Cryptology Part 1. Terminology. Basic Approaches to Cryptography. Basic Approaches to Cryptography: (1) Transposition (continued)

Similar documents
Acknowledgments. CSE565: Computer Security Lectures 16 & 17 Authentication & Applications

Cryptography and Network Security

KEY DISTRIBUTION AND USER AUTHENTICATION

Cryptography and Network Security Chapter 13. Digital Signatures & Authentication Protocols

Cryptography and Network Security Chapter 14

Computer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018

Cryptography and Network Security Chapter 13. Fourth Edition by William Stallings. Lecture slides by Lawrie Brown

Network Security Essentials

Contents Digital Signatures Digital Signature Properties Direct Digital Signatures

User Authentication. Modified By: Dr. Ramzi Saifan

Cristina Nita-Rotaru. CS355: Cryptography. Lecture 17: X509. PGP. Authentication protocols. Key establishment.

Glenda Whitbeck Global Computing Security Architect Spirit AeroSystems

CRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext

Key Management and Distribution

Protocols II. Computer Security Lecture 12. David Aspinall. 17th February School of Informatics University of Edinburgh

Kerberos and Public-Key Infrastructure. Key Points. Trust model. Goal of Kerberos

Trusted Intermediaries

AIT 682: Network and Systems Security

Unit III. Chapter 1: Message Authentication and Hash Functions. Overview:

Introduction. Trusted Intermediaries. CSC/ECE 574 Computer and Network Security. Outline. CSC/ECE 574 Computer and Network Security.

CIS 6930/4930 Computer and Network Security. Topic 7. Trusted Intermediaries

Cryptography CS 555. Topic 16: Key Management and The Need for Public Key Cryptography. CS555 Spring 2012/Topic 16 1

Classical Cryptography. Thierry Sans

CRYPTOGRAPHY. BY, Ayesha Farhin

Chapter 9: Key Management

(2½ hours) Total Marks: 75

The Kerberos Authentication System Course Outline

L7: Key Distributions. Hui Chen, Ph.D. Dept. of Engineering & Computer Science Virginia State University Petersburg, VA 23806

Security Handshake Pitfalls

2/7/2013. CS 472 Network and System Security. Mohammad Almalag Lecture 2 January 22, Introduction To Cryptography

Data Security and Privacy. Topic 14: Authentication and Key Establishment

1.264 Lecture 27. Security protocols Symmetric cryptography. Next class: Anderson chapter 10. Exercise due after class

CSC 774 Network Security

Kerberos. Pehr Söderman Natsak08/DD2495 CSC KTH 2008

Cryptographic Checksums

Key management. Required Reading. Stallings, Cryptography and Network Security: Principles and Practice, 5/E or 6/E

Authentication in Distributed Systems

Key distribution and certification

13/10/2013. Kerberos. Key distribution and certification. The Kerberos protocol was developed at MIT in the 1980.

Key Management. Digital signatures: classical and public key Classic and Public Key exchange. Handwritten Signature

OVE EDFORS ELECTRICAL AND INFORMATION TECHNOLOGY

T Cryptography and Data Security

Security Handshake Pitfalls

CIS 6930/4930 Computer and Network Security. Topic 6.2 Authentication Protocols

ECE 646 Lecture 3. Key management

This chapter examines some of the authentication functions that have been developed to support network-based use authentication.

Cryptography MIS

CSC 580 Cryptography and Computer Security

CS 470 Spring Security. Mike Lam, Professor. a.k.a. Why on earth do Alice and Bob need to share so many secrets?!?

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography

JNTU World JNTU World. JNTU World. Cryptography and Network Security. Downloaded From JNTU World ( )( )JNTU World

Key management. Pretty Good Privacy

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

Course Administration

Chapter 4 Authentication Applications

Chapter 3 Traditional Symmetric-Key Ciphers 3.1

Security. Communication security. System Security

Module 13 Network Security. Version 1 ECE, IIT Kharagpur

ECE 646 Lecture 3. Key management. Required Reading. Using the same key for multiple messages

PASSWORDS & ENCRYPTION

CSC 482/582: Computer Security. Security Protocols

CS549: Cryptography and Network Security

Protecting Information Assets - Week 11 - Cryptography, Public Key Encryption and Digital Signatures. MIS 5206 Protecting Information Assets

