CS470, A.SelcukLucifer & DES1 Block Ciphers Lucifer & DES CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.

Slides:



Advertisements
Similar presentations
6.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 2 Data Encryption Standard (DES)
Advertisements

The Data Encryption Standard - see Susan Landau’s paper: “Standing the test of time: the data encryption standard.” DES - adopted in 1977 as a standard.
From Crypto-Theory to Crypto-Practice 1 CHAPTER 14: From Crypto-Theory to Crypto-Practice SHIFT REGISTERS The first practical approach to ONE-TIME PAD.
1 Lecture 3: Secret Key Cryptography Outline concepts DES IDEA AES.
1 CIS 5371 Cryptography 5b. Pseudorandom Objects in Practice Block Ciphers.
Cryptography and Network Security Chapter 3
The Advanced Encryption Standard (AES) Simplified.
Rachana Y. Patil 1 Data Encryption Standard (DES) (DES)
Data Encryption Standard (DES)
Cryptography and Network Security
Cryptography1 CPSC 3730 Cryptography Chapter 3 DES.
DES 1 Data Encryption Standard DES 2 Data Encryption Standard  DES developed in 1970’s  Based on IBM Lucifer cipher  U.S. government standard  DES.
1 Overview of the DES A block cipher: –encrypts blocks of 64 bits using a 64 bit key –outputs 64 bits of ciphertext A product cipher –basic unit is the.
1 Chapter 3 – Block Ciphers and the Data Encryption Standard Modern Block Ciphers  now look at modern block ciphers  one of the most widely used types.
1 Chapter 3 – Block Ciphers and the Data Encryption Standard Modern Block Ciphers  now look at modern block ciphers  one of the most widely used types.
Cryptography and Network Security (AES) Dr. Monther Aldwairi New York Institute of Technology- Amman Campus 10/18/2009 INCS 741: Cryptography 10/18/20091Dr.
Cryptography and Network Security Chapter 5. Chapter 5 –Advanced Encryption Standard "It seems very simple." "It is very simple. But if you don't know.
CS Network Security Lecture 2 Prof. Katz. 9/7/2000Lecture 2 - Data Encryption2 DES – Data Encryption Standard Private key. Encrypts by series of.
ICS 454 Principles of Cryptography Advanced Encryption Standard (AES) (AES) Sultan Almuhammadi.
6. Practical Constructions of Symmetric-Key Primitives
CS470, A.SelcukAfter the DES1 Block Ciphers After the DES CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Dr. Lo’ai Tawalbeh 2007 Chapter 5: Advanced Encryption Standard (AES) Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
CS555Spring 2012/Topic 91 Cryptography CS 555 Topic 9: Block Cipher Construction & DES.
Chapter 3 – Block Ciphers and the Data Encryption Standard
Dan Boneh Block ciphers The data encryption standard (DES) Online Cryptography Course Dan Boneh.
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Data Encryption Standard (DES). Symmetric Cryptography  C = E(P,K)  P = D(C,K)  Requirements  Given C, the only way to obtain P should be with  the.
The Digital Encryption Standard CSCI 5857: Encoding and Encryption.
The Data Encryption Standard - see Susan Landau’s paper: “Standing the test of time: the data encryption standard.” DES - adopted in 1977 as a standard.
CSCI 5857: Encoding and Encryption
Cryptography and Network Security Chapter 3. Modern Block Ciphers  now look at modern block ciphers  one of the most widely used types of cryptographic.
Cryptography Lecture 4 Stefan Dziembowski
Network Security Lecture 14 Presented by: Dr. Munam Ali Shah.
TE/CS 536 Network Security Spring 2006 – Lectures 6&7 Secret Key Cryptography.
Block ciphers Structure of a multiround block cipher
1 Lect. 7 : Data Encryption Standard. 2 Data Encryption Standard (DES)  DES - History 1976 – adopted as a federal standard 1977 – official publication.
Data Encryption Standard (DES) © 2000 Gregory Kesden.
Classical &ontemporyryptology 1 Block Cipher Today’s most widely used ciphers are in the class of Block Ciphers Today’s most widely used ciphers are in.
DES Algorithm Data Encryption Standard. DES Features Block cipher, 64 bits per block 64-bit key, with only 56 bits effective ECB mode and CBC mode.
Stream Ciphers and Block Ciphers A stream cipher is one that encrypts a digital data stream one bit or one byte at a time. Examples of classical stream.
1 CIS 5371 Cryptography 5a. Pseudorandom Objects in Practice Block Ciphers B ased on: Jonathan Katz and Yehuda Lindell Introduction to Modern Cryptography.
‘Baby DES’ cipher Alexei Vernitski. Block cipher A message is a sequence of bits: … We split the message in blocks of a fixed length.
Description of a New Variable-Length Key, 64-Bit Block Cipher (BLOWFISH) Bruce Schneier BY Sunitha Thodupunuri.
Le Trong Ngoc Security Fundamentals (2) Encryption mechanisms 4/2011.
LUCIFER hell's favorite cipher.... By: OUTSOURCED Trevin Maerten Eitan Romanoff.
Introduction to Information Security Lect. 6: Block Ciphers.
Fifth Edition by William Stallings
Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.
CSC 386 – Computer Security Scott Heggen. Agenda Cryptography (i.e., Confusion and Diffusion)
Computer and Network Security Rabie A. Ramadan Lecture 3.
Module :MA3036NI Symmetric Encryption -4 Lecture Week 5.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
© Information Security Group, ICU1 Block Cipher- introduction  DES Description: Feistel, S-box Exhaustive Search, DC and LC Modes of Operation  AES Description:
DES Analysis and Attacks CSCI 5857: Encoding and Encryption.
Block Cipher- introduction
1 The Data Encryption Standard. 2 Outline 4.1 Introduction 4.4 DES 4.5 Modes of Operation 4.6 Breaking DES 4.7 Meet-in-the-Middle Attacks.
Data Encryption Standard (DES) most widely used block cipher in world adopted in 1977 by NBS (now NIST) – as FIPS PUB 46 encrypts 64-bit data using 56-bit.
CS519, © A.SelcukDifferential & Linear Cryptanalysis1 CS 519 Cryptography and Network Security Instructor: Ali Aydin Selcuk.
DES: Data Encryption Standard
Data Encryption Standard 1977 “New Directions in Cryptography” 1976.
CSE 5/7353 – January 25 th 2006 Cryptography. Conventional Encryption Shared Key Substitution Transposition.
Information and Computer Security CPIS 312 Lab 6 & 7 1 TRIGUI Mohamed Salim Symmetric key cryptography.
@Yuan Xue Announcement Project Release Team forming Homework 1 will be released next Tuesday.
Data Encryption Standard (DES) Financial companies found the need for a cryptographic algorithm that would have the blessing of the US government (=NSA)
Lecture 4 Data Encryption Standard (DES) Dr. Nermin Hamza
6b. Practical Constructions of Symmetric-Key Primitives.
Symmetric Key Block Ciphers
Cryptography Lecture 16.
Presentation transcript:

CS470, A.SelcukLucifer & DES1 Block Ciphers Lucifer & DES CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk

CS470, A.SelcukLucifer & DES2 Block Ciphers & S-P Networks Block Ciphers: Substitution ciphers with large block size (≥ 64 bits) How to define a good substitution for such large blocks? “SP Networks” (Shannon, 1949) –small, carefully designed substitution boxes (“confusion”) –their output mixed by a permutation box (“diffusion”) –iterated a certain number of times

CS470, A.SelcukLucifer & DES3 Lucifer Early 1970s: First serious needs for civilian encryption (in electronic banking) IBM’s response: Lucifer, an iterated SP cipher Lucifer (v0): –Two fixed, 4x4 s-boxes, S 0 & S 1 –A fixed permutation P –Key bits determine which s-box is to be used at each position –8 x 64/4 = 128 key bits (for 64-bit block, 8 rounds)..... P S0S0 S1S1 S0S0 S1S1 S0S0 S1S1 S0S0 S1S1 S0S0 S1S1 S0S0 S1S1 P S0S0 S1S1 S0S0 S1S1 S0S0 S1S1 x E K (x)

CS470, A.SelcukLucifer & DES4 Feistel Ciphers A straightforward SP cipher needs twice the hardware: one for encryption (S, P), one for decryption (S -1, P -1 ). Feistel’s solution: Lucifer v1: Feistel SP cipher; 64-bit block, 128-bit key, 16 rounds. x E K (x) LR f  ...   f f f where the f function is SP: x SSS.. P f(x, k i ) kiki (xhy?)

CS470, A.SelcukLucifer & DES5 Data Encryption Standard (DES) Need for a standardized cipher to protect computer and communications data NBS’ request for proposals (1973) IBM’s submission Lucifer is adopted after a revision by NSA.

CS470, A.SelcukLucifer & DES6 From Lucifer to DES 8 fixed, 6x4 s-boxes (non-invertible) expansion E (simple duplication of 16 bits) round keys are used only for xor with the input 56-bit key size 16 x 48 round key bits are selected from the 56-bit master key by the “key schedule”. x S1S1 S2S2 S8S8.. P f(x, k i ) kiki 32  48 E 32 bits

CS470, A.SelcukLucifer & DES7 The DES Contraversy Design process not made public. Any hidden trapdoors in the s-boxes? 56-bit key length is too short. Is it so that NSA can break it?

CS470, A.SelcukLucifer & DES8 Strengthening DES Multiple DES encryption 3DES: E K3 (D K2 (E K1 (x))) –Why not 2DES? (112-bit key not long enough?) –Why “D”? –Two-key 3DES: K3 = K1 DES-X (Rivest, 1995) E K (x  K1)  K2 –overhead cost minimal –construction is provably secure (Rogaway & Killian) –Why not E K (x)  K2 or E K (x  K1) ?