LUCIFER hell's favorite cipher.... By: OUTSOURCED Trevin Maerten Eitan Romanoff.

Slides:



Advertisements
Similar presentations
Cryptography and Network Security Chapter 3
Advertisements

Block Ciphers and the Data Encryption Standard
Rachana Y. Patil 1 Data Encryption Standard (DES) (DES)
Cryptography1 CPSC 3730 Cryptography Chapter 3 DES.
Simplified DES CS-480b Network Security Dick Steflik.
DES 1 Data Encryption Standard DES 2 Data Encryption Standard  DES developed in 1970’s  Based on IBM Lucifer cipher  U.S. government standard  DES.
1 Chapter 3 – Block Ciphers and the Data Encryption Standard Modern Block Ciphers  now look at modern block ciphers  one of the most widely used types.
1 Chapter 3 – Block Ciphers and the Data Encryption Standard Modern Block Ciphers  now look at modern block ciphers  one of the most widely used types.
CS470, A.SelcukLucifer & DES1 Block Ciphers Lucifer & DES CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
ICS 454: Principles of Cryptography
Lecture 2.2: Private Key Cryptography II CS 436/636/736 Spring 2012 Nitesh Saxena.
Cryptography Block Ciphers and Feistel Functions.
Chapter 3 – Block Ciphers and the Data Encryption Standard
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Data Encryption Standard (DES). Symmetric Cryptography  C = E(P,K)  P = D(C,K)  Requirements  Given C, the only way to obtain P should be with  the.
The Digital Encryption Standard CSCI 5857: Encoding and Encryption.
Frank Rowe John Gaetano Chuck Figiel.  CryptoViz implements and visualizes the Data Encryption Standard (DES) algorithm.  DES was used by the government.
Dr. Khalid A. Kaabneh Amman Arab University
CSCI 5857: Encoding and Encryption
Cryptography and Network Security Chapter 3. Modern Block Ciphers  now look at modern block ciphers  one of the most widely used types of cryptographic.
Software Security Seminar - 1 Chapter 14. Still Other Block Ciphers 발표자 : 최두호 Applied Cryptography.
Classical &ontemporyryptology 1 AESAES Classical &ontemporyryptology 2 Advanced Encryption Standard Since DES was becoming less reliable as new cryptanalysis.
Advance Encryption Standard. Topics  Origin of AES  Basic AES  Inside Algorithm  Final Notes.
Feistel Model Last Updated: Aug 27, Feistel Cipher Structure Described by Horst Feistel (IBM) in 1973 Many symmetric encryption algorithms use this.
Network Security Lecture 14 Presented by: Dr. Munam Ali Shah.
TE/CS 536 Network Security Spring 2006 – Lectures 6&7 Secret Key Cryptography.
Chapter 20 Symmetric Encryption and Message Confidentiality.
CPTR 427 Programming DES. Outline Top Level Design Design Decisions Operations to write Putting it together.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Feistel Cipher Structure
13. Other Block Ciphers 13.1 LUCIFER 13.2 MADRYGA 13.3 NEWDES 13.4 FEAL 13.5 REDOC 13.6 LOKI.
Data Security and Encryption (CSE348) 1. Lecture # 6 2.
Data Encryption Standard (DES) © 2000 Gregory Kesden.
BLOCK CIPHER SYSTEMS OPERATION MODES OF DATA ENCRYPTION STANDARD (DES)
Dr. Reuven Aviv, Nov 2008 Conventional Encryption 1 Conventional Encryption & Message Confidentiality Acknowledgements for slides Henric Johnson Blekinge.
Classical &ontemporyryptology 1 Block Cipher Today’s most widely used ciphers are in the class of Block Ciphers Today’s most widely used ciphers are in.
DES Algorithm Data Encryption Standard. DES Features Block cipher, 64 bits per block 64-bit key, with only 56 bits effective ECB mode and CBC mode.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
‘Baby DES’ cipher Alexei Vernitski. Block cipher A message is a sequence of bits: … We split the message in blocks of a fixed length.
GPU ASSISTED LM HASH CRACKING WILLIAM GROESBECK UNIVERSITY OF NEVADA, RENO – SPRING 2013 (Psst, the 90’s called - they want their hashing algorithm back)
Introduction to Information Security Lect. 6: Block Ciphers.
1 Symmetric key cryptography: DES DES: Data Encryption Standard US encryption standard [NIST 1993] 56-bit symmetric key, 64 bit plaintext input How secure.
CSC 386 – Computer Security Scott Heggen. Agenda Cryptography (i.e., Confusion and Diffusion)
Announcements: Homework 2 returned Homework 2 returned Monday: Written (concept and small calculations) exam on breaking ch 2 ciphers Monday: Written (concept.
Computer and Network Security Rabie A. Ramadan Lecture 3.
Module :MA3036NI Symmetric Encryption -4 Lecture Week 5.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Chapter 2 Symmetric Encryption.
Plaintextciphertext encryption algorithmdecryption algorithm plaintext.
DES Analysis and Attacks CSCI 5857: Encoding and Encryption.
Data Encryption Standard (DES) most widely used block cipher in world adopted in 1977 by NBS (now NIST) – as FIPS PUB 46 encrypts 64-bit data using 56-bit.
Computer Security coursework 3 Dr Alexei Vernitski.
Module :MA3036NI Symmetric Encryption -3 Lecture Week 4.
Simplified DES.
Block Ciphers and the Data Encryption Standard. Modern Block Ciphers  One of the most widely used types of cryptographic algorithms  Used in symmetric.
CST 312 Pablo Breuer. A block of plaintext is treated as a whole and used to produce a ciphertext block of equal length Typically a block size of 64 or.
Information and Computer Security CPIS 312 Lab 6 & 7 1 TRIGUI Mohamed Salim Symmetric key cryptography.
Data Encryption Standard (DES) Financial companies found the need for a cryptographic algorithm that would have the blessing of the US government (=NSA)
Lecture 4 Data Encryption Standard (DES) Dr. Nermin Hamza
Triple DES.
ICS 454: Principles of Cryptography
DATA ENCRYPTION STANDARD (DES)
ICS 555: Block Ciphers & DES Sultan Almuhammadi.
Advanced Encryption Standard
Feistel Cipher Structure
Presentation transcript:

LUCIFER hell's favorite cipher...

By: OUTSOURCED Trevin Maerten Eitan Romanoff

About Lucifer Created by Horst Feistel et al. at IBM One of the earliest block ciphers  “Father” of DES Limited commercial usage with banking software

About the Cipher Block Cipher  Plaintext blocks of 128 bits  128 bit key  72 bit sub-keys  Ciphertext blocks of 128 bits Feistel network 16 rounds per encryption

The Encryption Round

The Function XOR block with sub-key Block nibble swap  Based on bits of first sub-key byte Send nibbles to s-boxes  Left nibble to box 1, right nibble to box 2 Bit permutation

Our Approach Separate the cipher from the practical program. Have separate “helper classes”. Permutation Class KeyHandler Class SboxClass Keep readability high. High modularity for easy testing and optimization. Allow output as a hex string. Use Java - stick to what we know best!

Class Structure

Sample Encrypted Texts INPUT test sample input OUTPUT be15cc3974c2f0ab55e38a881efafa23 09b20463d448c50de9fc6ad609787a8d

Timed Results (Version 1) 1,000,000 round encryption: msec encryption repetitions 1.47e-05 sec/encryption

Analysis and Improvements A lot of unnecessary for loops  Generic toBitArray function unnecessary Massive overhead with O(n^2) routines!  “Grabbing Bits” too costly. Replace with simple shifts Focus on the methods called the most Overall class structure had negligible overhead

Timed Results (Version 2) 1,000,000 round encryption: 5679 msec encryption repetitions 5.68e-06 sec/encryption 259% Performance Boost Still a lot of room for unfolding larger loops Final permutation still costly

WeLoveLucy Demo

What We Learned The low-level programming mindset Bit-level operations on unsigned ints Overhead in non-obvious places Benefits of Feistel networks in decryption

Questions?

Really? No Questions?

References 1) Brown, Lawriem. “Block Ciphers”. April, Web. 30 Oct ) A. Sorkin, (1984). LUCIFER: a cryptographic algorithm. Cryptologia, 8(1), , ) Savard, John. "Lucifer - The First Block Cipher." John Savard's Home Page. 30 dec Web. 30 Oct ) "Lucifer (cipher)." Wikipedia, The Free Encyclopedia. 7 Apr 2009, 20:04 UTC. 7 Apr 2009

fin