Encryption and Forensics/Data Hiding

Cryptography & Key Exchange Protocols. Faculty of Computer Science & Engineering HCMC University of Technology

Overview. Cryptographic key infrastructure Certificates. May 13, 2004 ECS 235 Slide #1. Notation

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security

CSC/ECE 774 Advanced Network Security

Session key establishment protocols

Cryptographic Concepts

Session key establishment protocols

INFSCI 2935: Introduction of Computer Security 1. Courtesy of Professors Chris Clifton & Matt Bishop. INFSCI 2935: Introduction to Computer Security 2

A Modified Approach for Kerberos Authentication Protocol with Secret Image by using Visual Cryptography

Topics. Dramatis Personae Cathy, the Computer, trusted 3 rd party. Cryptographic Protocols

Computer Security: Principles and Practice

CS 470 Spring Security. Mike Lam, Professor. a.k.a. Why on earth do Alice and Bob need to talk so much?!? Content taken from the following:

Security and Privacy in Computer Systems. Lecture 7 The Kerberos authentication system. Security policy, security models, trust Access control models

Cryptography and Network Security

Information Systems Security

Authentication Handshakes

Computer Security 3e. Dieter Gollmann. Chapter 15: 1

Chapter 10: Key Management

Information Security CS 526

Network Security. Chapter 7 Cryptographic Protocols

CSCE 813 Internet Security Symmetric Cryptography

CSC 474/574 Information Systems Security

Cryptography Basics. IT443 Network Security Administration Slides courtesy of Bo Sheng

CSC 474/574 Information Systems Security

9/30/2016. Cryptography Basics. Outline. Encryption/Decryption. Cryptanalysis. Caesar Cipher. Mono-Alphabetic Ciphers

APNIC elearning: Cryptography Basics

Lecture 5: Protocols - Authentication and Key Exchange* CS 392/6813: Computer Security Fall Nitesh Saxena

Fall 2010/Lecture 32 1

Module: Authentication. Professor Trent Jaeger. CSE543 - Introduction to Computer and Network Security

Classical Encryption Techniques. CSS 322 Security and Cryptography

Cryptography and Network Security

Unit-VI. User Authentication Mechanisms.

Module: Authentication. Professor Trent Jaeger. CSE543 - Introduction to Computer and Network Security

From Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design. Edition 4 Pearson Education 2005

Cryptography Introduction

Spring 2010: CS419 Computer Security

Transcription:

Cryptology Part 1 Uses of Cryptology 1. Transmission of a message with assurance that the contents will be known only by sender and recipient a) Steganography: existence of the message is hidden b) Cryptography: garbling of the message so that its meaning can be discerned only by the intended recipient i. Codes ii. Ciphers Charles Abzug, Ph.D. Department of Computer Science James Madison University Harrisonburg, VA 22807 Voice Phone: 540-568-8746; Cell Phone: 443-956-9424 E-mail: abzugcx@jmu.edu OR CharlesAbzug@ACM.org Home Page: http://www.cs.jmu.edu/users/abzugcx 2004 Charles Abzug 2. Authentication a) Message content b) Message origin (Digital Signature) 3. Miscellaneous other uses and issues a) Electronic Voting: Confirmation of Voter-ID, Prevention of Double- Voting, Maintenance of Anonymity b) Signing of Contracts: Simultaneity c) E-cash: Avoidance of Fraud, Maintenance of Anonymity, Prevention of Tax-Avoidance d) Zero-Knowledge Protocol: ability of one party to convince the other that he/she has a secret, without revealing what it is 01-Nov-2004 2004 Charles Abzug 2 Terminology 1. Code 2. Cipher 3. Key 4. Algorithm 5. Plaintext (or Cleartext) 6. Ciphertext 7. Steganography 8. Cryptology 9. Cryptography 10. Cryptanalysis 11. Enciphering or Encrypting 12. Deciphering or Decrypting Basic Approaches to Cryptography 1. Transposition: e.g., the Spartan Scytale (pronunciation: SIT-a-lee) 2. Substitution: most modern ciphers 13. Etymology: κρψποσ (kryptos) λογοσ (logos) γραφια (graphia) 14. Passive Attack 15. Active Attack 16. Symmetric (classical cryptography, as well as modern) 17. Asymmetric (modern only) 01-Nov-2004 2004 Charles Abzug 3 01-Nov-2004 2004 Charles Abzug 4 Basic Approaches to Cryptography: (1) Transposition SYBLCRESEERACHTAYPUOHIPHRUEMTYILSOO!TDOFG Basic Approaches to Cryptography: (1) Transposition (continued) S B C E E R C T Y U H P R E T I S O T O G Y l R S E A H A P O I H U M Y L O! D F SYBLCRESEERACHTAYPUOHIPHRUEMTYILSOO!TDOFG S L E E C A U I R M I O T F Y C S R H Y O P U T L O D G B R E A T P H H E Y S! O S C E C Y H R T S T G Y R E H P I U Y O D B E R T U P E I O O L S A A O H M L! F S E C U R I T Y S H O U L D B E T H E S O L E A I M O F C R Y P T O G R A P H Y! S R R A H U I! G Y E A Y I E L T B S C P P M S D L E H U H T O O C E T O R Y O F 01-Nov-2004 2004 Charles Abzug 5 01-Nov-2004 2004 Charles Abzug 6

