state. Inpractice, the digits are typically single bits or bytes.

Page 10: Secured algorithm for gsm encryption & decryption

Stream cipher (contd.)

A stream cipher makes use of a much smaller andmore convenient key — 128 bits, for example. Based onthis key, it generates a pseudorandom key stream whichcan be combined with the plaintext digits in a similarfashion to the one-time pad.

Page 11: Secured algorithm for gsm encryption & decryption

Example of a Stream Cipher

RC4

In cryptography, RC4 (also known as ARC4 orARCFOUR meaning Alleged RC4) is the most widely-used software stream cipher & used in popularprotocols such as Secure Sockets Layer (SSL) (to protectInternet traffic) and WEP (to secure wireless networks).While remarkable for its simplicity and speed in software.

Page 12: Secured algorithm for gsm encryption & decryption

RC4, described a bit…

Page 13: Secured algorithm for gsm encryption & decryption

RC4, described a bit…

RC4 generates a pseudorandom stream of bits (a keystream). As with any stream cipher, these can be used forencryption by combining it with the plaintext using bit-wiseXOR; decryption is performed the same way (since exclusive-or is a symmetric operation).

To generate the key stream, the cipher makes use of a secretinternal state which consists of two parts:

A permutation of all 256 possible bytes. (denoted "S" in the

figure)

Two 8-bit index-pointers. (denoted "i" and "j“ in the figrue)

Page 14: Secured algorithm for gsm encryption & decryption

RC4 (key stream)

Page 15: Secured algorithm for gsm encryption & decryption

Problems with Block or Stream cipher alone…

Page 16: Secured algorithm for gsm encryption & decryption

Block cipher problem

All block ciphers share two common theoreticalvulnerabilities, because they all encrypt multiple blockswith a single key.

If an attacker can extract the key for one block, then hebreaks other blocks with almost zero effort. Also, anattacker can collect many blocks encrypted with a singlekey, which may allow attacks that are impossible againsta single block.

Page 17: Secured algorithm for gsm encryption & decryption

Stream cipher problem

All stream ciphers using a simple invertible operation as thecombiner have a common theoretical vulnerability.

Given some known or guessed plaintext, it is trivial for anadversary to recover some of the pseudorandom maskingmaterial.

For example, using P for plaintext, C for cipher text, R for(pseudo) random data, and ^ for the most

common combining function, bitwise exclusive OR, we get:encryption: C = P^Rdecryption: P = C^Rbut this means the enemy (if he has P) can do:recover R: R = C^P

Page 18: Secured algorithm for gsm encryption & decryption

To overcome those problems?

Join stream and block ciphers

In this research 3DES & RC4!

Page 19: Secured algorithm for gsm encryption & decryption

MY ALGORITHM (BIG Picture)

BLOCK Cipher(Triple DES Encryption)

STREAM Cipher(RC4 Encryption)

BLOCK Cipher(Triple DES Decryption)

STREAM Cipher(RC4 Decryption)

Input

Output

Cipher 2

Cipher 1

Plaintext 2

Plaintext 1

Page 20: Secured algorithm for gsm encryption & decryption

MY ALGORITHM (Overview)

Page 21: Secured algorithm for gsm encryption & decryption

What about my application?The whole application (encryption/decryption demonstrator) is written in Java.

Implementing the algorithm on paper is much easierthan getting the practical outcome of it.

Technology used: Java EE together its standardcryptographic libraries

Page 22: Secured algorithm for gsm encryption & decryption

IN MY JAVA PROGRAMS?

3DES, RC4 and the Hybrid Algorithms

It will take an input (plaintext) as an argument value and encrypt it with DES, and RC4 then it will decrypt it with RC4 and DES and finally output the result….

In between I have shown the cipher texts

It will calculate the execution time as well…

Page 23: Secured algorithm for gsm encryption & decryption

ENCRYPTION TIMES

Page 24: Secured algorithm for gsm encryption & decryption

DECRYPTION TIMEs

Page 25: Secured algorithm for gsm encryption & decryption

QUESTIONS?

I myself have some questions

1. Why don’t you encrypt more than two times ?2. Can you say use this is in GSM ?3. What are the attacks that this algorithm might face ?4. Any enhancements of this? (Combine AES with RC4 ?) I have done it too…

Page 26: Secured algorithm for gsm encryption & decryption

ENHACEMENT BASED ON THIS RESEARCH…

A CRYPTO TOOL TO

EVALUATE CRYPTOGRAPHIC ALGORITHMS

Page 27: Secured algorithm for gsm encryption & decryption
Page 28: Secured algorithm for gsm encryption & decryption
Page 29: Secured algorithm for gsm encryption & decryption
Page 30: Secured algorithm for gsm encryption & decryption

LOOK THE CRYPTO TOOL BY ME…

GO…

Page 31: Secured algorithm for gsm encryption & decryption

REFERENCES

Cryptography and Network Security Principles and Practices, Fourth Edition By William Stallings

Types and Modes Combined Algorithm for Data Encryption and Decryption (D.M.A.B. Mailewa1, T.D.B. Weerasinghe2, S.P.J

Perera3 ,C.A. Munasinghe4 Department of Computer Engineering, Faculty of Engineering, University of Peradeniya1234

Evaluation of the RC4 Algorithm for Data Encryption(Allam Mousa (1) and Ahmad Hamad (2)(1) Electrical Engineering Department An-Najah University, Nablus, Palestine(2) Systems EngineerPalTel Company, Nablus, Palestine

Page 32: Secured algorithm for gsm encryption & decryption

REFERENCES (contd.)

Combining stream ciphers and block ciphers - Sandy Harris

([email protected])

Internet (Wikipedia, DES & RSA references)

Page 33: Secured algorithm for gsm encryption & decryption

THANK YOU!