Application of cube attack to block and stream ciphers
|
|
|
- Debra Burns
- 10 years ago
- Views:
Transcription
1 Application of cube attack to block and stream ciphers Janusz Szmidt joint work with Piotr Mroczkowski Military University of Technology Military Telecommunication Institute Poland 23 czerwca 2009
2 1. Papers ItaiDinurandAdiShamir,CubeAttackson Tweakable Black Box Polynomials, Eurocrypt, S.S.BediandR.Pillai,CubeattacksonTrivium, IACR Cryptology eprint Archive, 2009/15. J-P. Aumasson, W. Meier, I. Dinur, A. Shamir, Cube testers and key recovery attacks on reduced round MD6 and Trivium, Fast Software Encryption, I. Dinur, A. Shamir, Side channel cube attacks on block ciphers, IACR Cryptology eprint Archive, 2009/127. J. Lathrop, Cube Attacks on Cryptographic Hash Functions, Master s Thesis, Rochester Institte of Technology, 2009.
3 Paper Miachael Vielhaber, Breaking One.Fivium by AIDA an Algebraic IV Differential Attack, IACR Cryptology eprint Archive, 2007.
4 2. The structure of attack Let us consider cryptosystem described by the polynomial: p(v 1,...,v m,x 1,...,x n ) dependingonmpublicvariablesv 1,...,v m (theinitial valueorplaintext)andonnsecretvariablesx 1,...,x n (thekey). The value of the polynomial represents the ciphertext bit. In general, the polynomial p is not explicitelly known; it canbeablackbox. We will consider the known plaintext attack, where at the preprocessing stage the attacker has also an access to secret variables(initial values or keys).
5 3. The structure of attack, cont. 1 The preprocessing stage. The attacker can change the valuesofpublicandsecretvariables.thetaskistoobtain a system of linear equations on secret variables. 2 Thestageonlineoftheattack.Thekeyissecret now. The attacker can change the values of public variables. He adds the output bits, where the inputs run over some multi-dimennsional cubes. The task is to obtain the right hand sides of linear equations. The system of linearequationcanbesolvedgivingsomebitsofthekey.
6 4. Mathematical background Foramomentweshallnotdistinguishthesecretand public variables. Letpbeapolynomialofnvariablesx 1,...,x n overthe fieldgf(2). ForasubsetofindexesI ={i 1,...,i k } {1,...,n}let ustakeamonomial t I =x i1...x ik Then we have a decomposition p(x 1,...,x n ) =t I p S(I) +q(x 1,...,x n ) wherethepolynomialp S(I) doesnotdependonthe variablesx i1,...,x ik.
7 5.Example1 Letusconsiderapolynomialpofdegree3dependingon 5 variables: p(x 1,x 2,x 3,x 4,x 5 ) =x 1 x 2 x 3 +x 1 x 2 x 4 +x 2 x 4 x 5 + x 1 x 2 +x 3 x 5 +x 2 +x 5 =1 LetI ={1.2}beachosensubsetofindexes. Then the polynomial p can be decomposed as: p(x 1,x 2,x 3,x 4,x 5 ) =x 1 x 2 (x 3 +x 4 +1)+ (x 2 x 4 x 5 +x 3 x 5 +x 2 +x 5 +1)
8 6. Example 1, cont. Using the introduced above notation: t I =x 1 x 2, p S(I) =x 3 +x 4 +1, q(x 1,x 2,x 3,x 4,x 5 ) =x 2 x 4 x 5 +x 3 x 5 +x 2 +x 5 +1
9 7. Definition 1 Themaxtermofthepolynomialpwecallthemonomialt I, such that deg(p S(I) ) =1, itmeansthatthepolynomialp S(I) correspondingtothesubset ofindexesiisalinearone,whichisnotaconstant.
10 8. Summation over cubes LetI ={i 1,...,i k } {1,...,n}beafixedsubsetofk indexes. ThesetIdefinesthek-dimensionalbooleancubeC I, whereontheplaceofeachoftheindexesweput0or1. Agivenvectorv C I definesthederivedpolynomoalp v dependingonn kvariables,whereinthebasic polynomoal p we put the values corresponding to the vectorv. SummingoverallvectorsinthecubeC I weobtainthe polynomial: p I = v C I p v
11 9.Theorem1 LetpbeapolynomialoverthefieldGF(2)andI {1,...,n} theindexsubset.thenwehave: p I =p S(I) mod2
12 10. Example 2 Let us consider a polynomial: p(v 1,v 2,v 3,x 1,x 2,x 3 ) =v 1 v 2 v 3 +v 1 v 2 x 1 +v 1 v 3 x 1 +v 2 v 3 x 1 + v 1 v 2 x 3 +v 1 v 3 x 2 +v 2 v 3 x 2 +v 1 v 3 x 3 +v 1 x 1 x 3 +v 3 x 2 x 3 +x 1 x 2 x 3 + v 1 v 2 +v 1 x 3 +v 3 x 1 +x 1 x 2 +x 2 x 3 +x 2 +v 1 +v 3 +1 ofdegreed=3dependingonpublicvariablesv 1,v 2,v 3 andsecretvariablesx 1,x 2,x 3. Substituting on public variables the values 0/1 we get the eight derived polynomials.
