Block and Stream Ciphers1 Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.

Slides:



Advertisements
Similar presentations
Conventional Encryption: Algorithms
Advertisements

CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
CMSC 414 Computer (and Network) Security Lecture 4 Jonathan Katz.
Digital Kommunikationselektroink TNE027 Lecture 6 (Cryptography) 1 Cryptography Algorithms Symmetric and Asymmetric Cryptography Algorithms Data Stream.
CIS 5371 Cryptography 3b. Pseudorandomness.
Week 2 - Friday.  What did we talk about last time?  Substitution ciphers  Vigenère ciphers  One-time pad.
Block Ciphers and the Data Encryption Standard
Cryptography and Network Security
CSE331: Introduction to Networks and Security Lecture 19 Fall 2002.
CSCI283 Fall 2005 GWU All slides from Bishop’s slide set Stream Ciphers.
 Stream ciphers o Encrypt chars/bits one at a time o Assume XOR w the key, need long key to be secure  Keystream generators (pseudo-random key) o Synchronous.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
Announcements: Matlab: tutorial available at Matlab: tutorial available at
CMSC 414 Computer (and Network) Security Lecture 5 Jonathan Katz.
HSC: Building Stream Cipher from Secure Hash Functions Juncao Li Nov. 29 th 2007 Department of Computer Science Portland State University.
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
RSA ( Rivest, Shamir, Adleman) Public Key Cryptosystem
Announcements: Assignment 2 finalized Assignment 2 finalizedQuestions?Today: Wrap up Hill ciphers Wrap up Hill ciphers One-time pads and LFSR One-time.
Algorithms for encryption. Historical perspective Caesar cipher: letter = letter + 3 ‘fish’ ‘ilvk’ rot13: Add 13/swap alphabet halves Usenet convention.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
CMSC 414 Computer and Network Security Lecture 4 Jonathan Katz.
Ref: STAL03More Concepts of Cryptography and Cryptanalysis 1 Reference –William Stallings, Cryptography and Network Security, 3rd Edition, Prentice Hall.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
CMSC 414 Computer and Network Security Lecture 5 Jonathan Katz.
Computer Security CS 426 Lecture 3
Network Security Chapter
AES Proposal: Rijndael Joan Daemen Vincent Rijmen “Rijndael is expected, for all key and block lengths defined, to behave as good as can be expected from.
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
Practical Techniques for Searches on Encrypted Data Yongdae Kim Written by Song, Wagner, Perrig.
Dan Boneh Stream ciphers The One Time Pad Online Cryptography Course Dan Boneh.
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
Códigos y Criptografía Francisco Rodríguez Henríquez A Short Introduction to Stream Ciphers.
Week 2 - Wednesday.  What did we talk about last time?  Encryption  Shift ciphers  Transposition ciphers.
Introduction to Stream Cipher Sayed Mahdi Mohammad Hasanzadeh Spring 2004.
One-Time Pad Or Vernam Cipher Sayed Mahdi Mohammad Hasanzadeh Spring 2004.
CS555Spring 2012/Topic 51 Cryptography CS 555 Topic 5: Pseudorandomness and Stream Ciphers.
Stream Cipher. A stream cipher breaks the message M into successive characters or bits m 1, m 2,..., and enciphers each m i with the ith element k i of.
Stream Ciphers Making the one-time pad practical.
13. BETTER SYMMETRIC CIPHER STREAM CIPHERS 1. SOME TRICKS FOR SUBSTITUTION CIPHER There are some tricks to make substitution cipher safer: Nulls: insert.
NUMBER THEORY Chapter 5: Cryptology. Era of Electronic Electronic communication Electronic Banking.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Classical Encryption techniques
CMSC 414 Computer and Network Security Lecture 5 Jonathan Katz.
Cryptograpy By Roya Furmuly W C I H D F O P S L 7.
Chapter 9: Algorithms Types and Modes Dulal C. Kar Based on Schneier.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
Modes of Usage Dan Fleck CS 469: Security Engineering These slides are modified with permission from Bill Young (Univ of Texas) 11 Coming up: Modes of.
‘Baby DES’ cipher Alexei Vernitski. Block cipher A message is a sequence of bits: … We split the message in blocks of a fixed length.
Data Encryption Standard CS-471/971. Category of Standard: Computer Security. Explanation: The Data Encryption Standard (DES) specifies a FIPS approved.
Introduction to Modern Symmetric-key Ciphers
Vigenere Cipher For example, choose a word “GOLD” for a key. And, add “GOLDGOLDGOLD….” to your plaintext Plaintext: t o o m u c h h y p e Key : GOLDGOLDGOLD.
Homework #1 J. H. Wang Oct. 2, 2013.
CS555Spring 2012/Topic 31 Cryptography CS 555 Topic 3: One-time Pad and Perfect Secrecy.
Vigenère Tableau Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
Module :MA3036NI Symmetric Encryption -3 Lecture Week 4.
NATO ARW, 6-9 October, 2008, Veliko Tarnovo, Bulgaria Error Correcting Cryptcodes Based on Quasigroups SMILE MARKOVSKI “Ss Cyril and Methodius” University.
University of Malawi, Chancellor College
Chapter 7 – Confidentiality Using Symmetric Encryption.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
Substitution Ciphers Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
Information and Network Security Lecture 2 Dr. Hadi AL Saadi.
หัวข้อบรรยาย Stream cipher RC4 WEP (in)security LFSR CSS (in)security.
Transposition Ciphers
Rivest, Shamir and Adleman
Cryptography Lecture 12.
Pseudorandom Numbers Network Security.
Presentation transcript:

Block and Stream Ciphers1 Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.

Block and Stream Ciphers2 Block Ciphers Block ciphers break messages into fixed length blocks, and encrypt each block using the same key. The Data Encryption Standard (DES) is an example of a block cipher, where blocks of 64 bits are encrypted using a 56-bit key.

Block and Stream Ciphers3 Formal Definition of a Block Cipher Let E be an encipherment algorithm, and let E k (b) be the encipherment of the message b with key k. Let a message m=b 1 b 2...where each b i is of a fixed length. A block cipher is a cipher for which E k (m) = E k (b 1 )E k (b 2 )...

Block and Stream Ciphers4 Stream Ciphers Stream ciphers, like block ciphers, break message into fixed length blocks, but use a sequence of keys to encrypt the blocks. The Vigenère cipher is an example of a stream cipher.

Block and Stream Ciphers5 Formal Definition of a Stream Cipher Let E be an encipherment algorithm, and let E k (b) be the encipherment of the message b with key k. Let a message m=b 1 b 2...where each b i is of a fixed length, and let k = k 1 k A stream cipher is a cipher for which E k (m) = E k 1 (b 1 )E k 2 (b 2 )...

Block and Stream Ciphers6 Synchronous Stream Ciphers The one-time pad is also a stream cipher, and can be implemented by exclusive-oring each bit of the key with one bit of the message. A synchronous stream cipher generates the key string from a source other than the message itself. A source for the key could come from an randomly generated binary sequence.

Block and Stream Ciphers7 Self-Synchronous Stream Ciphers Self-synchronous stream ciphers obtain a key from the message itself. An autokey cipher is a self-synchronous cipher that uses the message itself as a key.