Cryptography for Developers.Pdf

Total Page:16

File Type:pdf, Size:1020Kb

Cryptography for Developers.Pdf 404_CRYPTO_FM.qxd 10/30/06 2:33 PM Page i Visit us at www.syngress.com Syngress is committed to publishing high-quality books for IT Professionals and delivering those books in media and formats that fit the demands of our cus- tomers. We are also committed to extending the utility of the book you purchase via additional materials available from our Web site. SOLUTIONS WEB SITE To register your book, visit www.syngress.com/solutions. Once registered, you can access our [email protected] Web pages. There you may find an assortment of value-added features such as free e-books related to the topic of this book, URLs of related Web site, FAQs from the book, corrections, and any updates from the author(s). ULTIMATE CDs Our Ultimate CD product line offers our readers budget-conscious compilations of some of our best-selling backlist titles in Adobe PDF form. These CDs are the perfect way to extend your reference library on key topics pertaining to your area of exper- tise, including Cisco Engineering, Microsoft Windows System Administration, CyberCrime Investigation, Open Source Security, and Firewall Configuration, to name a few. DOWNLOADABLE E-BOOKS For readers who can’t wait for hard copy, we offer most of our titles in download- able Adobe PDF form. These e-books are often available weeks before hard copies, and are priced affordably. SYNGRESS OUTLET Our outlet store at syngress.com features overstocked, out-of-print, or slightly hurt books at significant savings. SITE LICENSING Syngress has a well-established program for site licensing our e-books onto servers in corporations, educational institutions, and large organizations. Contact us at [email protected] for more information. CUSTOM PUBLISHING Many organizations welcome the ability to combine parts of multiple Syngress books, as well as their own content, into a single volume for their own internal use. Contact us at [email protected] for more information. 404_CRYPTO_FM.qxd 10/30/06 2:33 PM Page ii 404_CRYPTO_FM.qxd 10/30/06 2:33 PM Page iii Cryptography for Developers Tom St Denis, Elliptic Semiconductor Inc. and Author of the LibTom Project Simon Johnson 404_CRYPTO_FM.qxd 10/30/06 2:33 PM Page iv Syngress Publishing, Inc., the author(s), and any person or firm involved in the writing, editing, or produc- tion (collectively “Makers”) of this book (“the Work”) do not guarantee or warrant the results to be obtained from the Work. There is no guarantee of any kind, expressed or implied, regarding the Work or its contents.The Work is sold AS IS and WITHOUT WARRANTY.You may have other legal rights, which vary from state to state. In no event will Makers be liable to you for damages, including any loss of profits, lost savings, or other inci- dental or consequential damages arising out from the Work or its contents. Because some states do not allow the exclusion or limitation of liability for consequential or incidental damages, the above limitation may not apply to you. You should always use reasonable care, including backup and other appropriate precautions, when working with computers, networks, data, and files. Syngress Media®, Syngress®,“Career Advancement Through Skill Enhancement®,”“Ask the Author UPDATE®,” and “Hack Proofing®,” are registered trademarks of Syngress Publishing, Inc.“Syngress:The Definition of a Serious Security Library”™,“Mission Critical™,” and “The Only Way to Stop a Hacker is to Think Like One™” are trademarks of Syngress Publishing, Inc. Brands and product names mentioned in this book are trademarks or service marks of their respective companies. KEY SERIAL NUMBER 001 HJIRTCV764 002 PO9873D5FG 003 829KM8NJH2 004 GPPQQW722M 005 CVPLQ6WQ23 006 VBP965T5T5 007 HJJJ863WD3E 008 2987GVTWMK 009 629MP5SDJT 010 IMWQ295T6T PUBLISHED BY Syngress Publishing, Inc. 800 Hingham Street Rockland, MA 02370 Cryptography for Developers Copyright © 2007 by Syngress Publishing, Inc.All rights reserved. Except as permitted under the Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written permission of the publisher, with the exception that the program listings may be entered, stored, and executed in a computer system, but they may not be reproduced for publication. 