This document discusses and compares various cryptographic algorithms for use in securing satellite downlink communications. It begins with an overview of aspects of satellite security and introduces cryptography. It then covers symmetric and asymmetric cryptographic algorithms like AES, RSA and stream ciphers. It analyzes the performance of algorithms in terms of hardware usage and throughput. Block cipher modes and attacks on cryptosystems are also examined. The document concludes by recommending the KHAZAD block cipher and A5/1 stream cipher as best suited for satellite security based on a performance comparison.
HASH FUNCTIONS AND DIGITAL SIGNATURES
Authentication requirement – Authentication function – MAC – Hash function – Security of hash function and MAC –MD5 – SHA – HMAC – CMAC – Digital signature and authentication protocols – DSS – EI Gamal – Schnorr.
HASH FUNCTIONS AND DIGITAL SIGNATURES
Authentication requirement – Authentication function – MAC – Hash function – Security of hash function and MAC –MD5 – SHA – HMAC – CMAC – Digital signature and authentication protocols – DSS – EI Gamal – Schnorr.
Artificial Intelligence: Artificial Neural NetworksThe Integral Worm
This presentation covers artificial neural networks for artificial intelligence. Topics covered are as follows: artificial neural networks, basic representation, hidden units, exclusive OR problem, backpropagation, advantages of artificial neural networks, properties of artificial neural networks, and disadvantages of artificial neural networks.
Introduction to Public key Cryptosystems with block diagrams
Reference : Cryptography and Network Security Principles and Practice , Sixth Edition , William Stalling
Abstract
Field of image processing has vast applications in medical, forensic, research etc., It includes various domains like enhancement,
classification, segmentation, etc., which are widely used for these applications. Image Enhancement is the pre processing step on
which the accuracy of the result lies. Image enhancement aims to improve the visual appearance of an image, without affecting
the original attributes (i.e.,) image contrast is adjusted and noise is removed to produce better quality image. Hence image
enhancement is one of the most important tasks in image processing. Enhancement is classified into two categories spatial domain
enhancement and frequency domain enhancement. Spatial domain enhancement acts upon pixel value whereas frequency domain
enhancement acts on the Fourier transform of the image. The enhancement techniques to be used depend on modality, climatic
and visual perspective etc., In this paper, we present a survey on various existing image enhancement techniques.
Keywords: Enhancement, Spatial domain enhancement, Frequency domain enhancement, Contrast, Modality.
BCH codes, part of the cyclic codes, are very powerful error correcting codes widely used in the information coding techniques. This presentation explains these codes with an example.
This Presentation discusses about the following topics:
Introduction to Intelligent Systems
Expert Systems
Neural Networks
Fuzzy Logic
Intelligent Agents
Slides from the presentation "Modern Cryptography" delivered at Deovxx UK 2013. See Parleys.com for the full video https://www.parleys.com/speaker/5148920c0364bc17fc5697a5
Artificial Intelligence: Artificial Neural NetworksThe Integral Worm
This presentation covers artificial neural networks for artificial intelligence. Topics covered are as follows: artificial neural networks, basic representation, hidden units, exclusive OR problem, backpropagation, advantages of artificial neural networks, properties of artificial neural networks, and disadvantages of artificial neural networks.
Introduction to Public key Cryptosystems with block diagrams
Reference : Cryptography and Network Security Principles and Practice , Sixth Edition , William Stalling
Abstract
Field of image processing has vast applications in medical, forensic, research etc., It includes various domains like enhancement,
classification, segmentation, etc., which are widely used for these applications. Image Enhancement is the pre processing step on
which the accuracy of the result lies. Image enhancement aims to improve the visual appearance of an image, without affecting
the original attributes (i.e.,) image contrast is adjusted and noise is removed to produce better quality image. Hence image
enhancement is one of the most important tasks in image processing. Enhancement is classified into two categories spatial domain
enhancement and frequency domain enhancement. Spatial domain enhancement acts upon pixel value whereas frequency domain
enhancement acts on the Fourier transform of the image. The enhancement techniques to be used depend on modality, climatic
and visual perspective etc., In this paper, we present a survey on various existing image enhancement techniques.
