SlideShare ist ein Scribd-Unternehmen logo
1 von 30
CBC Mode and Initial Vector for the AES algorithm in WIMAX Protocol Stack JAN 2, 2012 AJALA.AJ [email_address] AJAL.A.J ASST PROF – METS SCHOOL OF ENGG , MALA; KERALA  MOB: 0- 8907305642
OBJECTIVE  ,[object Object],WIMAX MOBILE WIMAX FIXED WIMAX AJAL.A.J ASST PROF – METS SCHOOL OF ENGG , MALA; KERALA  MOB: 0- 8907305642
MOTIVATION  ( SECURITY ISSUES ) ,[object Object],[object Object],[object Object],[object Object],AJAL.A.J ASST PROF – METS SCHOOL OF ENGG , MALA; KERALA  MOB: 0- 8907305642
Review of the Block Cipher Plaintext data byte  p AJAL.A.J ASST PROF – METS SCHOOL OF ENGG , MALA; KERALA  MOB: 0- 8907305642 Pseudo-random number generator “ key stream” byte  b  Ciphertext data byte   c  =  p      b
Encryption Algorithms AJAL.A.J ASST PROF – METS SCHOOL OF ENGG , MALA; KERALA  MOB: 0- 8907305642   3key TDES  2key TDES TDES     256   192    128 AES Top Secret Secret After 2010 Through 2010 Suite B Unclassified use
WiMAX Protocol Stack ,[object Object],[object Object],[object Object],[object Object]
Authentication
Data Key Exchange
Data Encryption
WIMAX  –  FEATURES ,[object Object],[object Object],[object Object],[object Object]
OFDMA System Architecture 2008 Spectrum Frequency User A User B User C Frequency Time User A User B User C 01/02/12 BS User A User B User C
  WiMAX  Security Architecture
System Architecture ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Subsystem design    (Data Privacy Subsystem) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Security Suite Specification ,[object Object],[object Object],[object Object],[object Object],AJAL.A.J ASST PROF – METS SCHOOL OF ENGG , MALA; KERALA  MOB: 0- 8907305642
CBC Mode AJAL.A.J ASST PROF – METS SCHOOL OF ENGG , MALA; KERALA  MOB: 0- 8907305642 P1 IV E K C1 P2 E K C2 C1 D K P1 IV C2 D K P2 Pn E K Cn Cn D K Pn ENCRYPT DECRYPT
Counter Mode (a stream cipher mode) AJAL.A.J ASST PROF – METS SCHOOL OF ENGG , MALA; KERALA  MOB: 0- 8907305642 ENCRYPT DECRYPT C1 E K CTR1 1 P1 P2 E K C2 CTR2 C2 E K P2 CTR2 Pn E K Cn Cn E K Pn CTRn CTRn • • • • • • P1 E K C1 CTR1 Keystream
CCM Mode Overview ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Header Payload MIC Authenticated Encrypted AJAL.A.J ASST PROF – METS SCHOOL OF ENGG , MALA; KERALA  MOB: 0- 8907305642
BI-SOVA BLOCK DIAGRAM
[object Object]
SYSTOLIC ARRAY
 
[object Object],AJAL.A.J ASST PROF – METS SCHOOL OF ENGG , MALA; KERALA  MOB: 0- 8907305642
 
 
TRANCEIVER OF MIMO OFDM
 
SUMMARY ,[object Object],[object Object],[object Object],AJAL.A.J ASST PROF – METS SCHOOL OF ENGG , MALA; KERALA  MOB: 0- 8907305642
REFERENCES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],AJAL.A.J ASST PROF – METS SCHOOL OF ENGG , MALA; KERALA  MOB: 0- 8907305642
Feedback? AJAL.A.J ASST PROF – METS SCHOOL OF ENGG , MALA; KERALA  MOB: 0- 8907305642

Weitere ähnliche Inhalte

Was ist angesagt?

