ram.ppt

47
FPGA Implementation of Diffie- Hellman Key Exchange Algorithm for Zero Knowledge Proof Presented by: V. SeethaRama Rao (12B81D5727) UNDER GUIDENCE OF Mr. M. Ashok Sir..

Upload: uday-kumar

Post on 18-Jul-2016

12 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: ram.ppt

FPGA Implementation of Diffie-Hellman Key Exchange Algorithm for Zero Knowledge Proof

Presented by: V. SeethaRama Rao (12B81D5727)UNDER GUIDENCE OFMr. M. Ashok Sir..(Sr. Asst.Professor)

Page 2: ram.ppt

•AIM of Project

•Attacks

•Network Security block diagram

•D-H key Exchange Algorithm

•ZKP Version1 and Version 2

•Simulation Results

•Applications

•Conclusion

•Future scope

•References

CONTENTS :

Page 3: ram.ppt

Aim of Project:The main aim of project is to design Zero Knowledge Proof protocol

and resists the known attacks.

Network Security is to provide security for the network which is done by Cryptography.

Cryptography means hiding the data.

Page 4: ram.ppt

Security Attack:Any action that compromises the security of information

owned by an organization

Active Attacks: Active attacks involve some modification of the data stream or the creation of a false stream.

• Masquerade• Replay• Modification of message• Denial of Service

Page 5: ram.ppt

Passive Attack:

A passive attack on a cryptosystem is one in which the cryptanalyst cannot interact with any of the parties involved, attempting to break the system solely based upon observed data i.e. the cipher text.

• Release of message contents• Traffic analysis

Page 6: ram.ppt

Security Services:

• Confidentiality• Integrity• Authentication• Nonrepudiation• Access Control• Availability

Page 7: ram.ppt

Model for Network Security:

Page 8: ram.ppt

Terminologies present:

Plain Text. Cipher Text. Encryption. Decryption. Symmetric Cryptography (Conventional Encryption). Asymmetric Cryptography (Publickey Encryption). Cryptanalysis (Breaking Code).

Page 9: ram.ppt

Classification of Security Algorithms:Symmetric Ciphers

Same key for Encryption and DecryptionEx: DES, AES…. etc

Asymmetric CiphersDifferent keys for Encryption and Decryption

Ex: RSA, Diffie-Hellman…. etc

Cryptographic data Integrity AlgorithmsEx:MD5, SHA 0,sha 1… etc

Page 10: ram.ppt

Differences between Symmetric and Asymmetric

Parameter Symmetric Asymmetric

Encryption &Decryption

Fast Slow

Key Distribution Difficult Easy

Complexity O(Log N) O (N3)

Security Moderate Highest

Security Services Confidentially Confidentially, integrity, non repudiation

Example AES,DES RSA,DH Algorithm

Page 11: ram.ppt

D-H key Exchange Algorithm:

It has different names such as Diffe-Hellman Protocol or Diffe-Hellman Hand Shake or DH for convenience.

It was invented by White Field Diffie and Martin Hellman in the year 1976.

It is one of the asymmetric (Public Encryption ) algorithm used for exchange of secret key in a number of commercial products.

Page 12: ram.ppt

DH Algorithm:

Page 13: ram.ppt

Steps present in DH Algorithm:1.Let two parties(Alice &Bob) chooses a two numbers p and g where p is a

prime number and g is a primitive root p.2. Alice chooses a random number x such that 0<x<p where ‘x’ is Alice Private

key Calculate R1= gX (mod p).3.Bob chooses a random number y such that 0<y<p where ‘y’ is Bobs Private

key Calculate R2= gY (mod p).

4.Alice sends R1to Bob5.Bob sends R2to Alice6.Alice computes Ka= R2 X (mod p).7.Bob computes Kb= R1Y(mod p). Finally both Alice & Bobs are equal Ka=Kb= gYX (mod p).

Page 14: ram.ppt

Example:1) Alice and Bob agree to use a prime number p = 23 and base g = 5.2) Alice chooses a secret integer x = 6, then sends Bob R1 = gx mod p

R1 = 56 mod 23 R1 = 15,625 mod 23 R1 = 8

3) Bob chooses a secret integer y= 15, then sends Alice R2= gy mod p R2 = 515 mod 23 R2 = 30,517,578,125 mod 23 R2 = 19

4) Alice computes Ka = R1 x mod p R2 = 196 mod 23 R2 = 47,045,881 mod 23 R2 = 2

5) Bob computes Kb = R2 y mod p Kb = 815 mod 23 Kb = 35,184,372,088,832 mod 23 Kb = 2

6) Alice and Bob now share a secret (the number 2) because 6 × 15 is the same as 15 × 6.

