Application of cube attack to block and stream ciphers

Size: px
Start display at page:

Download "Application of cube attack to block and stream ciphers"

Transcription

1 Application of cube attack to block and stream ciphers Janusz Szmidt joint work with Piotr Mroczkowski Military University of Technology Military Telecommunication Institute Poland 23 czerwca 2009

2 1. Papers ItaiDinurandAdiShamir,CubeAttackson Tweakable Black Box Polynomials, Eurocrypt, S.S.BediandR.Pillai,CubeattacksonTrivium, IACR Cryptology eprint Archive, 2009/15. J-P. Aumasson, W. Meier, I. Dinur, A. Shamir, Cube testers and key recovery attacks on reduced round MD6 and Trivium, Fast Software Encryption, I. Dinur, A. Shamir, Side channel cube attacks on block ciphers, IACR Cryptology eprint Archive, 2009/127. J. Lathrop, Cube Attacks on Cryptographic Hash Functions, Master s Thesis, Rochester Institte of Technology, 2009.

3 Paper Miachael Vielhaber, Breaking One.Fivium by AIDA an Algebraic IV Differential Attack, IACR Cryptology eprint Archive, 2007.

4 2. The structure of attack Let us consider cryptosystem described by the polynomial: p(v 1,...,v m,x 1,...,x n ) dependingonmpublicvariablesv 1,...,v m (theinitial valueorplaintext)andonnsecretvariablesx 1,...,x n (thekey). The value of the polynomial represents the ciphertext bit. In general, the polynomial p is not explicitelly known; it canbeablackbox. We will consider the known plaintext attack, where at the preprocessing stage the attacker has also an access to secret variables(initial values or keys).

5 3. The structure of attack, cont. 1 The preprocessing stage. The attacker can change the valuesofpublicandsecretvariables.thetaskistoobtain a system of linear equations on secret variables. 2 Thestageonlineoftheattack.Thekeyissecret now. The attacker can change the values of public variables. He adds the output bits, where the inputs run over some multi-dimennsional cubes. The task is to obtain the right hand sides of linear equations. The system of linearequationcanbesolvedgivingsomebitsofthekey.

6 4. Mathematical background Foramomentweshallnotdistinguishthesecretand public variables. Letpbeapolynomialofnvariablesx 1,...,x n overthe fieldgf(2). ForasubsetofindexesI ={i 1,...,i k } {1,...,n}let ustakeamonomial t I =x i1...x ik Then we have a decomposition p(x 1,...,x n ) =t I p S(I) +q(x 1,...,x n ) wherethepolynomialp S(I) doesnotdependonthe variablesx i1,...,x ik.

7 5.Example1 Letusconsiderapolynomialpofdegree3dependingon 5 variables: p(x 1,x 2,x 3,x 4,x 5 ) =x 1 x 2 x 3 +x 1 x 2 x 4 +x 2 x 4 x 5 + x 1 x 2 +x 3 x 5 +x 2 +x 5 =1 LetI ={1.2}beachosensubsetofindexes. Then the polynomial p can be decomposed as: p(x 1,x 2,x 3,x 4,x 5 ) =x 1 x 2 (x 3 +x 4 +1)+ (x 2 x 4 x 5 +x 3 x 5 +x 2 +x 5 +1)

8 6. Example 1, cont. Using the introduced above notation: t I =x 1 x 2, p S(I) =x 3 +x 4 +1, q(x 1,x 2,x 3,x 4,x 5 ) =x 2 x 4 x 5 +x 3 x 5 +x 2 +x 5 +1

9 7. Definition 1 Themaxtermofthepolynomialpwecallthemonomialt I, such that deg(p S(I) ) =1, itmeansthatthepolynomialp S(I) correspondingtothesubset ofindexesiisalinearone,whichisnotaconstant.

10 8. Summation over cubes LetI ={i 1,...,i k } {1,...,n}beafixedsubsetofk indexes. ThesetIdefinesthek-dimensionalbooleancubeC I, whereontheplaceofeachoftheindexesweput0or1. Agivenvectorv C I definesthederivedpolynomoalp v dependingonn kvariables,whereinthebasic polynomoal p we put the values corresponding to the vectorv. SummingoverallvectorsinthecubeC I weobtainthe polynomial: p I = v C I p v

11 9.Theorem1 LetpbeapolynomialoverthefieldGF(2)andI {1,...,n} theindexsubset.thenwehave: p I =p S(I) mod2

12 10. Example 2 Let us consider a polynomial: p(v 1,v 2,v 3,x 1,x 2,x 3 ) =v 1 v 2 v 3 +v 1 v 2 x 1 +v 1 v 3 x 1 +v 2 v 3 x 1 + v 1 v 2 x 3 +v 1 v 3 x 2 +v 2 v 3 x 2 +v 1 v 3 x 3 +v 1 x 1 x 3 +v 3 x 2 x 3 +x 1 x 2 x 3 + v 1 v 2 +v 1 x 3 +v 3 x 1 +x 1 x 2 +x 2 x 3 +x 2 +v 1 +v 3 +1 ofdegreed=3dependingonpublicvariablesv 1,v 2,v 3 andsecretvariablesx 1,x 2,x 3. Substituting on public variables the values 0/1 we get the eight derived polynomials.

