1 / 9

Air-Interface Application Layer Security: A follow up to C20-2006-327-011

Air-Interface Application Layer Security: A follow up to C20-2006-327-011. Source: Lucent Technologies, Inc. S.Patel, G.Sundaram, R.Rance, S.Mizikovsky, Z.Wang Recommendation: Discuss and adopt. Motivation. This is a follow up to contribution C20-20060327-011

ganit
Download Presentation

Air-Interface Application Layer Security: A follow up to C20-2006-327-011

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Air-Interface Application Layer Security:A follow up to C20-2006-327-011 Source: Lucent Technologies, Inc. S.Patel, G.Sundaram, R.Rance, S.Mizikovsky, Z.Wang Recommendation: Discuss and adopt

  2. Motivation • This is a follow up to contribution C20-20060327-011 • Introducing Link Layer Security functions above RLP • Motivation • Bandwidth savings due to reduced overheads • Cryptosync overhead is reduced to zero bytes • Explicit Message Authentication - only one tag per application packet rather than many tags. • Implicit Message Authentication - without explicit tags • Minimizes encryption/decryption in multiple places • The encrypted data can be moved around without requiring a need to secure the data and shuttle keys around. • Encryption can be implemented separately from lower layer functions • Pre-encryption possible • application data can be pre-encrypted rather than waiting for lower layers to schedule and create cryptosync.

  3. Overview • Encryption Overview • Three choices for encryption - one selected during connection setup: • Null encryption • Simple encryption • Encryption with Implicit Message Authentication (EIMA) • Message Authentication Overview • Choices for explicit message authentication and tag sizes – selected during connection setup: • Null authentication • Explicit Message Authentication • Tag sizes negotiated to be 32, 64, or 96.

  4. Cryptosync • A Byte Number based cryptosync used for byte oriented RLP • Transmitter: • 1) keeps track of the bytes seen at the security layer and • 2) uses them to create cryptosync for encryption and message authentication tag creation. • Receiver: • 1) the RLP byte number received in the RLP packet is used at the security layer to track the byte number and • 2) create the crytposync for decryption and message authentication tag verification. • A Packet Number based cryptosync used for packet oriented RLP • Transmitter: • 1) keeps track of packets seen at the security layer and • 2) uses them to create cryptosync for encryption and message authentication tag creation. • Receiver: • 1) the RLP packet number received in the RLP packet is used at the security layer to track the packet number and • 2) create the cryptosync for decryption and message authentication tag verification.

  5. Simple Encryption: for Byte oriented flows • Sender • Application packet is broken into 128-bit blocks and encrypted one block at a time. • Each block is stream ciphered (XORed) with mask bits created for that block. • Mask bits are created by running AES with a cryptosync. • The cryptosync is a flow_id concatenated with the current Block Number. • The block number is ((byte# of first byte)/16) • Block number is a large counter value of say 56 (or 64) bits • Receiver • Received RLP Byte Sequence Number is used to track the Bytes received at the security layer. • Note that RLP sequence number will start to recycle after 222-1 (or 230 -1) blocks are transmitted, after which a virtual counter is incremented. • Block Number is created from the Byte Number and used to create the cryptosync for that block, which in turn is used to create the mask bits to decrypt the ciphertext 128 bit block. • Decryption proceeds one block at a time.

  6. Simple encryption: for Packet oriented flows • Encryption is similar to existing standard. • Security layer tracks the number of packets seen, and knows the length of the current application packet to be encrypted. • Mask bits for the entire packet are created using existing AES encryption mode • Cryptosync is flow_id concatenated with Packet Number. • An internal incrementing 32-bit counter is used as part of the AES input to create mask bits beyond one block. • Again same as existing AES mode of encryption in standard. • At receiver, the received RLP Sequence Number is used along with a virtual part to create a Packet Number input to the cryptosync. • Mask bits needed for the length of the packet are created to decrypt the packet.

  7. Explicit Message Authentication • Cryptosync • For packet oriented flow, the cryptosync is same as for encryption. • For byte oriented flow, the first block number in the application packet is used for cryptosync. • Message authentication on entire application layer packet • Dramatically reduces overheads due to tags • E.g., entire IP packet, rather than RLP segment • Message authentication tag is: • EHMAC_SHA( Cryptosync | message )

  8. Encryption with Implicit Message Authentication (EIMA) • Mode of encryption that can provide message authentication in certain cases without incurring the bandwidth overhead of tags. • C = AX+B • X is message and C is ciphertext. • A and B are two streams of bits created by running AES twice with ‘0’|cryptosync and ‘1’|cryptosync respectively. • Basic block size is 16 bits, i.e. operations are done over GF(216) • Some performance details on next slide. • A malicious change in ciphertext would cause the decrypted text to be randomly changed. • If there are redundancy or error check in the message, e.g. UDP/TCP checksum, then its verification would fail, and the message would be rejected by the application. • Moreover, tampering with VoIP and other multimedia packets would result in noise at the receiver (implicitly rejected by the user).

  9. AX+B • Calculation • Encryption involves one multiplication in GF(216) • Decryption involves one inversion in GF(216), one multiplication in GF(216). X = (C + B)A-1 • Inversion can be done using two multiplication in GF(216) using Itoh’s method and normal basis. • Multiplication in GF(216) can be done efficiently by converting into GF(28) multiplications. • Multiplications for GF(28) can be done efficiently using lookup tables. • 24 bit blocks • A 24 bit block may be created for a short 24 bit message or if a long message is not a multiple of 16 bits. • Do AX+B over GF(224) • Calculations only slightly more complex than GF(216) • 24 bits blocks happen rarely.

More Related