RC6—The elegant AES choice Ron Rivest Matt Robshaw Yiqun Lisa Yin

Slides:



Advertisements
Similar presentations
International Data Encryption Algorithm
Advertisements

Origins  clear a replacement for DES was needed Key size is too small Key size is too small The variants are just patches The variants are just patches.
Chap. 5: Advanced Encryption Standard (AES) Jen-Chang Liu, 2005 Adapted from lecture slides by Lawrie Brown.
TIE Extensions for Cryptographic Acceleration Charles-Henri Gros Alan Keefer Ankur Singla.
128-bit Block Cipher Camellia
Cryptography and Network Security Chapter 5 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Doc.: IEEE /037 Submission March 2000 Duncan Kitchin, Jesse Walker, Intel NIDSlide 1 Proposal for Enhanced Encryption Duncan Kitchin Jesse Walker.
History Applications Attacks Advantages & Disadvantages Conclusion.
Cryptography and Network Security
Hash functions a hash function produces a fingerprint of some file/message/data h = H(M)  condenses a variable-length message M  to a fixed-sized fingerprint.
Foundations of Network and Computer Security J J ohn Black Lecture #5 Sep 7 th 2007 CSCI 6268/TLEN 5831, Fall 2007.
AES clear a replacement for DES was needed
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
Cryptography and Network Security (AES) Dr. Monther Aldwairi New York Institute of Technology- Amman Campus 10/18/2009 INCS 741: Cryptography 10/18/20091Dr.
Cryptography and Network Security Chapter 5. Chapter 5 –Advanced Encryption Standard "It seems very simple." "It is very simple. But if you don't know.
Cryptography and Network Security Chapter 5 Fourth Edition by William Stallings.
Foundations of Network and Computer Security J J ohn Black Lecture #6 Sep 10 th 2007 CSCI 6268/TLEN 5831, Fall 2007.
CS Network Security Lecture 2 Prof. Katz. 9/7/2000Lecture 2 - Data Encryption2 DES – Data Encryption Standard Private key. Encrypts by series of.
Lecture 23 Symmetric Encryption
Team W1 1. Bobby Colyer (W11) 2. Jeffrey Kuo (W12) 3. Myron Kwai (W13) 4. Shirlene Lim (W14) Stage I: 21 st January 2004 DESIGN PROPOSAL Presentation #1:
CS470, A.SelcukAfter the DES1 Block Ciphers After the DES CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Dr. Lo’ai Tawalbeh 2007 Chapter 5: Advanced Encryption Standard (AES) Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus.
AES Proposal: Rijndael Joan Daemen Vincent Rijmen “Rijndael is expected, for all key and block lengths defined, to behave as good as can be expected from.
Chapter 5 Advanced Encryption Standard. Origins clear a replacement for DES was needed –have theoretical attacks that can break it –have demonstrated.
Cryptography and Network Security
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Chapter 5 –Advanced Encryption Standard "It seems very simple." "It is very simple. But if you don't know what the key is it's virtually indecipherable."
HASH Functions.
Applied Cryptography Example: AES. Advanced Encryption Standard "It seems very simple." "It is very simple. But if you don't know what the key is it's.
TWOFISH ENCRYPTION ALGORITHM CS–627: Cryptology Fall 2004 Horatiu Paul Stancu.
DARPA AES Finalist Algorithm: The Rijndael Block Cipher Mel Tsai University of California at Berkeley.
Blowfish A widely used block cipher. Blowfish Designed by Bruce Schneier (1993) A variant of it (Twofish) was an AES finalist candidate 64-bit block size,
Comparison AES-Rijndael/Serpent 2G1704: Internet Security and Privacy Weltz Max 2G1704: Internet Security and Privacy Weltz Max.
9/17/15UB Fall 2015 CSE565: S. Upadhyaya Lec 6.1 CSE565: Computer Security Lecture 6 Advanced Encryption Standard Shambhu Upadhyaya Computer Science &
CIM Symmetric Ciphers 31 Advanced Encryption Standard Ch 5 of Cryptography and Network Security -Third Edition by William Stallings Modified from.
Encryption for Mobile Computing By Erik Olson Woojin Yu.
Advance Encryption Standard. Topics  Origin of AES  Basic AES  Inside Algorithm  Final Notes.
Information Security Lab. Dept. of Computer Engineering 122/151 PART I Symmetric Ciphers CHAPTER 5 Advanced Encryption Standard 5.1 Evaluation Criteria.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Cryptography and Network Security Contemporary Symmetric Ciphers.
AES: Rijndael 林志信 王偉全. Outline Introduction Mathematical background Specification Motivation for design choice Conclusion Discussion.
Advanced Encryption Standard. Origins NIST issued a new version of DES in 1999 (FIPS PUB 46-3) DES should only be used in legacy systems 3DES will be.
Lecture 23 Symmetric Encryption
Chapter 2 (C) –Advanced Encryption Standard. Origins clearly a replacement for DES was needed –have theoretical attacks that can break it –have demonstrated.
Advanced Encryption Standard Dr. Shengli Liu Tel: (O) Cryptography and Information Security Lab. Dept. of Computer.
The RC5 Encryption Algorithm: Two Years On Lisa Yin RC5 Encryption –Ron Rivest, December 1994 –Fast Block Cipher –Software and Hardware Implementations.
1 Symmetric-Key Encryption CSE 5351: Introduction to Cryptography Reading assignment: Chapter 2 Chapter 3 (sections ) You may skip proofs, but are.
The RC6 Block Cipher: A simple fast secure AES proposal
1 1.SHA-3 contest - Your Round 2 Report 2.Analyzing the Influence of a Computer Platform on Ranking of the SHA-3 Candidates in Terms of Performance in.
RC6: The Simple Cipher Presenter: Morgan Monger. RC6 Cipher Created by Ronald Rivest et al. for AES submission Follows the evolution of RC5 cipher –Parameterized.
Fall 2002CS 395: Computer Security1 Chapters 5-6: Contemporary Symmetric Ciphers Triple DES Blowfish AES.
Information Security and Management 11. Cryptographic Hash Functions Chih-Hung Wang Fall
The Advanced Encryption Standard Part 1: Overview
CSE 5/7353 – January 25 th 2006 Cryptography. Conventional Encryption Shared Key Substitution Transposition.
Understanding Cryptography by Christof Paar and Jan Pelzl Chapter 4 – The Advanced Encryption Standard (AES) ver. October 28, 2009.
1 CPCS425: Information Security (Topic 5) Topic 5  Symmetrical Cryptography  Understand the principles of modern symmetric (conventional) cryptography.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Zong-Cing Lin 2007/10/31.  Algorithm Description  Why chose Rijndael  Reference.
Information Security and Management (Abstract) 5
School of Computer Science and Engineering Pusan National University
Cryptography and Network Security
RC6—The elegant AES choice
128-bit Block Cipher Camellia
128-bit Block Cipher Camellia
RC6—The elegant AES choice
International Data Encryption Algorithm
Presentation transcript:

RC6—The elegant AES choice Ron Rivest Matt Robshaw Yiqun Lisa Yin

RC6 is the right AES choice u Security u Performance u Ease of implementation u Simplicity u Flexibility

RC6 is simple: only 12 lines B = B + S[ 0 ] D = D + S[ 1 ] for i = 1 to 20 do { t = ( B x ( 2B + 1 ) ) <<< 5 u = ( D x ( 2D + 1 ) ) <<< 5 A = ( ( A  t ) <<< u ) + S[ 2i ] C = ( ( C  u ) <<< t ) + S[ 2i + 1 ] (A, B, C, D) = (B, C, D, A) } A = A + S[ 42 ] C = C + S[ 43 ]

Simplicity u Facilitates and encourages analysis –allows rapid understanding of security –makes direct analysis straightforward (contrast with Mars and Twofish) u Enables easy implementation –allows compilers to produce high-quality code –obviates complicated optimizations –provides good performance with minimal effort

RC6 security is well-analyzed u RC6 is probably most studied AES finalist –RC6 is based on RC5 –RC6 analysis builds directly on RC5 analysis –original RC6 analysis is very detailed –RC6 simplified variants studied extensively –small-scale versions allowed experimentation

RC6 key schedule is rock-solid u Studied for more than six years u Secure –thorough mixing –one-way function –no key separation (cf. Twofish) –no related-key attacks (cf. Rijndael)

Original analysis still accurate u RC6 meets original design criteria u Security estimates from 1998 still good today; independent analyses supportive. u Secure, even in theory, even with analysis improvements far beyond those seen for DES during its lifetime u RC6 provides a solid, well-tuned margin for security

32-bit Performance u Excellent performance u 32-bit CPUs are –NIST reference platform –a significant fraction of installed computers throughout the AES lifetime –becoming more prevalent in cheaper devices (e.g. ARM)

Smart Card Suitability u RC6 fits in the cheapest smart cards, and well-suited for many (e.g. ARM processor) u Bandwidth, not CPU, likely to be most significant bottleneck u 8-bit CPUs will become far less important over the AES lifetime

Performance on 64-bit CPUs u Generally good 64-bit performance u IA64-performance only fair but anomalous--slower than Pentium! –Note 3x improvement with IA64++ u Future chips will optimize AES u In addition, RC6 gains dramatically with multi-block processing compared to other schemes

Major Trends: Java and DSPs u Increasing use of Java –for e-commerce and embedded apps. –RC6 provides excellent speed with minimal code size and memory usage u Increasing use of DSP chips –likely to be more significant than IA64 or 8-bit processors –RC6 gives excellent performance

Flexibility u RC6 is fully parameterized –key size, number of rounds, and block length can be readily changed –well-suited for hash functions u RC6 is only AES finalist that naturally gives DES and triple-DES compatible variants (64-bit blocks)

How do we grade candidates? u Security (corroborated) u Performance (speed+memory) –32-bit (30%) –Java (20%) –DSP (15%) –64-bit (15%) –Hardware (15%) –8-bit (5%) u Ease of implementation u Simplicity u Flexibility Overall:40/25/15/10/10

Conclusions u RC6 is a simple yet remarkably strong cipher –good performance on most important platforms –simple to code for good performance –excellent flexibility –the most studied finalist –the best understood finalist u RC6 is the secure and “elegant” choice for the AES

(The End)