Jeff Ehme Spelman College Chris Christensen Northern Kentucky University

Slides:



Advertisements
Similar presentations
DES The Data Encryption Standard (DES) is a classic symmetric block cipher algorithm. DES was developed in the 1970’s as a US government standard The block.
Advertisements

Origins  clear a replacement for DES was needed Key size is too small Key size is too small The variants are just patches The variants are just patches.
Conventional Encryption: Algorithms
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
1 CIS 5371 Cryptography 5b. Pseudorandom Objects in Practice Block Ciphers.
Cryptography and Network Security Chapter 3
Block Ciphers and the Data Encryption Standard
Cryptography and Network Security
Modern Cryptography.
Block Ciphers: Workhorses of Cryptography COMP 1721 A Winter 2004.
SYMMETRIC CRYPTOSYSTEMS Symmetric Cryptosystems 10/06/2015 | pag. 2.
Chapter 5 Cryptography Protecting principals communication in systems.
CSE331: Introduction to Networks and Security Lecture 18 Fall 2002.
1 Chapter 3 – Block Ciphers and the Data Encryption Standard Modern Block Ciphers  now look at modern block ciphers  one of the most widely used types.
1 Chapter 3 – Block Ciphers and the Data Encryption Standard Modern Block Ciphers  now look at modern block ciphers  one of the most widely used types.
Introduction to Symmetric Block Cipher Jing Deng Based on Prof. Rick Han’s Lecture Slides Dr. Andreas Steffen’s Security Tutorial.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Network Security Chapter
Cryptography Block Ciphers and Feistel Functions.
Chapter 3 – Block Ciphers and the Data Encryption Standard
CSE 651: Introduction to Network Security
Lecture 2 Overview.
Introduction to Information Security Chapter II : Classical Ciphers.
Cryptography and Network Security Chapter 3. Modern Block Ciphers  now look at modern block ciphers  one of the most widely used types of cryptographic.
Confusion and Diffusion1 Ref: William Stallings, Cryptography and Network Security, 3rd Edition, Prentice Hall, 2003.
Software Security Seminar - 1 Chapter 14. Still Other Block Ciphers 발표자 : 최두호 Applied Cryptography.
Introduction to Stream Cipher Sayed Mahdi Mohammad Hasanzadeh Spring 2004.
Cryptography Lecture 4 Stefan Dziembowski
Advance Encryption Standard. Topics  Origin of AES  Basic AES  Inside Algorithm  Final Notes.
Feistel Model Last Updated: Aug 27, Feistel Cipher Structure Described by Horst Feistel (IBM) in 1973 Many symmetric encryption algorithms use this.
Network Security Lecture 14 Presented by: Dr. Munam Ali Shah.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Lec. 5 : History of Cryptologic Research II
Chapter 20 Symmetric Encryption and Message Confidentiality.
Cryptography and Network Security
Feistel Cipher Structure
Data Security and Encryption (CSE348) 1. Lecture # 6 2.
Classical Encryption techniques
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
Stream Ciphers and Block Ciphers A stream cipher is one that encrypts a digital data stream one bit or one byte at a time. Examples of classical stream.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Introduction to Information Security Lect. 6: Block Ciphers.
Computer and Network Security Rabie A. Ramadan Lecture 3.
Chapter 2 Symmetric Encryption.
© Information Security Group, ICU1 Block Cipher- introduction  DES Description: Feistel, S-box Exhaustive Search, DC and LC Modes of Operation  AES Description:
1 Symmetric-Key Encryption CSE 5351: Introduction to Cryptography Reading assignment: Chapter 2 Chapter 3 (sections ) You may skip proofs, but are.
Applied Cryptography (Symmetric) Part I. Many savages at the present day regard their names as vital parts of themselves, and therefore take great pains.
Network Security Lecture 3 Secret Key Cryptography
Module :MA3036NI Symmetric Encryption -3 Lecture Week 4.
Data Encryption Standard 1977 “New Directions in Cryptography” 1976.
Block Ciphers and the Data Encryption Standard. Modern Block Ciphers  One of the most widely used types of cryptographic algorithms  Used in symmetric.
CSE 5/7353 – January 25 th 2006 Cryptography. Conventional Encryption Shared Key Substitution Transposition.
@Yuan Xue CS 285 Network Security Block Cipher Principle Fall 2012 Yuan Xue.
1 CPCS425: Information Security (Topic 5) Topic 5  Symmetrical Cryptography  Understand the principles of modern symmetric (conventional) cryptography.
@Yuan Xue Announcement Project Release Team forming Homework 1 will be released next Tuesday.
Lecture 4 Data Encryption Standard (DES) Dr. Nermin Hamza
@Yuan Xue Quick Review.
Chapter-2 Classical Encryption Techniques.
SYMMETRIC KEY ALGORITHMS
NET 311 Information Security
Symmetric Key Block Ciphers
Cryptography and Network Security Chapter 3
AES (Advance Encryption Standard)
SYMMETRIC KEY ALGORITHMS
Confusion and Diffusion
Modern Cryptography.
Presentation transcript:

Jeff Ehme Spelman College Chris Christensen Northern Kentucky University

SkytaleCaesar cipher

Vigenere Cipher 16 th century Playfair Cipher 19 th century Transposition Cipher

KL47 KW-7

ATMIFF

Data Encryption Standard 1977 “New Directions in Cryptography” 1976

Symmetric key block ciphers Public key ciphers Stream ciphers Post-quantum ciphers

SubstitutionTransposition

DROSX DOBOC DSXQW KDROW KDSMK VKCZO MDCYP ZELVS FUOIM SZROB CRKFO CZKBU ONSXD OBOCD LIWKD ROWKD SMCPK MEVDI SXDRO COMSZ ROBCK CKZZV SMKDS YXCYP WKDRO WKDSM CDRKD MKXLO ZBOCO XDONS XEXNO BQBKN EKDOM YEBCO CYPDO XSQXY BONRY GOFOB KBODR OWYNO BXZBS FKDOU OIMSZ ROBCD ROGYB URYBC OCYPM BIZDY QBKZR IWYNO BXZBS FKDOS OIMSZ ROBCK BOOAE KVVIW KDROW KDSMK VVISX DOBOC DSXQ

Lester Hill (1891 – 1961)

Symmetric Key vs Asymmetric key

Symmetric Key Asymmetric Key

If the solution to a problem can be quickly verified by a computer, can the computer also solve that problem quickly?

Horst Feistel (1915 – 1990) Simplified DES: Wade Trapp and Lawrence Washington

DES 64-bit block 56-bit key (8 parity bits) 8 S-boxes 6 x 4 16 rounds Feistel cipher 12-bit block 9-bit key 2 S-boxes 4 x 3 4 rounds Feistel cipher Simplified DES

9 bits of key Use the 8 bits on the left for k Rotate to the left one bit Use the 8 bits on the left for k Rotate to the left 1 bit Use the 8 bits on the left for k Rotate to the left 1 bit Use the 8 bits on the left for k

Encryption Decryption

EncryptionDecryption

Backdoor?

Perfect Security Random key, as long as the message, and used only once. Computational Security Today 112

Skipjack declassified 1998 Clipper Chip bit block 80-bit key 32 rounds Unbalanced Feistel cipher

Claude Shannon (1916 – 2001)

“A Mathematical Theory of Communication” 1948 “The Theory of Secrecy Systems” 1949

Diffusion: “… the statistical structure of [the message] which leads to its redundancy is dissipated into long range statistics.” Wire crossing, S-box Confusion: “… make the relation between the simple statistics of [the ciphertext] and the simple description of [the key] a very complex and involved one.” Permutation, P-box

Many

64-bit block 80- or 128-bit key 1 S-box 4 x 4 31 Rounds Substitution-Permutation Network

How do they know it’s secure?

Joan Daemen and Vincent Rijmen Simplified AES: Mohammad Musa, Edward Schaefer, and Stephen Wedig

AES 128-bit block 128-bit, 192-bit, or 256-bit key 10, 12, or 14 rounds SPN 16-bit block 16-bit key 2 rounds SPN Simplified AES

Serpent Twofish RC6 MARS

Simplified IDEA Hoffman, N “A Simplified IDEA Algorithm,” Cryptologia 31(2), 143 – 151. TEA Holden, J “Demitasse: A ‘Small’ Version of the Tiny Encryption Algorithm and Its Use in a classroom Setting.” Cryptologia 37(1), 74 – 83.

Stream ciphers

Simplified DES Trappe, W. and Washington, L. Introduction to Cryptography with Coding Theory Simplified IDEA Hoffman, N “A Simplified IDEA Algorithm,” Cryptologia 31(2), 143 – 151.

PRESENT Boganov, A. and others “PRESENT: An Ultra-Lightweight Block Cipher.” (Search the net.) Simplified AES Musa, A., Schaefer, E., and Wedig, S “A Simplified AES Algorithm and Its Linear and Differential Cryptanalysis,” Cryptologia 27(12), 148 – 177.

TEA Holden, J “Demitasse: A ‘Small’ Version of the Tiny Encryption Algorithm and Its Use in a classroom Setting.” Cryptologia 37(1), 74 – 83. Cryptology course notes and student-produced software