13 11. Example 2, cont. p(0,0,0,x 1,x 2,x 3 ) =x 1 x 2 x 3 +x 1 x 2 +x 2 x 3 +x 2 +1 p(0,0,1,x 1,x 2,x 3 ) =x 1 x 2 x 3 +x 1 x 2 +x 1 +x 2 p(0,1,0,x 1,x 2,x 3 ) =x 1 x 2 x 3 +x 1 x 2 +x 2 x 3 +x 2 +1 p(0,1,1,x 1,x 2,x 3 ) =x 1 x 2 x 3 +x 1 x 2 p(1,0,0,x 1,x 2,x 3 ) =x 1 x 2 x 3 +x 1 x 2 +x 1 x 3 +x 2 x 3 +x 2 +x 3 p(1,0,1,x 1,x 2,x 3 ) =x 1 x 2 x 3 +x 1 x 2 +x 1 x 3 +1 p(1,1,0,x 1,x 2,x 3 ) =x 1 x 2 x 3 +x 1 x 2 +x 1 x 3 +x 2 x 3 +x 1 +x 2 +1 p(1,1,1,x 1,x 2,x 3 ) =x 1 x 2 x 3 +x 1 x 2 +x 1 x 3 +x 2 +x 3 +1

14 12. Example 2, cont. Summingthefourderivedpolynomialswithv 1 =0weget x 1 +x 2, Summingthefourderivedpolynomialswithv 2 =0weget x 1 +x 2 +x 3, Summingthefourderivedpolynomialswithv 3 =0weget x 1 +x The obtained expressions lead to a system of linear equationsusedinthestageonlineoftheattack.

15 13. The preprocessing stage 1 Thefirsttaskistofixdimensionofthecubeandthe public variables over which we will sum; they are called the tweakable variables, and the other public variables are puttozero.inthecaseweknowthedegreedofthe basicpolynomial,weputthecubedimensiontod 1. 2 Wedothesummationoverafixedcubeforseveralvalues of secret variables and collect the obtained values. 3 Wedothelineartestsfortheobtainedfunctionofsecret variablesandstoreitwhenitislinear: f (x x ) =f (x) f(x ) f(0), wherex= (x 1,...,x n )aresecretvariables(thekey).

16 14. The preprocessing stage, cont. Thenexttaskistocalculatetheexactform(the coefficients) of the obtained linear function of secret variables. Thefreetermofthelinearfunctionweobtanputtingits all argument equal zero. Thecoefficientofthevariablex i isequal1ifandonlyif thechangeofthisvariableimpliesthechangeofvaluesof the function. Thecoefficientofthevariablex i isequal0ifandonlyif thechangeofthisvariabledoesnotimplythechangeof values of the function.

17 15. The preprocessing stage, cont. Thetaskofthisstageofattackistocollectpossible many independent linear terms- they constitute the system of linear equations on secret variables. Thissystemoflinearequationswillbeusedintheonline stage of attack. The preprocessing stage is done only once in cryptanalysis of the algorithm.

18 16.Thestageonlineofattack Now an attacker has the access only to public variables (thr plaintext for block ciphers, the initial values for stream ciphers), which he can change and calculates the corresponding bits of the ciphertext under the unknown value of secret variables. Thetaskofthisstageofattackistofindsomebitsof secret key with complexity, which would be lower than the exhuastive search in the brute force attack. The attacker uses the derived system of linear equations for secret variables(the unknown bits of the key), where therighthandsidesoftheseequationsarethevaluesof bits of ciphertext obtained after summation over the same cubesasinthepreprocessingstage,butnowthekeyis not known.

19 17.Thestageonlineofattack,cont. The cube attach is applicable to symmetric ciphers for which the polynomials descibing the system have relatively low degree. Thenonecaneventuallyfindsomebitsofunknownkey. Theremainingbitsofthekeymaybefoundbybrute force search. After successful preprocwssing stage, the stage on line of attack can be done many times for different unknown keys The cube attack is applicable, in general, to cryptosystems without knowing their inner structure. The attacker must have the possibility to realize the preprocessingstageandintheonlinestageanaccessto the implementation of the algorithm(to perform the summation over cubes under unknown key).

20 18.CTC-CourtoisToyCipher Specification CTC was designed by Nicolais Courtois to apply and test the methods of algebraic analysis. ItisaSPNnetworkwhichisscalableinthenumberof rounds, the block and key size. Each round performs the same operation on the input data,exceptthatadifferentroundkeyisaddedeach time.thenumberofroundsisdenotedbyn r.the outputofroundi 1istheinputtoroundi. Each round consists of parallel applications of B S-boxes (S), the application of the linear diffusion layer (D), and afinalkeyadditionoftheroundkey.theroundkeyk 0 is added to the plaitext block before the first round.

21 19.CTCovervievforB=10

22 20.CTC-CourtoisToyCipher Specyfication, cont. Theplaintextbitsp 0...p Bs 1 areidentifiedwith Z 0,0...Z 0,Bs 1 andtheciphertextbitsc 0...c Bs 1 are identifiedwithx Nr+1,0...X Nr+1,Bs 1tohaveanuniform notation. The S-box was chosen as the permutation [7,6,0,4,2,5,1,3] Ithas2 3 =8inputsand8outputs.Theoutputbitsare quadratic boolean functions of the input bits. The explicit formofthesefunctionsisnotusedincubeattack.

23 21.CTC-CourtoisToyCipher Specyfication, cont. The diffusion layer (D) is defined as foralli =1...N r, Z i,257modbs =Y i,0 Z i,(1987j+257)modbs =Y i,j +Y i,(j+137)modbs forj 0andalli,whereY i,j representsinputbotsand Z i,j representsoutputbits.