1 2 3 4 5 6 7 8 9 0 ISBN-10: 1-59749-104-7 ISBN-13: 978-1-59749-104-4 Publisher:Andrew Williams Page Layout and Art: Patricia Lupien Acquisitions Editor: Erin Heffernan Copy Editor: Beth Roberts Technical Editor: Simon Johnson Indexer: J. Edmund Rush Cover Designer: Michael Kavish Distributed by O’Reilly Media, Inc. in the United States and Canada. For information on rights, translations, and bulk sales, contact Matt Pedersen, Director of Sales and Rights, at Syngress Publishing; email [email protected] or fax to 781-681-3585. 404_CRYPTO_FM.qxd 10/30/06 2:33 PM Page v Acknowledgments Syngress would like to acknowledge the following people for their kindness and support in making this book possible. Syngress books are now distributed in the United States and Canada by O’Reilly Media, Inc.The enthusiasm and work ethic at O’Reilly are incredible, and we would like to thank everyone there for their time and efforts to bring Syngress books to market:Tim O’Reilly, Laura Baldwin, Mark Brokering, Mike Leonard, Donna Selenko, Bonnie Sheehan, Cindy Davis, Grant Kikkert, Opol Matsutaro, Steve Hazelwood, Mark Wilson, Rick Brown,Tim Hinton, Kyle Hart, Sara Winge, Peter Pardo, Leslie Crandell, Regina Aggio Wilkinson, Pascal Honscher, Preston Paull, Susan Thompson, Bruce Stewart, Laura Schmier, Sue Willing, Mark Jacobsen, Betsy Waliszewski, Kathryn Barrett, John Chodacki, Rob Bullington, Kerry Beck, Karen Montgomery, and Patrick Dirden. The incredibly hardworking team at Elsevier Science, including Jonathan Bunkell, Ian Seager, Duncan Enright, David Burton, Rosanna Ramacciotti, Robert Fairbrother, Miguel Sanchez, Klaus Beran, Emma Wyatt, Krista Leppiko, Marcel Koppes, Judy Chappell, Radek Janousek, Rosie Moss, David Lockley, Nicola Haden, Bill Kennedy, Martina Morris, Kai Wuerfl-Davidek, Christiane Leipersberger,Yvonne Grueneklee, Nadia Balavoine, and Chris Reinders for making certain that our vision remains worldwide in scope. David Buckland, Marie Chieng, Lucy Chong, Leslie Lim,Audrey Gan, Pang Ai Hua, Joseph Chan, June Lim, and Siti Zuraidah Ahmad of Pansing Distributors for the enthusiasm with which they receive our books. David Scott, Tricia Wilden, Marilla Burgess, Annette Scott, Andrew Swaffer, Stephen O’Donoghue, Bec Lowe, Mark Langley,and Anyo Geddes of Woodslane for distributing our books throughout Australia, New Zealand, Papua New Guinea, Fiji,Tonga, Solomon Islands, and the Cook Islands. v 404_CRYPTO_FM.qxd 10/30/06 2:33 PM Page vi 404_CRYPTO_FM.qxd 10/30/06 2:33 PM Page vii Lead Author Tom St Denis is a software developer known best for his LibTom series of public domain cryptographic libraries. He has spent the last five years distributing, developing, and supporting the cause of open source cryptography, and has championed its safe deployment.Tom currently is employed for Elliptic Semiconductor Inc. where he designs and develops software libraries for embedded systems. He works closely with a team of diverse hardware engineers to create a best of breed hardware and software combination. Tom is also the author (with Greg Rose) of BigNum Math: Implementing Cryptographic Multiple Precision Arithmetic (Syngress Publishing, ISBN: 1-59749-112-8), which discusses the deployment of crypytographic integer mathematics. Technical Editor and Coauthor Simon Johnson is a security engineer for a technology outfit based in the United Kingdom. Simon became interested in cryptography during his teenage years, studying all aspects of conventional soft- ware cryptography. He has been an active contributor to the crypto- graphic usenet group Sci.Crypt since the age of 17, attends various security conferences around the world, and continues to openly promote safe computing practices. vii 404_CRYPTO_FM.qxd 10/30/06 2:33 PM Page viii 404_CRYPTO_TOC.qxd 10/30/06 2:21 PM Page ix Contents Preface . xix Chapter 1 Introduction . 