Page 15: ram.ppt

Continued….Advantages:DH Algoritham key agrrement not limited to negotiateing a key

shared by only two participants.

Disadvantages: DH Algoritham is susceptible to two types of attacks. 1)Discrete logarithmic attack 2)Man in the middle attack

Page 16: ram.ppt

Man in the middle attack:

Page 17: ram.ppt

Zero Knowledge Proof:

Zero-knowledge proof (ZKP) plays an important role in authentication without revealing secret information

• A zero-knowledge proof is an interactive method for one party to prove to another that a statement is truewithout revealing anything other than the verity of the statement.

The proposed protocol is designed to satisfy the zeroknowledge proof properties and resists the known attacks.

Page 18: ram.ppt

Version 1:

Page 19: ram.ppt

Version 2:

Page 20: ram.ppt

Tools used:Design Entry Verilog HDL

Synthesis Xilinx Synthesis Tool(XST)

Simulation ISE Simulator

Implementation FPGA Editor, Plan Ahead Impact

FPGA board SPARTAN 3E (XC3s 500e fg320)

Page 21: ram.ppt

Simulation Results

Page 22: ram.ppt

Power module Simulation:

Page 23: ram.ppt

Schematic:

Page 24: ram.ppt

RTL Schematic:

Page 25: ram.ppt

Device Utilization Summary:

Page 26: ram.ppt

Binary Division:

Page 27: ram.ppt

Schematic:

Page 28: ram.ppt

Device Utilization Summary:

Page 29: ram.ppt

DH Simulation Results:

Page 30: ram.ppt

Schematic:

Page 31: ram.ppt

Device Utilization Summary:

Page 32: ram.ppt

ZKP Version 1

Page 33: ram.ppt

Simulation Results of Version 1:

Page 34: ram.ppt

Simulation Results of Version 1:

Page 35: ram.ppt

Schematic:

Page 36: ram.ppt

Device utilization summary:

Page 37: ram.ppt

ZKP Version 2

Page 38: ram.ppt

Simulation Results of Version 2:

Page 39: ram.ppt

Simulation Results of Version 2:

Page 40: ram.ppt

RTL Schematic:

Page 41: ram.ppt

Device utilization summary:

Page 42: ram.ppt

Applications:Diffie-Hellman is currently used in many protocols, namely:

• Secure Sockets Layer (SSL)• Transport Layer Security (TLS)• Secure Shell (SSH)• Internet Protocol Security (IPSec)• Public Key Infrastructure (PKI)

Page 43: ram.ppt

FPGA Prototyping:

01110001

Page 44: ram.ppt

Conclusion:

•The proposed ZKP protocol is a deterministic algorithm and it is protected against Discrete logarithm attack and Man-in-the-middle attack.

•The proposed algorithm serves as key exchange algorithm with the addition to authentication services

•The major Security goals are satisfied and give confidence to users to communicate securely.

Page 45: ram.ppt

Future Scope:These techniques not only used for secure data transfer, but

also it can be extended to transfer digital images by encrypting each pixel value

These can be extended to other asymmetric algorithms such as RSA, Elliptic Curve Cryptography, Digital Signature Algorithm etc…

Page 46: ram.ppt

References:

[1] Ibrahem M.K(2012)Modification of Diffie-Hellman key exchange algorithm for Zero Knowledge Proof Published in: future communication Networks (ICFCN)2012 International conference.

[2] Joseph M, (2010), "Feige-Fiat-Shamir ZKP Scheme Revisited", International Journal of Computing and ICT Research, Vol. 4, No. 1, June 2010.

[3] Carts, David A., (2001), "A Review of the Diffie- Hellman Algorithm and its Use in Secure Internet Protocols", SANS Institute, 2001

[4] Stallings, William (2010), "Cryptography and Network Security", Prentice Hall, 5th Ed. 2010

Page 47: ram.ppt

THANK YOU….!!!