Download presentation
Presentation is loading. Please wait.
Published byArthur Ellis Modified over 8 years ago
1
1 CPCS425: Information Security (Topic 5) Topic 5 Symmetrical Cryptography Understand the principles of modern symmetric (conventional) cryptography
2
2 CPCS425: Information Security (Topic 5) Overview Block Cipher Definition S-DES (to help you to understand DES) The DES (Data Encryption Standard) Triple DES (or 3DES) An Example Use of DES The AES (Advanced Encryption Standard) (Other) Symmetrical Cryptosystems Summary Stream Ciphers vs Block Ciphers Conclusions source: chapters 3 of Cryptography and Network Security
3
3 CPCS425: Information Security (Topic 5) Block Cipher Definition Block ciphers operate on blocks of plaintext and ciphertext. The block size n should be reasonably large, e.g. n 64 bits, to prevent dictionary attacks. The encryption function is usually complex: C=E K (M). We must have a decryption function which satisfies: M=D K (C). Most modern cryptosystems are block ciphers. We pick DES to illustrate how symmetrical cipher works. S-DES next will help you to understand the DES algorithm.
4
4 CPCS425: Information Security (Topic 5) Simplified DES (S-DES) (1/5) - The whole picture
5
5 CPCS425: Information Security (Topic 5) S-DES (2/5): The whole picture The 10-bit key K undergoes a serial of operations consisted of permutation (P), left shift (LS) and permutation/contraction (P8) to produce two 8-bit sub-keys, k 1 and k 2. The two sub-keys are used by the complex function F in two rounds. The complex function F consists of Expansion/Permutation (E/P), XOR, Substitution Box (S-Box), and Permutation (P4).
6
6 CPCS425: Information Security (Topic 5) S-DES (3/5): Major encryption functions 1st 4th - row 2nd 3rd - col
7
7 CPCS425: Information Security (Topic 5) S-DES (4/5): Proof IP -1 is the inverse of IP IP: 2 6 3 1 4 8 5 7 A 1 A 2 A 3 A 4 A 5 A 6 A 7 A 8 A 2 A 6 A 3 A 1 A 4 A 8 A 5 A 7 B 1 B 2 B 3 B 4 B 5 B 6 B 7 B 8 IP -1 : 4 1 3 5 7 2 8 6 B 4 B 1 B 3 B 5 B 7 B 2 B 8 B 6 A Question for you: Can you tell the difference between E (encryption algorithm) and D (decryption algorithm) in S-DES?
8
8 CPCS425: Information Security (Topic 5) S-DES (5/5): S-DES vs DES To summarise, the encryption can be described as IP -1 o f k2 o SW o f k1 o IP Relationship to DES DES operates on 64-bits blocks of input, has 16 rounds of permutation and substitution operations, and uses a 56-bit key (K). The encryption can be described as: IP -1 o f k16 o SW o f k15 o SW o … o SW o f k1 o IP
9
9 CPCS425: Information Security (Topic 5) The DES (1/7) - Some facts (1/2) It is a symmetric cryptography - encryption/decryption keys are the same. It is essentially a block cipher - block length is 64 bits. Length of key K is 56 bits (56-bit key is widely regarded as insufficient). The subkeys k 1, k 2 …, k 16 are each 48-bits, generated from key K. The DES decryption algorithm is the same as the encryption one; the only difference is that the keys for each round must be used in the reverse order. The algorithm public, but the design principles are kept secret.
10
10 CPCS425: Information Security (Topic 5) The DES (2/7): Some facts (2/2) It is mainly used for encryption of message contents - confidentiality. It is more efficient than asymmetric cryptosystems. No serious flaws or exploitable vulnerabilities have been reported in the design of DES. But its weakness is 56-bit key - which is good enough to deter casual DES key browsing, but not for a dedicated adversary who is after a specific DES ciphertext of significant interest. DES is a de facto international standard for banking security.
