Download Download
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Security in Wireless Sensor Networks Using Cryptographic Techniques
American Journal of Engineering Research (AJER) 2014 American Journal of Engineering Research (AJER) e-ISSN : 2320-0847 p-ISSN : 2320-0936 Volume-03, Issue-01, pp-50-56 www.ajer.org Research Paper Open Access Security in Wireless Sensor Networks using Cryptographic Techniques Madhumita Panda Sambalpur University Institute of Information Technology(SUIIT)Burla, Sambalpur, Odisha, India. Abstract: -Wireless sensor networks consist of autonomous sensor nodes attached to one or more base stations.As Wireless sensor networks continues to grow,they become vulnerable to attacks and hence the need for effective security mechanisms.Identification of suitable cryptography for wireless sensor networks is an important challenge due to limitation of energy,computation capability and storage resources of the sensor nodes.Symmetric based cryptographic schemes donot scale well when the number of sensor nodes increases.Hence public key based schemes are widely used.We present here two public – key based algorithms, RSA and Elliptic Curve Cryptography (ECC) and found out that ECC have a significant advantage over RSA as it reduces the computation time and also the amount of data transmitted and stored. Keywords: -Wireless Sensor Network,Security, Cryptography, RSA,ECC. I. WIRELESS SENSOR NETWORK Sensor networks refer to a heterogeneous system combining tiny sensors and actuators with general- purpose computing elements. These networks will consist of hundreds or thousands of self-organizing, low- power, low-cost wireless nodes deployed to monitor and affect the environment [1]. Sensor networks are typically characterized by limited power supplies, low bandwidth, small memory sizes and limited energy. This leads to a very demanding environment to provide security. -
Grain-128A: a New Version of Grain-128 with Optional Authentication
Grain-128a: a new version of Grain-128 with optional authentication Ågren, Martin; Hell, Martin; Johansson, Thomas; Meier, Willi Published in: International Journal of Wireless and Mobile Computing DOI: 10.1504/IJWMC.2011.044106 2011 Link to publication Citation for published version (APA): Ågren, M., Hell, M., Johansson, T., & Meier, W. (2011). Grain-128a: a new version of Grain-128 with optional authentication. International Journal of Wireless and Mobile Computing, 5(1), 48-59. https://doi.org/10.1504/IJWMC.2011.044106 Total number of authors: 4 General rights Unless other specific re-use rights are stated the following general rights apply: Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain • You may freely distribute the URL identifying the publication in the public portal Read more about Creative commons licenses: https://creativecommons.org/licenses/ Take down policy If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. LUND UNIVERSITY PO Box 117 221 00 Lund +46 46-222 00 00 Grain-128a: A New Version of Grain-128 with Optional Authentication Martin Agren˚ 1, Martin Hell1, Thomas Johansson1, and Willi Meier2 1 Dept. -
Cryptography Using Random Rc4 Stream Cipher on SMS for Android-Based Smartphones
(IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 9, No. 12, 2018 Cryptography using Random Rc4 Stream Cipher on SMS for Android-Based Smartphones Rifki Rifki1, Anindita Septiarini2, Heliza Rahmania Hatta3 Department of Computer Science, Faculty of Computer Science and Information Technology, Mulawarman University, Jl. Panajam Kampus Gn. Kelua, Samarinda, Indonesia. Abstract—Messages sent using the default Short Message image/graphic is 160 characters using 7 bits or 70 characters Service (SMS) application have to pass the SMS Center (SMSC) using 16 bits of character encoding [5]. to record the communication between the sender and recipient. Therefore, the message security is not guaranteed because it may Cryptographic methods are divided based on key-based read by irresponsible people. This research proposes the RC4 and keyless [6]. Several conventional keyless cryptographic stream cipher method for security in sending SMS. However, methods have implemented for improving data security such RC4 has any limitation in the Key Scheduling Algorithm (KSA) as Caesar ciphers [7], Vigenere ciphers [8], [9], Zigzag ciphers and