Foundations of Network and Computer Security J J ohn Black Lecture #5 Aug 31 st 2009 CSCI 6268/TLEN 5550, Fall 2009.

Slides:



Advertisements
Similar presentations
MAC Raushan. DES simple fiestel network 3131 PlainText Blocks 2*4=8bits 31 f f =0011 xor 0011=0000 = 0 f(r,k)=(2*r+k^2)%8 f(1,5)=(2*1+5^2)%8=3 xor 3 3.
Advertisements

“Advanced Encryption Standard” & “Modes of Operation”
Modern Symmetric-Key Ciphers
CMSC 414 Computer and Network Security Lecture 4 Jonathan Katz.
Modern Symmetric-Key Ciphers
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
CMSC 414 Computer (and Network) Security Lecture 4 Jonathan Katz.
11 Provable Security. 22 Given a ciphertext, find the corresponding plaintext.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
Cryptography and Network Security Chapter 6. Chapter 6 – Block Cipher Operation Many savages at the present day regard their names as vital parts of themselves,
Cryptography1 CPSC 3730 Cryptography Chapter 6 Triple DES, Block Cipher Modes of Operation.
CMSC 414 Computer (and Network) Security Lecture 5 Jonathan Katz.
Block Ciphers 1 Block Ciphers Block Ciphers 2 Block Ciphers  Modern version of a codebook cipher  In effect, a block cipher algorithm yields a huge.
CMSC 414 Computer and Network Security Lecture 4 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
Foundations of Network and Computer Security J J ohn Black Lecture #5 Sep 7 th 2007 CSCI 6268/TLEN 5831, Fall 2007.
Foundations of Network and Computer Security J J ohn Black Lecture #10 Sep 19 th 2007 CSCI 6268/TLEN 5831, Fall 2007.
CMSC 414 Computer and Network Security Lecture 4 Jonathan Katz.
Foundations of Network and Computer Security J J ohn Black Lecture #4 Sep 1 st 2005 CSCI 6268/TLEN 5831, Fall 2005.
A Designer’s Guide to KEMs Alex Dent
Asymmetric Cryptography part 1 & 2 Haya Shulman Many thanks to Amir Herzberg who donated some of the slides from
Foundations of Network and Computer Security J J ohn Black Lecture #8 Sep 15 th 2005 CSCI 6268/TLEN 5831, Fall 2005.
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
Introduction to Modern Cryptography Lecture 2 Symmetric Encryption: Stream & Block Ciphers.
Foundations of Network and Computer Security J J ohn Black Lecture #4 Sep 2 nd 2004 CSCI 6268/TLEN 5831, Fall 2004.
1 CS 255 Lecture 4 Attacks on Block Ciphers Brent Waters.
Foundations of Network and Computer Security J J ohn Black Lecture #3 Aug 28 th 2009 CSCI 6268/TLEN 5550, Fall 2009.
Foundations of Network and Computer Security J J ohn Black Lecture #5 Sep 6 th 2005 CSCI 6268/TLEN 5831, Fall 2005.
Foundations of Network and Computer Security J J ohn Black Lecture #8 Sep 14 th 2007 CSCI 6268/TLEN 5831, Fall 2007.
Introduction to Symmetric Block Cipher Jing Deng Based on Prof. Rick Han’s Lecture Slides Dr. Andreas Steffen’s Security Tutorial.
Foundations of Network and Computer Security J J ohn Black Lecture #6 Sep 10 th 2007 CSCI 6268/TLEN 5831, Fall 2007.
CMSC 414 Computer and Network Security Lecture 4 Jonathan Katz.
Foundations of Network and Computer Security J J ohn Black Lecture #3 Aug 31 st 2007 CSCI 6268/TLEN 5831, Fall 2007.
Foundations of Network and Computer Security J J ohn Black Lecture #11 Sep 21 st 2007 CSCI 6268/TLEN 5831, Fall 2007.
Computer Networking Lecture 21: Security and Cryptography Thanks to various folks from , semester’s past and others.
Foundations of Network and Computer Security J J ohn Black Lecture #4 Sep 5 th 2007 CSCI 6268/TLEN 5831, Fall 2007.
Lecture 23 Symmetric Encryption
Foundations of Network and Computer Security J J ohn Black Lecture #3 Aug 30 st 2005 CSCI 6268/TLEN 5831, Fall 2005.
Foundations of Network and Computer Security J J ohn Black Lecture #3 Aug 31 st 2004 CSCI 6268/TLEN 5831, Fall 2004.
Computer Security CS 426 Lecture 3
Encryption Schemes Second Pass Brice Toth 21 November 2001.
Lecture 3: Cryptographic Tools modified from slides of Lawrie Brown.
Practical Techniques for Searches on Encrypted Data Yongdae Kim Written by Song, Wagner, Perrig.
Cryptography and Network Security Chapter 6. Multiple Encryption & DES  clear a replacement for DES was needed theoretical attacks that can break it.
CS 4/585: Cryptography Tom Shrimpton FAB
Lecture 4: Using Block Ciphers
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Foundations of Network and Computer Security J J ohn Black CSCI 6268/TLEN 5550, Spring 2015.
CS555Spring 2012/Topic 111 Cryptography CS 555 Topic 11: Encryption Modes and CCA Security.
Cryptography Chapter 7 Part 2 Pages 781 to 812. Symmetric Cryptography Secret Key Figure 7-10 on page 782 Key distribution problem – Secure courier Many.
CMSC 414 Computer and Network Security Lecture 5 Jonathan Katz.
3DES and Block Cipher Modes of Operation CSE 651: Introduction to Network Security.
Multiple Encryption & DES  clearly a replacement for DES was needed Vulnerable to brute-force key search attacks Vulnerable to brute-force key search.
Shambhu Upadhyaya Security – AES-CCMP Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 13)
Cryptography and Network Security Chapter 6 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Lecture 2: Introduction to Cryptography
Class 3 Cryptography Refresher II CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman
Lecture 23 Symmetric Encryption
Lecture 5 Page 1 CS 236 Online More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
1 CPCS425: Information Security (Topic 5) Topic 5  Symmetrical Cryptography  Understand the principles of modern symmetric (conventional) cryptography.
1 Introduction to Cryptography Chapter-4. Definitions  Cryptography = the science (art) of encryption  Cryptanalysis = the science (art) of breaking.
Practical Aspects of Modern Cryptography Josh Benaloh & Brian LaMacchia.
Foundations of Network and Computer Security
مروري برالگوريتمهاي رمز متقارن(كليد پنهان)
Foundations of Network and Computer Security
Block vs Stream Ciphers
Foundations of Network and Computer Security
Block Ciphers (Crypto 2)
Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.
Presentation transcript:

Foundations of Network and Computer Security J J ohn Black Lecture #5 Aug 31 st 2009 CSCI 6268/TLEN 5550, Fall 2009

How about Triple-DES! Triple DES uses a 168-bit key K=(K1, K2, K3) TDES K (P) = DES K3 (DES K2 (DES K1 (P))) No known attacks against TDES –Provides 112-bits of security against key-search –Widely used, standardized, etc –More often used in “two-key triple-DES” mode with EDE format (K is 112 bits like DDES): TDES K (P) = DES K1 (DES -1 K2 (DES K1 (P))) –Why is the middle operation a decipherment?

AES – The Advanced Encryption Standard If TDES is secure, why do we need something else? –DES was slow –DES times 3 is three times slower –64-bit blocksize could be bigger without adding much cost –DES had other annoying weakness which were inherited by TDES –We know a lot more about blockcipher design, so time to make something really cool!

AES Competition NIST sponsored a competition –Individuals and groups submitted entries Goals: fast, portable, secure, constrained environments, elegant, hardware-friendly, patent- free, thoroughly analyzed, etc –Five finalists selected (Aug 1999) Rijndael (Belgium), MARS (IBM), Serpent (Israel), TwoFish (Counterpane), RC6 (RSA, Inc) –Rijndael selected (Dec 2001) Designed by two Belgians

AES – Rijndael Not a Feistel construction! –128 bit blocksize –128, 192, 256-bit keysize –SP network Series of invertible (non-linear) substitutions and permutations –Much faster than DES About 300 cycles on a Pentium III –A somewhat risky choice for NIST

Security of the AES Four rounds are easily broken via the “Square Attack” –Within the scope of this class, but we won’t do it –Six rounds breakable, but quite a bit harder –Initial proposal was therefore using 8 rounds –Objections during assessment phase caused designers to go to 10 rounds

Block Ciphers – Conclusion There are a bunch out there besides AES and DES –Some are pretty good (IDEA, TwoFish, etc) –Some are pretty lousy LOKI, FEAL, TEA, Magenta, Bass-O-Matic If you try and design your own, it will probably be really really bad –Plenty of examples, yet it still keeps happening

Aren’t We Done? Blockciphers are only a start –They take n-bits to n-bits under a k-bit key –Oftentimes we want to encrypt a message and the message might be less than or greater than n bits! –We need a “mode of operation” which encrypts any M in {0,1} * –There are many, but we focus on three: ECB, CBC, CTR

Recall Indistinguishability Recall blockcipher X: –I hand you an oracle that is either a random permutation or blockcipher X under a random key K; can you distinguish? Recall one-round of DES: –I hand you an oracle that is either a random permutation or 1-round DES under a random key K; can you distinguish? Recall two-rounds of DES: –Same question… it might be on the midterm.

Goals of Encryption Cryptographers want to give up exactly two pieces of information when encrypting a message 1) That M exists 2) The approximate length of M The military sometimes does not even want to give up these two things! –Traffic analysis We definitely don’t want to make it obvious when a message repeats

ECB – Electronic Codebook This is the most natural way to encrypt –It’s what we used with the Substitution Cipher –For blockcipher E under key K: –First, pad (if required) to ensure M in ({0,1} n ) + –Write M = M 1 M 2 … M m where each M i has size n-bits –Then just encipher each chunk: C i = E K (M i ) for all 1 ≤ i ≤ m –Ciphertext is C = C 1 C 2 … C m

Why ECB Mode is BAD ECB leaks more than we wanted –Repetitions in the plaintext show through to the ciphertext –This is easily avoided, so let’s do so There ARE applications where ECB makes sense What’s a nice advantage of ECB mode?

