Crypto: Symmetric-Key Cryptography

Similar documents
Network Security Essentials Chapter 2

Symmetric-Key Cryptography

Scanned by CamScanner

Symmetric Encryption. Thierry Sans

Double-DES, Triple-DES & Modes of Operation

Chapter 3 Block Ciphers and the Data Encryption Standard

Computer Security CS 526

Security and Cryptography 1. Stefan Köpsell, Thorsten Strufe. Module 5: Pseudo Random Permutations and Block Ciphers

Cryptography 2017 Lecture 3

Symmetric Cryptography

Chapter 6 Contemporary Symmetric Ciphers

Introduction to Symmetric Cryptography

9/30/2016. Cryptography Basics. Outline. Encryption/Decryption. Cryptanalysis. Caesar Cipher. Mono-Alphabetic Ciphers

Cryptography Basics. IT443 Network Security Administration Slides courtesy of Bo Sheng

CENG 520 Lecture Note III

Cryptography [Symmetric Encryption]

Block Ciphers and Data Encryption Standard. CSS Security and Cryptography

Stream Ciphers and Block Ciphers

Block Cipher Operation. CS 6313 Fall ASU

Cryptography CS 555. Topic 11: Encryption Modes and CCA Security. CS555 Spring 2012/Topic 11 1

Information Security CS526

page 1 Introduction to Cryptography Benny Pinkas Lecture 3 November 18, 2008 Introduction to Cryptography, Benny Pinkas

Block ciphers. CS 161: Computer Security Prof. Raluca Ada Popa. February 26, 2016

Winter 2011 Josh Benaloh Brian LaMacchia

Course Map. COMP 7/8120 Cryptography and Data Security. Learning Objectives. How to use PRPs (Block Ciphers)? 2/14/18

Stream Ciphers and Block Ciphers

Lecture 4: Symmetric Key Encryption

APNIC elearning: Cryptography Basics

Symmetric Encryption Algorithms

Lecture 3: Symmetric Key Encryption

Lecture 2: Secret Key Cryptography

Cryptography Symmetric Encryption Class 2

CS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University

symmetric cryptography s642 computer security adam everspaugh

Cryptography III: Symmetric Ciphers

Block cipher modes. Lecturers: Mark D. Ryan and David Galindo. Cryptography Slide: 75

Conventional Encryption Principles Conventional Encryption Algorithms Cipher Block Modes of Operation Location of Encryption Devices Key Distribution

CIS 6930/4930 Computer and Network Security. Topic 3.1 Secret Key Cryptography (Cont d)

Private-Key Encryption

CSCE 813 Internet Security Symmetric Cryptography

Goals of Modern Cryptography

Jaap van Ginkel Security of Systems and Networks

Introduction to Cryptographic Systems. Asst. Prof. Mihai Chiroiu

Cryptography Functions

CSE 127: Computer Security Cryptography. Kirill Levchenko

Introduction to Cryptography. Lecture 3

CIS 4360 Secure Computer Systems Symmetric Cryptography

Lecture 2: Shared-Key Cryptography

Introduction to Cryptography. Lecture 2. Benny Pinkas. Perfect Cipher. Perfect Ciphers. Size of key space

Outline. Data Encryption Standard. Symmetric-Key Algorithms. Lecture 4

Block ciphers used to encode messages longer than block size Needs to be done correctly to preserve security Will look at five ways of doing this

symmetric cryptography s642 computer security adam everspaugh

Practical Aspects of Modern Cryptography

Data Encryption Standard (DES)

Advanced Encryption Standard and Modes of Operation. Foundations of Cryptography - AES pp. 1 / 50

Some Aspects of Block Ciphers

Lecture 5. Constructions of Block ciphers. Winter 2018 CS 485/585 Introduction to Cryptography

Network Security Essentials

Introduction to cryptology (GBIN8U16)

Modern Symmetric Block cipher

CS155. Cryptography Overview

Cryptography (cont.)

Secret Key Cryptography Overview

Applied Cryptography Data Encryption Standard

ECE596C: Handout #7. Analysis of DES and the AES Standard. Electrical and Computer Engineering, University of Arizona, Loukas Lazos

Cryptography III: Symmetric Ciphers

Cryptography: Symmetric Encryption [continued]

CHAPTER 6. SYMMETRIC CIPHERS C = E(K2, E(K1, P))

Introduction to Cryptography. Lecture 3

EEC-484/584 Computer Networks

Computer and Data Security. Lecture 3 Block cipher and DES

Introduction to Modern Cryptography. Lecture 2. Symmetric Encryption: Stream & Block Ciphers

Block Ciphers. Secure Software Systems

ECE 646 Lecture 8. Modes of operation of block ciphers

COS433/Math 473: Cryptography. Mark Zhandry Princeton University Spring 2017

CPS2323. Block Ciphers: The Data Encryption Standard (DES)

Lecture 6: Symmetric Cryptography. CS 5430 February 21, 2018

Content of this part

CSCE 548 Building Secure Software Symmetric Cryptography

CS155. Cryptography Overview

Course Business. Midterm is on March 1. Final Exam is Monday, May 1 (7 PM) Allowed to bring one index card (double sided) Location: Right here

L3. An Introduction to Block Ciphers. Rocky K. C. Chang, 29 January 2015

3 Symmetric Key Cryptography 3.1 Block Ciphers Symmetric key strength analysis Electronic Code Book Mode (ECB) Cipher Block Chaining Mode (CBC) Some