24 22.CTC-CourtoisToyCipher Specyfication, cont. The key schedule is a simple permutation of bits: K i,j =K 0,(i+j)modBs foralliandj,wherek 0 isthemainkey. Key addition is performed bit-wise: X i+1,j =Z i,j +K i,j foralli =1...N r andj =1...Bs 1,whereZ i,j represents output bits of the previous diffusion layer, X i+1,j theinputbitsofthenextround,andk i,j thebitsof the current round key.

25 23.CubeattackonCTC WehaveappliedthecubeattacktotheversionofCTC withfourroundsandb=40ofs-boxes,i.e.theblock andthekeysizesbeing120bits. In the preprocessing stage we have done the summation over randomly chosen four dimensional cubes taken fromtheplaintext(otherbitsoftheplaintextareputto zero). Then 757 boxes lead to linear expresions (maxterms)forbitsofthekey.forderivationofeach linear expresion we used 5000 linear tests. We have chosen 120 linearly independent maxterms. They give the solvable system of linear equation for bits of the key.

26 24. The linear equations The equation Cube indexes 1+x66+x68 = c66 {4,5,22,52} x27+x28 = c105 {1,60,62,90} 1+x58 = c18 {16,17,60,110} 1+x14 = c80 {29,38,61,106} 1+x54+x56 = c36 {41,55,64,115} 1+x115+x116 = c66 {5,10,22,89} 1+x43 = c11 {73,74,75,118} x69+x70 = c28 {48,68,77,110} 1+x25 = c70 {73,76,93,104} x78+x79 = c114 {10,39,70,118} There are together 120 linearly independent such equations for thebitsx 0,...,x 119 ofthekey;c 0,...,c 119 areoutputbits.

27 25.CubeattackonCTC,cont. Intheonlinestageoftheattackweneedtosumover 120chosencubes(thekeyisunknown)tofindtheright hand sides of the linear equations. Thecomplexityoftheattackhereisabout =2 11 encryptionsofthefourroundctctorecoverthefull 120-bit key. Infact,thisreducedroundcipherisdescribedbyasystem of linear equations. Probably, for biger number of rounds, it is impossible to find such a description.

28 26.The stream cipher Trivium The specification of algorithm Algorithm Trivium(the authors: C. de Canniere and B. Preneel)isoneofthefinalistsofeSTREAM competitions. Thebasicparametersarethe80-bitkeyandthe80-bit initial value. TheinnerstateofTriviumare288bitsloadedtothree nonlinear registers of different lengths. Ineachroundofthealgorithmtheregistersareshiftedon one bit. Thefeedbackineachregisterisgivenbyanonlinear function.

29 27. The specification of Trivium (s 1,s 2,...,s 93 ) (k 1,k 2,...,k 80,0,...,0) (s 94,s 95,...,s 177 ) (IV 1,IV 2,...,IV 80,0,...,0) (s 178,s 179,...,s 288 ) (0,0,...,0,1,1,1) fori=1to1152 t 1 s 66 +s 93 t 2 s 162 +s 177 t 3 s 243 +s 288 t 1 t 1 +s 91 s 92 +s 171 t 2 t 2 +s 175 s 176 +s 264 t 3 t 3 +s 286 s 287 +s 69

30 28. The specification of Trivium, cont. (s 1,s 2,...,s 93 ) (t 3,s 1,...,s 92 ) (s 94,s 95,...,s 177 ) (t 1,s 94,...,s 176 ) (s 178,s 179,...,s 288 ) (t 2,s 178,...,s 287 ) end for

31 29. The specification of Trivium, cont. Thegenerationoftheouputbtstring (z i )ofthemaximal lengthupto N =2 64 bits,canberepresentedas: fori=1ton t 1 s 66 +s 93 t 2 s 162 +s 177 t 3 s 243 +s 288 z i t 1 +t 2 +t 3 t 1 t 1 +s 91 s 92 +s 171 t 2 t 2 +s 175 s 176 +s 264 t 3 t 3 +s 286 s 287 +s 69

32 30. The specification of Trivium, cont. (s 1,s 2,...,s 93 ) (t 3,s 1,...,s 92 ) (s 94,s 95,...,s 177 ) (t 1,s 94,...,s 176 ) (s 178,s 179,...,s 288 ) (t 2,s 178,...,s 287 ) end for

33 31.ThecubeattackonTrivium Dinur and Shamir investigated the reduced version of Trivium which contains 672(instead of 1152) initialization rounds. During the preprocessing stage they obtained 63 linearly independent maxterms corresponding to 12-dimensional cubesandoutputbitsoftheindicesfrom672to685.

34 32. The cube attack on Trivium, cont. Intheonlinestagetheattackermustfindthevaluesof the maxterms summing over dimensional cubes. After solving the system of linear equations the attacker obtains63bitsofthekeyandtheremaining17bitsof thekeyarefoundbybruteforcesearch. Thecomplexityoftheattack(intheonlinestage)isca evaluatioinsoftheinvestigated,reducedalgorithm.it issmallerthanthecomplexity2 55 inthepreviousattacks on this version of Trivium.

