Dr. Lo’ai Tawalbeh summer 2007 Chapter 6: Contemporary Symmetric Ciphers Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus INCS.

Slides:



Advertisements
Similar presentations
“Advanced Encryption Standard” & “Modes of Operation”
Advertisements

Modern Symmetric-Key Ciphers
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
Cryptography and Network Security Chapter 5 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 5
Cryptography and Network Security Chapter 3
Chapter 3 Block Ciphers and the Data Encryption Standard
Cryptography and Network Security Chapter 7 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 6. Chapter 6 – Block Cipher Operation Many savages at the present day regard their names as vital parts of themselves,
Cryptography1 CPSC 3730 Cryptography Chapter 6 Triple DES, Block Cipher Modes of Operation.
Cryptography and Network Security
1 Pertemuan 07 Enkripsi Simetrik Kontemporer Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
AES clear a replacement for DES was needed
Cryptography and Network Security (AES) Dr. Monther Aldwairi New York Institute of Technology- Amman Campus 10/18/2009 INCS 741: Cryptography 10/18/20091Dr.
Chap. 6: Contemporary Symmetric Ciphers Jen-Chang Liu, 2004 Adapted from Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 5. Chapter 5 –Advanced Encryption Standard "It seems very simple." "It is very simple. But if you don't know.
Cryptography and Network Security Chapter 5 Fourth Edition by William Stallings.
Cryptography and Network Security Chapter 6
Lecture 23 Symmetric Encryption
Dr. Lo’ai Tawalbeh 2007 Chapter 5: Advanced Encryption Standard (AES) Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus.
Chapter 2 (D) – Contemporary Symmetric Ciphers "I am fairly familiar with all the forms of secret writings, and am myself the author of a trifling monograph.
Chapter 3 – Block Ciphers and the Data Encryption Standard
Data Encryption Standard (DES). Symmetric Cryptography  C = E(P,K)  P = D(C,K)  Requirements  Given C, the only way to obtain P should be with  the.
The Digital Encryption Standard CSCI 5857: Encoding and Encryption.
Cryptography and Network Security Chapter 7 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Fourth Edition by William Stallings (Based on Lecture slides by Lawrie Brown) 1.
Chapter 5 Advanced Encryption Standard. Origins clear a replacement for DES was needed –have theoretical attacks that can break it –have demonstrated.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Chapter 5 –Advanced Encryption Standard "It seems very simple." "It is very simple. But if you don't know what the key is it's virtually indecipherable."
Cryptography and Network Security Chapter 7 Fifth Edition by William Stallings.
Applied Cryptography Example: AES. Advanced Encryption Standard "It seems very simple." "It is very simple. But if you don't know what the key is it's.
Cryptography and Network Security Chapter 6. Multiple Encryption & DES  clear a replacement for DES was needed theoretical attacks that can break it.
1 Chapter 3 Ciphers Mechanism that decides the process of encryption/decryption Stream Cipher: Bit-by-bit encryption / decryption Block Cipher: Block-by-block.
9/17/15UB Fall 2015 CSE565: S. Upadhyaya Lec 6.1 CSE565: Computer Security Lecture 6 Advanced Encryption Standard Shambhu Upadhyaya Computer Science &
Advance Encryption Standard. Topics  Origin of AES  Basic AES  Inside Algorithm  Final Notes.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Network Security Lecture 17 Presented by: Dr. Munam Ali Shah.
TE/CS 536 Network Security Spring 2006 – Lectures 6&7 Secret Key Cryptography.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Stream Cipher July 2011.
Scott CH Huang COM 5336 Cryptography Lecture 2 Symmetric Cryptography Scott CH Huang COM 5336 Cryptography Lecture 2.
Network Security Essentials Chapter 2: Symmetric Encryption Fourth Edition by William Stallings (Based on Lecture slides by Lawrie Brown)
3DES and Block Cipher Modes of Operation CSE 651: Introduction to Network Security.
Multiple Encryption & DES  clearly a replacement for DES was needed Vulnerable to brute-force key search attacks Vulnerable to brute-force key search.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown (Changed by Somesh Jha)
Cryptography and Network Security Contemporary Symmetric Ciphers.
Symmetric Encryption IT 352 : Lecture 2- part2 Najwa AlGhamdi, MSc – 2012 /1433.
Cryptography and Network Security Chapter 6 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Presented by: Dr. Munam Ali Shah
Lecture 23 Symmetric Encryption
Network Security Essentials Chapter 2 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Network Security Essentials Chapter 2 Fourth Edition by William Stallings (Based on Lecture slides by Lawrie Brown)
Fifth Edition by William Stallings
Advanced Encryption Standard Dr. Shengli Liu Tel: (O) Cryptography and Information Security Lab. Dept. of Computer.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
Applied Cryptography (Symmetric) Part I. Many savages at the present day regard their names as vital parts of themselves, and therefore take great pains.
Conventional Encryption Chapter 4. Multiple DES Advantage of extra stages –Each stage gives 56 more bits of key length –Double DES subject to meet-in-the-middle.
Fall 2002CS 395: Computer Security1 Chapters 5-6: Contemporary Symmetric Ciphers Triple DES Blowfish AES.
Module :MA3036NI Symmetric Encryption -3 Lecture Week 4.
University of Malawi, Chancellor College
Block Ciphers and the Data Encryption Standard. Modern Block Ciphers  One of the most widely used types of cryptographic algorithms  Used in symmetric.
1 CPCS425: Information Security (Topic 5) Topic 5  Symmetrical Cryptography  Understand the principles of modern symmetric (conventional) cryptography.
Lecture 4 Data Encryption Standard (DES) Dr. Nermin Hamza
Provides Confidentiality
Chapter -2 Block Ciphers and the Data Encryption Standard
BlowFish Algorithm.
Chapter -4 STREAM CIPHERS
Presentation transcript:

Dr. Lo’ai Tawalbeh summer 2007 Chapter 6: Contemporary Symmetric Ciphers Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus INCS 741: CRYPTOGRAPHY

Dr. Lo’ai Tawalbeh summer 2007 Why Triple-DES? why not Double-DES? NOT same as some other single-DES use, but have meet-in-the-middle attack works whenever use a cipher twice since X = E K1 [P] = D K2 [C] attack by encrypting P with all keys and store then decrypt C with keys and match X value can show takes O(2 56 ) steps

Dr. Lo’ai Tawalbeh summer 2007 Triple-DES with Two-Keys hence must use 3 encryptions would seem to need 3 distinct keys but can use 2 keys with E-D-E sequence C = E K1 [D K2 [E K1 [P]]] nb encrypt & decrypt equivalent in security if K1=K2 then can work with single DES no current known practical attacks

Dr. Lo’ai Tawalbeh summer 2007 Triple-DES with Three-Keys although are no practical attacks on two-key Triple-DES have some indications can use Triple-DES with Three-Keys to avoid even these C = E K3 [D K2 [E K1 [P]]] has been adopted by some Internet applications, eg PGP, S/MIME

Dr. Lo’ai Tawalbeh summer 2007 Blowfish a symmetric block cipher designed by Bruce Schneier in 1993/94 characteristics fast implementation on 32-bit CPUs compact in use of memory simple structure for analysis/implementation variable security by varying key size has been implemented in various products

Dr. Lo’ai Tawalbeh summer 2007 Blowfish Key Schedule uses a 32 to 448 bit key, 32-bit words stored in K-array K j, j from 1 to 14 used to generate bit subkeys stored in P array, P 1 …. P 18 four 8x32 S-boxes stored in S i,j, each with bit entries Subkeys and S-Boxes Generation: 1- initialize P-array and then 4 S-boxes in order using the fractional part of pi P 1 ( left most 32-bit), and so on,,, S 4, XOR P-array with key-Array (32-bit blocks) and reuse as needed: assume we have up to k 10 then P 10 XOR K 10,, P 11 XOR K 1 … P 18 XOR K 8

Dr. Lo’ai Tawalbeh summer 2007 Blowfish: SubKey and S-Boxes -cont. 3- Encrypt 64-bit block of zeros, and use the result to update P 1 and P encrypting output form previous step using current P & S and replace P 3 and P 4. Then encrypting current output and use it to update successive pairs of P. 5- After updating all P’s (last :P 17 P 18 ), start updating S values using the encrypted output from previous step. requires 521 encryptions, hence slow in re-keying Not suitable for limited-memory applications.

Dr. Lo’ai Tawalbeh summer 2007 Blowfish Encryption uses two main operations: addition modulo 2 32, and XOR data is divided into two 32-bit halves L 0 & R 0 for i = 1 to 16 do R i = L i-1 XOR P i ; L i = F[R i ] XOR R i-1 ; L 17 = R 16 XOR P 18 ; R 17 = L 16 XOR P 17 ; where F[a,b,c,d] = ((S 1,a + S 2,b ) XOR S 3,c ) + S 4,d

Dr. Lo’ai Tawalbeh summer 2007 Blowfish Encryption/Decryption

Dr. Lo’ai Tawalbeh summer 2007 Blowfish Encryption

Dr. Lo’ai Tawalbeh summer 2007 Discussion key dependent S-boxes and subkeys, generated using cipher itself, makes analysis very difficult changing both halves in each round increases security provided key is large enough, brute-force key search is not practical, especially given the high key schedule cost

