Académique Documents
Professionnel Documents
Culture Documents
PROJECT REPORT
BACHELOR OF TECHNOLOGY
(COMPUTER SCIENCE ENGINEERING)
SUBMITTED BY:
SHUCHI SAREEN
01814 8
ABSTRACT
Internet is made up of millions of interconnected
computers that share information. Security of vital
information is imperative for any communication.
Cryptography is the science of protecting data using
complex mathematics which converts this data into
unreadable form, so that only intended users can
access this information.
RSA is the most preferred Cryptosystem today , but
is not feasible for miniature devices like Wsn’s
because of resource constraints in such devices.
Elliptic Curve Cryptography is an alternate to the
RSA as it provides same level of Security .
Elliptic Curve Diffie-Hellman key exchange
mechanism based upon elliptic curve cryptography,
has been specifically studied and its limitation i.e
Man-in-the-middle attack has been discussed with
much smaller key size.
ABBREVIATIONS
2048 210 10 : 1
WHAT IS AN ELLIPTIC CURVE ?
A curve E over a finite field FP is an Elliptical Curve if it is of the form :
y2 = x3 + Ax +B , where A & B ∈ FP .
In this scheme the participants agree upon a value called a key. The participants
also agree to certain domain parameters such as (a,b,p,G) where :
Each of the participant contributes to the final key and cannot know it on its own.
ECDH uses point addition property on Elliptical Curves. The scheme starts with
creating a keyed one-way function which takes in two inputs – a Generator Point and a
private key(an integer) –, multiplies the two to get an output that becomes the public
key which will also be a point on the Elliptical Curve. All the participants in the key
exchange scheme have their own public keys which they transmit to the other
participant(s).
MATHEMATICALLY, THIS CAN BE REPRESENTED AS:
K.G=Q
WHERE ‘K’ REPRESENTS THE PRIVATE KEY, ‘G’ IS THE
GENERATOR POINT AND ‘Q’ BECOMES THE PUBLIC KEY.
MAN IN THE MIDDLE ATTACK IN ECDH
A SORT OF ATTACK, WHEREIN AN ATTACKER SETS IN HIMSELF BETWEEN
TWO COMMUNICATING SYSTEMS TO CAPTURE THEIR DYNAMIC
COMMUNICATION IS CALLED A MAN IN THE MIDDLE ATTACK.
SOLUTIONS TO MITM ATTACK
Certification Authority :
A certificate authority or certification authority (CA) is an
entity that issues digital certificates.
A digital certificate certifies the ownership of a public key
by the named subject of the certificate.
A digital certificate is an electronic “passport” that allows a
person, computer or organization to exchange information
securely over the Internet using the public key
infrastructure(PKI).
A digital certificate may also be referred to as a public key
certificate. A certificate is essential in order to circumvent
a malicious party which happens to be on the route to a
target server which acts as if it were the target.
A certificate authority (CA) is an organization that stores
public keys and their owners, and every party in a
communication trusts this organization (and knows its
public key).
SIP (SESSION INITIATION PROTOCOL)
• In 1999, Internet Engineering Task Force (IETF) proposed the Session Initiation
Protocol(SIP). It is a text based peer-to-peer protocol and can be widely used for
controlling multimedia communication sessions.
• The security of SIP authentication is based on the challenge-response mechanism.
Before the authentication procedure starts, the client user pre-shares a password
with the server. This pre shared password is used to verify the identity of the client
user or the server.
• The original SIP authentication scheme proceeds as follows :
Step 1: Client Server: REQUEST
The client sends a REQUEST to the server.