ECE Lecture 7. Towards modern ciphers. Data Encryption Standard and its extensions. Levels of Security
|
|
- Joleen Sims
- 5 years ago
- Views:
Transcription
1 ECE Lecture 7 Towards modern ciphers Data Encryption tandard and its extensions Required Reading: I W tallings, "Cryptography and Network-ecurity," 4th Edition, Chapter 3: Block Ciphers and the Data Encryption tandard Chapter 6: Multiple Encryption and Triple DE II A Menezes, P van Oorschot, and Vanstone, Handbook o Applied Cryptography, Chapters 74: DE Levels o ecurity Deinition: Unconditional ecurity A cryptosystem is unconditionally secure i it cannot be broken even with ininite computational resources Q: Which actual cryptosystems are unconditionally secure?
2 Levels o ecurity Deinition: Computational ecurity A cryptosystem is computational secure i best possible algorithm or breaking requires N operations, where N is very large and known Q: Which actual cryptosystems are computational secure? Gilbert Vernam, AT&T Major Joseph Mauborgne One-time Pad Vernam Cipher 926 c i = m i k i m i k i c i All bits o the key must be chosen at random and never reused One-time Pad Equivalent version c i = m i + k i mod 26 m i k i c i TO BE OR NOT TO BE AX TC VI URD WM OF TL UG JZ HFW PK PJ All letters o the key must be chosen at random and never reused 2
3 Perect Cipher Claude hannon Communication Theory o ecrecy ystems, 948 m M c C P(M=m C=c) = P(M = m) The codebreaker can guess a message with the same probability without knowing a ciphertext as with the knowledge o the ciphertext Is substitution cipher a perect cipher? C = XRZ P(M=ADD C=XRZ) = P(M=ADD) Is one-time pad a perect cipher? C = XRZ P(M=ADD C=XRZ) P(M=ADD) M might be equal to CAT, PET, ET, ADD, BBC, AAA, HOT, HI, HER, BET, WA, NOW, etc 3
4 -P Networks P P hannon Product Ciphers Computationally secure ciphers based on the idea o diusion and conusion Conusion relationship between plaintext and ciphertext is obscured, eg through the use o substitutions Diusion spreading inluence o one plaintext letter to many ciphertext letters, eg through the use o permutations Basic operations o -P networks ubstitution Permutation -box P-box 4
5 P Avalanche eect m m c c m 2 c m 3 2 c 2 c 3 m 4 c 4 m 5 m 6 m 7 m 8 m 9 m m m 2 m 6 m 62 m 63 m 64 P c 5 c 5 c 6 c 7 c 7 c 8 c 8 c 9 c c c c 2 c 6 c 6 c 62 c 63 c 64 c 64 LUCIFER Horst Feistel, Walt Tuchman IBM m m 2 m 3 m 4 m 5 m 6 m 7 m 8 m 9 m m m 2 m 25 m 26 m 27 m 28 k, k 2, k 3, k 32, P k,2 k 2,2 K 3,2 k 32,2 P k,6 K 2,6 k 3,6 k 32,6 c c 2 c 3 c 4 c 5 c 6 c 7 c 8 c 9 c c c 2 c 25 c 26 c 27 c 28 6 rounds LUCIFER- external look plaintext block 28 bits LUCIFER key 52 bits 28 bits ciphertext block 5
6 NB public request or a standard cryptographic algorithm May 5, 973, August 27, 974 The algorithm must be: secure public - completely speciied - easy to understand - available to all users economic and eicient in hardware able to be validated exportable DE - chronicle o events NB issues a public request or proposals or a standard cryptographic algorithm irst publication o the IBM s algorithm and request or comments NB organizes two workshops to evaluate the algorithm oicial publication as FIP PUB 46: Data Encryption tandard 983, 987, recertiication o the algorithm or another ive years sotware implementations allowed to be validated Controversies surrounding DE Unknown design criteria Most criteria reconstructed rom cipher analysis 99 Reinvention o dierential cryptanalysis low in sotware Only hardware implementations certiied 993 otware, irmware and hardware treated equally Too short key Theoretical designs o DE breaking machines 998 Practical DE cracker built 6
7 Lie o DE Time DE developed by IBM and NA In common use or over 2 years transision to a new standard Federal and banking standard Over 3 validated implementations De acto world-wide standard Most popular secret-key ciphers American standards DE 56 bit key AE 2 contest Triple DE 2, 68 bit keys AE - Rijndael 28, 92, and 256 bit keys Other popular algorithms IDEA RC5 Blowish CAT erpent Twoish RC6 Mars DE - external look plaintext block 64 bits DE ciphertext block key 56 bits 64 bits 7
8 DE high-level internal structure L R IP K DE Main Loop Feistel tructure L R L 2 R 2 L 5 R 5 K 2 K 6 L n+ =R n R n+ =L n (R n, K n+ ) R 6 L 6 IP - Feistel tructure Encryption Decryption L n R n L n R n K n+ K n+ L n+ R n+ L n+ R n+ L n+, R n+?? K n+ L n, R n?? 8
