Block cipher and modes of encryptions

Slides:



Advertisements
Similar presentations
Block Cipher Modes of Operation and Stream Ciphers
Advertisements

The Data Encryption Standard - see Susan Landau’s paper: “Standing the test of time: the data encryption standard.” DES - adopted in 1977 as a standard.
“Advanced Encryption Standard” & “Modes of Operation”
Modern Symmetric-Key Ciphers
Modern Symmetric-Key Ciphers
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
Cryptography and Network Security Chapter 6. Chapter 6 – Block Cipher Operation Many savages at the present day regard their names as vital parts of themselves,
Cryptography1 CPSC 3730 Cryptography Chapter 6 Triple DES, Block Cipher Modes of Operation.
CMSC 414 Computer (and Network) Security Lecture 5 Jonathan Katz.
Block Ciphers 1 Block Ciphers Block Ciphers 2 Block Ciphers  Modern version of a codebook cipher  In effect, a block cipher algorithm yields a huge.
1 Lect. 9 : Mode of Operation. 2 Modes of Operation – ECB Mode  Electronic Code Book Mode Break a message into a sequence of plaintext blocks Each plaintext.
Modes of Operation CS 795. Electronic Code Book (ECB) Each block of the message is encrypted with the same secret key Problems: If two identical blocks.
Chapter 3 – Block Ciphers and the Data Encryption Standard Jen-Chang Liu, 2004 Adopted from lecture slides by Lawrie Brown.
CS470, A.SelcukModes of Operation1 Encrypting with Block Ciphers CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Block Cipher Transmission Modes CSCI 5857: Encoding and Encryption.
Modes of Operation. Topics  Overview of Modes of Operation  EBC, CBC, CFB, OFB, CTR  Notes and Remarks on each modes.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
Lecture 4: Using Block Ciphers
TE/CS 536 Network Security Spring 2006 – Lectures 6&7 Secret Key Cryptography.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
CS555Spring 2012/Topic 111 Cryptography CS 555 Topic 11: Encryption Modes and CCA Security.
Cryptography Chapter 7 Part 2 Pages 781 to 812. Symmetric Cryptography Secret Key Figure 7-10 on page 782 Key distribution problem – Secure courier Many.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
3DES and Block Cipher Modes of Operation CSE 651: Introduction to Network Security.
Multiple Encryption & DES  clearly a replacement for DES was needed Vulnerable to brute-force key search attacks Vulnerable to brute-force key search.
Chapter 9: Algorithms Types and Modes Dulal C. Kar Based on Schneier.
Encryption Types & Modes Chapter 9 Encryption Types –Stream Ciphers –Block Ciphers Encryption Modes –ECB - Electronic Codebook –CBC - Cipher Block Chaining.
More About DES Cryptography and Network Security Reference: Sec 3.1 of Stallings Text.
Data Encryption Standard (DES) © 2000 Gregory Kesden.
Lecture 4 Page 1 CS 236 Stream and Block Ciphers Stream ciphers convert one symbol of plaintext immediately into one symbol of ciphertext Block ciphers.
1.1 Chapter 8 Encipherment Using Modern Symmetric-Key Ciphers Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
BLOCK CIPHER SYSTEMS OPERATION MODES OF DATA ENCRYPTION STANDARD (DES)
Shambhu Upadhyaya Security – AES-CCMP Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 13)
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
Modes of Usage Dan Fleck CS 469: Security Engineering These slides are modified with permission from Bill Young (Univ of Texas) 11 Coming up: Modes of.
Modes of Operation INSTRUCTOR: DANIA ALOMAR. Modes of Operation A block cipher can be used in various methods for data encryption and decryption; these.
Lecture 5 Block Diagrams Modes of Operation of Block Ciphers.
Class 3 Cryptography Refresher II CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman
1 Symmetric key cryptography: DES DES: Data Encryption Standard US encryption standard [NIST 1993] 56-bit symmetric key, 64 bit plaintext input How secure.
Lecture 4 Page 1 CS 236 Stream and Block Ciphers Stream ciphers convert one symbol of plaintext immediately into one symbol of ciphertext Block ciphers.
Cipher Transmission and Storage Modes Part 2: Stream Cipher Modes CSCI 5857: Encoding and Encryption.
Block Cipher Modes Last Updated: Aug 25, ECB Mode Electronic Code Book Divide the plaintext into fixed-size blocks Encrypt/Decrypt each block independently.
Modes of Operation block ciphers encrypt fixed size blocks – eg. DES encrypts 64-bit blocks with 56-bit key need some way to en/decrypt arbitrary amounts.
Block Cipher Encrypting a large message Electronic Code Book (ECB) message m1 m2 m3 m4 m5 m6 c1 c2 c3 c4 c5 c6 E E E Secret.
Symmetric-Key Cryptography CS 161: Computer Security Prof. Raluca Ada Popa Sept 13, 2016.
CS480 Cryptography and Information Security
Modes of Operation.
Algorithm Modes ECB, CBC, CFB, OFB.
Computer and Network Security
Outline Desirable characteristics of ciphers Stream and block ciphers
Final Project, , 2016 Kyle Kotowick
Introduction to modern cryptology
Block Cipher Modes CS 465 Make a chart for the mode comparisons
Cryptography Lecture 7 Arpita Patra © Arpita Patra.
PART VII Security.
Cryptography Lecture 7 Arpita Patra © Arpita Patra.
Foundations of Network and Computer Security
Algorithm Types & Algorithm Modes
Symmetric-Key Encryption
Block vs Stream Ciphers
Block Ciphers (Crypto 2)
Security of Wireless Sensor Networks
Cryptography Lecture 12.
Padding Oracle Attacks
Encryption Basics Types of ciphers Algorithms Modes Key Length
Counter Mode, Output Feedback Mode
Elect. Codebook, Cipher Block Chaining
Simple Hash Functions Network Security.
Secret-Key Encryption
Presentation transcript:

Block cipher and modes of encryptions

Block cipher Other name for fixed-length encryption scheme

Problem with just encrypting each block of the message using a randomized encryption scheme Each block uses k bits of randomness If we have 𝑑 blocks, it requires 𝑑𝑘 bits of randomness. Randomness is expensive

Solution to minimize randomness Create an initial state May use some randomness (called Nonce or IV). Encrypt the current block using the current state Update the state after each use of the block cipher

Goals (block cipher) Security Is it secure? What level of security does it have? Parallelizable: Can we encrypt/decrypt each block in parallel We don’t need to wait for the previous part to encrypt the next part. Forward: Do we need to use decryption operation Better if we don’t Error-resilient: If one block of the ciphertext becomes corrupted

ECB mode 𝐼𝑛𝑖𝑡() 𝑂𝑢𝑡𝑝𝑢𝑡 𝑚 𝑖 , 𝑆 𝑖 𝑈𝑝𝑑𝑎𝑡𝑒( 𝑚 𝑖 , 𝑠 𝑖 ) 𝑆 1 ←0 𝑂𝑢𝑡𝑝𝑢𝑡 𝑚 𝑖 , 𝑆 𝑖 𝑐 𝑖 ←𝐸𝑛 𝑐 𝑘 ( 𝑚 𝑖 ) 𝑈𝑝𝑑𝑎𝑡𝑒( 𝑚 𝑖 , 𝑠 𝑖 ) 𝑆 𝑖+1 ← 𝑆 𝑖

Electronic codebook mode (ECB)

Electronic codebook mode (ECB) Secure? Parallelizable Forward Error-resilient No yes no Unless the plaintext has high entropy.

Problem with ECB mode

Counter mode (CM) 𝐼𝑛𝑖𝑡() 𝑂𝑢𝑡𝑝𝑢𝑡 𝑚 𝑖 , 𝑆 𝑖 𝑈𝑝𝑑𝑎𝑡𝑒 𝑚 𝑖 , 𝑠 𝑖 𝑛𝑜𝑛𝑐𝑒 ∈ 𝑅 0,1 𝑠/2 𝑆 1 ←(𝑛𝑜𝑛𝑐𝑒, 0 𝑠/2 ) 𝑂𝑢𝑡𝑝𝑢𝑡 𝑚 𝑖 , 𝑆 𝑖 𝑐 𝑖 ←𝐸𝑛 𝑐 𝑘 𝑆 𝑖 ⊕ 𝑚 𝑖 𝑈𝑝𝑑𝑎𝑡𝑒 𝑚 𝑖 , 𝑠 𝑖 𝑠 𝑖+1 ← 𝑠 𝑖 +1

Counter mode (CM)

IV security reduced by half Counter mode Secure? Parallelizable Forward Error-resilient Yes but yes IV security reduced by half

Cipher block chaining 𝐼𝑛𝑖𝑡() 𝑂𝑢𝑡𝑝𝑢𝑡 𝑚 𝑖 , 𝑆 𝑖 𝑈𝑝𝑑𝑎𝑡𝑒 𝑚 𝑖 , 𝑠 𝑖 𝐼𝑉 ∈ 𝑅 0,1 𝑠 𝑆 1 ←𝐼𝑉 𝑂𝑢𝑡𝑝𝑢𝑡 𝑚 𝑖 , 𝑆 𝑖 𝑐 𝑖 ←𝐸𝑛 𝑐 𝑘 𝑚 𝑖 ⊕ 𝑆 𝑖 𝑈𝑝𝑑𝑎𝑡𝑒 𝑚 𝑖 , 𝑠 𝑖 𝑠 𝑖+1 ← 𝑐 𝑖

Cipher block chaining (CBC)

Cipher block chaining Secure? Parallelizable Forward Error-resilient Yes no