Cryptography Lecture 15.

Slides:



Advertisements
Similar presentations
1 KCipher-2 KDDI R&D Laboratories Inc.. ©KDDI R&D Laboratories Inc. All rights Reserved. 2 Introduction LFSR-based stream ciphers Linear recurrence between.
Advertisements

1 Introduction to Practical Cryptography Lectures 3/4 Stream Ciphers.
LINEAR FEEDBACK SHIFT REGISTERS, GALOIS FIELDS, AND STREAM CIPHERS Mike Thomsen Cryptography II May 14 th, 2012.
An Introduction to Stream Ciphers Zahra Ahmadian Electrical Engineering Department Sahrif University of Technology
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
Digital Kommunikationselektroink TNE027 Lecture 6 (Cryptography) 1 Cryptography Algorithms Symmetric and Asymmetric Cryptography Algorithms Data Stream.
CIS 5371 Cryptography 3b. Pseudorandomness.
Cryptography and Network Security Chapter 3
Session 2 Symmetric ciphers 1. Stream cipher definition Recall the Vernam cipher: Plaintext Ciphertext (Running) key
Stream Ciphers 1 Stream Ciphers. Stream Ciphers 2 Stream Ciphers  Generalization of one-time pad  Trade provable security for practicality  Stream.
Session 6: Introduction to cryptanalysis part 1. Contents Problem definition Symmetric systems cryptanalysis Particularities of block ciphers cryptanalysis.
Lecture 23 Symmetric Encryption
6. Practical Constructions of Symmetric-Key Primitives
Session 2: Secret key cryptography – stream ciphers – part 1.
Computer Security CS 426 Lecture 3
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
CS555Spring 2012/Topic 51 Cryptography CS 555 Topic 5: Pseudorandomness and Stream Ciphers.
Stream Ciphers Making the one-time pad practical.
Resynchronization Attacks on WG and LEX Hongjun Wu and Bart Preneel Katholieke Universiteit Leuven ESAT/COSIC.
Cryptanalysis of the Stream Cipher DECIM Hongjun Wu and Bart Preneel Katholieke Universiteit Leuven ESAT/COSIC.
Session 1 Stream ciphers 1.
TOPIC : Signature Analysis. Introduction Signature analysis is a compression technique based on the concept of (CRC) Cyclic Redundancy Checking It realized.
Understanding Cryptography – A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl Chapter 2 – Stream Ciphers These slides were.
หัวข้อบรรยาย Stream cipher RC4 WEP (in)security LFSR CSS (in)security.
Page : 1 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 Lecture-7 Secret-Key Ciphers.
Understanding Cryptography – A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl Chapter 2 – Stream Ciphers.
Cryptography CS 555 Topic 15: Stream Ciphers.
Cryptography Lecture 2.
Cryptography Lecture 9.
Cryptographic Hash Functions Part I
Cryptography Lecture 13.
Cryptography Lecture 12.
ICS 454 Principles of Cryptography
Cryptography Lecture 16.
Cryptography This week we are going to use OpenSSL
Cryptography Lecture 19.
مروري برالگوريتمهاي رمز متقارن(كليد پنهان)
CMSC 414 Computer and Network Security Lecture 3
Cryptography Lecture 6.
Cryptography Lecture 10.
Introduction to Modern Symmetric-key Ciphers
Cryptography Lecture 11.
Security Of Wireless Sensor Networks
Cryptography Lecture 17.
ICS 454 Principles of Cryptography
Cryptography Lecture 5.
Cryptography Lecture 8.
SYMMETRIC ENCRYPTION.
Block Ciphers (Crypto 2)
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
Security of Wireless Sensor Networks
Cryptography Lecture 9.
Cryptography Lecture 2.
CH 6. Stream Ciphers Information Security & IoT Lab 김해용
Cryptography Lecture 14.
Encryption Basics Types of ciphers Algorithms Modes Key Length
Cryptography Lecture 13.
Cryptography Lecture 10.
Cryptography Lecture 9.
Cryptography Lecture 11.
Cryptography Lecture 10.
Cryptography Lecture 16.
Cryptography Lecture 13.
Cryptography Lecture 17.
Cryptography Lecture 15.
Cryptography Lecture 18.
Information and Computer Security CPIS 312 Lab 4 & 5
Cryptanalysis Network Security.
Cryptography Lecture 15.
Blockchains Lecture 4.
Presentation transcript:

Cryptography Lecture 15

Summary and review We have finished our treatment of private-key schemes! (Though it will come up again later) Private-key crypto is used extensively in practice Arguably more than public-key crypto

So far… We have seen how to construct schemes based on various lower-level primitives Stream ciphers/PRGs Block ciphers/PRFs Hash functions How do we construct these primitives?

Two approaches Construct from even lower-level assumptions Can prove secure (given lower-level assumption) Typically inefficient Build directly Much more efficient! Need to assume security, but We have formal definitions to aim for We can concentrate our analysis on these primitives We can develop/analyze various design principles

Stream ciphers/PRGs

Terminology Init algorithm GetBits algorithm Takes as input a key + initialization vector (IV) Outputs initial state GetBits algorithm Takes as input the current state Outputs next bit/byte/chunk and updated state Allows generation of as many bits as needed

Security requirements If there is no IV, then (for a uniform key) the output of GetBits should be indistinguishable from a uniform, independent stream of bits If there is an IV, then (for a uniform key) the outputs of GetBits on multiple, uniform IVs should be indistinguishable from multiple uniform, independent streams of bits Even if the attacker is given the IVs

LFSRs Degree n  n registers State: bits sn-1, …, s0 (contents of the registers) Feedback coefficients cn-1, …, c0 (view as part of state; do not change) State updated and output generated in each “clock tick”

Example Assume initial content of registers is 0100 First 4 state transitions: 0100  1010  0101  0010  … First 3 output bits: 0 0 1 …

LFSRs as stream ciphers Key + IV used to initialize the state of the LFSR (possibly including feedback coefficients) One bit of output per clock tick State updated

LFSRs State (and output) “cycles” if state ever repeated Maximal-length LFSR cycles through all 2n - 1 nonzero states Known how to set feedback coefficients so as to achieve maximal length

LFSRs Maximal-length LFSRs have good statistical properties… …but they are not cryptographically secure!

Security? Are LFSRs secure? Might hope for 2n-bit security n-bit state + n bits to specify feedback Slightly less if we insist on maximal-length LFSR

LFSRs If feedback coefficients known, the first n output bits directly reveal the initial state! Even if feedback coefficients are unknown, can use linear algebra to learn everything from 2n consecutive output bits Moral: linearity is bad for cryptography (because linear algebra is so powerful)

Nonlinear FSRs Add nonlinearity to prevent attacks Nonlinear feedback Output is a nonlinear function of the state Multiple (coupled) LFSRs …or any combination of the above Still want to preserve statistical properties of the output, and long cycle length

Trivium Designed by De Cannière and Preneel in 2006 as part of eSTREAM competition Intended to be simple and efficient (especially in hardware) Essentially no attacks better than brute-force search are known

Trivium

Trivium Three FSRs of degree 93, 84, and 111 Initialization: 80-bit key in left-most registers of first FSR 80-bit IV in left-most registers of second FSR Remaining registers set to 0, except for three right-most registers of third FSR Run for 4 x 288 clock ticks