ADVANCED ENCRYPTION STANDARDADVANCED ENCRYPTION STANDARD

Slides:



Advertisements
Similar presentations
“Advanced Encryption Standard” & “Modes of Operation”
Advertisements

Modern Symmetric-Key Ciphers
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
1 CIS 5371 Cryptography 5b. Pseudorandom Objects in Practice Block Ciphers.
Cryptography and Network Security Chapter 5 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
1 The AES block cipher Niels Ferguson. 2 What is it? Block cipher: encrypts fixed-size blocks. Design by two Belgians. Chosen from 15 entries in a competition.
RC4 1 RC4 RC4 2 RC4  Invented by Ron Rivest o “RC” is “Ron’s Code” or “Rivest Cipher”  A stream cipher  Generate keystream byte at a step o Efficient.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 5 Wenbing Zhao Department of Electrical and Computer Engineering.
Lecture 23 Symmetric Encryption
Encryption Schemes Second Pass Brice Toth 21 November 2001.
Chapter 12 Cryptography (slides edited by Erin Chambers)
Cryptography and Network Security Chapter 7 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security
Cryptography and Network Security Chapter 6. Multiple Encryption & DES  clear a replacement for DES was needed theoretical attacks that can break it.
Chapter 20 Symmetric Encryption and Message Confidentiality.
TE/CS 536 Network Security Spring 2006 – Lectures 6&7 Secret Key Cryptography.
Chapter 20 Symmetric Encryption and Message Confidentiality.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
Stream Cipher July 2011.
3DES and Block Cipher Modes of Operation CSE 651: Introduction to Network Security.
Multiple Encryption & DES  clearly a replacement for DES was needed Vulnerable to brute-force key search attacks Vulnerable to brute-force key search.
Modes of Usage Dan Fleck CS 469: Security Engineering These slides are modified with permission from Bill Young (Univ of Texas) 11 Coming up: Modes of.
Advanced Encryption Standard. Origins NIST issued a new version of DES in 1999 (FIPS PUB 46-3) DES should only be used in legacy systems 3DES will be.
Presented by: Dr. Munam Ali Shah
Lecture 23 Symmetric Encryption
Fifth Edition by William Stallings
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
University of Malawi, Chancellor College
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Problem Set 1: Cryptography.
CPIS 312 Chapter Three: Symmetric KEY CRYPTO By Dr. Daniyal Alghazzawi 2011 Term 2.
Public Key Cryptography. Asymmetric encryption is a form of cryptosystem in which Encryption and decryption are performed using the different keys—one.
Block Cipher Modes Last Updated: Aug 25, ECB Mode Electronic Code Book Divide the plaintext into fixed-size blocks Encrypt/Decrypt each block independently.
Chapter6: More on Symmetric Ciphers
Provides Confidentiality
Data Security B. R. Chandavarkar Asst. Prof., CSE Dept., NITK, Surathkal. brc.nitk.ac.in.
Symmetric Encryption and Message Confidentiality
Triple DES.
What is network security?
Unit -1.
Lecture 2.2: Private Key Cryptography II
ADVANCED ENCRYPTION STANDARD
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
مروري برالگوريتمهاي رمز متقارن(كليد پنهان)
AES Objectives ❏ To review a short history of AES
PART VII Security.
Some of this slide set is from Section 2,
ICS 454: Principles of Cryptography
Fifth Edition by William Stallings
Algorithm Types & Algorithm Modes
Chapter -3 ADVANCED ENCRYPTION STANDARD & BLOCK CIPHER OPERATION
Advanced Encryption Standard
RC4 RC
Block Ciphers: DES and AES
SYMMETRIC ENCRYPTION.
Block Ciphers (Crypto 2)
Chapter -4 STREAM CIPHERS
Advanced Encryption Standard
DES (Data Encryption Standard)
A toy example for RC4.
Cryptography and Network Security Chapter 5 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
SOHAIL SHAHUL HAMEED Dr. BHARGAVI GOSWAMI
Information and Computer Security CPIS 312 Lab 4 & 5
Advanced Encryption Standard
Elect. Codebook, Cipher Block Chaining
The RC4 Algorithm Network Security.
Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.
Presentation transcript:

ADVANCED ENCRYPTION STANDARDADVANCED ENCRYPTION STANDARD ◆ AES is a block cipher intended to replace DES for commercial applications. It uses a 128-bit block size and a key size of 128, 192, or 256 bits. ◆ AES does not use a Feistel structure. Instead, each full round consists of four separate functions: byte substitution, permutation, arithmetic operations over a finite field, and XOR with a key. ADVANCED ENCRYPTION STANDARDADVANCED ENCRYPTION STANDARD

General Structure

AES Data Structures

AES Encryption AES Decryption

Four different stages are used, one of permutation and three of substitution: • Substitute bytes: Uses an S-box to perform a byte-by-byte substitution of the block • ShiftRows: A simple permutation • MixColumns: A substitution that makes use of arithmetic over • AddRoundKey: A simple bitwise XOR of the current block with a portion of the expanded key

1. Substitute bytes transformation

2. Shift Rows transformation 3. Mix Column Transformation

Multiple Encryption and Triple DES Multiple encryption is a technique in which an encryption algorithm is used multiple times. In the first instance, plaintext is converted to ciphertext using the encryption algorithm. This ciphertext is then used as input and the algorithm is applied again. This process may be repeated through any number of stages. Double DES Triple DES with Two Keys Triple DES with Three Keys

Double DES Triple encryption Encryption Encryption Decryption

Block Cipher Modes of Operation Electronic Code Book Cipher Block Chaining Mode Cipher Feedback Mode Output Feedback Mode Counter Mode

Electronic Code Book

2. Cipher Block Chaining Mode

3. Cipher Feedback Mode

4. Output Feedback Mode

5. Counter Mode

RC4 RC4 is a stream cipher designed in 1987 by Ron Rivest for RSA Security. RC4 cipher is officially named "Rivest Cipher 4", it is also known as "Ron's Code 4" It is a variable key size stream cipher with byte-oriented operations. The RC4 algorithm generates a pseudo-random keystream that is then used to generate the ciphertext (by XORing it with the plaintext). A variable- length key of from 1 to 256 bytes (8 to 2048 bits) is used to initialize a 256-byte state vector S, with elements . At all times, contains a permutation of all 8-bit numbers from 0 through 255. For encryption and decryption, a byte is generated from S by selecting one of the 255 entries in a systematic fashion. As each value of is generated, the entries in S are once again permuted.

Initialization of S /* Initialization */ for i = 0 to 255 do S[i] = i; T[i] = K[i mod keylen];

Initial Permutation of S j = 0; for i = 0 to 255 do j = (j + S[i] + T[i]) mod 256; Swap (S[i], S[j]);

Stream Generation /* Stream Generation */ i, j = 0; while (true) i = (i + 1) mod 256; j = (j + S[i]) mod 256; Swap (S[i], S[j]); t = (S[i] + S[j]) mod 256; k = S[t];

Encryption and decryption

PUBLIC-KEY CRYPTOGRAPHY AND RSA Asymmetric encryption is a form of cryptosystem in which encryption and decryption are performed using the different keys—one a public key and one a private key. It is also known as public-key encryption. Asymmetric encryption transforms plaintext into ciphertext using a one of two keys and an encryption algorithm. Using the paired key and a decryption algorithm, the plaintext is recovered from the ciphertext. Asymmetric encryption can be used for confidentiality, authentication, or both. The most widely used public-key cryptosystem is RSA. The difficulty of attacking RSA is based on the difficulty of finding the prime factors of a composite number.

THE RSA ALGORITHM

Traffic Confidentiality Security from traffic analysis attack Knowledge about the number and length of messages between nodes may enable an opponent to determine who is talking to whom Types of information derivable from traffic analysis Identities of communicating partners Frequency of communication Message patterns, e.g., length, quantity, (encrypted) content Correlation between messages and real world events Can (sometimes) be defeated through traffic padding

Countermeasure to Traffic Analysis Link encryption approach Link encryption hides address information Traffic padding is very effective End-to-End encryption approach Leaves addresses in the clear Measures available to the defender are more limited Pad out data units to a uniform length at either the transport or application level Null message can be inserted randomly into the stream