Symmetric Key Block Ciphers

Slides:



Advertisements
Similar presentations
Origins  clear a replacement for DES was needed Key size is too small Key size is too small The variants are just patches The variants are just patches.
Advertisements

CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
Jeff Ehme Spelman College Chris Christensen Northern Kentucky University
1 CIS 5371 Cryptography 5b. Pseudorandom Objects in Practice Block Ciphers.
Cryptography and Network Security Chapter 3
1 Chapter 3 – Block Ciphers and the Data Encryption Standard Modern Block Ciphers  now look at modern block ciphers  one of the most widely used types.
1 Chapter 3 – Block Ciphers and the Data Encryption Standard Modern Block Ciphers  now look at modern block ciphers  one of the most widely used types.
Introduction to Symmetric Block Cipher Jing Deng Based on Prof. Rick Han’s Lecture Slides Dr. Andreas Steffen’s Security Tutorial.
Cryptography and Network Security Chapter 5. Chapter 5 –Advanced Encryption Standard "It seems very simple." "It is very simple. But if you don't know.
Cryptography and Network Security Chapter 5 Fourth Edition by William Stallings.
Lecture 23 Symmetric Encryption
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Network Security Chapter
Cryptography Block Ciphers and Feistel Functions.
Encryption Schemes Second Pass Brice Toth 21 November 2001.
Chapter 3 – Block Ciphers and the Data Encryption Standard
CSE 651: Introduction to Network Security
Data Encryption Standard (DES). Symmetric Cryptography  C = E(P,K)  P = D(C,K)  Requirements  Given C, the only way to obtain P should be with  the.
Cryptography and Network Security Chapter 3. Modern Block Ciphers  now look at modern block ciphers  one of the most widely used types of cryptographic.
Confusion and Diffusion1 Ref: William Stallings, Cryptography and Network Security, 3rd Edition, Prentice Hall, 2003.
Software Security Seminar - 1 Chapter 14. Still Other Block Ciphers 발표자 : 최두호 Applied Cryptography.
Cryptography Lecture 4 Stefan Dziembowski
Advance Encryption Standard. Topics  Origin of AES  Basic AES  Inside Algorithm  Final Notes.
Feistel Model Last Updated: Aug 27, Feistel Cipher Structure Described by Horst Feistel (IBM) in 1973 Many symmetric encryption algorithms use this.
Network Security Lecture 14 Presented by: Dr. Munam Ali Shah.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Lec. 5 : History of Cryptologic Research II
Chapter 20 Symmetric Encryption and Message Confidentiality.
Stream Ciphers and Block Ciphers A stream cipher is one that encrypts a digital data stream one bit or one byte at a time. Examples of classical stream.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Instructor: Dania Alomar
Applied Cryptography (Symmetric) Part I. Many savages at the present day regard their names as vital parts of themselves, and therefore take great pains.
Module :MA3036NI Symmetric Encryption -3 Lecture Week 4.
Data Encryption Standard 1977 “New Directions in Cryptography” 1976.
Block Ciphers and the Data Encryption Standard. Modern Block Ciphers  One of the most widely used types of cryptographic algorithms  Used in symmetric.
CSE 5/7353 – January 25 th 2006 Cryptography. Conventional Encryption Shared Key Substitution Transposition.
1 CPCS425: Information Security (Topic 5) Topic 5  Symmetrical Cryptography  Understand the principles of modern symmetric (conventional) cryptography.
Lecture 4 Data Encryption Standard (DES) Dr. Nermin Hamza
Practical Aspects of Modern Cryptography Josh Benaloh & Brian LaMacchia.
Provides Confidentiality
School of Computer Science and Engineering Pusan National University
6b. Practical Constructions of Symmetric-Key Primitives.
Understanding Cryptography – A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl Chapter 3 – The Data Encryption.
Topics discussed in this section: 30-2 SYMMETRIC-KEY CRYPTOGRAPHY Symmetric-key cryptography started thousands of years ago when people needed.
SYMMETRIC KEY ALGORITHMS
Lecture 2.2: Private Key Cryptography II
NET 311 Information Security
NET 311 Information Security
Cryptography - Symmetric
Cryptography and Network Security Chapter 3
Cryptography and Network Security
مروري برالگوريتمهاي رمز متقارن(كليد پنهان)
AES (Advance Encryption Standard)
ICS 454: Principles of Cryptography
STREAM CIPHERS by Jennifer Seberry.
ADVANCED ENCRYPTION STANDARDADVANCED ENCRYPTION STANDARD
Advanced Encryption Standard
DES (Data Encryption Standards)
SYMMETRIC KEY ALGORITHMS
Confusion and Diffusion
Advanced Encryption Standard
DES (Data Encryption Standard)
Cryptography and Network Security Chapter 5 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography Lecture 17.
Modern Cryptography.
SOHAIL SHAHUL HAMEED Dr. BHARGAVI GOSWAMI
ICS 555: Block Ciphers & DES Sultan Almuhammadi.
Advanced Encryption Standard
Conventional Encryption
Presentation transcript:

Symmetric Key Block Ciphers

Classical Ciphers Substitution Transposition

Modern Cryptography Data Encryption Standard 1977 “New Directions in Cryptography” 1976

Ciphers Symmetric key block ciphers Public key ciphers Stream ciphers Post-quantum ciphers

Stream Ciphers Stream ciphers

Data Encryption Standard 1977 Horst Feistel (1915 – 1990) Simplified DES: Wade Trapp and Lawrence Washington

Data Encryption Standard 1976

DES DES Simplified DES 64-bit block 56-bit key (8 parity bits) 8 S-boxes 6 x 4 16 rounds Feistel cipher 12-bit block 9-bit key 2 S-boxes 4 x 3 4 rounds Feistel cipher

Simplified DES – Feistel Cipher

Key and Message

Key Schedule 9 bits of key 111 010 110 Use the 8 bits on the left for k1 1110 1011 Rotate to the left one bit 110 101 101 Use the 8 bits on the left for k12 1101 0110 Rotate to the left 1 bit 101 011 011 Use the 8 bits on the left for k3 1010 1101 Rotate to the left 1 bit 010 110 111 Use the 8 bits on the left for k4 0101 1011

Expansion Function and XOR

S-Box

DES Encryption

DES Decryption Encryption Decryption

DES Decryption Encryption Decryption

Secrecy of Algorithm Backdoor?

3DES 112-bit security

Security Level Perfect Security Random key, as long as the message, and used only once. Computational Security Today 128

Block Cipher Modes

Block Cipher Modes

Skipjack/Clipper Chip 64-bit block 80-bit key 32 rounds Unbalanced Feistel cipher Skipjack/Clipper Chip Skipjack declassified 1998 Clipper Chip 1993 -1996

Substitution-Permutation Networks Claude Shannon (1916 – 2001)

Claude Shannon “A Mathematical Theory of Communication” 1948 “The Theory of Secrecy Systems” 1949

“The Theory of Secrecy Systems 1949 Diffusion: “… the statistical structure of [the message] which leads to its redundancy is dissipated into long range statistics.” P-box Confusion: “… make the relation between the simple statistics of [the ciphertext] and the simple description of [the key] a very complex and involved one.” S-box

SPN

PRESENT 2007 Many

PRESENT 64-bit block 80- or 128-bit key 1 S-box 4 x 4 31 Rounds Substitution-Permutation Network

Substitution Layer

Permutation Layer

Substitution and Permutation

Key Schedule

Advanced Encryption Standard 2001 Joan Daemen and Vincent Rijmen Simplified AES: Mohammad Musa, Edward Schaefer, and Stephen Wedig

AES (Rijandael) AES Simplified AES 128-bit block 128-bit, 192-bit, or 256-bit key 10, 12, or 14 rounds SPN 16-bit block 16-bit key 2 rounds SPN

S-Box

S-Box

Add Key

SN, SR, MC

S-AES

Simplify the Other AES Finalists Serpent Twofish RC6 MARS