35 Cube attack Thank you

On the Influence of the Algebraic Degree of the Algebraic Degree of

On the Influence of the Algebraic Degree of the Algebraic Degree of IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 59, NO. 1, JANUARY 2013 691 On the Influence of the Algebraic Degree of the Algebraic Degree of Christina Boura and Anne Canteaut on Abstract We present a

More information

Lecture Note 8 ATTACKS ON CRYPTOSYSTEMS I. Sourav Mukhopadhyay

Lecture Note 8 ATTACKS ON CRYPTOSYSTEMS I. Sourav Mukhopadhyay Lecture Note 8 ATTACKS ON CRYPTOSYSTEMS I Sourav Mukhopadhyay Cryptography and Network Security - MA61027 Attacks on Cryptosystems Up to this point, we have mainly seen how ciphers are implemented. We

More information

Cryptography and Network Security Chapter 3

Cryptography and Network Security Chapter 3 Cryptography and Network Security Chapter 3 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 3 Block Ciphers and the Data Encryption Standard All the afternoon

More information

Cryptography and Network Security

Cryptography and Network Security Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 3: Block ciphers and DES Ion Petre Department of IT, Åbo Akademi University January 17, 2012 1 Data Encryption Standard

More information

Table of Contents. Bibliografische Informationen http://d-nb.info/996514864. digitalisiert durch

Table of Contents. Bibliografische Informationen http://d-nb.info/996514864. digitalisiert durch 1 Introduction to Cryptography and Data Security 1 1.1 Overview of Cryptology (and This Book) 2 1.2 Symmetric Cryptography 4 1.2.1 Basics 4 1.2.2 Simple Symmetric Encryption: The Substitution Cipher...

More information

How To Understand And Understand The History Of Cryptography

How To Understand And Understand The History Of Cryptography CSE497b Introduction to Computer and Network Security - Spring 2007 - Professors Jaeger Lecture 5 - Cryptography CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/

More information

Advanced Cryptography

Advanced Cryptography Family Name:... First Name:... Section:... Advanced Cryptography Final Exam July 18 th, 2006 Start at 9:15, End at 12:00 This document consists of 12 pages. Instructions Electronic devices are not allowed.

More information

How To Encrypt With A 64 Bit Block Cipher

How To Encrypt With A 64 Bit Block Cipher The Data Encryption Standard (DES) As mentioned earlier there are two main types of cryptography in use today - symmetric or secret key cryptography and asymmetric or public key cryptography. Symmetric

More information

The Advanced Encryption Standard: Four Years On

The Advanced Encryption Standard: Four Years On The Advanced Encryption Standard: Four Years On Matt Robshaw Reader in Information Security Information Security Group Royal Holloway University of London September 21, 2004 The State of the AES 1 The

More information

CSCE 465 Computer & Network Security

CSCE 465 Computer & Network Security CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Secret Key Cryptography (I) 1 Introductory Remarks Roadmap Feistel Cipher DES AES Introduction

More information

The Stream Cipher HC-128

The Stream Cipher HC-128 The Stream Cipher HC-128 Hongjun Wu Katholieke Universiteit Leuven, ESAT/SCD-COSIC Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium [email protected] Statement 1. HC-128 supports 128-bit

More information

2.3. Finding polynomial functions. An Introduction:

2.3. Finding polynomial functions. An Introduction: 2.3. Finding polynomial functions. An Introduction: As is usually the case when learning a new concept in mathematics, the new concept is the reverse of the previous one. Remember how you first learned

More information

Network Security: Cryptography CS/SS G513 S.K. Sahay

Network Security: Cryptography CS/SS G513 S.K. Sahay Network Security: Cryptography CS/SS G513 S.K. Sahay BITS-Pilani, K.K. Birla Goa Campus, Goa S.K. Sahay Network Security: Cryptography 1 Introduction Network security: measure to protect data/information

More information

1 Data Encryption Algorithm

1 Data Encryption Algorithm Date: Monday, September 23, 2002 Prof.: Dr Jean-Yves Chouinard Design of Secure Computer Systems CSI4138/CEG4394 Notes on the Data Encryption Standard (DES) The Data Encryption Standard (DES) has been

More information

CS 758: Cryptography / Network Security

CS 758: Cryptography / Network Security CS 758: Cryptography / Network Security offered in the Fall Semester, 2003, by Doug Stinson my office: DC 3122 my email address: [email protected] my web page: http://cacr.math.uwaterloo.ca/~dstinson/index.html

More information

VoteID 2011 Internet Voting System with Cast as Intended Verification

VoteID 2011 Internet Voting System with Cast as Intended Verification VoteID 2011 Internet Voting System with Cast as Intended Verification September 2011 VP R&D Jordi [email protected] Index Introduction Proposal Security Conclusions 2. Introduction Client computers could

More information

KALE: A High-Degree Algebraic-Resistant Variant of The Advanced Encryption Standard

KALE: A High-Degree Algebraic-Resistant Variant of The Advanced Encryption Standard KALE: A High-Degree Algebraic-Resistant Variant of The Advanced Encryption Standard Dr. Gavekort c/o Vakiopaine Bar Kauppakatu 6, 41 Jyväskylä FINLAND [email protected] Abstract. We have discovered that the

More information

Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23 Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest

More information

INTERPOLATION. Interpolation is a process of finding a formula (often a polynomial) whose graph will pass through a given set of points (x, y).

