Introduction to Information Security Lect. 6: Block Ciphers.

Slides:



Advertisements
Similar presentations
Origins  clear a replacement for DES was needed Key size is too small Key size is too small The variants are just patches The variants are just patches.
Advertisements

Conventional Encryption: Algorithms
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
1 CIS 5371 Cryptography 5b. Pseudorandom Objects in Practice Block Ciphers.
Cryptography and Network Security Chapter 3
Block Ciphers and the Data Encryption Standard
Block Ciphers: Workhorses of Cryptography COMP 1721 A Winter 2004.
SYMMETRIC CRYPTOSYSTEMS Symmetric Cryptosystems 10/06/2015 | pag. 2.
CMSC 414 Computer (and Network) Security Lecture 5 Jonathan Katz.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
DES 1 Data Encryption Standard DES 2 Data Encryption Standard  DES developed in 1970’s  Based on IBM Lucifer cipher  U.S. government standard  DES.
CSE331: Introduction to Networks and Security Lecture 18 Fall 2002.
1 Chapter 3 – Block Ciphers and the Data Encryption Standard Modern Block Ciphers  now look at modern block ciphers  one of the most widely used types.
1 Chapter 3 – Block Ciphers and the Data Encryption Standard Modern Block Ciphers  now look at modern block ciphers  one of the most widely used types.
CS470, A.SelcukLucifer & DES1 Block Ciphers Lucifer & DES CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
ICS 454: Principles of Cryptography
CS Network Security Lecture 2 Prof. Katz. 9/7/2000Lecture 2 - Data Encryption2 DES – Data Encryption Standard Private key. Encrypts by series of.
Lecture 23 Symmetric Encryption
CS470, A.SelcukAfter the DES1 Block Ciphers After the DES CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
CS555Spring 2012/Topic 91 Cryptography CS 555 Topic 9: Block Cipher Construction & DES.
Encryption Schemes Second Pass Brice Toth 21 November 2001.
Chapter 3 – Block Ciphers and the Data Encryption Standard
CSE 651: Introduction to Network Security
Dan Boneh Block ciphers The data encryption standard (DES) Online Cryptography Course Dan Boneh.
Data Encryption Standard (DES). Symmetric Cryptography  C = E(P,K)  P = D(C,K)  Requirements  Given C, the only way to obtain P should be with  the.
Cryptanalysis of Modern Symmetric-Key Block Ciphers [Based on “A Tutorial on Linear and Differential Cryptanalysis” by Howard Heys.] Modern block ciphers.
Dr. Khalid A. Kaabneh Amman Arab University
Cryptography and Network Security Chapter 3. Modern Block Ciphers  now look at modern block ciphers  one of the most widely used types of cryptographic.
Private Key Algorithms RSA SSL
Blowfish A widely used block cipher. Blowfish Designed by Bruce Schneier (1993) A variant of it (Twofish) was an AES finalist candidate 64-bit block size,
Cryptography Lecture 4 Stefan Dziembowski
Classical &ontemporyryptology 1 AESAES Classical &ontemporyryptology 2 Advanced Encryption Standard Since DES was becoming less reliable as new cryptanalysis.
Feistel Model Last Updated: Aug 27, Feistel Cipher Structure Described by Horst Feistel (IBM) in 1973 Many symmetric encryption algorithms use this.
Network Security Lecture 14 Presented by: Dr. Munam Ali Shah.
CHAPTER 6 Cryptography. An Overview It is origin from the Greek word kruptos which means hidden. The objective is to hide information so that only the.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Block ciphers Structure of a multiround block cipher
Feistel Cipher Structure
Cracking DES Cryptosystem A cryptosystem is made of these parts: Two parties who want to communicate over an insecure channel An encryption algorithm that.
Data Security and Encryption (CSE348) 1. Lecture # 6 2.
1 Lect. 7 : Data Encryption Standard. 2 Data Encryption Standard (DES)  DES - History 1976 – adopted as a federal standard 1977 – official publication.
Dr. Reuven Aviv, Nov 2008 Conventional Encryption 1 Conventional Encryption & Message Confidentiality Acknowledgements for slides Henric Johnson Blekinge.
Classical &ontemporyryptology 1 Block Cipher Today’s most widely used ciphers are in the class of Block Ciphers Today’s most widely used ciphers are in.
Stream Ciphers and Block Ciphers A stream cipher is one that encrypts a digital data stream one bit or one byte at a time. Examples of classical stream.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
DIFFERENTIAL CRYPTANALYSIS Chapter 3.4. Ciphertext only attack. The cryptanalyst knows the cryptograms. This happens, if he can eavesdrop the communication.
1 Symmetric key cryptography: DES DES: Data Encryption Standard US encryption standard [NIST 1993] 56-bit symmetric key, 64 bit plaintext input How secure.
Computer and Network Security Rabie A. Ramadan Lecture 3.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Chapter 2 Symmetric Encryption.
© Information Security Group, ICU1 Block Cipher- introduction  DES Description: Feistel, S-box Exhaustive Search, DC and LC Modes of Operation  AES Description:
Block Cipher- introduction
Data Encryption Standard (DES) most widely used block cipher in world adopted in 1977 by NBS (now NIST) – as FIPS PUB 46 encrypts 64-bit data using 56-bit.
CS519, © A.SelcukDifferential & Linear Cryptanalysis1 CS 519 Cryptography and Network Security Instructor: Ali Aydin Selcuk.
DES: Data Encryption Standard
Module :MA3036NI Symmetric Encryption -3 Lecture Week 4.
Block Ciphers and the Data Encryption Standard. Modern Block Ciphers  One of the most widely used types of cryptographic algorithms  Used in symmetric.
CST 312 Pablo Breuer. A block of plaintext is treated as a whole and used to produce a ciphertext block of equal length Typically a block size of 64 or.
1 CPCS425: Information Security (Topic 5) Topic 5  Symmetrical Cryptography  Understand the principles of modern symmetric (conventional) cryptography.
@Yuan Xue Announcement Project Release Team forming Homework 1 will be released next Tuesday.
Lecture 4 Data Encryption Standard (DES) Dr. Nermin Hamza
Practical Aspects of Modern Cryptography Josh Benaloh & Brian LaMacchia.
Symmetric Key Block Ciphers
مروري برالگوريتمهاي رمز متقارن(كليد پنهان)
Feistel Cipher Structure
Presentation transcript:

Introduction to Information Security Lect. 6: Block Ciphers

2 Model of Symmetric Cryptosystem E D Shared Secret Key Key K Secure Channel Insecure Channel Plaintext M Ciphertext C Plaintext M Cryptanalyst Adversary M K C = E K (M) D K (C) = M

3 Block Cipher – A Simplified View Encryption Function Encryption Key Schedule Input Message (Plaintext) User Key Encryption Round keys Output Message (Ciphertext) Decryption Key Schedule Decryption Round keys Decryption Function E D E D Input Message (Ciphertext) Output Message (Plaintext)

4 Most Popular Symmetric Ciphers DES 3DES AES IDEA RC5 Blowfish CAST Serpent RC6 Twofish Mars 56 bit key 128, 192, 256 bit key AES contest 2001 American standards Other popular algorithms

5 1. Feistel Network

6 Feistel-type Ciphers  Feistel network  An elegant variant of S-P networks that could be implemented using a single algorithm for both encryption and decryption  F( ) does not need to be invertible Horst Feistel Horst Feistel is best known for his work on the Feistel network construction – a common method for constructing encryption algorithms. In 1977, he was recognized at the IBM Corporate Technical Recognition Event (CTRE) for "devising a scheme encrypting binary data which is especially significant to IBM products and is the basis for the recently announced Federal Information Processing Standard adopted by the U.S. Commerce Department." His work at IBM led to the development of the pioneering Lucifer and Data Encryption Standards (DES) ciphers, and as a result of his efforts, IBM announced the 3845 and 3846 data encryption devices and the IBM cryptographic subsystem. Feistel earned a bachelor's and a master's degree in physics from MIT and Harvard, respectively. Before joining IBM, he worked with the U.S. Air Force Cambridge Research Center (AFCRC), MIT's Lincoln Laboratory and the Mitre Corporation.

7 Block Cipher Architecture : Feistel-type (Encryption) round 1 round 2 round r Plaintext Ciphertext    F F F K1K1 K2K2 KrKr L0L0 R0R0 L1L1 L r-1 R1R1 R r-1 LrLr RrRr

8 Block Cipher Architecture : Feistel-type (Decryption) Ciphertext    F F F KrKr K r-1 K1K1 RrRr LrLr R r-1 R1R1 L r-1 L1L1 R0R0 L0L0 Plaintext

9 Feistel-type Cipher P = L 0 || R 0 C = R r || L r L 1 = R 0 R r-1 = L r R 1 = L 0  F(K 1, R 0 ) L r-1 = R r  F(K r, R r-1 ) L i = R i-1 R i-1 = L i R i = L i-1  F(K i, R i-1 ) L i-1 = R i  F(K i, R i-1 ) L r = R r-1 R 0 = L 1 R r = L r-1  F(K r, R r-1 ) L 0 = R 1  F(K 1, R 0 ) C = R r || L r P = L 0 || R 0 P = L 0 || R 0 C = R r || L r for i=1 to r for i=r-1 to 0 L i = R i-1 R i = L i+1 R i = L i-1  F(K i, R i-1 ) L i = R i+1  F(K i+1, R i ) C = R r || L r P = L 0 || R 0

10 Design of Feistel-type Ciphers  Design of F-function The only non-linear part in the Feistel-type cipher Need not be invertible Typically uses S-boxes (Substitution boxes) for non-linearity May also contain mixing (permutation) part of the S-box outputs Determines the ultimate security  Design of Key scheduling algorithm Algorithm for deriving as many round keys as necessary from a fixed user key On-the-fly vs. off-line calculation  Number of rounds Depends on the strength of round function (F-function) A safety margin should be considered for long-term security Determined through the analysis of the whole algorithm against most powerful known cryptanalysis techniques