13 11. Example 2, cont. p(0,0,0,x 1,x 2,x 3 ) =x 1 x 2 x 3 +x 1 x 2 +x 2 x 3 +x 2 +1 p(0,0,1,x 1,x 2,x 3 ) =x 1 x 2 x 3 +x 1 x 2 +x 1 +x 2 p(0,1,0,x 1,x 2,x 3 ) =x 1 x 2 x 3 +x 1 x 2 +x 2 x 3 +x 2 +1 p(0,1,1,x 1,x 2,x 3 ) =x 1 x 2 x 3 +x 1 x 2 p(1,0,0,x 1,x 2,x 3 ) =x 1 x 2 x 3 +x 1 x 2 +x 1 x 3 +x 2 x 3 +x 2 +x 3 p(1,0,1,x 1,x 2,x 3 ) =x 1 x 2 x 3 +x 1 x 2 +x 1 x 3 +1 p(1,1,0,x 1,x 2,x 3 ) =x 1 x 2 x 3 +x 1 x 2 +x 1 x 3 +x 2 x 3 +x 1 +x 2 +1 p(1,1,1,x 1,x 2,x 3 ) =x 1 x 2 x 3 +x 1 x 2 +x 1 x 3 +x 2 +x 3 +1
14 12. Example 2, cont. Summingthefourderivedpolynomialswithv 1 =0weget x 1 +x 2, Summingthefourderivedpolynomialswithv 2 =0weget x 1 +x 2 +x 3, Summingthefourderivedpolynomialswithv 3 =0weget x 1 +x The obtained expressions lead to a system of linear equationsusedinthestageonlineoftheattack.
15 13. The preprocessing stage 1 Thefirsttaskistofixdimensionofthecubeandthe public variables over which we will sum; they are called the tweakable variables, and the other public variables are puttozero.inthecaseweknowthedegreedofthe basicpolynomial,weputthecubedimensiontod 1. 2 Wedothesummationoverafixedcubeforseveralvalues of secret variables and collect the obtained values. 3 Wedothelineartestsfortheobtainedfunctionofsecret variablesandstoreitwhenitislinear: f (x x ) =f (x) f(x ) f(0), wherex= (x 1,...,x n )aresecretvariables(thekey).
16 14. The preprocessing stage, cont. Thenexttaskistocalculatetheexactform(the coefficients) of the obtained linear function of secret variables. Thefreetermofthelinearfunctionweobtanputtingits all argument equal zero. Thecoefficientofthevariablex i isequal1ifandonlyif thechangeofthisvariableimpliesthechangeofvaluesof the function. Thecoefficientofthevariablex i isequal0ifandonlyif thechangeofthisvariabledoesnotimplythechangeof values of the function.
17 15. The preprocessing stage, cont. Thetaskofthisstageofattackistocollectpossible many independent linear terms- they constitute the system of linear equations on secret variables. Thissystemoflinearequationswillbeusedintheonline stage of attack. The preprocessing stage is done only once in cryptanalysis of the algorithm.
18 16.Thestageonlineofattack Now an attacker has the access only to public variables (thr plaintext for block ciphers, the initial values for stream ciphers), which he can change and calculates the corresponding bits of the ciphertext under the unknown value of secret variables. Thetaskofthisstageofattackistofindsomebitsof secret key with complexity, which would be lower than the exhuastive search in the brute force attack. The attacker uses the derived system of linear equations for secret variables(the unknown bits of the key), where therighthandsidesoftheseequationsarethevaluesof bits of ciphertext obtained after summation over the same cubesasinthepreprocessingstage,butnowthekeyis not known.
19 17.Thestageonlineofattack,cont. The cube attach is applicable to symmetric ciphers for which the polynomials descibing the system have relatively low degree. Thenonecaneventuallyfindsomebitsofunknownkey. Theremainingbitsofthekeymaybefoundbybrute force search. After successful preprocwssing stage, the stage on line of attack can be done many times for different unknown keys The cube attack is applicable, in general, to cryptosystems without knowing their inner structure. The attacker must have the possibility to realize the preprocessingstageandintheonlinestageanaccessto the implementation of the algorithm(to perform the summation over cubes under unknown key).
