1 CIS 5371 Cryptography 5b. Pseudorandom Objects in Practice Block Ciphers.

Slides:



Advertisements
Similar presentations
6.1.2 Overview DES is a block cipher, as shown in Figure 6.1.
Advertisements

From Crypto-Theory to Crypto-Practice 1 CHAPTER 14: From Crypto-Theory to Crypto-Practice SHIFT REGISTERS The first practical approach to ONE-TIME PAD.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
1 Lecture 3: Secret Key Cryptography Outline concepts DES IDEA AES.
Data Encryption Standard (DES)
Data Encryption Standard (DES)
Cryptography and Network Security Chapter 3
Block Ciphers and the Data Encryption Standard
Rachana Y. Patil 1 Data Encryption Standard (DES) (DES)
Data Encryption Standard (DES)
Cryptography and Network Security, resuming some notes Dr. M. Sakalli.
Cryptography1 CPSC 3730 Cryptography Chapter 3 DES.
Akelarre 1 Akelarre Akelarre 2 Akelarre  Block cipher  Combines features of 2 strong ciphers o IDEA — “mixed mode” arithmetic o RC5 — keyed rotations.
DES 1 Data Encryption Standard DES 2 Data Encryption Standard  DES developed in 1970’s  Based on IBM Lucifer cipher  U.S. government standard  DES.
1 Overview of the DES A block cipher: –encrypts blocks of 64 bits using a 64 bit key –outputs 64 bits of ciphertext A product cipher –basic unit is the.
CS470, A.SelcukLucifer & DES1 Block Ciphers Lucifer & DES CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
ICS 454: Principles of Cryptography
Introduction to Symmetric Block Cipher Jing Deng Based on Prof. Rick Han’s Lecture Slides Dr. Andreas Steffen’s Security Tutorial.
Lecture 23 Symmetric Encryption
Chapter 3 – Block Ciphers and the Data Encryption Standard
CSE 651: Introduction to Network Security
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Data Encryption Standard (DES). Symmetric Cryptography  C = E(P,K)  P = D(C,K)  Requirements  Given C, the only way to obtain P should be with  the.
The Digital Encryption Standard CSCI 5857: Encoding and Encryption.
Cryptanalysis of Modern Symmetric-Key Block Ciphers [Based on “A Tutorial on Linear and Differential Cryptanalysis” by Howard Heys.] Modern block ciphers.
The Data Encryption Standard - see Susan Landau’s paper: “Standing the test of time: the data encryption standard.” DES - adopted in 1977 as a standard.
Cryptography and Network Security Chapter 3. Modern Block Ciphers  now look at modern block ciphers  one of the most widely used types of cryptographic.
Differential Cryptanalysis - quite similar to linear cryptanalysis - exploits the relationship between the difference of two inputs and the difference.
Chapter 20 Symmetric Encryption and Message Confidentiality.
TE/CS 536 Network Security Spring 2006 – Lectures 6&7 Secret Key Cryptography.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Block ciphers Structure of a multiround block cipher
Feistel Cipher Structure
13. Other Block Ciphers 13.1 LUCIFER 13.2 MADRYGA 13.3 NEWDES 13.4 FEAL 13.5 REDOC 13.6 LOKI.
Dr. Reuven Aviv, Nov 2008 Conventional Encryption 1 Conventional Encryption & Message Confidentiality Acknowledgements for slides Henric Johnson Blekinge.
 Cryptography is the science of using mathematics to encrypt and decrypt data.  Cryptography enables you to store sensitive.
Le Trong Ngoc Security Fundamentals (2) Encryption mechanisms 4/2011.
Lecture 23 Symmetric Encryption
Fifth Edition by William Stallings
Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.
CSC 386 – Computer Security Scott Heggen. Agenda Cryptography (i.e., Confusion and Diffusion)
Computer and Network Security Rabie A. Ramadan Lecture 3.
Module :MA3036NI Symmetric Encryption -4 Lecture Week 5.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Block Ciphers and the Advanced Encryption Standard
Data Encryption Standard (DES)
Chapter 2 Symmetric Encryption.
© Information Security Group, ICU1 Block Cipher- introduction  DES Description: Feistel, S-box Exhaustive Search, DC and LC Modes of Operation  AES Description:
DES Analysis and Attacks CSCI 5857: Encoding and Encryption.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
Block Cipher- introduction
CS519, © A.SelcukDifferential & Linear Cryptanalysis1 CS 519 Cryptography and Network Security Instructor: Ali Aydin Selcuk.
Module :MA3036NI Symmetric Encryption -3 Lecture Week 4.
Block Ciphers and the Data Encryption Standard. Modern Block Ciphers  One of the most widely used types of cryptographic algorithms  Used in symmetric.
CST 312 Pablo Breuer. A block of plaintext is treated as a whole and used to produce a ciphertext block of equal length Typically a block size of 64 or.
Information and Computer Security CPIS 312 Lab 6 & 7 1 TRIGUI Mohamed Salim Symmetric key cryptography.
@Yuan Xue CS 285 Network Security Block Cipher Principle Fall 2012 Yuan Xue.
Lecture 4 Data Encryption Standard (DES) Dr. Nermin Hamza
CS480 Cryptography and Information Security
Triple DES.
6b. Practical Constructions of Symmetric-Key Primitives.
SYMMETRIC KEY ALGORITHMS
Cryptography Lecture 18.
Chapter -3 ADVANCED ENCRYPTION STANDARD & BLOCK CIPHER OPERATION
SYMMETRIC KEY ALGORITHMS
Cryptography Lecture 17.
Florida State University
Presentation transcript:

1 CIS 5371 Cryptography 5b. Pseudorandom Objects in Practice Block Ciphers

2 DES DES is a special type of iterated cipher based on the Feistel network. Block length 64 bits Key length 56 bits Ciphertext length 64 bits

3 DES The round function is: g ([L i-1,R i-1 ]), K i ) = (L i, R i ), where L i = R i-1 and R i = L i-1 XOR f (R i-1, K i ).

