Dr. Khalid A. Kaabneh Amman Arab University

Slides:



Advertisements
Similar presentations
6.1.2 Overview DES is a block cipher, as shown in Figure 6.1.
Advertisements

DES The Data Encryption Standard (DES) is a classic symmetric block cipher algorithm. DES was developed in the 1970’s as a US government standard The block.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
1 Lecture 3: Secret Key Cryptography Outline concepts DES IDEA AES.
1 CIS 5371 Cryptography 5b. Pseudorandom Objects in Practice Block Ciphers.
Cryptography and Network Security Chapter 3
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Block Ciphers: Workhorses of Cryptography COMP 1721 A Winter 2004.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 29 Cryptography and Network.
Announcement Homework 1 out, due 1/18 11:59pm If you purchased the textbooks, but it hasn’t arrived, please see TA for copies of the questions, Project.
First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown and edited by Archana Chidanandan Cryptographic Tools.
Simplified DES CS-480b Network Security Dick Steflik.
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
1 Chapter 3 – Block Ciphers and the Data Encryption Standard Modern Block Ciphers  now look at modern block ciphers  one of the most widely used types.
1 Chapter 3 – Block Ciphers and the Data Encryption Standard Modern Block Ciphers  now look at modern block ciphers  one of the most widely used types.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
Lecture 23 Symmetric Encryption
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Encryption Schemes Second Pass Brice Toth 21 November 2001.
Encryption Methods By: Michael A. Scott
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Data Encryption Standard (DES). Symmetric Cryptography  C = E(P,K)  P = D(C,K)  Requirements  Given C, the only way to obtain P should be with  the.
The Digital Encryption Standard CSCI 5857: Encoding and Encryption.
Lecture 3: Cryptographic Tools modified from slides of Lawrie Brown.
A Cryptography Education Tool Anna Yu Department of Computer Science College of Engineering North Carolina A&T State University June 18, 2009.
Chapter 2 Data Encryption Algorithms Part I
Network Security Lecture 14 Presented by: Dr. Munam Ali Shah.
Chapter 20 Symmetric Encryption and Message Confidentiality.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
TE/CS 536 Network Security Spring 2006 – Lectures 6&7 Secret Key Cryptography.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
Chapter 31 Cryptography And Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Feistel Cipher Structure
Simplified DES Cryptography and Network Security
Dr. Reuven Aviv, Nov 2008 Conventional Encryption 1 Conventional Encryption & Message Confidentiality Acknowledgements for slides Henric Johnson Blekinge.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
Classical &ontemporyryptology 1 Block Cipher Today’s most widely used ciphers are in the class of Block Ciphers Today’s most widely used ciphers are in.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Lecture 2: Introduction to Cryptography
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Chapter 3 Encryption Algorithms & Systems (Part D)
Lecture 23 Symmetric Encryption
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
Lecture 3 Overview. Ciphers The intent of cryptography is to provide secrecy to messages and data Substitutions – ‘hide’ letters of plaintext Transposition.
Network Security Lecture 3 Secret Key Cryptography
Module :MA3036NI Symmetric Encryption -3 Lecture Week 4.
Simplified DES.
Block Ciphers and the Data Encryption Standard. Modern Block Ciphers  One of the most widely used types of cryptographic algorithms  Used in symmetric.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Encryption Encryption: Transforms Message so that Interceptor Cannot Read it –Plaintext (original message) Not necessarily text; Can be graphics, etc.
CPIT 425 Chapter Three: Symmetric Key Cryptography.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
Information and Computer Security CPIS 312 Lab 6 & 7 1 TRIGUI Mohamed Salim Symmetric key cryptography.
1 CPCS425: Information Security (Topic 5) Topic 5  Symmetrical Cryptography  Understand the principles of modern symmetric (conventional) cryptography.
Lecture 4 Data Encryption Standard (DES) Dr. Nermin Hamza
SYMMETRIC KEY ALGORITHMS
PART VII Security.
SYMMETRIC KEY ALGORITHMS
Computer Security IT423 Semester II
Presentation transcript:

Dr. Khalid A. Kaabneh Amman Arab University

9/5/2015© 2004 Dr. Khalid Kaabneh.2 Encryption Systems Categories:  Symmetric encryption.  Asymmetric encryption.

