Encryption Schemes Second Pass Brice Toth 21 November 2001.

Slides:



Advertisements
Similar presentations
DES The Data Encryption Standard (DES) is a classic symmetric block cipher algorithm. DES was developed in the 1970’s as a US government standard The block.
Advertisements

Origins  clear a replacement for DES was needed Key size is too small Key size is too small The variants are just patches The variants are just patches.
“Advanced Encryption Standard” & “Modes of Operation”
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
1 Lecture 3: Secret Key Cryptography Outline concepts DES IDEA AES.
1 CIS 5371 Cryptography 5b. Pseudorandom Objects in Practice Block Ciphers.
Cryptography and Network Security Chapter 5 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Computer Science CSC 405By Dr. Peng Ning1 CSC 405 Introduction to Computer Security Topic 2. Basic Cryptography (Part II)
Cryptography1 CPSC 3730 Cryptography Chapter 6 Triple DES, Block Cipher Modes of Operation.
CMSC 414 Computer (and Network) Security Lecture 5 Jonathan Katz.
Cryptography and Network Security
1 The AES block cipher Niels Ferguson. 2 What is it? Block cipher: encrypts fixed-size blocks. Design by two Belgians. Chosen from 15 entries in a competition.
Chapter 5 Cryptography Protecting principals communication in systems.
J. Wang. Computer Network Security Theory and Practice. Springer 2008 Chapter 2 Data Encryption algorithms Part II.
AES clear a replacement for DES was needed
Cryptography and Network Security (AES) Dr. Monther Aldwairi New York Institute of Technology- Amman Campus 10/18/2009 INCS 741: Cryptography 10/18/20091Dr.
1 CS 255 Lecture 4 Attacks on Block Ciphers Brent Waters.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
Introduction to Symmetric Block Cipher Jing Deng Based on Prof. Rick Han’s Lecture Slides Dr. Andreas Steffen’s Security Tutorial.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 5 Wenbing Zhao Department of Electrical and Computer Engineering.
Cryptography and Network Security Chapter 5. Chapter 5 –Advanced Encryption Standard "It seems very simple." "It is very simple. But if you don't know.
Cryptography and Network Security Chapter 5 Fourth Edition by William Stallings.
CS Network Security Lecture 2 Prof. Katz. 9/7/2000Lecture 2 - Data Encryption2 DES – Data Encryption Standard Private key. Encrypts by series of.
Lecture 23 Symmetric Encryption
CS470, A.SelcukAfter the DES1 Block Ciphers After the DES CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Dr. Lo’ai Tawalbeh 2007 Chapter 5: Advanced Encryption Standard (AES) Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Data Encryption Standard (DES). Symmetric Cryptography  C = E(P,K)  P = D(C,K)  Requirements  Given C, the only way to obtain P should be with  the.
Lecture 3: Cryptographic Tools modified from slides of Lawrie Brown.
Practical Techniques for Searches on Encrypted Data Yongdae Kim Written by Song, Wagner, Perrig.
Chapter 5 Advanced Encryption Standard. Origins clear a replacement for DES was needed –have theoretical attacks that can break it –have demonstrated.
The Data Encryption Standard - see Susan Landau’s paper: “Standing the test of time: the data encryption standard.” DES - adopted in 1977 as a standard.
Chapter 5 –Advanced Encryption Standard "It seems very simple." "It is very simple. But if you don't know what the key is it's virtually indecipherable."
Applied Cryptography Example: AES. Advanced Encryption Standard "It seems very simple." "It is very simple. But if you don't know what the key is it's.
9/17/15UB Fall 2015 CSE565: S. Upadhyaya Lec 6.1 CSE565: Computer Security Lecture 6 Advanced Encryption Standard Shambhu Upadhyaya Computer Science &
Classical &ontemporyryptology 1 AESAES Classical &ontemporyryptology 2 Advanced Encryption Standard Since DES was becoming less reliable as new cryptanalysis.
Advance Encryption Standard. Topics  Origin of AES  Basic AES  Inside Algorithm  Final Notes.
AES Background and Mathematics CSCI 5857: Encoding and Encryption.
Information Security Lab. Dept. of Computer Engineering 122/151 PART I Symmetric Ciphers CHAPTER 5 Advanced Encryption Standard 5.1 Evaluation Criteria.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Chapter 20 Symmetric Encryption and Message Confidentiality.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
3DES and Block Cipher Modes of Operation CSE 651: Introduction to Network Security.
Multiple Encryption & DES  clearly a replacement for DES was needed Vulnerable to brute-force key search attacks Vulnerable to brute-force key search.
DES Algorithm Data Encryption Standard. DES Features Block cipher, 64 bits per block 64-bit key, with only 56 bits effective ECB mode and CBC mode.
Modes of Usage Dan Fleck CS 469: Security Engineering These slides are modified with permission from Bill Young (Univ of Texas) 11 Coming up: Modes of.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Advanced Encryption Standard. Origins NIST issued a new version of DES in 1999 (FIPS PUB 46-3) DES should only be used in legacy systems 3DES will be.
Lecture 23 Symmetric Encryption
Cryptography Lecture 17: Advanced Encryption Standard (AES) Piotr Faliszewski.
Fifth Edition by William Stallings
Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.
Chapter 2 (C) –Advanced Encryption Standard. Origins clearly a replacement for DES was needed –have theoretical attacks that can break it –have demonstrated.
Advanced Encryption Standard Dr. Shengli Liu Tel: (O) Cryptography and Information Security Lab. Dept. of Computer.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 7 September 9, 2004.
Module :MA3036NI Symmetric Encryption -3 Lecture Week 4.
1 CPCS425: Information Security (Topic 5) Topic 5  Symmetrical Cryptography  Understand the principles of modern symmetric (conventional) cryptography.
Zong-Cing Lin 2007/10/31.  Algorithm Description  Why chose Rijndael  Reference.
Practical Aspects of Modern Cryptography Josh Benaloh & Brian LaMacchia.
Triple DES.
مروري برالگوريتمهاي رمز متقارن(كليد پنهان)
ADVANCED ENCRYPTION STANDARDADVANCED ENCRYPTION STANDARD
Chapter -3 ADVANCED ENCRYPTION STANDARD & BLOCK CIPHER OPERATION
SYMMETRIC ENCRYPTION.
Advanced Encryption Standard
Secret-Key Encryption
Presentation transcript:

Encryption Schemes Second Pass Brice Toth 21 November 2001

Introduction Background Info Stream Ciphers Private-key Methods Public-key Methods Block Ciphers Types of Attacks

Constructions of Secure Encryption Schemes Key ideas: –Using any pseudorandom function, one can construct secure private-key encryption schemes –Using any trapdoor one-way permutation, one can construct secure public-key encryption schemes –Secure schemes must employ a probabilistic (randomized) encryption algorithm so that one cannot distinguish two encryptions of the same message

Stream Ciphers Typically there are less Stream Ciphers in use than Block Ciphers –Difficult to use correctly Basis: –Pseudorandom Generators –Keys –States –XOR

Stream Ciphers Basic Construction: –Key-generation/Initial State Uniformly select R (random number) and generate key pair (r,r) and set initial state to t=0 –Encrypting Plaintext Encrypt plaintext x with key r and state t such that l=|x| and p is the l-bit suffix of the encryption algorithm with input r and 1^(t+l) so that ciphertext is x  p, and new state is t+l –Decrypting Ciphertext Decrypt ciphertext y with key r and state t such that l=|y| and p is the l-bit suffix again so that the plaintext is y  p

Stream Ciphers Why are they so hard to use? –Must never reuse a key If key is reused, same stream of output generated –Must keep track of states –Must always depend on other things: Some way to agree on keys Authentication Synchronization

Stream Ciphers Some examples: –A5 –RC4 –SOBER –WAKE –SEAL –Panama

Private-key Methods Basic Construction: –Block Cipher with length n for message x –Generate key by selecting seed s and applying function f s –Encryption algorithm selects a uniform string r and produces ciphertext (r,x  f s (r)) –Decrypt ciphertext (r,y) using key s by computing y  f s (r)