Block Cipher Operation

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl

Unit 8 Review. Secure your network! CS144, Stanford University

COMP4109 : Applied Cryptography

6 Block Ciphers. 6.1 Block Ciphers CA642: CRYPTOGRAPHY AND NUMBER THEORY 1

ICT 6541 Applied Cryptography. Hossen Asiful Mustafa

Block Cipher Modes of Operation

Homework 2. Out: 09/23/16 Due: 09/30/16 11:59pm UNIVERSITY OF MARYLAND DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING

Block Ciphers. Lucifer, DES, RC5, AES. CS 470 Introduction to Applied Cryptography. Ali Aydın Selçuk. CS470, A.A.Selçuk Block Ciphers 1

CSC574: Computer & Network Security

Symmetric key cryptography

Computational Security, Stream and Block Cipher Functions

CIS 4360 Introduction to Computer Security Fall WITH ANSWERS in bold. First Midterm

Symmetric Cryptography

Computer Security. 08. Cryptography Part II. Paul Krzyzanowski. Rutgers University. Spring 2018

CRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext

CSc 466/566. Computer Security. 6 : Cryptography Symmetric Key

Transcription:

Computer Security Course. Song Crypto: Symmetric-Key Cryptography Slides credit: Dan Boneh, David Wagner, Doug Tygar

Overview Cryptography: secure communication over insecure communication channels Three goals Confidentiality Integrity Authenticity

Brief History of Crypto 2,000 years ago Caesar Cypher: shifting each letter forward by a fixed amount Encode and decode by hand During World War I/II Mechanical era: a mechanical device for encrypting messages After World War II Modern cryptography: rely on mathematics and electronic computers

Modern Cryptography Symmetric-key cryptography The same secret key is used by both endpoints of a communication Public-key cryptography Two endpoints use different keys

Attacks to Cryptography Ciphertext only Adversary has E(m1), E(m2), Known plaintext Adversary has E(m1)&m1, E(m2)&m2, Chosen plaintext Adversary picks m1, m2, (potentially adaptively) Adversary sees E(m1), E(m2), Chosen ciphertext Adversary picks E(m1), E(m2), (potentially adaptively) Adversary sees m1, m2,

One-time Pad K: random n-bit key P: n-bit message (plaintext) C: n-bit ciphertext Encryption: C = P xor K Decryption: P = C xor K A key can only be used once Impractical!

Block Cipher Encrypt/Decrypt messages in fixed size blocks using the same secret key k-bit secret key n-bit plaintext/ciphertext n bits Plaintext Block n E, D Key bits Ciphertext Block k Bits

Feistel cipher Encryption L1 R1 Li Ri Rn Rn+1-i Ln Start with (L0, R0) Li+1=Ri Ri+1=Li xor F(Ri,Ki) Ln+1-i Decryption Start with (Rn+1, Ln+1) Ri=Li+1 Li=Ri+1 xor F(Li+1,Ki)

DES - Data Encryption Standard (1977) Feistel cipher Works on 64 bit block with 56 bit keys Developed by IBM (Lucifer) improved by NSA Brute force attack feasible in 1997

AES Advanced Encryption Standard (1997) Rijndael cipher Joan Daemen & Vincent Rijmen Block size 128 bits Key can be 128, 192, or 256 bits

Abstract Block Ciphers: PRPs and PRFs PRF: F: K X Y such that: exists efficient algorithm to eval. F(k,x) PRP: E: K X X such that: 1. Exists efficient algorithm to eval. E(k,x) 2. The func E( k, ) is one-to-one 3. Exists efficient algorithm for inverse D(k,x) A block cipher is a PRP

Secure PRF and Secure PRP A PRF F: K X Y is secure if F(k, ) is indistinguishable from a random func. f: X Y A PRP E: K X X is secure if E(k, ) is indisting. from a random perm. : X X f Funs[X,Y] x X??? f(x) or F(k,x) k K

Modes of Operation Block ciphers encrypt fixed size blocks eg. DES encrypts 64-bit blocks with 56-bit key Need to en/decrypt arbitrary amounts of data NIST SP 800-38A defines 5 modes Block and stream modes Cover a wide variety of applications Can be used with any block cipher

Electronic Code Book (ECB) Message is broken into independent blocks which are encrypted Each block is a value which is substituted, like a codebook Each block is encoded independently of the other blocks

Advantages and Limitations of ECB Message repetitions may show in ciphertext If aligned with message block Particularly with data such graphics Or with messages that change very little Encrypted message blocks independent Not recommended

Cipher Block Chaining (CBC)

Advantages and Limitations of CBC Ciphertext block depends on all blocks before it Change to a block affects all following blocks Need Initialization Vector (IV) Random numbers Must be known to sender & receiver

Stream Modes of Operation Block modes encrypt entire block May need to operate on smaller units Real time data Convert block cipher into stream cipher Counter (CTR) mode Use block cipher as PRNG (Pseudo Random Number Generator)

Counter (CTR) Encrypts counter value Need a different key & counter value for every plaintext block Oi=EK(IV+i) Ci=Pi xor Oi Uses: high-speed network encryption

Counter (CTR) Counter mode with a random IV: IV IV (parallel encryption) m[0] m[1] m[l] Ek(IV) Ek(IV+1) Ek(IV+L) c[0] c[1] c[l] ciphertext

Advantages and Limitations of CTR Efficiency Can do parallel encryptions in h/w or s/w Can preprocess in advance of need Good for bursty high speed links Random access to encrypted data blocks Must ensure never reuse key/counter values, otherwise could break