Cryptography Chapter 7 Part 2 Pages 781 to 812. Symmetric Cryptography Secret Key Figure 7-10 on page 782 Key distribution problem – Secure courier Many.

Slides:



Advertisements
Similar presentations
DES The Data Encryption Standard (DES) is a classic symmetric block cipher algorithm. DES was developed in the 1970’s as a US government standard The block.
Advertisements

MAC Raushan. DES simple fiestel network 3131 PlainText Blocks 2*4=8bits 31 f f =0011 xor 0011=0000 = 0 f(r,k)=(2*r+k^2)%8 f(1,5)=(2*1+5^2)%8=3 xor 3 3.
“Advanced Encryption Standard” & “Modes of Operation”
Encipherment Using Modern Symmetric-Key Ciphers. 8.2 Objectives ❏ To show how modern standard ciphers, such as DES or AES, can be used to encipher long.
Modern Symmetric-Key Ciphers
Modern Symmetric-Key Ciphers
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
Cryptography & Security Presented April 16, 2010 By Dave Stycos, Zocalo Data Systems.
Symmetric Encryption Example: DES Weichao Wang. 2 Overview of the DES A block cipher: – encrypts blocks of 64 bits using a 64 bit key – outputs 64 bits.
1 CS 854 – Hot Topics in Computer and Communications Security Fall 2006 Introduction to Cryptography and Security.
Chapter 8 - Cryptography
Web Security for Network and System Administrators1 Chapter 4 Encryption.
Cryptography1 CPSC 3730 Cryptography Chapter 6 Triple DES, Block Cipher Modes of Operation.
Chapter 5 Cryptography Protecting principals communication in systems.
1 Overview of the DES A block cipher: –encrypts blocks of 64 bits using a 64 bit key –outputs 64 bits of ciphertext A product cipher –basic unit is the.
Cryptographic Technologies
Modes of Operation CS 795. Electronic Code Book (ECB) Each block of the message is encrypted with the same secret key Problems: If two identical blocks.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
Introduction to Symmetric Block Cipher Jing Deng Based on Prof. Rick Han’s Lecture Slides Dr. Andreas Steffen’s Security Tutorial.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 5 Wenbing Zhao Department of Electrical and Computer Engineering.
Computer Networking Lecture 21: Security and Cryptography Thanks to various folks from , semester’s past and others.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Lecture 23 Symmetric Encryption
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Network Security Chapter
Network Security Sorina Persa Group 3250 Group 3250.
1 Chapter 4 Encryption. 2 Objectives In this chapter, you will: Learn the basics of encryption technology Recognize popular symmetric encryption algorithms.
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
Cryptographic basics Cryptology is divided into cryptography and steganography. Cryptography means ciphering and deciphering text. The goal is not to hide.
The Data Encryption Standard - see Susan Landau’s paper: “Standing the test of time: the data encryption standard.” DES - adopted in 1977 as a standard.
Modes of Operation. Topics  Overview of Modes of Operation  EBC, CBC, CFB, OFB, CTR  Notes and Remarks on each modes.
symmetric key cryptography
Cryptography and Network Security Chapter 6. Multiple Encryption & DES  clear a replacement for DES was needed theoretical attacks that can break it.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Chapter 20 Symmetric Encryption and Message Confidentiality.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Cryptography and Network Security
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
3DES and Block Cipher Modes of Operation CSE 651: Introduction to Network Security.
Multiple Encryption & DES  clearly a replacement for DES was needed Vulnerable to brute-force key search attacks Vulnerable to brute-force key search.
Chapter 9: Algorithms Types and Modes Dulal C. Kar Based on Schneier.
1.1 Chapter 8 Encipherment Using Modern Symmetric-Key Ciphers Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
BLOCK CIPHER SYSTEMS OPERATION MODES OF DATA ENCRYPTION STANDARD (DES)
Dr. Reuven Aviv, Nov 2008 Conventional Encryption 1 Conventional Encryption & Message Confidentiality Acknowledgements for slides Henric Johnson Blekinge.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
Modes of Operation INSTRUCTOR: DANIA ALOMAR. Modes of Operation A block cipher can be used in various methods for data encryption and decryption; these.
Lecture 23 Symmetric Encryption
1 Symmetric key cryptography: DES DES: Data Encryption Standard US encryption standard [NIST 1993] 56-bit symmetric key, 64 bit plaintext input How secure.
Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
Cryptography and Network Security
Cipher Transmission and Storage Modes Part 2: Stream Cipher Modes CSCI 5857: Encoding and Encryption.
Lecture 5 Page 1 CS 236 Online More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Encryption Encryption: Transforms Message so that Interceptor Cannot Read it –Plaintext (original message) Not necessarily text; Can be graphics, etc.
Security. Cryptography (1) Intruders and eavesdroppers in communication.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
1 CPCS425: Information Security (Topic 5) Topic 5  Symmetrical Cryptography  Understand the principles of modern symmetric (conventional) cryptography.
Block Cipher Modes Last Updated: Aug 25, ECB Mode Electronic Code Book Divide the plaintext into fixed-size blocks Encrypt/Decrypt each block independently.
Chapter 8 Network Security.
Block Cipher Modes CS 465 Make a chart for the mode comparisons
مروري برالگوريتمهاي رمز متقارن(كليد پنهان)
Algorithm Types & Algorithm Modes
ADVANCED ENCRYPTION STANDARDADVANCED ENCRYPTION STANDARD
Elect. Codebook, Cipher Block Chaining
Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.
Presentation transcript:

Cryptography Chapter 7 Part 2 Pages 781 to 812

Symmetric Cryptography Secret Key Figure 7-10 on page 782 Key distribution problem – Secure courier Many keys – N(N-1)/2 – N=100, 4,950 keys

Symmetric Cryptography Provides only confidentiality Very fast. Hard to break. Data Encryption Standard (DES) Triple-DES (3DES) Advanced Encryption Standard (AES)

Asymetric Cryptography Public Key/Private Key Figure 7-11 on page 784 Alice, Bob, and Evil Eve Very slow Manageable key distribution Authentication and Non-repudiation – Bob encrypts with his private key

Asymetric Cryptography Bob sends message to Alice S= Private[Bob](Public[Alice]){Message} Alice authenticates that it came from Bob A = Public[Bob]{S} Alice decrypt – confidentiality M = Private[Alice]{A}

Asymetric Cryptography Rivest-Shamir-Adleman (RSA) Elliptic curve cryptosystem (ECC)

Comparison Table 7-1 on page 786

Block Ciphers 32, 64, or 128 bit blocks Figure on page 787 Confusion – substitution Diffusion – transposition Avalanche effect – slight change to input causes significant change to output IV – initialization vector – Don’t get same result

Stream Cipher Figure 7-13 on page 789 Figure 7-14 on page 790 Streaming communications – such as VoIP

Hybrid Encryption Figure page 794

Session Keys Figure 7-16 on page 797

DES Data Encryption Standard Data Encryption Algorithm (DEA) 56-bit keys 64-bit blocks 16 rounds of transpositions and substitution functions

DES ANSI (American National Standards Institute) standard in : Electronic Frontier Foundation broke DES in 3 days with brute force attack against keyspace using 1,536 microprocessors

DES Modes Electronic Code Book (EBC) 64-bit block encrypted by the key Can be done in parallel Can disclose patterns

Cipher Block Chaining (CBC) Figure 7-17 IV – 64-bit initialization vector Previous Ciphtertest XOR next Plaintext Errors persist

Cipher Feedback (FRB) Mode Figure 7-18 on page 805 For small text such as keystrokes or mouse movements Plaintext XOR Keystream

Output Feedback (OFB) Mode Figure 7-19 on page 806 Errors in data do not persist For video or VoIP

Counter (CTR) Mode Figure page 807 No IV Can encrypt in parallel

Triple DES DES-EEE3 DES-EDE2 48 rounds is slow Used while NIST adopted a new standard

AES Advanced Encryption Standard Rijndael Block & Key lengths: 128, 192, 256 NIST standard