Introduction to Symmetric Cryptography

Similar documents
CRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext

Module 13 Network Security. Version 1 ECE, IIT Kharagpur

Chapter 6 Contemporary Symmetric Ciphers

Cryptography MIS

Cryptography Functions

Computer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018

CSC 474/574 Information Systems Security

Crypto: Symmetric-Key Cryptography

Double-DES, Triple-DES & Modes of Operation

ENEE 459-C Computer Security. Symmetric key encryption in practice: DES and AES algorithms

Block Cipher Operation. CS 6313 Fall ASU

9/30/2016. Cryptography Basics. Outline. Encryption/Decryption. Cryptanalysis. Caesar Cipher. Mono-Alphabetic Ciphers

Cryptography Basics. IT443 Network Security Administration Slides courtesy of Bo Sheng

Outline. Data Encryption Standard. Symmetric-Key Algorithms. Lecture 4

Network Security Essentials Chapter 2

Cryptography Introduction

EEC-484/584 Computer Networks

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

Lecture 1 Applied Cryptography (Part 1)

Lecture 6: Symmetric Cryptography. CS 5430 February 21, 2018

Cryptography. Submitted to:- Ms Poonam Sharma Faculty, ABS,Manesar. Submitted by:- Hardeep Gaurav Jain

Computer Security CS 526

APNIC elearning: Cryptography Basics

Introduction to Cryptography. Vasil Slavov William Jewell College

Symmetric Encryption. Thierry Sans

Cryptography and Network Security

Scanned by CamScanner

Chapter 3 Traditional Symmetric-Key Ciphers 3.1

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl

Symmetric-Key Cryptography

CIS 4360 Secure Computer Systems Symmetric Cryptography

CIS 4360 Introduction to Computer Security Fall WITH ANSWERS in bold. First Midterm

CSE 127: Computer Security Cryptography. Kirill Levchenko

Cryptography Symmetric Encryption Class 2

CSC 580 Cryptography and Computer Security

Making and Breaking Ciphers

Practical Aspects of Modern Cryptography

Introduction to Network Security Missouri S&T University CPE 5420 Data Encryption Standard

Ref:

CSC 474/574 Information Systems Security

Cryptography Introduction to Computer Security. Chapter 8

Winter 2011 Josh Benaloh Brian LaMacchia

Cryptography 2017 Lecture 3

7. Symmetric encryption. symmetric cryptography 1

Chapter 6: Contemporary Symmetric Ciphers

Content of this part

UNIT - II Traditional Symmetric-Key Ciphers. Cryptography & Network Security - Behrouz A. Forouzan

Introduction Classical Confidentiality Modern Confidentiality Integrity Authentication

Lecture 4: Symmetric Key Encryption

Chapter 3 Block Ciphers and the Data Encryption Standard

How many DES keys, on the average, encrypt a particular plaintext block to a particular ciphertext block?

Classic Cryptography: From Caesar to the Hot Line

Network Security Essentials

Introduction to Modern Cryptography. Lecture 2. Symmetric Encryption: Stream & Block Ciphers

Traditional Symmetric-Key Ciphers. A Biswas, IT, BESU Shibpur

Basic Concepts and Definitions. CSC/ECE 574 Computer and Network Security. Outline

Symmetric Cryptography

Symmetric Encryption

Symmetric Encryption Algorithms

EEC-682/782 Computer Networks I

CHAPTER 6. SYMMETRIC CIPHERS C = E(K2, E(K1, P))

CSCE 813 Internet Security Symmetric Cryptography

Symmetric Cryptography. CS4264 Fall 2016

1.264 Lecture 27. Security protocols Symmetric cryptography. Next class: Anderson chapter 10. Exercise due after class

Lecture 2: Secret Key Cryptography

Chapter 8. Network Security. Cryptography. Need for Security. An Introduction to Cryptography 10/7/2010

CSCI 454/554 Computer and Network Security. Topic 2. Introduction to Cryptography

2/7/2013. CS 472 Network and System Security. Mohammad Almalag Lecture 2 January 22, Introduction To Cryptography

Garantía y Seguridad en Sistemas y Redes

Cryptography. Historical Encoding. Encryption Media. Intro to Encryption 8/24/2010. COMP620 Information Privacy & Security 1

ECE 646 Lecture 8. Modes of operation of block ciphers

Classical Cryptography. Thierry Sans

Outline. Cryptography. Encryption/Decryption. Basic Concepts and Definitions. Cryptography vs. Steganography. Cryptography: the art of secret writing

Block Ciphers and Data Encryption Standard. CSS Security and Cryptography

Lecture 3: Symmetric Key Encryption

Distributed Systems. 26. Cryptographic Systems: An Introduction. Paul Krzyzanowski. Rutgers University. Fall 2015

Encryption 2. Tom Chothia Computer Security: Lecture 3

Cryptography (Overview)

P2_L6 Symmetric Encryption Page 1

L3: Basic Cryptography II. Hui Chen, Ph.D. Dept. of Engineering & Computer Science Virginia State University Petersburg, VA 23806

Chap. 3. Symmetric Key Crypto (Block Ciphers)

Computer Security: Principles and Practice

Lecture 2. Cryptography: History + Simple Encryption,Methods & Preliminaries. Cryptography can be used at different levels

