Crypto Bro Rigby
History
Terms Plaintext Encryption Cipher Cipher text Cryptography Cryptographers
Terms Cryptanalysis Cryptanalysts Cryptology Keys Keyspace Hashing
Symmetric Encryption (Single Key)
How big are keys? 128? Has possible values – The total lifetime of the universe is about 2 61 seconds. – Number of atoms in the earth – Number of atoms in the sun – Number of atoms in the universe 2 265
Algorithms' Stream Ciphers (1 bit at a time) Block Ciphers (Chunks at a time, AES uses 128 bit blocks) Examples – DES, 3DES (No Longer Used) – Twofish, Serpent, AES, Blowfish, CAST5, RC4, TDES, IDEA
Symmetric Encryption DES (Data Encryption Standard) – 56 Bit – Federal Information Processing Standard (FIPS 46) in 1976 – 1997: RSA contest won by distributed crack (10,000 clients) – 1998: EFF built a $250K machine to crack DES in 2 days 2002 AES (May 26 th, 2002) – 5 Finalists (Mars,RC6,Rijndael,Serpent,Twofish) – 128, 192, 256 bit keys. – The largest successful publicly-known brute force attack has been against a 64-bit RC5 key by distributed.net (
Symmetric Encryption 128-bit encryption – 3 x – 1 modern computer needs years to crack 128-bit – 1 billion modern computers need years to crack – 1 billion modern computers need years to crack 256-bit – Some other cracking method required Other avenues are far easier: – Spyware/Rootkits – Social Engineering – Phishing – Password cracking Reference (The Struggle Between Unbreakable Encryption and Stupid Passwords By Brian Basgen
Asymmetric Encryption 2-key
Asymmetric Algorithms’ Diffie-Hellman DSS ElGamal – Based off of Diffie-Hellman RSA Cramer-Shoup
XOR Secret Splitting Secret Sharing
Hashing Digital Fingerprint – MD5 – SHA-1 Algorithm Output size (bits) Internal state size (bits) Block size (bits) Max message size (bits) Word size (bits) RoundsOperationsCollision SHA − ,and,or,xor, rotfl Yes SHA − ,and,or,xor, rotfl 2 63 attack SHA- 256/ / − ,and,or,xor, shr,rotfr None yet SHA- 512/ / − ,and,or,xor, shr,rotfr None yet
Digital Signatures Signing uses Private Key Verifying uses Public Key “Authentication” of message. Hash Message. Sign Hash. Send message with Encrypted Hash. Receiver decrypts hash with public key and then matches hash sent with hash of message.
PKI
Digital Certificates Binds a name to a public key. X.509 Standard Registration with CA – Software, hardware, procedures, policies, people – RA Responsible for verification – Class 1 – – Class 2 – Software signing – Class 3 – Be own CA
Digital Certificates Key Pair Generation Cert creation Cert distribution Key backup and recovery