Pseudo Random Generation Algorithm (PRGA) phases. [10], and Playfair cipher [11]. Those methods are more Therefore, this research developed RC4 with a random initial complex and consume a significant amount of power when state to increase the randomness level of the keystream. This applied in the resource-constrained devices for the provision SMS cryptography method applied the processes of encryption of secure communication [12]. Another method that has used against the sent SMS followed by decryption against the received is key-based with Symmetric Cryptography. The type of SMS. The performance of the proposed method is evaluated encryption that used is to provide end-to-end security to SMS based on the time of encryption and decryption as well as the messages. -
Improved Correlation Attacks on SOSEMANUK and SOBER-128
Improved Correlation Attacks on SOSEMANUK and SOBER-128 Joo Yeon Cho Helsinki University of Technology Department of Information and Computer Science, Espoo, Finland 24th March 2009 1 / 35 SOSEMANUK Attack Approximations SOBER-128 Outline SOSEMANUK Attack Method Searching Linear Approximations SOBER-128 2 / 35 SOSEMANUK Attack Approximations SOBER-128 SOSEMANUK (from Wiki) • A software-oriented stream cipher designed by Come Berbain, Olivier Billet, Anne Canteaut, Nicolas Courtois, Henri Gilbert, Louis Goubin, Aline Gouget, Louis Granboulan, Cedric` Lauradoux, Marine Minier, Thomas Pornin and Herve` Sibert. • One of the final four Profile 1 (software) ciphers selected for the eSTREAM Portfolio, along with HC-128, Rabbit, and Salsa20/12. • Influenced by the stream cipher SNOW and the block cipher Serpent. • The cipher key length can vary between 128 and 256 bits, but the guaranteed security is only 128 bits. • The name means ”snow snake” in the Cree Indian language because it depends both on SNOW and Serpent. 3 / 35 SOSEMANUK Attack Approximations SOBER-128 Overview 4 / 35 SOSEMANUK Attack Approximations SOBER-128 Structure 1. The states of LFSR : s0,..., s9 (320 bits) −1 st+10 = st+9 ⊕ α st+3 ⊕ αst, t ≥ 1 where α is a root of the primitive polynomial. 2. The Finite State Machine (FSM) : R1 and R2 R1t+1 = R2t ¢ (rtst+9 ⊕ st+2) R2t+1 = Trans(R1t) ft = (st+9 ¢ R1t) ⊕ R2t where rt denotes the least significant bit of R1t. F 3. The trans function Trans on 232 : 32 Trans(R1t) = (R1t × 0x54655307 mod 2 )≪7 4. The output of the FSM : (zt+3, zt+2, zt+1, zt)= Serpent1(ft+3, ft+2, ft+1, ft)⊕(st+3, st+2, st+1, st) 5 / 35 SOSEMANUK Attack Approximations SOBER-128 Previous Attacks • Authors state that ”No linear relation holds after applying Serpent1 and there are too many unknown bits...”. -
Analysis of Lightweight Stream Ciphers
ANALYSIS OF LIGHTWEIGHT STREAM CIPHERS THÈSE NO 4040 (2008) PRÉSENTÉE LE 18 AVRIL 2008 À LA FACULTÉ INFORMATIQUE ET COMMUNICATIONS LABORATOIRE DE SÉCURITÉ ET DE CRYPTOGRAPHIE PROGRAMME DOCTORAL EN INFORMATIQUE, COMMUNICATIONS ET INFORMATION ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE POUR L'OBTENTION DU GRADE DE DOCTEUR ÈS SCIENCES PAR Simon FISCHER M.Sc. in physics, Université de Berne de nationalité suisse et originaire de Olten (SO) acceptée sur proposition du jury: Prof. M. A. Shokrollahi, président du jury Prof. S. Vaudenay, Dr W. Meier, directeurs de thèse Prof. C. Carlet, rapporteur Prof. A. Lenstra, rapporteur Dr M. Robshaw, rapporteur Suisse 2008 F¨ur Philomena Abstract Stream ciphers are fast cryptographic primitives to provide confidentiality of electronically transmitted data. They can be very suitable in environments with restricted resources, such as mobile devices or embedded systems. Practical examples are cell phones, RFID transponders, smart cards or devices in sensor networks. Besides efficiency, security is the most important property of a stream cipher. In this thesis, we address cryptanalysis of modern lightweight stream ciphers. We derive and improve cryptanalytic methods for dif- ferent building blocks and present dedicated attacks on specific proposals, including some eSTREAM candidates. As a result, we elaborate on the design criteria for the develop- ment of secure and efficient stream ciphers. The best-known building block is the linear feedback shift register (LFSR), which can be combined with a nonlinear Boolean output function. A powerful type of attacks against LFSR-based stream ciphers are the recent algebraic attacks, these exploit the specific structure by deriving low degree equations for recovering the secret key. -
