Dan Boneh Block ciphers Exhaustive Search Attacks Online Cryptography Course Dan Boneh.

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

6.1.2 Overview DES is a block cipher, as shown in Figure 6.1.
AES Advanced Encryption Standard
Symmetric Encryption Prof. Ravi Sandhu.
Encryption.
DES The Data Encryption Standard (DES) is a classic symmetric block cipher algorithm. DES was developed in the 1970’s as a US government standard The block.
Lect. 8 : Advanced Encryption Standard
Dan Boneh Message integrity Message Auth. Codes Online Cryptography Course Dan Boneh.
Computer Security Set of slides 3 Dr Alexei Vernitski.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Avalanche Effect in DES key desirable property of encryption algo where a change of one input or key bit results in changing approx half output bits making.
DATA ENCRYPTION STANDARD (DES). Outline History Encryption Key Generation Decryption Strength of DES Ultimate.
Dan Boneh Using block ciphers Modes of operation: one time key Online Cryptography Course Dan Boneh example: encrypted , new key for every message.
Trusted 3rd parties Basic key exchange
Lecture 5: Cryptographic Hashes
Cryptography: Block Ciphers
Conventional Encryption: Algorithms
Online Cryptography Course Dan Boneh
Dan Boneh Stream ciphers Real-world Stream Ciphers Online Cryptography Course Dan Boneh.
1 CIS 5371 Cryptography 5b. Pseudorandom Objects in Practice Block Ciphers.
1 PRPs and PRFs CS255: Winter Abstract ciphers: PRPs and PRFs, 2.Security models for encryption, 3.Analysis of CBC and counter mode Dan Boneh, Stanford.
Cryptography and Network Security Chapter 3
Dan Boneh Message Integrity A Parallel MAC Online Cryptography Course Dan Boneh.
Notation Intro. Number Theory Online Cryptography Course Dan Boneh
1 CS 255 Lecture 4 Attacks on Block Ciphers Brent Waters.
CS Network Security Lecture 2 Prof. Katz. 9/7/2000Lecture 2 - Data Encryption2 DES – Data Encryption Standard Private key. Encrypts by series of.
Lecture 2.2: Private Key Cryptography II CS 436/636/736 Spring 2012 Nitesh Saxena.
Cryptanalysis on Substitution- Permutation Networks Jen-Chang Liu, 2005 Ref: Cryptography: Theory and Practice, D. R. Stinson.
Dan Boneh Basic key exchange The Diffie-Hellman protocol Online Cryptography Course Dan Boneh.
Dan Boneh Public Key Encryption from trapdoor permutations The RSA trapdoor permutation Online Cryptography Course Dan Boneh.
CS555Spring 2012/Topic 91 Cryptography CS 555 Topic 9: Block Cipher Construction & DES.
Dan Boneh Public Key Encryption from trapdoor permutations RSA in practice Online Cryptography Course Dan Boneh.
Dan Boneh Block ciphers The data encryption standard (DES) Online Cryptography Course Dan Boneh.
Dan Boneh Authenticated Encryption Definitions Online Cryptography Course Dan Boneh.
Dan Boneh Intro. Number Theory Intractable problems Online Cryptography Course Dan Boneh.
Dan Boneh Stream ciphers The One Time Pad Online Cryptography Course Dan Boneh.
Cryptanalysis of Modern Symmetric-Key Block Ciphers [Based on “A Tutorial on Linear and Differential Cryptanalysis” by Howard Heys.] Modern block ciphers.
Dan Boneh Introduction History Online Cryptography Course Dan Boneh.
Dan Boneh Block ciphers The AES block cipher Online Cryptography Course Dan Boneh.
Pseudo-Random Functions 1/22 Encryption as Permutation Assume cryptosystem correct and P = C If x  x’ then E K (x)  E K (x’) So, no y is hit by more.
TE/CS 536 Network Security Spring 2006 – Lectures 6&7 Secret Key Cryptography.
Dan Boneh Block ciphers More attacks on block ciphers Online Cryptography Course Dan Boneh.
Based on Bruce Schneier Chapter 7: Key Length Dulal C. Kar.
Dan Boneh Using block ciphers Modes of operation: many time key (CTR) Online Cryptography Course Dan Boneh Example applications: 1. File systems: Same.
1 Lect. 7 : Data Encryption Standard. 2 Data Encryption Standard (DES)  DES - History 1976 – adopted as a federal standard 1977 – official publication.
Dan Boneh Symmetric Encryption History Crypto. Dan Boneh History David Kahn, “The code breakers” (1996)
Dan Boneh Using block ciphers Modes of operation: many time key (CBC) Online Cryptography Course Dan Boneh Example applications: 1. File systems: Same.
Dan Boneh Stream ciphers Pseudorandom Generators Online Cryptography Course Dan Boneh.
Dan Boneh Collision resistance Introduction Online Cryptography Course Dan Boneh.
Dan Boneh Message Integrity CBC-MAC and NMAC Online Cryptography Course Dan Boneh.
Odds and ends Tweakable encryption
Data Encryption Standard (DES)
DES Analysis and Attacks CSCI 5857: Encoding and Encryption.
Linear Cryptanalysis of DES
Dan Boneh Stream ciphers Stream ciphers are semantically secure Online Cryptography Course Dan Boneh Goal: secure PRG ⇒ semantically secure stream cipher.
CS519, © A.SelcukDifferential & Linear Cryptanalysis1 CS 519 Cryptography and Network Security Instructor: Ali Aydin Selcuk.
Dan Boneh Collision resistance The Merkle-Damgard Paradigm Online Cryptography Course Dan Boneh.
Dan Boneh Stream ciphers PRG Security Defs Online Cryptography Course Dan Boneh.
Dan Boneh Intro. Number Theory Fermat and Euler Online Cryptography Course Dan Boneh.
Linear Cryptanalysis of DES M. Matsui. 1.Linear Cryptanalysis Method for DES Cipher. EUROCRYPT 93, 1994.Linear Cryptanalysis Method for DES Cipher 2.The.
Dan Boneh Intro. Number Theory Arithmetic algorithms Online Cryptography Course Dan Boneh.
Dan Boneh Odds and ends Deterministic Encryption Online Cryptography Course Dan Boneh.
Block ciphers What is a block cipher?
EE 122: Lecture 24 (Security) Ion Stoica December 4, 2001.
Attacking an obfuscated cipher by injecting faults Matthias Jacob Dan Boneh Edward.
Cryptography: Block Ciphers David Brumely Carnegie Mellon University Credits: Slides originally designed by David Brumley. Many other slides are from Dan.
@Yuan Xue Announcement Project Release Team forming Homework 1 will be released next Tuesday.
CS480 Cryptography and Information Security
Cryptography Lecture 18.
Cryptography Lecture 17.
Presentation transcript:

Dan Boneh Block ciphers Exhaustive Search Attacks Online Cryptography Course Dan Boneh

Dan Boneh Exhaustive Search for block cipher key Goal: given a few input output pairs ( m i, c i = E(k, m i ) ) i=1,..,3 find key k. Lemma: Suppose DES is an ideal cipher ( 2 56 random invertible functions ) Then ∀ m, c there is at most one key k s.t. c = DES(k, m) Proof: with prob. ≥ 1 – 1/256 ≈ 99.5%

Dan Boneh Exhaustive Search for block cipher key For two DES pairs ( m 1, c 1 =DES(k, m 1 ) ), ( m 2, c 2 =DES(k, m 2 ) ) unicity prob. ≈ 1 - 1/2 71 For AES-128: given two inp/out pairs, unicity prob. ≈ 1 - 1/2 128 ⇒ two input/output pairs are enough for exhaustive key search.

Dan Boneh DES challenge msg = “The unknown messages is: XXXX … “ CT = c 1 c 2 c 3 c 4 Goal: find k ∈ {0,1} 56 s.t. DES(k, m i ) = c i for i=1,2,3 1997: Internet search -- 3 months 1998: EFF machine (deep crack) -- 3 days (250K $) 1999: combined search hours 2006: COPACOBANA (120 FPGAs) -- 7 days (10K $) ⇒ 56-bit ciphers should not be used !! (128-bit key ⇒ 2 72 days)

Dan Boneh Strengthening DES against ex. search Method 1: Triple-DES Let E : K × M M be a block cipher Define 3E: K 3 × M M as For 3DES: key-size = 3×56 = 168 bits. 3×slower than DES. (simple attack in time ≈2 118 ) 3E ( (k 1,k 2,k 3 ), m ) =

Dan Boneh Why not double DES? Define 2E ( (k 1,k 2 ), m ) = E ( k 1, E(k 2, m) ) Attack: M = (m 1,…, m 10 ), C = (c 1,…,c 10 ). step 1: build table. sort on 2 nd column key-len = 112 bits for DES m m E(k 2, ⋅ ) E(k 1, ⋅ ) c c k 0 = 00…00 k 1 = 00…01 k 2 = 00…10 ⋮ k N = 11…11 k 0 = 00…00 k 1 = 00…01 k 2 = 00…10 ⋮ k N = 11…11 E(k 0, M) E(k 1, M) E(k 2, M) ⋮ E(k N, M) E(k 0, M) E(k 1, M) E(k 2, M) ⋮ E(k N, M) 2 56 entries

Dan Boneh Meet in the middle attack Attack: M = (m 1,…, m 10 ), C = (c 1,…,c 10 ) step 1: build table. Step 2: for all k ∈ {0,1} 56 do: test if D(k, C) is in 2 nd column. if so then E(k i,M) = D(k,C) ⇒ (k i,k) = (k 2,k 1 ) m m E(k 2, ⋅ ) E(k 1, ⋅ ) c c k 0 = 00…00 k 1 = 00…01 k 2 = 00…10 ⋮ k N = 11…11 k 0 = 00…00 k 1 = 00…01 k 2 = 00…10 ⋮ k N = 11…11 E(k 0, M) E(k 1, M) E(k 2, M) ⋮ E(k N, M) E(k 0, M) E(k 1, M) E(k 2, M) ⋮ E(k N, M)

Dan Boneh Meet in the middle attack Time = 2 56 log(2 56 ) log(2 56 ) < 2 63 << 2 112, space ≈ 2 56 Same attack on 3DES: Time = 2 118, space ≈ 2 56 m m E(k 2, ⋅ ) E(k 1, ⋅ ) c c m m E(k 2, ⋅ ) E(k 1, ⋅ ) c c E(k 3, ⋅ )

Dan Boneh Method 2: DESX E : K × {0,1} n {0,1} n a block cipher Define EX as EX ( (k 1,k 2,k 3 ), m ) = k 1 E(k 2, mk 3 ) For DESX: key-len = = 184 bits … but easy attack in time = (homework) Note: k 1 E(k 2, m) and E(k 2, mk 1 ) does nothing !!

Dan Boneh End of Segment