state university of telecommunications line cipher demonstration for educational purposes p.m....

21
State University of Telecommunications Line cipher demonstration for educational purposes P.M. Tutunnick, [email protected] Advisor: D.V. Kushnir

Upload: corey-mitchell

Post on 01-Jan-2016

220 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: State University of Telecommunications Line cipher demonstration for educational purposes P.M. Tutunnick, paul_3@front.ru Advisor: D.V. Kushnir

State University of Telecommunications

Line cipher demonstration for educational purposes

P.M. Tutunnick, [email protected]: D.V. Kushnir

Page 2: State University of Telecommunications Line cipher demonstration for educational purposes P.M. Tutunnick, paul_3@front.ru Advisor: D.V. Kushnir

2

Outline• Cryptology basics:

– Subject and main directions– Binary functions

• The overview of “Virtual University” complex creation history• Main principles of PC-based laboratory exercise• “LogiCon” experimentation tool introduction:

– Nature and general purpose– Main features list– Engine functionality basics– Interface capablities

• Application example:– “Exploration of Line-Recurrent Register” exercise– Key generator projects contest

• Complex adapation posiblities• Alternative use directions• Progress perspectives

Page 3: State University of Telecommunications Line cipher demonstration for educational purposes P.M. Tutunnick, paul_3@front.ru Advisor: D.V. Kushnir

3

Cryptology Subject

The science studying principles, methods and means of transformation of the information for its protection against unauthorized access and distortion.

Science about safety of communications

CryptographyThe science studying principles of possible cryptoatacks, and measuring defensive potential of cryptosystems.

Cryptanalysis

Page 4: State University of Telecommunications Line cipher demonstration for educational purposes P.M. Tutunnick, paul_3@front.ru Advisor: D.V. Kushnir

4

Cryptography directionsIt provides:

• Secrecy of stored private information

• Safety of messaging

• Users autentification

• Security of algorithms

• Passwords & keys management

Objects to protect :

• Encryption and decryption algorithm

• Transmitting channels

• Encryption details

• User co-ordinates

• Fact of encrypted transmittion

Types of important information, that needs to be protected:

• State secret

• Military secret

• Commercial secret

• Jurisprudential Secret

• Medical secret

• etc.

Page 5: State University of Telecommunications Line cipher demonstration for educational purposes P.M. Tutunnick, paul_3@front.ru Advisor: D.V. Kushnir

5

Tipical Cryptosystem Model

Main Types of Attacks :• Statistical (“linguoanalysis”) attac • Algorithm (“exploit”) attack• Chosen content (“user”) attack• Block-revealing (“vocabulary”) attack• Power (“all-key”) attack• Destructive (“heating”) attack• etc.

• Replacement ciphers

(Lisandr, “Scitala”)

• Switching ciphers

(“Caesar cipher”)

Simple Ciphers:

Page 6: State University of Telecommunications Line cipher demonstration for educational purposes P.M. Tutunnick, paul_3@front.ru Advisor: D.V. Kushnir

6

Binary Functions

y=F(x1,x2,..xn)Decimal (Multiplexing)

1 2 3 4

1 1 2 3 4

2 2 4 6 8

3 3 6 9 12

4 4 8 12 16

Binary (OR operation)

0 1

0 0 1

1 1 1

x1 y

0 1

1 0

x1 x2 y

0 0 0

0 1 0

1 0 0

1 1 1

x1 x2 y

0 0 0

0 1 1

1 0 1

1 1 1

“NOT” “AND” “OR”Binary Basis 3D Basis

Page 7: State University of Telecommunications Line cipher demonstration for educational purposes P.M. Tutunnick, paul_3@front.ru Advisor: D.V. Kushnir

7

Basis Functions Combining Example:

“XOR” Operator 1 1 0

0 1 1

1 0 1

0 0 0

y x2 x1

1221 XXXX %50)1|1(%50)1( 22 XYPXP

21 XXY

Page 8: State University of Telecommunications Line cipher demonstration for educational purposes P.M. Tutunnick, paul_3@front.ru Advisor: D.V. Kushnir

8

“Virtual university” project complex• Started: 1993

• Developed by: teachers and students of SUT ITTERC

• Meant to: assist the educational courses by interactive demonstration of it’s subjects and systematyse already existing thematical computing researches

• Now allows to:– Provide high-quality visual & interactive representings of

described physical & logical processes

– Fully automatyse technicaly aspects of educational processes

– Stimulate new researches by integrating it in earlier application packages

– Complete practical tasks remotely via internet

– Use virtual laboratories for performing topical experiments of any kind without any additional equipment

Page 9: State University of Telecommunications Line cipher demonstration for educational purposes P.M. Tutunnick, paul_3@front.ru Advisor: D.V. Kushnir

9

Subjects of University, in which project components are employed:

• Cryptography

• Steganography

• Programming on C Language

• Programming on Assembler Language

• High Level Programming

• Computing Support of Engeneering

• ElectroCommunications Theory

• SchemoTechnics Basics

• Digital Processing of Signals

• Military practice

Most of program complexes developed by ITTERC are integrated in the common database system that provides user access, basing on a Smart-Card technology, and contains student practice real-time statistics.