Fake Near Collisions Attacks∗
IACR Transactions on Symmetric Cryptology ISSN 2519-173X, Vol. 2020, No. 4, pp. 88–103. DOI:10.46586/tosc.v2020.i4.88-103 Fake Near Collisions Attacks∗ Patrick Derbez†, Pierre-Alain Fouque and Victor Mollimard Univ Rennes, Centre National de la Recherche Scientifique (CNRS), Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Rennes, France {patrick.derbez,pierre-alain.fouque,victor.mollimard}@irisa.fr Abstract. Fast Near collision attacks on the stream ciphers Grain v1 and A5/1 were presented at Eurocrypt 2018 and Asiacrypt 2019 respectively. They use the fact that the entire internal state can be split into two parts so that the second part can be recovered from the first one which can be found using the keystream prefix and some guesses of the key materials. In this paper we reevaluate the complexity of these attacks and show that actually they are inferior to previously known results. Basically, we show that their complexity is actually much higher and we point out the main problems of these papers based on information theoretic ideas. We also check that some distributions do not have the predicted entropy loss claimed by the authors. Checking cryptographic attacks with galactic complexity is difficult in general. In particular, as these attacks involve many steps it is hard to identify precisely where the attacks are flawed. But for the attack against A5/1, it could have been avoided if the author had provided a full experiment of its attack since the overall claimed complexity was lower than 232 in both time and memory. Keywords: Fast near collision technique · Reproducibility · Stream cipher 1 Introduction Checking results is in some sciences such as experimental physics as important as the result itself. -
Cryptanalysis of Sosemanuk and SNOW 2.0 Using Linear Masks
Cryptanalysis of Sosemanuk and SNOW 2.0 Using Linear Masks Jung-Keun Lee, Dong Hoon Lee, and Sangwoo Park ETRI Network & Communication Security Division, 909 Jeonmin-dong, Yuseong-gu, Daejeon, Korea Abstract. In this paper, we present a correlation attack on Sosemanuk with complexity less than 2150. Sosemanuk is a software oriented stream cipher proposed by Berbain et al. to the eSTREAM call for stream ci- pher and has been selected in the ¯nal portfolio. Sosemanuk consists of a linear feedback shift register(LFSR) of ten 32-bit words and a ¯nite state machine(FSM) of two 32-bit words. By combining linear approximation relations regarding the FSM update function, the FSM output function and the keystream output function, it is possible to derive linear approx- imation relations with correlation ¡2¡21:41 involving only the keystream words and the LFSR initial state. Using such linear approximation rela- tions, we mount a correlation attack with complexity 2147:88 and success probability 99% to recover the initial internal state of 384 bits. We also mount a correlation attack on SNOW 2.0 with complexity 2204:38. Keywords: stream cipher, Sosemanuk, SNOW 2.0, correlation attack, linear mask 1 Introduction Sosemanuk[3] is a software oriented stream cipher proposed by Berbain et al. to the eSTREAM call for stream cipher and has been selected in the ¯nal portfolio. The merits of Sosemanuk has been recognized as its considerable security margin and moderate performance[2]. Sosemanuk is based on the stream cipher SNOW 2.0[11] and the block cipher Serpent[1]. Though SNOW 2.0 is a highly reputed stream cipher, it is vulnerable to linear distinguishing attacks using linear masks[14, 15]. -
Efficient Implementation of Stream Ciphers on Embedded Processors