INTERPOLATION. Interpolation is a process of finding a formula (often a polynomial) whose graph will pass through a given set of points (x, y). INTERPOLATION Interpolation is a process of finding a formula (often a polynomial) whose graph will pass through a given set of points (x, y). As an example, consider defining and x 0 =0, x 1 = π 4, x

More information

Modern Block Cipher Standards (AES) Debdeep Mukhopadhyay

Modern Block Cipher Standards (AES) Debdeep Mukhopadhyay Modern Block Cipher Standards (AES) Debdeep Mukhopadhyay Assistant Professor Department of Computer Science and Engineering Indian Institute of Technology Kharagpur INDIA -721302 Objectives Introduction

More information

Masao KASAHARA. Public Key Cryptosystem, Error-Correcting Code, Reed-Solomon code, CBPKC, McEliece PKC.

Masao KASAHARA. Public Key Cryptosystem, Error-Correcting Code, Reed-Solomon code, CBPKC, McEliece PKC. A New Class of Public Key Cryptosystems Constructed Based on Reed-Solomon Codes, K(XII)SEPKC. Along with a presentation of K(XII)SEPKC over the extension field F 2 8 extensively used for present day various

More information

Cryptography and Network Security. Prof. D. Mukhopadhyay. Department of Computer Science and Engineering. Indian Institute of Technology, Kharagpur

Cryptography and Network Security. Prof. D. Mukhopadhyay. Department of Computer Science and Engineering. Indian Institute of Technology, Kharagpur Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 12 Block Cipher Standards

More information

Network Security Technology Network Management

Network Security Technology Network Management COMPUTER NETWORKS Network Security Technology Network Management Source Encryption E(K,P) Decryption D(K,C) Destination The author of these slides is Dr. Mark Pullen of George Mason University. Permission

More information

Cryptography and Network Security Block Cipher

Cryptography and Network Security Block Cipher Cryptography and Network Security Block Cipher Xiang-Yang Li Modern Private Key Ciphers Stream ciphers The most famous: Vernam cipher Invented by Vernam, ( AT&T, in 1917) Process the message bit by bit

More information

Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key

Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key Julia Juremi Ramlan Mahmod Salasiah Sulaiman Jazrin Ramli Faculty of Computer Science and Information Technology, Universiti Putra

More information

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Introduction to Cryptography What is cryptography?

More information

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No. # 11 Block Cipher Standards (DES) (Refer Slide

More information

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the

More information

Network Security. Chapter 3 Symmetric Cryptography. Symmetric Encryption. Modes of Encryption. Symmetric Block Ciphers - Modes of Encryption ECB (1)

Network Security. Chapter 3 Symmetric Cryptography. Symmetric Encryption. Modes of Encryption. Symmetric Block Ciphers - Modes of Encryption ECB (1) Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Network Security Chapter 3 Symmetric Cryptography General Description Modes of ion Data ion Standard (DES)

More information

Secret File Sharing Techniques using AES algorithm. C. Navya Latha 200201066 Garima Agarwal 200305032 Anila Kumar GVN 200305002

Secret File Sharing Techniques using AES algorithm. C. Navya Latha 200201066 Garima Agarwal 200305032 Anila Kumar GVN 200305002 Secret File Sharing Techniques using AES algorithm C. Navya Latha 200201066 Garima Agarwal 200305032 Anila Kumar GVN 200305002 1. Feature Overview The Advanced Encryption Standard (AES) feature adds support

More information

The Advanced Encryption Standard (AES)

The Advanced Encryption Standard (AES) The Advanced Encryption Standard (AES) Conception - Why A New Cipher? Conception - Why A New Cipher? DES had outlived its usefulness Vulnerabilities were becoming known 56-bit key was too small Too slow

More information

SOLVING POLYNOMIAL EQUATIONS

SOLVING POLYNOMIAL EQUATIONS C SOLVING POLYNOMIAL EQUATIONS We will assume in this appendix that you know how to divide polynomials using long division and synthetic division. If you need to review those techniques, refer to an algebra

More information

Network Security. HIT Shimrit Tzur-David

Network Security. HIT Shimrit Tzur-David Network Security HIT Shimrit Tzur-David 1 Goals: 2 Network Security Understand principles of network security: cryptography and its many uses beyond confidentiality authentication message integrity key

More information

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash

More information

The 128-bit Blockcipher CLEFIA Design Rationale

The 128-bit Blockcipher CLEFIA Design Rationale The 128-bit Blockcipher CLEFIA Design Rationale Revision 1.0 June 1, 2007 Sony Corporation NOTICE THIS DOCUMENT IS PROVIDED AS IS, WITH NO WARRANTIES WHATSOVER, INCLUDING ANY WARRANTY OF MERCHANTABIL-

More information

CIS433/533 - Computer and Network Security Cryptography

CIS433/533 - Computer and Network Security Cryptography CIS433/533 - Computer and Network Security Cryptography Professor Kevin Butler Winter 2011 Computer and Information Science A historical moment Mary Queen of Scots is being held by Queen Elizabeth and

More information

A NEW HASH ALGORITHM: Khichidi-1

A NEW HASH ALGORITHM: Khichidi-1 A NEW HASH ALGORITHM: Khichidi-1 Abstract This is a technical document describing a new hash algorithm called Khichidi-1 and has been written in response to a Hash competition (SHA-3) called by National

More information

EXAM questions for the course TTM4135 - Information Security June 2010. Part 1

EXAM questions for the course TTM4135 - Information Security June 2010. Part 1 EXAM questions for the course TTM4135 - Information Security June 2010 Part 1 This part consists of 6 questions all from one common topic. The number of maximal points for every correctly answered question