20 18.CTC-CourtoisToyCipher Specification CTC was designed by Nicolais Courtois to apply and test the methods of algebraic analysis. ItisaSPNnetworkwhichisscalableinthenumberof rounds, the block and key size. Each round performs the same operation on the input data,exceptthatadifferentroundkeyisaddedeach time.thenumberofroundsisdenotedbyn r.the outputofroundi 1istheinputtoroundi. Each round consists of parallel applications of B S-boxes (S), the application of the linear diffusion layer (D), and afinalkeyadditionoftheroundkey.theroundkeyk 0 is added to the plaitext block before the first round.
21 19.CTCovervievforB=10
22 20.CTC-CourtoisToyCipher Specyfication, cont. Theplaintextbitsp 0...p Bs 1 areidentifiedwith Z 0,0...Z 0,Bs 1 andtheciphertextbitsc 0...c Bs 1 are identifiedwithx Nr+1,0...X Nr+1,Bs 1tohaveanuniform notation. The S-box was chosen as the permutation [7,6,0,4,2,5,1,3] Ithas2 3 =8inputsand8outputs.Theoutputbitsare quadratic boolean functions of the input bits. The explicit formofthesefunctionsisnotusedincubeattack.
23 21.CTC-CourtoisToyCipher Specyfication, cont. The diffusion layer (D) is defined as foralli =1...N r, Z i,257modbs =Y i,0 Z i,(1987j+257)modbs =Y i,j +Y i,(j+137)modbs forj 0andalli,whereY i,j representsinputbotsand Z i,j representsoutputbits.
24 22.CTC-CourtoisToyCipher Specyfication, cont. The key schedule is a simple permutation of bits: K i,j =K 0,(i+j)modBs foralliandj,wherek 0 isthemainkey. Key addition is performed bit-wise: X i+1,j =Z i,j +K i,j foralli =1...N r andj =1...Bs 1,whereZ i,j represents output bits of the previous diffusion layer, X i+1,j theinputbitsofthenextround,andk i,j thebitsof the current round key.
25 23.CubeattackonCTC WehaveappliedthecubeattacktotheversionofCTC withfourroundsandb=40ofs-boxes,i.e.theblock andthekeysizesbeing120bits. In the preprocessing stage we have done the summation over randomly chosen four dimensional cubes taken fromtheplaintext(otherbitsoftheplaintextareputto zero). Then 757 boxes lead to linear expresions (maxterms)forbitsofthekey.forderivationofeach linear expresion we used 5000 linear tests. We have chosen 120 linearly independent maxterms. They give the solvable system of linear equation for bits of the key.
26 24. The linear equations The equation Cube indexes 1+x66+x68 = c66 {4,5,22,52} x27+x28 = c105 {1,60,62,90} 1+x58 = c18 {16,17,60,110} 1+x14 = c80 {29,38,61,106} 1+x54+x56 = c36 {41,55,64,115} 1+x115+x116 = c66 {5,10,22,89} 1+x43 = c11 {73,74,75,118} x69+x70 = c28 {48,68,77,110} 1+x25 = c70 {73,76,93,104} x78+x79 = c114 {10,39,70,118} There are together 120 linearly independent such equations for thebitsx 0,...,x 119 ofthekey;c 0,...,c 119 areoutputbits.
27 25.CubeattackonCTC,cont. Intheonlinestageoftheattackweneedtosumover 120chosencubes(thekeyisunknown)tofindtheright hand sides of the linear equations. Thecomplexityoftheattackhereisabout =2 11 encryptionsofthefourroundctctorecoverthefull 120-bit key. Infact,thisreducedroundcipherisdescribedbyasystem of linear equations. Probably, for biger number of rounds, it is impossible to find such a description.
28 26.The stream cipher Trivium The specification of algorithm Algorithm Trivium(the authors: C. de Canniere and B. Preneel)isoneofthefinalistsofeSTREAM competitions. Thebasicparametersarethe80-bitkeyandthe80-bit initial value. TheinnerstateofTriviumare288bitsloadedtothree nonlinear registers of different lengths. Ineachroundofthealgorithmtheregistersareshiftedon one bit. Thefeedbackineachregisterisgivenbyanonlinear function.
