Lecture 2.2: Private Key Cryptography II CS 436/636/736 Spring 2012 Nitesh Saxena.

Slides:



Advertisements
Similar presentations
1 Lecture 3: Secret Key Cryptography Outline concepts DES IDEA AES.
Advertisements

1 CIS 5371 Cryptography 5b. Pseudorandom Objects in Practice Block Ciphers.
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
Cryptography and Network Security Chapter 3
Lecture 2.1: Private Key Cryptography -- I CS 436/636/736 Spring 2013 Nitesh Saxena.
Block Ciphers and the Data Encryption Standard
Rachana Y. Patil 1 Data Encryption Standard (DES) (DES)
Data Encryption Standard (DES)
Lecture 3.3: Public Key Cryptography III CS 436/636/736 Spring 2012 Nitesh Saxena.
Cryptography and Network Security, resuming some notes Dr. M. Sakalli.
DES 1 Data Encryption Standard DES 2 Data Encryption Standard  DES developed in 1970’s  Based on IBM Lucifer cipher  U.S. government standard  DES.
1 Overview of the DES A block cipher: –encrypts blocks of 64 bits using a 64 bit key –outputs 64 bits of ciphertext A product cipher –basic unit is the.
ICS 454: Principles of Cryptography
Introduction to Symmetric Block Cipher Jing Deng Based on Prof. Rick Han’s Lecture Slides Dr. Andreas Steffen’s Security Tutorial.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 5 Wenbing Zhao Department of Electrical and Computer Engineering.
Computer Networking Lecture 21: Security and Cryptography Thanks to various folks from , semester’s past and others.
CS Network Security Lecture 2 Prof. Katz. 9/7/2000Lecture 2 - Data Encryption2 DES – Data Encryption Standard Private key. Encrypts by series of.
Lecture 23 Symmetric Encryption
CS555Spring 2012/Topic 91 Cryptography CS 555 Topic 9: Block Cipher Construction & DES.
Chapter 3 – Block Ciphers and the Data Encryption Standard
CSE 651: Introduction to Network Security
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Data Encryption Standard (DES). Symmetric Cryptography  C = E(P,K)  P = D(C,K)  Requirements  Given C, the only way to obtain P should be with  the.
Public Key Model 8. Cryptography part 2.
Understanding Cryptography – A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl Chapter 3 – The Data Encryption.
Lecture 2: Private Key Cryptography II CS 436/636/736 Spring 2015 Nitesh Saxena.
Network Security Lecture 14 Presented by: Dr. Munam Ali Shah.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Chapter 20 Symmetric Encryption and Message Confidentiality.
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Symmetric-Key Cryptography
Cracking DES Cryptosystem A cryptosystem is made of these parts: Two parties who want to communicate over an insecure channel An encryption algorithm that.
DES Attacks and Triple DES
Dr. Reuven Aviv, Nov 2008 Conventional Encryption 1 Conventional Encryption & Message Confidentiality Acknowledgements for slides Henric Johnson Blekinge.
Traditional Symmetric-Key Ciphers
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Description of a New Variable-Length Key, 64-Bit Block Cipher (BLOWFISH) Bruce Schneier BY Sunitha Thodupunuri.
TE/CS 536 Network Security Spring 2005 – Lecture 8 Security of symmetric algorithms.
Le Trong Ngoc Security Fundamentals (2) Encryption mechanisms 4/2011.
Lecture 2: Introduction to Cryptography
Lecture 23 Symmetric Encryption
Fifth Edition by William Stallings
Cracking the DES Encryption
COMP 424 Lecture 04 Advanced Encryption Techniques (DES, AES, RSA)
Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.
Data Encryption Standard (DES)
Chapter 2 Symmetric Encryption.
DES Analysis and Attacks CSCI 5857: Encoding and Encryption.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
Block Cipher- introduction
1 The Data Encryption Standard. 2 Outline 4.1 Introduction 4.4 DES 4.5 Modes of Operation 4.6 Breaking DES 4.7 Meet-in-the-Middle Attacks.
David Evans CS551: Security and Privacy University of Virginia Computer Science Lecture 4: Dissin’ DES The design took.
Conventional Encryption Chapter 4. Multiple DES Advantage of extra stages –Each stage gives 56 more bits of key length –Double DES subject to meet-in-the-middle.
Block Ciphers and the Data Encryption Standard. Modern Block Ciphers  One of the most widely used types of cryptographic algorithms  Used in symmetric.
CSE 5/7353 – January 25 th 2006 Cryptography. Conventional Encryption Shared Key Substitution Transposition.
1 CPCS425: Information Security (Topic 5) Topic 5  Symmetrical Cryptography  Understand the principles of modern symmetric (conventional) cryptography.
Lecture 4 Data Encryption Standard (DES) Dr. Nermin Hamza
CS480 Cryptography and Information Security
Lecture 2: Private Key Cryptography II CS 436/636/736 Spring 2016 Nitesh Saxena.
Lecture 2.2: Private Key Cryptography II
Lecture 2: Cryptography I
Lecture 3: Symmetric Key Encryption
Cryptography Lecture 17.
Presentation transcript:

Lecture 2.2: Private Key Cryptography II CS 436/636/736 Spring 2012 Nitesh Saxena

Today’s fun/informative bit – The Smudge Attack See: 7/3/2015 Lecture Private Key Cryptography II 2