Keywords: Enhancement, Spatial domain enhancement, Frequency domain enhancement, Contrast, Modality.
BCH codes, part of the cyclic codes, are very powerful error correcting codes widely used in the information coding techniques. This presentation explains these codes with an example.
This Presentation discusses about the following topics:
Introduction to Intelligent Systems
Expert Systems
Neural Networks
Fuzzy Logic
Intelligent Agents
Slides from the presentation "Modern Cryptography" delivered at Deovxx UK 2013. See Parleys.com for the full video https://www.parleys.com/speaker/5148920c0364bc17fc5697a5
Bitcoin, Blockchain and the Crypto Contracts - Part 2Prithwis Mukerjee
Where we explain how the cryptographic ideas are used to create a crypto asset on the block chain. This one part of a three part slide deck. For the full deck and the context please visit http://bit.ly/pm-bbc
In this project we develop an application for translation of information in any language to Cipher/Encrypted , which otherwise is done by using different software in the present scenario. Our attempt is to overcome the various shortcomings in different software available in the market and develop the best (Encryptor/Decryptor) with most useful algorithms. We explore and implement Tiny Algorith, Neural Algorithm, A hybrid blend Neural and Tiny algorithm, Rijandel Agorithm, Stegnography (for Image and Audio files), Video Encryption and Decryption, and a Chat server for secret Communication oiver the software.
This design involves the implementation AES 128. Inside top module, enc, dec and key_generation modules are available. Both enc and dec are controlled via respective resets. When enc executes, key_generation runs and further fills the key memory. dec unit on its execution extracts key from the same memory. Working on to test the design with Side Channel Attacks.
Introduction to blockchain and crypto currenciesRohas Nagpal
The Blockchain technology has received tremendous attention over the last couple of years.Key benefits of blockchains include immutability and decentralisation.
Reserve Bank of India has said that "With its potential to fight counterfeiting, the 'blockchain' is likely to bring about a major transformation in the functioning of financial markets, collateral identification (land records for instance) and payments system".
This presentation introduces the blockchain technology.
A Complete Beginners Guide to Blockchain Technology Part 5 of 6. Slides from the #StartingBlock2015 tour by @blockstrap
Part 1: http://www.slideshare.net/Blockstrap/cbgtbt-part-1-workshop-introduction-primer
Part 2: http://www.slideshare.net/Blockstrap/02-blockchains-101
Part 3: http://www.slideshare.net/Blockstrap/03-transactions-101
Part 4: http://www.slideshare.net/Blockstrap/cbgtbt-part-4-mining
Part 5: http://www.slideshare.net/Blockstrap/05-blockchains-102
Part 6: http://www.slideshare.net/Blockstrap/06-transactions-102
Overview on Cryptography and Network SecurityDr. Rupa Ch
These slides give some overview on the the concepts which were in Crytography and network security. I have prepared these slides by the experiece after refer the text bbok as well as resources from the net. Added figures directly from the references. I would like to acknowledge all the authors by originally.
Cryptography is the science of using mathematics to encrypt and decrypt data.
Cryptography enables you to store sensitive information or transmit it across insecure networks so that it cannot be read by anyone except the intended recipient.
A brief discussion of network security and an introduction to cryptography. We end the presentation with a discussion of the RSA algorithm, and show how it works with a basic example.
Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...ijcisjournal
In this paper, we present an improved Paillier Cryptosystem for a secured data transmission based on the
Residue Number System (RNS). The current state of Paillier Cryptosystem allows the computation of the
plaintext from the cipher text without solving its security assumption of Decisional Composite Residuosity
or the knowledge of its private keys under mathematical attacks
RSA is one of the most popular Public Key Cryptography based algorithm mainly used for digital
signatures, encryption/decryption etc. It is based on the mathematical scheme of factorization of very large
integers which is a compute-intensive process and takes very long time as well as power to perform.
Several scientists are working throughout the world to increase the speedup and to decrease the power
consumption of RSA algorithm while keeping the security of the algorithm intact. One popular technique
which can be used to enhance the performance of RSA is parallel programming. In this paper we are
presenting the survey of various parallel implementations of RSA algorithm involving variety of hardware
and software implementations.
