DARPA AES Finalist Algorithm: The Rijndael Block Cipher Mel Tsai University of California at Berkeley.

Slides:



Advertisements
Similar presentations
DES The Data Encryption Standard (DES) is a classic symmetric block cipher algorithm. DES was developed in the 1970’s as a US government standard The block.
Advertisements

Origins  clear a replacement for DES was needed Key size is too small Key size is too small The variants are just patches The variants are just patches.
Chap. 5: Advanced Encryption Standard (AES) Jen-Chang Liu, 2005 Adapted from lecture slides by Lawrie Brown.
1 CIS 5371 Cryptography 5b. Pseudorandom Objects in Practice Block Ciphers.
Cryptography and Network Security Chapter 5 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 5
The Advanced Encryption Standard (AES) Simplified.
Computer Science CSC 405By Dr. Peng Ning1 CSC 405 Introduction to Computer Security Topic 2. Basic Cryptography (Part II)
Data Encryption Standard (DES)
Advanced Encryption Standard
Cryptography and Network Security
Encryption CS 465 January 9, 2006 Tim van der Horst.
Advanced Encryption Standard(AES) Presented by: Venkata Marella Slide #9-1.
AES clear a replacement for DES was needed
Advanced Encryption Standard. This Lecture Why AES? NIST Criteria for potential candidates The AES Cipher AES Functions and Inverse Functions AES Key.
1 AES Proposal : Rijndael Joan Daeman Vincent Rijmen.
Cryptography and Network Security (AES) Dr. Monther Aldwairi New York Institute of Technology- Amman Campus 10/18/2009 INCS 741: Cryptography 10/18/20091Dr.
The Design of Improved Dynamic AES and Hardware Implementation Using FPGA 游精允.
Introduction to Modern Cryptography Lecture 3 (1) Finite Groups, Rings and Fields (2) AES - Advanced Encryption Standard.
Cryptography and Network Security Chapter 5. Chapter 5 –Advanced Encryption Standard "It seems very simple." "It is very simple. But if you don't know.
Cryptography and Network Security Chapter 5 Fourth Edition by William Stallings.
ICS 454 Principles of Cryptography Advanced Encryption Standard (AES) (AES) Sultan Almuhammadi.
Lecture 23 Symmetric Encryption
Lecture 2.3: Private Key Cryptography III CS 436/636/736 Spring 2012 Nitesh Saxena.
1  A clear a replacement for DES was needed have theoretical attacks that can break it have theoretical attacks that can break it have demonstrated exhaustive.
CS470, A.SelcukAfter the DES1 Block Ciphers After the DES CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Dr. Lo’ai Tawalbeh 2007 Chapter 5: Advanced Encryption Standard (AES) Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus.
Encryption Schemes Second Pass Brice Toth 21 November 2001.
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
AES Proposal: Rijndael Joan Daemen Vincent Rijmen “Rijndael is expected, for all key and block lengths defined, to behave as good as can be expected from.
Kevin Orr JT Schratz AES ENCRYPTION. OVERVIEW History Algorithm Uses Brute Force Attack.
Chapter 5 Advanced Encryption Standard. Origins clear a replacement for DES was needed –have theoretical attacks that can break it –have demonstrated.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Cryptography and Network Security
Chapter 5 –Advanced Encryption Standard "It seems very simple." "It is very simple. But if you don't know what the key is it's virtually indecipherable."
Lecture 2: Private Key Cryptography II CS 436/636/736 Spring 2015 Nitesh Saxena.
9/17/15UB Fall 2015 CSE565: S. Upadhyaya Lec 6.1 CSE565: Computer Security Lecture 6 Advanced Encryption Standard Shambhu Upadhyaya Computer Science &
Classical &ontemporyryptology 1 AESAES Classical &ontemporyryptology 2 Advanced Encryption Standard Since DES was becoming less reliable as new cryptanalysis.
Advance Encryption Standard. Topics  Origin of AES  Basic AES  Inside Algorithm  Final Notes.
FORESEC Academy FORESEC Academy Security Essentials (IV)
Information Security Lab. Dept. of Computer Engineering 122/151 PART I Symmetric Ciphers CHAPTER 5 Advanced Encryption Standard 5.1 Evaluation Criteria.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Rijndael Advanced Encryption Standard. Overview Definitions Definitions Who created Rijndael and the reason behind it Who created Rijndael and the reason.
Cryptography Team Presentation 2
“Implementation of a RC5 block cipher algorithm and implementing an attack on it” Cryptography Team Presentation 1.
AES: Rijndael 林志信 王偉全. Outline Introduction Mathematical background Specification Motivation for design choice Conclusion Discussion.
Advanced Encryption Standard. Origins NIST issued a new version of DES in 1999 (FIPS PUB 46-3) DES should only be used in legacy systems 3DES will be.
Lecture 23 Symmetric Encryption
Fifth Edition by William Stallings
Chapter 2 (C) –Advanced Encryption Standard. Origins clearly a replacement for DES was needed –have theoretical attacks that can break it –have demonstrated.
Advanced Encryption Standard Dr. Shengli Liu Tel: (O) Cryptography and Information Security Lab. Dept. of Computer.
Lecture 2.3: Private Key Cryptography III CS 436/636/736 Spring 2013 Nitesh Saxena.
© Information Security Group, ICU1 Block Cipher- introduction  DES Description: Feistel, S-box Exhaustive Search, DC and LC Modes of Operation  AES Description:
Block Cipher- introduction
The Advanced Encryption Standard Part 1: Overview
CSE 5/7353 – January 25 th 2006 Cryptography. Conventional Encryption Shared Key Substitution Transposition.
Understanding Cryptography by Christof Paar and Jan Pelzl Chapter 4 – The Advanced Encryption Standard (AES) ver. October 28, 2009.
Le Trong Ngoc Security Fundamentals (2) Encryption mechanisms 4/2011.
1 CPCS425: Information Security (Topic 5) Topic 5  Symmetrical Cryptography  Understand the principles of modern symmetric (conventional) cryptography.
Zong-Cing Lin 2007/10/31.  Algorithm Description  Why chose Rijndael  Reference.
Lecture 2: Private Key Cryptography II CS 436/636/736 Spring 2016 Nitesh Saxena.
Practical Aspects of Modern Cryptography Josh Benaloh & Brian LaMacchia.
Triple DES.
School of Computer Science and Engineering Pusan National University
The Advanced Encryption Standard: Rijndael
AES Objectives ❏ To review a short history of AES
Advanced Encryption Standard (Symmetric key Algorithm)
Chapter -3 ADVANCED ENCRYPTION STANDARD & BLOCK CIPHER OPERATION
Cryptography and Network Security Chapter 5 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Advanced Encryption Standard
Presentation transcript:

DARPA AES Finalist Algorithm: The Rijndael Block Cipher Mel Tsai University of California at Berkeley

2 10/18/2000 Introduction and History  National Institute of Science and Technology  DES is an aging standard that no longer addresses today’s needs for strong encryption  Triple-DES: Endorsed by NIST as today’s defacto standard  AES: The Advanced Encryption Standard  To be finalized in 2001  Goal is to define the Federal Information Processing Standard (FIPS) by selecting a new powerful encryption algorithm suitable for encrypting government documents  AES candidate algorithms must be:  Symmetric-key ciphers supporting 128, 192, and 256 bit keys  Royalty-Free  Unclassified (i.e. public domain) ‏  Available for worldwide export

3 10/18/2000 Overview of Secret Key Cryptography  To transmit data securely over an insecure medium, two parties agree on a key in which to encrypt data.  This key is usually exchanged through public-key cryptographic methods  User A encrypts a block of data X with key W and sends this data to user B.  By using the same key W, user B decrypts the ciphertext Y back into X X Z Insecure Medium Y W Y Z -1 X W AB Fundamental Concept: Due to algorithm Z, it’s nearly impossible to recover data X from ciphertext Y without key W. “Guessing” the key W through exhaustive search is generally infeasible.

4 10/18/2000 Introduction and History (cont.) ‏  AES Round-3 Finalist Algorithms:  MARS  Candidate offering from IBM  RC6  Developed by Ron Rivest of RSA Labs, creator of the widely used RC4 algorithm  Twofish  From Counterpane Internet Security, Inc.  Serpent  Designed by Ross Anderson, Eli Biham and Lars Knudsen  Rijndael  Designed by Joan Daemen and Vincent Rijmen

5 10/18/2000 Rijndael  The Winner: Rijndael  Joan Daemen (of Proton World International) and Vincent Rijmen (of Katholieke Universiteit Leuven).  (pronounced “Rhine-doll”) ‏  Allows only 128, 192, and 256-bit key sizes (unlike the other candidates) ‏  Variable block length of 128, 192, or 256 bits. All nine combinations of key/block length possible.  A block is the smallest data size the algorithm will encrypt  Vast speed improvement over DES in both hardware and software implementations  8416 bytes/sec on a 20MHz CPI) ‏  8.8 Mbytes/sec on a 200MHz Pentium Pro

6 10/18/2000 Rijndael X r1r1 Key r2r2 R n-1 rnrn r3r3 Y R n-2 k1k1 k2k2 K n-1 knkn k3k3 K n-2 W KE Key Expansion Round Keys Encryption Rounds r 1 … r n  Key is expanded to a set of n round keys  Input block X undergoes n rounds of operations (each operation is based on value of the nth round key), until it reaches a final round.  Strength of algorithm relies on the fact that it’s very difficult to obtain the intermediate result (or state ) of round n from round n+1 without the round key.