1 Introduction . .2 Threat Models . .3 What Is Cryptography? . .4 Cryptographic Goals . .4 Privacy . .4 Integrity . .6 Authentication . .8 Nonrepudiation . .10 Goals in a Nutshell . .10 Asset Management . .11 Privacy and Authentication . .12 Life of Data . .12 Common Wisdom . .13 Developer Tools . .15 Summary . .16 Organization . .16 Frequently Asked Questions . .18 Chapter 2 ASN.1 Encoding . 21 Overview of ASN.1 . .22 ASN.1 Syntax . .23 ASN.1 Explicit Values . .24 ASN.1 Containers . .24 ASN.1 Modifiers . .26 OPTIONAL . .26 DEFAULT . .26 CHOICE . .27 ASN.1 Data Types . .28 ASN.1 Header Byte . .28 Classification Bits . .29 Constructed Bit . .29 ix 404_CRYPTO_TOC.qxd 10/30/06 2:21 PM Page x x Contents Primitive Types . .30 ASN.1 Length Encodings . .31 Short Encodings . .31 Long Encodings . .31 ASN.1 Boolean Type . .32 ASN.1 Integer Type . .33 ASN.1 BIT STRING Type . .34 ASN.1 OCTET STRING Type . .35 ASN.1 NULL Type . .35 ASN.1 OBJECT IDENTIFIER Type . .36 ASN.1 SEQUENCE and SET Types . .37 SEQUENCE OF . .39 SET . .39 SET OF . .40 ASN.1 PrintableString and IA5STRING Types . .41 ASN.1 UTCTIME Type . .41 Implementation . .42 ASN.1 Length Routines . .42 ASN.1 Primitive Encoders . .45 BOOLEAN Encoding . .46 INTEGER Encoding . .48 BIT STRING Encoding . .52 OCTET STRING Encodings . .55 NULL Encoding . .57 OBJECT IDENTIFIER Encodings . .58 PRINTABLE and IA5 STRING Encodings . .63 UTCTIME Encodings . .67 SEQUENCE Encodings . .71 ASN.1 Flexi Decoder . .78 Putting It All Together . .83 Building Lists . .83 Nested Lists . .85 Decoding Lists . .86 FlexiLists . .87 Other Providers . .89 Frequently Asked Questions . .90 404_CRYPTO_TOC.qxd 10/30/06 2:21 PM Page xi Contents xi Chapter 3 Random Number Generation . 91 Introduction . .92 Concept of Random . .92 Measuring Entropy . .94 Bit Count . .95 Word Count . .95 Gap Space Count .
Recommended publications
  • Cryptography Whitepaper
    Cryptography Whitepaper Threema uses modern cryptography based on open source components that strike an optimal balance between security, performance and message size. In this whitepaper, the algorithms and design decisions behind the cryptography in Threema are explained. VERSION: JUNE 21, 2021 Contents Overview 4 Open Source 5 End-to-End Encryption 5 Key Generation and Registration 5 Key Distribution and Trust 6 Message Encryption 7 Group Messaging 8 Key Backup 8 Client-Server Protocol Description 10 Chat Protocol (Message Transport Layer) 10 Directory Access Protocol 11 Media Access Protocol 11 Cryptography Details 12 Key Lengths 12 Random Number Generation 13 Forward Secrecy 14 Padding 14 Repudiability 15 Replay Prevention 15 Local Data Encryption 15 iOS 15 Android 16 Key Storage 16 iOS 16 Android 16 Push Notifications 17 iOS 17 Android 17 Threema • Cryptography Whitepaper Address Book Synchronization 17 Linking 18 ID Revocation 19 An Example 19 Profile Pictures 19 Web Client 20 Architecture 20 Connection Buildup 21 WebRTC Signaling 22 WebRTC Connection Buildup 22 Trusted Keys / Stored Sessions 23 Push Service 23 Self Hosting 24 Links 24 Threema Calls 24 Signaling 24 Call Encryption 24 Audio Encoding 25 Video Encoding 25 Privacy / IP Exposure 25 Threema Safe 26 Overview 26 Backup Format 27 Encryption 27 Upload/Storage 27 Backup Intervals 28 Restore/Decryption 28 Running a Custom Threema Safe Server 28 Threema • Cryptography Whitepaper Overview Threema uses two different encryption layers to protect messages between the sender and the recipient. • End-to-end encryption layer: this layer is between the sender and the recipient. • Transport layer: each end-to-end encrypted message is encrypted again for transport between the client and the server, in order to protect the header information.