Unit 1
Information System Security
(According RTU Syllabus)
1-Introduction to security attacks Services and mechanism
2-Classical encryption techniques
3-Cryptanalysis, stream and block ciphers
4- Modern Block Ciphers: Block ciphers principals
5- Shannon’s theory of confusion and diffusion
6- Fiestal structure
7- Data encryption standard(DES)
8- Differential and linear cryptanalysis of DES
9- Block cipher modes of operations.
10- Triple Data Encryption Standard (Triple-DES)
Paying forward, this deck summarizes key concepts we need to be successful in IT Operations and security, focus is cryptographic controls and their relationship to cryptographic exploits. Please refer to the Networking and Security deck to better understand reference to layers and their associated protocols.
Topics listed below are explained in the PPT:
Introduction
CIA Triad
Mechanisms of Cryptography
OSI Security Architecture
Security Attacks
Security Mechanisms
Security Services
Cryptography vs Steganography
Network Security Model
Cryptographic techniques
Stream Cipher vs Block cipher
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...editor1knowledgecuddle
Today is the era of Internet and networks applications. So,Information security is a challenging issue in today’s technological world. There is a demand for a stronger encryption which is very hard to crack. The role of Cryptography is most important in the field of network security. There is a broad range of cryptographic algorithms that are used for securing networks and presently continuous researches on the new cryptographic algorithms are going on for evolving more advanced techniques for secures
communication. In this study is made for the cryptography algorithms, particularly algorithms- AES, DES, RSA, Blowfishare compared and performance is evaluated. Also some enhanced algorithms are described and compared with the enhanced algorithms.
Keywords - AES, DES, BLOWFISH, Decryption, Encryption, Security
RSA and RC4 Cryptosystem Performance Evaluation Using Image and TextYekini Nureni
The process of transforming plaintext data into cipher text in order to conceal its meaning in case it fall to hand of unauthorized recipient is refers to as encryption. The systems that perform the encryption processes are known as cryptosystems, there are several cryptosystem algorithms: RSA, RC4, DES, 3DES, Blowfish, AES, IDEA, Skipjack, DSA, ElGamal, etc. The major features that identify and differentiate one cryptosystem algorithm from another are its ability to secure the protected data against attacks and its speed/efficiency. In this paper: application software was designed to implement RSA, and RCA encryption algorithms with advanced features of visual Basic 6 for the front end interface. Microsoft Access is used to design backend of the application, and the Macromedia Flash was also used to incorporate dynamic features that enhance the appearance of the application. The program was used to compare the performance of RSA and RC4. The encryption operation was carried out for both RSA and RC4 using five text files and five graphic files of different sizes 10, 50, 100, 150, and 200 kilobyte respectively. The major factor considered for measuring the performance of the algorithms (RSA and RC4) is the speed of execution using time of execution (TE) as parameter for the evaluation. The performance result was presented and analyzed. We discovered that the RC4 is better compare to RSA algorithm based on the experimental facts presented and the result analysis of the two evaluated algorithms.
Similar to A study of cryptography for satellite applications (20)
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Key Trends Shaping the Future of Infrastructure.pdf
A study of cryptography for satellite applications
1. By
Rajesh Azmera
Shakun Yawatkar
at
Digital Systems Group
ISAC, Bangalore
2. Objectives
Study of basics of cryptography and different
cryptographic methods.
Study of CCSDS security needs and recommendations
Comparison of several cryptographic algorithms
Finding the best cryptographic algorithm for satellite
security( downlink in RS satellites)
3. Overview
Aspects of Satellite Security and their
Countermeasures
Introduction to Cryptography
Classification of Cryptography
Attacks and their classification
Various Cryptographic Algorithms and their
comparison
CCSDS Recommendations
Comparison of Block and Stream Ciphers
Conclusion
4. Aspects of Satellite Security
Access Control:
Process of granting access to the resources of a system only
to authorized users, programs, processes.
Enable only approved operators to access mission control
systems
Authentication:
Ability to verify the identity of a user or device.
Only authenticated telecommands are obeyed by the
onboard systems.
Availability:
Assurance that a system will be usable when it has to be.
