DES Attacks and Triple DES

Slides:



Advertisements
Similar presentations
Conventional Encryption: Algorithms
Advertisements

1 CIS 5371 Cryptography 5b. Pseudorandom Objects in Practice Block Ciphers.
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
Cryptography and Network Security Chapter 3
Public Key Encryption Algorithm
Data Encryption Standard (DES)
Announcements: Get your ch 1-2 quiz if you haven’t. Get your ch 1-2 quiz if you haven’t. Grading change: Grading change: Homeworks are mixed programming.
1 Overview of the DES A block cipher: –encrypts blocks of 64 bits using a 64 bit key –outputs 64 bits of ciphertext A product cipher –basic unit is the.
ICS 454: Principles of Cryptography
Ref: STAL03More Concepts of Cryptography and Cryptanalysis 1 Reference –William Stallings, Cryptography and Network Security, 3rd Edition, Prentice Hall.
Lecture 2.2: Private Key Cryptography II CS 436/636/736 Spring 2012 Nitesh Saxena.
Cryptanalysis on Substitution- Permutation Networks Jen-Chang Liu, 2005 Ref: Cryptography: Theory and Practice, D. R. Stinson.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
CSE 651: Introduction to Network Security
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Lecture 5 Overview Does DES Work? Differential Cryptanalysis Idea – Use two plaintext that barely differ – Study the difference in the corresponding.
Lecture 3: Cryptographic Tools modified from slides of Lawrie Brown.
Cryptanalysis. The Speaker  Chuck Easttom  
History and Background Part 1: Basic Concepts and Monoalphabetic Substitution CSCI 5857: Encoding and Encryption.
Public-Key Cryptology An Asymmetrical Approach to Encryption.
Security. Cryptography Why Cryptography Symmetric Encryption – Key exchange Public-Key Cryptography – Key exchange – Certification.
The Data Encryption Standard - see Susan Landau’s paper: “Standing the test of time: the data encryption standard.” DES - adopted in 1977 as a standard.
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
CHAPTER 6 Cryptography. An Overview It is origin from the Greek word kruptos which means hidden. The objective is to hide information so that only the.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Cryptography and Network Security (CS435) Part Two (Classic Encryption Techniques)
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
Introduction to Cryptography Techniques How secure is that banking network traffic?
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
Based on Bruce Schneier Chapter 7: Key Length Dulal C. Kar.
David Evans CS588: Security and Privacy University of Virginia Computer Science Lecture 6: Striving for Confusion Structures.
Strength of Cryptographic Systems Dr. C F Chong, Dr. K P Chow Department of Computer Science and Information Systems The University of Hong Kong.
Simplified DES Cryptography and Network Security
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
3DES and Block Cipher Modes of Operation CSE 651: Introduction to Network Security.
Understanding Cryptography – A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl Chapter 5 – More About Block.
Announcements: Homework 3 due now Homework 3 due now Homework 4 posted Homework 4 postedToday: Attacks on DES Attacks on DESQuestions? DTTF/NB479: DszquphsbqizDay.
Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown (Changed by Somesh Jha)
Data Security and Encryption (CSE348) 1. Lecture # 3 2.
TE/CS 536 Network Security Spring 2005 – Lecture 8 Security of symmetric algorithms.
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Lecture 23 Symmetric Encryption
A Java implemented key collision attack on the Data Encryption Standard (DES) John Loughran, Tom Dowling NUI, Maynooth, Co. Kildare, Ireland PPPJ ‘03.
1 Symmetric key cryptography: DES DES: Data Encryption Standard US encryption standard [NIST 1993] 56-bit symmetric key, 64 bit plaintext input How secure.
+ Security. + What is network security? confidentiality: only sender, intended receiver should “understand” message contents sender encrypts message receiver.
Data Encryption Standard (DES)
DES Analysis and Attacks CSCI 5857: Encoding and Encryption.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
Cryptography and Its Algorithms Scott Chappell. What is Cryptography?  Definition: the art of writing or solving codes.
1 The Data Encryption Standard. 2 Outline 4.1 Introduction 4.4 DES 4.5 Modes of Operation 4.6 Breaking DES 4.7 Meet-in-the-Middle Attacks.
David Evans CS551: Security and Privacy University of Virginia Computer Science Lecture 4: Dissin’ DES The design took.
Computer Security Lecture 5 Ch.9 Public-Key Cryptography And RSA Prepared by Dr. Lamiaa Elshenawy.
Lecture 3 Page 1 CS 236 Online Introduction to Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
CST 312 Pablo Breuer. A block of plaintext is treated as a whole and used to produce a ciphertext block of equal length Typically a block size of 64 or.
@Yuan Xue CS 285 Network Security Block Cipher Principle Fall 2012 Yuan Xue.
1 Managing Security Additional notes. 2 Intercepting confidential messages Attacker Taps into the Conversation: Tries to Read Messages Client PC Server.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
CS480 Cryptography and Information Security
Revision. Cryptography depends on some properties of prime numbers. One of these is that it is rather easy to generate large prime numbers, but much harder.
6b. Practical Constructions of Symmetric-Key Primitives.
Introduction Of System Security
Lecture 3: Symmetric Key Encryption
Security.
Section 2: Cryptography
Triple DES Network Security.
Stream Cipher Structure
Presentation transcript:

DES Attacks and Triple DES Cryptography and Network Security Reference: Sec 4.1 of Stallings Text

DES and Brute Force Attack Known plaintext attack Plaintext-ciphertext pairs are available Brute force attack involves going through all 256 keys, encrypting the plaintext and matching with the ciphertext SDESCrack1.java and SDESCrack2.java are programs that attack Simplified DES Brute-force search on all 210 keys Note the necessity of two plaintext-ciphertext pairs

Multiple DES Brute-force attack on DES will eventually become possible and practical Multiple applications (multiple keys) of DES increases the key search space for brute-force attacks e.g., Double DES means two keys and therefore 2112 possible key-pairs to consider

Double DES Encryption: C = Ek2[Ek1[P]] Decryption: P = Dk1[Dk2[C]] Check out SDES2.java for a simplified version The following fact is essential: For any two keys k1 and k2, it does not follow that a key k3 exists where Ek2[Ek1[P]] = Ek3[P] A single-key brute-force attack will not work Brute-force attack has two go through all key-pairs (see SDES2Crack1.java & SDES2Crack2.java)

Meet-in-the-Middle Attack C = Ek2[Ek1[P]] implies X = Ek1[P] = Dk2[C] Algorithm: (assume p1,c1 and p2,c2 are known pairs) Try all 256 possibilities for k1 and tabulate all Ek1[p1] Try all 256 possibilities for k2, compute for Dk2[c1], and compare against the table When values match, check if c2 = Ek2[Ek1[p2]]

Analysis of Revised Attack on Double DES Takes only twice the amount of time (approx) as brute-force on Regular DES Requires a table of size 256 See SDES2MM.java for an attack on Simplified Double DES

Triple DES Meet-in-the-Middle attack does not apply if three DES applications are used Using three keys possible but aggregate length of keys might be undesirable Use two keys instead Reuse a key for first and third application Make second application a decryption operation (for backward compatibility with Regular DES) See SDES3.java

Programming Homework #2 Write an attack program for simplified triple DES (SDES3.java) Use a combination of the brute-force method and the meet-in-the-middle method (use a table of size 210) to come up with an algorithm that runs in roughly the same amount of time as DES2Crack1.java