01-Nov-2004 2004 Charles Abzug 7 Simple Additive Cipher Simple Additive Cipher Plaintext: a b c d e f g h i j k l m n o p q r s t u v w x y z Ciphertext: D E F G H I J K L M N O P Q R S T U V W X Y Z A B C Plaintext: a b c d e f g h i j k l m n o p q r s t u v w x y z Ciphertext: D E F G H I J K L M N O P Q R S T U V W X Y Z A B C cleartext. cleartext FOHDUWHAW OHWWHU. OHWWHU letter 01-Nov-2004 2004 Charles Abzug 8 Basic Approaches to Cryptography: (2) Substitution Basic Approaches to Cryptography: (2) Substitution 1. Monoalphabetic Ciphers over the "natural" alphabet a) Additive Ciphers or Shift Ciphers (keys: 1, 2,,, 25; keyspace =?) b) Multiplicative Ciphers (keys: 1, 3, 5, 7, 9, 11, 15, 17, 19, 21, 23, 25; keyspace =?) c) Affine Ciphers (keyspace =?) d) General Monoalphabetic Cipher (keyspace =?) 1. Monoalphabetic Ciphers over the "natural" alphabet a) Additive Ciphers or Shift Ciphers (keys: 1, 2,,, 25; keyspace = 26) b) Multiplicative Ciphers (keys: 1, 3, 5, 7, 9, 11, 15, 17, 19, 21, 23, 25; keyspace = 12) c) Affine Ciphers (keyspace =???) d) General Monoalphabetic Cipher (keyspace =?) 01-Nov-2004 2004 Charles Abzug 9 01-Nov-2004 2004 Charles Abzug 10 Basic Approaches to Cryptography: (2) Substitution 1. Monoalphabetic Ciphers over the "natural" alphabet a) Additive Ciphers or Shift Ciphers (keys: 1, 2,,, 25; keyspace = 26) b) Multiplicative Ciphers (keys: 1, 3, 5, 7, 9, 11, 15, 17, 19, 21, 23, 25; keyspace = 12) c) Affine Ciphers (keyspace = 12 * 26 = 312) d) General Monoalphabetic Cipher (keyspace =???) Susceptibility of Monoalphabetic Ciphers to Cryptanalysis 1. "Brute Force" Attack: try all possible keys 2. Frequency Analysis (al-kindi, eighth century) 01-Nov-2004 2004 Charles Abzug 11 01-Nov-2004 2004 Charles Abzug 12