9 IP - Decryption IP L R R 6 L 6 K K 6 L R R 5 L 5 K 2 K 5 L 2 R 2 R 4 L 4 L 5 R 5 R L K 6 K R 6 L 6 L R IP IP - Classical Feistel Network plaintext = L R or i= to n { L i =R i- R i =L i- (R i-, K i ) } L n+ = R n R n+ = L n ciphertext = L n+ R n+ Mangler Function o DE, F 9
10 Notation or Permutations Input i i 2 i 3 i 4 i 5 i 6 i 7 i 8 i 9 i i 56 i 57 i 58 i 59 i 6 i 6 i 62 i 63 i i 58 i 5 i 42 i 34 i 26 i 8 i i 2 i 5 i 63 i 55 i 47 i 39 i 3 i 23 i 5 i 7 Output
11 Notation or -boxes Input i i 2 i 3 i 4 i 5 i 6 i i 6 determines a row number in the -box table, 3 i 2 i 3 i 4 i 5 determine a column in the -box table, 5 o o 2 o 3 o 4 is a binary representation o a number rom 5 in the given row and the given column o o 2 o 3 o 4 Output
12 Randomness General design criteria o DE 2 Avalanche property changing a single bit at the input changes on average hal o the bits at the output 3 Completeness property every output bit is a complex unction o all input bits (and not just a subset o input bits) 4 Nonlinearity encryption unction is non-aine or any value o the key 5 Correlation immunity output bits are statistically independent o any subset o input bits Completeness property Every output bit is a complex unction o all input bits (and not just a subset o input bits) Formal requirement: For all values o i and j, i=64, j=64 there exist inputs X and X 2, such that X x x 2 x 3 x i- x i+ x 63 x 64 X 2 x x 2 x 3 x i- x i+ x 63 x 64 Y = DE(X ) y y 2 y 3 y j- y j y j+ y 63 y 64 Y 2 = DE(X 2 ) y y 2 y 3 y j- y j y j+ y 63 y 64 Linear Transormations Transormations that ulill the condition: T(X [m x ] ) = Y [n x ] = A [n x m] X [m x ] or T(X X 2 ) = T(X ) T(X 2 ) Aine Transormations Transormations that ulill the condition: T(X [m x ] ) = Y [n x ] = A [n x m] X [m x ] B [n x ] 2
13 Linear Transormations o DE IP, IP -, E, PC, PC2, HIFT eg, IP(X X 2 ) = IP(X ) IP( X 2 ) Non-Linear and non-aine transormations o DE There are no such matrices A [4x6] and B [4x] that (X [6x] ) = A [4x6] X [6x] B [4x] Design o -boxes [5] in out = [in] 6! 2 3 possibilities precisely deined initially unpublished criteria resistant against dierential cryptanalysis (attack known to the designers and rediscovered in the open research in 99 by E Biham and A hamir) Round Key[] Typical Flow Diagram o a ecret-key Block Cipher Initial transormation i:= Round Key[i] Cipher Round i<#rounds? i:=i+ #rounds times Round Key[#rounds+] Final transormation 3
14 Implementation o a secret-key cipher in hardware Round keys computed on-the-ly input key encryption/decryption key scheduling round keys output Implementation o a secret-key cipher Round keys precomputed input key key scheduling encryption/decryption memory o round keys output Basic iterative architecture o secret key ciphers input key Key scheduling round keys multiplexer register combinational logic output one round 4
15 Theoretical design o the specialized machine to break DE Project: Michael Wiener, Entrust Technologies, 993, 997 Method: exhaustive key search attack Basic component: specialized integrated circuit in CMO technology, 75 MHz Checks: 2 mln keys per second Costs: $ Total cost $ mln $ Estimated time 35 minutes 6 hours DE breaking machine known ciphertext key counter Round key Encryption Round key Key cheduling Round Encryption Round 2 Round key 2 Key cheduling Round 2 plaintext Encryption Round 6 comparator Round key 6 known plaintext Key cheduling Round 6 Deep Crack Electronic Frontier Foundation, 998 Total cost: $22, Average time o search: 45 days/key 8 AIC chips, 4 MHz clock 5
16 Deep Crack Parameters Number o AIC chips 8 Clock requency 4 MHz Number o clock cycles per key 6 Number o search units per AIC 24 earch speed Average time to recover the key 9 bln keys/s 45 days COPACOBANA Cost-Optimized Parallel COde Breaker Ruhr University, Bochum, University o Kiel, Germany, 26 Cost: 898 (ver ) COPACOBANA Based on Xilinx FPGAs (Field Programmable Gate Arrays) ver based on 2 partan 3 FPGAs ver 2 based on 28 Virtex 4 X 35 FPGAs Description, FAQ, and news available at For ver based on partan FPGAs Clock requency = 36 MHz Average search time or a single DE key = 64 days Worst case search time or a single DE key = 28 days 6
