DES Analysis and Attacks CSCI 5857: Encoding and Encryption.

Slides:



Advertisements
Similar presentations
DES The Data Encryption Standard (DES) is a classic symmetric block cipher algorithm. DES was developed in the 1970’s as a US government standard The block.
Advertisements

CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
1 Lecture 3: Secret Key Cryptography Outline concepts DES IDEA AES.
Data Encryption Standard (DES)
1 CIS 5371 Cryptography 5b. Pseudorandom Objects in Practice Block Ciphers.
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
Cryptography and Network Security Chapter 3
Block Ciphers and the Data Encryption Standard
Rachana Y. Patil 1 Data Encryption Standard (DES) (DES)
Data Encryption Standard (DES)
Symmetric Encryption Example: DES Weichao Wang. 2 Overview of the DES A block cipher: – encrypts blocks of 64 bits using a 64 bit key – outputs 64 bits.
Advanced Encryption Standard
Cryptography and Network Security, resuming some notes Dr. M. Sakalli.
1 The AES block cipher Niels Ferguson. 2 What is it? Block cipher: encrypts fixed-size blocks. Design by two Belgians. Chosen from 15 entries in a competition.
Cryptography1 CPSC 3730 Cryptography Chapter 3 DES.
FEAL FEAL 1.
1 Overview of the DES A block cipher: –encrypts blocks of 64 bits using a 64 bit key –outputs 64 bits of ciphertext A product cipher –basic unit is the.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 5 Wenbing Zhao Department of Electrical and Computer Engineering.
Lecture 23 Symmetric Encryption
Lecture 2.2: Private Key Cryptography II CS 436/636/736 Spring 2012 Nitesh Saxena.
CS555Spring 2012/Topic 91 Cryptography CS 555 Topic 9: Block Cipher Construction & DES.
CSE 651: Introduction to Network Security
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
The Digital Encryption Standard CSCI 5857: Encoding and Encryption.
Cryptanalysis. The Speaker  Chuck Easttom  
History and Background Part 1: Basic Concepts and Monoalphabetic Substitution CSCI 5857: Encoding and Encryption.
Block Cipher Transmission Modes CSCI 5857: Encoding and Encryption.
Cryptanalysis of Modern Symmetric-Key Block Ciphers [Based on “A Tutorial on Linear and Differential Cryptanalysis” by Howard Heys.] Modern block ciphers.
The Data Encryption Standard - see Susan Landau’s paper: “Standing the test of time: the data encryption standard.” DES - adopted in 1977 as a standard.
CSCI 5857: Encoding and Encryption
Differential Cryptanalysis - quite similar to linear cryptanalysis - exploits the relationship between the difference of two inputs and the difference.
AES Background and Mathematics CSCI 5857: Encoding and Encryption.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
Block ciphers Structure of a multiround block cipher
CSCI 5857: Encoding and Encryption
DES Attacks and Triple DES
Multiple Encryption & DES  clearly a replacement for DES was needed Vulnerable to brute-force key search attacks Vulnerable to brute-force key search.
Introduction to Modern Symmetric-key Ciphers
TE/CS 536 Network Security Spring 2005 – Lecture 8 Security of symmetric algorithms.
Le Trong Ngoc Security Fundamentals (2) Encryption mechanisms 4/2011.
Lecture 23 Symmetric Encryption
Cracking the DES Encryption
Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.
Computer and Network Security Rabie A. Ramadan Lecture 3.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Data Encryption Standard (DES)
© Information Security Group, ICU1 Block Cipher- introduction  DES Description: Feistel, S-box Exhaustive Search, DC and LC Modes of Operation  AES Description:
Linear Cryptanalysis of DES
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
Block Cipher- introduction
1 The Data Encryption Standard. 2 Outline 4.1 Introduction 4.4 DES 4.5 Modes of Operation 4.6 Breaking DES 4.7 Meet-in-the-Middle Attacks.
David Evans CS551: Security and Privacy University of Virginia Computer Science Lecture 4: Dissin’ DES The design took.
Lecture 4 Overview. Data Encryption Standard Combination of substitution and transposition – Repeated for 16 cycles – Provides confusion and diffusion.
Linear Cryptanalysis of DES M. Matsui. 1.Linear Cryptanalysis Method for DES Cipher. EUROCRYPT 93, 1994.Linear Cryptanalysis Method for DES Cipher 2.The.
Cipher Transmission and Storage Modes Part 2: Stream Cipher Modes CSCI 5857: Encoding and Encryption.
Module :MA3036NI Symmetric Encryption -3 Lecture Week 4.
Block Ciphers and the Data Encryption Standard. Modern Block Ciphers  One of the most widely used types of cryptographic algorithms  Used in symmetric.
The Advanced Encryption Standard Part 1: Overview
Message Authentication Codes CSCI 5857: Encoding and Encryption.
Information and Network Security Lecture 2 Dr. Hadi AL Saadi.
1 CPCS425: Information Security (Topic 5) Topic 5  Symmetrical Cryptography  Understand the principles of modern symmetric (conventional) cryptography.
CS480 Cryptography and Information Security
6b. Practical Constructions of Symmetric-Key Primitives.
History and Background Part 3: Polyalphabetic Ciphers
مروري برالگوريتمهاي رمز متقارن(كليد پنهان)
Introduction to Modern Symmetric-key Ciphers
Chapter -2 Block Ciphers and the Data Encryption Standard
Presentation transcript:

