International Data Encryption Algorithm

Slides:



Advertisements
Similar presentations
International Data Encryption Algorithm
Advertisements

CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
TIE Extensions for Cryptographic Acceleration Charles-Henri Gros Alan Keefer Ankur Singla.
Cryptography and Network Security Chapter 3
Block Ciphers and the Data Encryption Standard
Lecture 23 Symmetric Encryption
CSE 651: Introduction to Network Security
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Data Encryption Standard (DES). Symmetric Cryptography  C = E(P,K)  P = D(C,K)  Requirements  Given C, the only way to obtain P should be with  the.
A Compact and Efficient FPGA Implementation of DES Algorithm Saqib, N.A et al. In:International Conference on Reconfigurable Computing and FPGAs, Sept.
Network Security Lecture 14 Presented by: Dr. Munam Ali Shah.
Chapter 20 Symmetric Encryption and Message Confidentiality.
LOGO Hardware side of Cryptography Anestis Bechtsoudis Patra 2010.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Block ciphers Structure of a multiround block cipher
Cracking DES Cryptosystem A cryptosystem is made of these parts: Two parties who want to communicate over an insecure channel An encryption algorithm that.
1 SC700 A2 Internet Information Protocols 4/17/2001 Application Presentation by J. Chu Pretty Good Privacy.
Data Security and Encryption (CSE348) 1. Lecture # 3 2.
Chapter 3 Encryption Algorithms & Systems (Part D)
Lecture 23 Symmetric Encryption
Computer and Network Security Rabie A. Ramadan Lecture 3.
Chapter 2 Symmetric Encryption.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
Lecture 3 Overview. Ciphers The intent of cryptography is to provide secrecy to messages and data Substitutions – ‘hide’ letters of plaintext Transposition.
Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 7 September 9, 2004.
Module :MA3036NI Symmetric Encryption -3 Lecture Week 4.
Block Ciphers and the Data Encryption Standard. Modern Block Ciphers  One of the most widely used types of cryptographic algorithms  Used in symmetric.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
1 CPCS425: Information Security (Topic 5) Topic 5  Symmetrical Cryptography  Understand the principles of modern symmetric (conventional) cryptography.
Lecture 4 Data Encryption Standard (DES) Dr. Nermin Hamza
Provides Confidentiality
Information Security and Management (Abstract) 5
Triple DES.
School of Computer Science and Engineering Pusan National University
Blowfish Algorithm.
6b. Practical Constructions of Symmetric-Key Primitives.
Data Encryption Standard
Topics discussed in this section: 30-2 SYMMETRIC-KEY CRYPTOGRAPHY Symmetric-key cryptography started thousands of years ago when people needed.
SHAIKH SAMIUDDIN NIZAMI
Lecture 2.2: Private Key Cryptography II
Lecture 3: Symmetric Key Encryption
NET 311 Information Security
Cryptography after DES
Data Security and Encryption (CSE348)
Cryptography and Network Security Chapter 3
PART VII Security.
Security in Network Communications
Unit 2 “Implementation of a RC5 block cipher algorithm and implementing an attack on it”
Cryptography Team Presentation 1
Fifth Edition by William Stallings
Block Ciphers and the Data Encryption Standard (DES)
Dynamic High-Performance Multi-Mode Architectures for AES Encryption
Chapter -2 Block Ciphers and the Data Encryption Standard
Chapter -3 ADVANCED ENCRYPTION STANDARD & BLOCK CIPHER OPERATION
About Blowfish Encryption Video made by: Tudor Mare Sorin Nita Valentina Sociu Stefan Stefanescu.
SYMMETRIC ENCRYPTION.
Computer Security IT423 Semester II
Cryptography and Network Security Chapter 5 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Introduction to Cryptography
SOHAIL SHAHUL HAMEED Dr. BHARGAVI GOSWAMI
Florida State University
Counter Mode, Output Feedback Mode
Advanced Encryption Standard
Feistel Cipher Structure
Data Encryption Standard (DES)
Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.
Presentation transcript:

International Data Encryption Algorithm

Overview DES algorithm has been a popular secret key encryption algorithm and is used in many commercial and financial applications. However, its key size is too small by current standards and its entire 56 bit key space can be searched in approximately 22 hours IDEA is a block cipher designed by Xuejia Lai and James L. Massey in 1991 It is a minor revision of an earlier cipher, PES (Proposed Encryption Standard) IDEA was originally called IPES (Improved PES) and was developed to replace DES

Overview (cont’) It entirely avoids the use of any lookup tables or S-boxes IDEA was used as the symmetric cipher in early versions of the Pretty Good Privacy cryptosystem

Detailed description of IDEA IDEA operates with 64-bit plaintext and cipher text blocks and is controlled by a 128-bit key Completely avoid substitution boxes and table lookups used in the block ciphers The algorithm structure has been chosen such that when different key sub-blocks are used, the encryption process is identical to the decryption process

IDEA – Block Diagram

Key generation The 64-bit plaintext block is partitioned into four 16-bit sub-blocks Six 16-bit key are generated from the 128-bit key. Since a further four 16-bit key-sub-blocks are required for the subsequent output transformation, a total of 52 (= 8 x 6 + 4) different 16-bit sub-blocks have to be generated from the 128-bit key.

Key generation process First, the 128-bit key is partitioned into eight 16-bit sub-blocks which are then directly used as the first eight key sub-blocks The 128-bit key is then cyclically shifted to the left by 25 positions, after which the resulting 128-bit block is again partitioned into eight 16-bit sub-blocks to be directly used as the next eight key sub-blocks The cyclic shift procedure described above is repeated until all of the required 52 16-bit key sub-blocks have been generated

Encryption of the key sub-blocks The key sub-blocks used for the encryption and the decryption in the individual rounds are shown in Table 1

Encryption the first four 16-bit key sub-blocks are combined with two of the 16-bit plaintext blocks using addition modulo 216, and with the other two plaintext blocks using multiplication modulo 216 + 1 At the end of the first encryption round four 16-bit values are produced which are used as input to the second encryption round The process is repeated in each of the subsequent 7 encryption rounds The four 16-bit values produced at the end of the 8th encryption round are combined with the last four of the 52 key sub-blocks using addition modulo 216 and multiplication modulo 216 + 1 to form the resulting four 16-bit ciphertext blocks

Decryption The computational process used for decryption of the ciphertext is essentially the same as that used for encryption The only difference is that each of the 52 16-bit key sub-blocks used for decryption is the inverse of the key sub-block used during encryption In addition, the key sub-blocks must be used in the reverse order during decryption in order to reverse the encryption process

Implementation Although IDEA involves only simple 16-bit operations, software implementations of this algorithm still cannot offer the encryption rate required for on-line encryption in high-speed networks Software implementation running on a Sun Enterprise E4500 machine with twelve 400MHz Ultra-Hi processor, performs an encryption rate of 147.13Mb/sec, still cannot be applied to applications such as encryption for 155Mb/sec Asynchronous Transfer Mode (ATM) networks

Implementation (cont’) Hardware implementations offer significant speed improvements over software implementations In addition, they are likely to be cheaper, have lower power consumption and smaller footprint than a high speed software implementation A high performance implementation of the IDEA presented by Leong uses a novel bit-serial architecture to perform multiplication modulo 216 + 1; the implementation occupies a minimal amount of hardware

Implementation (cont’) The bit-serial architecture enabled the algorithm to be deeply pipelined to achieve a system clock rate of 125MHz An implementation on a Xilinx Virtex X CV300-4 was successfully tested, delivering a throughput of 500Mb/sec. With a X CV1000-6 device, the estimated performance is 2.35Gb/sec

Applications of IDEA Today, there are hundreds of IDEA-based security solutions available in many market areas, ranging from Financial Services, and Broadcasting to Government The IDEA algorithm can easily be embedded in any encryption software. Data encryption can be used to protect data transmission and storage. Typical fields are: Audio and video data for cable TV, pay TV, video conferencing, distance learning Sensitive financial and commercial data Email via public networks Smart cards

Conclusion As electronic communications grow in importance, there is also an increasing need for data protection When PGP (Pretty Good Privacy) was designed, the developers were looking for maximum security. IDEA was their first choice for data encryption The fundamental criteria for the development of IDEA were military strength for all security requirements and easy hardware and software implementation