CBC Mode and Initial Vector for the AES algorithm in WIMAX Protocol Stack JAN 2, 2012 AJALA.AJ [email_address] AJAL.A.J AS...
OBJECTIVE  <ul><li>TO IMPLEMENT THE NETWORK LEVEL SECURITY IN IEEE-802.16e STANDARDS USING Advanced Encryption Standards [...
MOTIVATION  ( SECURITY ISSUES ) <ul><li>CONFIDENTALITY </li></ul><ul><li>MESSAGE INTEGRITY </li></ul><ul><li>AUTHENTICATIO...
Review of the Block Cipher Plaintext data byte  p AJAL.A.J ASST PROF – METS SCHOOL OF ENGG , MALA; KERALA  MOB: 0- 8907305...
Encryption Algorithms AJAL.A.J ASST PROF – METS SCHOOL OF ENGG , MALA; KERALA  MOB: 0- 8907305642   3key TDES  2key TDE...
WiMAX Protocol Stack <ul><li>Provides secure communication </li></ul><ul><ul><li>Data encrypted with cipher clock chaining...
Authentication
Data Key Exchange
Data Encryption
WIMAX  –  FEATURES <ul><li>OFDM  </li></ul><ul><li>Sub Channelization  </li></ul><ul><li>Directional Antennas </li></ul><u...
OFDMA System Architecture 2008 Spectrum Frequency User A User B User C Frequency Time User A User B User C 01/02/12 BS Use...
  WiMAX  Security Architecture
System Architecture <ul><li>Data Privacy subsystem (DPS) </li></ul><ul><ul><li>Get the data form different system </li></u...
Subsystem design    (Data Privacy Subsystem) <ul><li>Data Encryption Function </li></ul><ul><ul><li>Get key from key manag...
Security Suite Specification <ul><li>It is  based  on 3 security mechanisms: </li></ul><ul><li>CBC-MAC mode, to provide fo...
CBC Mode AJAL.A.J ASST PROF – METS SCHOOL OF ENGG , MALA; KERALA  MOB: 0- 8907305642 P1 IV E K C1 P2 E K C2 C1 D K P1 IV C...
Counter Mode (a stream cipher mode) AJAL.A.J ASST PROF – METS SCHOOL OF ENGG , MALA; KERALA  MOB: 0- 8907305642 ENCRYPT DE...
CCM Mode Overview <ul><li>Designed for IEEE 802.11 wireless LANs </li></ul><ul><li>Use CBC-MAC to compute a MIC (Message I...
BI-SOVA BLOCK DIAGRAM
<ul><li>TRACE BACK SYSTOLIC ARRAY OF BI-SOVA – SIMULATION RESULTS </li></ul>
SYSTOLIC ARRAY
 
<ul><li>BI-SOVA SIMULATION RESULTS </li></ul>AJAL.A.J ASST PROF – METS SCHOOL OF ENGG , MALA; KERALA  MOB: 0- 8907305642
 
 
TRANCEIVER OF MIMO OFDM
 
SUMMARY <ul><li>Advanced Encryption standard comes under suite B achieves top level secret using CCM mode </li></ul><ul><l...
REFERENCES <ul><li>[1]  C. Thmas, M. A. Bickerstaff, L. M. Davis, T. Prokop, B. Widdup, G. Zhou, D. Garrett, C. Nicol, “In...
Feedback? AJAL.A.J ASST PROF – METS SCHOOL OF ENGG , MALA; KERALA  MOB: 0- 8907305642
Upcoming SlideShare
Loading in...5
×

Ajal jose

350

Published on

SECURITY

Published in: Education, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
350
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
1
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "Ajal jose"

