Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 Symmetric-Key Encryption CSE 5351: Introduction to Cryptography Reading assignment: Chapter 3 Read sections 3.1-3.2 first (skipping 3.2.2)

Similar presentations


Presentation on theme: "1 Symmetric-Key Encryption CSE 5351: Introduction to Cryptography Reading assignment: Chapter 3 Read sections 3.1-3.2 first (skipping 3.2.2)"— Presentation transcript:

1 1 Symmetric-Key Encryption CSE 5351: Introduction to Cryptography Reading assignment: Chapter 3 Read sections 3.1-3.2 first (skipping 3.2.2)

2 2

3 3

4 4

5 5

6 6

7 7

8 8

9 9

10 10

11 11

12 12

13 13

14 Pseudorandom Generators and Stream Ciphers Encryption schemes using pseudorandom generators K&L: Section 3.3 14

15 15

16 16

17 17

18 18

19 19

20 20

21 21

22 22

23 23

24 24

25 25

26 26

27 27

28 28

29 29

30 30

31 31

32 32

33 33

34 34

35 35

36 36

37 37

38 38

39 Security of RC4 RC4 is not a truly pseudorandom generator. The key stream generated by RC4 is biased. –The second byte is biased toward zero with high probability. –The first few bytes are strongly non-random and leak information about the input key. Defense: discard the initial n bytes of the keystream. –Called “RC4-drop[n-bytes]”. –Recommended values for n = 256, 768, or 3072 bytes. Efforts are under way (e.g. the eSTREAM project) to develop more secure stream ciphers. 39

40 The Use of RC4 in WEP WEP is an RC4-based protocol for encrypting data transmitted over an IEEE 802.11 wireless LAN. WEP requires each packet to be encrypted with a separate RC4 key. The RC4 key for each packet is a concatenation of a 40-bit or 104-bit long-term key and a random 24-bit R. 40 l RC4 key: Long-term key (40 or 104 bits) R (24) l Header R Message CRC encrypted 802.11 Frame:

41 WEP is not secure Mainly because of its way of constructing the key Can be cracked in a minute http://eprint.iacr.org/2007/120.pdf 41

42 Stronger Security Notions K&L: Section 3.4 42

43 43

44 44

45 45

46 46

47 47

48 48

49 49

50 50

51 51

52 52

53 Constructing CPA-Secure Encryption Schemes K&L: Section 3.5 53

54 54

55 55

56 56

57 57

58 58

59 59

60 60

61 61

62 62

63 63

64 64

65 65

66 66

67 67

68 Modes of Operations K&L: Section 3.6.2 68

69 69

70 70

71 71

72 Counter Mode (CTR) 72

73 73

74 Output feedback 74

75 75

76 How is Cipher Feedback (CFB) different from OFB? 76

77 77

78 Cipher block chaining (CBC) 78

79 Chained CBC 79

80 80

81 81

82 82

83 Electronic Code Book (ECB) 83

84 84

85 Chosen-Ciphertext Attacks K&L Section 3.7 85

86 86

87 87

88 88

89 89

90 90

91 Padding-Oracle Attack: a concrete example of (partial) chosen-ciphertext attacks K&L Section 3.7.2 91

92 92

93 93

94 94

95 95

96 96

97 97


Download ppt "1 Symmetric-Key Encryption CSE 5351: Introduction to Cryptography Reading assignment: Chapter 3 Read sections 3.1-3.2 first (skipping 3.2.2)"

Similar presentations


Ads by Google