RC6. Marcel Felipe Weschenfelder



Similar documents
CSCE 465 Computer & Network Security

Privacy Preservation and Secure Data Sharing in Cloud Storage

Network Security. Chapter 3 Symmetric Cryptography. Symmetric Encryption. Modes of Encryption. Symmetric Block Ciphers - Modes of Encryption ECB (1)

Cryptography and Network Security

The Advanced Encryption Standard: Four Years On

SeChat: An AES Encrypted Chat

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Network Security. Security. Security Services. Crytographic algorithms. privacy authenticity Message integrity. Public key (RSA) Message digest (MD5)

A Comparative Study Of Two Symmetric Encryption Algorithms Across Different Platforms.

7! Cryptographic Techniques! A Brief Introduction

Cryptography and Network Security Block Cipher

Network Security. Omer Rana

IJESRT. [Padama, 2(5): May, 2013] ISSN:

Cryptography and Network Security. Prof. D. Mukhopadhyay. Department of Computer Science and Engineering. Indian Institute of Technology, Kharagpur

The Advanced Encryption Standard (AES)

Modern Block Cipher Standards (AES) Debdeep Mukhopadhyay

Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key

AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES

Secure Data Storage in Cloud Service using RC5 Algorithm

Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

Lecture 4 Data Encryption Standard (DES)

Efficient Software Implementation of AES on 32-bit Platforms

Rijndael Encryption implementation on different platforms, with emphasis on performance

Block encryption. CS-4920: Lecture 7 Secret key cryptography. Determining the plaintext ciphertext mapping. CS4920-Lecture 7 4/1/2015

A PPENDIX H RITERIA FOR AES E VALUATION C RITERIA FOR

Computer Security: Principles and Practice

The Misuse of RC4 in Microsoft Word and Excel

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

A Study of New Trends in Blowfish Algorithm

Implementation of Full -Parallelism AES Encryption and Decryption

How To Encrypt With A 64 Bit Block Cipher

Split Based Encryption in Secure File Transfer

A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS)

How To Understand And Understand The History Of Cryptography

Design and Verification of Area-Optimized AES Based on FPGA Using Verilog HDL

Network Security Technology Network Management

Cryptographic Algorithms and Key Size Issues. Çetin Kaya Koç Oregon State University, Professor

The Advanced Encryption Standard (AES)

Cryptography and Network Security Chapter 3


Table of Contents. Bibliografische Informationen digitalisiert durch

A NOVEL STRATEGY TO PROVIDE SECURE CHANNEL OVER WIRELESS TO WIRE COMMUNICATION

Network Security: Cryptography CS/SS G513 S.K. Sahay

AStudyofEncryptionAlgorithmsAESDESandRSAforSecurity

Keywords Cloud Computing, CRC, RC4, RSA, Windows Microsoft Azure

Lecture Note 8 ATTACKS ON CRYPTOSYSTEMS I. Sourav Mukhopadhyay

Ahsay Online Backup. Whitepaper Data Security

Side Channel Analysis and Embedded Systems Impact and Countermeasures

The 128-bit Blockcipher CLEFIA Design Rationale

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Data Superhero Online Backup Whitepaper Data Security

Security in IEEE WLANs

Multi-Layered Cryptographic Processor for Network Security

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Chapter 8. Network Security

Common Pitfalls in Cryptography for Software Developers. OWASP AppSec Israel July The OWASP Foundation

DataTrust Backup Software. Whitepaper Data Security. Version 6.8

Developing and Investigation of a New Technique Combining Message Authentication and Encryption

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES

SHA3 WHERE WE VE BEEN WHERE WE RE GOING

Design and Analysis of Parallel AES Encryption and Decryption Algorithm for Multi Processor Arrays

Evaluating The Performance of Symmetric Encryption Algorithms

Message Authentication

F3 Symmetric Encryption

Secret File Sharing Techniques using AES algorithm. C. Navya Latha Garima Agarwal Anila Kumar GVN

Polymorphic AES Encryption Implementation

CIS433/533 - Computer and Network Security Cryptography

Survey on Enhancing Cloud Data Security using EAP with Rijndael Encryption Algorithm

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

BestCrypt Volume Encryption Enterprise Edition. Administrator Guide

CrypTool Claudia Eckert / Thorsten Clausius Bernd Esslinger / Jörg Schneider / Henrik Koy

Evaluation of the RC4 Algorithm for Data Encryption

Data Security and Privacy in Cloud using RC6 Algorithm for Remote Data Back-up Server

Salsa20/8 and Salsa20/12

A Survey on Performance Analysis of DES, AES and RSA Algorithm along with LSB Substitution Technique

How to Break MD5 and Other Hash Functions

Disk encryption... (not only) in Linux. Milan Brož

Hardware Implementations of RSA Using Fast Montgomery Multiplications. ECE 645 Prof. Gaj Mike Koontz and Ryon Sumner

ELECTENG702 Advanced Embedded Systems. Improving AES128 software for Altera Nios II processor using custom instructions

Mathematics of Internet Security. Keeping Eve The Eavesdropper Away From Your Credit Card Information

Key Hopping A Security Enhancement Scheme for IEEE WEP Standards

Password-based encryption in ZIP files

CS 758: Cryptography / Network Security

Symantec Corporation Symantec Enterprise Vault Cryptographic Module Software Version:

A PPENDIX G S IMPLIFIED DES

Today. Network Security. Crypto as Munitions. Crypto as Munitions. History of Cryptography