17 Minimum length o the key or symmetric ciphers I Panel o experts, January 996 M Blaze, W Diie, R Rivest, B chneier, T himomura, E Thompson, M Wiener Report: Minimal Key Lengths or ymmetric Ciphers to Provide Adequate Commercial ecurity II National Academy o ciences, National Research Council, May 996 Report: Cryptography's Role in ecuring the Inormation ociety 7
18 ecure key length today and in 2 years (against an intelligence agency with the budget o $3M) key length 28 bits IDEA, minimum key length in AE 2 bits DEX 2 bits Triple DE with two keys 97 bits ecure key length in bits 8 bits kipjack ecure key length in bits DE ecure key length - discussion increasing key length in a newly developed cipher costs NOTHING increasing eective key length, assuming the use o an existing cipher has a limited inluence on the eiciency o implementation (DEX, Triple DE) It is economical to use THE AME secure key length FOR ALL aplications The primary barriers blocking the use o symmetric ciphers with a secure key length have been o the political nature (eg, export policy o UA) Other attacks dierential cryptanalysis Biham, hamir 99 linear cryptanalysis Matsui, 993 8
19 Dierential cryptanalysis M M * M 2 M 2 * M N- M N- * M N M N * M i M i * = const Encryption module key C C * C 2 C 2 * C N- C N- * C N C N * access to the encryption module with the key inside analysis o trilions o pairs plaintext-ciphertext Dierential cryptanalysis o DE Requirements: Biham, hamir 99 access to the encryption module with the key inside time or encryption o 2 47 = 4 4 plaintext blocks = million gigabytes o plaintext Conclusions: attack impossible to mount DE specially designed (IBM, NA) to be resistant against dierential cryptanalysis Requirements: Linear cryptanalysis o DE Matsui = 88 2 known plaintext blocks = 73 terabytes o known plaintext 2 43 operations probability o success 85% Conclusions: attack impossible to mount in practice 9
20 What i creators o DE did not know about dierential cryptanalysis Required number o plaintext blocks Original DE Modiications: Identity permutation in place o P Order o -boxes XOR replaced by addition -boxes random one position changed Expansion unction E eliminated 2 47 = mln GB 2 9 = 4 MB 2 38 = 2, GB 2 3 = 2 GB 2 2 = 6 MB 2 33 = 8 GB 2 26 = 64 MB Dierential and linear cryptanalysis - discussion Attacks ineasible or correctly designed ciphers Perect tool or comparing strengths o various ciphers Resistance against these attacks does not imply resistance against other unknown methods o attack Triple DE EDE mode with two keys encryption decryption plaintext ciphertext Diie, Hellman, 977 E encryption 56 K D decryption 56 K D decryption 56 K2 E encryption 56 K2 E encryption 56 K D decryption 56 K ciphertext plaintext 2
21 Triple DE EDE mode with three keys encryption decryption plaintext ciphertext Diie, Hellman, 977 E encryption 56 K D decryption 56 K D decryption 56 K2 E encryption 56 K2 E encryption 56 K3 D decryption 56 K3 ciphertext plaintext Advantages: Triple DE secure key length (2 or 68 bits) increased compared to DE resistance to linear and dierential cryptanalysis possibility o utilizing existing implementations o DE Disadvantages: relatively slow, especially in sotware DEX Rivest, 988 plaintext 64 DE 56 K a K KEY = (K, K a ) 2 bits 64 K b = hash unction(k, K a ) K b ciphertext 2
Data Encryption Standard
ECE 646 Lecture 6 Data Encryption Standard Required Reading: I. W. Stallings, "Cryptography and Network-Security," 5th Edition, Chapter 3: Block Ciphers and the Data Encryption Standard Chapter 6.1: Multiple
More informationData Encryption Standard
ECE 646 Lecture 7 Data Encryption Standard Required Reading W. Stallings, "Cryptography and Network-Security," 5th Edition, Chapter 3: Block Ciphers and the Data Encryption Standard Chapter 6.1: Multiple
More informationWeek 4. : Block Ciphers and DES
Week 4. : Block Ciphers and DES Model of Symmetric Cryptosystem Cryptanalyst Adversary M K E Insecure Channel D Plaintext M Ciphertext C Secure Channel Plaintext M Key K Shared Secret Key C = E K (M) D
More informationStream Ciphers and Block Ciphers
Stream Ciphers and Block Ciphers Ruben Niederhagen September 18th, 2013 Introduction 2/22 Recall from last lecture: Public-key crypto: Pair of keys: public key for encryption, private key for decryption.