29 27. The specification of Trivium (s 1,s 2,...,s 93 ) (k 1,k 2,...,k 80,0,...,0) (s 94,s 95,...,s 177 ) (IV 1,IV 2,...,IV 80,0,...,0) (s 178,s 179,...,s 288 ) (0,0,...,0,1,1,1) fori=1to1152 t 1 s 66 +s 93 t 2 s 162 +s 177 t 3 s 243 +s 288 t 1 t 1 +s 91 s 92 +s 171 t 2 t 2 +s 175 s 176 +s 264 t 3 t 3 +s 286 s 287 +s 69
30 28. The specification of Trivium, cont. (s 1,s 2,...,s 93 ) (t 3,s 1,...,s 92 ) (s 94,s 95,...,s 177 ) (t 1,s 94,...,s 176 ) (s 178,s 179,...,s 288 ) (t 2,s 178,...,s 287 ) end for
31 29. The specification of Trivium, cont. Thegenerationoftheouputbtstring (z i )ofthemaximal lengthupto N =2 64 bits,canberepresentedas: fori=1ton t 1 s 66 +s 93 t 2 s 162 +s 177 t 3 s 243 +s 288 z i t 1 +t 2 +t 3 t 1 t 1 +s 91 s 92 +s 171 t 2 t 2 +s 175 s 176 +s 264 t 3 t 3 +s 286 s 287 +s 69
32 30. The specification of Trivium, cont. (s 1,s 2,...,s 93 ) (t 3,s 1,...,s 92 ) (s 94,s 95,...,s 177 ) (t 1,s 94,...,s 176 ) (s 178,s 179,...,s 288 ) (t 2,s 178,...,s 287 ) end for
33 31.ThecubeattackonTrivium Dinur and Shamir investigated the reduced version of Trivium which contains 672(instead of 1152) initialization rounds. During the preprocessing stage they obtained 63 linearly independent maxterms corresponding to 12-dimensional cubesandoutputbitsoftheindicesfrom672to685.
34 32. The cube attack on Trivium, cont. Intheonlinestagetheattackermustfindthevaluesof the maxterms summing over dimensional cubes. After solving the system of linear equations the attacker obtains63bitsofthekeyandtheremaining17bitsof thekeyarefoundbybruteforcesearch. Thecomplexityoftheattack(intheonlinestage)isca evaluatioinsoftheinvestigated,reducedalgorithm.it issmallerthanthecomplexity2 55 inthepreviousattacks on this version of Trivium.
35 Cube attack Thank you
On the Influence of the Algebraic Degree of the Algebraic Degree of
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 59, NO. 1, JANUARY 2013 691 On the Influence of the Algebraic Degree of the Algebraic Degree of Christina Boura and Anne Canteaut on Abstract We present a
Lecture Note 8 ATTACKS ON CRYPTOSYSTEMS I. Sourav Mukhopadhyay
Lecture Note 8 ATTACKS ON CRYPTOSYSTEMS I Sourav Mukhopadhyay Cryptography and Network Security - MA61027 Attacks on Cryptosystems Up to this point, we have mainly seen how ciphers are implemented. We
Cryptography and Network Security Chapter 3
Cryptography and Network Security Chapter 3 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 3 Block Ciphers and the Data Encryption Standard All the afternoon
Cryptography and Network Security
Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 3: Block ciphers and DES Ion Petre Department of IT, Åbo Akademi University January 17, 2012 1 Data Encryption Standard
Table of Contents. Bibliografische Informationen http://d-nb.info/996514864. digitalisiert durch
1 Introduction to Cryptography and Data Security 1 1.1 Overview of Cryptology (and This Book) 2 1.2 Symmetric Cryptography 4 1.2.1 Basics 4 1.2.2 Simple Symmetric Encryption: The Substitution Cipher...
How To Understand And Understand The History Of Cryptography
CSE497b Introduction to Computer and Network Security - Spring 2007 - Professors Jaeger Lecture 5 - Cryptography CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/
Advanced Cryptography
Family Name:... First Name:... Section:... Advanced Cryptography Final Exam July 18 th, 2006 Start at 9:15, End at 12:00 This document consists of 12 pages. Instructions Electronic devices are not allowed.