A New Digital Encryption Scheme: Binary Matrix Rotations Encryption Algorithm

FIPS Security Policy LogRhythm Log Manager

A NEW DNA BASED APPROACH OF GENERATING KEY-DEPENDENT SHIFTROWS TRANSFORMATION

Hash Function JH and the NIST SHA3 Hash Competition

IT Networks & Security CERT Luncheon Series: Cryptography

Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography

Transcription:

RC6 Marcel Felipe Weschenfelder

Introduction Operations Algorithm Performance Crypto analyse Highlight/lowlight Conclusion References Agenda

RC6 Introduction Designed by: Ron Rivest, Matt Robshaw, Ray Sidney, and Yiqun Lisa Yin Symmetric key block cipher derived from RC5 First published: 1998 One of the five finalists of AES Also submitted to the NESSIE and CRYPTREC projects Proprietary algorithm, patented by RSA Security

RC6 Introduction Structure: Feistel network Block size of 128 bits Supports key sizes of 128, 192 and 256 bits Rounds: 20 Can be parameterized (RC6 w/r/b) to support a wide variety of word lengths, key sizes and number of rounds Similar to RC5: using data dependent rotations, modular addition and XOR operations Multiplication operation

Operations A + B : adição módulo 2 w A B : subtração módulo 2 w A x B : multiplicação módulo 2 w A B : ou exclusivo A <<< B : rotação circular de A para a esquerda de B bits A >>> B : rotação circular de A para a direita de B bits

Key schedule for RC6 w/r/b Input: User supplied b byte key preloaded into the c word array L[0,..., c 1] Number r of rounds Output: w bit round keys S[0,..., 2r + 3] Procedure: S[0] = B7E15163 for i = 1 to 2r + 3 do S[i] = S[i 1] + 9E3779B9 A = B = i = j = 0 v = 3 max{c, 2r + 4} for s = 1 to v do { A = S[i] = (S[i] + A + B)<<<3 B = L[j] = (L[j] + A + B)<<<(A + B) i = (i + 1) mod (2r + 4) j = (j + 1) mod c }

Encryption with RC6 w/r/b Input: Output: Plaintext stored in four w bit input registers A,B,C,D Number r of rounds w bit round keys S[0,..., 2r + 3] Cipher text stored in A,B,C,D Procedure: B = B + S[0] D = D + S[1] for i = 1 to r do { t = (B (2B + 1))<<<lg w u = (D (2D + 1))<<<lg w A = ((A t)<<<u) + S[2i] C = ((C u)<<<t) + S[2i + 1] (A,B,C,D) = (B,C,D,A) } A = A + S[2r + 2] C = C + S[2r + 3]

Decryption with RC6 w/r/b Input: Output: Cipher text stored in four w bit input registers A,B,C,D Number r of rounds w bit round keys S[0,..., 2r + 3] Plaintext stored in A,B,C,D Procedure: C = C S[2r + 3] A = A S[2r + 2] for i = r downto 1 do { (A,B,C,D) = (D, A,B,C) u = (D (2D + 1))<<<lg w t = (B (2B + 1))<<<lg w C = ((C S[2i + 1])>>>t) u A = ((A S[2i])>>>u) t } D = D S[1] B = B S[0]

Desempenho Implementações em linguagem C em computadores de 32 bits a 200MHz atingem velocidades na ordem de 5 Mbytes/sec

Desempenho

RC6 x Rijndael Thesamesecuritylevel Rijndael is more easy to implement in hardware Rijndael has better performance in a 8 bit processor RC6 small memory requirements Pentium II, Pentium Pro, Pentium III, and PowerPC. In C implementations, and handoptimized assembly on these processors, RC6 generally out performs Rijndael.

Criptoanálise

Criptoanálise

Criptoanálise CHAVE No known weaknesses No Known weak keys No known related key attacks Round keys appear to be a random function of the supplied key

Criptoanálise The more advanced attacks of differential and linear cryptanalysis, while being feasible on small round versions of the cipher, do not extend to attacking the full 20 round RC6 cipher.

Highlight Nenhuma fraqueza no design. Design simples Mais seguro contra criptoanalise que RC5 Mais veloz que RC5 Adequado para implementacoes em hardware e software

Lowlight On 8 bit processors, RC6 does not generally perform as well as some of the other AES finalists. The key schedule and the use of multiplication added some complexity to hardware implementations and impacted hardware performance pequena margem de segurança (com poucas rodadas)

Applications Best Crypto electronic data protection in smartphones. It provides you with a user friendly graphical interface for encrypting and decrypting your sensitive data. Encrypt Easy secure file encryption (67 encryption algorithms) program enabling fast and simple one click encryption. The program allows encryption and decryption of single files, folders and entire directory trees. Integrated with windows explorer.

References [An] Ron Rivest, Further notes on RC6, http://theory.lcs.mit.edu/~rivest/rc6 notes.txt Wikipedia May 2007 http://en.wikipedia.org/wiki/rc6 RC6 Block Cipher on RSA web page May 2007 http://www.rsa.com/rsalabs/node.asp?id=2512 The RC6 Block Cipher: A simple fast secure AES proposal http://csrc.nist.gov/encryption/aes/round1/conf1/rc6 slides.pdf S. Contini, R.L. Rivest, M.J.B. Robshaw, and Y.L. Yin. The security of RC6. August 20, 1998. Available at www.rsasecurity.com/rsalabs/aes/ Ronald R. Rives Home Page http://people.csail.mit.edu/rivest/ RC6 and the AES M.J.B. Robshaw 16d Stowe Rd, London, W12 8BN, UK. January 9, 2001