Confusion and Diffusion

Slides:



Advertisements
Similar presentations
1 CIS 5371 Cryptography 5b. Pseudorandom Objects in Practice Block Ciphers.
Advertisements

Cryptography and Network Security Chapter 3
Block Ciphers and the Data Encryption Standard
Cryptography and Network Security
1 Chapter 3 – Block Ciphers and the Data Encryption Standard Modern Block Ciphers  now look at modern block ciphers  one of the most widely used types.
1 Chapter 3 – Block Ciphers and the Data Encryption Standard Modern Block Ciphers  now look at modern block ciphers  one of the most widely used types.
Introduction to Symmetric Block Cipher Jing Deng Based on Prof. Rick Han’s Lecture Slides Dr. Andreas Steffen’s Security Tutorial.
Chapter 2 Basic Encryption and Decryption (part B)
Ref: STAL03More Concepts of Cryptography and Cryptanalysis 1 Reference –William Stallings, Cryptography and Network Security, 3rd Edition, Prentice Hall.
CPSC CPSC 3730 Cryptography Chapter 2 Classical Encryption Techniques.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Network Security Chapter
Chapter 3 – Block Ciphers and the Data Encryption Standard
Data Encryption Standard (DES). Symmetric Cryptography  C = E(P,K)  P = D(C,K)  Requirements  Given C, the only way to obtain P should be with  the.
IT 221: Classical and Modern Encryption Techniques Lecture 2: Classical and Modern Encryption Techniques For Educational Purposes Only Revised: September.
Cryptography Week-6.
Cryptanalysis. The Speaker  Chuck Easttom  
Confusion and Diffusion1 Ref: William Stallings, Cryptography and Network Security, 3rd Edition, Prentice Hall, 2003.
Lec. 5 : History of Cryptologic Research II
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Cryptography and Network Security
Terminology and classical Cryptology
Data Security and Encryption (CSE348) 1. Lecture # 6 2.
Classical Encryption techniques
Introduction to Ciphers Breno de Medeiros. Cipher types From “Cipher”, Wikipedia article.
Cryptography Part 1: Classical Ciphers Jerzy Wojdyło May 4, 2001.
Lecture 3 Page 1 Advanced Network Security Review of Cryptography Advanced Network Security Peter Reiher August, 2014.
Stream Ciphers and Block Ciphers A stream cipher is one that encrypts a digital data stream one bit or one byte at a time. Examples of classical stream.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Module :MA3036NI Symmetric Encryption -3 Lecture Week 4.
Data Encryption Standard 1977 “New Directions in Cryptography” 1976.
Block Ciphers and the Data Encryption Standard. Modern Block Ciphers  One of the most widely used types of cryptographic algorithms  Used in symmetric.
@Yuan Xue CS 285 Network Security Block Cipher Principle Fall 2012 Yuan Xue.
COMPUTER AND NETWORK SECURITY First of all, an introduction to the field of computer security and some of relevant issues are presented. Then, a background.
Lecture 4 Data Encryption Standard (DES) Dr. Nermin Hamza
CH15 –Security & Crypto.
Outline Desirable characteristics of ciphers Uses of cryptography
Block Ciphers and the Data Encryption Standard
Classical Encryption techniques
Columnar Transposition
Introduction Of System Security
Topics discussed in this section: 30-2 SYMMETRIC-KEY CRYPTOGRAPHY Symmetric-key cryptography started thousands of years ago when people needed.
- Stream Cipher and Block Cipher - Confusion & Diffusion
Outline Desirable characteristics of ciphers Uses of cryptography
SYMMETRIC KEY ALGORITHMS
NET 311 Information Security
Symmetric Key Block Ciphers
Cryptography and Network Security Chapter 3
Cryptography II Jagdish S. Gangolly School of Business
PART VII Security.
Block cipher & Fiestel Structure
ICS 454: Principles of Cryptography
Block Ciphers and the Data Encryption Standard (DES)
Algorithm Types & Algorithm Modes
SYMMETRIC KEY ALGORITHMS
Cryptography: Cesar Cipher
Cryptography Lecture 16.
Basics Of Symmetric Encryption
Cryptanalysis Network Security.
Symmetric Encryption or conventional / private-key / single-key
Florida State University
Elect. Codebook, Cipher Block Chaining
Conventional Encryption
Presentation transcript:

Confusion and Diffusion Ref: William Stallings, Cryptography and Network Security, 3rd Edition, Prentice Hall, 2003 Confusion and Diffusion

Statistics and Plaintext Suppose the frequency distribution of plaintext in a human-readable message in some language is known. Or suppose there are known words or phrases that are used in the plaintext message. A cryptanalysist can use this information to break a cryptographic algorithm. Confusion and Diffusion

Confusion and Diffusion Changing Statistics Claude Shannon suggested that to complicate statistical attacks, the cryptographer could dissipate the statistical structure of the plaintext in the long range statistics of the ciphertext. Shannon called this process diffusion. Confusion and Diffusion

Changing Statistics (p.2) Diffusion can be accomplished by having many plaintext characters affect each ciphertext character. An example of diffusion is the encryption of a message M=m1,m2,... using a an averaging: yn= i=1,k mn+i(mod26). Confusion and Diffusion

Changing Statistics (p.3) In binary block ciphers, such as the Data Encryption Standard (DES), diffusion can be accomplished using permutations on data, and then applying a function to the permutation to produce ciphertext. Confusion and Diffusion

Confusion and Diffusion Complex Use of a Key Diffusion complicates the statistics of the ciphertext, and makes it difficult to discover the key of the encryption process. The process of confusion, makes the use of the key so complex, that even when an attacker knows the statistics, it is still difficult to deduce the key. Confusion and Diffusion

Confusion and Diffusion Complex Use of a Key(p.2) Confusion can be accomplished by using a complex substitution algorithm. Block ciphers, such as the Data Encryption Standard, makes use of substitution operations. Confusion and Diffusion