Download presentation
Presentation is loading. Please wait.
Published byEthel Shanon Barrett Modified over 8 years ago
1
@Yuan Xue (yuan.xue@vanderbilt.edu) Announcement Project Release Team forming Homework 1 will be released next Tuesday
2
@Yuan Xue (yuan.xue@vanderbilt.edu) Data Encryption Standard (DES)
3
@Yuan Xue (yuan.xue@vanderbilt.edu) DES Overview Data Encryption Standard (DES) Most widely used encryption scheme Adopted as Federal Information Processing Standard (FIPS) for the United States in 1976Federal Information Processing StandardUnited States 64-bit data block 56-bit key Based on Feistel Network The decryption follows the same process as the encryption. Now considered insecure for many applications Replaced by AES
4
@Yuan Xue (yuan.xue@vanderbilt.edu) DES Structure
5
@Yuan Xue (yuan.xue@vanderbilt.edu) Initial Permutation and Inverse Initial Permutation IP and FP have almost no cryptographic significance, included in order to facilitate loading blocks in and out of mid-1970s hardware, as well as to make DES run slower in software.
6
@Yuan Xue (yuan.xue@vanderbilt.edu) IP
7
@Yuan Xue (yuan.xue@vanderbilt.edu) Single Round
8
@Yuan Xue (yuan.xue@vanderbilt.edu)
9
Expansion (E) and Permutation (P)
10
@Yuan Xue (yuan.xue@vanderbilt.edu) S-Box
11
@Yuan Xue (yuan.xue@vanderbilt.edu) S-box definition
12
@Yuan Xue (yuan.xue@vanderbilt.edu) The S-boxes S i : {0,1} 6 {0,1} 4 Credit: Dan Boneh, “Introduction to Cryptography”
13
@Yuan Xue (yuan.xue@vanderbilt.edu) Example: a bad S-box choice Suppose: S i (x 1, x 2, …, x 6 ) = ( x 2 x 3, x 1 x 4 x 5, x 1 x 6, x 2 x 3 x 6 ) or written equivalently: S i (x) = A i ⋅ x (mod 2) We say that S i is a linear function. 0 1 1 0 0 0 1 0 0 1 1 0 1 0 0 0 0 1 0 1 1 0 0 1 0 1 1 0 0 0 1 0 0 1 1 0 1 0 0 0 0 1 0 1 1 0 0 1 x1x2x3x4x5x6x1x2x3x4x5x6 x1x2x3x4x5x6x1x2x3x4x5x6. = x2x3x1x4x5x1x6x2x3x6x2x3x1x4x5x1x6x2x3x6 x2x3x1x4x5x1x6x2x3x6x2x3x1x4x5x1x6x2x3x6 Credit: Dan Boneh, “Introduction to Cryptography”
14
@Yuan Xue (yuan.xue@vanderbilt.edu) Example: a bad S-box choice Then entire DES cipher would be linear: ∃ fixed binary matrix B s.t. But then: DES(k,m 1 ) DES(k,m 2 ) DES(k,m 3 ) B B m k 1 k 2 k 16 m k 1 k 2 k 16. = c c 832 64 ⋮ DES(k,m) = = DES(k, m 1 m 2 m 3 ) B B B = B m1km1k m1km1k m2km2k m2km2k m3km3k m3km3k m1m2m3kkkm1m2m3kkk m1m2m3kkkm1m2m3kkk (mod 2) Credit: Dan Boneh, “Introduction to Cryptography”
15
@Yuan Xue (yuan.xue@vanderbilt.edu) Choosing the S-boxes and P-box Choosing the S-boxes and P-box at random would result in an insecure block cipher (key recovery after ≈2 24 outputs) [BS’89] Several rules used in choice of S and P boxes: No output bit should be close to a linear func. of the input bits S-boxes are 4-to-1 maps ⋮ Credit: Dan Boneh, “Introduction to Cryptography”
16
@Yuan Xue (yuan.xue@vanderbilt.edu) Sub-key Generation
17
@Yuan Xue (yuan.xue@vanderbilt.edu) Permutation Choice Note: Only 56 bits Are used
18
@Yuan Xue (yuan.xue@vanderbilt.edu) DES Security DES is replaced by AES Concerns Key size Nature of the algorithm Attacks Brute-force attack Linear cryptanalysis Differential cryptanalysis Side channel attacks Timing attack Energy analysis
19
@Yuan Xue (yuan.xue@vanderbilt.edu) Other Symmetric Ciphers Block Ciphers 3DES AES: Key sizes: 128, 192, 256 bits Block size: 128 bits Blowfish IDEA Stream Ciphers RC4
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.