Counter Mode, Output Feedback Mode

Slides:



Advertisements
Similar presentations
ECE454/CS594 Computer and Network Security
Advertisements

“Advanced Encryption Standard” & “Modes of Operation”
Encipherment Using Modern Symmetric-Key Ciphers. 8.2 Objectives ❏ To show how modern standard ciphers, such as DES or AES, can be used to encipher long.
Modern Symmetric-Key Ciphers
Modern Symmetric-Key Ciphers
8.1 Chapter 8 Encipherment Using Modern Symmetric-Key Ciphers Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Modern Symmetric-Key Ciphers
Cryptography and Network Security Chapter 6 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 6. Chapter 6 – Block Cipher Operation Many savages at the present day regard their names as vital parts of themselves,
Cryptography1 CPSC 3730 Cryptography Chapter 6 Triple DES, Block Cipher Modes of Operation.
Block Ciphers 1 Block Ciphers Block Ciphers 2 Block Ciphers  Modern version of a codebook cipher  In effect, a block cipher algorithm yields a huge.
1 Lect. 9 : Mode of Operation. 2 Modes of Operation – ECB Mode  Electronic Code Book Mode Break a message into a sequence of plaintext blocks Each plaintext.
Modes of Operation CS 795. Electronic Code Book (ECB) Each block of the message is encrypted with the same secret key Problems: If two identical blocks.
Chapter 3 – Block Ciphers and the Data Encryption Standard Jen-Chang Liu, 2004 Adopted from lecture slides by Lawrie Brown.
CSCE 790G: Computer Network Security Chin-Tser Huang University of South Carolina.
CS470, A.SelcukModes of Operation1 Encrypting with Block Ciphers CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Block Cipher Transmission Modes CSCI 5857: Encoding and Encryption.
Modes of Operation. Topics  Overview of Modes of Operation  EBC, CBC, CFB, OFB, CTR  Notes and Remarks on each modes.
Information Security and Management 3. Block Ciphers and the Data Encryption Standard Chih-Hung Wang Fall
Cryptography and Network Security Chapter 6. Multiple Encryption & DES  clear a replacement for DES was needed theoretical attacks that can break it.
Lecture 4: Using Block Ciphers
Cryptography and Network Security
Block ciphers Structure of a multiround block cipher
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
3DES and Block Cipher Modes of Operation CSE 651: Introduction to Network Security.
Multiple Encryption & DES  clearly a replacement for DES was needed Vulnerable to brute-force key search attacks Vulnerable to brute-force key search.
Chapter 9: Algorithms Types and Modes Dulal C. Kar Based on Schneier.
Encryption Types & Modes Chapter 9 Encryption Types –Stream Ciphers –Block Ciphers Encryption Modes –ECB - Electronic Codebook –CBC - Cipher Block Chaining.
More About DES Cryptography and Network Security Reference: Sec 3.1 of Stallings Text.
Chapter 2 (B) – Block Ciphers and Data Encryption Standard.
Lecture 4 Page 1 CS 236 Stream and Block Ciphers Stream ciphers convert one symbol of plaintext immediately into one symbol of ciphertext Block ciphers.
1.1 Chapter 8 Encipherment Using Modern Symmetric-Key Ciphers Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
BLOCK CIPHER SYSTEMS OPERATION MODES OF DATA ENCRYPTION STANDARD (DES)
Shambhu Upadhyaya Security – AES-CCMP Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 13)
Modes of Usage Dan Fleck CS 469: Security Engineering These slides are modified with permission from Bill Young (Univ of Texas) 11 Coming up: Modes of.
Modes of Operation INSTRUCTOR: DANIA ALOMAR. Modes of Operation A block cipher can be used in various methods for data encryption and decryption; these.
Stream Ciphers and Block Ciphers A stream cipher is one that encrypts a digital data stream one bit or one byte at a time. Examples of classical stream.
Cryptography and Network Security Chapter 6 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Privacy and Integrity: “ Two Essences of Network Security” Presenter Prosanta Gope Advisor Tzonelih Hwang Quantum Information and Network Security Lab,
Lecture 4 Page 1 CS 236 Stream and Block Ciphers Stream ciphers convert one symbol of plaintext immediately into one symbol of ciphertext Block ciphers.
Cryptography and Network Security
Cipher Transmission and Storage Modes Part 2: Stream Cipher Modes CSCI 5857: Encoding and Encryption.
Block Cipher Modes Last Updated: Aug 25, ECB Mode Electronic Code Book Divide the plaintext into fixed-size blocks Encrypt/Decrypt each block independently.
Modes of Operation block ciphers encrypt fixed size blocks – eg. DES encrypts 64-bit blocks with 56-bit key need some way to en/decrypt arbitrary amounts.
CS480 Cryptography and Information Security
Modes of Operation.
Algorithm Modes ECB, CBC, CFB, OFB.
Computer and Network Security
Chapter 6 – Block Cipher Operation
Cryptography and Network Security Chapter 6
Outline Desirable characteristics of ciphers Stream and block ciphers
Block Cipher Modes CS 465 Make a chart for the mode comparisons
3DES, AES, and Modes of Operation
Block cipher and modes of encryptions
PART VII Security.
Cryptography and Network Security
Algorithm Types & Algorithm Modes
Block vs Stream Ciphers
Block Ciphers: DES and AES
Cryptography and Network Security Chapter 6
Counter With Cipher Block Chaining-MAC
Elect. Codebook, Cipher Block Chaining
The RC4 Algorithm Network Security.
Stream Cipher Structure
Feistel Cipher Structure
Simple Hash Functions Network Security.
Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.
Secret-Key Encryption
Presentation transcript:

Counter Mode, Output Feedback Mode Network Security

Counter Mode, Output Feedback Mode Objectives of the Topic After completing this topic, a student will be able to explain counter and output feedback modes.

Counter Mode, Output Feedback Mode Figures and material in this topic have been adapted from “Network Security Essentials”, 2014, by William Stallings. W. Stallings, “Crypto. and Network Security Principles and Practice”, Pearson Education, 2014

Counter Mode, Output Feedback Mode Electronic Codebook Mode (ECB) Cipher Block Chaining Mode (CBC) Cipher Feedback Mode (CFB) Output Feedback (OFB) Counter Mode (CTR)

Counter Mode, Output Feedback Mode Similar in structure to that of CFB. For OFB, the output of encryption function is fed back to become the input for encrypting the next block of plaintext.

Counter Mode, Output Feedback Mode The OFB mode operates on full blocks of plaintext and ciphertext, whereas CFB operates on an s-bit subset.

Counter Mode, Output Feedback Mode The OFB mode requires a nonce; an initialization vector, unique to each execution of the encryption operation. Sequence of encryption output blocks depends only on the key and the IV and not on plaintext.

Counter Mode, Output Feedback Mode

Counter Mode, Output Feedback Mode

Counter Mode, Output Feedback Mode An advantage of the OFB method is that bit errors in transmission do not propagate. The disadvantage of OFB is that it is more vulnerable to a message stream modification attack than is CFB.

Counter Mode, Output Feedback Mode Employed in applications to ATM (asynchronous transfer mode), network security and IPSec (IP security). A counter equal to the plaintext block size is used in this mode.

Counter Mode, Output Feedback Mode The counter value must be different for each plaintext block that is encrypted. Typically, the counter is initialized to some value and then incremented by 1 for each subsequent block (modulo 2b, where b is block size).

Counter Mode, Output Feedback Mode For encryption, the counter is encrypted and then XORed with the plaintext block to produce the ciphertext block. There is no chaining.

Counter Mode, Output Feedback Mode

Counter Mode, Output Feedback Mode For decryption, the same sequence of counter values is used, with each encrypted counter XORed with a ciphertext block to recover the corresponding plaintext block.

Counter Mode, Output Feedback Mode

Counter Mode, Output Feedback Mode Advantages of Counter Mode: Preprocessing when the plaintext or ciphertext input is presented, the only computation is a series of XORs, greatly enhancing throughput.

Counter Mode, Output Feedback Mode Random access The ith block of plaintext or ciphertext can be processed in random-access fashion Provable security CTR can be shown to be at least as secure as the other modes.

Counter Mode, Output Feedback Mode Hardware efficiency Encryption/decryption can be done in parallel on multiple blocks of plaintext or ciphertext Software efficiency Processors that support parallel features can be effectively utilized.

Counter Mode, Output Feedback Mode Simplicity Requires only the implementation of the encryption algorithm and not the decryption algorithm End