01-Nov-2004 2004 Charles Abzug 13 Relative Frequencies of Letters in English Text letter a b c d e f g h i j k l m Relative Frequency (%) 8.167 1.492 2.782 4.253 12.702 2.228 2.015 6.094 6.966 0.153 0.772 4.025 2.406 letter n o p q r s t u v w x y z Relative Frequency (%) 6.749 7.507 1.929 0.095 5.987 6.327 9.056 2.758 0.978 2.360 0.150 1.974 0.074 Basic Approaches to Cryptography: (2) Substitution 1. Monoalphabetic Ciphers over the "natural" alphabet a) Additive Ciphers or Shift Ciphers (keys: 1, 2,,, 25; keyspace = 26) b) Multiplicative Ciphers (keys: 1, 3, 5, 7, 9, 11, 15, 17, 19, 21, 23, 25; keyspace = 12) c) Affine Ciphers (keyspace = 12 * 26 = 312) d) General Monoalphabetic Cipher (keyspace = 26! = 403,291,461,126,605,635,584,000,000 > 4 * 10 26 ) 2. Polyalphabetic Ciphers over the "natural" alphabet 3. Complex Monoalphabetic Ciphers 01-Nov-2004 2004 Charles Abzug 14 Simple Monoalphabetic Cipher with Keyword 1. Uses a keyword 2. Second and all subsequent repetitions of each character deleted 3. Length of keyword generally smaller than 26 4. Remaining letters of alphabet (i.e., those not present in the keyword) then listed in alphabetical order to make up 26 letters. 5. Example keyword: ANTIDISESTABLISHMENTARIANISM 6. Example keyword with duplicates removed: ANTIDSEBLHMNR 7. Final key, augmented from keyword: ANTIDSEBLHMNRCFGJKOPQUVWXYZ Polyalphabetic Cipher with Keyword: the Vigenère Cipher 1. Uses a keyword 2. Second and all subsequent repetitions of each character deleted 3. Length of keyword generally smaller than 26 4. Keyword repeated as many times as necessary to fill out the plaintext 5. Each letter of plaintext encrypted IAW the corresponding line of the Vigenère square) 6. Example keyword: ANTIDISESTABLISHMENTARIANISM 7. Example keyword with duplicates removed: ANTIDSEBLHMNR 8. Final Key: ANTIDSEBLHMNRANTIDSEBLHMNRANTIDSEBLHMNRANTIDSEBL HMNRANTIDSEBLHMNRANTIDSEBLHMNRANTIDSEBLHMNR... 9. Keyword Length for this example: 13 01-Nov-2004 2004 Charles Abzug 15 01-Nov-2004 2004 Charles Abzug 16 More Robust Polyalphabetic Cipher with Keytext 1. Uses a lengthy text as key 2. Repetitions of key characters accepted 3. Arbitrary length of key text: generally longer than plaintext 4. Each letter of plaintext encrypted IAW the corresponding line of the Vigenère square) Attacks on Vigenère Cipher 1. Overall strategy: Determine the keylength; once known, the problem reduces to multiple monoalphabetic substitutions. 2. By hand: search for repeating digraphs, trigraphs, quadgraphs to guess keylength. 3. Develop table of repetition distances for each character pattern. 5. Example key text: WHEN IN THE COURSE OF HUMAN EVENTS IT BECOMES NECESSARY FOR ONE PEOPLE TO DISSOLVE THE POLITICAL BANDS WHICH HAVE CONNECTED THEM WITH ANOTHER AND TO ASSUME AMONG THE POWERS OF THE EARTH THE SEPARATE AND EQUAL STATION TO WHICH THE LAWS OF NATURE AND... 01-Nov-2004 2004 Charles Abzug 17 01-Nov-2004 2004 Charles Abzug 18

01-Nov-2004 2004 Charles Abzug 19 Stallings' Fig. 3.5 Stallings' Fig. 3.6 01-Nov-2004 2004 Charles Abzug 20 Stallings' Fig. 3.7 Stallings' Fig. 3.8 01-Nov-2004 2004 Charles Abzug 21 01-Nov-2004 2004 Charles Abzug 22 Needham-Schroeder Protocol Stallings' Fig. 3.9 original third-party key distribution protocol for session between A & B mediated by KDC protocol overview is: 1. A KDC: ID A ID B N 1 2. KDC A: E Ka [Ks ID B N 1 E Kb [Ks ID A ] ] 3. A B: E Kb [Ks ID A ] 4. B A: E Ks [N 2 ] 5. A B: E Ks [f(n 2 )] 01-Nov-2004 2004 Charles Abzug 23 01-Nov-2004 2004 Charles Abzug 24