Public-key Methods Basic Construction: –Key generation selects a random permutation p from a collection of trapdoor permutations, along with a trapdoor  (p serves as the public-key and  serves as the private-key) –When encrypting a bit b, the encryption algorithm randomly selects an element r in the domain of p and produces ciphertext (p(r),b  r)

Public-key Methods –Decrypting occurs by taking ciphertext (y, s) and computing the inverse using  or s  r(p -1 (y)) The security of the scheme follows from the one-way feature of the collection p

Block Ciphers Basis: –Take blocks of input and encrypt entire block –Reusable keys –Different modes Keep in mind potential problem areas: –Block padding –Initialization vectors –Codebook attacks, use the right modes

Block Ciphers Modes of Operation: –Different characteristics Error propagation Resynchronization Block resolution Efficiency Increase in data size –4 Modes defined in Federal Information Processing Standards

Block Ciphers Electronic Code Book – separately encrypt each block, patterns recognizable, “codebook” can be built up Cipher Block Chaining – XOR plaintext with previous ciphertext block, then encrypt, use initialization vector for first block, makes identical inputs look different

Block Ciphers Ciphertext Feedback – take previous ciphertext, encrypt, then XOR with plaintext Output Feedback – encrypt previous output, then XOR with plaintext to get ciphertext, uses counters to determine where to take from output

Block Ciphers Basic Construction: –Generate key pair –Encrypt plaintext Break message into consecutive blocks of length l (possibly have to augment the last block with some padding) Encrypt each block with encryption key r –Decrypt ciphertext Decrypt each block with decryption key d and concatenate blocks less padding to get plaintext

Block Ciphers The Basic Construction results in ciphertexts that reveal the exact length of the original plaintext –This is acceptable and completely hiding the length is futile –Encryption schemes that hide some information about the length of the plaintext can easily be constructed

Block Ciphers Some examples: –DES –Blowfish –IDEA –SAFER –CAST –AES (Rijndael)

Block Ciphers - AES Advanced Encryption Standard National Institute of Standards and Technology search for standard replacement for DES –Requirements: 128 bit blocksize 128, 192, 256 bit keys –Finalists announced in August 1999

Block Ciphers - AES –Serpent –Rijndael –Twofish –Mars –RC6 Winner: Rijndael

Block Ciphers - AES Joan Daemen and Vincent Rijmen (Belgium) Based on an algorithm called Square Supports keys which are multiples of 32 bits and block sizes which are multiples of 64 bits Number of rounds changes based on key size Generally faster than the other candidates

Block Ciphers - AES Key Schedule for Rijndael: –Expand cipher key (varies depending on key length, uses linear recurrence relations) –Round keys are taken from the expanded cipher key –Round keys are then rotated, passed through the S-box, and XOR’d with a round dependent constant (constants based on similar computation to S-box)

Block Ciphers - AES Variable rounds: –9 if both block and key are 128 bits –11 if either block or key is 192 bits and neither are longer than that –13 if either block or key is 256 bits –etc

Block Ciphers - AES Using Rijndael: 1.Perform Add Round Key Step (XOR a subkey with the block) 2.Perform rounds: 1.Byte Sub (each byte of the block is replaced by its substitute from an S-box) 2.Shift Row 1.Bytes are arranged in a rectangle and shifted, ex. from to

Block Ciphers - AES The S-box is:

Block Ciphers - AES 3.Mix Column –Matrix multiplication performed where each column is multiplied by: Add round key (XOR subkey for current round) »An extra final round is added where the mix column step is omitted

Block Ciphers - AES

Types of Attacks Passive Attacks –Adversary eavesdrops on the line and possibly gets the sender to encrypt a message of the adversary’s choice and/or gets the sender to decrypt a ciphertext of the adversary’s choice Key-oblivious: choice of plaintext does not depend on the key Key-dependent: choice of plaintext does depend on the key

Types of Attacks Chosen Plaintext Attacks –Attacker obtains the encryption of any plaintext of its choice (under the key being attacked) Chosen Ciphertext Attacks –Attacker obtains the decryption of any ciphertext of its choice (under the key being attacked)