Network Security
Network Security
Riyad ITE2301
ITE2301
Assignment 02
M.M.M Riyad
E07410073
E07410073 MMM.Riyad ITE2301
You are going to start an Internet company that sell video films over the
Internet to customers who purchase a subscription to your service. To
ensure that only those with a valid subscription can view the video files
distributed by you, it is planned to use encryption when transmitting a
video film from your server to a client program running on the customers
Internet-connected.
You plan to use the Data Encryption Standard (DES) cipher for encryption
of your transmitted video films. The DES cipher has elements called S-
boxes and P-boxes in its algorithm.
P-box stands for permutation box .this provides a permutation of the input
to the box as the output. It works based on a mapping system where it
specifies how to do the permutation. For example it will be mapped like bit
no 02 should go to bit no 11.Permutations provide the diffusion of
information in the input throughout the whole input. Hence the statistical
relationships between input and output are reduced. Further a
permutation is easy to implement in hardware be simply running a wire
from each input to one of the outputs. In software, a permutation can be
implemented with a series of logical operations that isolate the individual
bits and move each to a new position, a slow process.
(d) If you plan to stream the video films in real-time from the server to
the client player program, what is the DES mode of operation you would
select? You must explain in detail the reasons for your choice.
For streaming the video film on real rime from the server there are several
DES modes is being used. This includes Electronic codebook (ECB), the
cipher block chaining mode (CBC), the Cipher feedback mode (CFB) and the
output Feedback mode (OFB).
Out of these modes I would select the ECB electronic codebook mode due
the following reasons.
ECB is the fastest and easiest to implement, making it the most common
mode of DES seen in commercial applications. This has the capability to
divide long data stream into parts and to do the encryption in parallel. Data
is divided into 64 bits blocks and these blocks are encrypted one at a time.
These encryptions are totally independent to each other. This character
helps to transmit the data independently. Further this helps to affect the
errors on the data transmission to the relevant block only and will not
affect other blocks. Further an error in a single mode will not affect the
other blocks and it will remain UN recognized. In other words a single bit
E07410073 MMM.Riyad ITE2301
error in cipher text will remain as a single bit error in the decrypted
plaintext and this will not affect the quality of the video as I mentioned
earlier since this doesn’t have much difference and it will remain
unrecognized by human.
On this context if we compare the other DES mode operation the error on
block will not be independent and it will cause the error in the other blocks
as well and it is very difficult to correct this error and the overhead is also
very high. This can lead to slow data transmission which is not good sign
when it comes to video streaming.
Further ECB doesn’t have the additional security modes other than the
basic DES algorithms. But this will not effect in my company since my
concern is all about speed and quality.
(e) If you plan to first download the complete video films from the server
to the client player program and then play it, what is the DES mode of
operation you would select? You must explain in detail the reasons for
your choice.
On the above scenario I would select the OFB output feedback mode. As I
mentioned earlier a major drawback in the ECB is security measures but
since the video need to be streaming this will not affect our requirements
(speed). But if we are going to transfer the data to client file we need to
consider the security very crucially and we don’t need to consider about
speed .Yes of course there should be standard speed but comparatively this
can be lower than the streaming video.
Further in OFB method output can be computed in advance and it uses the
stream encryption over noisy channels which is great plus point when it
comes to file download. Further the massages are treated as a stream of
bits where we can download the files accordingly.
Further this method gives feedback on the massage error and encryption
before the massage is made available. This is plus point when it comes to
file download.
E07410073 MMM.Riyad ITE2301
(f) What are the possible weaknesses in the above security scheme to
prevent people without a valid subscription from viewing video films
provided by your company?
• In a given time any number of users can use the same password and
use his password for long duration which can lead decrease the
commercial popularity of the video since there is no time frame.
• Hackers can steal the decrypted key which is embedded in the video
and miss use it.Inother words they can dissameble, debug and find
the embedded key which is used for decryption and find the protocol
of communication and the server and he can write his own program
to access our server and use it.
• There should be a time limit per user to view the video as well as to
download it and it should expire and in given time it should allow
only one PC or the IP address to access with the same user name and
password.
• Further all the videos should be copy right protected to avoid copy
rights and to prevent from sales. Further to avoid copying videos we
can use watermarking on the videos and based on that we can apply
copy right protections.