Block encryption. CS-4920: Lecture 7 Secret key cryptography. Determining the plaintext ciphertext mapping. CS4920-Lecture 7 4/1/2015



Similar documents
CSCE 465 Computer & Network Security

How To Encrypt With A 64 Bit Block Cipher

Cryptography and Network Security

How To Understand And Understand The History Of Cryptography

Cryptography and Network Security Block Cipher

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Network Security. Security. Security Services. Crytographic algorithms. privacy authenticity Message integrity. Public key (RSA) Message digest (MD5)


Cryptography and Network Security Chapter 3

Lecture 4 Data Encryption Standard (DES)

Properties of Secure Network Communication

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

1 Data Encryption Algorithm

Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015

Developing and Investigation of a New Technique Combining Message Authentication and Encryption

Network Security. Omer Rana

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

CIS433/533 - Computer and Network Security Cryptography

Application Layer (1)

Network Security. Chapter 3 Symmetric Cryptography. Symmetric Encryption. Modes of Encryption. Symmetric Block Ciphers - Modes of Encryption ECB (1)

AStudyofEncryptionAlgorithmsAESDESandRSAforSecurity

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Network Security - ISA 656 Introduction to Cryptography

Cryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g.

Overview of Symmetric Encryption

6 Data Encryption Standard (DES)

MAC. SKE in Practice. Lecture 5

Table of Contents. Bibliografische Informationen digitalisiert durch

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

Keywords Web Service, security, DES, cryptography.

Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key

Network Security Technology Network Management

Symmetric Key cryptosystem

Today. Network Security. Crypto as Munitions. Crypto as Munitions. History of Cryptography

Ky Vu DeVry University, Atlanta Georgia College of Arts & Science

Cyber Security Workshop Encryption Reference Manual

Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur

Evaluation of the RC4 Algorithm for Data Encryption

EXAM questions for the course TTM Information Security May Part 1

A PPENDIX H RITERIA FOR AES E VALUATION C RITERIA FOR

Secret File Sharing Techniques using AES algorithm. C. Navya Latha Garima Agarwal Anila Kumar GVN

Lecture 9: Application of Cryptography

{(i,j) 1 < i,j < n} pairs, X and X i, such that X and X i differ. exclusive-or sums. ( ) ( i ) V = f x f x

CS 758: Cryptography / Network Security

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

A Comparative Study Of Two Symmetric Encryption Algorithms Across Different Platforms.

Chapter 8. Network Security

How To Attack A Block Cipher With A Key Key (Dk) And A Key (K) On A 2Dns) On An Ipa (Ipa) On The Ipa 2Ds (Ipb) On Pcode)

CSE/EE 461 Lecture 23

Talk announcement please consider attending!

A PPENDIX G S IMPLIFIED DES

NOORUL ISLAM COLLEGE OF ENGINEERING,KUMARACOIL. ME COMPUTER SCIENCE AND ENGG CS1629 -NETWORK SECURITY

Introduction. Where Is The Threat? Encryption Methods for Protecting Data. BOSaNOVA, Inc. Phone: Web:

Error oracle attacks and CBC encryption. Chris Mitchell ISG, RHUL

A Study of New Trends in Blowfish Algorithm

Lecture Note 8 ATTACKS ON CRYPTOSYSTEMS I. Sourav Mukhopadhyay

Split Based Encryption in Secure File Transfer

Digital Rights Management and Code Obfuscation. Amit Sethi

A NEW DNA BASED APPROACH OF GENERATING KEY-DEPENDENT SHIFTROWS TRANSFORMATION

Network Security. Modes of Operation. Steven M. Bellovin February 3,

Cryptography Lecture 8. Digital signatures, hash functions

The Advanced Encryption Standard: Four Years On

Lecture 9 - Network Security TDTS (ht1)

Message Authentication

CRYPTOGRAPHY IN NETWORK SECURITY

Sandeep Mahapatra Department of Computer Science and Engineering PEC, University of Technology

Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

Security in Distributed Systems. Network Security

Application Layer (1)

Fundamentals of Computer Security

: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and its Modified Version using Digital Images

How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and

A NOVEL STRATEGY TO PROVIDE SECURE CHANNEL OVER WIRELESS TO WIRE COMMUNICATION

AC76/AT76 CRYPTOGRAPHY & NETWORK SECURITY DEC 2014

CSE331: Introduction to Networks and Security. Lecture 20 Fall 2006

7! Cryptographic Techniques! A Brief Introduction

Chapter 23. Database Security. Security Issues. Database Security

Hash Functions. Integrity checks

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES

A Survey on Performance Analysis of DES, AES and RSA Algorithm along with LSB Substitution Technique

SeChat: An AES Encrypted Chat

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES

IT Networks & Security CERT Luncheon Series: Cryptography

Cryptography & Network Security

Network Security: Cryptography CS/SS G513 S.K. Sahay

The Advanced Encryption Standard (AES)

CSC474/574 - Information Systems Security: Homework1 Solutions Sketch

Overview/Questions. What is Cryptography? The Caesar Shift Cipher. CS101 Lecture 21: Overview of Cryptography

F3 Symmetric Encryption

Lecture 9 - Message Authentication Codes

The Misuse of RC4 in Microsoft Word and Excel

Transcription:

CS-4920: Lecture 7 Secret key cryptography Reading Chapter 3 (pp. 59-75, 92-93) Today s Outcomes Discuss block and key length issues related to secret key cryptography Define several terms related to secret key cryptography Describe and evaluate DES, focusing on both design and implementation issues Explain some uses of one-time pads with RC4 as a representative example 1 Block encryption Block algorithms Take a fixed-length message block... size? Short block problem (e.g., monoalphabetic cipher) Too easy to make <plaintext, ciphertext> table 64-bit blocks are commonly used Longer is merely inconvenient, once security is established Take a fixed-length key 56 bits for DES, 128 for IDEA, typically 64 bits Generate a ciphertext block equal in length to the input block 2 Determining the plaintext ciphertext mapping Want a random-looking mapping So a few <pt, ct> pairs cannot be used to infer the key without exhaustive search Consider Caesar cipher vs. monoalphabetic For 64 bits, there are 2 64! 1-to-1 random mappings Nearly 2 70 bits needed this key is too long Random-looking vs. random, various tests... Single bit input change results in an apparently unrelated output Roughly half of the bits are different We can get random-looking output with much shorter, practical keys... 3 Eric Durant, PhD, MBA 1

Evading cryptanalysis by spreading input effects Substitution A separate output for each input Random tables reasonable for 8 bits (2 8 entries) But not 64 bits (2 64 entries) Takes (nearly) k 2 k bits Bits per entry entries Permutation Spreads the influence of bits throughout the block Let LSBs affect any bits, not just other LSBs Random, reversible, reordering Takes (nearly) k log 2 k bits Entries cost to encode a position 4 A round: substitution followed by permutation Choose a reasonable number of rounds Too few: can see patterns and attack Too many: inefficient Reversible Everything done can be undone If we know the permutations and substitutions 5 General block encryption, not DES in particular 6 Eric Durant, PhD, MBA 2

DES (Data Encryption Standard) 1977 National Bureau of Standards (now NIST) 56-bit key, 64-bit I/O blocks Key appears as 64 bits But LSB of each byte is an odd-parity bit Consensus is no practical value to this use of parity Reasonable encryption speeds on standard CPUs Roughly 60 kb/s per 1000 MIP, varying with architecture and implementation Much more efficient with custom hardware Some features of DES do not add to security, but make software implementations inefficient 7 Breaking DES 1977 ~$20M hardware to find a key in 12 hours 1998 <$250k to find a key in 4.5 days Triple DES (Chapter 4) E EDE, D DED Keying option 2, K1=K3 Believed to be 2 56 times harder to break Prevents meet-in-the-middle attack Secure for foreseeable future 2010 112 80-bit chosen plaintext attack per NIST 8 DES Overview 64-bit input through fixed permutation 56-bit key generates 16, 48-bit keys for 16 rounds Round processing 16 64-bit input and output, 48-bit key Swap halves Final permutation (inverse of initial) Decryption: just reverse the steps 9 Eric Durant, PhD, MBA 3

10 Initial and final permutations 64-bit to 64-bit See book, pages 66-67 Do not add security value Since they are fixed and occur at the very beginning and end Just to make software implementation on a general CPU less efficient? 11 Generating the per-round keys 56-bit key is passed through a fixed permutation Again, no security value The two 28-bit halves are called C 0 and D 0 Rounds 1-16 Left rotate C and D each by 1 (round 1, 2, 9, 16) or 2 bits The rotations go full circle (1 4 + 2(16-4) = 28) C and D are permuted (with 4 bits discarded) to generate the 2 halves of the 48-bit round key These permutations are believed to have security value Less locality in the round keys 12 Eric Durant, PhD, MBA 4

13 DES round (see Figure) Block divided into 2, 32-bit halves L n and R n L n+1 = R n R n+1 = L n mangler(r n, K n ) Decryption: reverse process Need L n. Reverse mangler? No (elegant design)... Use, A B B = A L n = R n+1 mangler(r n, K n ) R n and K n are known 14 15 Eric Durant, PhD, MBA 5

The mangler Purpose: scramble the data based on the round key Also called the Feistel function Inputs: R n (32-bit data block), K n (48-bit round key) Output: Mangled 32-bit block Processing Expand R n to 48 bits Take 8, 6-bit chunks that overlap by 2 bits bits -1 through 4, 3 through 8,... (Expanded R n ) K n Map each 6-bit chunk to a 4-bit chunk Separate table for each of the 8 chunks (S-boxes) Center 4 bits are based on the data 2 edge bits select 1 of 4 subtables for each chunk Permute the final 32-bit quantity Security value: bit spreading for next round, good randomness property 16 Weak and semi-weak keys 4 of the 2 56 keys are weak All 0s or 1s in C 0 and D 0 They are their own inverses Encrypting with a key is the same as decrypting with its inverse 12 more are semi-weak Alternating 1010 or 0101 in C 0 and/or D 0 The inverse of each is in the set of 12 17 DES Issues Design process was secret Were the S-boxes chosen to be weak? 1991: Swapping box 3 with 7 makes DES about an order of magnitude less secure Admittedly specific, unlikely attack To address this secret weakness concern Many cryptographic algorithms choose their random numbers based on demonstrable methods E.g., digits of π 18 Eric Durant, PhD, MBA 6

RC4 One-time pad a long (pseudo)random string used to encrypt a message Use one time theoretically very secure But, how do we generate? Pseudorandom Passes many/all tests for randomness Distribution, correlation with previous samples (overall or of particular bits),... Generated by algorithm predictable if you know algorithm/key Stream cipher apply one-time pad to a stream of plaintext RC4 (page 93) Simple algorithm generating a 1-time pad based on a key of 1 to 256 bytes 258 bytes of state information Also useful for generating pseudorandom numbers 19 Eric Durant, PhD, MBA 7