Announcements: Homework 3 due now Homework 3 due now Homework 4 posted Homework 4 postedToday: Attacks on DES Attacks on DESQuestions? DTTF/NB479: DszquphsbqizDay.

Slides:



Advertisements
Similar presentations
DES The Data Encryption Standard (DES) is a classic symmetric block cipher algorithm. DES was developed in the 1970’s as a US government standard The block.
Advertisements

ECE454/CS594 Computer and Network Security
“Advanced Encryption Standard” & “Modes of Operation”
Conventional Encryption: Algorithms
Encipherment Using Modern Symmetric-Key Ciphers. 8.2 Objectives ❏ To show how modern standard ciphers, such as DES or AES, can be used to encipher long.
Modern Symmetric-Key Ciphers
Modern Symmetric-Key Ciphers
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
1 CIS 5371 Cryptography 5b. Pseudorandom Objects in Practice Block Ciphers.
Symmetric Encryption Example: DES Weichao Wang. 2 Overview of the DES A block cipher: – encrypts blocks of 64 bits using a 64 bit key – outputs 64 bits.
Web Security for Network and System Administrators1 Chapter 4 Encryption.
Cryptography and Network Security Chapter 6. Chapter 6 – Block Cipher Operation Many savages at the present day regard their names as vital parts of themselves,
Cryptography1 CPSC 3730 Cryptography Chapter 6 Triple DES, Block Cipher Modes of Operation.
Block Ciphers 1 Block Ciphers Block Ciphers 2 Block Ciphers  Modern version of a codebook cipher  In effect, a block cipher algorithm yields a huge.
1 Lect. 9 : Mode of Operation. 2 Modes of Operation – ECB Mode  Electronic Code Book Mode Break a message into a sequence of plaintext blocks Each plaintext.
Announcements: Get your ch 1-2 quiz if you haven’t. Get your ch 1-2 quiz if you haven’t. Grading change: Grading change: Homeworks are mixed programming.
1 Overview of the DES A block cipher: –encrypts blocks of 64 bits using a 64 bit key –outputs 64 bits of ciphertext A product cipher –basic unit is the.
Announcements: Quizzes returned tomorrow Quizzes returned tomorrow This week: Mon-Thurs: Data Encryption Standard (DES) Mon-Thurs: Data Encryption Standard.
Announcements: Homework 2 returned Homework 2 returned Monday: Written (concept and small calculations) exam on breaking ch 2 ciphers Monday: Written (concept.
Announcements: Quizzes returned at end of class Quizzes returned at end of class This week: Mon-Thurs: Data Encryption Standard (DES) Mon-Thurs: Data Encryption.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
Chapter 3 – Block Ciphers and the Data Encryption Standard Jen-Chang Liu, 2004 Adopted from lecture slides by Lawrie Brown.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 5 Wenbing Zhao Department of Electrical and Computer Engineering.
Announcements: Quizzes graded, but not in gradebook. (Current grade gives 0 on the parts you shouldn’t have done .) Quizzes graded, but not in gradebook.
CS470, A.SelcukModes of Operation1 Encrypting with Block Ciphers CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Network Security Chapter
Encryption Schemes Second Pass Brice Toth 21 November 2001.
1 Chapter 4 Encryption. 2 Objectives In this chapter, you will: Learn the basics of encryption technology Recognize popular symmetric encryption algorithms.
Lecture 3: Cryptographic Tools modified from slides of Lawrie Brown.
Block Cipher Transmission Modes CSCI 5857: Encoding and Encryption.
Modes of Operation. Topics  Overview of Modes of Operation  EBC, CBC, CFB, OFB, CTR  Notes and Remarks on each modes.
