Blowfish Encryption Algorithm

Slides:



Advertisements
Similar presentations
Keyed, symmetric block cipher Designed in Can be used as a drop-in replacement for DES.
Advertisements

Origins  clear a replacement for DES was needed Key size is too small Key size is too small The variants are just patches The variants are just patches.
Chap. 5: Advanced Encryption Standard (AES) Jen-Chang Liu, 2005 Adapted from lecture slides by Lawrie Brown.
1 CIS 5371 Cryptography 5b. Pseudorandom Objects in Practice Block Ciphers.
Cryptography and Network Security Chapter 5 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 5
Cryptography and Network Security Chapter 3
Block Ciphers and the Data Encryption Standard
Cryptography and Network Security
AES clear a replacement for DES was needed
1 Overview of the DES A block cipher: –encrypts blocks of 64 bits using a 64 bit key –outputs 64 bits of ciphertext A product cipher –basic unit is the.
Cryptography and Network Security (AES) Dr. Monther Aldwairi New York Institute of Technology- Amman Campus 10/18/2009 INCS 741: Cryptography 10/18/20091Dr.
The Design of Improved Dynamic AES and Hardware Implementation Using FPGA 游精允.
Cryptography and Network Security Chapter 5. Chapter 5 –Advanced Encryption Standard "It seems very simple." "It is very simple. But if you don't know.
Cryptography and Network Security Chapter 5 Fourth Edition by William Stallings.
CS470, A.SelcukAfter the DES1 Block Ciphers After the DES CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Dr. Lo’ai Tawalbeh 2007 Chapter 5: Advanced Encryption Standard (AES) Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus.
Chapter 5 Advanced Encryption Standard. Origins clear a replacement for DES was needed –have theoretical attacks that can break it –have demonstrated.
Chapter 5 –Advanced Encryption Standard "It seems very simple." "It is very simple. But if you don't know what the key is it's virtually indecipherable."
Blowfish Algorithm. The Blowfish Encryption Algorithm Blowfish is a keyed, symmetric block cipher, designed in 1993 by Bruce Schneier and included in.
Blowfish A widely used block cipher. Blowfish Designed by Bruce Schneier (1993) A variant of it (Twofish) was an AES finalist candidate 64-bit block size,
9/17/15UB Fall 2015 CSE565: S. Upadhyaya Lec 6.1 CSE565: Computer Security Lecture 6 Advanced Encryption Standard Shambhu Upadhyaya Computer Science &
Advance Encryption Standard. Topics  Origin of AES  Basic AES  Inside Algorithm  Final Notes.
13. Other Block Ciphers 13.1 LUCIFER 13.2 MADRYGA 13.3 NEWDES 13.4 FEAL 13.5 REDOC 13.6 LOKI.
Description of a New Variable-Length Key, 64-Bit Block Cipher (BLOWFISH) Bruce Schneier BY Sunitha Thodupunuri.
Advanced Encryption Standard. Origins NIST issued a new version of DES in 1999 (FIPS PUB 46-3) DES should only be used in legacy systems 3DES will be.
Lecture 23 Symmetric Encryption
Chapter 2 (C) –Advanced Encryption Standard. Origins clearly a replacement for DES was needed –have theoretical attacks that can break it –have demonstrated.
Advanced Encryption Standard Dr. Shengli Liu Tel: (O) Cryptography and Information Security Lab. Dept. of Computer.
Chapter 2 Symmetric Encryption.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
Conventional Encryption Chapter 4. Multiple DES Advantage of extra stages –Each stage gives 56 more bits of key length –Double DES subject to meet-in-the-middle.
Fall 2002CS 395: Computer Security1 Chapters 5-6: Contemporary Symmetric Ciphers Triple DES Blowfish AES.
The Advanced Encryption Standard Part 1: Overview
@Yuan Xue Announcement Project Release Team forming Homework 1 will be released next Tuesday.
A Summary in Fifteen Minutes mas y menos
CSE565: Computer Security Lectures 5 & 6 Advanced Encryption Standard
Provides Confidentiality
CH15 –Security & Crypto.
Information Security and Management (Abstract) 5
School of Computer Science and Engineering Pusan National University
Blowfish Algorithm.
6b. Practical Constructions of Symmetric-Key Primitives.
Lecture 2.2: Private Key Cryptography II
Lecture 3: Symmetric Key Encryption
ADVANCED ENCRYPTION STANDARD
Cryptography Lecture 18.
Cryptography and Network Security
مروري برالگوريتمهاي رمز متقارن(كليد پنهان)
AES Objectives ❏ To review a short history of AES
ICS 454: Principles of Cryptography
Fifth Edition by William Stallings
Chapter -2 Block Ciphers and the Data Encryption Standard
Chapter -3 ADVANCED ENCRYPTION STANDARD & BLOCK CIPHER OPERATION
Advanced Encryption Standard
About Blowfish Encryption Video made by: Tudor Mare Sorin Nita Valentina Sociu Stefan Stefanescu.
SYMMETRIC ENCRYPTION.
BlowFish Algorithm.
Advanced Encryption Standard
Cryptography and Network Security Chapter 5 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography Lecture 17.
Modern Cryptography.
Information and Computer Security CPIS 312 Lab 4 & 5
Florida State University
ICS 555: Block Ciphers & DES Sultan Almuhammadi.
Advanced Encryption Standard
Stream Cipher Structure
Feistel Cipher Structure
Presentation transcript:

Blowfish Encryption Algorithm Joshua Job Gordon Standart

Introduction Reason Design Requirements and Decisions Design Elements Implementation Cryptanalysis Future Concerns

Reason / Justification DES Weaknesses S-boxes Too small Not sufficiently random Key management / complexity Other Issues Designed as general-purpose algorithm In the public domain C/C++, Java, C#, Visual Basic, Perl, Javascript One of the fastest block ciphers in widespread use Relatively large memory footprint. Generally not used for: Small embedded systems Early smartcards

Design Requirements Fast Compact Simple to code Flat keyspace Allow any random string (of required length) to be a possible key Easily modifiable for different security levels

Design Decisions Manipulate data in large blocks All operations use byte-sized blocks Operations use 32-bit blocks where possible Scalable Key (32 to 448 bits) Simple operation that are efficient on microprocessors XOR, Addition, Table lookup, etc Employ Precomputable Subkeys Variable number of iterations

Design Decisions If possible, have no weak keys If not possible: Unlikely to choose a weak key Make weak keys explicitly known No linear structures that reduce the complexity of exhaustive search Use a design that is simple to understand Facilitate analysis Increase confidence in the algorithm Feistel iterated block cipher

Design Elements 64-bit block cipher with variable length key Large key-dependent S-boxes More resistant to cryptanalysis Key-dependent permutations Diverse Mathematical Operations Combine XOR and addition

Implementation: Encryption Arrays: P – Number of rounds + 2 elements 4 S-boxes – 256 elements Wikipedia, http://en.wikipedia.org/wiki/Image:BlowfishDiagram.png

Implementation: Function F(x) Addition is mod 232 Wikipedia, http://upload.wikimedia.org/wikipedia/en/8/81/BlowfishFFunction.png

Implementation: Subkey and S-Box Generation Fill arrays with hexadecimal digits of pi Xor P array with the key Repeat Encrypt all zero string Replace two elements of p array or subkeys

Cryptanalysis Differential Attack Weak Keys After 4 rounds a differential attack is no better than a brute force attack Weak Keys S-box collisions

Future Concerns Simplifications Twofish Fewer and Smaller S-boxes Fewer Iterations On-the-fly subkey calculation Twofish AES Finalist 128-bit Block Size More Operations

Summary Reason / Justification Design Elements Implementation Cryptanalysis Future Concerns

References Wikipedia (for illustrations) Applied Cryptography http://en.wikipedia.org/wiki/Blowfish_cipher Applied Cryptography Bruce Schneier John Wiley and Sons, Inc. 1996 The Blowfish Paper http://www.schneier.com/paper-blowfish-fse.html