Simplified IDEA Cryptography and Network Security.

Slides:



Advertisements
Similar presentations
Conventional Encryption: Algorithms
Advertisements

CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
1 Lecture 3: Secret Key Cryptography Outline concepts DES IDEA AES.
1 CIS 5371 Cryptography 5b. Pseudorandom Objects in Practice Block Ciphers.
Cryptography and Network Security Chapter 5 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 3
Akelarre 1 Akelarre Akelarre 2 Akelarre  Block cipher  Combines features of 2 strong ciphers o IDEA — “mixed mode” arithmetic o RC5 — keyed rotations.
A5/1 A5/1 consists of 3 shift registers X: 19 bits (x18,x17,x16, …,x0)
Lecture 13 Message Signing
Data Encryption Standard (DES). Symmetric Cryptography  C = E(P,K)  P = D(C,K)  Requirements  Given C, the only way to obtain P should be with  the.
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Feistel Cipher Structure
Simplified DES Cryptography and Network Security
Fifth Edition by William Stallings
1 Symmetric key cryptography: DES DES: Data Encryption Standard US encryption standard [NIST 1993] 56-bit symmetric key, 64 bit plaintext input How secure.
Lecture 4 Data Encryption Standard (DES) Dr. Nermin Hamza
CS480 Cryptography and Information Security
The RC6 Block Cipher: A simple fast secure. Design Philosophy u Leverage our experience with RC5: use data-dependent rotations to achieve a high level.
Computer and Information Security Chapter 6 Advanced Cryptanalysis 1.
If the hash algorithm is properly designed and distributes the hashes uniformly over the output space, "finding a hash collision" by random guessing is.
Provides Confidentiality
School of Computer Science and Engineering Pusan National University
Blowfish Algorithm.
6b. Practical Constructions of Symmetric-Key Primitives.
Symmetric Algorithm of Cryptography
Data Encryption Standard
Classical Encryption techniques
Topics discussed in this section: 30-2 SYMMETRIC-KEY CRYPTOGRAPHY Symmetric-key cryptography started thousands of years ago when people needed.
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
- Stream Cipher and Block Cipher - Confusion & Diffusion
SHAIKH SAMIUDDIN NIZAMI
SYMMETRIC KEY ALGORITHMS
Lecture 2.2: Private Key Cryptography II
Networks and Communication Systems Department
NET 311 Information Security
Symmetric Key Block Ciphers
NET 311 Information Security
Implementation of IDEA on a Reconfigurable Computer
Data Security and Encryption (CSE348)
Cryptography Lecture 18.
Cryptography and Network Security Chapter 3
Security in Network Communications
ICS 454: Principles of Cryptography
Fifth Edition by William Stallings
Block Ciphers and the Data Encryption Standard (DES)
Rotors and Secret-Key Encryption
NET 311 Information Security
Section 2: Cryptography
Chapter -2 Block Ciphers and the Data Encryption Standard
Fun with Cryptography The Science of Secrecy.
SYMMETRIC KEY ALGORITHMS
Block Ciphers: DES and AES
SYMMETRIC ENCRYPTION.
Block Ciphers (Crypto 2)
Computer Security IT423 Semester II
BlowFish Algorithm.
International Data Encryption Algorithm
DES (Data Encryption Standard)
Cryptography and Network Security Chapter 5 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
DATA ENCRYPTION STANDARD (DES)
Cryptography Lecture 17.
Modern Cryptography.
Florida State University
ICS 555: Block Ciphers & DES Sultan Almuhammadi.
Counter Mode, Output Feedback Mode
Cipher-Based MAC Network Security.
Stream Cipher Structure
Feistel Cipher Structure
Data Encryption Standard (DES)
Presentation transcript:

Simplified IDEA Cryptography and Network Security

Components of IDEA Key generation Three operations Multiple rounds and an output transformation

IDEA Simplified IDEA 128-bit key 64-bit plaintext 8 rounds 8*6 + 4 = 52 16-bit subkeys 64-bit plaintext 8 rounds Operations: modulo 216 and 216+1 16-bit key 2*6 + 4 = 16 2-bit subkeys 8-bit plaintext 2 rounds Operations: modulo 22 and 22+1

Key Generation 16-bit key: Z[1..16] Z1 = Z[1,2] , Z2 = Z[3,4], …, Z8 = Z[15,16] Z9 = Z[4,5], Z10 = Z[5,6], …, Z13 = Z[12,13], Z14 = Z[14,15] Z15 = Z[16,1], Z16= Z[2,3] (rotate 3 bits to the left before extracting second set of 8 subkeys)

Two-bit Operands Plaintext divided into 4 2-bit pieces and subjected to the two round and final output transformation 2-bit subkeys used as follows: Z1..Z6 for first round Z7..Z12 for second round Z13..Z16 for final transformation

Operations XOR Addition modulo 4 Multiplication modulo 5

Encryption Decryption Subkeys Subkeys Z1, Z2, Z3, Z4, Z5, Z6 Z7, Z8, Z9, Z10, Z11, Z12 Z13, Z14, Z15, Z16 Z13-1, -Z14, -Z15 Z16-1, Z11, Z12 Z7-1, -Z9, -Z8, Z10-1, Z5, Z6 Z1-1, -Z2, -Z3, Z4-1