Spread Spectrum and Frequency Hopping techniques can
be used to prevent jamming.
5. Aspects of Satellite Security Continued
Confidentiality:
Ensures that data is disclosed only to the authorized systems.
Prevents disclosure of sensitive information contained within space mission
data system.
Confidentiality of uplink and downlink data
Prevents analysis of communication traffic by unauthorized system.
CRYPTOGRAPHY COMES INTO PICTURE.
Data Integrity:
Ensuring that data transmitted from a source is not modified, altered or
destroyed
Mission data has not been manipulated in any way during Transmission.
Appending Integrity Check Value (ICV) to the data structure
A form of sequence numbering for stream of data.
Accountability:
Ensures that the system actions are logged with the identity of the entity
initiating the action and the data and time the action occurred( Auditing)
6. Classes of Missions with respect to security
High Security Missions:
Government or Military section
Protection of mission data from unauthorized
access, Prevention from detection, interception, and
exploitation
Moderate Security Missions:
Commercial Communications, Meteorological and Remote
Sensing Missions
Protection from unauthorized access, protect payload data
Minimal Security Missions:
Other space missions
Confidentiality requirement for specific telemetry
information
7. Introduction to Cryptography
Need of Cryptography:
Confidentiality, Authentication, Integrity and Non-
repudiation are needed in various applications like
Radio Communication,
Telephonic Communication
Network Communication
Mobile Communication
Internet
8. Cryptography
Cryptography is the science of protecting data, which
provides means and methods of converting data into
unreadable form, so that
The data cannot be accessed for unauthorized use.
The content of the data frames is hidden.
The authenticity of the data can be established.
The undetected modification of the data is avoided.
The originator of the message cannot disown the data.
10. Some Important Terms
Plaintext: An original intelligible message or data that is
fed into the algorithm as input.
Ciphertext: The coded message is known as Ciphertext. It
depends upon the plaintext and the secret key
Encryption: The process of conversion of plaintext into
ciphertext is known as Encryption
Decryption: Restoring the plaintext from ciphertext is
known as Decryption.
Cryptanalysis: Techniques used for deciphering a message
without any knowledge of enciphering details fall into the
area of Cryptanalysis.
Cryptology: The areas of cryptography and cryptanalysis
together are called Cryptology.
11. Classification of Cryptographic Techniques
Symmetric Key Cryptography
also known as Secret Key Cryptography
Problem: Process of transferring keys to the recipient
is prone to risk. Includes a authorized third party.
12. Asymmetric (Public Key) Cryptography:
This technique is very slow as compared to symmetric
one.
14. Cryptographic Algorithms in Symmetric Key
Cryptography
Data Encryption Standard (DES)
Extensively studied since its publication and is the best
known algorithm
Developed by IBM in 1970 s.
64-bit block size and 56-bit key
In multiuser environment, secure key distribution may
be difficult
Most recently DES cracking machine was used to
recover 56-bit key in 22 hrs.
Result: DES is not secure, Banned by U.S. Government.
15. Triple DES
Minor Variation of DES, three times slower than DES
More secure than DES
EDE(Encrypt- Decrypt-Encrypt)
Encrypts plaintext data with a 56-bit key. The
ciphertext obtained is decrypted with different key
giving garbage data. And this garbage data is again
encrypted using the first key.
Some other algorithms are IDEA, RC4, RC5, CAST 128
16. Advanced Encryption Standard (AES)
National Institute of Standards and Technology (NIST) realized the
need of new secure algorithm to replace DES. And arranged a
competition.
One of the criteria for the arranged competition was the ability to
support 128-bit blocks of plaintext.
The finalists of the competition were
MARS: by IBM
RC6: by Ron Rivest of RSA Labs
Twofish: from Counterpane Internet Security (highly suitable for
microprocessors and smart cards
Serpent: by Ross Anderson, Eli Bihan and Lars Knudsen
Rijndael: by Daemen and Rijmen
Of all these, Rijndael was judged best and announced to be new AES.
17. Rijndael Algorithm
Fixed Block Sixe of 128-bits and key size of 128, 192 or
256 bits.
Operates on 4*4 matrix of bytes, termed the state.