More informationSymmetric Cryptography. Chapter 6
Symmetric Cryptography Chapter 6 Block vs Stream Ciphers Block ciphers process messages into blocks, each of which is then en/decrypted Like a substitution on very big characters 64-bits or more Stream
More informationBlock Ciphers and the Data Encryption Standard (DES) Modified by: Dr. Ramzi Saifan
Block Ciphers and the Data Encryption Standard (DES) Modified by: Dr. Ramzi Saifan Block ciphers Keyed, invertible Large key space, large block size A block of plaintext is treated as a whole and used
More informationIntroduction to Network Security Missouri S&T University CPE 5420 Data Encryption Standard
Introduction to Network Security Missouri S&T University CPE 5420 Data Encryption Standard Egemen K. Çetinkaya Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University of
More informationChapter 3 Block Ciphers and the Data Encryption Standard
Chapter 3 Block Ciphers and the Data Encryption Standard Last Chapter have considered: terminology classical cipher techniques substitution ciphers cryptanalysis using letter frequencies transposition
More informationIntroduction. Secret Key Cryptography. Outline. Secrets? (Cont d) Secret Keys or Secret Algorithms? Introductory Remarks Feistel Cipher DES AES
Outline CSCI 454/554 Computer and Network Security Introductory Remarks Feistel Cipher DES AES Topic 3.1 Secret Key Cryptography Algorithms 2 Secret Keys or Secret Algorithms? Introduction Security by
More informationSymmetric Encryption Algorithms
Symmetric Encryption Algorithms CS-480b Dick Steflik Text Network Security Essentials Wm. Stallings Lecture slides by Lawrie Brown Edited by Dick Steflik Symmetric Cipher Model Plaintext Encryption Algorithm
More informationECE 646 Lecture 7. Secret-Key Ciphers. Data Encryption Standard DES
ECE 646 Lecture 7 Secret-Key Ciphers Data Encryption Standard DES 1 NBS public request for a standard cryptographic algorithm May 15, 1973, August 27, 1974 The algorithm must be: secure public - completely
More informationSecret Key Cryptography
Secret Key Cryptography 1 Block Cipher Scheme Encrypt Plaintext block of length N Decrypt Secret key Cipher block of length N 2 Generic Block Encryption Convert a plaintext block into an encrypted block:
More informationSymmetric Encryption. Thierry Sans
Symmetric Encryption Thierry Sans Design principles (reminder) 1. Kerkoff Principle The security of a cryptosystem must not rely on keeping the algorithm secret 2. Diffusion Mixing-up symbols 3. Confusion
More informationNetwork Security. Lecture# 6 Lecture Slides Prepared by: Syed Irfan Ullah N.W.F.P. Agricultural University Peshawar
Network Security Lecture# 6 Lecture Slides Prepared by: Syed Irfan Ullah N.W.F.P. Agricultural University Peshawar Modern Block Ciphers now look at modern block ciphers one of the most widely used types
More informationLecture 4: Symmetric Key Encryption
Lecture 4: Symmetric ey Encryption CS6903: Modern Cryptography Spring 2009 Nitesh Saxena Let s use the board, please take notes 2/20/2009 Lecture 1 - Introduction 2 Data Encryption Standard Encrypts by
More informationStream Ciphers and Block Ciphers
Stream Ciphers and Block Ciphers 2MMC10 Cryptology Fall 2015 Ruben Niederhagen October 6th, 2015 Introduction 2/32 Recall: Public-key crypto: Pair of keys: public key for encryption, private key for decryption.
More informationECE596C: Handout #7. Analysis of DES and the AES Standard. Electrical and Computer Engineering, University of Arizona, Loukas Lazos
ECE596C: Handout #7 Analysis of DES and the AES Standard Electrical and Computer Engineering, University of Arizona, Loukas Lazos Abstract. In this lecture we analyze the security properties of DES and
More informationComparison of the Hardware Performance of the AES Candidates Using Reconfigurable Hardware
Comparison of the Hardware Performance of the AES Candidates Using Reconfigurable Hardware Master s Thesis Pawel Chodowiec MS CpE Candidate, ECE George Mason University Advisor: Dr. Kris Gaj, ECE George
More informationMaking and Breaking Ciphers
Making and Breaking Ciphers Ralph Morelli Trinity College, Hartford (ralph.morelli@trincoll.edu) Smithsonian Institute October 31, 2009 2009 Ralph Morelli You are free to reuse and remix this presentation
More informationCryptography and Network Security Chapter 3. Modern Block Ciphers. Block vs Stream Ciphers. Block Cipher Principles
Cryptography and Network Security Chapter 3 Fifth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 3 Block Ciphers and the Data Encryption Standard All the afternoon Mungo had been working
More informationCENG 520 Lecture Note III
CENG 520 Lecture Note III Symmetric Ciphers block ciphers process messages in blocks, each of which is then en/decrypted like a substitution on very big characters 64-bits or more stream ciphers process
More informationModern Block Ciphers
Modern Block Ciphers now look at modern block ciphers one of the most widely used types of cryptographic algorithms provide secrecy /authentication services focus on DES (Data Encryption Standard) to illustrate
More informationLecture 3: Symmetric Key Encryption
Lecture 3: Symmetric Key Encryption CS996: Modern Cryptography Spring 2007 Nitesh Saxena Outline Symmetric Key Encryption Continued Discussion of Potential Project Topics Project proposal due 02/22/07
More informationL3. An Introduction to Block Ciphers. Rocky K. C. Chang, 29 January 2015
L3. An Introduction to Block Ciphers Rocky K. C. Chang, 29 January 2015 Outline Product and iterated ciphers A simple substitution-permutation network DES and AES Modes of operations Cipher block chaining
More informationEEC-484/584 Computer Networks
