Stream Ciphers Part 1  Cryptography 3 Stream Ciphers.

Slides:



Advertisements
Similar presentations
CS470, A.SelcukStream Ciphers1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Advertisements

CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
TIE Extensions for Cryptographic Acceleration Charles-Henri Gros Alan Keefer Ankur Singla.
1 Lecture 3: Secret Key Cryptography Outline concepts DES IDEA AES.
Encryption/Decyprtion using RC4 Vivek Ramachandran.
Cryptography and Network Security Chapter 5 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 5
Cryptography and Network Security Chapter 7 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security
AES clear a replacement for DES was needed
RC4 1 RC4 RC4 2 RC4  Invented by Ron Rivest o “RC” is “Ron’s Code” or “Rivest Cipher”  A stream cipher  Generate keystream byte at a step o Efficient.
Cryptography and Network Security (AES) Dr. Monther Aldwairi New York Institute of Technology- Amman Campus 10/18/2009 INCS 741: Cryptography 10/18/20091Dr.
Foundations of Network and Computer Security J J ohn Black Lecture #24 Nov 23 rd 2004 CSCI 6268/TLEN 5831, Fall 2004.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
1 CSCD 439/539 Wireless Networks and Security Lecture 9 WEP Fall 2007.
Cryptography and Network Security Chapter 5. Chapter 5 –Advanced Encryption Standard "It seems very simple." "It is very simple. But if you don't know.
Cryptography and Network Security Chapter 5 Fourth Edition by William Stallings.
Cryptography and Network Security Chapter 6
A5/1 A5/1 consists of 3 shift registers X: 19 bits (x18,x17,x16, …,x0)
Stream Ciphers 1 Stream Ciphers. Stream Ciphers 2 Stream Ciphers  Generalization of one-time pad  Trade provable security for practicality  Stream.
Lecture 23 Symmetric Encryption
ORYX 1 ORYX ORYX 2 ORYX  ORYX not an acronym, but upper case  Designed for use with cell phones o To protect confidentiality of voice/data o For “data.
Dr. Lo’ai Tawalbeh 2007 Chapter 5: Advanced Encryption Standard (AES) Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus.
Chapter 2 (D) – Contemporary Symmetric Ciphers "I am fairly familiar with all the forms of secret writings, and am myself the author of a trifling monograph.
Cryptography and Network Security Chapter 7 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Dr. Khalid A. Kaabneh Amman Arab University
Chapter 5 Advanced Encryption Standard. Origins clear a replacement for DES was needed –have theoretical attacks that can break it –have demonstrated.
Chapter 5 –Advanced Encryption Standard "It seems very simple." "It is very simple. But if you don't know what the key is it's virtually indecipherable."
AL-MAAREFA COLLEGE FOR SCIENCE AND TECHNOLOGY COMP 425: Information Security CHAPTER 7 Symmetric Key Crypto (Chapter 3 in the textbook) INFORMATION.
Cryptography and Network Security Chapter 7 Fifth Edition by William Stallings.
Cryptography and Network Security Chapter 6. Multiple Encryption & DES  clear a replacement for DES was needed theoretical attacks that can break it.
Slide 1 Stream Ciphers uBlock ciphers generate ciphertext Ciphertext(Key,Message)=Message  Key Key must be a random bit sequence as long as message uIdea:
1 Chapter 3 Ciphers Mechanism that decides the process of encryption/decryption Stream Cipher: Bit-by-bit encryption / decryption Block Cipher: Block-by-block.
Encryption for Mobile Computing By Erik Olson Woojin Yu.
1 Chapter 3 Symmetric Key Crypto Stream Ciphers Block Ciphers Block Cipher Modes Integrity Chapter 3 Symmetric Key Crypto.
Chapter 20 Symmetric Encryption and Message Confidentiality.
CS555Spring 2012/Topic 51 Cryptography CS 555 Topic 5: Pseudorandomness and Stream Ciphers.
Stream Ciphers Making the one-time pad practical.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Stream Cipher July 2011.
Implementing the RC4 Algorithm
Multiple Encryption & DES  clearly a replacement for DES was needed Vulnerable to brute-force key search attacks Vulnerable to brute-force key search.
Part 1  Cryptography 1 Chapter 3: Symmetric Key Crypto.
Cryptography and Network Security Contemporary Symmetric Ciphers.
Symmetric Encryption IT 352 : Lecture 2- part2 Najwa AlGhamdi, MSc – 2012 /1433.
Presented by: Dr. Munam Ali Shah
Lecture 23 Symmetric Encryption
Chapter 2 (C) –Advanced Encryption Standard. Origins clearly a replacement for DES was needed –have theoretical attacks that can break it –have demonstrated.
Advanced Encryption Standard Dr. Shengli Liu Tel: (O) Cryptography and Information Security Lab. Dept. of Computer.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
Dr. Lo’ai Tawalbeh summer 2007 Chapter 6: Contemporary Symmetric Ciphers Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus INCS.
Cryptography and Network Security Chapter 7 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
1 Analysis of Non-fortuitous Predictive States of the RC4 Keystream Generator Souradyuti Paul and Bart Preneel K.U. Leuven, ESAT/COSIC Indocrypt 2003 India.
University of Malawi, Chancellor College
1 A New Weakness in the RC4 Keystream Generator and an Approach to Improve the Security of the Cipher Souradyuti Paul and Bart Preneel K.U. Leuven, ESAT/COSIC.
Slide 1 Vitaly Shmatikov CS 378 Stream Ciphers. slide 2 Stream Ciphers uRemember one-time pad? Ciphertext(Key,Message)=Message  Key Key must be a random.
CPIT 425 Chapter Three: Symmetric Key Cryptography.
Computer and Information Security
Provides Confidentiality
Crypto in information security
Cryptography CS 555 Topic 15: Stream Ciphers.
Pseudo Random Number Generators
Cryptography Lecture 16.
STREAM CIPHERS by Jennifer Seberry.
ADVANCED ENCRYPTION STANDARDADVANCED ENCRYPTION STANDARD
RC4 RC
Chapter -4 STREAM CIPHERS
A toy example for RC4.
Information and Computer Security CPIS 312 Lab 4 & 5
Presentation transcript:

Stream Ciphers

Part 1  Cryptography 3 Stream Ciphers

Part 1  Cryptography 4 Stream Ciphers Once upon a time, not so very long ago, stream ciphers were the king of crypto Today, not as popular as block ciphers We’ll discuss two stream ciphers… A5/1 – Based on shift registers – Used in GSM mobile phone system RC4 – Based on a changing lookup table – Used many places

Part 1  Cryptography 5 A5/1: Shift Registers A5/1 uses 3 shift registers –X : 19 bits (x 0,x 1,x 2, …,x 18 ) –Y : 22 bits (y 0,y 1,y 2, …,y 21 ) –Z : 23 bits (z 0,z 1,z 2, …,z 22 )

Part 1  Cryptography 6 A5/1: Keystream At each step: m = maj(x 8, y 10, z 10 ) – Examples: maj(0,1,0) = 0 and maj(1,1,0) = 1 If x 8 = m then X steps – t = x 13  x 16  x 17  x 18 – x i = x i  1 for i = 18,17,…,1 and x 0 = t If y 10 = m then Y steps – t = y 20  y 21 – y i = y i  1 for i = 21,20,…,1 and y 0 = t If z 10 = m then Z steps – t = z 7  z 20  z 21  z 22 – z i = z i  1 for i = 22,21,…,1 and z 0 = t Keystream bit is x 18  y 21  z 22

Part 1  Cryptography 7 A5/1 Each variable here is a single bit Key is used as initial fill of registers Each register steps (or not) based on maj (x 8, y 10, z 10 ) Keystream bit is XOR of rightmost bits of registers y0y0 y1y1 y2y2 y3y3 y4y4 y5y5 y6y6 y7y7 y8y8 y9y9 y 10 y 11 y 12 y 13 y 14 y 15 y 16 y 17 y 18 y 19 y 20 y 21 z0z0 z1z1 z2z2 z3z3 z4z4 z5z5 z6z6 z7z7 z8z8 z9z9 z 10 z 11 z 12 z 13 z 14 z 15 z 16 z 17 z 18 z 19 z 20 z 21 z 22 X Y Z     x0x0 x1x1 x2x2 x3x3 x4x4 x5x5 x6x6 x7x7 x8x8 x9x9 x 10 x 11 x 12 x 13 x 14 x 15 x 16 x 17 x 18

Part 1  Cryptography 8 A5/1 In this example, m = maj(x 8, y 10, z 10 ) = maj(1,0,1) = 1 Register X steps, Y does not step, and Z steps Keystream bit is XOR of right bits of registers Here, keystream bit will be 0  1  0 = X Y Z    

Part 1  Cryptography 9 Shift Register Crypto Shift register crypto efficient in hardware Often, slow if implement in software In the past, very popular Today, more is done in software due to fast processors Shift register crypto still used some – Resource-constrained devices

Part 1  Cryptography 10 RC4 A self-modifying lookup table Table always contains a permutation of the byte values 0,1,…,255 Initialize the permutation using key At each step, RC4 does the following – Swaps elements in current lookup table – Selects a keystream byte from table Each step of RC4 produces a byte – Efficient in software Each step of A5/1 produces only a bit – Efficient in hardware

Part 1  Cryptography 11 RC4 Initialization S[] is permutation of 0,1,...,255 key[] contains N bytes of key 1. In step 1, state is initialized to values 1,1,…255 2.A key array K[0], K[1],……….K[255] is also created for i = 0 to 255 S[i] = i K[i] = key[i (mod N)] // N=keylength next i In second state initialized state goes through a permutation. j = 0 for i = 0 to 255 { j = (j + S[i] + K[i]) mod 256 swap(S[i], S[j]) } next i

Part 1  Cryptography 12 RC4 Keystream generation For each keystream byte, swap elements in table and select byte i = j = 0 (initialised to 0 before first iteration) i = (i + 1) mod 256 j = (j + S[i]) mod 256 swap(S[i], S[j]) t = (S[i] + S[j]) mod 256 keystreamByte = S[t] Use keystream bytes like a one-time pad Note: first 256 bytes should be discarded – Otherwise, related key attack exists

Part 1  Cryptography 13 Stream Ciphers Stream ciphers were popular in the past – Efficient in hardware – Speed was needed to keep up with voice, etc. – Today, processors are fast, so software-based crypto is usually more than fast enough Future of stream ciphers? – Shamir declared “the death of stream ciphers” – May be greatly exaggerated…