More information

Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur

Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Module No. # 01 Lecture No. # 05 Classic Cryptosystems (Refer Slide Time: 00:42)

More information

Ky Vu DeVry University, Atlanta Georgia College of Arts & Science

Ky Vu DeVry University, Atlanta Georgia College of Arts & Science Ky Vu DeVry University, Atlanta Georgia College of Arts & Science Table of Contents - Objective - Cryptography: An Overview - Symmetric Key - Asymmetric Key - Transparent Key: A Paradigm Shift - Security

More information

JUST THE MATHS UNIT NUMBER 1.8. ALGEBRA 8 (Polynomials) A.J.Hobson

JUST THE MATHS UNIT NUMBER 1.8. ALGEBRA 8 (Polynomials) A.J.Hobson JUST THE MATHS UNIT NUMBER 1.8 ALGEBRA 8 (Polynomials) by A.J.Hobson 1.8.1 The factor theorem 1.8.2 Application to quadratic and cubic expressions 1.8.3 Cubic equations 1.8.4 Long division of polynomials

More information

RSA Attacks. By Abdulaziz Alrasheed and Fatima

RSA Attacks. By Abdulaziz Alrasheed and Fatima RSA Attacks By Abdulaziz Alrasheed and Fatima 1 Introduction Invented by Ron Rivest, Adi Shamir, and Len Adleman [1], the RSA cryptosystem was first revealed in the August 1977 issue of Scientific American.

More information

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. #01 Lecture No. #10 Symmetric Key Ciphers (Refer

More information

Network Security. Security. Security Services. Crytographic algorithms. privacy authenticity Message integrity. Public key (RSA) Message digest (MD5)

Network Security. Security. Security Services. Crytographic algorithms. privacy authenticity Message integrity. Public key (RSA) Message digest (MD5) Network Security Security Crytographic algorithms Security Services Secret key (DES) Public key (RSA) Message digest (MD5) privacy authenticity Message integrity Secret Key Encryption Plain text Plain

More information

IT Networks & Security CERT Luncheon Series: Cryptography

IT Networks & Security CERT Luncheon Series: Cryptography IT Networks & Security CERT Luncheon Series: Cryptography Presented by Addam Schroll, IT Security & Privacy Analyst 1 Outline History Terms & Definitions Symmetric and Asymmetric Algorithms Hashing PKI

More information

A PPENDIX H RITERIA FOR AES E VALUATION C RITERIA FOR

A PPENDIX H RITERIA FOR AES E VALUATION C RITERIA FOR A PPENDIX H RITERIA FOR AES E VALUATION C RITERIA FOR William Stallings Copyright 20010 H.1 THE ORIGINS OF AES...2 H.2 AES EVALUATION...3 Supplement to Cryptography and Network Security, Fifth Edition

More information

A New 128-bit Key Stream Cipher LEX

A New 128-bit Key Stream Cipher LEX A New 128-it Key Stream Cipher LEX Alex Biryukov Katholieke Universiteit Leuven, Dept. ESAT/SCD-COSIC, Kasteelpark Arenerg 10, B 3001 Heverlee, Belgium http://www.esat.kuleuven.ac.e/~airyuko/ Astract.

More information

A PPENDIX G S IMPLIFIED DES

A PPENDIX G S IMPLIFIED DES A PPENDIX G S IMPLIFIED DES William Stallings opyright 2010 G.1 OVERVIEW...2! G.2 S-DES KEY GENERATION...3! G.3 S-DES ENRYPTION...4! Initial and Final Permutations...4! The Function f K...5! The Switch

More information

Block encryption. CS-4920: Lecture 7 Secret key cryptography. Determining the plaintext ciphertext mapping. CS4920-Lecture 7 4/1/2015

Block encryption. CS-4920: Lecture 7 Secret key cryptography. Determining the plaintext ciphertext mapping. CS4920-Lecture 7 4/1/2015 CS-4920: Lecture 7 Secret key cryptography Reading Chapter 3 (pp. 59-75, 92-93) Today s Outcomes Discuss block and key length issues related to secret key cryptography Define several terms related to secret

More information

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code

More information

{(i,j) 1 < i,j < n} pairs, X and X i, such that X and X i differ. exclusive-or sums. ( ) ( i ) V = f x f x

{(i,j) 1 < i,j < n} pairs, X and X i, such that X and X i differ. exclusive-or sums. ( ) ( i ) V = f x f x ON THE DESIGN OF S-BOXES A. F. Webster and S. E. Tavares Department of Electrical Engineering Queen's University Kingston, Ont. Canada The ideas of completeness and the avalanche effect were first introduced

More information

Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015

Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015 Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015 Chapter 2: Introduction to Cryptography What is cryptography? It is a process/art of mangling information in such a way so as to make it

More information

Developing and Investigation of a New Technique Combining Message Authentication and Encryption

Developing and Investigation of a New Technique Combining Message Authentication and Encryption Developing and Investigation of a New Technique Combining Message Authentication and Encryption Eyas El-Qawasmeh and Saleem Masadeh Computer Science Dept. Jordan University for Science and Technology P.O.

More information

1 Lecture: Integration of rational functions by decomposition

1 Lecture: Integration of rational functions by decomposition Lecture: Integration of rational functions by decomposition into partial fractions Recognize and integrate basic rational functions, except when the denominator is a power of an irreducible quadratic.