EEC-484/584 Computer Networks Lecture 23 wenbing@ieee.org (Lecture notes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of last lecture Introduction to
More informationNetwork Security Essentials Chapter 2
Network Security Essentials Chapter 2 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Encryption What is encryption? Why do we need it? No, seriously, let's discuss this. Why do we need
More informationLecture 2: Secret Key Cryptography
T-79.159 Cryptography and Data Security Lecture 2: Secret Key Cryptography Helger Lipmaa Helsinki University of Technology helger@tcs.hut.fi 1 Reminder: Communication Model Adversary Eve Cipher, Encryption
More informationCryptography MIS
Cryptography MIS-5903 http://community.mis.temple.edu/mis5903sec011s17/ Cryptography History Substitution Monoalphabetic Polyalphabetic (uses multiple alphabets) uses Vigenere Table Scytale cipher (message
More informationBlock Encryption and DES
Block Encryption and DES Plain Text Block 1 Block 2 Block 3 Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available
More information3 Symmetric Key Cryptography 3.1 Block Ciphers Symmetric key strength analysis Electronic Code Book Mode (ECB) Cipher Block Chaining Mode (CBC) Some
3 Symmetric Key Cryptography 3.1 Block Ciphers Symmetric key strength analysis Electronic Code Book Mode (ECB) Cipher Block Chaining Mode (CBC) Some popular block ciphers Triple DES Advanced Encryption
More informationCryptography and Network Security Block Ciphers + DES. Lectured by Nguyễn Đức Thái
Cryptography and Network Security Block Ciphers + DES Lectured by Nguyễn Đức Thái Outline Block Cipher Principles Feistel Ciphers The Data Encryption Standard (DES) (Contents can be found in Chapter 3,
More informationComputational Security, Stream and Block Cipher Functions
Computational Security, Stream and Block Cipher Functions 18 March 2019 Lecture 3 Most Slides Credits: Steve Zdancewic (UPenn) 18 March 2019 SE 425: Communication and Information Security 1 Topics for
More informationIntroduction to Modern Symmetric-Key Ciphers
Introduction to Modern Symmetric-Key Ciphers 1 Objectives Review a short history of DES. Define the basic structure of DES. List DES alternatives. Introduce the basic structure of AES. 2 Data Encryption
More informationCSCE 813 Internet Security Symmetric Cryptography
CSCE 813 Internet Security Symmetric Cryptography Professor Lisa Luo Fall 2017 Previous Class Essential Internet Security Requirements Confidentiality Integrity Authenticity Availability Accountability
More informationCryptography and Network Security
Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 6: Advanced Encryption Standard (AES) Ion Petre Department of IT, Åbo Akademi University 1 Origin of AES 1999: NIST
More informationComputer Security 3/23/18
s s encrypt a block of plaintext at a time and produce ciphertext Computer Security 08. Cryptography Part II Paul Krzyzanowski DES & AES are two popular block ciphers DES: 64 bit blocks AES: 128 bit blocks
More informationDr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010
CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Secret Key Cryptography Block cipher DES 3DES
More informationCSCI 454/554 Computer and Network Security. Topic 3.1 Secret Key Cryptography Algorithms
CSCI 454/554 Computer and Network Security Topic 3.1 Secret Key Cryptography Algorithms Outline Introductory Remarks Feistel Cipher DES AES 2 Introduction Secret Keys or Secret Algorithms? Security by
More informationSecret Key Cryptography Overview
Secret Key Cryptography Overview Dr. Arjan Durresi Louisiana State University Baton Rouge, LA 70810 Durresi@csc.lsu.Edu These slides are available at: http://www.csc.lsu.edu/~durresi/csc01_07/ Block ciphers
More informationpage 1 Introduction to Cryptography Benny Pinkas Lecture 3 November 18, 2008 Introduction to Cryptography, Benny Pinkas
Introduction to Cryptography Lecture 3 Benny Pinkas page 1 1 Pseudo-random generator Pseudo-random generator seed output s G G(s) (random, s =n) Deterministic function of s, publicly known G(s) = 2n Distinguisher
More informationBlock Ciphers and Data Encryption Standard. CSS Security and Cryptography
Block Ciphers and Data Encryption Standard CSS 322 - Security and Cryptography Contents Block Cipher Principles Feistel Structure for Block Ciphers DES Simplified DES Real DES DES Design Issues CSS 322
More informationCSC 474/574 Information Systems Security
CSC 474/574 Information Systems Security Topic 2.2 Secret Key Cryptography CSC 474/574 Dr. Peng Ning 1 Agenda Generic block cipher Feistel cipher DES Modes of block ciphers Multiple encryptions Message
More informationECE 646 Lecture 7. Data Encryption Standard DES. Secret-Key Ciphers. Secret agreement between IBM & NSA, 1974
C 646 Lecture 7 Secret-Key Ciphers Data Standard DS NBS public request for a standard cryptographic algorithm May 15, 1973, August 27, 1974 The algorithm must be: secure public - completely specified -
More informationPRNGs & DES. Luke Anderson. 16 th March University Of Sydney.
PRNGs & DES Luke Anderson luke@lukeanderson.com.au 16 th March 2018 University Of Sydney Overview 1. Pseudo Random Number Generators 1.1 Sources of Entropy 1.2 Desirable PRNG Properties 1.3 Real PRNGs
More informationAPNIC elearning: Cryptography Basics
APNIC elearning: Cryptography Basics 27 MAY 2015 03:00 PM AEST Brisbane (UTC+10) Issue Date: Revision: Introduction Presenter Sheryl Hermoso Training Officer sheryl@apnic.net Specialties: Network Security
More informationSecret Key Algorithms (DES) Foundations of Cryptography - Secret Key pp. 1 / 34
Secret Key Algorithms (DES) Foundations of Cryptography - Secret Key pp. 1 / 34 Definition a symmetric key cryptographic algorithm is characterized by having the same key used for both encryption and decryption.