  1. 1. CBC Mode and Initial Vector for the AES algorithm in WIMAX Protocol Stack JAN 2, 2012 AJALA.AJ [email_address] AJAL.A.J ASST PROF – METS SCHOOL OF ENGG , MALA; KERALA MOB: 0- 8907305642
  2. 2. OBJECTIVE <ul><li>TO IMPLEMENT THE NETWORK LEVEL SECURITY IN IEEE-802.16e STANDARDS USING Advanced Encryption Standards [AES] </li></ul>WIMAX MOBILE WIMAX FIXED WIMAX AJAL.A.J ASST PROF – METS SCHOOL OF ENGG , MALA; KERALA MOB: 0- 8907305642
  3. 3. MOTIVATION ( SECURITY ISSUES ) <ul><li>CONFIDENTALITY </li></ul><ul><li>MESSAGE INTEGRITY </li></ul><ul><li>AUTHENTICATION </li></ul><ul><li>NON- REPUDATION </li></ul>AJAL.A.J ASST PROF – METS SCHOOL OF ENGG , MALA; KERALA MOB: 0- 8907305642
  4. 4. Review of the Block Cipher Plaintext data byte p AJAL.A.J ASST PROF – METS SCHOOL OF ENGG , MALA; KERALA MOB: 0- 8907305642 Pseudo-random number generator “ key stream” byte b  Ciphertext data byte c = p  b
  5. 5. Encryption Algorithms AJAL.A.J ASST PROF – METS SCHOOL OF ENGG , MALA; KERALA MOB: 0- 8907305642   3key TDES  2key TDES TDES     256   192    128 AES Top Secret Secret After 2010 Through 2010 Suite B Unclassified use
  6. 6. WiMAX Protocol Stack <ul><li>Provides secure communication </li></ul><ul><ul><li>Data encrypted with cipher clock chaining mode of DES </li></ul></ul><ul><li>Prevents theft of service </li></ul><ul><ul><li>SSs authenticated by BS using key management protocol </li></ul></ul>
  7. 7. Authentication
  8. 8. Data Key Exchange
  9. 9. Data Encryption
  10. 10. WIMAX – FEATURES <ul><li>OFDM </li></ul><ul><li>Sub Channelization </li></ul><ul><li>Directional Antennas </li></ul><ul><li>Adaptive Modulation </li></ul>
  11. 11. OFDMA System Architecture 2008 Spectrum Frequency User A User B User C Frequency Time User A User B User C 01/02/12 BS User A User B User C
  12. 12. WiMAX Security Architecture
  13. 13. System Architecture <ul><li>Data Privacy subsystem (DPS) </li></ul><ul><ul><li>Get the data form different system </li></ul></ul><ul><ul><li>Verify the data if encrypt or decrypt </li></ul></ul><ul><ul><li>Dispatch the data to the subsystem </li></ul></ul><ul><li>Authentication subsystem (AS) </li></ul><ul><ul><li>Verify the certification </li></ul></ul><ul><ul><li>Add the relative information </li></ul></ul><ul><ul><li>Generate the AK (New one or Update old) </li></ul></ul><ul><li>Key Management subsystem (KMS) </li></ul><ul><ul><li>Save the information of the key (TEK KEK HMAC-keys etc.) </li></ul></ul><ul><ul><li>Use AK to Generate key (KEK HMAC-key) </li></ul></ul><ul><ul><li>Generate the TEK (New one or Update old) </li></ul></ul><ul><li>Data Privacy subsystem (DPS) </li></ul><ul><ul><li>Get the data form different system </li></ul></ul><ul><ul><li>Verify the data if encrypt or decrypt </li></ul></ul><ul><ul><li>Dispatch the data to the subsystem </li></ul></ul><ul><li>Authentication subsystem (AS) </li></ul><ul><ul><li>Verify the certification </li></ul></ul><ul><ul><li>Add the relative information </li></ul></ul><ul><ul><li>Generate the AK (New one or Update old) </li></ul></ul><ul><li>Key Management subsystem (KMS) </li></ul><ul><ul><li>Save the information of the keys (TEK KEK HMAC-key etc.) </li></ul></ul><ul><ul><li>Use AK to Generate key (KEK HMAC-key) </li></ul></ul><ul><ul><li>Generate the TEKs (New one or Update old) </li></ul></ul>
  14. 14. Subsystem design (Data Privacy Subsystem) <ul><li>Data Encryption Function </li></ul><ul><ul><li>Get key from key management </li></ul></ul><ul><ul><li>subsystem </li></ul></ul><ul><ul><li>Get the security algorithm from </li></ul></ul><ul><ul><li>Security Suit Function </li></ul></ul><ul><li>Data Decryption Function </li></ul><ul><ul><li>Get key from key management subsystem </li></ul></ul><ul><ul><li>Get the security algorithms from Security Suit Function </li></ul></ul><ul><ul><li>Send the tek relative information to key management subsystem </li></ul></ul><ul><ul><li>Send the certification to Authentication subsystem </li></ul></ul><ul><li>Security Suit Function </li></ul><ul><ul><li>Provide the different