Encryption Basics Types of ciphers Algorithms Modes Key Length

Slides:



Advertisements
Similar presentations
“Advanced Encryption Standard” & “Modes of Operation”
Advertisements

CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
Web Security for Network and System Administrators1 Chapter 4 Encryption.
Cryptography1 CPSC 3730 Cryptography Chapter 6 Triple DES, Block Cipher Modes of Operation.
1 Lect. 9 : Mode of Operation. 2 Modes of Operation – ECB Mode  Electronic Code Book Mode Break a message into a sequence of plaintext blocks Each plaintext.
Chapter 5 Cryptography Protecting principals communication in systems.
Modes of Operation CS 795. Electronic Code Book (ECB) Each block of the message is encrypted with the same secret key Problems: If two identical blocks.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
Introduction to Symmetric Block Cipher Jing Deng Based on Prof. Rick Han’s Lecture Slides Dr. Andreas Steffen’s Security Tutorial.
Lecture 23 Symmetric Encryption
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
CS470, A.SelcukModes of Operation1 Encrypting with Block Ciphers CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Data Encryption Standard (DES). Symmetric Cryptography  C = E(P,K)  P = D(C,K)  Requirements  Given C, the only way to obtain P should be with  the.
1 Chapter 4 Encryption. 2 Objectives In this chapter, you will: Learn the basics of encryption technology Recognize popular symmetric encryption algorithms.
Block Cipher Transmission Modes CSCI 5857: Encoding and Encryption.
Cryptography and Network Security Chapter 6. Multiple Encryption & DES  clear a replacement for DES was needed theoretical attacks that can break it.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Lec. 5 : History of Cryptologic Research II
TE/CS 536 Network Security Spring 2006 – Lectures 6&7 Secret Key Cryptography.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
Cryptography Chapter 7 Part 2 Pages 781 to 812. Symmetric Cryptography Secret Key Figure 7-10 on page 782 Key distribution problem – Secure courier Many.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Multiple Encryption & DES  clearly a replacement for DES was needed Vulnerable to brute-force key search attacks Vulnerable to brute-force key search.
Chapter 9: Algorithms Types and Modes Dulal C. Kar Based on Schneier.
Encryption Types & Modes Chapter 9 Encryption Types –Stream Ciphers –Block Ciphers Encryption Modes –ECB - Electronic Codebook –CBC - Cipher Block Chaining.
More About DES Cryptography and Network Security Reference: Sec 3.1 of Stallings Text.
Data Encryption Standard (DES) © 2000 Gregory Kesden.
Lecture 4 Page 1 CS 236 Stream and Block Ciphers Stream ciphers convert one symbol of plaintext immediately into one symbol of ciphertext Block ciphers.
BLOCK CIPHER SYSTEMS OPERATION MODES OF DATA ENCRYPTION STANDARD (DES)
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
Modes of Usage Dan Fleck CS 469: Security Engineering These slides are modified with permission from Bill Young (Univ of Texas) 11 Coming up: Modes of.
Modes of Operation INSTRUCTOR: DANIA ALOMAR. Modes of Operation A block cipher can be used in various methods for data encryption and decryption; these.
Stream Ciphers and Block Ciphers A stream cipher is one that encrypts a digital data stream one bit or one byte at a time. Examples of classical stream.
Lecture 23 Symmetric Encryption
1 Symmetric key cryptography: DES DES: Data Encryption Standard US encryption standard [NIST 1993] 56-bit symmetric key, 64 bit plaintext input How secure.
Privacy and Integrity: “ Two Essences of Network Security” Presenter Prosanta Gope Advisor Tzonelih Hwang Quantum Information and Network Security Lab,
Lecture 4 Page 1 CS 236 Stream and Block Ciphers Stream ciphers convert one symbol of plaintext immediately into one symbol of ciphertext Block ciphers.
Cipher Transmission and Storage Modes Part 2: Stream Cipher Modes CSCI 5857: Encoding and Encryption.
Block Cipher Modes Last Updated: Aug 25, ECB Mode Electronic Code Book Divide the plaintext into fixed-size blocks Encrypt/Decrypt each block independently.
Modes of Operation block ciphers encrypt fixed size blocks – eg. DES encrypts 64-bit blocks with 56-bit key need some way to en/decrypt arbitrary amounts.
Block Cipher Encrypting a large message Electronic Code Book (ECB) message m1 m2 m3 m4 m5 m6 c1 c2 c3 c4 c5 c6 E E E Secret.
CS480 Cryptography and Information Security
Computer and Network Security
Symmetric Cryptography
IT443 – Network Security Administration Instructor: Bo Sheng
Row Transposition Ciphers
(Data Encryption Standard)
Outline Desirable characteristics of ciphers Stream and block ciphers
Lecture 3: Symmetric Key Encryption
Block Cipher Modes CS 465 Make a chart for the mode comparisons
Cryptography Basics and Symmetric Cryptography
Cryptography This week we are going to use OpenSSL
مروري برالگوريتمهاي رمز متقارن(كليد پنهان)
Block cipher and modes of encryptions
PART VII Security.
Cryptography and Network Security
Algorithm Types & Algorithm Modes
Symmetric-Key Encryption
Block vs Stream Ciphers
ADVANCED ENCRYPTION STANDARDADVANCED ENCRYPTION STANDARD
Block Ciphers: DES and AES
SYMMETRIC ENCRYPTION.
Block Ciphers (Crypto 2)
Counter Mode, Output Feedback Mode
Elect. Codebook, Cipher Block Chaining
Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.
Secret-Key Encryption
Presentation transcript:

Encryption Basics Types of ciphers Algorithms Modes Key Length Internet Cryptography by Richard Smith (33 – 42) 2019/5/11

Encryption using Exclusive-OR 2019/5/11

Example - encryption Assume the plaintext is 1 1 0 0 And the key is 1 0 1 0 The encrypted message (ciphertext) using exclusive-or is: 1 1 0 0 (plaintext) 1 0 1 0 (key) 0 1 1 0 (Ciphertext) 2019/5/11

Example - decryption Assume the ciphertext is 0 1 1 0 And the key is 1 0 1 0 (asymmetric key) The decrypted message (plaintext) using exclusive-or is: 0 1 1 0 (ciphertext) 1 0 1 0 (key) 1 1 0 0 (original plaintext) 2019/5/11

Exercise – using exclusive-OR is called substitution Given the plaintext is 11001010 and the key is 10101010, determine the ciphertext using exclusive-or. The answer is 1100101010101010 = 01100000 Given the ciphertext is 01100000 and the key is 10101010, determine the plaintext using exclusive-or. The answer is 0110000010101010 = 11001010 Think about the answer if the key is 10101000 2019/5/11

Transposition 0 0 1 0 1 1 0 1  bit 0 ciphertext It is to re-position the bit position using an agreed method (algorithm) 1 0 1 1 0 0 1 0  bit 0 plaintext 0 0 1 0 1 1 0 1  bit 0 ciphertext 2019/5/11

Exercise Given the plaintext is 10100011, determine the ciphertext using the previous algorithm. The answer is : 0 0 10 11 10 To decrypt it, you have to reverse the process. Determine the plaintext, if the ciphertext is 11001100. 2019/5/11

Type of Ciphers There are two types: Stream and Block Stream cipher: It is designed to accept a crypto key and a steam of plaintext to produce a stream of ciphertext Block cipher It is designed to take a block of a particular size, encrypt them with a key of a particular size and yield a block of cipertext block that is the same size of he plainetxt block. 2019/5/11

Stream of Ciphers The simplest stream cipher is called the Vernam cipher. A bit from the key is added with the carry discarded. (exclusive-or) 2019/5/11

Properties of stream and block cipher algorithms Stream cipher: Vernam cipher Block ciphers that are in use (uses complex method, not just exclusive-or) Secret Key Block Data Block Crypto Key Size DES (data encryption standard) 64 56 International Data Encryption Algorithm 128 SKIPJACK 80 2019/5/11

Example of stream cipher Give the key pattern of a stream cipher at a particular moment is: ...10011100100111001001110010011100... Determine the ciphertext, given the stream of plaintext at that moment is ..1010101001010101 1010101001010101.. Recall that 1+1 = 0 (remove the carry), 1+0 = 1, 0 + 1= 1, 0 + 0 = 0 (You can use exclusive or as well.) The answer is: ...00110110110010010011011011001001.. 2019/5/11

Problem of Block cipher Assume that you want to encrypt a plaintext of “book by book” and the key is 32-bit length (4 bytes). The ciphertext can be “%6Yiui90%6Yi”. You know that The first ciphertext book is %6Yi The ciphertext _by_ (_ means space) is ui90 and second ciphertext is %6Yi. You find that it is vulnerable (easy) to decrypt. 2019/5/11

Diagram of Electronic Code Book Drawback: same output for the same input, it is very easy to decrypt. 2019/5/11

NOTE- Electronic Code Book Mode WE EXPECT, the same plaintext will not produce the same ciphertext pattern The ciphertext depends on the initialization vector as well. That is why the initalization vector should pass to the remote as well. If it is corrupted, it never reproduces the same plaintext. (here, the vector is a random 32-bit pattern) 2019/5/11

Block Ciphers There are four common methods to resolve the above problem: Electronic Code Book  not block (already mentioned) Cipher Block Chaining Cipher Feedback Output Feedback Block 2019/5/11

Cipher Block Chaining 2019/5/11 Note: The output depends on the initialized vector, also same input will not produce the same output.

Cipher Feedback 2019/5/11

Cipher Feedback It is similar to CBC except that it feeds the ciphertext book back through the block cipher. This mode is called CTAK in military systems. An advantage is that: it is not limited to the cipher’s block size. 2019/5/11

Output Feedback 2019/5/11

Output Feedback Block (OFB) OFB is similar to Cipher feedback but is simpler. The output from the encryption is connected to the input of next encryption stage. 2019/5/11

Brute Force - key lengths and the time to crack the system Type of Key Key length No. of keys Time to test one case AVG time (divided by 2) 3-digit luggage lock 10 (2^10 = 1024) 1000 2 sec 17 min (2 sec x 1000/2)/60 sec) 4-digit bank card 14 10000 60 sec 3.5 days Netscape export crypto 40 1099511627776 50 micro sec 10 months DES key 56 72057594037927900 52780 years 2019/5/11

Summary Simple encryption using exclusive-or (add without carry out) and transposition Type of encryption: stream and block Block uses fixed length plaintext and key Block mode: Electronic code book (ECB), cipher block chaining, cipher feedback and output feedback Drawback of ECB: It is easy to be cracked. 2019/5/11