More informationNetwork Security 網路安全. Lecture 3 March 16, 2015 洪國寶
Network Security 網路安全 Lecture 3 March 16, 2015 洪國寶 1 Outline Review: Symmetric encryption -- Classical techniques (Cont.) Symmetric encryption -- Modern techniques secure encryption schemes modern symmetric
More informationCryptography and Network Security. Sixth Edition by William Stallings
Cryptography and Network Security Sixth Edition by William Stallings Chapter 3 Block Ciphers and the Data Encryption Standard All the afternoon Mungo had been working on Stern's code, principally with
More informationNew Kid on the Block Practical Construction of Block Ciphers. Table of contents
New Kid on the Block Practical Construction of Block Ciphers Foundations of Cryptography Computer Science Department Wellesley College Fall 2016 Table of contents Introduction Substitution-permutation
More informationComputer and Data Security. Lecture 3 Block cipher and DES
Computer and Data Security Lecture 3 Block cipher and DES Stream Ciphers l Encrypts a digital data stream one bit or one byte at a time l One time pad is example; but practical limitations l Typical approach
More informationEncryption DES. Dr.Talal Alkharobi. The Data Encryption Standard (DES)
DES The Data Standard (DES) 2 A block cipher selected as an official Federal Information Processing Standard (FIPS) for the United States in 1976, and which has subsequently enjoyed widespread use internationally.
More informationLecture 2: Shared-Key Cryptography
Graduate Course on Computer Security Lecture 2: Cryptography Iliano Cervesato iliano@itd.nrl.navy.mil ITT Industries, Inc @ NRL Washington DC http://www.cs.stanford.edu/~iliano/ DIMI, Universita di Udine,
More informationSymmetric Key Algorithms. Definition. A symmetric key algorithm is an encryption algorithm where the same key is used for encrypting and decrypting.
Symmetric Key Algorithms Definition A symmetric key algorithm is an encryption algorithm where the same key is used for encrypting and decrypting. 1 Block cipher and stream cipher There are two main families
More informationSecret Key Algorithms (DES)
Secret Key Algorithms (DES) G. Bertoni L. Breveglieri Foundations of Cryptography - Secret Key pp. 1 / 34 Definition a symmetric key cryptographic algorithm is characterized by having the same key used
More informationComputer Security. 08. Cryptography Part II. Paul Krzyzanowski. Rutgers University. Spring 2018
Computer Security 08. Cryptography Part II Paul Krzyzanowski Rutgers University Spring 2018 March 23, 2018 CS 419 2018 Paul Krzyzanowski 1 Block ciphers Block ciphers encrypt a block of plaintext at a
More informationJaap van Ginkel Security of Systems and Networks
Jaap van Ginkel Security of Systems and Networks November 4, 2013 Part 4 Modern Crypto Block Ciphers (Iterated) Block Cipher Plaintext and ciphertext consist of fixed-sized blocks Ciphertext obtained from
More informationStudy and Analysis of Symmetric Key-Cryptograph DES, Data Encryption Standard
Study and Analysis of Symmetric Key-Cryptograph DES, Data Encryption Standard Dr Atul Gonsai #1, Naimish Kakkad *2, Bhargavi Goswami $3, Dr Nikesh Shah @4 # Department of MCA, Saurashtra University, @
More information3 Symmetric Cryptography
CA4005: CRYPTOGRAPHY AND SECURITY PROTOCOLS 1 3 Symmetric Cryptography Symmetric Cryptography Alice Bob m Enc c = e k (m) k c c Dec m = d k (c) Symmetric cryptography uses the same secret key k for encryption
More informationFundamentals of Cryptography
Fundamentals of Cryptography Topics in Quantum-Safe Cryptography June 23, 2016 Part III Data Encryption Standard The Feistel network design m m 0 m 1 f k 1 1 m m 1 2 f k 2 2 DES uses a Feistel network
More informationAIT 682: Network and Systems Security
AIT 682: Network and Systems Security Topic 3.1 Secret Key Cryptography Algorithms Instructor: Dr. Kun Sun Outline Introductory Remarks Feistel Cipher DES AES 2 Introduction Secret Keys or Secret Algorithms?