Page 10: State University of Telecommunications Line cipher demonstration for educational purposes P.M. Tutunnick, paul_3@front.ru Advisor: D.V. Kushnir

10

PC-based practice program properties:

Educational utility Clear work plan Interactive elucidative texts Not too formal and easy to perform Acceptable visualization quality Unified interface functionality Wide experimental capabilities Controling and score-counting tools Integrated client-server system Modification abilities

Page 11: State University of Telecommunications Line cipher demonstration for educational purposes P.M. Tutunnick, paul_3@front.ru Advisor: D.V. Kushnir

11

Virtual Logical Models Constructor Utilityaka LogiCon

- Multipurposal educational desighning toolset package, that allows to create, redact and analyse fully operational logical schemes of different sorts.

- Was developed in 2004 for demonstration of cryptography basic algorithms.

- Upgraded to provide experience of exploring and development of abstract logic schemes, allowing to applicate it more effectively and widely.

- Is currently bypassing final adaptation and tests before getting into exploitation.

Page 12: State University of Telecommunications Line cipher demonstration for educational purposes P.M. Tutunnick, paul_3@front.ru Advisor: D.V. Kushnir

12

LogiCon Project main features list

• Flexible logical functionality

• User-friendly interface

• Drag’n’drpop-based workspase

• Rich set of pre-programed logical elements

• Nearly unlimited number of construction blocks

• Blocks flexible tuning ability

• Multi-level logic desighn

• File-level exchange

• Built-in script sublanguage

• Abitity to model occasionaly events

• Statistic analiser tools

• Interactive guiding informer

• Smart result-checking system

Page 13: State University of Telecommunications Line cipher demonstration for educational purposes P.M. Tutunnick, paul_3@front.ru Advisor: D.V. Kushnir

13

LogiCon Engine functionality basics: “block”

• Input/Output

• Registers

• Functions

• Custom Operators

- Primary construction element

- Low-level defined visual object

- Provides inner data processing

Each kind of element is supported with a individual settings system

with a simple access by a pop-up menu, allowing to change block

options swiftly without replacing it.

Page 14: State University of Telecommunications Line cipher demonstration for educational purposes P.M. Tutunnick, paul_3@front.ru Advisor: D.V. Kushnir

14

LogiCon Engine functionality basics: “link”

- Single-sided connection between blocks

- Defined as a block logical property

- Delivers the binary calculation results

User-established links define a scheme graph virtual

matrix, allowing it to perform logical operations.

- Standart, constantive state of a scheme

- Untill switched all digital values remain unchanged

Proceeding to the next phase allows to spectate sceme

operating step-by-step and to receive the intermediate

results of process.

LogiCon Engine functionality basics: “phase”

Page 15: State University of Telecommunications Line cipher demonstration for educational purposes P.M. Tutunnick, paul_3@front.ru Advisor: D.V. Kushnir

15

Logicon Interface Components

System Menu

Desighn Space

Zoom-In/Out

Switch to Next/Previous Phase

Availible Components

Stand-Alone Component

Page 16: State University of Telecommunications Line cipher demonstration for educational purposes P.M. Tutunnick, paul_3@front.ru Advisor: D.V. Kushnir

16

Block Ciphering Stream (Line) Ciphering

Joining Algorithm

Page 17: State University of Telecommunications Line cipher demonstration for educational purposes P.M. Tutunnick, paul_3@front.ru Advisor: D.V. Kushnir

17

Simple stream cipher algorithm

Encryption Decryption

Page 18: State University of Telecommunications Line cipher demonstration for educational purposes P.M. Tutunnick, paul_3@front.ru Advisor: D.V. Kushnir

18

LogiCon representation

Encryption DecryptionTransmission

Page 19: State University of Telecommunications Line cipher demonstration for educational purposes P.M. Tutunnick, paul_3@front.ru Advisor: D.V. Kushnir

19

Linear recurrent register shift algorithm

T=2n-1

B0,2=F(B2,1,B7,1)

n

Page 20: State University of Telecommunications Line cipher demonstration for educational purposes P.M. Tutunnick, paul_3@front.ru Advisor: D.V. Kushnir

20

Modified (switching) key generator

T=T1.T2.T3

Page 21: State University of Telecommunications Line cipher demonstration for educational purposes P.M. Tutunnick, paul_3@front.ru Advisor: D.V. Kushnir

21

Thank you for attention!Спасибо за внимание!

LogiCon

[email protected]

www.uicitt-sut.spb.ru