Algorithm Types & Algorithm Modes

Slides:



Advertisements
Similar presentations
Cryptography and Network Security Chapter 6 Block Cipher Modes of Operation Lecture slides by Lawrie Brown for “Cryptography and Network Security”, 5/e,
Advertisements

Chapter 4: Modes of Operation CS 472: Fall Encrypting a Large Massage 1.Electronic Code Book (ECB) 2.Cipher Block Chaining (CBC) 3.Output Feedback.
“Advanced Encryption Standard” & “Modes of Operation”
Encipherment Using Modern Symmetric-Key Ciphers. 8.2 Objectives ❏ To show how modern standard ciphers, such as DES or AES, can be used to encipher long.
Modern Symmetric-Key Ciphers
Cryptography and Network Security Chapter 6 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 6. Chapter 6 – Block Cipher Operation Many savages at the present day regard their names as vital parts of themselves,
Cryptography1 CPSC 3730 Cryptography Chapter 6 Triple DES, Block Cipher Modes of Operation.
1 Lect. 9 : Mode of Operation. 2 Modes of Operation – ECB Mode  Electronic Code Book Mode Break a message into a sequence of plaintext blocks Each plaintext.
Modes of Operation CS 795. Electronic Code Book (ECB) Each block of the message is encrypted with the same secret key Problems: If two identical blocks.
Chapter 3 – Block Ciphers and the Data Encryption Standard Jen-Chang Liu, 2004 Adopted from lecture slides by Lawrie Brown.
Introduction to Symmetric Block Cipher Jing Deng Based on Prof. Rick Han’s Lecture Slides Dr. Andreas Steffen’s Security Tutorial.
Cryptography and Network Security Chapter 6
Lecture 23 Symmetric Encryption
CSCE 790G: Computer Network Security Chin-Tser Huang University of South Carolina.
Block Cipher Transmission Modes CSCI 5857: Encoding and Encryption.
Modes of Operation. Topics  Overview of Modes of Operation  EBC, CBC, CFB, OFB, CTR  Notes and Remarks on each modes.
Cryptography and Network Security Chapter 6. Multiple Encryption & DES  clear a replacement for DES was needed theoretical attacks that can break it.
Chapter 20 Symmetric Encryption and Message Confidentiality.
TE/CS 536 Network Security Spring 2006 – Lectures 6&7 Secret Key Cryptography.
Chapter 20 Symmetric Encryption and Message Confidentiality.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Cryptography Chapter 7 Part 2 Pages 781 to 812. Symmetric Cryptography Secret Key Figure 7-10 on page 782 Key distribution problem – Secure courier Many.
Multiple Encryption & DES  clearly a replacement for DES was needed Vulnerable to brute-force key search attacks Vulnerable to brute-force key search.
Chapter 9: Algorithms Types and Modes Dulal C. Kar Based on Schneier.
More About DES Cryptography and Network Security Reference: Sec 3.1 of Stallings Text.
Chapter 2 (B) – Block Ciphers and Data Encryption Standard.
Lecture 4 Page 1 CS 236 Stream and Block Ciphers Stream ciphers convert one symbol of plaintext immediately into one symbol of ciphertext Block ciphers.
1.1 Chapter 8 Encipherment Using Modern Symmetric-Key Ciphers Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
BLOCK CIPHER SYSTEMS OPERATION MODES OF DATA ENCRYPTION STANDARD (DES)
Modes of Usage Dan Fleck CS 469: Security Engineering These slides are modified with permission from Bill Young (Univ of Texas) 11 Coming up: Modes of.
Modes of Operation INSTRUCTOR: DANIA ALOMAR. Modes of Operation A block cipher can be used in various methods for data encryption and decryption; these.
Stream Ciphers and Block Ciphers A stream cipher is one that encrypts a digital data stream one bit or one byte at a time. Examples of classical stream.
Cryptography and Network Security Chapter 6 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Lecture 23 Symmetric Encryption
Privacy and Integrity: “ Two Essences of Network Security” Presenter Prosanta Gope Advisor Tzonelih Hwang Quantum Information and Network Security Lab,
Lecture 4 Page 1 CS 236 Stream and Block Ciphers Stream ciphers convert one symbol of plaintext immediately into one symbol of ciphertext Block ciphers.
Cipher Transmission and Storage Modes Part 2: Stream Cipher Modes CSCI 5857: Encoding and Encryption.
Block Cipher Modes Last Updated: Aug 25, ECB Mode Electronic Code Book Divide the plaintext into fixed-size blocks Encrypt/Decrypt each block independently.
Modes of Operation block ciphers encrypt fixed size blocks – eg. DES encrypts 64-bit blocks with 56-bit key need some way to en/decrypt arbitrary amounts.
Block Cipher Encrypting a large message Electronic Code Book (ECB) message m1 m2 m3 m4 m5 m6 c1 c2 c3 c4 c5 c6 E E E Secret.
CS480 Cryptography and Information Security
Modes of Operation.
Algorithm Modes ECB, CBC, CFB, OFB.
Computer and Network Security
Row Transposition Ciphers
CSCE 715: Network Systems Security
(Data Encryption Standard)
Chapter 6 – Block Cipher Operation
Cryptography and Network Security Chapter 6
Outline Desirable characteristics of ciphers Stream and block ciphers
- Stream Cipher and Block Cipher - Confusion & Diffusion
Lecture 2.2: Private Key Cryptography II
Block Cipher Modes CS 465 Make a chart for the mode comparisons
مروري برالگوريتمهاي رمز متقارن(كليد پنهان)
PART VII Security.
Cryptography and Network Security
Security Of Wireless Sensor Networks
Block vs Stream Ciphers
ADVANCED ENCRYPTION STANDARDADVANCED ENCRYPTION STANDARD
Security of Wireless Sensor Networks
Encryption Basics Types of ciphers Algorithms Modes Key Length
Cryptography and Network Security Chapter 6
Counter Mode, Output Feedback Mode
Elect. Codebook, Cipher Block Chaining
Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.
Secret-Key Encryption
Presentation transcript:

Algorithm Types & Algorithm Modes Lecture slides by Lawrie Brown for “Cryptography and Network Security”, 4/e, by William Stallings, Chapter 2 – “Classical Encryption Techniques”.