More informationNetwork Security Essentials
Network Security Essentials Applications and Standards Third Edition William Stallings Chapter 2 Symmetric Encryption and Message Confidentiality Dr. BHARGAVI H. GOSWAMI Department of Computer Science
More informationBlock Ciphers. Secure Software Systems
1 Block Ciphers 2 Block Cipher Encryption function E C = E(k, P) Decryption function D P = D(k, C) Symmetric-key encryption Same key is used for both encryption and decryption Operates not bit-by-bit but
More informationIntroduction to Cryptography. Lecture 1. Benny Pinkas. Administrative Details. Bibliography. In the Library
Administrative Details Introduction to Cryptography Lecture 1 Benny Pinkas Grade Exam 75% Homework 25% (might include programming) Office hours: Wednesday, 12-13. Email: benny@cs.haifa.ac.il Web page:
More informationIntroduction to Cryptography. Lecture 1
Introduction to Cryptography Lecture 1 Benny Pinkas page 1 1 Administrative Details Grade Exam 75% Homework 25% (might include programming) Office hours: Wednesday, 12-13. Email: benny@cs.haifa.ac.il Web
More informationIntroduction to Cryptography. Vasil Slavov William Jewell College
Introduction to Cryptography Vasil Slavov William Jewell College Crypto definitions Cryptography studies how to keep messages secure Cryptanalysis studies how to break ciphertext Cryptology branch of mathematics,
More informationSymmetric Cryptography. CS4264 Fall 2016
Symmetric Cryptography CS4264 Fall 2016 Correction: TA Office Hour Stefan Nagy (snagy2@vt.edu) Office hour: Thursday Friday 10-11 AM, 106 McBryde Hall 2 Slides credit to Abdou Illia RECAP AND HIGH-LEVEL
More informationCryptography. Submitted to:- Ms Poonam Sharma Faculty, ABS,Manesar. Submitted by:- Hardeep Gaurav Jain
Cryptography Submitted to:- Ms Poonam Sharma Faculty, ABS,Manesar Submitted by:- Hardeep Gaurav Jain Cryptography Cryptography, a word with Greek origins, means "secret writing." However, we use the term
More informationCOPACOBANA: RECONFIGURABLE COMPUTING IN CRYPTANALYSIS. Ben Johnstone
COPACOBANA: RECONFIGURABLE COMPUTING IN CRYPTANALYSIS Ben Johnstone Overview Goals Architecture DES Performance Conclusion What is COPACOBANA? Cost Optimized Parallel Code Breaker History Developed at
More informationInternational Journal for Research in Applied Science & Engineering Technology (IJRASET) Performance Comparison of Cryptanalysis Techniques over DES
Performance Comparison of Cryptanalysis Techniques over DES Anupam Kumar 1, Aman Kumar 2, Sahil Jain 3, P Kiranmai 4 1,2,3,4 Dept. of Computer Science, MAIT, GGSIP University, Delhi, INDIA Abstract--The
More informationCryptography Basics. IT443 Network Security Administration Slides courtesy of Bo Sheng
Cryptography Basics IT443 Network Security Administration Slides courtesy of Bo Sheng 1 Outline Basic concepts in cryptography systems Secret key cryptography Public key cryptography Hash functions 2 Encryption/Decryption
More informationA Related Key Attack on the Feistel Type Block Ciphers
International Journal of Network Security, Vol.8, No.3, PP.221 226, May 2009 221 A Related Key Attack on the Feistel Type Block Ciphers Ali Bagherzandi 1,2, Mahmoud Salmasizadeh 2, and Javad Mohajeri 2
More information9/30/2016. Cryptography Basics. Outline. Encryption/Decryption. Cryptanalysis. Caesar Cipher. Mono-Alphabetic Ciphers
Cryptography Basics IT443 Network Security Administration Slides courtesy of Bo Sheng Basic concepts in cryptography systems Secret cryptography Public cryptography 1 2 Encryption/Decryption Cryptanalysis
More informationICT 6541 Applied Cryptography. Hossen Asiful Mustafa
ICT 6541 Applied Cryptography Hossen Asiful Mustafa Encryption & Decryption Key (K) Plaintext (P) Encrypt (E) Ciphertext (C) C = E K (P) Same Key (K) Ciphertext (C) Decrypt (D) Plaintext (P) P = D K (C)
More informationComputer Security CS 526
Computer Security CS 526 Topic 4 Cryptography: Semantic Security, Block Ciphers and Encryption Modes CS555 Topic 4 1 Readings for This Lecture Required reading from wikipedia Block Cipher Ciphertext Indistinguishability
More informationPractical Aspects of Modern Cryptography
Practical Aspects of Modern Cryptography Lecture 3: Symmetric s and Hash Functions Josh Benaloh & Brian LaMacchia Meet Alice and Bob Alice Bob Message Modern Symmetric s Setup: Alice wants to send a private
More informationCryptography and Network Security
Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 14: Folklore, Course summary, Exam requirements Ion Petre Department of IT, Åbo Akademi University 1 Folklore on
More informationSecret Key Cryptography
Secret Key Cryptography General Block Encryption: The general way of encrypting a 64-bit block is to take each of the: 2 64 input values and map it to a unique one of the 2 64 output values. This would
More informationCSc 466/566. Computer Security. 6 : Cryptography Symmetric Key
1/56 CSc 466/566 Computer Security 6 : Cryptography Symmetric Key Version: 2012/02/22 16:14:16 Department of Computer Science University of Arizona collberg@gmail.com Copyright c 2012 Christian Collberg
More informationFast implementations of secret-key block ciphers using mixed inner- and outer-round pipelining
Pawel Chodowiec, Po Khuon, Kris Gaj Electrical and Computer Engineering George Mason University Fast implementations of secret-key block ciphers using mixed inner- and outer-round pipelining http://ece.gmu.edu/crypto-text.htm
More informationCPS2323. Block Ciphers: The Data Encryption Standard (DES)
Block Ciphers: The Data Encryption Standard (DES) Content Block Ciphers: Constructing Pseudo Random Permutations using confusion/diffusion A call for an industry standard... and the NSA Lucifer and Feistel
More informationCryptographic Algorithms - AES
Areas for Discussion Cryptographic Algorithms - AES CNPA - Network Security Joseph Spring Department of Computer Science Advanced Encryption Standard 1 Motivation Contenders Finalists AES Design Feistel
More informationCryptography Symmetric Encryption Class 2
Cryptography Symmetric Encryption Class 2 Stallings: Ch 3 & 6 Stallings: Ch 4 CEN-5079: 18.January.2018 1 Symmetric Cryptosystems Encryption Key Decryption Key Plaintext Plaintext Encryption Algorithm
More information6 Block Ciphers. 6.1 Block Ciphers CA642: CRYPTOGRAPHY AND NUMBER THEORY 1
CA642: CRYPTOGRAPHY AND NUMBER THEORY 1 6 Block Ciphers 6.1 Block Ciphers Block Ciphers Plaintext is divided into blocks of fixed length and every block is encrypted one at a time. A block cipher is a
More informationSymmetric Key Encryption. Symmetric Key Encryption. Advanced Encryption Standard ( AES ) DES DES DES 08/01/2015. DES and 3-DES.
