Stream cipher diagram + + Recall: One-time pad in Chap. 2.

Slides:



Advertisements
Similar presentations
“Advanced Encryption Standard” & “Modes of Operation”
Advertisements

Network Security. Confidentiality Using Symmetric Encryption John wrote the letters of the alphabet under the letters in its first lines and tried it.
Applied Cryptography (Public key) Part I. Let’s first finish “Symmetric Key” before talking about public key John wrote the letters of the alphabet under.
CS457 – Introduction to Information Systems Security Cryptography 1b Elias Athanasopoulos
Public Key Encryption Algorithm
Cryptography and Network Security
Cryptography and Network Security Chapter 7 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography1 CPSC 3730 Cryptography Chapter 6 Triple DES, Block Cipher Modes of Operation.
Pseudorandom Bit Generation Artur Gadomski Piero Giammarino Henrik Goldman Massimo Giulio Caterino.
Cryptography1 CPSC 3730 Cryptography Chapter 7 Confidentiality Using Symmetric Encryption.
Session 6: Introduction to cryptanalysis part 1. Contents Problem definition Symmetric systems cryptanalysis Particularities of block ciphers cryptanalysis.
Lecture 23 Symmetric Encryption
Session 2: Secret key cryptography – stream ciphers – part 1.
Cryptography and Network Security Chapter 7
Computer Security CS 426 Lecture 3
Cryptography and Network Security Chapter 7 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Modified – Tom Noack, UPRM.
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
15-853Page :Algorithms in the Real World Generating Random and Pseudorandom Numbers.
1 Confidentiality Cryptography & Network Security H. Yoon Confidentiality Using Conventional Encryption Where should cryptographic functionality be located?
Cryptography and Network Security Chapter 7 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Pseudo-random Number Generation Qiuliang Tang. Random Numbers in Cryptography ► The keystream in the one-time pad ► The secret key in the DES encryption.
CS526Topic 3: One-time Pad and Perfect Secrecy 1 Information Security CS 526 Topic 3 Cryptography: One-time Pad, Information Theoretic Security, and Stream.
© Neeraj Suri EU-NSF ICT March 2006 DEWSNet Dependable Embedded Wired/Wireless Networks MUET Jamshoro Computer Security: Principles and Practice Slides.
RC4-Stream Ciphers Blowfish, RC5 Block Ciphers M. Sakalli, Marmara Univ. Chapter 6 of Cryptography and Network Security by William Stallings Modified from.
Cryptography and Network Security Chapter 7 Fifth Edition by William Stallings.
Cryptography and Network Security (CS435)
Cryptography and Network Security Chapter 6. Multiple Encryption & DES  clear a replacement for DES was needed theoretical attacks that can break it.
Chapter 20 Symmetric Encryption and Message Confidentiality.
CS555Spring 2012/Topic 51 Cryptography CS 555 Topic 5: Pseudorandomness and Stream Ciphers.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Random-Number Generation Andy Wang CIS Computer Systems Performance Analysis.
Network Security Lecture 19 Presented by: Dr. Munam Ali Shah.
Information Security Lab. Dept. of Computer Engineering 182/203 PART I Symmetric Ciphers CHAPTER 7 Confidentiality Using Symmetric Encryption 7.1 Placement.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Stream Cipher July 2011.
Cryptography Lecture 2: Classic Ciphers Piotr Faliszewski.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 2 “Cryptographic Tools”.
Public-Key Encryption
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
Politiche delle Reti e Sicurezza 2008 UNICAM. M.L.Maggiulli © Maria Laura Maggiulli Dipartimento di Informatica.
Modes of Operation INSTRUCTOR: DANIA ALOMAR. Modes of Operation A block cipher can be used in various methods for data encryption and decryption; these.
Chapter 7 – Confidentiality Using Symmetric Encryption.
Chapter 7 Confidentiality Using Symmetric Encryption.
Cryptography and Network Security Key Distribution for Symmetric Encryption.
Data Security and Encryption (CSE348) 1. Lecture # 14 2.
Attacks on PRNGs - By Nupura Neurgaonkar CS-265 (Prof. Mark Stamp)
Network Security Lecture 18 Presented by: Dr. Munam Ali Shah.
Lecture 23 Symmetric Encryption
PRNGs Pseudo-random number generation. Randomness and Cryptography Randomness and pseudo-randomness are useful in cryptography: –To generate random and.
Fall 2006CS 395: Computer Security1 Confidentiality Using Symmetric Encryption.
Chapter 7 Confidentiality Using Symmetric Encryption.
Cryptography and Network Security Chapter 7 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Chapter 7 – Confidentiality Using Symmetric Encryption.
Key Wrap Algorithm.
หัวข้อบรรยาย Stream cipher RC4 WEP (in)security LFSR CSS (in)security.
Cryptography and Network Security Chapter 7
Issues of Random Numbers and Cryptography
Cryptography and Network Security Chapter 7
Chapter 7: Confidentiality Using Symmetric Encryption
Cryptography and Network Security Chapter 7
Cryptography and Network Security
Pseudo Random Number Generators
Confidentiality using Symmetric Encryption
Confidentiality using Symmetric Encryption
Cryptography and Network Security Chapter 7
Cryptography and Network Security Chapter 7
Cryptography and Network Security Chapter 7
Generating Random and Pseudorandom Numbers
Generating Random and Pseudorandom Numbers
Stream Cipher Structure
Presentation transcript:

Stream cipher diagram + + Recall: One-time pad in Chap. 2

Advantage of stream cipher With proper design of PRNG, stream cipher is as secure as block cipher of comparable key length (?) Stream cipher is faster than block cipher

Disadvantage of stream cipher never reuse the same key c.f. you can reuse keys in block cipher Ciphertext 1 = plaintext 1  keystream Ciphertext 2 = plaintext 2  keystream Ciphertext 1  Ciphertext 2 = (plaintext 1  keystream)  (plaintext 2  keystream) = plaintext 1  plaintext 2 If plaintexts are text string, credit card no., or other streams with known properties, then cryptanalysis may be successful. ?[DAWS96]

Random Numbers many uses of random numbers in cryptography keystream for a one-time pad nonces in authentication protocols to prevent replay session keys public key generation Requirement for a sequence of random numbers: Randomness Uniform distribution: freq. of occurrence of each number should be approximately the same Independence: no one value in the seq. can be inferred from the others Unpredictability cannot infer future sequence on previous values

Application: randomization Goal: determine if a given number N is prime Brute-force search: divide N by odd integers less than => tests N= => Randomization: test using a (sufficiently long) sequence of randomly chosen integers

Source of random numbers: 1. Natural Random Noise best source is natural randomness in real world find a regular but random event and monitor do generally need special h/w to do this eg. radiation counters, radio noise, audio noise, thermal noise in diodes, leaky capacitors, mercury discharge tubes etc starting to see such h/w in new CPU's problems of bias or uneven distribution in signal have to compensate for this when sample and use best to only use a few noisiest bits from each sample

2. Published Sources a few published collections of random numbers Rand Co, in 1955, published 1 million numbers generated using an electronic roulette wheel has been used in some cipher designs cf Khafre earlier Tippett in 1927 published a collection issues are that: these are limited too well-known for most uses

3. Pseudorandom Number Generators (PRNGs) algorithmic technique to create “ random numbers ” deterministic algorithm although not truly random can pass many tests of “randomness”

Linear Congruential Generator common iterative technique using: X n+1 = (aX n + c) mod m How to choose suitable values of parameters ? a=1, c=1 a=7, c=0, m=32, X 0 =1 X 0 : initial seed {1, 7, 17, 23, 1, … }

Congruence: Integers Modulo 7 Example congruence 一致 (from Gauss) Z 7 : residue class modulo n Integers a and b are congruence modulo n : a ≡ b mod n

Linear Congruential Generator (cont.) Suitable criteria to have are: 1. function generates a full-period {1, …, m-1} 2. generated sequence should appear random 3. efficient implementation (eg. with 32-bit arithmetic) To satisfy 1. c=0, m is a prime, and certain a (?) 3. For 32-bit arithmetic, m = 2 32 – 1 (prime?) 2. Few a satisfy random: ex. a=7 5 =16807 X n+1 = (aX n + c) mod m X n+1 = (aX n ) mod ( )

Primitive root

Attacks on linear congruential method All parameters are known A single number is discovered, subsequent numbers are known Only know the linear congruential method Know a small sequence of numbers X 1 = (aX 0 + c) mod m X 2 = (aX 1 + c) mod m X 3 = (aX 2 + c) mod m X0X0

Cryptographically generated random numbers can use block cipher to generate numbers 1. use Counter Mode X i = E Km [i] (protected)

Cryptographically generated random numbers (cont.) 2. use Output Feedback Mode X i = E Km [X i-1 ] Looks like RC4 stream cipher

Cryptographically generated random numbers (cont.) 3. ANSI X9.17 PRNG (one of the strongest PRNGs) uses date-time + seed inputs and 3 triple-DES encryptions to generate new seed & random (date/time) (seed) (triple-DES keys) (random output) (next seed)

Blum Blum Shub (BBS) random bit generator based on public key algorithms use least significant bit from iterative equation: x i+1 = x i 2 mod n B i+1 = x i+1 mod 2 where n=pq, and primes p,q=3 mod 4 n= =383x503

Blum Blum Shub (BBS) random bit generator (cont.) unpredictable, passes next-bit test (prediction based on previous k bits) security rests on difficulty of factoring n is unpredictable given any run of bits slow, since very large numbers must be used too slow for cipher use, good for key generation