7 10/18/2000 Rijndael Detailed view of round n  Each round performs the following operations:  Non-linear Layer: No linear relationship between the input and output of a round  Linear Mixing Layer: Guarantees high diffusion over multiple rounds  Very small correlation between bytes of the round input and the bytes of the output  Key Addition Layer: Bytes of the input are simply EXOR’ed with the expanded round key ByteSubShiftRowMixColumnAddRoundKey KnKn Result from round n-1 Pass to round n+1

8 10/18/2000 Rijndael  Three layers provide strength against known types of cryptographic attacks: Rijndael provides “full diffusion” after only two rounds  Linear and differential cryptanalysis  Known-key and related-key attacks  Square attack  Interpolation attacks  Weak-keys  Rijndael has been shown to be K- secure :  No key-recovery attacks faster than exhaustive search exist  No known symmetry properties in the round mapping  No weak keys  No related-key attacks: No two keys have a high number of expanded round keys in common

9 10/18/2000 Rijndael: ByteSub Each byte at the input of a round undergoes a non-linear byte substitution according to the following transform: Substitution (“S”)-box

10 10/18/2000 Rijndael: ShiftRow Depending on the block length, each “row” of the block is cyclically shifted according to the above table

11 10/18/2000 Rijndael: MixColumn Each column is multiplied by a fixed polynomial C(x) = ’03’*X 3 + ’01’*X 2 + ’01’*X + ’02’ This corresponds to matrix multiplication b(x) = c(x)  a(x):

12 10/18/2000 Rijndael: Key Expansion and Addition Each word is simply EXOR’ed with the expanded round key KeyExpansion(int* Key[4*Nk], int* EKey[Nb*(Nr+1)])‏ { for(i = 0; i < Nk; i++)‏ EKey[i] = (Key[4*i],Key[4*i+1],Key[4*i+2],Key[4*i+3]); for(i = Nk; i < Nb * (Nr + 1); i++)‏ { temp = EKey[i - 1]; if (i % Nk == 0)‏ temp = SubByte(RotByte(temp)) ^ Rcon[i / Nk]; EKey[i] = EKey[i - Nk] ^ temp; } Key Expansion algorithm:

13 10/18/2000 Rijndael: Implementations  Rijndael is well suited for software implementations on 8-bit processors (important for “Smart Cards”) ‏  Atomic operations focus on bytes and nibbles, not 32 or 64 bit integers  Layers such as ByteSub can be efficiently implemented using small tables in ROM (e.g. < 256 bytes).  No special instructions are required to speed up operation, e.g. barrel rotates  For 32-bit implementations:  An entire round can be implemented via a fast table lookup routine on machines with 32-bit or higher word lengths  Considerable parallelism exists in the algorithm  Each layer of Rijndael operates in a parallel manner on the bytes of the round state, all four component transforms act on individual parts of the block  Although the Key expansion is complicated and cannot benefit much from parallelism, it only needs to be performed once until the two parties switch keys.

14 10/18/2000 Rijndael: Implementations  Hardware Implementations  Rijndael performs very well in software, but there still exists cases where more performance is required (e.g. server and VPN applications).  Multiple S-Box engines, round-key EXORs, and byte shifts can all be implemented efficiently in hardware when absolute speed is required  Small amount of hardware can vastly speed up 8-bit implementations  Inverse Cipher  Except for the non-linear ByteSub step, each part of Rijndael has a straightforward inverse and the operations simply need to be undone in the reverse order.  However, Rijndael was specially written so that the same code that encrypts a block can also decrypt the same block simply by changing certain tables and polynomials for each layer. The rest of the operation remains identical.

15 10/18/2000 Conclusions and The Future  Rijndael is an extremely fast, state-of-the-art, highly secure algorithm  Rijndael has efficient implementations in both hardware and software; it requires no special instructions to obtain good performance on any computing platform  Despite being the chosen by NIST as the AES candidate winner, Rijndael is not yet automatically the new encryption standard  Rijndael will soon be formally announced in the Federal Register  NIST will then undergo public review and comments on the draft Federal Information Processing Standard for 90 days  Triple-DES, still highly secure and supported by NIST, is expected to be common for the foreseeable future. Sources: Algorithm Information and most images taken from The Rijndael AES Proposal by Daemen & Rijmen, © 1998