8 or 10 or 12 rounds as per the respective key size. Each
round consists of several processing steps.
18. High-level description of the algorithm:
Key Expansion- round keys are derived from the cipher key using Rijndael's key schedule
Initial Round
Add Round Key- each byte of the state is combined with the round key using bitwise
xor
Rounds
SubBytes- a non-linear substitution step where each byte is replaced with another
according to a lookup table.
ShiftRows- a transposition step where each row of the state is shifted cyclically a
certain number of steps.
MixColumns- a mixing operation which operates on the columns of the
state, combining the four bytes in each column.
AddRoundKey
Final Round (no MixColumns)
SubBytes
ShiftRows
AddRoundKey
20. Algorithms in Asymmetric Cryptography
The most common algorithm is RSA.
Ronald Rivest, Adi Shamir, and Leonard Adleman
developed the RSA system in 1977; RSA stands for the first
letter in each of its inventors’ last names.
Take two large primes, p and q, and compute their product
n = pq: n is called the modulus. Choose a number ‘e’ less
than n and relatively prime to (p-1)(q-1), Which means e
and (p - 1)(q - 1) have no common factors except 1.
Find another number d such that (ed - 1) is divisible by (p -
1)(q - 1). The values e and d are called the public and private
exponents/keys. The public key is the pair (n; e); the
private key is (n; d). The factors p and q may be destroyed
or kept with the private key.
21. It is currently difficult to obtain the private key d from
the public key (n; e). However if one could factor n
into p and q, then one could obtain the private key d.
Thus the security of the RSA system is based on the
assumption that factoring is difficult.
22. Symmetric encryption are further classified as
Block ciphers – It encrypts plain text and decipher the
text blocks of a fixed length.
Stream ciphers – In this plain text bits are combined with
a pseudorandom cipher bit stream by exclusive –or
operation. In this plain text bits are encrypted one at a
time.
23. Different types of Block ciphers are:
1. Electronic Code Book Mode(ECB).
2. Cipher-Block Chaining Mode(CBC).
3. Cipher Feed-Back Mode(CFB).
4. Output Feed Back Mode(OFB).
5. Counter Mode(CTR).
24. Electronic Code Book mode - Each plain text block is
encrypted by the underlying algorithm Block
Encryption, transmitted and decrypted . The last fragment
of the message is suitably padded with zero to make it
block size.
Disadvantage – Identical plain text block has identical
cipher text block, where it does not provide serious
message confidentiality.
25. Cipher Block Chaining Mode- Co is initialization vector which is
used as the seed for the process.
Initialization vector- A block of bits is used by several modes to
randomize the encryption.
26. Cipher Feed back Mode-
The cipher key stream is extracted from the outputs of the block cipher
encryption whose inputs are taken as the feedback from the cipher text
stream. Before the feedback is available , an initialization vector is used as
a seed.
27. Out put Feed back Mode- This is almost similar to the CFB
mode ,except that the block cipher encryption takes the feedback
directly from its own outputs.
30. Stream classified into two types
1. Synchronous stream Cipher- In this type of cipher the sender
and receiver must be exactly in step/synchronized for decryption to
be successful. If digits are added or removed from the message during
transmission, synchronization is lost, however a single bit is lost and
error doesn’t propagate.
2. Self-synchronous Stream cipher- In this type, if digits are
added/removed during the transmission synchronization can be
attained by the algorithm.
In this stream ciphers padding is not required as in case of block ciphers.
31. Various types of attacks that are possible on
cryptographic systems
There are two types of basic attacks:
Passive attack.
Active attack.
Passive attack: This type of attack is generally accomplished by
eavesdropping and modification of data is not possible.
A space system can be subjected to two principle types of passive attacks :
Compromise of Data confidentiality- Disclosure of information
flowing between ground and space systems
Compromise of traffic flow confidentiality-Disclosure of
information like volume, source and destination of the information.
eg: traffic analysis.
These are difficult to detect because they don’t involve alteration of data.
32. Active attacks-
Some of the possible types of attacks to be considered for space systems
are:
Modification of messages- This kind of attack occurs when some
amount of data is altered resulting in undesirable effects.