DES Analysis and Attacks CSCI 5857: Encoding and Encryption

Outline Confusion and diffusion Attacks and weaknesses –Linear cryptanalysis attacks –Weak keys Exhaustive search attacks –Use of multiple keys –Meet in the middle attacks –Triple DES

Confusion and Diffusion Use of inputs to create round key assures each plaintext bit affects many ciphertext bits Use of shifts and permutations in key generation assures each key bit affects many ciphertext bits

Cryptanalysis Differential Cryptanalysis: Using similar plaintexts to look for patterns in how ciphertext generated Linear Cryptanalysis: Attempting to approximate entire cipher as one big set of linear equations –Finding solutions to set of linear equations well studied in engineering –Possible if all S-boxes linear –n bit key requires n known plaintexts to solve

Linear S-Boxes Linear n x m S-Box can be expressed as linear equation of form: c 1 = a 11 x 1  a 12 x 2  …  a 1n x n c 2 = a 21 x 1  a 22 x 2  …  a 2n x n … c m = a m1 x 1  a m2 x 2  …  a mn x n where x i is ith input bit c i is ith ciphertext bit a ij is either 0 or 1 Each cipherbit character is defined as the XOR of certain input bits

Linear S-Boxes Example of linear 3x3 S-Box: Corresponding linear equations c 1 = x 1  x 2 = 1  x 1  1  x 2  0  x 3 c 2 = x 1  x 2  x 3 = 1  x 1  1  x 2  1  x 3 c 3 = x 2  x 3 = 0  x 1  1  x 2  1  x

Linear Cryptanalysis Example Example: Above S-Box used after XOR stage

Linear Cryptanalysis Example S-Box input bit x i = p i  k i Resulting equations: c 1 = (p 1  k 1 )  (p 2  k 2 ) c 2 = (p 1  k 1 )  (p 2  k 2 )  (p 3  k 3 ) c 3 = (p 2  k 2 )  (p 3  k 3 ) Can now solve for key bits! k 1 = p 1  (c 1  c 2  c 3 ) k 2 = p 1  (c 1  c 2 ) k 3 = p 1  (c 2  c 3 )

Linear Cryptanalysis Possible if cipher uses only linear components –Permutation boxes linear by definition! Shifting from position i to position j is equation c j = 0  p 1  0  p 2  …  1  p i …  0  p n Therefore, S-Boxes must not be linear! –They are the only possible nonlinear component

Cryptanalysis Attacks on DES Linear Cryptanalysis –DES not designed for this attack (invented after DES released –However, DES S-Boxes not linear –2 43 known plaintexts needed to break DES using linear cryptanalysis

Weak Keys Keys that leave plaintext vulnerable in some way –Simple example: k = 26 in Caesar cipher Weak keys in DES produce same round key for multiple rounds –4 keys give same round key every round –8 keys give only 2 distinct round keys –48 keys give only 4 distinct round keys –Odds unlikely (8.8 x ), but should still check randomly generated keys

Exhaustive Search Attacks 56-bit key not computationally secure Parallel processing attacks –Computer with 1 million chips (1998)  key found in 112 hours –Network of 3500 computers (1977)  key found in 120 days 56-bit key not recommended by NIST! “all clones test different keys!”

Multiple Stage DES No way to use larger key in DES –Structure “hardwired” Only solution: multiple stage DES –Different keys used each stage –Output ciphertext of one stage  input plaintext of next stage

Multiple Stage DES Multiple stages with different keys greatly increases number of possible ciphertexts –(2 64 )! possible mappings from 2 64 possible input blocks to 2 64 possible output blocks –Only 2 56 possible keys (tiny fraction of the above) –Extremely unlikely that there exists K 3 such that E(E(P, K 1 ), K 2 ) = E(P, K 3 ) Possible ciphertexts After applying K 1 and K 2 After applying K 1

“Meet In The Middle” Attack Theoretically, two stages should be sufficient –Adversary would have to try all combinations of possible K 1 and K 2 –2 56 x 2 56 = possible combinations of keys Vulnerable to “meet in the middle” attack –Adversary has a known plaintext P and ciphertext C –Works forward encrypting P with all possible K 1 –Works backward decrypting C with all possible K 2 –Stores results and searches for matches

“Meet In The Middle” Attack “I’ll try all K1 and store the results in a table” Table of all possible M created by encrypting P “I’ll try all K2 and store the results in another table” Table of all possible M created by decrypting C “Now I’ll compare the two and look for any matches”

“Meet In The Middle” Attack M’s (and keys K 1 and K 2 that created them) kept in sorted tables –2 56 runs to create each table –56 x 2 56 comparisons to find matches –Match gives plausible values for K 1 and K 2 “Double DES” not computationally secure MK … …01 MK … …00 “These match” “So this might be K1 and K2”

Triple DES Need at least three stages of encryption –“Meet in middle” attack can only take place after at least two stages –Effectively the same as 112 bit key K1K1 K3K3 K2K2 “I can only attack here”

Triple DES With Two Keys Just use K1 twice (in first and last stage) Shorter keys (112 bits instead of 168 bits) Still secure (have to try all K 1 and K 2 to do meet in middle attack) “Still too hard to crack”

Efficiency of DES Fast if burned into hardware –Basic structure corresponds to wiring diagram Slow if executed as software –Basic structure doesn’t fit into registers –Much swapping between RAM/registers required 3DES even slower