More information

7! Cryptographic Techniques! A Brief Introduction

7! Cryptographic Techniques! A Brief Introduction 7! Cryptographic Techniques! A Brief Introduction 7.1! Introduction to Cryptography! 7.2! Symmetric Encryption! 7.3! Asymmetric (Public-Key) Encryption! 7.4! Digital Signatures! 7.5! Public Key Infrastructures

More information

CSCE 465 Computer & Network Security

CSCE 465 Computer & Network Security CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Public Key Cryptogrophy 1 Roadmap Introduction RSA Diffie-Hellman Key Exchange Public key and

More information

Physical-Layer Security: Combining Error Control Coding and Cryptography

Physical-Layer Security: Combining Error Control Coding and Cryptography 1 Physical-Layer Security: Combining Error Control Coding and Cryptography Willie K Harrison and Steven W McLaughlin arxiv:09010275v2 [csit] 16 Apr 2009 Abstract In this paper we consider tandem error

More information

Factoring. Factoring 1

Factoring. Factoring 1 Factoring Factoring 1 Factoring Security of RSA algorithm depends on (presumed) difficulty of factoring o Given N = pq, find p or q and RSA is broken o Rabin cipher also based on factoring Factoring like

More information

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:

More information

Security Evaluation of the SPECTR-128. Block Cipher

Security Evaluation of the SPECTR-128. Block Cipher pplied Mathematical Sciences, ol. 7,, no. 4, 6945-696 HIKI td, www.m-hikari.com http://dx.doi.org/.988/ams..584 Security Evaluation of the SPECT-8 Block Cipher Manh Tuan Pham, am T. u Posts and Telecommunications

More information

SFLASH v3, a fast asymmetric signature scheme

SFLASH v3, a fast asymmetric signature scheme SFLASH v3, a fast asymmetric signature scheme Specification of SFLASH, version 3.0., 17 October 2003 The authors still recommend SFLASH-v2, see below. Nicolas T. Courtois 1, Louis Goubin 1 and Jacques

More information

A Practical Attack on Broadcast RC4

A Practical Attack on Broadcast RC4 A Practical Attack on Broadcast RC4 Itsik Mantin and Adi Shamir Computer Science Department, The Weizmann Institute, Rehovot 76100, Israel. {itsik,shamir}@wisdom.weizmann.ac.il Abstract. RC4is the most

More information

Cryptanalysis of Grain using Time / Memory / Data Tradeoffs

Cryptanalysis of Grain using Time / Memory / Data Tradeoffs Cryptanalysis of Grain using Time / Memory / Data Tradeoffs v1.0 / 2008-02-25 T.E. Bjørstad The Selmer Center, Department of Informatics, University of Bergen, Pb. 7800, N-5020 Bergen, Norway. Email :

More information

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 [email protected] Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 hmsun@cs.nthu.edu.tw Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室 Network Security 孫 宏 民 [email protected] Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室 Security Attacks Normal flow: sender receiver Interruption: Information source Information destination

More information

Cryptography & Network Security

Cryptography & Network Security Cryptography & Network Security Lecture 1: Introduction & Overview 2002. 3. 27 [email protected] Common Terms(1) Cryptography: The study of mathematical techniques related to aspects of information security

More information

Lagrange Interpolation is a method of fitting an equation to a set of points that functions well when there are few points given.

Lagrange Interpolation is a method of fitting an equation to a set of points that functions well when there are few points given. Polynomials (Ch.1) Study Guide by BS, JL, AZ, CC, SH, HL Lagrange Interpolation is a method of fitting an equation to a set of points that functions well when there are few points given. Sasha s method

More information

Split Based Encryption in Secure File Transfer

Split Based Encryption in Secure File Transfer Split Based Encryption in Secure File Transfer Parul Rathor, Rohit Sehgal Assistant Professor, Dept. of CSE, IET, Nagpur University, India Assistant Professor, Dept. of CSE, IET, Alwar, Rajasthan Technical

More information

Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human

Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human Int Jr of Mathematics Sciences & Applications Vol3, No1, January-June 2013 Copyright Mind Reader Publications ISSN No: 2230-9888 wwwjournalshubcom Mathematical Model Based Total Security System with Qualitative

More information

Symmetric Key cryptosystem

Symmetric Key cryptosystem SFWR C03: Computer Networks and Computer Security Mar 8-11 200 Lecturer: Kartik Krishnan Lectures 22-2 Symmetric Key cryptosystem Symmetric encryption, also referred to as conventional encryption or single

More information

Lecture 4 Data Encryption Standard (DES)

Lecture 4 Data Encryption Standard (DES) Lecture 4 Data Encryption Standard (DES) 1 Block Ciphers Map n-bit plaintext blocks to n-bit ciphertext blocks (n = block length). For n-bit plaintext and ciphertext blocks and a fixed key, the encryption

More information

Multi-Layered Cryptographic Processor for Network Security

Multi-Layered Cryptographic Processor for Network Security International Journal of Scientific and Research Publications, Volume 2, Issue 10, October 2012 1 Multi-Layered Cryptographic Processor for Network Security Pushp Lata *, V. Anitha ** * M.tech Student,

More information

Unknown Plaintext Template Attacks

Unknown Plaintext Template Attacks Unknown Plaintext Template Attacks Neil Hanley, Michael Tunstall 2, and William P. Marnane Department of Electrical and Electronic Engineering, University College Cork, Ireland. [email protected], [email protected]

