Presentation is loading. Please wait.

Presentation is loading. Please wait.

Introduction to Information Security Lect. 6: Block Ciphers.

Similar presentations


Presentation on theme: "Introduction to Information Security Lect. 6: Block Ciphers."— Presentation transcript:

1 Introduction to Information Security Lect. 6: Block Ciphers

2 2 Model of Symmetric Cryptosystem E D Shared Secret Key Key K Secure Channel Insecure Channel Plaintext M Ciphertext C Plaintext M Cryptanalyst Adversary M K C = E K (M) D K (C) = M

3 3 Block Cipher – A Simplified View Encryption Function Encryption Key Schedule Input Message (Plaintext) User Key Encryption Round keys Output Message (Ciphertext) Decryption Key Schedule Decryption Round keys Decryption Function E D E D Input Message (Ciphertext) Output Message (Plaintext)

4 4 Most Popular Symmetric Ciphers 1980 1990 2000 2010 2020 2030 DES 3DES AES IDEA RC5 Blowfish CAST Serpent RC6 Twofish Mars 56 bit key 128, 192, 256 bit key 1997 1999 AES contest 2001 American standards Other popular algorithms

5 5 1. Feistel Network

6 6 Feistel-type Ciphers  Feistel network  An elegant variant of S-P networks that could be implemented using a single algorithm for both encryption and decryption  F( ) does not need to be invertible Horst Feistel Horst Feistel is best known for his work on the Feistel network construction – a common method for constructing encryption algorithms. In 1977, he was recognized at the IBM Corporate Technical Recognition Event (CTRE) for "devising a scheme encrypting binary data which is especially significant to IBM products and is the basis for the recently announced Federal Information Processing Standard adopted by the U.S. Commerce Department." His work at IBM led to the development of the pioneering Lucifer and Data Encryption Standards (DES) ciphers, and as a result of his efforts, IBM announced the 3845 and 3846 data encryption devices and the IBM cryptographic subsystem. Feistel earned a bachelor's and a master's degree in physics from MIT and Harvard, respectively. Before joining IBM, he worked with the U.S. Air Force Cambridge Research Center (AFCRC), MIT's Lincoln Laboratory and the Mitre Corporation.

7 7 Block Cipher Architecture : Feistel-type (Encryption) round 1 round 2 round r Plaintext Ciphertext    F F F K1K1 K2K2 KrKr L0L0 R0R0 L1L1 L r-1 R1R1 R r-1 LrLr RrRr

8 8 Block Cipher Architecture : Feistel-type (Decryption) Ciphertext    F F F KrKr K r-1 K1K1 RrRr LrLr R r-1 R1R1 L r-1 L1L1 R0R0 L0L0 Plaintext

9 9 Feistel-type Cipher P = L 0 || R 0 C = R r || L r L 1 = R 0 R r-1 = L r R 1 = L 0  F(K 1, R 0 ) L r-1 = R r  F(K r, R r-1 ) L i = R i-1 R i-1 = L i R i = L i-1  F(K i, R i-1 ) L i-1 = R i  F(K i, R i-1 ) L r = R r-1 R 0 = L 1 R r = L r-1  F(K r, R r-1 ) L 0 = R 1  F(K 1, R 0 ) C = R r || L r P = L 0 || R 0 P = L 0 || R 0 C = R r || L r for i=1 to r for i=r-1 to 0 L i = R i-1 R i = L i+1 R i = L i-1  F(K i, R i-1 ) L i = R i+1  F(K i+1, R i ) C = R r || L r P = L 0 || R 0

10 10 Design of Feistel-type Ciphers  Design of F-function The only non-linear part in the Feistel-type cipher Need not be invertible Typically uses S-boxes (Substitution boxes) for non-linearity May also contain mixing (permutation) part of the S-box outputs Determines the ultimate security  Design of Key scheduling algorithm Algorithm for deriving as many round keys as necessary from a fixed user key On-the-fly vs. off-line calculation  Number of rounds Depends on the strength of round function (F-function) A safety margin should be considered for long-term security Determined through the analysis of the whole algorithm against most powerful known cryptanalysis techniques


Download ppt "Introduction to Information Security Lect. 6: Block Ciphers."

Similar presentations


Ads by Google