Simplified DES Cryptography and Network Security

Slides:



Advertisements
Similar presentations
6.1.2 Overview DES is a block cipher, as shown in Figure 6.1.
Advertisements

1 Lecture 3: Secret Key Cryptography Outline concepts DES IDEA AES.
1 CIS 5371 Cryptography 5b. Pseudorandom Objects in Practice Block Ciphers.
Cryptography and Network Security Chapter 3
Rachana Y. Patil 1 Data Encryption Standard (DES) (DES)
Simplified DES CS-480b Network Security Dick Steflik.
DES 1 Data Encryption Standard DES 2 Data Encryption Standard  DES developed in 1970’s  Based on IBM Lucifer cipher  U.S. government standard  DES.
ICS 454: Principles of Cryptography
Computer Networking Lecture 21: Security and Cryptography Thanks to various folks from , semester’s past and others.
Lecture 2.2: Private Key Cryptography II CS 436/636/736 Spring 2012 Nitesh Saxena.
Cryptography Block Ciphers and Feistel Functions.
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Data Encryption Standard (DES). Symmetric Cryptography  C = E(P,K)  P = D(C,K)  Requirements  Given C, the only way to obtain P should be with  the.
The Digital Encryption Standard CSCI 5857: Encoding and Encryption.
A Cryptography Education Tool Anna Yu Department of Computer Science College of Engineering North Carolina A&T State University June 18, 2009.
Dr. Khalid A. Kaabneh Amman Arab University
CSCI 5857: Encoding and Encryption
Confusion and Diffusion1 Ref: William Stallings, Cryptography and Network Security, 3rd Edition, Prentice Hall, 2003.
Network Security Lecture 14 Presented by: Dr. Munam Ali Shah.
TE/CS 536 Network Security Spring 2006 – Lectures 6&7 Secret Key Cryptography.
Chapter 20 Symmetric Encryption and Message Confidentiality.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Feistel Cipher Structure
13. Other Block Ciphers 13.1 LUCIFER 13.2 MADRYGA 13.3 NEWDES 13.4 FEAL 13.5 REDOC 13.6 LOKI.
DES Attacks and Triple DES
McGraw-Hill©The McGraw-Hill Companies, Inc., 2003 Chapter 19 Data Encryption.
Cryptography Team Presentation 2
Data Encryption Standard (DES) © 2000 Gregory Kesden.
BLOCK CIPHER SYSTEMS OPERATION MODES OF DATA ENCRYPTION STANDARD (DES)
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
‘Baby DES’ cipher Alexei Vernitski. Block cipher A message is a sequence of bits: … We split the message in blocks of a fixed length.
 Cryptography is the science of using mathematics to encrypt and decrypt data.  Cryptography enables you to store sensitive.
Permuted Choice #
1 Symmetric Key Ciphers “Even as we learn more about security – how to design cryptographic algorithms, how to build secure operating systems – we build.
GPU ASSISTED LM HASH CRACKING WILLIAM GROESBECK UNIVERSITY OF NEVADA, RENO – SPRING 2013 (Psst, the 90’s called - they want their hashing algorithm back)
Chapter 3 Encryption Algorithms & Systems (Part D)
1 Symmetric key cryptography: DES DES: Data Encryption Standard US encryption standard [NIST 1993] 56-bit symmetric key, 64 bit plaintext input How secure.
Announcements: Homework 2 returned Homework 2 returned Monday: Written (concept and small calculations) exam on breaking ch 2 ciphers Monday: Written (concept.
Computer and Network Security Rabie A. Ramadan Lecture 3.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Data Encryption Standard (DES)
Plaintextciphertext encryption algorithmdecryption algorithm plaintext.
Network Security Cryptology Cryptography Cryptanalysis.
DES Analysis and Attacks CSCI 5857: Encoding and Encryption.
Homework #1 J. H. Wang Oct. 2, 2013.
Linear Cryptanalysis of DES M. Matsui. 1.Linear Cryptanalysis Method for DES Cipher. EUROCRYPT 93, 1994.Linear Cryptanalysis Method for DES Cipher 2.The.
Lecture 3 Overview. Ciphers The intent of cryptography is to provide secrecy to messages and data Substitutions – ‘hide’ letters of plaintext Transposition.
Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 7 September 9, 2004.
Network Security Lecture 3 Secret Key Cryptography
Module :MA3036NI Symmetric Encryption -3 Lecture Week 4.
Data Encryption Standard 1977 “New Directions in Cryptography” 1976.
Simplified DES.
Block Ciphers and the Data Encryption Standard. Modern Block Ciphers  One of the most widely used types of cryptographic algorithms  Used in symmetric.
CPIT 425 Chapter Three: Symmetric Key Cryptography.
Information and Computer Security CPIS 312 Lab 6 & 7 1 TRIGUI Mohamed Salim Symmetric key cryptography.
1 CPCS425: Information Security (Topic 5) Topic 5  Symmetrical Cryptography  Understand the principles of modern symmetric (conventional) cryptography.
Data Encryption Standard - DES DES was developed as a standard for communications and data protection by an IBM research team, in response to a public.
Lecture 4 Data Encryption Standard (DES) Dr. Nermin Hamza
Provides Confidentiality
Simplified IDEA Cryptography and Network Security.
SYMMETRIC KEY ALGORITHMS
Networks and Communication Systems Department
NET 311 Information Security
NET 311 Information Security
Chapter -2 Block Ciphers and the Data Encryption Standard
SYMMETRIC KEY ALGORITHMS
Data Encryption Standard (DES)
Simple Hash Functions Network Security.
Presentation transcript:

Simplified DES Cryptography and Network Security Reference: Sec 3.1 of Stallings Text

Components of DES Key generation Bit permutations S-boxes Bit Rotations and exclusive-or operations

Simplified DES Key: 10 bits Plaintext and ciphertext: 8 bits Generates two 8-bit keys Plaintext and ciphertext: 8 bits Encryption: ctxt = IP-1(fk(SW(fk(IP(ptxt),K1)),K2)) Decryption: ptxt = IP-1(fk(SW(fk(IP(ptxt),K2)),K1))

Key Generation Permute 10-bit key (using P10) Split into two 5-bit parts K1 Rotate both parts once, concatenate, then apply permutation P8 K2 Rotate both parts 3 times, concatenate, then apply permutation P8

Encryption Apply permutation IP to plaintext Apply a function f to update the left half of the result using K1 Switch left and right halves of the result Apply a function f to update the left half of the result using K2 Apply permutation IP-1 on the result to produce ciphertext

Decryption Apply permutation IP to the ciphertext Apply a function f to update the left half of the result using K2 Switch left and right halves of the result Apply a function f to update the left half of the result using K1 Apply permutation IP-1 on result to produce the plaintext

f(SK, input) Only the left four bits (L) of input will be affected; the right four bits (R) will be used but not affected L = L ^ F(R, SK) ^ means exclusive or F(R, SK) is a function that takes a 4-bit string and an 8-bit key

F(R,SK) Permute/expand R using EP to obtain R’ R’ = R’ ^ SK Becomes 8 bits R’ = R’ ^ SK Suppose R’ = b7b6b5b4b3b2b1b0 Use bit-pairs as indices for the S-boxes S0[b7b4][b6b5] S1[b3b0][b2b1] Permute using P4

Manipulating Bits in a Program Important Bit-wise operations: and &, or |, not ~, xor ^, shifts << >> Useful functions Retrieve a bit Set a bit Rotate/shift left

Exercises Encrypt by hand Key = 1011001001 Plaintext = 10111110 Use the posted SDES program to observe the effect on the ciphertext Of a bit change in the key Of a bit change in the plaintext