    [Show full text]
  • ERHARD-RNG: a Random Number Generator Built from Repurposed Hardware in Embedded Systems
    ERHARD-RNG: A Random Number Generator Built from Repurposed Hardware in Embedded Systems Jacob Grycel and Robert J. Walls Department of Computer Science Worcester Polytechnic Institute Worcester, MA Email: jtgrycel, [email protected] Abstract—Quality randomness is fundamental to crypto- only an external 4 MHz crystal oscillator and power supply. graphic operations but on embedded systems good sources are We chose this platform due to its numerous programmable pe- (seemingly) hard to find. Rather than use expensive custom hard- ripherals, its commonality in embedded systems development, ware, our ERHARD-RNG Pseudo-Random Number Generator (PRNG) utilizes entropy sources that are already common in a and its affordability. Many microcontrollers and Systems On a range of low-cost embedded platforms. We empirically evaluate Chip (SoC) include similar hardware that allows our PRNG to the entropy provided by three sources—SRAM startup state, be implemented, including chips from Atmel, Xilinx, Cypress oscillator jitter, and device temperature—and integrate those Semiconductor, and other chips from Texas Instruments. sources into a full Pseudo-Random Number Generator imple- ERHARD-RNG is based on three key insights. First, we mentation based on Fortuna [1]. Our system addresses a number of fundamental challenges affecting random number generation can address the challenge of collecting entropy at runtime by on embedded systems. For instance, we propose SRAM startup sampling the jitter of the low-power/low-precision oscillator. state as a means to efficiently generate the initial seed—even for Coupled with measurements of the internal temperature sensor systems that do not have writeable storage. Further, the system’s we can effectively re-seed our PRNG with minimal overhead.
    [Show full text]
  • How to Eat Your Entropy and Have It Too — Optimal Recovery Strategies for Compromised Rngs
    How to Eat Your Entropy and Have it Too — Optimal Recovery Strategies for Compromised RNGs Yevgeniy Dodis1?, Adi Shamir2, Noah Stephens-Davidowitz1, and Daniel Wichs3?? 1 Dept. of Computer Science, New York University. { [email protected], [email protected] } 2 Dept. of Computer Science and Applied Mathematics, Weizmann Institute. [email protected] 3 Dept. of Computer Science, Northeastern University. [email protected] Abstract. We study random number generators (RNGs) with input, RNGs that regularly update their internal state according to some aux- iliary input with additional randomness harvested from the environment. We formalize the problem of designing an efficient recovery mechanism from complete state compromise in the presence of an active attacker. If we knew the timing of the last compromise and the amount of entropy gathered since then, we could stop producing any outputs until the state becomes truly random again. However, our challenge is to recover within a time proportional to this optimal solution even in the hardest (and most realistic) case in which (a) we know nothing about the timing of the last state compromise, and the amount of new entropy injected since then into the state, and (b) any premature production of outputs leads to the total loss of all the added entropy used by the RNG. In other words, the challenge is to develop recovery mechanisms which are guaranteed to save the day as quickly as possible after a compromise we are not even aware of. The dilemma is that any entropy used prematurely will be lost, and any entropy which is kept unused will delay the recovery.
    [Show full text]
  • Analysis of Entropy Usage in Random Number Generators
    DEGREE PROJECT IN THE FIELD OF TECHNOLOGY ENGINEERING PHYSICS AND THE MAIN FIELD OF STUDY COMPUTER SCIENCE AND ENGINEERING, SECOND CYCLE, 30 CREDITS STOCKHOLM, SWEDEN 2017 Analysis of Entropy Usage in Random Number Generators KTH ROYAL INSTITUTE OF TECHNOLOGY SCHOOL OF COMPUTER SCIENCE AND COMMUNICATION Analysis of Entropy Usage in Random Number Generators JOEL GÄRTNER Master in Computer Science Date: September 16, 2017 Supervisor: Douglas Wikström Examiner: Johan Håstad Principal: Omegapoint Swedish title: Analys av entropianvändning i slumptalsgeneratorer School of Computer Science and Communication i Abstract Cryptographically secure random number generators usually require an outside seed to be initialized. Other solutions instead use a continuous entropy stream to ensure that the internal state of the generator always remains unpredictable. This thesis analyses four such generators with entropy inputs. Furthermore, different ways to estimate entropy is presented and a new method useful for the generator analy- sis is developed. The developed entropy estimator performs well in tests and is used to analyse en- tropy gathered from the different generators. Furthermore, all the analysed generators exhibit some seemingly unintentional behaviour, but most should still be safe for use. ii Sammanfattning Kryptografiskt säkra slumptalsgeneratorer behöver ofta initialiseras med ett oförutsägbart frö. En annan lösning är att istället konstant ge slumptalsgeneratorer entropi. Detta gör det möjligt att garantera att det interna tillståndet i generatorn hålls oförutsägbart. I den här rapporten analyseras fyra sådana generatorer som matas med entropi. Dess- utom presenteras olika sätt att skatta entropi och en ny skattningsmetod utvecklas för att användas till analysen av generatorerna. Den framtagna metoden för entropiskattning lyckas bra i tester och används för att analysera entropin i de olika generatorerna.