Dr. Lo’ai Tawalbeh summer 2007 RC5 can vary key size / data size / variable rounds very clean and simple design easy implementation on various CPUs yet still regarded as secure

Dr. Lo’ai Tawalbeh summer 2007 RC5 Ciphers RC5 is a family of ciphers RC5-w/r/b w = word size in bits (16/32/64). Encrypts 2w data blocks r = number of rounds (0..255) b = number of bytes in the key (0..255) nominal version is RC5-32/12/16 ie 32-bit words so encrypts 64-bit data blocks using 12 rounds with 16 bytes (128-bit) secret key

Dr. Lo’ai Tawalbeh summer 2007 RC5 Key Expansion RC5 uses t=2r+2 subkey words (w-bits) subkeys are stored in array S[i], i=0..t-1 then the key schedule consists of initializing S to a fixed pseudorandom value, based on constants e and phi the byte key is copied into a c-words array L a mixing operation then combines L and S to form the final S array

Dr. Lo’ai Tawalbeh summer 2007 RC5 Key Expansion

Dr. Lo’ai Tawalbeh summer 2007 RC5 Encryption Three main operations: + mod 2 w, XOR, circular left shift <<<, and there inverses used. split input into two halves A & B (w-bits each) L 0 = A + S[0]; R 0 = B + S[1]; for i = 1 to r do L i = (( L i-1 XOR R i-1 ) <<< R i-1 ) + S[2 x i]; R i = (( R i-1 XOR L i ) <<< L i ) + S[2 x i + 1]; each round is like 2 DES rounds note rotation is main source of non-linearity need reasonable number of rounds (eg 12-16)

Dr. Lo’ai Tawalbeh summer 2007 RC5 Encryption

Dr. Lo’ai Tawalbeh summer 2007 RC5 Modes 4 modes used by RC5: RC5 Block Cipher, is ECB mode RC5-CBC, is CBC mode RC5-CBC-PAD, is CBC with padding by bytes with value being the number of padded bytes RC5-CTS, a variant of CBC which is the same size as the original message, uses ciphertext stealing to keep size same as original

Dr. Lo’ai Tawalbeh summer 2007 RC5 Modes-Ciphertext Stealing (CTS) mode

Dr. Lo’ai Tawalbeh summer 2007 Block Cipher Characteristics features seen in modern block ciphers are: variable key length / block size / rounds mixed operators, data/key dependent rotation key dependent S-boxes more complex key scheduling operation of full data in each round varying non-linear functions

Dr. Lo’ai Tawalbeh summer 2007 Stream Ciphers process the message bit by bit (as a stream) typically have a (pseudo) random stream key combined (XOR) with plaintext bit by bit randomness of stream key completely destroys any statistical properties in the message C i = M i XOR StreamKey i what could be simpler!!!! but must never reuse stream key otherwise can remove effect and recover messages

Dr. Lo’ai Tawalbeh summer 2007 Stream Cipher Properties some design considerations are: long period with no repetitions statistically random depends on large enough key confusion diffusion use of highly non-linear boolean functions

Dr. Lo’ai Tawalbeh summer 2007 RC4 Designed in 1987 as a proprietary cipher owned by RSA simple but effective, widely used: (SSL/TLS standards) variable key size (1 to 256 bytes), byte-oriented stream cipher key forms random permutation of all 8-bit values uses that permutation to scramble input info processed a byte at a time fast Software implementations.

Dr. Lo’ai Tawalbeh summer 2007 RC4 Key Schedule starts with an array S of numbers: S[0]=0, …S[255] =255 Also initialize T with the key. T[i]= K[ i mod keylength] use key to well and truly shuffle S forms internal state of the cipher given a key k of length l bytes for i = 0 to 255 do S[i] = i j = 0 for i = 0 to 255 do j = (j + S[i] + k[i mod l]) (mod 256) swap (S[i], S[j])

Dr. Lo’ai Tawalbeh summer 2007 RC4 Encryption encryption continues shuffling array values sum of shuffled pair selects "stream key" value XOR with next byte of message to en/decrypt i = j = 0 for each message byte M i i = (i + 1) (mod 256) j = (j + S[i]) (mod 256) swap(S[i], S[j]) t = (S[i] + S[j]) (mod 256) C i = M i XOR S[t]

Dr. Lo’ai Tawalbeh summer 2007 RC4 Security claimed secure against known attacks have some analyses, none practical result is very non-linear since RC4 is a stream cipher, must never reuse a key

Dr. Lo’ai Tawalbeh summer 2007 Summary have considered: some other modern symmetric block ciphers Triple-DES Blowfish RC5 briefly introduced stream ciphers RC4