Cryptography and Network Security Contemporary Symmetric Ciphers.

Slides:



Advertisements
Similar presentations
“Advanced Encryption Standard” & “Modes of Operation”
Advertisements

CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
Cryptography and Network Security Chapter 5 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 5
Cryptography and Network Security Chapter 3
Cryptography and Network Security Chapter 6 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Chapter 3 Block Ciphers and the Data Encryption Standard
Cryptography and Network Security Chapter 7 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 6. Chapter 6 – Block Cipher Operation Many savages at the present day regard their names as vital parts of themselves,
Cryptography1 CPSC 3730 Cryptography Chapter 6 Triple DES, Block Cipher Modes of Operation.
Cryptography and Network Security
1 Pertemuan 07 Enkripsi Simetrik Kontemporer Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
AES clear a replacement for DES was needed
Cryptography and Network Security (AES) Dr. Monther Aldwairi New York Institute of Technology- Amman Campus 10/18/2009 INCS 741: Cryptography 10/18/20091Dr.
Chap. 6: Contemporary Symmetric Ciphers Jen-Chang Liu, 2004 Adapted from Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 5. Chapter 5 –Advanced Encryption Standard "It seems very simple." "It is very simple. But if you don't know.
Cryptography and Network Security Chapter 5 Fourth Edition by William Stallings.
Cryptography and Network Security Chapter 6
Lecture 23 Symmetric Encryption
Chapter 2 (D) – Contemporary Symmetric Ciphers "I am fairly familiar with all the forms of secret writings, and am myself the author of a trifling monograph.
Computer Security CS 426 Lecture 3
Cryptography and Network Security Chapter 7 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Fourth Edition by William Stallings (Based on Lecture slides by Lawrie Brown) 1.
Chapter 5 Advanced Encryption Standard. Origins clear a replacement for DES was needed –have theoretical attacks that can break it –have demonstrated.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Chapter 5 –Advanced Encryption Standard "It seems very simple." "It is very simple. But if you don't know what the key is it's virtually indecipherable."
Cryptography and Network Security Chapter 7 Fifth Edition by William Stallings.
Cryptography and Network Security Chapter 6. Multiple Encryption & DES  clear a replacement for DES was needed theoretical attacks that can break it.
1 Chapter 3 Ciphers Mechanism that decides the process of encryption/decryption Stream Cipher: Bit-by-bit encryption / decryption Block Cipher: Block-by-block.
9/17/15UB Fall 2015 CSE565: S. Upadhyaya Lec 6.1 CSE565: Computer Security Lecture 6 Advanced Encryption Standard Shambhu Upadhyaya Computer Science &
Chapter 20 Symmetric Encryption and Message Confidentiality.
Network Security Lecture 17 Presented by: Dr. Munam Ali Shah.
CS555Spring 2012/Topic 51 Cryptography CS 555 Topic 5: Pseudorandomness and Stream Ciphers.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Stream Cipher July 2011.
Scott CH Huang COM 5336 Cryptography Lecture 2 Symmetric Cryptography Scott CH Huang COM 5336 Cryptography Lecture 2.
Network Security Essentials Chapter 2: Symmetric Encryption Fourth Edition by William Stallings (Based on Lecture slides by Lawrie Brown)
3DES and Block Cipher Modes of Operation CSE 651: Introduction to Network Security.
Multiple Encryption & DES  clearly a replacement for DES was needed Vulnerable to brute-force key search attacks Vulnerable to brute-force key search.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown (Changed by Somesh Jha)
Symmetric Encryption IT 352 : Lecture 2- part2 Najwa AlGhamdi, MSc – 2012 /1433.
Cryptography and Network Security Chapter 6 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Presented by: Dr. Munam Ali Shah
Lecture 23 Symmetric Encryption
Network Security Essentials Chapter 2 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Network Security Essentials Chapter 2 Fourth Edition by William Stallings (Based on Lecture slides by Lawrie Brown)
Fifth Edition by William Stallings
Advanced Encryption Standard Dr. Shengli Liu Tel: (O) Cryptography and Information Security Lab. Dept. of Computer.
Chapter 2 Symmetric Encryption.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
Applied Cryptography (Symmetric) Part I. Many savages at the present day regard their names as vital parts of themselves, and therefore take great pains.
Conventional Encryption Chapter 4. Multiple DES Advantage of extra stages –Each stage gives 56 more bits of key length –Double DES subject to meet-in-the-middle.
Dr. Lo’ai Tawalbeh summer 2007 Chapter 6: Contemporary Symmetric Ciphers Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus INCS.
Fall 2002CS 395: Computer Security1 Chapters 5-6: Contemporary Symmetric Ciphers Triple DES Blowfish AES.
Module :MA3036NI Symmetric Encryption -3 Lecture Week 4.
University of Malawi, Chancellor College
Block Ciphers and the Data Encryption Standard. Modern Block Ciphers  One of the most widely used types of cryptographic algorithms  Used in symmetric.
1 CPCS425: Information Security (Topic 5) Topic 5  Symmetrical Cryptography  Understand the principles of modern symmetric (conventional) cryptography.
School of Computer Science and Engineering Pusan National University
Pseudo Random Number Generators
ADVANCED ENCRYPTION STANDARDADVANCED ENCRYPTION STANDARD
Chapter -3 ADVANCED ENCRYPTION STANDARD & BLOCK CIPHER OPERATION
Chapter -4 STREAM CIPHERS
Cryptography and Network Security Chapter 5 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security
Presentation transcript:

Cryptography and Network Security Contemporary Symmetric Ciphers

Chapter 6 – Contemporary Symmetric Ciphers "I am fairly familiar with all the forms of secret writings, and am myself the author of a trifling monograph upon the subject, in which I analyze one hundred and sixty separate ciphers," said Holmes. —The Adventure of the Dancing Men, Sir Arthur Conan Doyle

Triple DES clear a replacement for DES was needed –theoretical attacks that can break it –demonstrated exhaustive key search attacks AES is a new cipher alternative prior to this alternative was to use multiple encryption with DES implementations Triple-DES is the chosen form

Triple-DES with Two-Keys hence must use 3 encryptions –would seem to need 3 distinct keys but can use 2 keys with E-D-E sequence –C = E K1 [D K2 [E K1 [P]]] –nb encrypt & decrypt equivalent in security –if K1=K2 then can work with single DES standardized in ANSI X9.17 & ISO8732 no current known practical attacks, resist to meet-in-the-middle attack (2^112)

Triple-DES with Three-Keys although are no practical attacks on two- key Triple-DES have some indications can use Triple-DES with Three-Keys to avoid even these –C = E K3 [D K2 [E K1 [P]]] has been adopted by some Internet applications, eg PGP, S/MIME

Blowfish a symmetric block cipher designed by Bruce Schneier in 1993/94 characteristics –fast implementation on 32-bit CPUs –compact in use of memory less than 5K memory –simple structure eases analysis/implemention –variable security by varying key size has been implemented in various products

Blowfish Encryption uses two primitives: addition & XOR data is divided into two 32-bit halves L 0 & R 0 for i = 1 to 16 do R i = L i-1 XOR P i ; L i = F[R i ] XOR R i-1 ; L 17 = R 16 XOR P 18 ; R 17 = L 16 XOR i 17 ; where F[a,b,c,d] = ((S 1,a + S 2,b ) XOR S 3,c ) + S 4,a

Blowfish Key Schedule uses a 32 to 448 bit key used to generate –18 32-bit subkeys stored in K-array K j –four 8x32 S-boxes stored in S i,j key schedule consists of: –initialize P-array and then 4 S-boxes using pi –XOR P-array with key bits (reuse as needed) –loop repeatedly encrypting data using current P & S and replace successive pairs of P then S values –requires 521 encryptions, hence slow in rekeying –not suitable for applications in which the secret key changes frequently –For rapid execution, the P and S arrays have to be stored rather than rederive, this requires about 4KBytes memory, not for smart cards

