On Security Enhancement of Lightweight Encryption Employing Error - - PowerPoint PPT Presentation

on security enhancement of lightweight encryption
SMART_READER_LITE
LIVE PREVIEW

On Security Enhancement of Lightweight Encryption Employing Error - - PowerPoint PPT Presentation

On Security Enhancement of Lightweight Encryption Employing Error Correction Coding and Simulators of Channels with Synchronization Errors Miodrag MIHALJEVIC Mathematical Institute, Serbian Academy of Sciences and Arts Belgrade, Serbia - COST


slide-1
SLIDE 1

1 1 1 1

On Security Enhancement of Lightweight Encryption Employing Error Correction Coding and Simulators of Channels with Synchronization Errors Miodrag MIHALJEVIC

Mathematical Institute, Serbian Academy of Sciences and Arts Belgrade, Serbia

  • COST CRYPTACUS Workshop -

16-18 November 2017, Nijmegen - Netherlands

slide-2
SLIDE 2

2

Roadmap

  • Introduction
  • A Framework for Security Enhanced

Encryption Based on Channels with Synchronization Errors

  • Particular Instantiation
  • Information-Theoretic Security Evaluation
  • Computational-Complexity Security

Evaluation

  • Concluding Notes
slide-3
SLIDE 3

3 3 3 3

  • 1. Introduction

Noisy Channels and Security Enhancement of Encryption

slide-4
SLIDE 4

Security of Encryption and Implementation Complexity

  • Mainly based on

heuristic assumptions

  • Particularly when the

encryption is based

  • n employment of

finite state machines

  • Lightweight

encryption implies additional challenges ...

  • Security

enhancement appers as an interesting approach ...

  • Asymmetric

implementation complexity of encryption and decryption also appears as an interesting issue

4

slide-5
SLIDE 5

Claude Shannon (1916-2001)

5

slide-6
SLIDE 6

Two Key Papers

  • Information Thory
  • C. E. Shannon, “A

mathematical theory

  • f communication”.

Bell System Technical Journal, vol. 27, pp. 379–423 and 623– 656, July and October 1948.

  • Cryptology
  • C. E. Shannon

"Communication Theory of Secrecy Systems". Bell System Technical Journal, vol. 28 (4),

  • pp. 656–715, 1949.
slide-7
SLIDE 7

Noisy Channels

Channels with Additive Noise

  • Erasure Channel
  • Binary Symmetric

Channel

  • Gaussian Channel
  • ...

Channels with Synchronization Noise

  • Channels with insertion
  • Channels with deletions
  • Channels with Insertion,

deletion and additive noise

  • ...

7

slide-8
SLIDE 8

Binary Channel with Random Erasures

8

Initial vector with bits subject to erasure Erasure of bits is RANDOM – Positions of erased bits are KNOWN

slide-9
SLIDE 9

Binary Channel with Random Bit Complementation (BSC Channel)

9

Initial vector with bits subject to complementation Complementation of bits is RANDOM – Positions of deleted bits are UNKNOWN

slide-10
SLIDE 10

Binary Channel with Random Bit Insetion

10

Expanded vector after the chanel with random bits insertion Initial vector with bits subject to bit insertion Insertion of bits is RANDOM – Positions of insereted bits are UNKNOWN

slide-11
SLIDE 11

Binary Channel with Random Bit Deletion

11

Shrinked vector after the chanel with random bits deletion Initial vector with bits subject to deletion Deletion of bits is RANDOM – Positions of deleted bits are UNKNOWN

slide-12
SLIDE 12
  • 2. A Framework for Security

Enhancement Based on the Channels with Synchronization Errors

12

slide-13
SLIDE 13

13

Homophonic & Error Correction Encoding Encryption Binary Symmetric Channel Encryption Error Correction Coding & Simmulation of a Channel with Synchronization Errors

Paradigm II Paradigm I

slide-14
SLIDE 14

14

Desired Model of Encryption an Attacker Should Face

slide-15
SLIDE 15

15

Encryption at Party I Encryption at Party II

Keystream Generator

+

Binary Channel with Insertion Errors

Attacker Side

Keystream Generator

+

Binary Channel with Deletion Errors

slide-16
SLIDE 16

16

A Framework for Encryption Based on Simulated Channels with Synchronization Errors

Lightweight Keystream Generator

+ +

error correction decoding

Lightweight Keystream Generator

+ +

error correction encoding simulated channel with sync. errors Party-I Party-II stream-ciphering stream-ciphering error correction encoding simulated channel with sync. errors error correction decoding

slide-17
SLIDE 17

17

A Framework for Encryption with Asymmetric Implementation Complexity

Lightweight Keystream Generator

+ +

error correction decoding

Lightweight Keystream Generator

+ +

error correction encoding decimation decimation random bits embedding (after channel with erasures) (for channel with erasures) Party-I Party-II stream-ciphering stream-ciphering

slide-18
SLIDE 18

block cipher encryption encoding for binary erasure channel simulator

  • f a

binary erasure channel block cipher decryption decoding of the binary erasure error correction code control of the simulator control of decoding

slide-19
SLIDE 19

19

A Linear Binary Block Code Encoding Paradigm

binary vector Generator Matrix of Linear Block Code codeword degraded codeword with erased bits x x x channel with bit erasures

slide-20
SLIDE 20
  • 3. Particular Instantiation

Under Security Evaluation

slide-21
SLIDE 21

A Framework for Encryption and Decryption with Asymmetric Implementation Complexity

Lightweight Keystream Generator

+

Lightweight Keystream Generator

+

decimation random bits embedding

Transmitting Entity Receiving Entity encryption

simulator of a binary channel with insertions

decryption

source of randomness

M C X G’ Y Y C M G’ X

deterministic mapping deterministic mapping

G G

slide-22
SLIDE 22
  • 4. Information-Theoretic

Security Evaluation

slide-23
SLIDE 23

Preliminaries

slide-24
SLIDE 24
slide-25
SLIDE 25
slide-26
SLIDE 26

Illustrative Numerical Example

0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1

slide-27
SLIDE 27
slide-28
SLIDE 28
slide-29
SLIDE 29
  • 5. Computational Complexity

Security Evaluation

slide-30
SLIDE 30
slide-31
SLIDE 31
slide-32
SLIDE 32
slide-33
SLIDE 33
slide-34
SLIDE 34
  • Y. Liron and M. Langberg, “A Characterization of the Number of

Subsequences Obtained via the Deletion Channel”, IEEE Transactions

  • n Information Theory, vol. 61, no. 5, pp. 2300-2312, May 2015.
slide-35
SLIDE 35
  • Y. Liron and M. Langberg, “A Characterization of the Number of

Subsequences Obtained via the Deletion Channel”, IEEE Transactions

  • n Information Theory, vol. 61, no. 5, pp. 2300-2312, May 2015.
slide-36
SLIDE 36
slide-37
SLIDE 37
slide-38
SLIDE 38
slide-39
SLIDE 39

Concluding Notes

slide-40
SLIDE 40

Main Messages

  • A paradigm for the

security enhancement based on results regarding channels with synchronization errors has been proposed

  • Evaluation of the

security enhancement has been discussed from the information- theoretic and computational complexity points of view

40

slide-41
SLIDE 41

41

Thank You Very Much for the Attention,

and QUESTIONS Please!