DES The Data Encryption Standard (DES) is a classic symmetric block cipher algorithm. DES was developed in the 1970’s as a US government standard The block.

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

6.1.2 Overview DES is a block cipher, as shown in Figure 6.1.
Symmetric Encryption Prof. Ravi Sandhu.
Block Cipher Modes of Operation and Stream Ciphers
ECE454/CS594 Computer and Network Security
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Network Security Essentials Chapter 2
International Data Encryption Algorithm
The Data Encryption Standard - see Susan Landau’s paper: “Standing the test of time: the data encryption standard.” DES - adopted in 1977 as a standard.
“Advanced Encryption Standard” & “Modes of Operation”
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
1 Lecture 3: Secret Key Cryptography Outline concepts DES IDEA AES.
1 CIS 5371 Cryptography 5b. Pseudorandom Objects in Practice Block Ciphers.
Cryptography and Network Security Chapter 3
Block Ciphers and the Data Encryption Standard
Data Encryption Standard (DES)
Symmetric Encryption Example: DES Weichao Wang. 2 Overview of the DES A block cipher: – encrypts blocks of 64 bits using a 64 bit key – outputs 64 bits.
Web Security for Network and System Administrators1 Chapter 4 Encryption.
Cryptography1 CPSC 3730 Cryptography Chapter 6 Triple DES, Block Cipher Modes of Operation.
Block Ciphers 1 Block Ciphers Block Ciphers 2 Block Ciphers  Modern version of a codebook cipher  In effect, a block cipher algorithm yields a huge.
Advanced Encryption Standard(AES) Presented by: Venkata Marella Slide #9-1.
1 Overview of the DES A block cipher: –encrypts blocks of 64 bits using a 64 bit key –outputs 64 bits of ciphertext A product cipher –basic unit is the.
Introduction to Symmetric Block Cipher Jing Deng Based on Prof. Rick Han’s Lecture Slides Dr. Andreas Steffen’s Security Tutorial.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 5 Wenbing Zhao Department of Electrical and Computer Engineering.
Computer Networking Lecture 21: Security and Cryptography Thanks to various folks from , semester’s past and others.
Lecture 23 Symmetric Encryption
Decryption Algorithms Characterization Project ECE 526 spring 2007 Ravimohan Boggula,Rajesh reddy Bandala Southern Illinois University Carbondale.
Network Security Chapter
Encryption Schemes Second Pass Brice Toth 21 November 2001.
Data Encryption Standard (DES). Symmetric Cryptography  C = E(P,K)  P = D(C,K)  Requirements  Given C, the only way to obtain P should be with  the.
AES Proposal: Rijndael Joan Daemen Vincent Rijmen “Rijndael is expected, for all key and block lengths defined, to behave as good as can be expected from.
1 Chapter 4 Encryption. 2 Objectives In this chapter, you will: Learn the basics of encryption technology Recognize popular symmetric encryption algorithms.
Lecture 3: Cryptographic Tools modified from slides of Lawrie Brown.
Block Cipher Transmission Modes CSCI 5857: Encoding and Encryption.
Dr. Khalid A. Kaabneh Amman Arab University
The Data Encryption Standard - see Susan Landau’s paper: “Standing the test of time: the data encryption standard.” DES - adopted in 1977 as a standard.
1 Chapter 3 Ciphers Mechanism that decides the process of encryption/decryption Stream Cipher: Bit-by-bit encryption / decryption Block Cipher: Block-by-block.
Advance Encryption Standard. Topics  Origin of AES  Basic AES  Inside Algorithm  Final Notes.
Chapter 20 Symmetric Encryption and Message Confidentiality.
TE/CS 536 Network Security Spring 2006 – Lectures 6&7 Secret Key Cryptography.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Block ciphers Structure of a multiround block cipher
Cryptography Chapter 7 Part 2 Pages 781 to 812. Symmetric Cryptography Secret Key Figure 7-10 on page 782 Key distribution problem – Secure courier Many.
3DES and Block Cipher Modes of Operation CSE 651: Introduction to Network Security.
Chapter 9: Algorithms Types and Modes Dulal C. Kar Based on Schneier.
Data Encryption Standard (DES) © 2000 Gregory Kesden.
BLOCK CIPHER SYSTEMS OPERATION MODES OF DATA ENCRYPTION STANDARD (DES)
Classical &ontemporyryptology 1 Block Cipher Today’s most widely used ciphers are in the class of Block Ciphers Today’s most widely used ciphers are in.
Chapter 3 Encryption Algorithms & Systems (Part D)
Lecture 23 Symmetric Encryption
Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
Block Cipher- introduction
1 The Data Encryption Standard. 2 Outline 4.1 Introduction 4.4 DES 4.5 Modes of Operation 4.6 Breaking DES 4.7 Meet-in-the-Middle Attacks.
Lecture 4 Overview. Data Encryption Standard Combination of substitution and transposition – Repeated for 16 cycles – Provides confusion and diffusion.
Block Ciphers and the Data Encryption Standard. Modern Block Ciphers  One of the most widely used types of cryptographic algorithms  Used in symmetric.
CSE 5/7353 – January 25 th 2006 Cryptography. Conventional Encryption Shared Key Substitution Transposition.
CST 312 Pablo Breuer. A block of plaintext is treated as a whole and used to produce a ciphertext block of equal length Typically a block size of 64 or.
1 CPCS425: Information Security (Topic 5) Topic 5  Symmetrical Cryptography  Understand the principles of modern symmetric (conventional) cryptography.
Triple DES.
مروري برالگوريتمهاي رمز متقارن(كليد پنهان)
Chapter -3 ADVANCED ENCRYPTION STANDARD & BLOCK CIPHER OPERATION
Block Ciphers: DES and AES
SOHAIL SHAHUL HAMEED Dr. BHARGAVI GOSWAMI
Counter Mode, Output Feedback Mode
Advanced Encryption Standard
Presentation transcript:

DES The Data Encryption Standard (DES) is a classic symmetric block cipher algorithm. DES was developed in the 1970’s as a US government standard The block size is 64 bits and the ciphertext block size is 64 bits. The key size is 56 bits.

The key is used to generate 16 subkeys Ki each of length 48 bits. The following is then performed 16 times: 1. The block is split into two halves Li and Ri 2. The left half of the output at the next round is the right half of the previous round but the right half is the left half XORed by a function with the right half and the corresponding key Ki.

We have Li+1 = Ri Ri+1 = Li  F(Ki,Ri) Where F is a function specified in the DES protocol. Decryption is the reverse of encryption since Ri = Li+1 Li = Ri+1  F(Ki,Ri)

Strengths of DES Even if you have the plaintext and ciphertext, it seems difficult to get the key. Altering 1 bit of the plaintext block alters about half of the bits of the ciphertext block. The functions are a mixture of different mathematical structures with no apparent shortcut. DES is tried and tested.

Weaknesses of DES Although secure when it was designed in 1977, the key size of 56 bits is now too small. It is feasible these days to exhaustively search a key space of size 256. Linear and differential cryptanalysis can be used to improve the search time. Nobody can prove that DES is secure.

Triple DES One way to improve the security of DES is to increase the key size. This is done by using a variation called triple DES. We have 3 DES keys K1,K2 and K3. First Alice encrypts the message M with key K1 to get C, she then decrypts C with key K2 to get M’, finally she encrypts M’ with key K3 to get C’ which she sends to Bob.

Bob also has the 3 keys K1,K2 and K3 Bob also has the 3 keys K1,K2 and K3. and he receives ciphertext C’ from Alice. Bob decrypts C’ using key K3 to get M’, he then encrypts M’ using key K2 to get C and finally Bob decrypts C using key K1 to get the original message M. The key size is now 3*56 = 168 bits which is long enough to defeat exhaustive key search attacks with current technology. The block size remains unchanged.

AES In 1997, NIST (National Institute of Standards and Technologies) issued a call for a new Advanced Encryption Standard (AES). NIST were looking for a block cipher algorithm to replace DES. Proposed algorithms were evaluated for security, computational efficiency, memory requirements, software suitability and flexibility.

Rijndael The winner of the AES, announced in 2000 was an algorithm called Rijndael which was designed Vincent Rijmen and Joan Daemen. A European project called NESSIE (New European Standards for Security, Integrity and Encryption) also recommends Rijndael in the block cipher category.

Rijndael The length of the key is either 128, 192 or 256 bits depending on the security required. The number of rounds is either 10, 12 or 14 depending respectively on the key length. A subkey is generated for each round. A round consists of substitutions, permutations and multiplications.

Where Rijndael is different from DES is that it considers the data as polynomials with co-efficients being either 0 or 1. This means that it is possible to write a Rijndael encryption as a algebraic formula.

Strengths and Weaknesses Flexibility - different key lengths and different block sizes can be used. Efficient Requires little memory Can be implemented in hardware as well as software Because it is relatively new, it has not been studied in as much detail as other older block ciphers. The mathematical structure might prove to be a weakness (or maybe not!?)

Modes of Operation a) Electronic codebook (ECB) b) Cipher Block Chaining (CBC) c) Output Feedback (OFB) A block cipher used in a mode other than ECB can be used as the keystream generator for a stream cipher.