How To Encrypt With A 64 Bit Block Cipher
The Data Encryption Standard (DES) As mentioned earlier there are two main types of cryptography in use today - symmetric or secret key cryptography and asymmetric or public key cryptography. Symmetric
The Advanced Encryption Standard: Four Years On
The Advanced Encryption Standard: Four Years On Matt Robshaw Reader in Information Security Information Security Group Royal Holloway University of London September 21, 2004 The State of the AES 1 The
CSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Secret Key Cryptography (I) 1 Introductory Remarks Roadmap Feistel Cipher DES AES Introduction
The Stream Cipher HC-128
The Stream Cipher HC-128 Hongjun Wu Katholieke Universiteit Leuven, ESAT/SCD-COSIC Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium [email protected] Statement 1. HC-128 supports 128-bit
2.3. Finding polynomial functions. An Introduction:
2.3. Finding polynomial functions. An Introduction: As is usually the case when learning a new concept in mathematics, the new concept is the reverse of the previous one. Remember how you first learned
Network Security: Cryptography CS/SS G513 S.K. Sahay
Network Security: Cryptography CS/SS G513 S.K. Sahay BITS-Pilani, K.K. Birla Goa Campus, Goa S.K. Sahay Network Security: Cryptography 1 Introduction Network security: measure to protect data/information
1 Data Encryption Algorithm
Date: Monday, September 23, 2002 Prof.: Dr Jean-Yves Chouinard Design of Secure Computer Systems CSI4138/CEG4394 Notes on the Data Encryption Standard (DES) The Data Encryption Standard (DES) has been
CS 758: Cryptography / Network Security
CS 758: Cryptography / Network Security offered in the Fall Semester, 2003, by Doug Stinson my office: DC 3122 my email address: [email protected] my web page: http://cacr.math.uwaterloo.ca/~dstinson/index.html
VoteID 2011 Internet Voting System with Cast as Intended Verification
VoteID 2011 Internet Voting System with Cast as Intended Verification September 2011 VP R&D Jordi [email protected] Index Introduction Proposal Security Conclusions 2. Introduction Client computers could
KALE: A High-Degree Algebraic-Resistant Variant of The Advanced Encryption Standard
KALE: A High-Degree Algebraic-Resistant Variant of The Advanced Encryption Standard Dr. Gavekort c/o Vakiopaine Bar Kauppakatu 6, 41 Jyväskylä FINLAND [email protected] Abstract. We have discovered that the
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
INTERPOLATION. Interpolation is a process of finding a formula (often a polynomial) whose graph will pass through a given set of points (x, y).
INTERPOLATION Interpolation is a process of finding a formula (often a polynomial) whose graph will pass through a given set of points (x, y). As an example, consider defining and x 0 =0, x 1 = π 4, x
Modern Block Cipher Standards (AES) Debdeep Mukhopadhyay
Modern Block Cipher Standards (AES) Debdeep Mukhopadhyay Assistant Professor Department of Computer Science and Engineering Indian Institute of Technology Kharagpur INDIA -721302 Objectives Introduction
Masao KASAHARA. Public Key Cryptosystem, Error-Correcting Code, Reed-Solomon code, CBPKC, McEliece PKC.
A New Class of Public Key Cryptosystems Constructed Based on Reed-Solomon Codes, K(XII)SEPKC. Along with a presentation of K(XII)SEPKC over the extension field F 2 8 extensively used for present day various
Cryptography and Network Security. Prof. D. Mukhopadhyay. Department of Computer Science and Engineering. Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 12 Block Cipher Standards
Network Security Technology Network Management
COMPUTER NETWORKS Network Security Technology Network Management Source Encryption E(K,P) Decryption D(K,C) Destination The author of these slides is Dr. Mark Pullen of George Mason University. Permission
Cryptography and Network Security Block Cipher
Cryptography and Network Security Block Cipher Xiang-Yang Li Modern Private Key Ciphers Stream ciphers The most famous: Vernam cipher Invented by Vernam, ( AT&T, in 1917) Process the message bit by bit
Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key
Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key Julia Juremi Ramlan Mahmod Salasiah Sulaiman Jazrin Ramli Faculty of Computer Science and Information Technology, Universiti Putra
Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010
CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Introduction to Cryptography What is cryptography?
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No. # 11 Block Cipher Standards (DES) (Refer Slide
Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the
Network Security. Chapter 3 Symmetric Cryptography. Symmetric Encryption. Modes of Encryption. Symmetric Block Ciphers - Modes of Encryption ECB (1)
Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Network Security Chapter 3 Symmetric Cryptography General Description Modes of ion Data ion Standard (DES)
Secret File Sharing Techniques using AES algorithm. C. Navya Latha 200201066 Garima Agarwal 200305032 Anila Kumar GVN 200305002
Secret File Sharing Techniques using AES algorithm C. Navya Latha 200201066 Garima Agarwal 200305032 Anila Kumar GVN 200305002 1. Feature Overview The Advanced Encryption Standard (AES) feature adds support
The Advanced Encryption Standard (AES)
