Feistel Cipher Structure

Slides:



Advertisements
Similar presentations
CS457 – Introduction to Information Systems Security Cryptography 1a Elias Athanasopoulos
Advertisements

Cryptography and Network Security Chapter 3
Block Ciphers and the Data Encryption Standard
Cryptography and Network Security
1 Pertemuan 06 Kriptografi tradisional Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
1 Chapter 3 – Block Ciphers and the Data Encryption Standard Modern Block Ciphers  now look at modern block ciphers  one of the most widely used types.
1 Chapter 3 – Block Ciphers and the Data Encryption Standard Modern Block Ciphers  now look at modern block ciphers  one of the most widely used types.
Chapter 3 – Block Ciphers and the Data Encryption Standard
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Data Encryption Standard (DES). Symmetric Cryptography  C = E(P,K)  P = D(C,K)  Requirements  Given C, the only way to obtain P should be with  the.
IT 221: Classical and Modern Encryption Techniques Lecture 2: Classical and Modern Encryption Techniques For Educational Purposes Only Revised: September.
Feistel Model Last Updated: Aug 27, Feistel Cipher Structure Described by Horst Feistel (IBM) in 1973 Many symmetric encryption algorithms use this.
Network Security Lecture 14 Presented by: Dr. Munam Ali Shah.
Cryptography and Network Security
Feistel Cipher Structure
Data Security and Encryption (CSE348) 1. Lecture # 6 2.
Dr. Reuven Aviv, Nov 2008 Conventional Encryption 1 Conventional Encryption & Message Confidentiality Acknowledgements for slides Henric Johnson Blekinge.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Computer and Network Security Rabie A. Ramadan Lecture 3.
Chapter 2 Symmetric Encryption.
Module :MA3036NI Symmetric Encryption -3 Lecture Week 4.
Block Ciphers and the Data Encryption Standard. Modern Block Ciphers  One of the most widely used types of cryptographic algorithms  Used in symmetric.
CST 312 Pablo Breuer. A block of plaintext is treated as a whole and used to produce a ciphertext block of equal length Typically a block size of 64 or.
Lecture 4 Data Encryption Standard (DES) Dr. Nermin Hamza
Symmetric Encryption and Message Confidentiality
Cryptography and Network Security
Provides Confidentiality
Chapter3: Block Ciphers and the Data Encryption Standard
6b. Practical Constructions of Symmetric-Key Primitives.
Block Ciphers and the Data Encryption Standard
Symmetric Algorithm of Cryptography
Classical Encryption techniques
Data Encryption Standard
Simplified IDEA Cryptography and Network Security.
SYMMETRIC KEY ALGORITHMS
NET 311 Information Security
Cryptography and Network Security Chapter 3
PART VII Security.
Cryptography and Network Security
ICS 454: Principles of Cryptography
Fifth Edition by William Stallings
Block Ciphers and the Data Encryption Standard (DES)
Cryptography and Network Security
Chapter -2 Block Ciphers and the Data Encryption Standard
SYMMETRIC KEY ALGORITHMS
SYMMETRIC ENCRYPTION.
DATA ENCRYPTION STANDARD (DES)
Modern Cryptography.
Triple DES Network Security.
Basics Of Symmetric Encryption
Cryptanalysis Network Security.
Florida State University
ICS 555: Block Ciphers & DES Sultan Almuhammadi.
Hash Function Requirements
The RSA Public-Key Encryption Algorithm
Counter Mode, Output Feedback Mode
Advanced Encryption Standard
Cipher-Based MAC Network Security.
Elect. Codebook, Cipher Block Chaining
The RC4 Algorithm Network Security.
Stream Cipher Structure
Data Encryption Standard (DES)
Simple Hash Functions Network Security.
Presentation transcript:

Feistel Cipher Structure Network Security

Feistel Cipher Structure Objectives of the Topic After completing this topic, a student will be able to explain structure of Feistel Cipher.

Feistel Cipher Structure Figures and material in this topic have been adapted from “Network Security Essentials: Applications and Standards”, 2014, by William Stallings.

Feistel Cipher Structure Many symmetric block encryption algorithms have a structure, which was first described by Horst Feistel of IBM in 1973.

Feistel Cipher Structure Feistel Encryption The inputs to the encryption algorithm are a plaintext block of length 2w bits and a key K. The plaintext block is divided into two halves, LE0 and RE0.

Feistel Cipher Structure The two halves of the data pass through n rounds of processing and then combine to produce the ciphertext block.

Feistel Cipher Structure Each round i has as inputs LEi -1 and REi -1 derived from the previous round, as well as a subkey Ki derived from the overall K.

Feistel Cipher Structure In general, the subkeys Ki are different from K and from each other and are generated from the key by a subkey generation algorithm.

Feistel Cipher Structure In a given round, a substitution is performed on the left half of the data. Apply a round function F to the right half of the data and then take XOR of the output of that function and the left half of the data.

Feistel Cipher Structure The round function has the same general structure for each round but is parameterized by the round subkey Ki. A permutation is then performed to interchange the two halves of the data.

Feistel Cipher Structure Feistel Encryption 16 rounds

Feistel Cipher Structure Feistel Decryption Use the ciphertext as input to the algorithm, but use the subkeys Ki in reverse order. That is, use Kn in the first round, Kn-1 in the second round, and so on until K1 is used in the last round.

Feistel Cipher Structure Feistel Decryption

Feistel Cipher Structure Encryption Decryption

Feistel Cipher Structure Feistel Cipher Design Features: Block size: Larger block sizes mean greater security (all other things being equal) but reduced encryption/decryption speed.

Feistel Cipher Structure Key size: Larger key size means greater security but may decrease encryption/decryption speed.

Feistel Cipher Structure Number of rounds: The essence of a symmetric block cipher is that a single round offers inadequate security but that multiple rounds offer increasing security.

Feistel Cipher Structure Subkey generation algorithm: Greater complexity in this algorithm should lead to greater difficulty of cryptanalysis. Round function: Greater complexity generally means greater resistance to cryptanalysis.

Feistel Cipher Structure Fast software Algorithms: Encryption is embedded in applications or utility functions in such a way as to preclude a hardware implementation. Thus, speed of execution of the algorithm becomes a concern.

Feistel Cipher Structure Ease of analysis: If the algorithm can be concisely and clearly explained, it is easier to analyze that algorithm for cryptanalytic vulnerabilities and develop a higher level of assurance as to its strength. End