01-Nov-2004 2004 Charles Abzug 25 Needham-Schroeder Protocol Using Public-Key Encryption used to securely distribute a new session key for communications between A & B but is vulnerable to a replay attack if an old session key has been compromised then message 3 can be resent convincing B that is communicating with A modifications to address this require: timestamps (Denning 81) using an extra nonce (Neuman 93) have a range of approaches based on the use of public-key encryption need to ensure have correct public keys for other parties using a central Authentication Server (AS) various protocols exist using timestamps or nonces 01-Nov-2004 2004 Charles Abzug 26 Denning AS Protocol One-Way Authentication Denning 81 presented the following: 1. A AS: ID A ID B 2. AS A: E KRas [ID A KU a T] E KRas [ID B KU b T] 3. A B: E KRas [ID A KU a T] E KRas [ID B KU b T] E KUb [E KRas [K s T]] note session key is chosen by A, hence AS need not be trusted to protect it timestamps prevent replay but require synchronized clocks required when sender & receiver are not in communications at same time (eg. email) have header in clear so can be delivered by email system may want contents of body protected & sender authenticated 01-Nov-2004 2004 Charles Abzug 27 01-Nov-2004 2004 Charles Abzug 28 Using Symmetric Encryption can refine use of KDC but can t have final exchange of nonces, vis: 1. A KDC: ID A ID B N 1 2. KDC A: E Ka [Ks ID B N 1 E Kb [Ks ID A ] ] 3. A B: E Kb [Ks ID A ] E Ks [M] does not protect against replays could rely on timestamp in message, though email delays make this problematic Public-Key Approaches have seen some public-key approaches if confidentiality is major concern, can use: A B: E KUb [Ks] E Ks [M] has encrypted session key, encrypted message if authentication needed use a digital signature with a digital certificate: A B: M E KRa [H(M)] E KRas [T ID A KU a ] with message, signature, certificate 01-Nov-2004 2004 Charles Abzug 29 01-Nov-2004 2004 Charles Abzug 30

01-Nov-2004 2004 Charles Abzug 31 Arbitrated Techniques for Digital Signature Kerberos Stallings' Table 13.1 trusted key server system from MIT provides centralised private-key third-party authentication in a distributed network allows users access to services distributed through network without needing to trust all workstations rather all trust a central authentication server two versions in use: 4 & 5 01-Nov-2004 2004 Charles Abzug 32 Kerberos Requirements Kerberos 4 Overview first published report identified its requirements as: security reliability transparency scalability implemented using an authentication protocol based on Needham-Schroeder a basic third-party authentication scheme have an Authentication Server (AS) users initially negotiate with AS to identify self AS provides a non-corruptible authentication credential (ticket granting ticket TGT) have a Ticket Granting server (TGS) users subsequently request access to other services from TGS on basis of users TGT 01-Nov-2004 2004 Charles Abzug 33 01-Nov-2004 2004 Charles Abzug 34 Kerberos 4 Overview Message Exchanges in Kerberos v.4 Stallings' Fig. 14.1 Stallings' Table 14.3 01-Nov-2004 2004 Charles Abzug 35 01-Nov-2004 2004 Charles Abzug 36

01-Nov-2004 2004 Charles Abzug 37 Kerberos Realms Kerberos Version 5 a Kerberos environment consists of: a Kerberos server a number of clients, all registered with server application servers, sharing keys with server this is termed a realm typically a single administrative domain if have multiple realms, their Kerberos servers must share keys and trust developed in mid 1990 s provides improvements over v4 addresses environmental shortcomings encryption alg, network protocol, byte order, ticket lifetime, authentication forwarding, interrealm auth and technical deficiencies double encryption, non-std mode of use, session keys, password attacks specified as Internet standard RFC 1510 01-Nov-2004 2004 Charles Abzug 38 X.509 Authentication Service X.509 Certificates part of CCITT X.500 directory service standards distributed servers maintaining some info database defines framework for authentication services directory may store public-key certificates with public key of user signed by certification authority also defines authentication protocols uses public-key crypto & digital signatures algorithms not standardised, but RSA recommended issued by a Certification Authority (CA), containing: version (1, 2, or 3) serial number (unique within CA) identifying certificate signature algorithm identifier issuer X.500 name (CA) period of validity (from - to dates) subject X.500 name (name of owner) subject public-key info (algorithm, parameters, key) issuer unique identifier (v2+) subject unique identifier (v2+) extension fields (v3) signature (of hash of all fields in certificate) notation CA<<A>> denotes certificate for A signed by CA 01-Nov-2004 2004 Charles Abzug 39 01-Nov-2004 2004 Charles Abzug 40 X.509 Certificates Obtaining a Certificate Stallings' Fig. 14.3 any user with access to CA can get any certificate from it only the CA can modify a certificate because cannot be forged, certificates can be placed in a public directory 01-Nov-2004 2004 Charles Abzug 41 01-Nov-2004 2004 Charles Abzug 42

