Cryptography Lecture 18.

Slides:



Advertisements
Similar presentations
Conventional Encryption: Algorithms
Advertisements

1 CIS 5371 Cryptography 5b. Pseudorandom Objects in Practice Block Ciphers.
Cryptography and Network Security Chapter 3
CMSC 414 Computer (and Network) Security Lecture 5 Jonathan Katz.
Advanced Encryption Standard(AES) Presented by: Venkata Marella Slide #9-1.
Akelarre 1 Akelarre Akelarre 2 Akelarre  Block cipher  Combines features of 2 strong ciphers o IDEA — “mixed mode” arithmetic o RC5 — keyed rotations.
1 CS 255 Lecture 4 Attacks on Block Ciphers Brent Waters.
CS Network Security Lecture 2 Prof. Katz. 9/7/2000Lecture 2 - Data Encryption2 DES – Data Encryption Standard Private key. Encrypts by series of.
Lecture 23 Symmetric Encryption
Lecture 2.2: Private Key Cryptography II CS 436/636/736 Spring 2012 Nitesh Saxena.
CS555Spring 2012/Topic 91 Cryptography CS 555 Topic 9: Block Cipher Construction & DES.
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Cryptanalysis of Modern Symmetric-Key Block Ciphers [Based on “A Tutorial on Linear and Differential Cryptanalysis” by Howard Heys.] Modern block ciphers.
The Data Encryption Standard - see Susan Landau’s paper: “Standing the test of time: the data encryption standard.” DES - adopted in 1977 as a standard.
1 Lect. 7 : Data Encryption Standard. 2 Data Encryption Standard (DES)  DES - History 1976 – adopted as a federal standard 1977 – official publication.
Dr. Reuven Aviv, Nov 2008 Conventional Encryption 1 Conventional Encryption & Message Confidentiality Acknowledgements for slides Henric Johnson Blekinge.
1 CIS 5371 Cryptography 5a. Pseudorandom Objects in Practice Block Ciphers B ased on: Jonathan Katz and Yehuda Lindell Introduction to Modern Cryptography.
DES Analysis and Attacks CSCI 5857: Encoding and Encryption.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
Module :MA3036NI Symmetric Encryption -3 Lecture Week 4.
@Yuan Xue CS 285 Network Security Block Cipher Principle Fall 2012 Yuan Xue.
CS480 Cryptography and Information Security
Provides Confidentiality
Chapter3: Block Ciphers and the Data Encryption Standard
Triple DES.
School of Computer Science and Engineering Pusan National University
6b. Practical Constructions of Symmetric-Key Primitives.
Classical Encryption techniques
Data Encryption Standard
Simplified IDEA Cryptography and Network Security.
Lecture 2.2: Private Key Cryptography II
Lecture 3: Symmetric Key Encryption
NET 311 Information Security
Cryptography after DES
Homework 2 Statistics Harry Hagrid Minimum Value Maximum Value
Cryptography Lecture 13.
Cryptography and Network Security Chapter 3
Cryptography Lecture 16.
Cryptography Lecture 19.
DES supplement.
ICS 454: Principles of Cryptography
Block Ciphers and the Data Encryption Standard (DES)
Cryptography Lecture 17.
Chapter -2 Block Ciphers and the Data Encryption Standard
Chapter -3 ADVANCED ENCRYPTION STANDARD & BLOCK CIPHER OPERATION
Advanced Encryption Standard
Cryptography Lecture 8.
SYMMETRIC ENCRYPTION.
Block Ciphers (Crypto 2)
Computer Security IT423 Semester II
Cryptography Lecture 9.
Advanced Encryption Standard
Differential Cryptanalysis
DES (Data Encryption Standard)
Cryptography Lecture 14.
Cryptography and Network Security Chapter 5 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography Lecture 13.
Cryptography Lecture 16.
Cryptography Lecture 13.
Cryptography Lecture 17.
Modern Cryptography.
Florida State University
ICS 555: Block Ciphers & DES Sultan Almuhammadi.
Cryptography Lecture 15.
Advanced Encryption Standard
Feistel Cipher Structure
Data Encryption Standard (DES)
Blowfish Encryption Algorithm
Presentation transcript:

Cryptography Lecture 18

Key-recovery attack, 1-round SPN Consider first the case where there is no final key-mixing step Possible to get the key immediately! What about a full 1-round SPN? Attack 1: for each possible 1st-round key, get corresponding 2nd-round key Continue process of elimination Complexity 2l for key of length 2l

Key-recovery attack, 1-round SPN Better attack: work S-box-by-S-box Assume 8-bit S-box For each 8 bits of 1st-round key, get corresponding 8 bits of 2nd-round key Continue process of elimination Complexity?

Feistel networks

Feistel networks Build (invertible) permutation from non-invertible components One round: Keyed round function f: {0,1}n x {0,1}l/2 {0,1}l/2 Fk1(L0, R0)  (L1, R1) where L1 = R0; R1 = L0  fk1(R0) Always invertible!

Security? Security of 1-round Feistel? Security of 2-round Feistel (with independent keys) Security of 3/4-round Feistel?

Data Encryption Standard (DES) Standardized in 1977 56-bit keys, 64-bit block length 16-round Feistel network Same round function in all rounds (but different sub-keys) Basically an SPN design!

DES mangler function

DES mangler function S-boxes Mixing permutation Each S-box is 4-to-1 Changing 1 bit of input changes at least 2 bits of output Mixing permutation The 4 bits of output from any S-box affect the input to 6 S-boxes in the next round

Key schedule 56-bit master key, 48-bit subkey in each round Each subkey takes 24 bits from the left half of the master key, and 24 bits from the right half of the master key

Avalanche effect Consider 1-bit difference in left half of input After 1 round, 1-bit difference in right half S-boxes cause a 2-bit difference, implying a 3-bit difference overall after 2 rounds Mixing permutation spreads differences into different S-boxes …

Security of DES DES is extremely well-designed Except for some attacks that require large amounts of plaintext, no attacks better than brute-force are known But … parameters are too small! I.e., brute-force search is feasible

56-bit key length A concern as soon as DES was released Brute-force search over 256 keys is possible 1997: 1000s of computers, 96 days 1998: distributed.net, 41 days 1999: Deep Crack ($250,000), 56 hours Today: 48 FPGAs, ~1 day

64-bit block length Birthday collisions relatively likely E.g., encrypt 230 ( 1 billion) records using CTR mode; chances of a collision are  260/264 = 1/16

Increasing key length? DES has key that is too short How to fix? Design new cipher Tweak DES so that it takes a larger key Build new cipher using DES as a black box

Double encryption Let F: {0,1}n x {0,1}l  {0,1}l (i.e., n=56, l=64 for DES) Define F2 : {0,1}2n x {0,1}l  {0,1}l as follows: F2k1, k2(x) = Fk1(Fk2(x)) (still invertible) If best attack on F takes time 2n, is it reasonable to assume that the best attack on F2 takes time 22n?

Meet-in-the-middle attack No! There is an attack taking 2n time… (And 2n memory) The attack applies any time a block cipher can be “factored” into 2 independent components

Triple encryption Define F3 : {0,1}3n x {0,1}l  {0,1}l as follows: F3k1, k2, k3(x) = Fk1(Fk2(Fk3(x))) What is the best attack now?

Two-key triple encryption Define F3 : {0,1}2n x {0,1}l  {0,1}l as follows: F3k1, k2(x) = Fk1(Fk2(Fk1(x))) Best attacks take time 22n – optimal given the key length! This approach is taken by triple-DES