11
11 CPCS425: Information Security (Topic 5) The DES (3/7) - Modes of operation Any block ciphers can be used in a variety of operational modes. Understanding them and choosing the right one for the job is an important factor in using a block cipher securely. Here we use DES as an example block cipher to illustrate two (mostly commonly used) modes of operation in block ciphers: ECB (electronic codebook) mode CBC (cipher block chaining) mode This modes of operation are applicable to all block ciphers! – e.g. RSA.
12
12 CPCS425: Information Security (Topic 5) The DES (4/7) - Electronic codebook (ECB) mode
13
13 CPCS425: Information Security (Topic 5) The DES (5/7) - Cipher block chaining (CBC) mode (1/2)
14
14 CPCS425: Information Security (Topic 5) The DES (6/7) - Cipher block chaining (CBC) mode (2/2) This mode is effective at disguising any patterns in the plaintext. CBC mode is used in most commercial applications that encrypt more than one blocks.
15
15 CPCS425: Information Security (Topic 5) The DES (7/7) - Strength Built-in trapdoors might be placed in secret boxes. Use of a 56-bit key that can be broken on average in 2 56 (i.e. 7.2 * 10 16 ) trials. trials/second time required 1 10 9 years 10 3 10 6 years 10 6 10 3 years 10 9 1 year 10 12 10 hours a DES chip does 1 million encryptions per second. a million chips in parallel do 10 12 trials per second. estimated cost is in 10s of millions of US dollars.
16
16 CPCS425: Information Security (Topic 5) Triple-DES What is triple-DES? To get round problems of short DES key, triple-DES is increasingly common. This involves using two DES keys (K 1, K 2 ), encryption algorithm E, and decryption algorithm D: C=E K1 (D K2 (E K1 (M))) The use of D here does not have any security implication, it just makes triple-DES backward compatible if K 1 =K 2. Properties More secure than DES, as effective key length now is 112- bits; But it is slower than DES.
17
17 CPCS425: Information Security (Topic 5) An example use of DES
18
18 CPCS425: Information Security (Topic 5) The AES (1/2) - Background In the near term, triple DES is strong enough. But an improvement in processor speeds and number of parallel computers threatens it, too. In 1997, a call was issued by NIST for a new encryption system. The standard aims Security - bigger key sizes. Cost - fast in software too. Algorithm and implementation characteristics - fast & easy. The finalist candidates were MARS, RC6, Rijndael, Serpent, and Twofish. Rijndael was selected as it offered the best combination of security, performance, ease of implementation and flexibility. In 2001, Rijndael was formally nominated as the AES standard.
19
19 CPCS425: Information Security (Topic 5) The AES (2/2) - the Details AES is a block cipher, block size is 128 bits (others are allowed but not recognised by the standard). The key length can be 128, 192, or 256 bits. It is a substitution-permutation cipher involve n rounds: for key length=128 bits, n=9; for key length =192 bits, n=11; and for key length =256 bits, n=13. It has been subjected to extensive cryptanalysis, but no significant problems have been found to date. For now, the AES seems a solid replacement for the DES.
20
20 CPCS425: Information Security (Topic 5) (Other) Conventional Cryptosystems (2/2) - Summary
21
21 CPCS425: Information Security (Topic 5) Stream Ciphers vs Block Ciphers
22
22 CPCS425: Information Security (Topic 5) Conclusions (1/2) Modern symmetric ciphers come in two variants: block ciphers and stream ciphers. The mostly used block cipher is used to be DES. A comparatively recent block cipher is the AES, called Rijndael. Both DES and AES obtain their security by repeated application of simple rounds consisting of substitution, permutation, shift and key addition.
23
23 CPCS425: Information Security (Topic 5) Conclusions (2/2) To use a block cipher one needs to also specify a mode of operation: the simplest mode is ECB mode, which has problems associated with it: same plaintext will always generate same ciphertext; suffers from possible insertion/deletion attacks. Hence it is common to use a more advanced mode such as CBC mode. Symmetrical cryptography is reasonably secure, more efficient, and more suitable for encryption of large messages - provide message confidentiality. But it has key exchange problem and does not support non- repudiation.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.