    [Show full text]
  • Preimages for Reduced SHA-0 and SHA-1
    Preimages for Reduced SHA-0 and SHA-1 Christophe De Canni`ere1,2 and Christian Rechberger3 1 D´epartement d’Informatique Ecole´ Normale Sup´erieure, [email protected] 2 Katholieke Universiteit Leuven, Dept. ESAT/SCD-COSIC, and IBBT 3 Graz University of Technology Institute for Applied Information Processing and Communications (IAIK) [email protected] Abstract. In this paper, we examine the resistance of the popular hash function SHA-1 and its predecessor SHA-0 against dedicated preimage attacks. In order to assess the security margin of these hash functions against these attacks, two new cryptanalytic techniques are developed: – Reversing the inversion problem: the idea is to start with an impossible expanded message that would lead to the required di- gest, and then to correct this message until it becomes valid without destroying the preimage property. – P3graphs: an algorithm based on the theory of random graphs that allows the conversion of preimage attacks on the compression func- tion to attacks on the hash function with less effort than traditional meet-in-the-middle approaches. Combining these techniques, we obtain preimage-style shortcuts attacks for up to 45 steps of SHA-1, and up to 50 steps of SHA-0 (out of 80). Keywords: hash function, cryptanalysis, preimages, SHA-0, SHA-1, di- rected random graph 1 Introduction Until recently, most of the cryptanalytic research on popular dedicated hash functions has focused on collisions resistance, as can be seen from the successful attempts to violate the collision resistance property of MD4 [10], MD5 [32, 34], SHA-0 [6] and SHA-1 [13, 21, 33] using the basic ideas of differential cryptanaly- sis [2].
    [Show full text]
  • Package 'Rngsetseed'
    Package ‘rngSetSeed’ February 15, 2013 Type Package Title Initialization of the R base random number generator Mersenne-Twister with a vector of an arbitrary length. Version 0.2-3 Date 2012-03-08 Author Petr Savicky Maintainer Petr Savicky <[email protected]> Description The package provides a function setVectorSeed(vseed). Its argument is a vector of arbitrary nonzero length, including length 1, whose components have integer values from [0, 2^32-1] and which is used to initialize the R base Mersenne-Twister random number generator. In order to guarantee that different input vectors yield unrelated streams of random numbers, a random number generator based on AES (Advanced Encryption Standard) is used for the transformation of vseed into the initial state of Mersenne-Twister. Due to the use of AES, the function provides a better alternative to R base function set.seed() even if vseed is a single integer. Initializing random number stream with a vector including a reproducible index of an R process allows to use reproducible and unrelated streams of random numbers in several independent R processes. The package contains test scripts, which verify its installation by comparing the output with a stored precomputed one and by comparing the encryption provided by C-level AES with an implementation of AES at the R-level, which is included for test purposes. See CRAN package ‘‘randaes’’ for a random number generator based purely on AES. License GPL-2 LazyLoad yes Repository CRAN 1 2 rngSetSeed-package Date/Publication 2012-03-08 14:22:01 NeedsCompilation yes R topics documented: rngSetSeed-package .