The Advanced Encryption Standard (AES) Conception - Why A New Cipher? Conception - Why A New Cipher? DES had outlived its usefulness Vulnerabilities were becoming known 56-bit key was too small Too slow
SOLVING POLYNOMIAL EQUATIONS
C SOLVING POLYNOMIAL EQUATIONS We will assume in this appendix that you know how to divide polynomials using long division and synthetic division. If you need to review those techniques, refer to an algebra
Network Security. HIT Shimrit Tzur-David
Network Security HIT Shimrit Tzur-David 1 Goals: 2 Network Security Understand principles of network security: cryptography and its many uses beyond confidentiality authentication message integrity key
CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives
CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash
The 128-bit Blockcipher CLEFIA Design Rationale
The 128-bit Blockcipher CLEFIA Design Rationale Revision 1.0 June 1, 2007 Sony Corporation NOTICE THIS DOCUMENT IS PROVIDED AS IS, WITH NO WARRANTIES WHATSOVER, INCLUDING ANY WARRANTY OF MERCHANTABIL-
CIS433/533 - Computer and Network Security Cryptography
CIS433/533 - Computer and Network Security Cryptography Professor Kevin Butler Winter 2011 Computer and Information Science A historical moment Mary Queen of Scots is being held by Queen Elizabeth and
A NEW HASH ALGORITHM: Khichidi-1
A NEW HASH ALGORITHM: Khichidi-1 Abstract This is a technical document describing a new hash algorithm called Khichidi-1 and has been written in response to a Hash competition (SHA-3) called by National
EXAM questions for the course TTM4135 - Information Security June 2010. Part 1
EXAM questions for the course TTM4135 - Information Security June 2010 Part 1 This part consists of 6 questions all from one common topic. The number of maximal points for every correctly answered question
Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur
Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Module No. # 01 Lecture No. # 05 Classic Cryptosystems (Refer Slide Time: 00:42)
Ky Vu DeVry University, Atlanta Georgia College of Arts & Science
Ky Vu DeVry University, Atlanta Georgia College of Arts & Science Table of Contents - Objective - Cryptography: An Overview - Symmetric Key - Asymmetric Key - Transparent Key: A Paradigm Shift - Security
JUST THE MATHS UNIT NUMBER 1.8. ALGEBRA 8 (Polynomials) A.J.Hobson
JUST THE MATHS UNIT NUMBER 1.8 ALGEBRA 8 (Polynomials) by A.J.Hobson 1.8.1 The factor theorem 1.8.2 Application to quadratic and cubic expressions 1.8.3 Cubic equations 1.8.4 Long division of polynomials
RSA Attacks. By Abdulaziz Alrasheed and Fatima
RSA Attacks By Abdulaziz Alrasheed and Fatima 1 Introduction Invented by Ron Rivest, Adi Shamir, and Len Adleman [1], the RSA cryptosystem was first revealed in the August 1977 issue of Scientific American.
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. #01 Lecture No. #10 Symmetric Key Ciphers (Refer
Network Security. Security. Security Services. Crytographic algorithms. privacy authenticity Message integrity. Public key (RSA) Message digest (MD5)
Network Security Security Crytographic algorithms Security Services Secret key (DES) Public key (RSA) Message digest (MD5) privacy authenticity Message integrity Secret Key Encryption Plain text Plain
IT Networks & Security CERT Luncheon Series: Cryptography
IT Networks & Security CERT Luncheon Series: Cryptography Presented by Addam Schroll, IT Security & Privacy Analyst 1 Outline History Terms & Definitions Symmetric and Asymmetric Algorithms Hashing PKI
A PPENDIX H RITERIA FOR AES E VALUATION C RITERIA FOR
A PPENDIX H RITERIA FOR AES E VALUATION C RITERIA FOR William Stallings Copyright 20010 H.1 THE ORIGINS OF AES...2 H.2 AES EVALUATION...3 Supplement to Cryptography and Network Security, Fifth Edition
A New 128-bit Key Stream Cipher LEX
A New 128-it Key Stream Cipher LEX Alex Biryukov Katholieke Universiteit Leuven, Dept. ESAT/SCD-COSIC, Kasteelpark Arenerg 10, B 3001 Heverlee, Belgium http://www.esat.kuleuven.ac.e/~airyuko/ Astract.
A PPENDIX G S IMPLIFIED DES
A PPENDIX G S IMPLIFIED DES William Stallings opyright 2010 G.1 OVERVIEW...2! G.2 S-DES KEY GENERATION...3! G.3 S-DES ENRYPTION...4! Initial and Final Permutations...4! The Function f K...5! The Switch
Block encryption. CS-4920: Lecture 7 Secret key cryptography. Determining the plaintext ciphertext mapping. CS4920-Lecture 7 4/1/2015
CS-4920: Lecture 7 Secret key cryptography Reading Chapter 3 (pp. 59-75, 92-93) Today s Outcomes Discuss block and key length issues related to secret key cryptography Define several terms related to secret
Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code
{(i,j) 1 < i,j < n} pairs, X and X i, such that X and X i differ. exclusive-or sums. ( ) ( i ) V = f x f x
ON THE DESIGN OF S-BOXES A. F. Webster and S. E. Tavares Department of Electrical Engineering Queen's University Kingston, Ont. Canada The ideas of completeness and the avalanche effect were first introduced
Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015
Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015 Chapter 2: Introduction to Cryptography What is cryptography? It is a process/art of mangling information in such a way so as to make it
Developing and Investigation of a New Technique Combining Message Authentication and Encryption
Developing and Investigation of a New Technique Combining Message Authentication and Encryption Eyas El-Qawasmeh and Saleem Masadeh Computer Science Dept. Jordan University for Science and Technology P.O.