More information

3-6 Toward Realizing Privacy-Preserving IP-Traceback

3-6 Toward Realizing Privacy-Preserving IP-Traceback 3-6 Toward Realizing Privacy-Preserving IP-Traceback The IP-traceback technology enables us to trace widely spread illegal users on Internet. However, to deploy this attractive technology, some problems

More information

SOLVING SEXTIC EQUATIONS. Raghavendra G. Kulkarni

SOLVING SEXTIC EQUATIONS. Raghavendra G. Kulkarni Atlantic Electronic http://aejm.ca Journal of Mathematics http://aejm.ca/rema Volume 3, Number 1, Winter 2008 pp. 56 60 SOLVING SEXTIC EQUATIONS Raghavendra G. Kulkarni Hybrid Microcircuits Division Bharat

More information

CRYPTOG NETWORK SECURITY

CRYPTOG NETWORK SECURITY CRYPTOG NETWORK SECURITY PRINCIPLES AND PRACTICES FOURTH EDITION William Stallings Prentice Hall Upper Saddle River, NJ 07458 'jkfetmhki^^rij^jibwfcmf «MMr""'-^.;

More information

Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K.

Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K. Cryptosystems Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K. C= E(M, K), Bob sends C Alice receives C, M=D(C,K) Use the same key to decrypt. Public

More information

Analysis of Non-fortuitous Predictive States of the RC4 Keystream Generator

Analysis of Non-fortuitous Predictive States of the RC4 Keystream Generator Analysis of Non-fortuitous Predictive States of the RC4 Keystream Generator Souradyuti Paul and Bart Preneel Katholieke Universiteit Leuven, Dept. ESAT/COSIC, Kasteelpark Arenberg 10, B 3001 Leuven-Heverlee,

More information

MAC. SKE in Practice. Lecture 5

MAC. SKE in Practice. Lecture 5 MAC. SKE in Practice. Lecture 5 Active Adversary Active Adversary An active adversary can inject messages into the channel Active Adversary An active adversary can inject messages into the channel Eve

More information

Message Authentication Codes

Message Authentication Codes 2 MAC Message Authentication Codes : and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 28 October 2013 css322y13s2l08, Steve/Courses/2013/s2/css322/lectures/mac.tex,

More information

CRYPTOGRAPHY IN NETWORK SECURITY

CRYPTOGRAPHY IN NETWORK SECURITY ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can

More information

159.334 Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

159.334 Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology Network Security 1 Professor Richard Harris School of Engineering and Advanced Technology Presentation Outline Overview of Identification and Authentication The importance of identification and Authentication

More information

Cryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g.

Cryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g. Cryptography: Motivation Many areas have sensitive information, e.g. Data Structures and Algorithms Cryptography Goodrich & Tamassia Sections 3.1.3 & 3.1.4 Introduction Simple Methods Asymmetric methods:

More information

FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION

FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION INTRODUCTION GANESH ESWAR KUMAR. P Dr. M.G.R University, Maduravoyal, Chennai. Email: [email protected] Every day, millions of people

More information

Lukasz Pater CMMS Administrator and Developer

Lukasz Pater CMMS Administrator and Developer Lukasz Pater CMMS Administrator and Developer EDMS 1373428 Agenda Introduction Why do we need asymmetric ciphers? One-way functions RSA Cipher Message Integrity Examples Secure Socket Layer Single Sign

More information

Indiana State Core Curriculum Standards updated 2009 Algebra I

Indiana State Core Curriculum Standards updated 2009 Algebra I Indiana State Core Curriculum Standards updated 2009 Algebra I Strand Description Boardworks High School Algebra presentations Operations With Real Numbers Linear Equations and A1.1 Students simplify and

More information

Cryptography and Network Security Chapter 9

Cryptography and Network Security Chapter 9 Cryptography and Network Security Chapter 9 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 9 Public Key Cryptography and RSA Every Egyptian received two names,

More information

Rijndael Encryption implementation on different platforms, with emphasis on performance

Rijndael Encryption implementation on different platforms, with emphasis on performance Rijndael Encryption implementation on different platforms, with emphasis on performance KAFUUMA JOHN SSENYONJO Bsc (Hons) Computer Software Theory University of Bath May 2005 Rijndael Encryption implementation

More information

expression is written horizontally. The Last terms ((2)( 4)) because they are the last terms of the two polynomials. This is called the FOIL method.

expression is written horizontally. The Last terms ((2)( 4)) because they are the last terms of the two polynomials. This is called the FOIL method. A polynomial of degree n (in one variable, with real coefficients) is an expression of the form: a n x n + a n 1 x n 1 + a n 2 x n 2 + + a 2 x 2 + a 1 x + a 0 where a n, a n 1, a n 2, a 2, a 1, a 0 are

More information

Introduction. Where Is The Threat? Encryption Methods for Protecting Data. BOSaNOVA, Inc. Phone: 866-865-5250 Email: [email protected] Web: www.theq3.

Introduction. Where Is The Threat? Encryption Methods for Protecting Data. BOSaNOVA, Inc. Phone: 866-865-5250 Email: info@theq3.com Web: www.theq3. Introduction Within the last ten years, there has been a vast increase in the accumulation and communication of digital computer data in both the private and public sectors. Much of this information has

More information

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES www.arpapress.com/volumes/vol8issue1/ijrras_8_1_10.pdf SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES Malek Jakob Kakish Amman Arab University, Department of Computer Information Systems, P.O.Box 2234,

More information