Symmetric Key Encryption Symmetric Key Encryption and 3- Tom Chothia Computer Security: Lecture 2 Padding Block cipher modes Advanced Encryption Standard ( AES ) AES is a state-of-the-art block cipher.
More informationComp527 status items. Crypto Protocols, part 2 Crypto primitives. Bart Preneel July Install the smart card software. Today
Comp527 status items Crypto Protocols, part 2 Crypto primitives Today s talk includes slides from: Bart Preneel, Jonathan Millen, and Dan Wallach Install the smart card software Bring CDs back to Dan s
More informationFoundations of Cryptology
Multimedia Security Mauro Barni University of Siena Cryptography Cryptography is the art or science of keeping messages secret; the word cryptography is derived from Greek and literally means secret (crypto-)
More informationGoals of Modern Cryptography
Goals of Modern Cryptography Providing information security: Data Privacy Data Integrity and Authenticity in various computational settings. Data Privacy M Alice Bob The goal is to ensure that the adversary
More informationCRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext
CRYPTOLOGY CRYPTOGRAPHY KEY MANAGEMENT CRYPTANALYSIS Cryptanalytic Brute-Force Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext 58 Types of Cryptographic Private key (Symmetric) Public
More informationCryptography Functions
Cryptography Functions Lecture 3 1/29/2013 References: Chapter 2-3 Network Security: Private Communication in a Public World, Kaufman, Perlman, Speciner Types of Cryptographic Functions Secret (Symmetric)
More informationSecret Key Cryptography (Spring 2004)
Secret Key Cryptography (Spring 2004) Instructor: Adi Shamir Teaching assistant: Eran Tromer 1 Background Lecture notes: DES Until early 1970 s: little cryptographic research in industry and academcy.
More informationCIT 380: Securing Computer Systems. Symmetric Cryptography
CIT 380: Securing Computer Systems Symmetric Cryptography Topics 1. Modular Arithmetic 2. What is Cryptography? 3. Transposition Ciphers 4. Substitution Ciphers 1. Cæsar cipher 2. Vigènere cipher 5. Cryptanalysis:
More informationConventional Encryption Principles Conventional Encryption Algorithms Cipher Block Modes of Operation Location of Encryption Devices Key Distribution
Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ Ola.Flygt@vxu.se +46 470 70 86 49 1 Conventional Encryption Principles Conventional Encryption Algorithms Cipher Block Modes of Operation
More informationOutline. Data Encryption Standard. Symmetric-Key Algorithms. Lecture 4
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 4 Department of Electrical and Computer Engineering Cleveland State University wenbing@ieee.org Outline Review
More informationComputer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 2 Cryptographic Tools First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Cryptographic Tools cryptographic algorithms
More informationCS Network Security. Module 6 Private Key Cryptography
CS 393 - Network Security Module 6 Private ey Cryptography Data Encryption Encryption is the process of encoding a message such that its meaning is not obvious. Decryption is the reverse process, ie, transforming
More informationCSCI 454/554 Computer and Network Security. Topic 2. Introduction to Cryptography
CSCI 454/554 Computer and Network Security Topic 2. Introduction to Cryptography Outline Basic Crypto Concepts and Definitions Some Early (Breakable) Cryptosystems Key Issues 2 Basic Concepts and Definitions
More information7. Symmetric encryption. symmetric cryptography 1
CIS 5371 Cryptography 7. Symmetric encryption symmetric cryptography 1 Cryptographic systems Cryptosystem: t (MCKK GED) (M,C,K,K,G,E,D) M, plaintext message space C, ciphertext message space K, K, encryption
More informationData Encryption Standard (DES)
Data Encryption Standard (DES) Best-known symmetric cryptography method: DES 1973: Call for a public cryptographic algorithm standard for commercial purposes by the National Bureau of Standards Goals:
More informationCryptography III: Symmetric Ciphers
Cryptography III: Symmetric Ciphers Computer Security Lecture 12 David Aspinall School of Informatics University of Edinburgh 14th February 2008 Outline Stream ciphers Block ciphers DES and Rijndael Summary
More informationCSC 474/574 Information Systems Security
CSC 474/574 Information Systems Security Topic 2.1 Introduction to Cryptography CSC 474/574 By Dr. Peng Ning 1 Cryptography Cryptography Original meaning: The art of secret writing Becoming a science that
More information