01-Nov-2004 2004 Charles Abzug 43 CA Hierarchy CA Hierarchy Use if both users share a common CA then they are assumed to know its public key otherwise CA's must form a hierarchy use certificates linking members of hierarchy to validate other CA's each CA has certificates for clients (forward) and parent (backward) each client trusts parents certificates enable verification of any certificate from one CA by users of all other CAs in hierarchy Stallings' Fig 14.4 01-Nov-2004 2004 Charles Abzug 44 Certificate Revocation Authentication Procedures certificates have a period of validity may need to revoke before expiry, eg: 1. user's private key is compromised 2. user is no longer certified by this CA 3. CA's certificate is compromised CA s maintain list of revoked certificates the Certificate Revocation List (CRL) users should check certs with CA s CRL X.509 includes three alternative authentication procedures: One-Way Authentication Two-Way Authentication Three-Way Authentication all use public-key signatures 01-Nov-2004 2004 Charles Abzug 45 01-Nov-2004 2004 Charles Abzug 46 One-Way Authentication Two-Way Authentication 1 message ( A->B) used to establish the identity of A and that message is from A message was intended for B integrity & originality of message message must include timestamp, nonce, B's identity and is signed by A 2 messages (A->B, B->A) which also establishes in addition: the identity of B and that reply is from B that reply is intended for A integrity & originality of reply reply includes original nonce from A, also timestamp and nonce from B 01-Nov-2004 2004 Charles Abzug 47 01-Nov-2004 2004 Charles Abzug 48

01-Nov-2004 2004 Charles Abzug 49 Three-Way Authentication X.509 Version 3 3 messages (A->B, B->A, A->B) which enables above authentication without synchronized clocks has reply from A back to B containing signed copy of nonce from B means that timestamps need not be checked or relied upon has been recognised that additional information is needed in a certificate email/url, policy details, usage constraints rather than explicitly naming new fields defined a general extension method extensions consist of: extension identifier criticality indicator extension value 01-Nov-2004 2004 Charles Abzug 50 Certificate Extensions Summary key and policy information convey info about subject & issuer keys, plus indicators of certificate policy certificate subject and issuer attributes support alternative names, in alternative formats for certificate subject and/or issuer certificate path constraints allow constraints on use of certificates by other CA s have considered: Kerberos trusted key server system X.509 authentication and certificates 01-Nov-2004 2004 Charles Abzug 51 01-Nov-2004 2004 Charles Abzug 52 Data Encryption Standard (DES) Stallings' Fig. 3.5 01-Nov-2004 2004 Charles Abzug 53 01-Nov-2004 2004 Charles Abzug 54

01-Nov-2004 2004 Charles Abzug 55 Stallings' Fig. 3.6 Stallings' Fig. 3.7 01-Nov-2004 2004 Charles Abzug 56 Stallings' Table 3.2 Stallings' Fig. 3.8 01-Nov-2004 2004 Charles Abzug 57 01-Nov-2004 2004 Charles Abzug 58 Stallings' Fig. 3.9 Stallings' Table 3.3 01-Nov-2004 2004 Charles Abzug 59 01-Nov-2004 2004 Charles Abzug 60

01-Nov-2004 2004 Charles Abzug 61 Stallings' Table 3.4 Stallings' Table 3.5 01-Nov-2004 2004 Charles Abzug 62 Stallings' Fig. 3.15 Advanced Encryption Standard (AES) 01-Nov-2004 2004 Charles Abzug 63 01-Nov-2004 2004 Charles Abzug 64 Stallings' Table 5.3 Stallings' Fig. 5.1 01-Nov-2004 2004 Charles Abzug 65 01-Nov-2004 2004 Charles Abzug 66

01-Nov-2004 2004 Charles Abzug 67 Stallings' Fig. 5.2 Stallings' Fig. 5.3 01-Nov-2004 2004 Charles Abzug 68 Stallings' Fig. 5.7 END 01-Nov-2004 2004 Charles Abzug 69 01-Nov-2004 2004 Charles Abzug 70