4 DES round encryption

5 DES inner function

6 DES computation path

7 One DES Round 32 bit R n+1 64 bit output 32 bit L n+1 64 bit input 32 bit L n 32 bit R n Inner Function + KnKn

8 Combine 32 bit input and 48 bit key into 32 bit output Expand 32 bit input to 48 bits XOR the 48 bit key with the expanded 48 bit input Apply the S-boxes to the 48 bit input to produce 32 bit output Permute the resulting 32 bits

9 Inner Function Expand 32 bit input to 48 bits by adding a bit to the front and the end of each 4 bit segment. These bits are taken from adjacent bits. This String Becomes this String Notice several bit values are repeated: 4, 5, 8, 9, 28, 29, etc.

10 S Boxes  There are 8 different S-Boxes, 1 for each chunk  S-box process maps 6 bit input to 4 bit output  S box performs substitution on 4 bits  There are 8 possible substitutions in each S box  Inner 4 bits are fed into an S box  Outer 2 bits determine which substitution is used

11 S Boxes Use bits 1 & 6 to select the row Bits 2-5 to select the substitution

12 DES: The Initial and Final Permutations There is also an initial and a final permutation: the final permutation is the inverse of the initial Permutation.

13 Decrypting with DES DES (and all Feistel structures) is invertible through “reverse” encryption because  The input to the n th step is the output of the n-1 th step  Everything needed (except the key) to produce the input to the inner function of the n-1 th step is available from the output of the n th step. So we can Work backwards to step 1. Note that the S-boxes are not reversible.

14 32 bit R n+1 64 bit input 32 bit L n+1 64 bit output 32 bit L n 32 bit R n Inner Function + KnKn 32 bit R n+1 64 bit output 32 bit L n+1 64 bit input 32 bit L n 32 bit R n Inner Function + KnKn

15 Key schedule INPUT: 64-bit key: k 1, k 2, …, k 64 OUTPUT: sixteen 48-bit keys: k 1, k 2, …, k 16 The algorithm used for generating the key schedule combines and selects bits of K to generate the round keys two bit selection tables. -- for details see textbook.

16 Weak Keys Let C 0 and D 0 be the 28 bit key halves  There are 4 week keys in the keyspace (2 56 ) C 0 = All zeros & D 0 = All zeros C 0 = All ones & D 0 = All zeros C 0 = All zeros & D 0 = All ones C 0 = All ones & D 0 = All ones  There are 12 semi-weak keys, where C o & D o are the following in some combination All zeros, All ones, …, … -- for details see Handbook of Applied Cryptography.

17 Attacks on iterated ciphers 

18 Diffusion & Confusion -Shannon  Diffusion. The relationship between the statistics of the plaintext and the ciphertext should as complex as possible: the value of each plaintext bit affects many plaintext bits.  Confusion: the relationship between the statistics of the ciphertext and the value of the key is as complex as possible.

19 Attacks on DES  Brute force  Linear Cryptanalysis  Known plaintext attack  Differential cryptanalysis  Chosen plaintext attack  Modify plaintext bits, observe change in ciphertext No dramatic improvement on brute force

20 Linear cryptanalysis (known plaintext) For each pair (x i,y i ), decrypt using all possible candidate keys for the last round and determine if the linear relation holds. If it does, increment a frequency counter for the candidate key used. Hopefully, at the end, this counter can be used to determine the correct values for the subkey bits.

21 Differential cryptanalysis (chosen plaintext) Differential cryptanalysis is a chosen plaintext attack. In this case the XOR of two inputs x, x* is compared with that of the corresponding outputs y, y*. In general we look for pairs x, x* for which x’=x+x* is fixed. For each such pair, decrypt y, y* using all possible candidate keys for the last round, and determine if their XOR has a certain value. Again use a frequency counter. Hopefully, at the end, this counter can be used to determine the correct values for the subkey bits.

22 The security of DES None of these attacks have a serious impact on the security of DES. The main problem with DES is that it has relatively short key length. Consequently it is subject to brute-force or exhaustive key search attacks. One solution to overcome this problem is to run DES a multiple number of times.

23 Countering Attacks  Large keyspace combats brute force attack  Triple DES, typically two key mode: E k 1 D k 2 E k 1  Use AES

24 Triple DES Encryption: c = E k 1 (D k 2 (E k 1 (m)) Decryption: m = D k 1 (E k 2 (D k 1 (c))

25 AES Block length 128 bits. Key lengths 128 (or 192 or 256). The AES is an iterated cipher with Nr=10 (or 12 or 14) In each round we have:  Subkey mixing: State  Roundkey XOR State  A substitution: SubBytes(State)  A permutation: ShiftRows(State) & MixColumns(State)

26 Establishing Trusted Communication Channels  Conventional techniques  Public-key techniques  Quantum Key distribution techniques