Download presentation
Presentation is loading. Please wait.
Published byFerdinand Baldwin Modified over 8 years ago
1
1 Symmetric-Key Encryption CSE 5351: Introduction to Cryptography Reading assignment: Chapter 3 Read sections 3.1-3.2 first (skipping 3.2.2)
2
2
3
3
4
4
5
5
6
6
7
7
8
8
9
9
10
10
11
11
12
12
13
13
14
Pseudorandom Generators and Stream Ciphers Encryption schemes using pseudorandom generators K&L: Section 3.3 14
15
15
16
16
17
17
18
18
19
19
20
20
21
21
22
22
23
23
24
24
25
25
26
26
27
27
28
28
29
29
30
30
31
31
32
32
33
33
34
34
35
35
36
36
37
37
38
38
39
Security of RC4 RC4 is not a truly pseudorandom generator. The key stream generated by RC4 is biased. –The second byte is biased toward zero with high probability. –The first few bytes are strongly non-random and leak information about the input key. Defense: discard the initial n bytes of the keystream. –Called “RC4-drop[n-bytes]”. –Recommended values for n = 256, 768, or 3072 bytes. Efforts are under way (e.g. the eSTREAM project) to develop more secure stream ciphers. 39
40
The Use of RC4 in WEP WEP is an RC4-based protocol for encrypting data transmitted over an IEEE 802.11 wireless LAN. WEP requires each packet to be encrypted with a separate RC4 key. The RC4 key for each packet is a concatenation of a 40-bit or 104-bit long-term key and a random 24-bit R. 40 l RC4 key: Long-term key (40 or 104 bits) R (24) l Header R Message CRC encrypted 802.11 Frame:
41
WEP is not secure Mainly because of its way of constructing the key Can be cracked in a minute http://eprint.iacr.org/2007/120.pdf 41
42
Stronger Security Notions K&L: Section 3.4 42
43
43
44
44
45
45
46
46
47
47
48
48
49
49
50
50
51
51
52
52
53
Constructing CPA-Secure Encryption Schemes K&L: Section 3.5 53
54
54
55
55
56
56
57
57
58
58
59
59
60
60
61
61
62
62
63
63
64
64
65
65
66
66
67
67
68
Modes of Operations K&L: Section 3.6.2 68
69
69
70
70
71
71
72
Counter Mode (CTR) 72
73
73
74
Output feedback 74
75
75
76
How is Cipher Feedback (CFB) different from OFB? 76
77
77
78
Cipher block chaining (CBC) 78
79
Chained CBC 79
80
80
81
81
82
82
83
Electronic Code Book (ECB) 83
84
84
85
Chosen-Ciphertext Attacks K&L Section 3.7 85
86
86
87
87
88
88
89
89
90
90
91
Padding-Oracle Attack: a concrete example of (partial) chosen-ciphertext attacks K&L Section 3.7.2 91
92
92
93
93
94
94
95
95
96
96
97
97
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.