Download presentation

Presentation is loading. Please wait.

Published byElsa Stiller Modified over 3 years ago

1
CMSC 414 Computer and Network Security Lecture 4 Jonathan Katz

2
Announcements HW1 out –Work in teams of two students Both students should contribute to all problems Material covered on HW1 is fair game for the exam –Post on Piazza if you are looking for a partner Assigned reading on course syllabus

3
Review If we want perfect secrecy, we face several inherent limitations –Key as long as the message –Key used only once –Not secure against chosen-plaintext attacks Computational secrecy offers the potential to circumvent these limitations E.g., the pseudo-one-time pad

4
Stream ciphers Basically PRNGs Popular ones: –RC4 –A5/1 Used for GSM cellphone encryption Not very secure –Block ciphers can also be turned into stream ciphers

5
Note Which drawbacks of the one-time pad does the pseudo-OTP address? What is the “right” threat model? –Multiple messages or a single message? –Passive/active adversary? –Ciphertext-only, known-plaintext, chosen-plaintext, chosen-ciphertext, … The threat model matters! –The classical encryption schemes we have seen are immediately broken by a known-plaintext attack

6
Attack taxonomy So far, we have been considering only passive eavesdropping of a single ciphertext –aka, ciphertext-only attack In practice, stronger attacks need to be considered –Known-plaintext attacks –Chosen-plaintext attacks (CPA-security) Implies security for multiple messages encrypted using the same key –Chosen-ciphertext attacks (by default, encompasses chosen-plaintext attacks)

7
Definitions? kk c = Enc k (m) I know the message m is either m 0 or m 1, but which one? Ciphertext-only attack m1m1 Enc k (m 1 ) m2m2 Enc k (m 2 ) Known/chosen-plaintext attack Chosen-ciphertext attack c’ Dec k (c’)

8
Chosen-plaintext security Is the definition too strong? Voting example: Midway example Voters c Enc k (Obama) Enc k (McCain)

9
Chosen-plaintext security Is security against chosen-plaintext attacks even possible?? Deterministic encryption schemes cannot be secure against chosen-plaintext attacks –Nor can they be secure for encrypting multiple messages To be secure against chosen-plaintext attack, encryption must be randomized Moral: always use randomized encryption!

10
Minimum requirements The minimum level of security nowadays is security against chosen-plaintext attacks –Implies security when multiple messages encrypted Security against chosen-ciphertext attacks (or even stronger) is often necessary –Make sure you are aware of this when deploying encryption! We will revisit this issue after discussing message authentication

11
Block ciphers Keyed, invertible permutation F –F is a deterministic function Large key space, large block length Indistinguishable from a random permutation A block cipher is not an encryption scheme –A block cipher can be used to build an encryption scheme (and other things as well) Example – the “trivial” encryption scheme: –C = F K (m) –This is not randomized…

12
Encryption from block ciphers Enc k (m) =, for random r –Randomized! Theorem: If F is a secure block cipher, this is CPA-secure –Proof sketch…

13
Data Encryption Standard (DES) Developed in 1970s by IBM / NSA / NBS –Non-public design process 56-bit key, 64-bit block length –A 64-bit key is derived from 56 random bits –One bit in each octet is a parity-check bit The short key length is a major concern… The short block length is also a concern

14
Concerns about DES Short key length –DES “cracker”, built for $250K, can break DES in days –Computation can be distributed to make it faster –Does not mean “DES is insecure”; depends on desired security Short block length –Repeated blocks happen “too frequently” Some (theoretical) attacks have been found –Claimed known to DES designers 15 years before public discovery! Non-public design process

15
3DES/triple-DES Expands the key length Now, key K = (K 1, K 2 ); |K| = 112 –Still has the short block length The new block cipher is just: –E K1, K2 (m) = DES K1 (DES -1 K2 (DES K1 (m))) This is a permutation, and invertible Fairly slow…but widely used in practice –Backward compatibility

16
Adv. Encryption Standard (AES) Public contest sponsored by NIST in ’97 –15 candidates submitted –Narrowed to 5 finalists in ’99 –Winner selected in 2000 –Entire contest open; intense cryptanalytic effort Supports 128/192/256-bit keys (“default” is 128- bit keys) and 128-bit block length –2 128 is a huge number Number of nanoseconds since big bang (estimate): ~2 90 Both efficiency and security taken into account –The “most secure” finalist was not the one chosen

17
Other block ciphers? No compelling reason to use anything but AES –Unless (possibly) you have very severe performance requirements –Even then, think twice In particular, AES (possibly in stream cipher mode) is usually a better choice than a dedicated stream cipher

Similar presentations

OK

CS555Spring 2012/Topic 31 Cryptography CS 555 Topic 3: One-time Pad and Perfect Secrecy.

CS555Spring 2012/Topic 31 Cryptography CS 555 Topic 3: One-time Pad and Perfect Secrecy.

© 2018 SlidePlayer.com Inc.

All rights reserved.

To ensure the functioning of the site, we use **cookies**. We share information about your activities on the site with our partners and Google partners: social networks and companies engaged in advertising and web analytics. For more information, see the Privacy Policy and Google Privacy & Terms.
Your consent to our cookies if you continue to use this website.

Ads by Google

Ppt on council of ministers kuwait Ppt on internet services download Ppt on aircraft landing gear Ppt on adaptation of animals due to climatic conditions Ppt on dry cell and wet cell battery Ppt on disk formatting software A ppt on refraction of light Ppt on world book day books Ppt on afforestation and deforestation 3d holographic display ppt online