Netmanias.2013.08.05 lte security i-concept and authentication.eng
Netmanias.2013.08.05 lte security i-concept and authentication.engNetmanias.2013.08.05 lte security i-concept and authentication.eng
Netmanias.2013.08.05 lte security i-concept and authentication.eng
son6971
 
BAIT2164 Tutorial 4
BAIT2164 Tutorial 4BAIT2164 Tutorial 4
BAIT2164 Tutorial 4
limsh
 
A zigbee wireless sensor network and multiple way bus communication meduim ca...
A zigbee wireless sensor network and multiple way bus communication meduim ca...A zigbee wireless sensor network and multiple way bus communication meduim ca...
A zigbee wireless sensor network and multiple way bus communication meduim ca...
ranjitha mudhiraj
 

Was ist angesagt? (16)

Netmanias.2013.08.05 lte security i-concept and authentication.eng
Netmanias.2013.08.05 lte security i-concept and authentication.engNetmanias.2013.08.05 lte security i-concept and authentication.eng
Netmanias.2013.08.05 lte security i-concept and authentication.eng
 
Zigbee 802-15-4
Zigbee 802-15-4Zigbee 802-15-4
Zigbee 802-15-4
 
Ipsec vpn v0.1
Ipsec vpn v0.1Ipsec vpn v0.1
Ipsec vpn v0.1
 
Megaplexer Ip implementation in Enode B
Megaplexer Ip implementation in Enode BMegaplexer Ip implementation in Enode B
Megaplexer Ip implementation in Enode B
 
Ch3
Ch3Ch3
Ch3
 
Vpn site to site
Vpn site to siteVpn site to site
Vpn site to site
 
N828 specification-www.ttbvs.com
N828 specification-www.ttbvs.comN828 specification-www.ttbvs.com
N828 specification-www.ttbvs.com
 
CCNAv5 - S3: Chapter 7 EIGRP
CCNAv5 - S3: Chapter 7 EIGRPCCNAv5 - S3: Chapter 7 EIGRP
CCNAv5 - S3: Chapter 7 EIGRP
 
World Connect Training
World Connect TrainingWorld Connect Training
World Connect Training
 
Zigbee based two way wireless chatting system
Zigbee based two way wireless chatting systemZigbee based two way wireless chatting system
Zigbee based two way wireless chatting system
 
Vpn(4)
Vpn(4)Vpn(4)
Vpn(4)
 
CCNA Icnd110 s02l03
CCNA Icnd110 s02l03CCNA Icnd110 s02l03
CCNA Icnd110 s02l03
 
BAIT2164 Tutorial 4
BAIT2164 Tutorial 4BAIT2164 Tutorial 4
BAIT2164 Tutorial 4
 
Set review 1
Set review 1Set review 1
Set review 1
 
A zigbee wireless sensor network and multiple way bus communication meduim ca...
A zigbee wireless sensor network and multiple way bus communication meduim ca...A zigbee wireless sensor network and multiple way bus communication meduim ca...
A zigbee wireless sensor network and multiple way bus communication meduim ca...
 
CCNA Icnd110 s02l08
 CCNA Icnd110 s02l08 CCNA Icnd110 s02l08
CCNA Icnd110 s02l08
 

Ähnlich wie Ajal jose

TELE25892-4.3 802.11 MAC Architecture.pptx
TELE25892-4.3 802.11 MAC Architecture.pptxTELE25892-4.3 802.11 MAC Architecture.pptx
TELE25892-4.3 802.11 MAC Architecture.pptx
WangRoof
 
Mngn2005 wireless security
Mngn2005 wireless securityMngn2005 wireless security
Mngn2005 wireless security
Arpan Pal
 

Ähnlich wie Ajal jose (20)

Securing Wireless Cellular Systems
Securing Wireless Cellular SystemsSecuring Wireless Cellular Systems
Securing Wireless Cellular Systems
 
K43066774
K43066774K43066774
K43066774
 
WLAN SECURITY BY SAIKIRAN PANJALA
WLAN SECURITY BY SAIKIRAN PANJALAWLAN SECURITY BY SAIKIRAN PANJALA
WLAN SECURITY BY SAIKIRAN PANJALA
 
TELE25892-4.3 802.11 MAC Architecture.pptx
TELE25892-4.3 802.11 MAC Architecture.pptxTELE25892-4.3 802.11 MAC Architecture.pptx
TELE25892-4.3 802.11 MAC Architecture.pptx
 
