ICS 454: Principles of Cryptography

Slides:



Advertisements
Similar presentations
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
Advertisements

1 Lecture 3: Secret Key Cryptography Outline concepts DES IDEA AES.
1 CIS 5371 Cryptography 5b. Pseudorandom Objects in Practice Block Ciphers.
Cryptography and Network Security Chapter 3
Block Ciphers and the Data Encryption Standard
Cryptography and Network Security
Rachana Y. Patil 1 Data Encryption Standard (DES) (DES)
Cryptography1 CPSC 3730 Cryptography Chapter 3 DES.
DES 1 Data Encryption Standard DES 2 Data Encryption Standard  DES developed in 1970’s  Based on IBM Lucifer cipher  U.S. government standard  DES.
1 Chapter 3 – Block Ciphers and the Data Encryption Standard Modern Block Ciphers  now look at modern block ciphers  one of the most widely used types.
1 Chapter 3 – Block Ciphers and the Data Encryption Standard Modern Block Ciphers  now look at modern block ciphers  one of the most widely used types.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
ICS 454 Principles of Cryptography Advanced Encryption Standard (AES) (AES) Sultan Almuhammadi.
Lecture 23 Symmetric Encryption
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
CSE 651: Introduction to Network Security
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Data Encryption Standard (DES). Symmetric Cryptography  C = E(P,K)  P = D(C,K)  Requirements  Given C, the only way to obtain P should be with  the.
The Digital Encryption Standard CSCI 5857: Encoding and Encryption.
Chapter 2 Data Encryption Algorithms Part I
CSCI 5857: Encoding and Encryption
Network Security Lecture 14 Presented by: Dr. Munam Ali Shah.
Chapter 20 Symmetric Encryption and Message Confidentiality.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
TE/CS 536 Network Security Spring 2006 – Lectures 6&7 Secret Key Cryptography.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
Cryptography and Network Security
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Feistel Cipher Structure
Data Security and Encryption (CSE348) 1. Lecture # 6 2.
Classical Encryption techniques
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
DES Algorithm Data Encryption Standard. DES Features Block cipher, 64 bits per block 64-bit key, with only 56 bits effective ECB mode and CBC mode.
Stream Ciphers and Block Ciphers A stream cipher is one that encrypts a digital data stream one bit or one byte at a time. Examples of classical stream.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
 Cryptography is the science of using mathematics to encrypt and decrypt data.  Cryptography enables you to store sensitive.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Lecture 23 Symmetric Encryption
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
Fifth Edition by William Stallings
Computer and Network Security Rabie A. Ramadan Lecture 3.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Chapter 2 Symmetric Encryption.
Plaintextciphertext encryption algorithmdecryption algorithm plaintext.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
5.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 5 Introduction to Modern Symmetric-key Ciphers.
Module :MA3036NI Symmetric Encryption -3 Lecture Week 4.
Block Ciphers and the Data Encryption Standard. Modern Block Ciphers  One of the most widely used types of cryptographic algorithms  Used in symmetric.
CST 312 Pablo Breuer. A block of plaintext is treated as a whole and used to produce a ciphertext block of equal length Typically a block size of 64 or.
Information and Computer Security CPIS 312 Lab 6 & 7 1 TRIGUI Mohamed Salim Symmetric key cryptography.
@Yuan Xue CS 285 Network Security Block Cipher Principle Fall 2012 Yuan Xue.
1 CPCS425: Information Security (Topic 5) Topic 5  Symmetrical Cryptography  Understand the principles of modern symmetric (conventional) cryptography.
@Yuan Xue Announcement Project Release Team forming Homework 1 will be released next Tuesday.
Lecture 4 Data Encryption Standard (DES) Dr. Nermin Hamza
Provides Confidentiality
Chapter3: Block Ciphers and the Data Encryption Standard
Lecture 2.2: Private Key Cryptography II
ICS 454: Principles of Cryptography
Block Ciphers and the Data Encryption Standard (DES)
Chapter -2 Block Ciphers and the Data Encryption Standard
Advanced Encryption Standard
Advanced Encryption Standard
Florida State University
ICS 555: Block Ciphers & DES Sultan Almuhammadi.
Presentation transcript:

ICS 454: Principles of Cryptography Block Ciphers & DES Sultan Almuhammadi

Outline (Stallings 3.1-3.2) Stream cipher vs. Block cipher Motivation Reversible vs. Irreversible mapping Ideal Block Cipher DES

Stream Cipher & Block Cipher stream cipher: encrypts data stream one bit or one byte at a time. E.g.: Caesar shift cipher (one letter at time) XOR-scheme (one bit at a time) block cipher: a block of plaintext is treated as a whole and used to produce a ciphertext block of equal length. Block size (typically): 64 or 128 bits e.g. Feistel cipher and DES

Motivation A block cipher operates on a block of n bits. It produces a ciphertext block of n bits. There are 2n possible different plaintext/ciphertext blocks. The encryption must be reversible. i.e. decryption to be possible. each plaintext must produce a unique ciphertext block. (one-to-one correspondence)

Reversible vs. Irreversible Reversible Mapping Plaintext Ciphertext 00 11 01 10 10 00 11 01 Irreversible Mapping Plaintext Ciphertext 00 11 01 10 10 01 11 01

Ideal Block Cipher (a general substitution cipher) 0 0 1 1 0 0 0 1

Encryption/Decryption Table for Substitution Cipher

Problems with Ideal Cipher If a small block size, such as n = 4, is used, then the system is equivalent to a classical substitution cipher  Easy attack (statistical analysis of the plaintext) If large block size is usednot practical (for implementation and performance) Huge encryption/decryption tables  Huge key: for n = 4, key size = 4 bits x 16 rows = 64 bits for n = 64, key size = 64 x 264 = 270 = 1021 bits

Data Encryption Standard (DES) Widely used encryption scheme. Adopted by National Bureau of Standards in 1977. The algorithm itself is called Data Encryption Algorithm (DEA). Data are encrypted in 64-bit blocks using a 56-bit key.

DES Encryption

DES: Initial Permutation (IP)

DES: Inverse Initial Permutation

Single Round of DES Algorithm

DES: Expansion Permutation (E)

DES: S-Boxes

DES Encryption

DES Decryption Decryption uses the same algorithm as encryption, except that the application of the subkeys is reversed.