Discussion key dependent S-boxes and subkeys, generated using cipher itself, makes analysis very difficult changing both halves in each round increases security provided key is large enough, brute-force key search is not practical, especially given the high key schedule cost It is also impressively fast to execute

RC5 a proprietary cipher owned by RSADSI designed by Ronald Rivest (of RSA fame) used in various RSADSI products can vary key size / data size / no rounds very clean and simple design easy implementation on various CPUs yet still regarded as secure

RC5 Ciphers RC5 is a family of ciphers RC5-w/r/b –w = word size in bits (16/32/64) nb data=2w –r = number of rounds (0..255) –b = number of bytes in key (0..255) nominal version is RC5-32/12/16 –ie 32-bit words so encrypts 64-bit data blocks –using 12 rounds –with 16 bytes (128-bit) secret key

RC5 Encryption split input into two halves A & B L 0 = A + S[0]; R 0 = B + S[1]; for i = 1 to r do L i = (( L i-1 XOR R i-1 ) <<< R i-1 ) + S[2 x i]; R i = (( R i-1 XOR L i ) <<< L i ) + S[2 x i + 1]; each round is like 2 DES rounds note rotation is main source of non-linearity need reasonable number of rounds (eg 12-16)

RC5 Key Expansion RC5 uses 2r+2 subkey words (w-bits) subkeys are stored in array S[i], i=0..t-1 then the key schedule consists of –initializing S to a fixed pseudorandom value, based on constants e and phi –the byte key is copied (little-endian) into a c- word array L –a mixing operation then combines L and S to form the final S array

RC5 Modes RFC2040 defines 4 modes used by RC5 –RC5 Block Cipher, is ECB mode –RC5-CBC, is CBC mode –RC5-CBC-PAD, is CBC with padding by bytes with value being the number of padding bytes –RC5-CTS, a variant of CBC which is the same size as the original message, uses ciphertext stealing to keep size same as original

Block Cipher Characteristics features seen in modern block ciphers are: –variable key length / block size / no rounds –mixed operators, data/key dependent rotation –key dependent S-boxes –more complex key scheduling –operation of full data in each round –varying non-linear functions

Stream Ciphers process the message bit by bit (as a stream) typically have a (pseudo) random stream key combined (XOR) with plaintext bit by bit randomness of stream key completely destroys any statistically properties in the message –C i = M i XOR StreamKey i what could be simpler!!!! but must never reuse stream key –otherwise can remove effect and recover messages –Such as credit card, test strings, other byte streams with known properties

Stream and Block Cipher Stream of data such as data over data communication channel or a browser/web link Block of data such as file transfer, and database However, either type can be used in virtually any application

Stream Cipher Properties some design considerations are: –long period with no repetitions –statistically random –depends on large enough key –large linear complexity –correlation immunity –confusion –diffusion –use of highly non-linear boolean functions

RC4 a proprietary cipher owned by RSA DSI another Ron Rivest design, simple but effective variable key size, byte-oriented stream cipher widely used (web SSL/TLS, wireless WEP LAN standard) key forms random permutation of all 8-bit values uses that permutation to scramble input info processed a byte at a time

RC4 Key Schedule starts with an array S of numbers: use key to well and truly shuffle S forms internal state of the cipher given a key k of length l bytes for i = 0 to 255 do S[i] = i j = 0 for i = 0 to 255 do j = (j + S[i] + k[i mod l]) (mod 256) swap (S[i], S[j])

RC4 Encryption encryption continues shuffling array values sum of shuffled pair selects "stream key" value XOR with next byte of message to en/decrypt i = j = 0 for each message byte M i i = (i + 1) (mod 256) j = (j + S[i]) (mod 256) swap(S[i], S[j]) t = (S[i] + S[j]) (mod 256) C i = M i XOR S[t]

RC4 Security claimed secure against known attacks –have some analyses, none practical result is very non-linear since RC4 is a stream cipher, must never reuse a key have a concern with WEP, but due to key handling rather than RC4 itself