Lecture 10: The Return of Paco Background just got here last week

Slides:



Advertisements
Similar presentations
Origins  clear a replacement for DES was needed Key size is too small Key size is too small The variants are just patches The variants are just patches.
Advertisements

History Applications Attacks Advantages & Disadvantages Conclusion.
David Evans CS150: Computer Science University of Virginia Computer Science Lecture 31: Types of Types.
Cryptography and Network Security
AES clear a replacement for DES was needed
Cryptography and Network Security (AES) Dr. Monther Aldwairi New York Institute of Technology- Amman Campus 10/18/2009 INCS 741: Cryptography 10/18/20091Dr.
David Evans CS655: Programming Languages University of Virginia Computer Science Lecture 5: Languages Bugs and/or Features.
Cryptography and Network Security Chapter 5. Chapter 5 –Advanced Encryption Standard "It seems very simple." "It is very simple. But if you don't know.
Cryptography and Network Security Chapter 5 Fourth Edition by William Stallings.
CS Network Security Lecture 2 Prof. Katz. 9/7/2000Lecture 2 - Data Encryption2 DES – Data Encryption Standard Private key. Encrypts by series of.
CS470, A.SelcukAfter the DES1 Block Ciphers After the DES CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Chapter 5 –Advanced Encryption Standard "It seems very simple." "It is very simple. But if you don't know what the key is it's virtually indecipherable."
Private Key Algorithms RSA SSL
9/17/15UB Fall 2015 CSE565: S. Upadhyaya Lec 6.1 CSE565: Computer Security Lecture 6 Advanced Encryption Standard Shambhu Upadhyaya Computer Science &
FORESEC Academy FORESEC Academy Security Essentials (IV)
David Evans CS551: Security and Privacy University of Virginia Computer Science Lecture 5: One Fish, Two Fish, Blowfish,
CS216: Program and Data Representation University of Virginia Computer Science Spring 2006 David Evans Lecture 23: Review.
CS216: Program and Data Representation University of Virginia Computer Science Spring 2006 David Evans Lecture 3: Levels of Abstraction
Introduction to Information Security Lect. 6: Block Ciphers.
Chapter 2 (C) –Advanced Encryption Standard. Origins clearly a replacement for DES was needed –have theoretical attacks that can break it –have demonstrated.
The Advanced Encryption Standard Part 1: Overview
CSE 5/7353 – January 25 th 2006 Cryptography. Conventional Encryption Shared Key Substitution Transposition.
Lecture 5 Page 1 CS 236 Online More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
David Evans CS201j: Engineering Software University of Virginia Computer Science Lecture 11: Subtyping and Inheritance.
David Evans CS588: Security and Privacy University of Virginia Computer Science Lecture 10: Certificates and Hashes.
Page 1 This is page one. I’m talking about it now….
(Thunking about Thunks)
Lecture 4: Metacircles Eval Apply David Evans
Lecture 1: Introduction Background just got here last week
Lecture 6: Lambda Calculus
Lecture 2: Schreme David Evans
Lecture 4: Evaluation Rules Recursion CS200: Computer Science
CS216: Program and Data Representation
L – Modeling and Simulating Social Systems with MATLAB
Lambda Calculus Revisited
Private Key Algorithms Key Exchange Protocols SSL
Google Analytics.
Lecture 8: SmallTalking about Objects
Lecture 11: Authenticating Authentic Authenticaters Background
Lecture 21: Inheritance CS200: Computer Science University of Virginia
Lecture 9: Hash House Harriers Background just got here last week
Lecture 11: All Sorts CS200: Computer Science University of Virginia
Lecture 28: Types of Types
Lecture 15: Multics for the Masses
Lecture 14: Blocking and Catching Photons Background
RC6—The elegant AES choice
Lecture 7: Non-secret Key Cryptosystems
Lecture 8: Security of RSA THE MAGIC WORDS ARE SQUEAMISH OSSIFRAGE.
Lecture 21: Crosscutting Aspect-Oriented Programming Background
Lecture 2: Perfect Ciphers (in Theory, not Practice)
Lecture 7: Data Abstraction
Lecture 10: Using Object-Oriented Languages
RC6—The elegant AES choice
CSE 115 November , 2008.
October 29, 2015 D V T Student Planner Place this in the proper place
Lecture 17: Defeating Malcode (Shameless Self-Promotion) Background
Lecture 19: Proof-Carrying Code Background just got here last week
Lecture 10: Fixed Points ad Infinitum M.C. Escher, Moebius Ants
David Evans Lecture 19: ||ism I don’t think we have found the right programming concepts for parallel computers yet.
Lecture 3: Rules of Evaluation CS200: Computer Science
Lecture 13: Proof-Carrying Code Background just got here last week
Lecture 12: Minding your Ps & Qs:
Lecture 6: Two Fish on the Rijndael
Lecture 5: DES Use and Analysis Background just got here last week
Lecture 14: Mocking Mockingbirds
Lecture 15: Crazy Eddie and the Fixed Points Background
Lecture 13: Subtyping Rules Killer Bear Climber
Lecture 11: Sorting Grounds and Bubbles
Group 4: Song Li, Ying Lu, Hexin Wang, and Michael Walker May 1, 2000
CMPT 120 Lecture 15 – Unit 3 – Graphics and Animation
Presentation transcript:

David Evans http://www.cs.virginia.edu/~evans Lecture 10: The Return of Paco Background just got here last week finished degree at MIT week before Philosophy of advising students don’t come to grad school to implement someone else’s idea can get paid more to do that in industry learn to be a researcher important part of that is deciding what problems and ideas are worth spending time on grad students should have their own project looking for students who can come up with their own ideas for research will take good students interested in things I’m interested in – systems, programming languages & compilers, security rest of talk – give you a flavor of the kinds of things I am interested in meant to give you ideas (hopefully even inspiration!) but not meant to suggest what you should work on CS551: Security and Privacy University of Virginia Computer Science David Evans http://www.cs.virginia.edu/~evans

University of Virginia CS 551 Menu AES Announcement Paco Return PS2 Today’s Manifest: on the web Due Wednesday: Project Proposals 16 January 2019 University of Virginia CS 551

Choosing AES Serpent 62 69 3.56 341 KB MARS 23 34 1.90 85 KB RC6 15 43 (From Lecture 5) Choosing AES Cipher Speed (32) Speed (8) Safety Factor Simplicity (code size) Serpent 62 69 3.56 341 KB MARS 23 34 1.90 85 KB RC6 15 43 1.18 48 KB Rijndael 18 20 1.33 98 KB Twofish 16 2.67 104 KB (cycles/byte encrypt) 16 January 2019 University of Virginia CS 551

NIST selects.... *** RIJNDAEL *** Selected by NIST for the Proposed AES October 2, 2000 [Note: Apparently, one of our NIST servers was down for while today, making the webcast inaccessible. It also has led to a delay in these AES pages being updated. We will try to make the "archived" webcast available as soon as possible.] Press Release (available later today, Oct. 2)   16 January 2019 University of Virginia CS 551

University of Virginia CS 551 Paco 16 January 2019 University of Virginia CS 551