SYMMETRIC KEY ALGORITHMS

Slides:



Advertisements
Similar presentations
6.1.2 Overview DES is a block cipher, as shown in Figure 6.1.
Advertisements

1 CIS 5371 Cryptography 5b. Pseudorandom Objects in Practice Block Ciphers.
Cryptography and Network Security Chapter 3
Rachana Y. Patil 1 Data Encryption Standard (DES) (DES)
Simplified DES CS-480b Network Security Dick Steflik.
1 Chapter 3 – Block Ciphers and the Data Encryption Standard Modern Block Ciphers  now look at modern block ciphers  one of the most widely used types.
1 Chapter 3 – Block Ciphers and the Data Encryption Standard Modern Block Ciphers  now look at modern block ciphers  one of the most widely used types.
Introduction to Symmetric Block Cipher Jing Deng Based on Prof. Rick Han’s Lecture Slides Dr. Andreas Steffen’s Security Tutorial.
Lecture 23 Symmetric Encryption
Chapter 3 – Block Ciphers and the Data Encryption Standard
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Data Encryption Standard (DES). Symmetric Cryptography  C = E(P,K)  P = D(C,K)  Requirements  Given C, the only way to obtain P should be with  the.
A Cryptography Education Tool Anna Yu Department of Computer Science College of Engineering North Carolina A&T State University June 18, 2009.
Dr. Khalid A. Kaabneh Amman Arab University
Cryptography and Network Security Chapter 3. Modern Block Ciphers  now look at modern block ciphers  one of the most widely used types of cryptographic.
Network Security Lecture 14 Presented by: Dr. Munam Ali Shah.
Chapter 20 Symmetric Encryption and Message Confidentiality.
TE/CS 536 Network Security Spring 2006 – Lectures 6&7 Secret Key Cryptography.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Feistel Cipher Structure
Simplified DES Cryptography and Network Security
Classical Encryption techniques
Stream Ciphers and Block Ciphers A stream cipher is one that encrypts a digital data stream one bit or one byte at a time. Examples of classical stream.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Fifth Edition by William Stallings
Computer and Network Security Rabie A. Ramadan Lecture 3.
Network Security Cryptology Cryptography Cryptanalysis.
Lecture 3 Overview. Ciphers The intent of cryptography is to provide secrecy to messages and data Substitutions – ‘hide’ letters of plaintext Transposition.
Module :MA3036NI Symmetric Encryption -3 Lecture Week 4.
Data Encryption Standard 1977 “New Directions in Cryptography” 1976.
Simplified DES.
Block Ciphers and the Data Encryption Standard. Modern Block Ciphers  One of the most widely used types of cryptographic algorithms  Used in symmetric.
Information and Computer Security CPIS 312 Lab 6 & 7 1 TRIGUI Mohamed Salim Symmetric key cryptography.
1 CPCS425: Information Security (Topic 5) Topic 5  Symmetrical Cryptography  Understand the principles of modern symmetric (conventional) cryptography.
Lecture 4 Data Encryption Standard (DES) Dr. Nermin Hamza
CS480 Cryptography and Information Security
Provides Confidentiality
Chapter3: Block Ciphers and the Data Encryption Standard
School of Computer Science and Engineering Pusan National University
6b. Practical Constructions of Symmetric-Key Primitives.
Block Ciphers and the Data Encryption Standard
Classical Encryption techniques
Data Encryption Standard
- Stream Cipher and Block Cipher - Confusion & Diffusion
Simplified IDEA Cryptography and Network Security.
Networks and Communication Systems Department
NET 311 Information Security
NET 311 Information Security
Symmetric Key Block Ciphers
Cryptography and Network Security Chapter 3
مروري برالگوريتمهاي رمز متقارن(كليد پنهان)
PART VII Security.
ICS 454: Principles of Cryptography
Fifth Edition by William Stallings
Introduction to Modern Symmetric-key Ciphers
Block Ciphers and the Data Encryption Standard (DES)
Chapter -2 Block Ciphers and the Data Encryption Standard
SYMMETRIC KEY ALGORITHMS
SYMMETRIC ENCRYPTION.
Computer Security IT423 Semester II
CSCE 715: Network Systems Security
CSCE 715: Network Systems Security
DES (Data Encryption Standard)
DATA ENCRYPTION STANDARD (DES)
Florida State University
ICS 555: Block Ciphers & DES Sultan Almuhammadi.
Feistel Cipher Structure
Data Encryption Standard (DES)
Presentation transcript:

SYMMETRIC KEY ALGORITHMS

Comparison of Symmetric and Asymmetric Encryption Decryption Ciphertext Original Plaintext Plaintext Secret Key Symmetric (Single Key) Cryptography Encryption Decryption Ciphertext Original Plaintext Private Key Public Key Plaintext Asymmetric (Two Key) Cryptography

BLOCK CIPHER DESIGN PRINCIPLES Two properties of operation of secure cipher: Confusion – make the relationship between the statistics of the ciphertext and the value of the encryption key as complex as possible. Confusion is achieved through a complex substitution. Diffusion – dissipates the redundancies of the plaintext by distributing over the ciphertext. Diffusion is achieved through permutations. Claude Shannon’s Papers of 1948/1949: A Mathematical Theory of Communication Communication Theory of Secrecy Systems To thwart cryptanalysis based on statistical analysis

SIMPLIFIED DES Developed 1996 as a teaching tool Santa Clara University Prof. Edward Schaefer Takes an 8-bit block plaintext, a 10 –bit key and produces an 8-bit block of ciphertext Decryption takes the 8-bit block of ciphertext, the same 10-bit key and produces the original 8-bit block of plaintext

Simplified DES scheme Five Functions to Encrypt: IP – an initial permutation fk - a complex, 2-input function SW – a simple permutation that swaps the two halves of data fk - a complex, 2-input function; again IP – inverse permutation of the initial permutation

S-DES KEY GENERATION

S-DES KEY GENERATION 10-bit key be designated as (k1, k2,k3, k4, k5, k6, k7, k8, k9, k10) Then the permutation P10 is defined as: P10(k1, k2, k3, k4, k5, k6, k7, k8, k9, k10) = (k3, k5, k2, k7, k4, k10, k1, k9, k8, k6)

S-DES KEY GENERATION Perform a circular shift (LS-1), or rotation, separately on the 1st 5 bits and the 2nd 5 bits. Next, we apply P8,permute 8 of the 10 bits as Result is subkey 1, K1 , of 8 bits

S-DES KEY GENERATION Go back to the pair of 5-bit strings produced by the two LS-1 functions, and perform a circular left shift of 2 bit positions, LS-2 ,on each string Finally, P8 is applied again to produce K2 ,the subkey 2

S-DES ENCRYPTION

S-DES Encryption 8-bit block of plaintext (eg. 10111101) First permute using the IP(Initial Permutation) function as At the end, apply inverse permutation IP-1

Encryption Detail

S-DES Encryption The Function F and fk Divide the value after IP into two parts: L, R fk(L,R) = (L F(R,SK),R) where SK is a subkey and is the bit-by-bit XOR operation

S-DES Encryption- F(R,SK) Rightmost 4 bits(n1,n2,n3,n4) as input to E/P Expand the 4-bit value and concatenate it twice into an 8-bit value . Then permute it. Create a matrix based on the result Row 1 Row 2

S-DES Encryption- F(R,SK) 8-bit subkey K1 = (k11, k12, k13, k14, k15, k16, k17,k18) and perform an exclusive-OR function on the matrix in prev. step

Rename the resultant matrix as The first 4 bits (first row of the preceding matrix) are fed into the S-box S0 to produce a 2-bit output, and the remaining 4 bits (second row) are fed into S1 to produce another 2-bit output

The S-boxes are The first and fourth input bits are treated as a 2-bit number that specify a row of the S-box and the second and third input bits specify a column of the S-box (P0,0 P0,3) = (11) = 3 (P0,1 P0,2) = (10) = 2 (P1,0 P1,3) = (11) = 3 (P1,1 P1,2) = (00) = 0

Concatenate S0 (e. g. 3=11) and S1 (e. g. 2=10) into a 4-bit value (e Concatenate S0 (e.g. 3=11) and S1 (e.g. 2=10) into a 4-bit value (e.g. 1110) Permute 4 bit value as P4 Output of Function F fk(L,R) = (L F(R,SK),R) 4 bits of L F(R,SK) and R are given to SW SW interchanges the L and R bits to next function fk(L,R)

Encryption Detail 8 Bit Plaintext I P E/P K 1 S0 S1 P4 SW 4 8 8 4 4 4 2 2 P4 4 SW 4

8 bits passes through next function fk Key used is K2 Finally , apply inverse permutation IP-1

S-DES Decryption Reverse process of encryption Input is the ciphertext Key K2 is applied before K1 Output is the plaintext.