Efficient Implementation of Stream Ciphers on Embedded Processors Gordon Meiser 07.05.2007 Master Thesis Ruhr-University Bochum (Germany) Chair for Communication Security Prof. Dr.-Ing. Christof Paar Co-Advised by Kerstin Lemke-Rust and Thomas Eisenbarth “They who would give up an essential liberty for temporary security, deserve neither liberty or security.”(Benjamin Franklin, 1706-1790) iii STATEMENT / ERKLÄRUNG I hereby declare, that the work presented in this thesis is my own work and that to the best of my knowledge it is original, except where indicated by references to other authors. Hiermit versichere ich, dass ich meine Diplomarbeit selber verfasst und keine anderen als die angegebenen Quellen und Hilfsmittel benutzt, sowie Zitate kenntlich gemacht habe. Gezeichnet —————————– ——————————– Gordon Meiser Ort, Datum iv ACKNOWLEDGEMENT It is my pleasure to express my gratitude to all the people who contributed, in whatever manner, to the success of this work. I want to thank Prof. Dr.-Ing. Christof Paar for giving me the possibility to write my master thesis at the Chair for Communication Security at the Ruhr-University Bochum. Furthermore I’d like to thank my Co-Advisors Dipl.-Phys. Kerstin Lemke-Rust and Dipl.-Ing. Thomas Eisenbarth for advising me with writing scientific papers and an- swering all my questions. I also want to thank all the people sitting in my room, especially Leif Uhsadel and Sören Rinne, who helped me keep the focus on my work. I spent many nights working on my master thesis and with Leif this time was much easier to bear. Another thank you goes to all reviewers, especially to Phill Cabeen for reading, correcting, and revising my master thesis from the view of a native English speaker. -
Breaking Trivium Stream Cipher Implemented in ASIC Using Experimental Attacks and DFA
sensors Article Breaking Trivium Stream Cipher Implemented in ASIC Using Experimental Attacks and DFA Francisco Eugenio Potestad-Ordóñez * , Manuel Valencia-Barrero , Carmen Baena-Oliva , Pilar Parra-Fernández and Carlos Jesús Jiménez-Fernández Departament of Electronic Technology, University of Seville, Virgen de Africa 7, 41011 Seville, Spain; [email protected] (M.V.-B.); [email protected] (C.B.-O.); [email protected] (P.P.-F.); [email protected] (C.J.J.-F.) * Correspondence: [email protected] Received: 1 November 2020; Accepted: 1 December 2020; Published: 3 December 2020 Abstract: One of the best methods to improve the security of cryptographic systems used to exchange sensitive information is to attack them to find their vulnerabilities and to strengthen them in subsequent designs. Trivium stream cipher is one of the lightweight ciphers designed for security applications in the Internet of things (IoT). In this paper, we present a complete setup to attack ASIC implementations of Trivium which allows recovering the secret keys using the active non-invasive technique attack of clock manipulation, combined with Differential Fault Analysis (DFA) cryptanalysis. The attack system is able to inject effective transient faults into the Trivium in a clock cycle and sample the faulty output. Then, the internal state of the Trivium is recovered using the DFA cryptanalysis through the comparison between the correct and the faulty outputs. Finally, a backward version of Trivium was also designed to go back and get the secret keys from the initial internal states. The key recovery has been verified with numerous simulations data attacks and used with the experimental data obtained from the Application Specific Integrated Circuit (ASIC) Trivium. -
Improved Guess and Determine Attack on SOSEMANUK
Improved Guess and Determine Attack on SOSEMANUK Hadi Ahmadi 1, Taraneh Eghlidos 2, Shahram Khazaei 3 1 School of Electrical Engineering, Sharif University of Technology, Tehran, Iran. 2 Electronics Research Center, Sharif University of Technology, Tehran, Iran. 3 Zaeim Electronic Industries Co., Tehran, Iran. [email protected], [email protected], [email protected] Abstract. SOSEMANUK is a word-oriented stream cipher submitted to the ECRYPT stream cipher project, with a variable-length key between 128 and 256 bits. The algorithm is similar to the stream cipher SNOW 2.0 except having a smaller LFSR that can lead to higher efficiency. In this paper, we introduce a Guess and Determine (GD) attack on the stream cipher SOSEMANUK with a complexity of O(2226). The results show that the cipher has still the 128-bit security claimed by the authors, but does not provide full security when the key of length more than 226 bits is used. 1 Introduction Word-oriented stream ciphers are a class of stream ciphers in which the operations are done on blocks of w bits long, called word, and over the Galois Field GF(2w). The most important characteristic of these ciphers is their efficiency because they generate blocks of several bits instead of one bit per clock. Having much higher speed while being much smaller in hardware, word-oriented stream ciphers became of great interests to the industry and many cryptologists. The NESSIE project [1] started its first announcement in 2000 on cryptographic primitives from different fields of cryptography. The main objective was to collect and introduce strong cryptographic algorithms as standards in different fields of cryptography such as block ciphers, stream ciphers, MAC algorithms, hash functions, public key schemes and so on. -