Report on wireless System CDMA security
Report on wireless System CDMA securityReport on wireless System CDMA security
Report on wireless System CDMA security
 
Analysis on Mobile WiMAX Security.pdf
Analysis on Mobile WiMAX Security.pdfAnalysis on Mobile WiMAX Security.pdf
Analysis on Mobile WiMAX Security.pdf
 
MTLS - Securing Microservice Architecture with Mutual TLS Authentication
MTLS - Securing Microservice Architecture with Mutual TLS AuthenticationMTLS - Securing Microservice Architecture with Mutual TLS Authentication
MTLS - Securing Microservice Architecture with Mutual TLS Authentication
 
Megaplex nerc-cip-compliance
Megaplex nerc-cip-complianceMegaplex nerc-cip-compliance
Megaplex nerc-cip-compliance
 
Resilience in the ZigBee Residential Mode
Resilience in the ZigBee Residential ModeResilience in the ZigBee Residential Mode
Resilience in the ZigBee Residential Mode
 
WiMAX Network Security
WiMAX Network SecurityWiMAX Network Security
WiMAX Network Security
 
Intermediate: Security in Mobile Cellular Networks
Intermediate: Security in Mobile Cellular NetworksIntermediate: Security in Mobile Cellular Networks
Intermediate: Security in Mobile Cellular Networks
 
Security Consideration in 5G
Security Consideration in 5GSecurity Consideration in 5G
Security Consideration in 5G
 
Mngn2005 wireless security
Mngn2005 wireless securityMngn2005 wireless security
Mngn2005 wireless security
 
Security Enhancement in Next Generation Networks using Enhanced AES with RC4 ...
Security Enhancement in Next Generation Networks using Enhanced AES with RC4 ...Security Enhancement in Next Generation Networks using Enhanced AES with RC4 ...
Security Enhancement in Next Generation Networks using Enhanced AES with RC4 ...
 
Mobile security
Mobile securityMobile security
Mobile security
 
Security in GSM(2G) and UMTS(3G) Networks
Security in GSM(2G) and UMTS(3G) NetworksSecurity in GSM(2G) and UMTS(3G) Networks
Security in GSM(2G) and UMTS(3G) Networks
 
WLAN and IP security
WLAN and IP securityWLAN and IP security
WLAN and IP security
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
 
CCNAv5 - S1: Chapter 5 - Ethernet
CCNAv5 - S1: Chapter 5 - EthernetCCNAv5 - S1: Chapter 5 - Ethernet
CCNAv5 - S1: Chapter 5 - Ethernet
 
Chapter 05 - Ethernet
Chapter 05 - EthernetChapter 05 - Ethernet
Chapter 05 - Ethernet
 

Mehr von AJAL A J

Mehr von AJAL A J (20)

KEAM KERALA ENTRANCE EXAM
KEAM KERALA ENTRANCE EXAMKEAM KERALA ENTRANCE EXAM
KEAM KERALA ENTRANCE EXAM
 
Paleontology Career
Paleontology  CareerPaleontology  Career
Paleontology Career
 
CHEMISTRY basic concepts of chemistry
CHEMISTRY  basic concepts of chemistryCHEMISTRY  basic concepts of chemistry
CHEMISTRY basic concepts of chemistry
 
Ecology
EcologyEcology
Ecology
 
Biogeochemical cycles
Biogeochemical cyclesBiogeochemical cycles
Biogeochemical cycles
 
ac dc bridges
ac dc bridgesac dc bridges
ac dc bridges
 
Hays bridge schering bridge wien bridge
Hays bridge  schering bridge  wien bridgeHays bridge  schering bridge  wien bridge
Hays bridge schering bridge wien bridge
 
App Naming Tip
App Naming TipApp Naming Tip
App Naming Tip
 
flora and fauna of himachal pradesh and kerala
flora and fauna of himachal pradesh and keralaflora and fauna of himachal pradesh and kerala
flora and fauna of himachal pradesh and kerala
 
B.Sc Cardiovascular Technology(CVT)
 B.Sc Cardiovascular Technology(CVT)  B.Sc Cardiovascular Technology(CVT)
B.Sc Cardiovascular Technology(CVT)
 
