Introduction to Modern Symmetric-Key Ciphers

Similar documents
UNIT - II Traditional Symmetric-Key Ciphers. Cryptography & Network Security - Behrouz A. Forouzan

Cryptography and Network Security Block Ciphers + DES. Lectured by Nguyễn Đức Thái

Lecture 4: Symmetric Key Encryption

Cryptographic Algorithms - AES

Understanding Cryptography by Christof Paar and Jan Pelzl. Chapter 4 The Advanced Encryption Standard (AES) ver. October 28, 2009

Content of this part

Chapter 7 Advanced Encryption Standard (AES) 7.1

Block Ciphers and Data Encryption Standard. CSS Security and Cryptography

Computer and Data Security. Lecture 3 Block cipher and DES

Goals of Modern Cryptography

Lecture 3: Symmetric Key Encryption

Week 4. : Block Ciphers and DES

Winter 2011 Josh Benaloh Brian LaMacchia

Week 5: Advanced Encryption Standard. Click

Secret Key Cryptography

Cryptography and Network Security. Sixth Edition by William Stallings

Block Ciphers. Lucifer, DES, RC5, AES. CS 470 Introduction to Applied Cryptography. Ali Aydın Selçuk. CS470, A.A.Selçuk Block Ciphers 1

Cryptography MIS

Block Ciphers and the Data Encryption Standard (DES) Modified by: Dr. Ramzi Saifan

Stream Ciphers and Block Ciphers

Introduction to Cryptology. Lecture 17

Cryptography Trends: A US-Based Perspective. Burt Kaliski, RSA Laboratories IPA/TAO Cryptography Symposium October 20, 2000

L3. An Introduction to Block Ciphers. Rocky K. C. Chang, 29 January 2015

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Computational Security, Stream and Block Cipher Functions

Fundamentals of Cryptography

Cryptography and Network Security

Cryptography Functions

Stream Ciphers and Block Ciphers

Symmetric Encryption. Thierry Sans

Symmetric Key Algorithms. Definition. A symmetric key algorithm is an encryption algorithm where the same key is used for encrypting and decrypting.

Secret Key Algorithms (DES)

Modern Block Ciphers

CPSC 467b: Cryptography and Computer Security

Data Encryption Standard (DES)

Network Security Essentials

Symmetric Encryption Algorithms

Symmetric Cryptography. Chapter 6

Block Ciphers Tutorial. c Eli Biham - May 3, Block Ciphers Tutorial (5)

CPSC 467b: Cryptography and Computer Security

CSCE 813 Internet Security Symmetric Cryptography

Introduction to Network Security Missouri S&T University CPE 5420 Data Encryption Standard

Cryptography: Symmetric Encryption [continued]

Chapter 3 Block Ciphers and the Data Encryption Standard

Presented by: Kevin Hieb May 2, 2005

Cryptography. Submitted to:- Ms Poonam Sharma Faculty, ABS,Manesar. Submitted by:- Hardeep Gaurav Jain

Introduction to Cryptography. Lecture 2. Benny Pinkas. Perfect Cipher. Perfect Ciphers. Size of key space

7. Symmetric encryption. symmetric cryptography 1

Cryptography and Network Security. Sixth Edition by William Stallings

Secret Key Algorithms (DES) Foundations of Cryptography - Secret Key pp. 1 / 34

CPSC 467: Cryptography and Computer Security

AES Advanced Encryption Standard

CSCI 454/554 Computer and Network Security. Topic 3.1 Secret Key Cryptography Algorithms

Block Encryption and DES

AES Java Technology Comparisons

Jaap van Ginkel Security of Systems and Networks

Cryptography [Symmetric Encryption]

AIT 682: Network and Systems Security

Network Security Essentials Chapter 2

Study and Analysis of Symmetric Key-Cryptograph DES, Data Encryption Standard

CSc 466/566. Computer Security. 6 : Cryptography Symmetric Key

FPGA Can be Implemented Using Advanced Encryption Standard Algorithm

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

Block Ciphers. Secure Software Systems

DataTraveler 5000 (DT5000) and DataTraveler 6000 (DT6000) Ultimate Security in a USB Flash Drive. Submitted by SPYRUS, Inc.

New Kid on the Block Practical Construction of Block Ciphers. Table of contents

The FastDES: A New Look of Data Encryption Standard

Symmetric Cryptography

ICT 6541 Applied Cryptography. Hossen Asiful Mustafa

Homework 2. Out: 09/23/16 Due: 09/30/16 11:59pm UNIVERSITY OF MARYLAND DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING

Block Ciphers and Stream Ciphers. Block Ciphers. Stream Ciphers. Block Ciphers

Crypto Basics. Recent block cipher: AES Public Key Cryptography Public key exchange: Diffie-Hellmann Homework suggestion

Lecture 4. Encryption Continued... Data Encryption Standard (DES)

ENEE 459-C Computer Security. Symmetric key encryption in practice: DES and AES algorithms

Data Encryption Standard

6 Block Ciphers. 6.1 Block Ciphers CA642: CRYPTOGRAPHY AND NUMBER THEORY 1

CS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University

Cryptography 2017 Lecture 3

CIS 6930/4930 Computer and Network Security. Project requirements

PRNGs & DES. Luke Anderson. 16 th March University Of Sydney.