1 Lecture: Integration of rational functions by decomposition
Lecture: Integration of rational functions by decomposition into partial fractions Recognize and integrate basic rational functions, except when the denominator is a power of an irreducible quadratic.
7! Cryptographic Techniques! A Brief Introduction
7! Cryptographic Techniques! A Brief Introduction 7.1! Introduction to Cryptography! 7.2! Symmetric Encryption! 7.3! Asymmetric (Public-Key) Encryption! 7.4! Digital Signatures! 7.5! Public Key Infrastructures
CSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Public Key Cryptogrophy 1 Roadmap Introduction RSA Diffie-Hellman Key Exchange Public key and
Physical-Layer Security: Combining Error Control Coding and Cryptography
1 Physical-Layer Security: Combining Error Control Coding and Cryptography Willie K Harrison and Steven W McLaughlin arxiv:09010275v2 [csit] 16 Apr 2009 Abstract In this paper we consider tandem error
Factoring. Factoring 1
Factoring Factoring 1 Factoring Security of RSA algorithm depends on (presumed) difficulty of factoring o Given N = pq, find p or q and RSA is broken o Rabin cipher also based on factoring Factoring like
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
Security Evaluation of the SPECTR-128. Block Cipher
pplied Mathematical Sciences, ol. 7,, no. 4, 6945-696 HIKI td, www.m-hikari.com http://dx.doi.org/.988/ams..584 Security Evaluation of the SPECT-8 Block Cipher Manh Tuan Pham, am T. u Posts and Telecommunications
SFLASH v3, a fast asymmetric signature scheme
SFLASH v3, a fast asymmetric signature scheme Specification of SFLASH, version 3.0., 17 October 2003 The authors still recommend SFLASH-v2, see below. Nicolas T. Courtois 1, Louis Goubin 1 and Jacques
A Practical Attack on Broadcast RC4
A Practical Attack on Broadcast RC4 Itsik Mantin and Adi Shamir Computer Science Department, The Weizmann Institute, Rehovot 76100, Israel. {itsik,shamir}@wisdom.weizmann.ac.il Abstract. RC4is the most
Cryptanalysis of Grain using Time / Memory / Data Tradeoffs
Cryptanalysis of Grain using Time / Memory / Data Tradeoffs v1.0 / 2008-02-25 T.E. Bjørstad The Selmer Center, Department of Informatics, University of Bergen, Pb. 7800, N-5020 Bergen, Norway. Email :
Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 [email protected] Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室
Network Security 孫 宏 民 [email protected] Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室 Security Attacks Normal flow: sender receiver Interruption: Information source Information destination
Cryptography & Network Security
Cryptography & Network Security Lecture 1: Introduction & Overview 2002. 3. 27 [email protected] Common Terms(1) Cryptography: The study of mathematical techniques related to aspects of information security
Lagrange Interpolation is a method of fitting an equation to a set of points that functions well when there are few points given.
Polynomials (Ch.1) Study Guide by BS, JL, AZ, CC, SH, HL Lagrange Interpolation is a method of fitting an equation to a set of points that functions well when there are few points given. Sasha s method
Split Based Encryption in Secure File Transfer
Split Based Encryption in Secure File Transfer Parul Rathor, Rohit Sehgal Assistant Professor, Dept. of CSE, IET, Nagpur University, India Assistant Professor, Dept. of CSE, IET, Alwar, Rajasthan Technical
Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human
Int Jr of Mathematics Sciences & Applications Vol3, No1, January-June 2013 Copyright Mind Reader Publications ISSN No: 2230-9888 wwwjournalshubcom Mathematical Model Based Total Security System with Qualitative
Symmetric Key cryptosystem
SFWR C03: Computer Networks and Computer Security Mar 8-11 200 Lecturer: Kartik Krishnan Lectures 22-2 Symmetric Key cryptosystem Symmetric encryption, also referred to as conventional encryption or single
Lecture 4 Data Encryption Standard (DES)
Lecture 4 Data Encryption Standard (DES) 1 Block Ciphers Map n-bit plaintext blocks to n-bit ciphertext blocks (n = block length). For n-bit plaintext and ciphertext blocks and a fixed key, the encryption
Multi-Layered Cryptographic Processor for Network Security
International Journal of Scientific and Research Publications, Volume 2, Issue 10, October 2012 1 Multi-Layered Cryptographic Processor for Network Security Pushp Lata *, V. Anitha ** * M.tech Student,
Unknown Plaintext Template Attacks
Unknown Plaintext Template Attacks Neil Hanley, Michael Tunstall 2, and William P. Marnane Department of Electrical and Electronic Engineering, University College Cork, Ireland. [email protected], [email protected]
3-6 Toward Realizing Privacy-Preserving IP-Traceback
3-6 Toward Realizing Privacy-Preserving IP-Traceback The IP-traceback technology enables us to trace widely spread illegal users on Internet. However, to deploy this attractive technology, some problems
SOLVING SEXTIC EQUATIONS. Raghavendra G. Kulkarni
Atlantic Electronic http://aejm.ca Journal of Mathematics http://aejm.ca/rema Volume 3, Number 1, Winter 2008 pp. 56 60 SOLVING SEXTIC EQUATIONS Raghavendra G. Kulkarni Hybrid Microcircuits Division Bharat
CRYPTOG NETWORK SECURITY
CRYPTOG NETWORK SECURITY PRINCIPLES AND PRACTICES FOURTH EDITION William Stallings Prentice Hall Upper Saddle River, NJ 07458 'jkfetmhki^^rij^jibwfcmf «MMr""'-^.;
Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K.