    [Show full text]
  • Ciphire Mail Email Encryption and Authentication
    Ciphire Mail Email Encryption and Authentication Lars Eilebrecht Ciphire Labs [email protected] Abstract. Ciphire Mail is cryptographic software that provides email encryp- tion and digital signatures. The Ciphire Mail client resides on the user's com- puter between the email client and the email server, intercepting, encrypting, decrypting, signing, and authenticating email communication. During normal operation, all operations are performed in the background, making it very easy to use even for non-technical users. Ciphire Mail provides automated secure public-key exchange using an auto- mated fingerprinting system. It uses cryptographic hash values to identify and validate certificates, thus enabling clients to detect malicious modification of certificates. This data is automatically circulated among clients, making it im- possible to execute fraud without alerting users. The Ciphire system is a novel concept for making public-key cryptography and key exchange usable for email communication. It is the first transparent email encryption system that allows everyone to secure their communications without a steep learning curve. Keywords: Ciphire, secure email, email encryption, email authentication, digi- tal signatures, certificates, fingerprints, fingerprint system, PKI. Introduction Ciphire Mail is cryptographic software providing email encryption and digital signa- tures [24]. The Ciphire Mail client resides on the user's computer between the email client (mail user agent, MUA) and the email server (mail transfer agent, MTA), inter- cepting, encrypting, decrypting, signing, and authenticating email communication. During normal operation, all operations are performed in the background. This makes Ciphire Mail very similar to a transparent proxy. Apart from per-user installations, Ciphire Mail may also be deployed on mail servers as a gateway solution.
    [Show full text]
  • Pycryptodome Documentation Release 3.10.4
    PyCryptodome Documentation Release 3.10.4 Legrandin Sep 24, 2021 Contents 1 PyCryptodome 3 2 Features 5 3 Installation 9 3.1 Compiling in Linux Ubuntu.......................................9 3.2 Compiling in Linux Fedora....................................... 10 3.3 Windows (from sources, Python 2.7).................................. 10 3.4 Windows (from sources, Python 3.5 and newer)............................. 11 3.5 Documentation.............................................. 12 3.6 PGP verification............................................. 12 4 Compatibility with PyCrypto 15 5 API documentation 17 5.1 Crypto.Cipher package....................................... 17 5.1.1 Introduction........................................... 17 5.1.2 API principles.......................................... 17 5.1.3 Symmetric ciphers....................................... 18 5.1.4 Legacy ciphers......................................... 34 5.2 Crypto.Signature package..................................... 34 5.2.1 Signing a message....................................... 34 5.2.2 Verifying a signature...................................... 35 5.2.3 Available mechanisms..................................... 35 5.3 Crypto.Hash package......................................... 35 5.3.1 API principles.......................................... 35 5.3.2 Attributes of hash objects.................................... 37 5.3.3 Modern hash algorithms.................................... 37 5.3.4 Extensible-Output Functions (XOF).............................. 38 5.3.5
    [Show full text]
  • How to Correctly Use and Implement Cryptographic Primitives
    TMS Cryptography Pack How to correctly use and implement Cryptographic Primitives In our modern digital world, use of cryptographic services, functions and mechanisms is a common rule. Initially largely dedicated to the protection of data confidentiality, cryptographic algorithms are now used to verify data integrity, data origin and to provide non-repudiable evidence of transactions for instance. In this article, we survey different cryptographic primitives, their goal and we show, using examples with TMS Cryptography Pack1, how to use them in a secure manner. Five families of algorithms are discussed: symmetric algorithms, asymmetric algorithms, hash functions, key derivation functions and random number generators. The last section discusses the critical aspect of key management to properly activate the various primitives. Symmetric encryption algorithms These algorithms owe their name to the fact that the same key is used to both encrypt and decrypt file, messages and streams. They use a series of invertible functions that enable the production of a cryptogram from clear text. The most famous symmetric encryption algorithm is the Data Encryption Standard (DES), closely followed by the Advanced Encryption Standard (AES). DES using only 56 bit keys, it shall be banned to protect any sensitive2 data. AES shall be preferred to encrypt data whereas SPECK may be used with low power chips, such as found in embedded systems at large, with the reservation on the fact that it has been designed by NSA and therefore it should not be used to encrypt highly sensitive data with current knowledge on its design. Symmetric encryption algorithms fall into two categories: block encryption (e.g., AES, SPECK) and stream encryption (e.g., SALSA20).