9/5/2015© 2004 Dr. Khalid Kaabneh.3 Symmetric Encryption: In a symmetric encryption system, both the sender and receiver must possess the same key value. The sender encrypts the plaintext message using the key and the receiver decrypts the cipher-text message using the same secret key. The word “symmetric" here means that the same key is used for encryption and decryption.

9/5/2015© 2004 Dr. Khalid Kaabneh.4 Symmetric Encryption:

9/5/2015© 2004 Dr. Khalid Kaabneh.5 Symmetric Encryption: The weaknesses: How you securely distribute the key to the needed parties and the fact that the number of keys required for secure pair-wise communication is given by (n 2 -n)/2 where n is is the number of communication endpoints. Symmetric key systems can be unmanageable for more than small groups of communicants.

9/5/2015© 2004 Dr. Khalid Kaabneh.6 Symmetric Encryption:  Block - operates on plaintext input in blocks (usually 64 bits at a time) of bits to produce the ciphertext output; uses the key value to determine how the transformation algorithm is applied.  Stream - operates on plaintext input one bit at a time, often using a keystream generator to produce a series of bits which are XOR'd with the plaintext input. Two classes of symmetric-key encryption algorithms:

9/5/2015© 2004 Dr. Khalid Kaabneh.7 Symmetric Encryption:  Examples of Block: –DES is a block cipher with a 64 bit block size. –AES is a block cipher with a 128 bit block size. –RSA and Diffie-Hellman are block ciphers with variable block sizes.  Examples of Stream: –A5, the algorithm used to encrypt GSM communications, is a stream cipher. –The RC4 cipher and the one-time pad are also stream ciphers.

9/5/2015© 2004 Dr. Khalid Kaabneh.8 Stream Ciphers  C = P  K, where  is XOR Operation.  C  K = (P  K)  K = P ( K  K) = P  0 = P 

9/5/2015© 2004 Dr. Khalid Kaabneh.9 Stream Ciphers  C = P  K, where  is XOR Operation.  C  K = (P  K)  K = P ( K  K) = P  0 = P Plaintext  Key Cipher

9/5/2015© 2004 Dr. Khalid Kaabneh.10 Asymmetric Encryption: Known as "public key" encryption, each entity participating in the communication uses mathematical algorithms implemented in a software program to generate a "public key" and a "private key" which are related via the mathematical formulae. The private key must be kept secret and is never disclosed; this is a requirement for the security system to function. The public key, however, is intended to be freely distributed.

9/5/2015© 2004 Dr. Khalid Kaabneh.11 Asymmetric Encryption:

9/5/2015© 2004 Dr. Khalid Kaabneh.12 Public key cryptography characteristics:  Something encrypted with the public key can only be decrypted with the private key.  Something encrypted with the private key can only be decrypted with the public key.

9/5/2015© 2004 Dr. Khalid Kaabneh.13 Symmetric-key vs. Public-key cryptography

9/5/2015© 2004 Dr. Khalid Kaabneh.14 Advantages of symmetric-key  Have high rates of data throughput.  Keys for symmetric-key ciphers are relatively short.  Symmetric-key ciphers can be composed to produce stronger ciphers.

9/5/2015© 2004 Dr. Khalid Kaabneh.15 Disadvantages of symmetric-key  In a two-party communication, the key must remain secret at both ends.  In a large network, there are many key pairs to be managed.  Digital signature mechanisms arising from symmetric-key encryption.

9/5/2015© 2004 Dr. Khalid Kaabneh.16 Advantages of Public-key  Only the private key must be kept secret.  Depending on the mode of usage, a private key/public key pair may remain unchanged for considerable periods of time.  Many public-key schemes yield relatively efficient digital signature mechanisms.

9/5/2015© 2004 Dr. Khalid Kaabneh.17 Disadvantages of Public-key  Slower than the best known symmetric-key schemes.  Key sizes are typically much larger.  No public-key scheme has been proven to be secure.

9/5/2015© 2004 Dr. Khalid Kaabneh.18 Symmetric Encryption Techniques  S-DES  DES

9/5/2015© 2004 Dr. Khalid Kaabneh.19 Simplified DES  DES = Data Encryption Standard.  Educational tool (not secure)  8 -bit block cipher  10-bit key

9/5/2015© 2004 Dr. Khalid Kaabneh.20 Simplified DES Encryption involves these Steps:  IP = Initial Permutations.  fk1 = complex function.  SW = Switch the two halves.  fk2 = complex function.  IP -1 = inverse Permutation.