11 business strategies to make profit
11 business strategies to make profit 11 business strategies to make profit
11 business strategies to make profit
 
PCOS Polycystic Ovary Syndrome
PCOS  Polycystic Ovary SyndromePCOS  Polycystic Ovary Syndrome
PCOS Polycystic Ovary Syndrome
 
Courses and Career Options after Class 12 in Humanities
Courses and Career Options after Class 12 in HumanitiesCourses and Career Options after Class 12 in Humanities
Courses and Career Options after Class 12 in Humanities
 
MANAGEMENT Stories
 MANAGEMENT Stories MANAGEMENT Stories
MANAGEMENT Stories
 
NEET PREPRATION TIPS AND STRATEGY
NEET PREPRATION TIPS AND STRATEGYNEET PREPRATION TIPS AND STRATEGY
NEET PREPRATION TIPS AND STRATEGY
 
REVOLUTIONS IN AGRICULTURE
REVOLUTIONS IN AGRICULTUREREVOLUTIONS IN AGRICULTURE
REVOLUTIONS IN AGRICULTURE
 
NRI QUOTA IN NIT'S
NRI QUOTA IN NIT'S NRI QUOTA IN NIT'S
NRI QUOTA IN NIT'S
 
Subjects to study if you want to work for a charity
Subjects to study if you want to work for a charitySubjects to study if you want to work for a charity
Subjects to study if you want to work for a charity
 
IIT JEE A KERALA PERSPECTIVE
IIT JEE A KERALA PERSPECTIVE IIT JEE A KERALA PERSPECTIVE
IIT JEE A KERALA PERSPECTIVE
 
Clat 2020 exam COMPLETE DETAILS
Clat 2020 exam COMPLETE DETAILSClat 2020 exam COMPLETE DETAILS
Clat 2020 exam COMPLETE DETAILS
 

Kürzlich hochgeladen

Kürzlich hochgeladen (20)

Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 

Ajal jose

  • 1. CBC Mode and Initial Vector for the AES algorithm in WIMAX Protocol Stack JAN 2, 2012 AJALA.AJ [email_address] AJAL.A.J ASST PROF – METS SCHOOL OF ENGG , MALA; KERALA MOB: 0- 8907305642
  • 2.
  • 3.
  • 4. Review of the Block Cipher Plaintext data byte p AJAL.A.J ASST PROF – METS SCHOOL OF ENGG , MALA; KERALA MOB: 0- 8907305642 Pseudo-random number generator “ key stream” byte b  Ciphertext data byte c = p  b
  • 5. Encryption Algorithms AJAL.A.J ASST PROF – METS SCHOOL OF ENGG , MALA; KERALA MOB: 0- 8907305642   3key TDES  2key TDES TDES     256   192    128 AES Top Secret Secret After 2010 Through 2010 Suite B Unclassified use
  • 6.
  • 10.
  • 11. OFDMA System Architecture 2008 Spectrum Frequency User A User B User C Frequency Time User A User B User C 01/02/12 BS User A User B User C
  • 12. WiMAX Security Architecture
  • 13.
  • 14.
  • 15.
  • 16. CBC Mode AJAL.A.J ASST PROF – METS SCHOOL OF ENGG , MALA; KERALA MOB: 0- 8907305642 P1 IV E K C1 P2 E K C2 C1 D K P1 IV C2 D K P2 Pn E K Cn Cn D K Pn ENCRYPT DECRYPT
  • 17. Counter Mode (a stream cipher mode) AJAL.A.J ASST PROF – METS SCHOOL OF ENGG , MALA; KERALA MOB: 0- 8907305642 ENCRYPT DECRYPT C1 E K CTR1 1 P1 P2 E K C2 CTR2 C2 E K P2 CTR2 Pn E K Cn Cn E K Pn CTRn CTRn • • • • • • P1 E K C1 CTR1 Keystream
  • 18.
  • 20.
  • 22.  
  • 23.
  • 24.  
  • 25.  
  • 27.  
  • 28.
  • 29.
  • 30. Feedback? AJAL.A.J ASST PROF – METS SCHOOL OF ENGG , MALA; KERALA MOB: 0- 8907305642