Cryptology Design Fundamentals

Slides:



Advertisements
Similar presentations
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
Advertisements

PAUL CUFF ELECTRICAL ENGINEERING PRINCETON UNIVERSITY A Framework for Partial Secrecy.
Revision of Chapter III For an information source {p i, i=1,2,…,N} its entropy is defined by Shannon’s first theorem: For an instantaneous coding, we have.
Shannon ’ s theory part II Ref. Cryptography: theory and practice Douglas R. Stinson.
CS470, A.SelcukIntroduction1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
CryptographyPerfect secrecySlide 1 Today What does it mean for a cipher to be: –Computational secure? Unconditionally secure? Perfect secrecy –Conditional.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
CMSC 414 Computer and Network Security Lecture 5 Jonathan Katz.
Computer Security CS 426 Lecture 3
PAUL CUFF ELECTRICAL ENGINEERING PRINCETON UNIVERSITY Secure Communication for Distributed Systems.
Block and Stream Ciphers1 Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
Dan Boneh Stream ciphers The One Time Pad Online Cryptography Course Dan Boneh.
EE5552 Network Security and Encryption block 4 Dr. T.J. Owens CEng MIET Dr T. Itagaki MIET, MIEEE, MAES.
David Evans CS551: Security and Privacy University of Virginia Computer Science Lecture 2: Breaking Unbreakable Ciphers.
CRYPTANALYSIS OF STREAM CIPHER Bimal K Roy Cryptology Research Group Indian Statistical Institute Kolkata.
1 Information Theory Nathanael Paul Oct. 09, 2002.
1 Lecture 7 System Models Attributes of a man-made system. Concerns in the design of a distributed system Communication channels Entropy and mutual information.
CHAPTER 14 ENCRYPTION AND DECRYPTION Sajina Pradhan
PRESENTATION ON SECURE SOCKET LAYER (SSL) BY: ARZOO THAKUR M.E. C.S.E (REGULAR) BATCH
CMSC 414 Computer (and Network) Security Lecture 3 Jonathan Katz.
Page : 1 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 Lecture-6 Ciphering and the.
Page : 1 Date : Duration : 90 Minutes Maximum marks 70% Vorname ……………………………………….. Nachname ……………………………………….. Matrikel-Nr. ………………………………………..
Page : 1 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 Tutorial-5 Theory of Secret-Key.
Public-Key Cryptography ElGamal Public-Key Crypto-System
Cryptographic Protocols Secret sharing, Threshold Security
Rabin Lock and Public-Key Systems
Public-Key Cryptography RSA Rivest-Shamir-Adelmann Public-Key System
CSCE 715: Network Systems Security
Design Problems (Open book)
Cryptology Design Fundamentals
Cryptology Design Fundamentals
Sample Solution Cryptology Design Fundamentals
Ciphering and the Theory of Secrecy Systems
COT 5611 Operating Systems Design Principles Spring 2012
Chapter 3:Cryptography (16M)
Information-Theoretic Secrecy
COT 5611 Operating Systems Design Principles Spring 2014
ElGamal Public-Key Systems over GF(p) & GF(2m)
Rivest, Shamir and Adleman
CS/ECE 478 Network Security Dr. Attila Altay Yavuz
STREAM CIPHERS by Jennifer Seberry.
Using Secret Key to Foil an Eavesdropper
Section 2: Cryptography
Homework #1 Chap. 1, 3, 4 J. H. Wang Oct. 2, 2018.
Cryptology Design Fundamentals
Cryptology Design Fundamentals
Cryptology Design Fundamentals
Cryptology Design Fundamentals
Cryptology Design Fundamentals
Cryptology Design Fundamentals
Cryptology Design Fundamentals
Cryptology Design Fundamentals
Cryptology Design Fundamentals
Cryptology Design Fundamentals
Cryptology Design Fundamentals
Sample Solution Cryptology Design Fundamentals
Sample Solution Final exam: Cryptology Design Fundamentals
Cryptology Design Fundamentals
Cryptology Design Fundamentals
Cryptology Design Fundamentals
Cryptology Design Fundamentals
Cryptology System Design Fundamentals
Cryptographic Protocols Secret Sharing, Threshold Security
Network Security Tutorial-14 Design Fundamentals IPSEC, KERBEROS
Cryptology Design Fundamentals
Cryptology Design Fundamentals
Cipher-Based MAC Network Security.
Network Security Tutorial-14 Design Fundamentals IPSEC, KERBEROS
Cryptology Design Fundamentals
Ciphering and the Theory of Secrecy Systems
Presentation transcript:

Cryptology Design Fundamentals Grundlagen des kryptographischen Systementwurfs Module ID: ET-IDA-048 27.11.2018, v27 Prof. W. Adi Tutorial-5 Theory of Secret-Key Ciphers

Plain Text Padding PTP: Summary of security fundamentals Shannon security theorem: Perfect Security condition is H (Z)  H (X) Where r is the clear text redundancy Unicity Distance nu H(Z)= Key entropy, H(x)=Information entropy, N information length, K key length Plain Text Padding PTP: Clear text redundancy and N After PTP: r ¢ N Bits L Bits padding = r L + N Clear text H(X) Random pattern u nu N L n + = ¢ New unicity distance:

Problem 5-1: A cipher encrypting an information block of 250 bits. The entropy of the information source is 150 bits. The key length of the cipher is 64 bits. How many cryptogram (cipher text) bits are at least necessary for an attacker to observe, in order to be theoretically capable to break the cipher. Solution 5-1: The minimum number of cipher text bits necessary to enable theoretically breaking the cipher is the unicity distance nu Where: K is the cipher key length and r the clear text redundancy The Information redundancy is : = 250 – 150 / 250 = 0.40 The minimum number of cryptogram bits to break the cipher is nu = K/r = 64/0.4 = 160 bits

Problem 5-2: Solution 5-2: nu N L n + = ¢ A cipher having a key length of 80 bits is encrypting a clear text information block of length 800 bits having an information entropy of 300 bits. Compute the unicity distance of the cipher. Find the new unicity distance if a random pattern of 1000 bits is appended to the information block. How much Is the change in the new channel data rate Solution 5-2: 1. The unicity distance can be found by substituting in the formula: , r is to be computed. = 800-300/800 = 0.625, = 80 / 0.625 = 128 bits 2. The new unicity distance  nu’ = (800 +1000/800) 128 =288 bits 3. 800 useful data bits and 1000 non-useful random bits are appended to enhance security however, these additional random bits include no transmitted information. percentage of useful data is = 800 / (800 + 1000) = 44% thus the channel data rate is reduced by 100% -44% = 56% u nu N L n + = ¢

Problem 5-3: Solution 5-3: nu N L n + = ¢ A cipher is to be designed with a unicity distance of 2500 bits. Compute the key length required for the cipher if the encrypted clear text block length is 1000 bits and clear text entropy is 500 bits. Find the required data compression to reduce the key length by 20% without reducing the system security (unicity distance). The unicity distance is to be increased to 3000 bits, how many random bits are to be padded to the information block to achieve the new unicity distance Solution 5-3: 1. The key length can be found by substituting in the relation: Where: nu=2500 and = 1000-500/1000 = 0.5,  2500 = K/0.5 => K = 1250 bits 2. To reduce the key length by 20%= 1250 x 0.2 = 250 bits to become 1000 bits, and still keep the unicity distance unchanged =2500, the new redundancy is r = K/nu= 1000/2500 = 0.4 to find the new data length, substitute in the redundancy formula  0.4 =(N-500)/N => N=833 bits (data compressed to 833 bits) 3.  3000 = [(L + 833)/833] 2500 => L=167 random bits are to be appended to 833 u nu N L n + = ¢