2DES and 3DES Lecture slides by Lawrie Brown for “Cryptography and Network Security”, 4/e, by William Stallings, Chapter 2 – “Classical Encryption Techniques”. 2 2

Meet In the Middle attack Lecture slides by Lawrie Brown for “Cryptography and Network Security”, 4/e, by William Stallings, Chapter 2 – “Classical Encryption Techniques”. 3 3

Must know about: Algorithm types Confusion Diffusion Stream Cipher Block Cipher Confusion The idea of confusion is to hide the relationship between the cipher text and the key Confusion is achieved by means of the substitution techniques. Diffusion Diffusion hide the relationship between the cipher text and plain text. diffusion is achieved by means of the transposition techniques. Lecture slides by Lawrie Brown for “Cryptography and Network Security”, 4/e, by William Stallings, Chapter 2 – “Classical Encryption Techniques”. 4 4

Block cipher modes of operation The algorithm modes defines the details of the cryptographic algorithm, once the types is decided. There are four modes of operation (algorithm modes) of block cipher have been defined. It is a technique for enhancing the effect of a cryptographic algorithm. Briefly review some terminology used throughout the course. 5 5

Block cipher modes Electronic Code Book(ECB) Cipher Block Chaining(CBC) Cipher Feedback(CFB) Output Feedback(OFB) Also discuss a variation of the OFB mode, called as Counter(CTR)

Block cipher modes of operation Algorithm modes Electronic code Book(ECB) Cipher Block Chaining(CBC) Cipher feedback (CFB) Output Feedback (OFB) Briefly review some terminology used throughout the course. This two modes work on block Ciphers. These two modes work on block Ciphers acting as stream ciphers 7 7

Electronic code book (ECB) Simplest mode of operation. Plain text message is divided into blocks of 64 bits each. Each block then encrypted independently of the other blocks. For each blocks same key used for encryption. Briefly review some terminology used throughout the course. 8 8

Electronic code book (ECB) Encryption Reverse process is used for Decryption. Briefly review some terminology used throughout the course. 9 9

Electronic code book (ECB) ECB is useful only for small message. Characteristics of ECB The same b bit block of plaintext , if it appears more than once in message , always produce the same cipher text. For lengthy message ECB is not secure Briefly review some terminology used throughout the course. 10 10

Cipher Block Chaining (CBC) message is broken into blocks linked together in encryption operation each previous cipher blocks is chained with current plaintext block, hence name use Initial Vector (IV) to start process uses: bulk data encryption, authentication To overcome the problems of repetitions and order independence in ECB, want some way of making the ciphertext dependent on all blocks before it. This is what CBC gives us, by combining the previous ciphertext block with the current message block before encrypting. To start the process, use an Initial Value (IV), which is usually well known (often all 0's), or otherwise is sent, ECB encrypted, just before starting CBC use. CBC mode is applicable whenever large amounts of data need to be sent securely, provided that all data is available in advance (eg email, FTP, web etc).

Cipher block chaining mode(CBC) Briefly review some terminology used throughout the course. 12 12

Advantages and Limitations of CBC a ciphertext block depends on all blocks before it any change to a block affects all following ciphertext blocks need Initialization Vector (IV) which must be known to sender & receiver if sent in clear, attacker can change bits of first block, and change IV to compensate hence IV must either be a fixed value (as in EFTPOS) or must be sent encrypted in ECB mode before rest of message CBC is the block mode generally used. The chaining provides an avalanche effect, which means the encrypted message cannot be changed or rearranged without totally destroying the subsequent data. However there is the issue of ensuring that the IV is either fixed or sent encrypted in ECB mode to stop attacks on 1st block.

Cipher feedback mode(CFB) Briefly review some terminology used throughout the course. 14

Cipher feedback mode(CFB) C1 = P1 (XOR) MSBs [E(k,IV)]. P1 = C1 (XOR) MSBs [E(k,IV)]. For DES, b = 64 bits. For AES, b = 128 bits. Initially S = 8 bits. Briefly review some terminology used throughout the course. 15 15

Output feedback mode(OFB) Briefly review some terminology used throughout the course. 16 16

Output feedback mode(OFB) Extremely similar to the CFB. Only difference is that in the case of OFB, the output of the IV encryption process is fed into the next stage of encryption process. Briefly review some terminology used throughout the course. 17 17

Counter Mode(CTR) Similar to the OFB with one variation. It uses sequence number called counters as the input to the algorithm. After each block is encrypted to fill the register, the next counter value is used. Size of counter value is same as plain text block. Briefly review some terminology used throughout the course. 18 18

Counter Mode(CTR) Briefly review some terminology used throughout the course. 19 19

Counter Mode(CTR)