Course Administration TA/Grader: Eric Frees – – Office hours: 2-4pm on Wednesdays, Ugrad lab (CH 154) 7/3/2015 Lecture Private Key Cryptography II 3

Outline of today’s lecture Block Ciphers Data Encryption Standard (DES) 7/3/2015 Lecture Private Key Cryptography II 4

Block Ciphers and Stream Ciphers Block ciphers partition plaintext into blocks and encrypt each block independently (with the same key) to produce ciphertext blocks. A stream cipher generates a keystream and encrypts by combining the keystream with the plaintext, usually with the bitwise XOR operation. We will focus mostly on Block Ciphers 7/3/2015 Lecture Private Key Cryptography II 5

DES – Data Encryption Standard Encrypts by series of substitution and transpositions. Based on Feistel Structure Worldwide standard for more than 20 years. Designed by IBM (Lucifer) with later help (interference?) from NSA. No longer considered secure for highly sensitive applications. Replacement standard AES (advanced encryption standard) recently completed. 7/3/2015 Lecture Private Key Cryptography II 6

DES – Overview (Block Operation) 7/3/2015 Lecture Private Key Cryptography II 7

DES – Each Round 7/3/20158

DES – Function F 7/3/2015 Lecture Private Key Cryptography II 9

DES – Key Schedule (KS) 7/3/2015 Lecture Private Key Cryptography II 10

Operation Tables of DES: Key Schedule, PC-1, PC-2 7/3/2015 Lecture Private Key Cryptography II 11

Operation Tables (IP, IP -1, E and P) 7/3/2015 Lecture Private Key Cryptography II 12

S-boxes: S1 (as an example) /3/2015 Lecture Private Key Cryptography II 13 Is the table entry from

DES Decryption Same as the encryption algorithm with the “reversed” key schedule – NEXT! 7/3/2015 Lecture Private Key Cryptography II 14

Plain text Initial permutation (IP) Round-1 (key K 1 ) Round-16 (key K 16 ) swap IP inverse Cipher text Rounds /3/201515

IP inverse Cipher text IP Round-1 (K 16 ) = Since encrypt decrypt 7/3/2015 Lecture Private Key Cryptography II 16

DES Example 7/3/2015 Lecture Private Key Cryptography II 17 We choose a random plaintext block and a random key, and determine what the ciphertext block would be (all in hexadecimal):

Example (contd) -- encryption 7/3/2015 Lecture Private Key Cryptography II 18

Example (contd) -- decryption 7/3/2015 Lecture Private Key Cryptography II 19 Let us see how Bob, at the destination, can decipher the ciphertext received from Alice using the same key. Table 6.16 shows some interesting points.

DES Security: Avalanche Effect 7/3/2015 Lecture Private Key Cryptography II 20

DES Security S-Box design not well understood Has survived some recent sophisticated attacks (differential cryptanalysis) Key is too short. Hence is vulnerable to brute force attack distributed attack took 3 months. $1,000,000 machine will crack DES in 35 minutes – 1997 estimate. $10,000 – 2.5 days. 7/3/2015 Lecture Private Key Cryptography II 21

DES Cracking machine 7/3/2015 Lecture Private Key Cryptography II 22

Super-encryption. If key length is a concern, then instead of encrypting once, encrypt twice!! C = E K2 (E K1 (P)) P = D K2 (D K1 (C)) Does this result in a larger key space? Encrypting with multiple keys is known as super-encryption. May not always be a good idea 7/3/2015 Lecture Private Key Cryptography II 23

Double DES Double DES is almost as easy to break as single DES (Needs more memory though)! 7/3/2015 Lecture Private Key Cryptography II 24

Double DES – Meet-in-the-middle Attack (due to Diffie-Hellman) Based on the observation that, if C = E K2 (E K1 (P)) Then X = E K1 (P) = D K2 (C). Given a known (P, C) pair, encrypt P with all possible values of K and store result in table T. Next, decrypt C with all possible keys K and check result. If match occurs then check key pair with new known (P, C) pair. If match occurs, you have found the keys. Else continue as before. Process will terminate successfully. 7/3/2015 Lecture Private Key Cryptography II 25

Meet-in-the-middle Explanation The first match does not say anything as we have 2 64 ciphertexts and keys. On the average / 2 64 = 2 48 keys will produce same ciphertext. So there could be 2 48 possible candidates We can use a second pair (P’,C’) So, probability that false alarm will survive two known (P, C) pairs is 2 48 / 2 64 = One can always check a third pair to further reduce the chance of a false alarm. 7/3/2015 Lecture Private Key Cryptography II 26

Triple DES 27 Triple DES (2 keys) requires search. Is reasonably secure. Triple DES (3 keys) requires as well Which one is better?

Some Questions Double encryption in DES increases the key space size from 2^56 to 2^112 – true or false? Is known-plaintext an active or a passive attack? Is chosen-ciphertext attack an active or a passive attack? Reverse Engineering is applied to what design of systems – open or closed? Alice needs to send a 64-bit long top-secret letter to Bob. Which of the ciphers that we studied today should she use? 7/3/2015 Lecture Private Key Cryptography II 28

Further Reading Chapter 7.4 of HAC Chapter 3 of Stallings 7/3/2015 Lecture Private Key Cryptography II 29