Replay Attack- when a message or part of it is stored and repeated at
later time to produce undesirable effect.
Insider attack- Most of the computer crimes are the result of insider
attack.
Software threats- programs like viruses , worms etc.. to allow
bypassing the usual security controls.
33. Attacks which are possible on stream ciphers
Possible attacks on stream ciphers are:
Known Cipher text attack.
Known plain text attack.
Chosen plain text attack.
Chosen cipher text attack.
Side channel attack.
Bit flipping attack.
Known Cipher text attack – In this type of attack where the attacker
assumed to have access to set of cipher texts. The attack is completely
successful if the plain text is deducted.
Various techniques developed by the cryptographers are:
Traffic analysis.
Brute force attack.
34. Know plain text attack : the attacker has the samples of both the
cipher text and plain text and use them to reveal the information.
Chosen plain text attack- Here the attacker has the capability to
choose the plain text and obtain the corresponding cipher text. The goal
of the attack to gain some further information which reduces the security
of the encryption scheme.
Chosen cipher text attack- In this attacker gather the information at
least in part by part and obtaining its decryption under a unknown key.
The aim is to deduce the key.
Key recovery method- a method to recover the key.
35. Side channel attack- Side channel attacks are based on side channel
information, side cannel information is retrieved from physical
implementation instead of theoretical weakness. Here the attacker
studies the power consumption of a cryptographic device and uses its
electro magnetic radiation to find out the key.
Bit flipping attack- in this type of attack, attacker can change the cipher
text in such a way that a predictable change in plain text is made.
This type of attack can be avoided by using message authentication codes
(MAC) to increase the likelihood that tampering will be detected.
36. Attacks that are possible on block ciphers:
Brute force attack.
Linear crypt analysis.
Differential crypt analysis.
Brute force attack- It involves symmetrically checking all the possible
keys until the correct key is found. In the worst case, this would involve
traversing entire search space.
Linear crypt analysis- In this attack it takes the advantage of linear
relationships between a the input and output of cipher keys. The usual
approach is to analyze the non linear components and approximate them.
37. Differential crypt analysis- In this type of attack it analyzes the
differences in pair of plaintext on the difference of resultant cipher texts.
These differences can be used to assign probabilities to the possible keys
and locate the most possible key.
38. Comparison of various algorithms based data
rate, throughput and hardware.
Throughput- defined as the no.of bits encrypted and decrypted in
unit of time.
Through put per slice-which measures the hardware
cost, associated with the implementation resulting throughput.
Latency- time necessary to encrypt and decrypt a single block of
plain text or cipher text.
39. Performance comparison of stream ciphers:
Cipher Area (Slices) Frequency (MHz) Throughput (Mbps) Through/Area
A5/1 32 188.3 188.3 5.88
W7 608 96 768 1.26
E0 895 189 189 0.21
Helix 418 32 1024 2.45
RC4 140 60.8 120.8 0.86
Hardware used- Xilinx Virtex XC2v6000 1152-6 FPGA which contains
33792 slices and 144 RAM blocks.
Conclusion- A5/1 is considered as best.
40. Performance comparison of Block ciphers
It consists of two basic type of architectures-
Basic Looping Architecture-
44. Conclusion obtained from above table :
A5/1 is most efficient but is the weakest
Helix appears to be efficient but requires software pre-computations
which may not be practical.
LILI-II is not competitive with modern block ciphers and its expensive
synchronization limits its efficiency.
SNOW2.0 considered to be best and comparable to ICEBERG
Comparison between ICEBERG and AES shows that AES should be
preferred for space application where through put is compromised.
45. CCSDS :
The Consultative Committee for Space Data Systems, formed in 1982
by the major space agencies of the world.
Since its establishment, actively developing recommendations for data
and information systems.
CCSDS standardization reduces the cost burden of missions by cost
sharing between agencies and cost effective commercialization.
CCSDS recommendations
Proposed only block cipher for encryption than stream cipher because
Block cipher are faster and different algorithms can be implemented
without changing the hardware.
Stream cipher can be susceptible to serious security problems if used
incorrectly.
