Announcements: Homework 2 returned Homework 2 returned Monday: Written (concept and small calculations) exam on breaking ch 2 ciphers Monday: Written (concept.

Slides:



Advertisements
Similar presentations
1 Lecture 3: Secret Key Cryptography Outline concepts DES IDEA AES.
Advertisements

Cryptography and Network Security Chapter 5 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 3
The Advanced Encryption Standard (AES) Simplified.
Rachana Y. Patil 1 Data Encryption Standard (DES) (DES)
Symmetric Encryption Example: DES Weichao Wang. 2 Overview of the DES A block cipher: – encrypts blocks of 64 bits using a 64 bit key – outputs 64 bits.
Announcements: Quiz grades entered Quiz grades entered Homework 4 updated with more details. Homework 4 updated with more details. Discussion forum is.
SYMMETRIC CRYPTOSYSTEMS Symmetric Cryptosystems 10/06/2015 | pag. 2.
CMSC 414 Computer (and Network) Security Lecture 5 Jonathan Katz.
Announcements: Ch 3 quiz next week (tentatively Friday). Will include fields (today) Ch 3 quiz next week (tentatively Friday). Will include fields (today)Today:
Announcements: 1. HW7 due next Tuesday. 2. Inauguration today! Questions? This week: Discrete Logs, Diffie-Hellman, ElGamal Discrete Logs, Diffie-Hellman,
Cryptography1 CPSC 3730 Cryptography Chapter 3 DES.
Announcements: Class is cancelled Thurs+Fri while I’m at the SIGCSE conference Class is cancelled Thurs+Fri while I’m at the SIGCSE conference Assignment.
Announcements: Homework 3 due now Homework 3 due now Homework 4 posted Homework 4 postedToday: Attacks on DES Attacks on DESQuestions? DTTF/NB479: DszquphsbqizDay.
DES 1 Data Encryption Standard DES 2 Data Encryption Standard  DES developed in 1970’s  Based on IBM Lucifer cipher  U.S. government standard  DES.
1 Overview of the DES A block cipher: –encrypts blocks of 64 bits using a 64 bit key –outputs 64 bits of ciphertext A product cipher –basic unit is the.
Announcements: Quizzes returned tomorrow Quizzes returned tomorrow This week: Mon-Thurs: Data Encryption Standard (DES) Mon-Thurs: Data Encryption Standard.
Announcements: Homework 2 returned Homework 2 returned Monday: Written (concept and small calculations) exam on breaking ch 2 ciphers Monday: Written (concept.
1 Chapter 3 – Block Ciphers and the Data Encryption Standard Modern Block Ciphers  now look at modern block ciphers  one of the most widely used types.
1 Chapter 3 – Block Ciphers and the Data Encryption Standard Modern Block Ciphers  now look at modern block ciphers  one of the most widely used types.
Announcements: Quizzes returned at end of class Quizzes returned at end of class This week: Mon-Thurs: Data Encryption Standard (DES) Mon-Thurs: Data Encryption.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
Announcements: HW3 updated. Due next Thursday HW3 updated. Due next Thursday Written quiz tomorrow on chapters 1-2 (next slide) Written quiz tomorrow on.
ICS 454: Principles of Cryptography
Announcements: DES due Thursday. DES due Thursday. Try not to use late day, so you can study for Ch 3 quiz Friday. Try not to use late day, so you can.
Announcements: HW4 – DES due Friday midnight HW4 – DES due Friday midnight Any volunteers to help config C/C# later today? Who’s using Scheme? Quiz on.
ICS 454 Principles of Cryptography Advanced Encryption Standard (AES) (AES) Sultan Almuhammadi.
Lecture 2.2: Private Key Cryptography II CS 436/636/736 Spring 2012 Nitesh Saxena.
Dr. Lo’ai Tawalbeh 2007 Chapter 5: Advanced Encryption Standard (AES) Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus.
Announcements: Quizzes graded, but not in gradebook. (Current grade gives 0 on the parts you shouldn’t have done .) Quizzes graded, but not in gradebook.
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Data Encryption Standard (DES). Symmetric Cryptography  C = E(P,K)  P = D(C,K)  Requirements  Given C, the only way to obtain P should be with  the.
The Digital Encryption Standard CSCI 5857: Encoding and Encryption.
A Cryptography Education Tool Anna Yu Department of Computer Science College of Engineering North Carolina A&T State University June 18, 2009.
Chapter 5 Advanced Encryption Standard. Origins clear a replacement for DES was needed –have theoretical attacks that can break it –have demonstrated.
Cryptography and Network Security
1 Chapter 3 Ciphers Mechanism that decides the process of encryption/decryption Stream Cipher: Bit-by-bit encryption / decryption Block Cipher: Block-by-block.
AES Background and Mathematics CSCI 5857: Encoding and Encryption.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Announcements: HW4 – DES due Thursday HW4 – DES due Thursday I have installed, or will install: Java, C (gcc), Python. What other languages? Please make.
Feistel Cipher Structure
1 Lect. 7 : Data Encryption Standard. 2 Data Encryption Standard (DES)  DES - History 1976 – adopted as a federal standard 1977 – official publication.
Announcements: Homework 3 due now Homework 3 due now Homework 4 posted Homework 4 postedToday: Attacks on DES Attacks on DESQuestions? DTTF/NB479: DszquphsbqizDay.
DES Algorithm Data Encryption Standard. DES Features Block cipher, 64 bits per block 64-bit key, with only 56 bits effective ECB mode and CBC mode.
Chapter 3 Encryption Algorithms & Systems (Part D)
Advanced Encryption Standard. Origins NIST issued a new version of DES in 1999 (FIPS PUB 46-3) DES should only be used in legacy systems 3DES will be.
Fifth Edition by William Stallings
Chapter 2 (C) –Advanced Encryption Standard. Origins clearly a replacement for DES was needed –have theoretical attacks that can break it –have demonstrated.
Computer and Network Security Rabie A. Ramadan Lecture 3.
Plaintextciphertext encryption algorithmdecryption algorithm plaintext.
Linear Cryptanalysis of DES
5.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 5 Introduction to Modern Symmetric-key Ciphers.
Conventional Encryption Chapter 4. Multiple DES Advantage of extra stages –Each stage gives 56 more bits of key length –Double DES subject to meet-in-the-middle.
Network Security. Three tools Hash Function Block Cipher Public Key / Private Key.
Linear Cryptanalysis of DES M. Matsui. 1.Linear Cryptanalysis Method for DES Cipher. EUROCRYPT 93, 1994.Linear Cryptanalysis Method for DES Cipher 2.The.
Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 7 September 9, 2004.
Module :MA3036NI Symmetric Encryption -3 Lecture Week 4.
Simplified DES.
The Advanced Encryption Standard Part 1: Overview
Understanding Cryptography by Christof Paar and Jan Pelzl Chapter 4 – The Advanced Encryption Standard (AES) ver. October 28, 2009.
Information and Computer Security CPIS 312 Lab 6 & 7 1 TRIGUI Mohamed Salim Symmetric key cryptography.
1 CPCS425: Information Security (Topic 5) Topic 5  Symmetrical Cryptography  Understand the principles of modern symmetric (conventional) cryptography.
@Yuan Xue Announcement Project Release Team forming Homework 1 will be released next Tuesday.
Provides Confidentiality
PART VII Security.
ICS 454: Principles of Cryptography
DATA ENCRYPTION STANDARD (DES)
ICS 555: Block Ciphers & DES Sultan Almuhammadi.
Presentation transcript:

Announcements: Homework 2 returned Homework 2 returned Monday: Written (concept and small calculations) exam on breaking ch 2 ciphers Monday: Written (concept and small calculations) exam on breaking ch 2 ciphers HW 3 due date pushed back to Tuesday HW 3 due date pushed back to Tuesday Next 2 weeks: Data Encryption Standard (DES) Data Encryption Standard (DES) HW 4 (posted Monday, due 1.5 weeks later) is to implement DES HW 4 (posted Monday, due 1.5 weeks later) is to implement DES Rijndael, start RSA Rijndael, start RSAQuestions? DTTF/NB479: DszquphsbqizDay 12

The Chapter 2 Written Exam is next class Content: Written problems Written problems Concepts of the algorithms we discussed, how they work, how you can break them using various attacks Concepts of the algorithms we discussed, how they work, how you can break them using various attacks Inverses of integers and matrices (mod n) Inverses of integers and matrices (mod n) Working out some examples by hand, like 5 -1 mod (7) Working out some examples by hand, like 5 -1 mod (7) Anything else from ch 1-2, but nothing that will require a computer. Anything else from ch 1-2, but nothing that will require a computer.Rules: Closed book and computer Closed book and computer You may bring a sheet with letters  numbers, and inverses mod 26. You may bring a sheet with letters  numbers, and inverses mod 26. A scientific calculator is allowed A scientific calculator is allowed

DES is a block cipher History? Full-scale version operates on 64-bit blocks TextASCII bit vector Block 1 (64 bits) DES Encoded 1 (64 bits) Encoded bit vector Block 2 (64 bits) DES Encoded 2 (64 bits) …

EDEN is a toy version of DES that operates on 12-bit blocks EDEN is a term I coined: Easy Data Encryption Non-standard

EDEN Input (12 bits) L 0 (6)R 0 (6) f L 1 (6)R 1 (6) K 1 (8) f L 2 (6)R 2 (6) K 2 (8) Round 1 Round 2 Repeat for 8 rounds … The key, K i for round i is derived from a 9-bit key K. 1.Write L 1, R 1 2.We can decrypt by switching L and R and using the same procedure! (We need only to reverse the key sequence.) Example. This is a Feistel system.

1. Expanders 2. XOR with key 3. S-boxes Read p. 116 to help with Q1-4. Could you implement this? EDEN’s encryption function f has the same three types of components as DES’ f 1-4

DES has the same structure as EDEN except it uses initial permutations (IP) Trappe &Washington, p. 125

The initial permutation table tells at which position in the input to find the output bit Reading permutation tables Say y = IP(x) Then y[1] = x[58], y[2] = x[50], … If y = IP -1 (x), y[58] = x[1], y[50] = x[2], …

Differences between DES & EDEN EDENDES 12-bit blocks 64-bit blocks Extra initial permutation IP (for efficiency in 1970’s?) 8 rounds 16 rounds E: 6  8 bits E: 32  48 bits 9 bit key: use 8/round 64-bit key: use 56/round Also contains extra permutations, a left-shift each round, and a reduction to 48 bits each round 2 S-boxes: 4  3 bits each 8 S-boxes: 6  4 bits each f ends by permuting the 32 bits

T&W, p

DES round keys involve two permutations and a left shift K = Grab 56 permuted bits:[57, 49, 41, 33 …] Get 1100… In round 1, LS(1), so: 100 …1 Then grab 48 permuted bits: [14, 17, 11, 24, 1, 5, 3, …] Get … 1 0 … T&W, p