A Novel Stream Cipher with Dynamic Structure By
A NOVEL STREAM CIPHER WITH DYNAMIC STRUCTURE BY FARDOUS MOHAMED ALI ELJADI A thesis submitted in fulfillment of the requirement for the degree of Doctor of Philosophy in Computer Science Kulliyyah of Information and Communication Technology International Islamic University Malaysia MARCH 2017 ABSTRACT Stream ciphers are commonly used to provide confidentiality for a wide range of frame based applications such as mobile devices or embedded systems. For these applications, stream ciphers are preferred for encryption due to the simplicity of their implementation, efficiency and high throughput. However, practical attacks have been discovered on well-known stream ciphers. Many stream ciphers are designed to resist these attacks. The majority of these ciphers has a fixed structure, which is an advantage that their security against the known attacks can be proved. However, the fixed building structure of these ciphers also provides opportunities for potential new attacks. There have been a few approaches that have tried to add dynamicity to the structure of these ciphers to improve their security level. The idea behind this is that when the structures of ciphers are unknown to attackers, they are more resistant to attacks. However, these ciphers are not widely discussed among researchers. Moreover, the existing research concerning stream ciphers with dynamic structures has focused mostly on dynamic polynomial switching in the Linear Feedback Shift Registers. This study proposes a novel dynamic structure stream cipher algorithm based on using a dynamic structure and some parameters to increase the complexity of the cipher, consequently, improving its security level. In the proposed cipher, the dynamic parameters are the number of registers, the length of the registers, the clocking system, the initialization procedure, the confusion and diffusion method, and the output function. -
An Ultra-Lightweight Cryptographic Library for Embedded Systems
ULCL An Ultra-lightweight Cryptographic Library for Embedded Systems George Hatzivasilis1, Apostolos Theodoridis2, Elias Gasparis2 and Charalampos Manifavas3 1 Dept. of Electronic & Computer Engineering, Technical University of Crete, Akrotiri Campus, 73100 Chania, Crete, Greece 2 Dept. of Computer Science, University of Crete, Voutes Campus, 70013 Heraklion, Crete, Greece 3 Dept. of Informatics Engineering, Technological Educational Institute of Crete, Estavromenos, 71500 Heraklion, Crete, Greece Keywords: Cryptographic Library, Lightweight Cryptography, API, Embedded Systems, Security. Abstract: The evolution of embedded systems and their applications in every daily activity, derive the development of lightweight cryptography. Widely used crypto-libraries are too large to fit on constrained devices, like sensor nodes. Also, such libraries provide redundant functionality as each lightweight and ultra-lightweight application utilizes a limited and specific set of crypto-primitives and protocols. In this paper we present the ULCL crypto-library for embedded systems. It is a compact software cryptographic library, optimized for space and performance. The library is a collection of open source ciphers (27 overall primitives). We implement a common lightweight API for utilizing all primitives and a user-friendly API for users that aren’t familiar with cryptographic applications. One of the main novelties is the configurable compilation process. A user can compile the exact set of crypto-primitives that are required to implement a lightweight application. The library is implemented in C and measurements were made on PC, BeagleBone and MemSic IRIS devices. ULCL occupies 4 – 516.7KB of code. We compare our library with other similar proposals and their suitability in different types of embedded devices. 1 INTRODUCTION (ECRYPT, 2008) finalists and the SHA-3 (NIST, 2012).