encrypt/decrypt algorithms and signature algorithm </li></ul></ul><ul><li>Data Encryption Function </li></ul><ul><ul><li>Get key from Key Management </li></ul></ul><ul><ul><li>subsystem </li></ul></ul><ul><ul><li>Get the security algorithm from </li></ul></ul><ul><ul><li>Security Suit Function </li></ul></ul><ul><li>Data Decryption Function </li></ul><ul><ul><li>Get key from Key Management subsystem </li></ul></ul><ul><ul><li>Get the security algorithms from Security Suit Function </li></ul></ul><ul><ul><li>Send the TEK relative information to key management subsystem </li></ul></ul><ul><ul><li>Send the certification to Authentication subsystem </li></ul></ul><ul><li>Security Suit Function </li></ul><ul><ul><li>Provide the different encrypt/decrypt algorithms and signature algorithm </li></ul></ul>
  15. 15. Security Suite Specification <ul><li>It is based on 3 security mechanisms: </li></ul><ul><li>CBC-MAC mode, to provide for data authentication only </li></ul><ul><li>AES-CTR mode, to provide data confidentiality only </li></ul><ul><li>AES-CCM mode, to provide both data confidentiality and data authenticity. </li></ul>AJAL.A.J ASST PROF – METS SCHOOL OF ENGG , MALA; KERALA MOB: 0- 8907305642
  16. 16. CBC Mode AJAL.A.J ASST PROF – METS SCHOOL OF ENGG , MALA; KERALA MOB: 0- 8907305642 P1 IV E K C1 P2 E K C2 C1 D K P1 IV C2 D K P2 Pn E K Cn Cn D K Pn ENCRYPT DECRYPT
  17. 17. Counter Mode (a stream cipher mode) AJAL.A.J ASST PROF – METS SCHOOL OF ENGG , MALA; KERALA MOB: 0- 8907305642 ENCRYPT DECRYPT C1 E K CTR1 1 P1 P2 E K C2 CTR2 C2 E K P2 CTR2 Pn E K Cn Cn E K Pn CTRn CTRn • • • • • • P1 E K C1 CTR1 Keystream
  18. 18. CCM Mode Overview <ul><li>Designed for IEEE 802.11 wireless LANs </li></ul><ul><li>Use CBC-MAC to compute a MIC (Message Integrity Code) on the plaintext header, length of the header, and the payload </li></ul><ul><li>Use CTR mode to encrypt the payload </li></ul><ul><ul><li>Counter values 1, 2, 3, … </li></ul></ul><ul><li>Use CTR mode to encrypt the MIC </li></ul><ul><ul><li>anywhere else we’d call it a MAC rather than a MIC </li></ul></ul><ul><ul><li>Counter value 0 </li></ul></ul>Header Payload MIC Authenticated Encrypted AJAL.A.J ASST PROF – METS SCHOOL OF ENGG , MALA; KERALA MOB: 0- 8907305642
  19. 19. BI-SOVA BLOCK DIAGRAM
  20. 20. <ul><li>TRACE BACK SYSTOLIC ARRAY OF BI-SOVA – SIMULATION RESULTS </li></ul>
  21. 21. SYSTOLIC ARRAY
  22. 23. <ul><li>BI-SOVA SIMULATION RESULTS </li></ul>AJAL.A.J ASST PROF – METS SCHOOL OF ENGG , MALA; KERALA MOB: 0- 8907305642
  23. 26. TRANCEIVER OF MIMO OFDM
  24. 28. SUMMARY <ul><li>Advanced Encryption standard comes under suite B achieves top level secret using CCM mode </li></ul><ul><li>Decoder part has been completely implemented sucessfully </li></ul><ul><li>FFT module has been analyzed to suite IEEE802.16e standards </li></ul>AJAL.A.J ASST PROF – METS SCHOOL OF ENGG , MALA; KERALA MOB: 0- 8907305642
  25. 29. REFERENCES <ul><li>[1] C. Thmas, M. A. Bickerstaff, L. M. Davis, T. Prokop, B. Widdup, G. Zhou, D. Garrett, C. Nicol, “Integrated circuits for channel coding in 3G cellular mobile wireless systems,” IEEE Commun. Mag., vol. 41, no. 8, pp. 150-159, Aug. 2003. </li></ul><ul><li>[2] C.-S. Lee, T. Keller, and L. Hanzo, “OFDM-based turbo-coded </li></ul><ul><li>hierarchical and non-hierarchical terrestrial mobile digital video </li></ul><ul><li>broadcasting,” IEEE Trans. on Broadcasting, vol. 46, no. 1, pp. 1-22, Mar. 2000. </li></ul><ul><li>[3] C.-H. Wang, W.-T. Wang, and C.-C. Chao, “A unified structure of trellis-based soft-output decoding algorithms for turbo codes,” IEEE Trans. on Commun., vol. 52, no. 8, pp. 1355-1366, Aug. 2004. </li></ul><ul><li>[4] L. Papke and P. Robertson, “Improved decoding with the SOVA in a parallel concatenated (turbo-code) scheme,” in Proc. ICC96, pp. 102-106. </li></ul>AJAL.A.J ASST PROF – METS SCHOOL OF ENGG , MALA; KERALA MOB: 0- 8907305642
  26. 30. Feedback? AJAL.A.J ASST PROF – METS SCHOOL OF ENGG , MALA; KERALA MOB: 0- 8907305642
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×