46. Algorithm selection by CCSDS
AES,BLOWFISH,TEA,IDEA,SEED were considered but AES was
recommended.
BLOWFISH : It is the predecessor of the AES finalist TWOFISH which was
not on CCSDS’s list.
Tiny Encryption Algorithm(TEA): It requires many rounds (64). So extreme
high speed is not achieved with cryptographic weaknesses.
IDEA: Strong but speed is not high. Also, IDEA is patented and licensed.
SEED: Korean algorithm, performance was not outstanding and usage was
limited to Korea.
AES: Selected through lengthy, open , international competition.
Available worldwide on a royalty free basis and not covered by any
legal restrictions/patents.
AES USING COUNTER MODE OPERATION IS RECOMMENDED BY CCSDS.
47. Advantages of counter mode:
Counter mode is very efficient in operation.
Padding is not required.
Single bit error results in loss of single bit.
Counter mode effectively converts block cipher to stream cipher so that
advantages of both can be achieved.
Parallel computation is possible.
48. Comparison between stream and block cipher:
Stream cipher Block cipher
1. It encrypts and decrypts one bit data at a time. It encrypts a block at a time of size M.
2. Different algorithms cannot be implemented using the Using block cipher hardware architecture different types of
same hardware. algorithm can be implemented without changing the
hardware
3. Applications where the speed is required it cannot It provides high speed though the encryption is
provide high speed providing more encryption which is not comparatively lower than that of stream ciphers.
required by the application
4. Transmission error can affect only single bit. Transmission error in one cipher text block has no effect on
other blocks in counter mode.
5. Padding is not required. Padding is required.
6. Insertion and deletion of bits is not possible. Insertion and deletion of blocks is possible.
7. Less susceptible for crypt analysis attack but if used More susceptible for crypt analysis attack as compared to
incorrectly, can be susceptible to serious security problems. stream ciphers
8. Through put is less than block ciphers. Through put is high.
9. Hardware required is less. Hardware requirement is high.
10. Difficult to implement in software basis. Easy to implement compared to stream ciphering.
11. Cipher resynchronization is required when there is Resynchronization is not required.
error in a bit.
12. Synchronous stream cipher is periodic and key may No repetition is done because key is generated randomly.
repeat after d characters.
13. Parallel process of encryption can be done. Parallel process of encryption cannot be done.
49. Conclusion:
Security of Remote sensing satellites fall under high or moderate levels.
As the high resolution imaging payloads generate data, large in size. So
higher data rate is required along with security.
Stream ciphers cannot provide high speed, block cipher are preferred.
Block cipher in counter mode is preferred so as to minimize BER.
Considering the comparison between various algorithms and CCSDS
recommendations AES with counter mode is preferred for satellite
downlink data.
50. References :
[1] RSA Laboratories, RSA Laboratories’ Frequently Asked Questions About Today’s Cryptography, Version 4.1, RSA Security
Inc., 2000
[2] Encryption algorithm Trade Survey, Report Concerning Space Data System Standards, CCSDS-350.2-G-1, Green
Book, Washington D.C.: CCSDS, March 2008.
[3] Symmetric Encryption, Draft Recommendation for Space Data Practices, CCSDS 353.0-R-1, Red Book, Washington
D.C., October 2008
[4] Audia_S_Abd Al_R_Asedy, Ameer A.J Al_ Swidi, An advantages and disadvantages of Block and Stream Cipher,
<http://www.uobabylon.edu.iq/uobColeges/fileshare/articles/block.pdf>
[5]Cryptography Basics
<http://media.wiley.com/product_data/excerpt/94/07645487/0764548794.pdf>
[6] Advanced Encryption Standard, Federal Information Processing Standards Publications
197, November 26, 2001
[7] Mohammed Atiquzzaman and Md. Shohrab Hossain, Security Issues in Space Networks,
[8] The Secret Satellite, www.apscc.or.kr | APSCC Yearbook 2007
[9]Michalis Galanis, Paris Kitsos, Giorgos Kostopoulos, Nicolas Sklavos, and Costas Goutis, Comparison
of the Hardware Implementation of the Stream Ciphers, The International Arab Journal of Information
Technology, Vol. 2, No. 4, October 2005