Encryption Algorithms

Goals of Modern Cryptography

Introduction. CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell

PROTECTING CONVERSATIONS

Modern Symmetric Block cipher

Information Security CS526

Cryptography Part II Introduction to Computer Security. Chapter 8

Lecture 02: Historical Encryption Schemes. Lecture 02: Historical Encryption Schemes

Chapter 8. Network Security. Need for Security. An Introduction to Cryptography. Transposition Ciphers One-Time Pads

Information Security CS526

Cryptography (DES+RSA) by Amit Konar Dept. of Math and CS, UMSL

Computer Security. 08. Cryptography Part II. Paul Krzyzanowski. Rutgers University. Spring 2018

Introduction to Cryptographic Systems. Asst. Prof. Mihai Chiroiu

Secret Key Cryptography

L2. An Introduction to Classical Cryptosystems. Rocky K. C. Chang, 23 January 2015

Security: Cryptography

ECE596C: Handout #7. Analysis of DES and the AES Standard. Electrical and Computer Engineering, University of Arizona, Loukas Lazos

Transcription:

Introduction to Symmetric Cryptography Tingting Chen Cal Poly Pomona 1 Some slides are from Dr. Cliff Zou. www.cs.ucf.edu/~czou/cis3360-12/ch08-cryptoconcepts.ppt

Basic Cryptography Private Key Cryptography Secret Key Cryptography, Symmetric Cryptography, Classical Cryptography Public Key Cryptography 2

Classical Cryptography Alice Encrypt (algorithm) Secret key K Key Source Secure Channel Decrypt (algorithm) Bob Plaintext X Ciphertext Y Plaintext X 3

Classical Cryptography Sender, receiver share common key Keys may be the same, or trivial to derive from one another Two basic types Transposition ciphers Substitution ciphers e.g., Caesar cipher, Vigenere cipher, one-time pad, S-box 4

One-Time Pads There is one type of substitution cipher that is absolutely unbreakable. The one-time pad was invented in 1917 by Joseph Mauborgne and Gilbert Vernam We use a block of shift keys, (k 1, k 2,..., k n ), to encrypt a plaintext, M, of length n, with each shift key being chosen uniformly at random. Since each shift is random, every ciphertext is equally likely for any plaintext. 5

Weaknesses of the One-Time Pad In spite of their perfect security, one-time pads have some weaknesses The key has to be as long as the plaintext Keys can never be reused Repeated use of one-time pads allowed the U.S. to break some of the communications of Soviet spies during the Cold War. Public domain declassified government image from https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/books-and-monographs/venona-soviet-espionage-and-the-american-response-1939-1957/part2.htm 6

Block Ciphers In a block cipher: Plaintext and ciphertext have fixed length b (e.g., 128 bits) A plaintext of length n is partitioned into a sequence of m blocks, P[0],, P[m 1], where n bm < n + b Each message is divided into a sequence of blocks and encrypted or decrypted in terms of its blocks. Plaintext Blocks of plaintext Requires padding with extra bits. 7

Block Ciphers in Practice Data Encryption Standard (DES) Developed by IBM and adopted by NIST in 1977 64-bit blocks and 56-bit keys Small key space makes exhaustive search attack feasible since late 90s Triple DES (3DES) Nested application of DES with three different keys KA, KB, and KC Effective key length is 168 bits, making exhaustive search attacks unfeasible C = E KC (D KB (E KA (P))); P = D KA (E KB (D KC (C))) Equivalent to DES when KA=KB=KC (backward compatible) Advanced Encryption Standard (AES) Selected by NIST in 2001 through open international competition and public discussion 128-bit blocks and several possible key lengths: 128, 192 and 256 bits Exhaustive search attack not currently possible AES-256 is the symmetric encryption algorithm of choice 8

Block Cipher Modes A block cipher mode describes the way a block cipher encrypts and decrypts a sequence of message blocks. Electronic Code Book (ECB) Mode (is the simplest): Block P[i] encrypted into ciphertext block C[i] = E K (P[i]) Block C[i] decrypted into plaintext block M[i] = D K (C[i]) Public domain images from http://en.wikipedia.org/wiki/file:ecb_encryption.png and http://en.wikipedia.org/wiki/file:ecb_decryption.png

Cipher Block Chaining (CBC) Mode In Cipher Block Chaining (CBC) Mode The previous ciphertext block is combined with the current plaintext block C[i] = E K (C[i 1] P[i]) C[ 1] = V, a random block separately transmitted encrypted (known as the initialization vector) Decryption: P[i] = C[i 1] D K (C[i]) CBC Encryption: CBC Decryption: P[0] P[1] P[2] P[3] P[0] P[1] P[2] P[3] V V E K E K E K E K D K D K D K D K C[0] C[1] C[2] C[3] C[0] C[1] C[2] C[3] 10

Stream Cipher Key stream Pseudo-random sequence of bits S = S[0], S[1], S[2], Can be generated on-line one bit (or byte) at the time Stream cipher XOR the plaintext with the key stream C[i] = S[i] P[i] Suitable for plaintext of arbitrary length generated on the fly, e.g., media stream 11

Applications of Symmetric Ciphers Data encryption Most data is encrypted using symmetric algorithms RSA encryption in Java SE Message Authentication Code CBC-MAC Hash Functions based on Block Ciphers One-way compression function. 12