RC6—The elegant AES choice

Slides:



Advertisements
Similar presentations
Origins  clear a replacement for DES was needed Key size is too small Key size is too small The variants are just patches The variants are just patches.
Advertisements

Chap. 5: Advanced Encryption Standard (AES) Jen-Chang Liu, 2005 Adapted from lecture slides by Lawrie Brown.
TIE Extensions for Cryptographic Acceleration Charles-Henri Gros Alan Keefer Ankur Singla.
Cryptography and Network Security
AES clear a replacement for DES was needed
Cryptography and Network Security (AES) Dr. Monther Aldwairi New York Institute of Technology- Amman Campus 10/18/2009 INCS 741: Cryptography 10/18/20091Dr.
Cryptography and Network Security Chapter 5. Chapter 5 –Advanced Encryption Standard "It seems very simple." "It is very simple. But if you don't know.
Cryptography and Network Security Chapter 5 Fourth Edition by William Stallings.
Foundations of Network and Computer Security J J ohn Black Lecture #6 Sep 10 th 2007 CSCI 6268/TLEN 5831, Fall 2007.
Lecture 23 Symmetric Encryption
Team W1 1. Bobby Colyer (W11) 2. Jeffrey Kuo (W12) 3. Myron Kwai (W13) 4. Shirlene Lim (W14) Stage I: 21 st January 2004 DESIGN PROPOSAL Presentation #1:
CS470, A.SelcukAfter the DES1 Block Ciphers After the DES CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Dr. Lo’ai Tawalbeh 2007 Chapter 5: Advanced Encryption Standard (AES) Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus.
AES Proposal: Rijndael Joan Daemen Vincent Rijmen “Rijndael is expected, for all key and block lengths defined, to behave as good as can be expected from.
Chapter 5 Advanced Encryption Standard. Origins clear a replacement for DES was needed –have theoretical attacks that can break it –have demonstrated.
Cryptography and Network Security
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Chapter 5 –Advanced Encryption Standard "It seems very simple." "It is very simple. But if you don't know what the key is it's virtually indecipherable."
Database Architecture Optimized for the New Bottleneck: Memory Access Peter Boncz Data Distilleries B.V. Amsterdam The Netherlands Stefan.
TWOFISH ENCRYPTION ALGORITHM CS–627: Cryptology Fall 2004 Horatiu Paul Stancu.
Blowfish A widely used block cipher. Blowfish Designed by Bruce Schneier (1993) A variant of it (Twofish) was an AES finalist candidate 64-bit block size,
Comparison AES-Rijndael/Serpent 2G1704: Internet Security and Privacy Weltz Max 2G1704: Internet Security and Privacy Weltz Max.
9/17/15UB Fall 2015 CSE565: S. Upadhyaya Lec 6.1 CSE565: Computer Security Lecture 6 Advanced Encryption Standard Shambhu Upadhyaya Computer Science &
CIM Symmetric Ciphers 31 Advanced Encryption Standard Ch 5 of Cryptography and Network Security -Third Edition by William Stallings Modified from.
Encryption for Mobile Computing By Erik Olson Woojin Yu.
Advance Encryption Standard. Topics  Origin of AES  Basic AES  Inside Algorithm  Final Notes.
Information Security Lab. Dept. of Computer Engineering 122/151 PART I Symmetric Ciphers CHAPTER 5 Advanced Encryption Standard 5.1 Evaluation Criteria.
Chapter 20 Symmetric Encryption and Message Confidentiality.
AES: Rijndael 林志信 王偉全. Outline Introduction Mathematical background Specification Motivation for design choice Conclusion Discussion.
Lecture 23 Symmetric Encryption
Chapter 2 (C) –Advanced Encryption Standard. Origins clearly a replacement for DES was needed –have theoretical attacks that can break it –have demonstrated.
Advanced Encryption Standard Dr. Shengli Liu Tel: (O) Cryptography and Information Security Lab. Dept. of Computer.
The RC5 Encryption Algorithm: Two Years On Lisa Yin RC5 Encryption –Ron Rivest, December 1994 –Fast Block Cipher –Software and Hardware Implementations.
The RC6 Block Cipher: A simple fast secure AES proposal
1 1.SHA-3 contest - Your Round 2 Report 2.Analyzing the Influence of a Computer Platform on Ranking of the SHA-3 Candidates in Terms of Performance in.
RC6: The Simple Cipher Presenter: Morgan Monger. RC6 Cipher Created by Ronald Rivest et al. for AES submission Follows the evolution of RC5 cipher –Parameterized.
Information Security and Management 11. Cryptographic Hash Functions Chih-Hung Wang Fall
Understanding Cryptography by Christof Paar and Jan Pelzl Chapter 4 – The Advanced Encryption Standard (AES) ver. October 28, 2009.
RC6—The elegant AES choice Ron Rivest Matt Robshaw Yiqun Lisa Yin
1 CPCS425: Information Security (Topic 5) Topic 5  Symmetrical Cryptography  Understand the principles of modern symmetric (conventional) cryptography.
Zong-Cing Lin 2007/10/31.  Algorithm Description  Why chose Rijndael  Reference.
Embedded Systems. What is Embedded Systems?  Embedded reflects the facts that they are an integral.
CSE565: Computer Security Lectures 5 & 6 Advanced Encryption Standard
Provides Confidentiality
Information Security and Management (Abstract) 5
Triple DES.
School of Computer Science and Engineering Pusan National University
HEY DOUG HOW ARE YOU? NKE JUAM NUC GXK EUA. HEY DOUG HOW ARE YOU? NKE JUAM NUC GXK EUA.
STRATEGIC ENCRYPTION
Cryptography after DES
Symmetric Key Block Ciphers
ICS 454 Principles of Cryptography
Cryptography and Network Security
Cryptography and Network Security
EE 445S Real-Time Digital Signal Processing Lab Spring 2014
The performance requirements for DSP applications continue to grow and the traditional solutions do not adequately address this new challenge Paradigm.
ICS 454 Principles of Cryptography
128-bit Block Cipher Camellia
128-bit Block Cipher Camellia
SOFTWARE IMPLEMENTATION OF OCB MODE
RC6—The elegant AES choice
SYMMETRIC ENCRYPTION.
Origins AES = current federal standard for symmetric crypto (replacing DES) DES Key size is too small The variants are just patches can use Triple-DES.
International Data Encryption Algorithm
Cryptography and Network Security Chapter 5 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography Lecture 17.
Advanced Encryption Standard
Presentation transcript:

RC6—The elegant AES choice Ron Rivest rivest@mit.edu Matt Robshaw mrobshaw@supanet.com Yiqun Lisa Yin yiqun@nttmcl.com

RC6 is the right AES choice Security Performance Ease of implementation Simplicity Flexibility

RC6 is simple: only 12 lines B = B + S[ 0 ] D = D + S[ 1 ] for i = 1 to 20 do { t = ( B x ( 2B + 1 ) ) <<< 5 u = ( D x ( 2D + 1 ) ) <<< 5 A = ( ( A  t ) <<< u ) + S[ 2i ] C = ( ( C  u ) <<< t ) + S[ 2i + 1 ] (A, B, C, D) = (B, C, D, A) } A = A + S[ 42 ] C = C + S[ 43 ]

Simplicity Facilitates and encourages analysis allows rapid understanding of security makes direct analysis straightforward (contrast with Mars and Twofish) Enables easy implementation allows compilers to produce high-quality code obviates complicated optimizations provides good performance with minimal effort

RC6 security is well-analyzed RC6 is probably most studied AES finalist RC6 is based on RC5 RC6 analysis builds directly on RC5 analysis original RC6 analysis is very detailed RC6 simplified variants studied extensively small-scale versions allowed experimentation

RC6 key schedule is rock-solid Studied for more than six years Secure thorough mixing one-way function no key separation (cf. Twofish) no related-key attacks (cf. Rijndael)

Original analysis still accurate RC6 meets original design criteria Security estimates from 1998 still good today; independent analyses supportive. Secure, even in theory, even with analysis improvements far beyond those seen for DES during its lifetime RC6 provides a solid, well-tuned margin for security

32-bit Performance Excellent performance 32-bit CPUs are NIST reference platform a significant fraction of installed computers throughout the AES lifetime becoming more prevalent in cheaper devices (e.g. ARM)

Smart Card Suitability RC6 fits in the cheapest smart cards, and well-suited for many (e.g. ARM processor) Bandwidth, not CPU, likely to be most significant bottleneck 8-bit CPUs will become far less important over the AES lifetime

Performance on 64-bit CPUs Generally good 64-bit performance IA64-performance only fair but anomalous--slower than Pentium! Note 3x improvement with IA64++ Future chips will optimize AES In addition, RC6 gains dramatically with multi-block processing compared to other schemes

Major Trends: Java and DSPs Increasing use of Java for e-commerce and embedded apps. RC6 provides excellent speed with minimal code size and memory usage Increasing use of DSP chips likely to be more significant than IA64 or 8-bit processors RC6 gives excellent performance

Flexibility RC6 is fully parameterized key size, number of rounds, and block length can be readily changed well-suited for hash functions RC6 is only AES finalist that naturally gives DES and triple-DES compatible variants (64-bit blocks)

How do we grade candidates? Security (corroborated) Performance (speed+memory) 32-bit (30%) Java (20%) DSP (15%) 64-bit (15%) Hardware (15%) 8-bit (5%) Ease of implementation Simplicity Flexibility Overall: 40/25/15/10/10

Conclusions RC6 is a simple yet remarkably strong cipher good performance on most important platforms simple to code for good performance excellent flexibility the most studied finalist the best understood finalist RC6 is the secure and “elegant” choice for the AES

(The End)