CBC Mode Encryption Start with an n-bit “nonce” called the IV –Initialization Vector –Usually a counter or a random string Blockcipher E under key K, M broken into m blocks of n bits as usual –C 0 = IV –C i = E K (M i ⊕ C i-1 ) for all 1 ≤ i ≤ m EKEK EKEK EKEK M2M2 MmMm M1M1 IV C1C1 C2C2 CmCm

Digression on the One-Time Pad Suppose Alice and Bob shared a 10,000 bit string K that was secret, uniformly random –Can Alice send Bob a 1KB message M with “perfect” security? –1KB is 8192 bits; let X be the first 8192 bits of the shared string K –Alice sets C = M ⊕ X, and sends C to Bob –Bob computes C ⊕ X and recovers M Recall that M ⊕ X ⊕ X = M

Security of the One-Time Pad Consider any bit of M, m i, and the corresponding bits of X and C, (x i, c i ) –Then c i = m i ⊕ x i –Given that some adversary sees c i go across a wire, what can he discern about the bit m i ? Nothing! Since x i is equally likely to be 0 or 1 –So why not use the one-time pad all the time? Shannon proved (1948) that for perfect security the key must be at least as long as the message –Impractical

One-Time Pad (cont) Still used for very-top-secret stuff –Purportedly used by Russians in WW II Note that it is very important that each bit of the pad be used at most one time! –The infamous “two time pad” is easily broken Imagine C = M ⊕ X, C’ = M’ ⊕ X Then C ⊕ C’ = M ⊕ X ⊕ M’ ⊕ X = M ⊕ M’ Knowing the xor of the two messages is potentially very useful n-time pad for large n is even worse (WEP does this)

Counter Mode – CTR Blockcipher E under key K, M broken into m blocks of n bits, as usual Nonce N is typically a counter, but not required C 0 = N C i = E K (N++) ⊕ M i Ciphertext is C = C 0 C 1 … C m

CTR Mode Again, n bits of ciphertext expansion Non-deterministic encryption Fully parallelizable in both directions Not that widely used despite being known for a long time –People worry about counter overlap producing pad reuse

Why I Like Modes of Operation Modes are “provably secure” –Unlike blockciphers which are deemed “hopefully secure” after intense scrutiny by experts, modes can be proven secure like this: Assume blockcipher E is secure (computationally indistinguishable from random, as we described) Then the mode is secure in an analogous black-box experiment –The proof technique is done via a “reduction” much like you did in your NP-Completeness class –The argument goes like this: suppose we could break the mode with computational resources X, Y, Z. Then we could distinguish the blockcipher with resources X’, Y’, Z’ where these resources aren’t that much different from X, Y, and Z

Security Model Alice and Bob –Traditional names –Let’s us abbreviate A and B –Adversary is the bad guy This adversary is passive; sometimes called “eve” –Note also the absence of side-channels Power consumption, timing, error messages, etc Adversary Alice Key K Bob

Various Attack Models Known-Ciphertext Attack (KCA) –You only know the ciphertext –Requires you know something about the plaintext (eg, it’s English text, an MP3, C source code, etc) –This is the model for the Sunday cryptograms which use a substitution cipher Known-Plaintext Attack (KPA) –You have some number of plaintext-ciphertext pairs, but you cannot choose which plaintexts you would like to see –This was our model for exhaustive key search and the meet in the middle attack

Attack Models (cont) Chosen-Plaintext Attack (CPA) –You get to submit plaintexts of your choice to an encryption oracle (black box) and receive the ciphertexts in return –Models the ability to inject traffic into a channel Send a piece of disinformation to an enemy and watch for its encryption Send plaintext to a wireless WEP user and sniff the traffic as he receives it –This is the model we used for defining blockcipher security (computational indistinguishability)

Attack Models (cont) Chosen-Ciphertext Attack (CCA) –The strongest definition (gives you the most attacking power) –You get to submit plaintexts and ciphertexts to your oracles (black boxes) –Sometimes called a “lunchtime attack” –We haven’t used this one yet, but it’s a reasonable model for blockcipher security as well

So What about CBC, for example? CBC Mode encryption –It’s computationally indistinguishable under chosen plaintext attack You can’t distinguish between the encryption of your query M and the encryption of a random string of the same length –In the lingo, “CBC is IND-CPA” –It’s not IND-CCA You need to add authentication to get this

The Big (Partial) Picture Primitives Block Ciphers Hash Functions Hard Problems Stream Ciphers First-Level Protocols Symmetric Encryption Digital Signatures MAC Schemes Asymmetric Encryption Second-Level Protocols SSH, SSL/TLS, IPSec Electronic Cash, Electronic Voting (Can do proofs) (No one knows how to prove security; make assumptions)