9/5/2015© 2004 Dr. Khalid Kaabneh.21 S-DES Details:  P10 = (3,5,2,7,4,10,1,9,8,6).  P8 = (6,3,7,4,8,5,10,9).  IP = (2,6,3,1,4,8,5,7).  IP -1 =(4,1,3,5,7,2,8,6).

9/5/2015© 2004 Dr. Khalid Kaabneh.22 S-DES Details: (S 0 Box) S0S0 C0C0 C1C1 C2C2 C3C3 R0R R1R R2R R3R3 3132

9/5/2015© 2004 Dr. Khalid Kaabneh.23 S-DES Details: (S 1 Box) S1S1 C0C0 C1C1 C2C2 C3C3 R0R R1R R2R R3R3 2103

9/5/2015© 2004 Dr. Khalid Kaabneh.24 S-box Operation (1) First and fourth bits give row number. (2) Second and third bits give column number. (3) Look up number in specified row and column. (4) Convert to binary.

9/5/2015© 2004 Dr. Khalid Kaabneh.25 SUBKEY GENERATION

9/5/2015© 2004 Dr. Khalid Kaabneh.26 SUBKEY GENERATION  Apply the P10 operation on the 10 bit input.  Apply LS-1 (left shift 1) to each 5-bit group.  Apply permutation P8  K1.  Apply LS-2 (left shift 2) to each 5-bit group.  K2.

9/5/2015© 2004 Dr. Khalid Kaabneh.27 S-DES

9/5/2015© 2004 Dr. Khalid Kaabneh.28 S-DES Example: let K = Step (1):  | Step (2):  | Step (3): Apply permutation P8 then K1 = Step (4): Apply LS-2 (left shift 2) |  LS2  |  P8 K2 =

9/5/2015© 2004 Dr. Khalid Kaabneh.29 S-DES Example: let plaintext: IP 1110 | 0110 IP = (2,6,3,1,4,8,5,7) E/P Apply expansion/permutation E/P To right 4 bits of above result, =

9/5/2015© 2004 Dr. Khalid Kaabneh.30 Perform binary XOR operation with sub key K1: XOR 1001 | 1000 From above: For the row, combine bits 1 and 4 and convert to decimal. For the column, combine bits 2 and 3 and convert to decimal. Left Side: bits 1 & 4  11  Row: 3 bits 2 & 3  00  Col: 0 therefore, get from S 0 R3 & C0  3  11 Right Side: bits 1 & 4  10  Row: 2 bits 2 & 3  00  Col: 0 therefore, get from S 1 R2 & C0  3  11

9/5/2015© 2004 Dr. Khalid Kaabneh.31 S0 & S P4 P4 = (2,4,3,1) 1111 Perform binary XOR operation, combining it with the left 4-bits of our first result (application of IP to original plaintext input, blue cell above). Result: 0001

9/5/2015© 2004 Dr. Khalid Kaabneh.32 Rewrite that first result with its left half replaced | 0110 Swap the two 4-bit halves of the above result | 0001 To right 4 bits of above, apply E/P Upon above result, perform binary XOR operation with sub-key K2:

9/5/2015© 2004 Dr. Khalid Kaabneh.33 From above: For the row, combine bits 1 and 4 and convert to decimal. For the column, combine bits 2 and 3 and convert to decimal. Left Side: bits 1 & 4  10  Row: 2 bits 2 & 3  10  Col: 2 therefore, get from S 0 R2 & C2  1  01 Right Side: bits 1 & 4  01  Row: 1 bits 2 & 3  00  Col: 0 therefore, get from S 1 R1 & C0  2  | 0001

9/5/2015© 2004 Dr. Khalid Kaabneh P4 P4 = (2,4,3,1) 1010 Perform binary XOR operation with the left 4-bits of the earlier swap result (0110) Rewrite that first result with its left half replaced

9/5/2015© 2004 Dr. Khalid Kaabneh To above result, apply reverse of initial permutation IP, which is IP -1 =(4,1,3,5,7,2,8,6). Ciphertext is

9/5/2015© 2004 Dr. Khalid Kaabneh.36 How can we decrypt a ciphertext???