Stream Cipher Structure

Slides:



Advertisements
Similar presentations
ECE454/CS594 Computer and Network Security
Advertisements

“Advanced Encryption Standard” & “Modes of Operation”
Cryptography and Network Security Chapter 3
Block Ciphers and the Data Encryption Standard
Cryptography and Network Security
First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown and edited by Archana Chidanandan Cryptographic Tools.
Stream cipher diagram + + Recall: One-time pad in Chap. 2.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 5 Wenbing Zhao Department of Electrical and Computer Engineering.
Lecture 23 Symmetric Encryption
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Lecture 3: Cryptographic Tools modified from slides of Lawrie Brown.
Cryptanalysis. The Speaker  Chuck Easttom  
Modes of Operation. Topics  Overview of Modes of Operation  EBC, CBC, CFB, OFB, CTR  Notes and Remarks on each modes.
Differential Cryptanalysis - quite similar to linear cryptanalysis - exploits the relationship between the difference of two inputs and the difference.
One-Time Pad Or Vernam Cipher Sayed Mahdi Mohammad Hasanzadeh Spring 2004.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Chapter 20 Symmetric Encryption and Message Confidentiality.
The Misuse of RC4 in Microsoft Office A paper by: Hongjun Wu Institute for Infocomm Research, Singapore ECE 578 Matthew Fleming.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Stream Cipher July 2011.
More About DES Cryptography and Network Security Reference: Sec 3.1 of Stallings Text.
Modes of Usage Dan Fleck CS 469: Security Engineering These slides are modified with permission from Bill Young (Univ of Texas) 11 Coming up: Modes of.
Modes of Operation INSTRUCTOR: DANIA ALOMAR. Modes of Operation A block cipher can be used in various methods for data encryption and decryption; these.
Stream Ciphers and Block Ciphers A stream cipher is one that encrypts a digital data stream one bit or one byte at a time. Examples of classical stream.
Lecture 23 Symmetric Encryption
Wired Equivalent Privacy (WEP) Chris Overcash. Contents What is WEP? What is WEP? How is it implemented? How is it implemented? Why is it insecure? Why.
CST 312 Pablo Breuer. A block of plaintext is treated as a whole and used to produce a ciphertext block of equal length Typically a block size of 64 or.
Block Cipher Modes Last Updated: Aug 25, ECB Mode Electronic Code Book Divide the plaintext into fixed-size blocks Encrypt/Decrypt each block independently.
Modes of Operation block ciphers encrypt fixed size blocks – eg. DES encrypts 64-bit blocks with 56-bit key need some way to en/decrypt arbitrary amounts.
Symmetric Encryption and Message Confidentiality
Chapter6: More on Symmetric Ciphers
Chapter3: Block Ciphers and the Data Encryption Standard
Symmetric Encryption and Message Confidentiality
Outline Desirable characteristics of ciphers Stream and block ciphers
Unit -1.
Presented by: Dr. Munam Ali Shah
Lecture 2.2: Private Key Cryptography II
NET 311 Information Security
Block Cipher Modes CS 465 Make a chart for the mode comparisons
Stream Cipher.
Pseudo Random Number Generators
ICS 454: Principles of Cryptography
Block Ciphers and the Data Encryption Standard (DES)
ADVANCED ENCRYPTION STANDARDADVANCED ENCRYPTION STANDARD
Chapter -2 Block Ciphers and the Data Encryption Standard
SYMMETRIC ENCRYPTION.
Chapter -4 STREAM CIPHERS
Cryptanalysis of Block Ciphers
Triple DES Network Security.
Basics Of Symmetric Encryption
Information and Computer Security CPIS 312 Lab 4 & 5
Cryptanalysis Network Security.
ICS 555: Block Ciphers & DES Sultan Almuhammadi.
Pseudorandom Numbers Network Security.
Hash Function Requirements
The RSA Public-Key Encryption Algorithm
Counter With Cipher Block Chaining-MAC
Counter Mode, Output Feedback Mode
Advanced Encryption Standard
Cipher-Based MAC Network Security.
Elect. Codebook, Cipher Block Chaining
The RC4 Algorithm Network Security.
Feistel Cipher Structure
Message Authentication
Data Encryption Standard (DES)
Simple Hash Functions Network Security.
The Use of Random Numbers
Presentation transcript:

Stream Cipher Structure Network Security

Stream Cipher Structure Objectives of the Topic After completing this topic, a student will be able to describe the basic structure of stream ciphers.

Stream Cipher Structure Figures and material in this topic have been adapted from “Network Security Essentials: Applications and Standards”, 2014, by William Stallings.

Stream Cipher Structure A stream cipher processes the input elements continuously, producing output one element at a time as it goes along.

Stream Cipher Structure A typical stream cipher encrypts plaintext one byte at a time, although a stream cipher may be designed to operate on one bit at a time or on units larger than a byte at a time.

Stream Cipher Structure In a stream cipher structure, a key is input to a pseudorandom bit generator that produces a stream of 8-bit numbers that are apparently random.

Stream Cipher Structure A pseudorandom stream is one that is unpredictable without knowledge of the input key and which has an apparently random character.

Stream Cipher Structure The output of the generator called a keystream, is combined one byte at a time with the plaintext stream using the bitwise exclusive-OR (XOR) operation.

Stream Cipher Structure

Stream Cipher Structure Example if the next byte generated by the generator is 01101100 and the next plaintext byte is 11001100, then the resulting ciphertext byte is

Stream Cipher Structure Decryption requires the use of the same pseudorandom sequence

Stream Cipher Structure Stream Cipher design considerations: 1. The encryption sequence should have a large period.

Stream Cipher Structure A pseudorandom number generator uses a function that produces a deterministic stream of bits that eventually repeats. The longer the period of repeat, the more difficult it will be to do cryptanalysis.

Stream Cipher Structure 2. The keystream should approximate the properties of a true random number stream as close as possible.

Stream Cipher Structure There should be an approximately equal number of 1s and 0s. If the keystream is treated as a stream of bytes, then all of the 256 possible byte values should appear approximately equally often.

Stream Cipher Structure The more random-appearing the keystream is, the more randomized the ciphertext is, making cryptanalysis more difficult.

Stream Cipher Structure 3. As the output of the pseudorandom number generator is conditioned on the value of the input key, to guard against brute-force attacks, the key needs to be sufficiently long.

Stream Cipher Structure With the current technology, a key length of at least 128 bits is desirable. The primary advantage of a stream cipher is that stream ciphers are almost always faster and use far less code than do block ciphers.

Stream Cipher Structure The advantage of a block cipher is that you can reuse keys. If two plaintexts are encrypted with the same key using a stream cipher, then cryptanalysis is often quite simple.

Stream Cipher Structure For applications that deal with stream of data, a stream cipher is preferred. For applications that deal with blocks of data (file transfer, e-mail), block ciphers may be more appropriate. End