Cryptography and Network Security Chapter 6. Multiple Encryption & DES  clear a replacement for DES was needed theoretical attacks that can break it.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Cryptography and Network Security
DES Attacks and Triple DES
Cryptography Chapter 7 Part 2 Pages 781 to 812. Symmetric Cryptography Secret Key Figure 7-10 on page 782 Key distribution problem – Secure courier Many.
Multiple Encryption & DES  clearly a replacement for DES was needed Vulnerable to brute-force key search attacks Vulnerable to brute-force key search.
Chapter 9: Algorithms Types and Modes Dulal C. Kar Based on Schneier.
Encryption Types & Modes Chapter 9 Encryption Types –Stream Ciphers –Block Ciphers Encryption Modes –ECB - Electronic Codebook –CBC - Cipher Block Chaining.
More About DES Cryptography and Network Security Reference: Sec 3.1 of Stallings Text.
Chapter 2 (B) – Block Ciphers and Data Encryption Standard.
1.1 Chapter 8 Encipherment Using Modern Symmetric-Key Ciphers Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
BLOCK CIPHER SYSTEMS OPERATION MODES OF DATA ENCRYPTION STANDARD (DES)
Announcements: Homework 3 due now Homework 3 due now Homework 4 posted Homework 4 postedToday: Attacks on DES Attacks on DESQuestions? DTTF/NB479: DszquphsbqizDay.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
Modes of Usage Dan Fleck CS 469: Security Engineering These slides are modified with permission from Bill Young (Univ of Texas) 11 Coming up: Modes of.
Stream Ciphers and Block Ciphers A stream cipher is one that encrypts a digital data stream one bit or one byte at a time. Examples of classical stream.
TE/CS 536 Network Security Spring 2005 – Lecture 8 Security of symmetric algorithms.
Cryptography and Network Security Chapter 6 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
1 Symmetric key cryptography: DES DES: Data Encryption Standard US encryption standard [NIST 1993] 56-bit symmetric key, 64 bit plaintext input How secure.
Privacy and Integrity: “ Two Essences of Network Security” Presenter Prosanta Gope Advisor Tzonelih Hwang Quantum Information and Network Security Lab,
Announcements: Homework 2 returned Homework 2 returned Monday: Written (concept and small calculations) exam on breaking ch 2 ciphers Monday: Written (concept.
DES Analysis and Attacks CSCI 5857: Encoding and Encryption.
1 The Data Encryption Standard. 2 Outline 4.1 Introduction 4.4 DES 4.5 Modes of Operation 4.6 Breaking DES 4.7 Meet-in-the-Middle Attacks.
David Evans CS551: Security and Privacy University of Virginia Computer Science Lecture 4: Dissin’ DES The design took.
Various Attacks on Cryptosystems slides (c) 2012 by Richard Newman.
Cryptography and Network Security
Cipher Transmission and Storage Modes Part 2: Stream Cipher Modes CSCI 5857: Encoding and Encryption.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Problem Set 1: Cryptography.
1 CPCS425: Information Security (Topic 5) Topic 5  Symmetrical Cryptography  Understand the principles of modern symmetric (conventional) cryptography.
Modes of Operation block ciphers encrypt fixed size blocks – eg. DES encrypts 64-bit blocks with 56-bit key need some way to en/decrypt arbitrary amounts.
CS480 Cryptography and Information Security
Computer and Network Security
Block Cipher Modes CS 465 Make a chart for the mode comparisons
Block cipher and modes of encryptions
PART VII Security.
Block vs Stream Ciphers
Counter Mode, Output Feedback Mode
Presentation transcript:

Announcements: Homework 3 due now Homework 3 due now Homework 4 posted Homework 4 postedToday: Attacks on DES Attacks on DESQuestions? DTTF/NB479: DszquphsbqizDay 14

DES can be broken by has been showing signs of weakness from the beginning

Only 2 56 = 72,057,594,037,927,936 keys, so it was brute forced using parallelism 1997: DES Challenge issued. $10K prize Found after searching ___% of keyspace Found after searching ___% of keyspace 1998: DES Challenge II Down to 39 days, 85% of keyspace! Down to 39 days, 85% of keyspace! Also in 1998…

DES Cracker used a mixture of software and specialized hardware Budget of only $200, dollars vs $20,000, dollars vs $20,000, dollarsResult?

Post-DES Brute force attacks that take O(N) DES computations are now reasonable. Can we just double encrypt to get O(N 2 ) computations? Use k1, k2 Use k1, k2 C = E k2 (E k1 (P)), so P = D k1 (D k2 (C)) ? C = E k2 (E k1 (P)), so P = D k1 (D k2 (C)) ?

Meet-in-the-middle attack Assume k completely determines E k and D k Know P and C = E k2 (E k1 (P)) P E k1 (P) (for all k1) C D k2 (C) (for all k2) Time complexity? O( n ) DES computations, O( n 2 ) comparisons O(n ) memory

Triple-DES? Type DES computations ComparisonsMemory Brute force DES Double C=E k2 (E k1 (P)) O(N) O(N 2 ) O(N) Triple1 C=E k3 (E k2 (E k1 (P))) Triple2 C=E k1 (E k2 (E k1 (P))) Triple3 C=E k2 (E k1 (E k1 (P))) Describe attacks on triple 1-3, fill out chart, and order by level of security

Triple-DES? Type DES computations ComparisonsMemory Brute force DES (3) Double C=E k2 (E k1 (P)) O(N) O(N 2 ) O(N) (1) Triple1 C=E k3 (E k2 (E k1 (P))) O(N 2 ) O(N 3 ) O(N 2 ) O(N 3 ) (2) Triple2 C=E k1 (E k2 (E k1 (P))) (3) Triple3 C=E k2 (E k1 (E k1 (P))) Describe attacks on triple 1-3, fill out chart, and order by level of security

Triple-DES? Type DES computations ComparisonsMemory Brute force DES (3) Double C=E k2 (E k1 (P)) O(N) O(N 2 ) O(N) (1) Triple1 C=E k3 (E k2 (E k1 (P))) O(N 2 ) O(N 3 ) O(N 2 ) O(N 3 ) (2) Triple2 C=E k1 (E k2 (E k1 (P))) O(N 2 ) O(N 3 ) O(N 2 ) (3) Triple3 C=E k2 (E k1 (E k1 (P))) Describe attacks on triple 1-3, fill out chart, and order by level of security

Triple-DES? Type DES computations ComparisonsMemory Brute force DES (3) Double C=E k2 (E k1 (P)) O(N) O(N 2 ) O(N) (1) Triple1 C=E k3 (E k2 (E k1 (P))) O(N 2 ) O(N 3 ) O(N 2 ) O(N 3 ) (2) Triple2 C=E k1 (E k2 (E k1 (P))) O(N 2 ) (3) Triple3 C=E k2 (E k1 (E k1 (P))) O(N) O(N 2 ) O(N) Describe attacks on triple 1-3, fill out chart, and order by level of security

DES Modes of Operation Electronic codebook: Each block is encoded independently TextASCII bit vector Block 1 (64 bits) DES Encoded 1 (64 bits) Encoded bit vector Block 2 (64 bits) DES Encoded 2 (64 bits) …

DES Modes of Operation Cipher-block chaining: Each plaintext block is XOR’ed with the previous ciphertext before going into DES TextASCII bit vector Block 1 (64 bits) DES Encoded 1 (64 bits) Encoded bit vector Block 2 (64 bits) DES Encoded 2 (64 bits) + … ++ C0C0 (random; sent in clear)

DES Modes of Operation Others: Cipher feedback: similar, but 64-bit blocks overlap, giving k bits at a time (like 8 for 1 character at a time) Cipher feedback: similar, but 64-bit blocks overlap, giving k bits at a time (like 8 for 1 character at a time) Uses pseudorandom bits like LFSR Output feedback: similar but helps catch errors before propagate. Output feedback: similar but helps catch errors before propagate. Counter: Some output can be computed independently, so better for parallelizing Counter: Some output can be computed independently, so better for parallelizing I trust you could implement these if needed. Not part of HW4…

HW4: DES Implementation I implemented EDEN in Java fairly quickly DES is obviously more complicated You’ll implement encryption and decryption. Correctness: Can use one to test the other. Can use one to test the other.Efficiency: In addition, it’d be nice to use a language that’s closer to the hardware for efficiency, like C or non-OO Java. In addition, it’d be nice to use a language that’s closer to the hardware for efficiency, like C or non-OO Java. Part of your grade will depend on this Part of your grade will depend on this There will also be a competition to see whose implementation is quickest! There will also be a competition to see whose implementation is quickest!

Questions so far on DES?