Lecture 5. Encryption Continued... Why not 2-DES?

Uses of Cryptography

Network Security. Lecture# 6 Lecture Slides Prepared by: Syed Irfan Ullah N.W.F.P. Agricultural University Peshawar

P2_L6 Symmetric Encryption Page 1

Encryption DES. Dr.Talal Alkharobi. The Data Encryption Standard (DES)

Lecture 2: Secret Key Cryptography

Symmetric Cryptography CS461/ECE422

Syrvey on block ciphers

Cryptography and Network Security Chapter 3. Modern Block Ciphers. Block vs Stream Ciphers. Block Cipher Principles

Conventional Encryption: Modern Technologies

Secret Key Cryptography

Encryption I. An Introduction

Information Security and Cryptography 資訊安全與密碼學. Lecture 6 April 8, 2015 洪國寶

Modern Symmetric Block cipher

Computer Security. 08. Cryptography Part II. Paul Krzyzanowski. Rutgers University. Spring 2018

Computer Security 3/23/18

Ref:

Data Encryption Standard

Computer Security: Principles and Practice

Comp527 status items. Crypto Protocols, part 2 Crypto primitives. Bart Preneel July Install the smart card software. Today

Transcription:

Introduction to Modern Symmetric-Key Ciphers 1

Objectives Review a short history of DES. Define the basic structure of DES. List DES alternatives. Introduce the basic structure of AES. 2

Data Encryption Standard (DES) History DES is most well known symmetric-key block cipher published by National Institute of Standards and Technology (NIST). Proposal from IBM. DES was adopted as a federal standard in 1976 and published as DES in 1977. It was used widely in the financial industry. In 1998, NIST issued a call for a new proposal for an algorithm because DES was no longer able to provide adequate cryptographic protection. 3

Overview Data Encryption Standard (DES) Block size=64 bit It takes a 64 bit plaintext and creates 64 bit ciphertext. Key=56 bit The round-key generator create sixteen 48 bit keys out of one 56 bit cipher key. 4

Encryption Data Encryption Standard (DES) Encryption process is made of: Two permutation - Called initial and final. - Each of these permutation takes a 64-bit input and permutes them according to a predefined rules. - They are keyless straight permutation per that are the inverse of each other. 16 Feistel rounds. - Each round uses different round key generated by round key generator. 5

64-bit plaintext DES Initial permutation Round 1 Round 2... Round 16 K 1 48 bit K 2 48 bit. K 16 48 bit Round d-key generator 56 bit Cipher key Final permutation 64-bit ciphertext Figure 6.2: General Structure of DES

Ref: http://www.dmst.aueb.gr/dds/secimp/crypto/indexw.htm

Data Encryption Standard (DES) Decryption The decryption is essentially the same as encryption. only the key schedule is reversed. This is due to the fact that DES is based on a Feistel network. 8

Criticism Data Encryption Standard (DES) DES was criticized for two reasons: 1. Small key length (only 56 bit) which could make the cipher vulnerable to brute-force attack. 2. Critics were concerned about some hidden design behind the internal structure of DES. 9

DES Alternatives There exists a wealth of other block ciphers. A small collection of as of yet unbroken ciphers is: Algorithm I/O bits Key Lengths Remark AES/Rijndael 128 128/192/256 DES successor", US federal standard Triple DES 64 112 (effective) Most conservative choice It has been adopted by banking industry Mars 128 128/192/256 AES finalist RC6 128 128/192/256 AES finalist Serpent 128 128/192/256 AES finalist Twofish 128 128/192/256 AES finalist IDEA 64 128 patented 10

Advanced Encryption Standard (AES) History The Advanced Encryption Standard (AES) is a symmetric-key block cipher. In February 2001, NIST announced that a draft of the Federal Information Processing Standard (FIPS) was available for public review and comment AES was published as FIPS 1997. the Federal Register in December 2001. The criteria defined by NIST for selecting AES fall into three areas: security, cost, implementation. 11

Advanced Encryption Standard (AES) Overview AES is a non-feistel cipher. It encrypts and decrypts a data block of 128 bits. The key size, which can be 128, 192, or 256 bits. It uses 10, 12, or 14 rounds depending on the key size. The round keys are always 128 bits. 12

Advanced Encryption Standard (AES) Encryption To provide security, AES use four types of transformations: substitution, permutation, mixing and key adding. At the encryption side, each round except the last use four transformations that are invertible. The pre-round transformation uses only one transformation(key adding). The last round has only three transformation (mixing is missing). 13

Advanced Encryption Standard (AES) Figure 7.1: General design of AES encryption ciphe 14

Advanced Encryption Standard (AES) Decryption AES is a non-feistel cipher,, which means that each transformation or group of transformation must be invertible. The order of each transformation is changed in the reverse cipher (the decryption side) The difference in ordering is needed to make each transformation in the encryption side aligned with its inverse in the decryption side => In this way, operations will cancel the effect of each other. 15

Advanced Encryption Standard (AES) Analysis of AES AES was designed after DES. Most of the known attacks on DES were already tested on AES. For example: Brute-Force Attack AES is definitely more secure than DES due to the larger-size key. 16

References [1] Ch 6, Introduction to CRYPTOGRAPHY and NETWORK SECURITY, Behrouz A.Forouzan [2] http://www.box.net/shared/static/76vk1rd49n.pdf 17