Cryptosystems Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K. C= E(M, K), Bob sends C Alice receives C, M=D(C,K) Use the same key to decrypt. Public
Analysis of Non-fortuitous Predictive States of the RC4 Keystream Generator
Analysis of Non-fortuitous Predictive States of the RC4 Keystream Generator Souradyuti Paul and Bart Preneel Katholieke Universiteit Leuven, Dept. ESAT/COSIC, Kasteelpark Arenberg 10, B 3001 Leuven-Heverlee,
MAC. SKE in Practice. Lecture 5
MAC. SKE in Practice. Lecture 5 Active Adversary Active Adversary An active adversary can inject messages into the channel Active Adversary An active adversary can inject messages into the channel Eve
Message Authentication Codes
2 MAC Message Authentication Codes : and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 28 October 2013 css322y13s2l08, Steve/Courses/2013/s2/css322/lectures/mac.tex,
CRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
159.334 Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology
Network Security 1 Professor Richard Harris School of Engineering and Advanced Technology Presentation Outline Overview of Identification and Authentication The importance of identification and Authentication
Cryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g.
Cryptography: Motivation Many areas have sensitive information, e.g. Data Structures and Algorithms Cryptography Goodrich & Tamassia Sections 3.1.3 & 3.1.4 Introduction Simple Methods Asymmetric methods:
FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION
FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION INTRODUCTION GANESH ESWAR KUMAR. P Dr. M.G.R University, Maduravoyal, Chennai. Email: [email protected] Every day, millions of people
Lukasz Pater CMMS Administrator and Developer
Lukasz Pater CMMS Administrator and Developer EDMS 1373428 Agenda Introduction Why do we need asymmetric ciphers? One-way functions RSA Cipher Message Integrity Examples Secure Socket Layer Single Sign
Indiana State Core Curriculum Standards updated 2009 Algebra I
Indiana State Core Curriculum Standards updated 2009 Algebra I Strand Description Boardworks High School Algebra presentations Operations With Real Numbers Linear Equations and A1.1 Students simplify and
Cryptography and Network Security Chapter 9
Cryptography and Network Security Chapter 9 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 9 Public Key Cryptography and RSA Every Egyptian received two names,
Rijndael Encryption implementation on different platforms, with emphasis on performance
Rijndael Encryption implementation on different platforms, with emphasis on performance KAFUUMA JOHN SSENYONJO Bsc (Hons) Computer Software Theory University of Bath May 2005 Rijndael Encryption implementation
expression is written horizontally. The Last terms ((2)( 4)) because they are the last terms of the two polynomials. This is called the FOIL method.
A polynomial of degree n (in one variable, with real coefficients) is an expression of the form: a n x n + a n 1 x n 1 + a n 2 x n 2 + + a 2 x 2 + a 1 x + a 0 where a n, a n 1, a n 2, a 2, a 1, a 0 are
Introduction. Where Is The Threat? Encryption Methods for Protecting Data. BOSaNOVA, Inc. Phone: 866-865-5250 Email: [email protected] Web: www.theq3.
Introduction Within the last ten years, there has been a vast increase in the accumulation and communication of digital computer data in both the private and public sectors. Much of this information has
SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES
www.arpapress.com/volumes/vol8issue1/ijrras_8_1_10.pdf SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES Malek Jakob Kakish Amman Arab University, Department of Computer Information Systems, P.O.Box 2234,