    [Show full text]
  • Practical Random Number Generation in Software
    Practical Random Number Generation in Software John Viega Virginia Tech [email protected] Abstract There are simple, efficient cryptographic constructions that leak insignificant amounts of information about There is a large gap between the theory and practice the internal state, such as a block cipher run in CTR for random number generation. For example, on most (counter) mode. Nonetheless, there are numerous operating systems, using /dev/random to generate a practical pitfalls, even when one has a 256-bit AES key is highly likely to produce a key with cryptographically sound PRNG. Many of the concerns no more than 160 bits of security. In this paper, we have been addressed by other work. [15] and [6] both propose solutions to many of the issues that real look at the range of attacks that can be launched software-based random number infrastructures have against random number infrastructures. encountered. Particularly, we demonstrate that Nonetheless, the currently deployed solutions are universal hash functions are a theoretically appealing unsatisfying. The more implementation-oriented and efficient mechanism for accumulating entropy, we systems such as the /dev/random and /dev/urandom show how to deal with forking processes without devices on many modern operating systems often fail using a two-phase commit, we explore better metrics to facilitate analysis, whereas research-oriented systems for estimating entropy and argue that systems should tend to ignore some important practical requirements. provide both computational security and information Having a secure source of random numbers is a theoretic security through separate interfaces. critical assumption of many protocols systems. There have been several high profile failures in random 1.
    [Show full text]
  • Multi-Purpose Keccak for Modern Fpgas
    Introduction Modes of Operation Implementation Results and Conclusion Multi-Purpose Keccak for Modern FPGAs Panasayya Yalla Ekawat Homsirikamol Jens-Peter Kaps Cryptographic Engineering Research Group (CERG) http://cryptography.gmu.edu Department of ECE, Volgenau School of Engineering, George Mason University, Fairfax, VA, USA Directions in Authenticated Ciphers { DIAC 2014 August 24th, 2014 DIAC 2014 P. Yalla, E. Homsirikamol, J.-P. Kaps Multi-Purpose Keccak for Modern FPGAs 1 / 35 Introduction Modes of Operation Implementation Results and Conclusion Outline 1 Introduction 2 Modes of Operation 3 Implementation 4 Results and Conclusion DIAC 2014 P. Yalla, E. Homsirikamol, J.-P. Kaps Multi-Purpose Keccak for Modern FPGAs 2 / 35 Introduction Modes of Operation Cryptographic Services Implementation Cryptographic Algorithms Results and Conclusion Cryptographic Services Security protocols typically provide the following cryptographic services: Integrity Authenticity Confidentiality Non Repudiation Key Exchange/Agreement Pseudo Random Numbers Services provided through secret key functions With the exception of Non Repudiation and Key Exchange all other services are provided by secret key functions. DIAC 2014 P. Yalla, E. Homsirikamol, J.-P. Kaps Multi-Purpose Keccak for Modern FPGAs 3 / 35 Introduction Modes of Operation Cryptographic Services Implementation Cryptographic Algorithms Results and Conclusion Providing Cryptographic Services Secret key based cryptographic services can be provided by cryptographic functions. Integrity ! Hash Authenticity,
    [Show full text]
  • Secure Cloud Storage
    Secure Cloud Storage B.Sc. Thesis in Computer Science and Engineering Ahlstedt, Mattias Altensten, Simon Erlandsson, Andréas Hildén, Johannes Johansson, Rasmus Reitmaier, Rebecka Chalmers University of Technology University of Gothenburg Department of Computer Science and Engineering Gothenburg, Sweden 2017 Title: Secure Cloud Storage Authors: Mattias Ahlstedt, Simon Altensten, Andr´easErlandsson, Johannes Hild´en,Rasmus Johansson, Rebecka Reitmaier Supervisor: Michal Palka Examiner: Thomas Hallgren c Mattias Ahlstedt, 2017 c Simon Altensten, 2017 c Andr´easErlandsson, 2017 c Johannes Hild´en,2017 c Rasmus Johansson, 2017 c Rebecka Reitmaier, 2017 Department of Computer Science and Engineering Chalmers University of Technology University of Gothenburg SE-412 96 Gothenburg, Sweden Telephone + 46 (0)31 - 772 1000 The Authors grants to Chalmers University of Technology and University of Gothenburg the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law. The Author shall, when transferring the rights of the Work to a third party (for example a publisher or a company), acknowledge the third party about this agreement. If the Author has signed a copyright agreement with a third party regarding the Work, the Author warrants hereby that he/she has obtained any necessary permission from this third party to let Chalmers University of Technology and University of Gothenburg store the Work electronically and make it accessible on the Internet. Abstract This bachelor of science thesis describes and discusses the development of a secure cloud storage service.
    [Show full text]