Information Security and Management (Abstract) 5

Slides:



Advertisements
Similar presentations
Origins  clear a replacement for DES was needed Key size is too small Key size is too small The variants are just patches The variants are just patches.
Advertisements

Conventional Encryption: Algorithms
Principles of Information Security, 2nd edition1 Cryptography.
History Applications Attacks Advantages & Disadvantages Conclusion.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
AES clear a replacement for DES was needed
1 Pertemuan 06 Kriptografi tradisional Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Computer Networking Lecture 21: Security and Cryptography Thanks to various folks from , semester’s past and others.
Dr Alejandra Flores-Mosri Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the.
CS470, A.SelcukAfter the DES1 Block Ciphers After the DES CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Chapter 2 (D) – Contemporary Symmetric Ciphers "I am fairly familiar with all the forms of secret writings, and am myself the author of a trifling monograph.
AES Proposal: Rijndael Joan Daemen Vincent Rijmen “Rijndael is expected, for all key and block lengths defined, to behave as good as can be expected from.
Lecture 3: Cryptographic Tools modified from slides of Lawrie Brown.
© Neeraj Suri EU-NSF ICT March 2006 DEWSNet Dependable Embedded Wired/Wireless Networks MUET Jamshoro Computer Security: Principles and Practice Slides.
Number Theory and Advanced Cryptography 1. Finite Fields and AES
Chapter 5 –Advanced Encryption Standard "It seems very simple." "It is very simple. But if you don't know what the key is it's virtually indecipherable."
1 Chapter 3 Ciphers Mechanism that decides the process of encryption/decryption Stream Cipher: Bit-by-bit encryption / decryption Block Cipher: Block-by-block.
9/06 Cryptography Block Ciphers after DES Anita Jones CS451 Information Security Copyright(C) Anita Jones.
9/17/15UB Fall 2015 CSE565: S. Upadhyaya Lec 6.1 CSE565: Computer Security Lecture 6 Advanced Encryption Standard Shambhu Upadhyaya Computer Science &
Advance Encryption Standard. Topics  Origin of AES  Basic AES  Inside Algorithm  Final Notes.
3DES and Block Cipher Modes of Operation CSE 651: Introduction to Network Security.
Multiple Encryption & DES  clearly a replacement for DES was needed Vulnerable to brute-force key search attacks Vulnerable to brute-force key search.
Cryptography and Network Security Contemporary Symmetric Ciphers.
Presented by: Dr. Munam Ali Shah
1 Symmetric key cryptography: DES DES: Data Encryption Standard US encryption standard [NIST 1993] 56-bit symmetric key, 64 bit plaintext input How secure.
Chapter 2 (C) –Advanced Encryption Standard. Origins clearly a replacement for DES was needed –have theoretical attacks that can break it –have demonstrated.
Chapter 2 Symmetric Encryption.
Plaintextciphertext encryption algorithmdecryption algorithm plaintext.
© Information Security Group, ICU1 Block Cipher- introduction  DES Description: Feistel, S-box Exhaustive Search, DC and LC Modes of Operation  AES Description:
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
Conventional Encryption Chapter 4. Multiple DES Advantage of extra stages –Each stage gives 56 more bits of key length –Double DES subject to meet-in-the-middle.
Dr. Lo’ai Tawalbeh summer 2007 Chapter 6: Contemporary Symmetric Ciphers Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus INCS.
Fall 2002CS 395: Computer Security1 Chapters 5-6: Contemporary Symmetric Ciphers Triple DES Blowfish AES.
Information Security and Management 11. Cryptographic Hash Functions Chih-Hung Wang Fall
Lecture 4 Data Encryption Standard (DES) Dr. Nermin Hamza
Provides Confidentiality
Triple DES.
School of Computer Science and Engineering Pusan National University
Blowfish Algorithm.
HEY DOUG HOW ARE YOU? NKE JUAM NUC GXK EUA. HEY DOUG HOW ARE YOU? NKE JUAM NUC GXK EUA.
Symmetric Algorithm of Cryptography
Lecture 3: Symmetric Key Encryption
ICS 454 Principles of Cryptography
مروري برالگوريتمهاي رمز متقارن(كليد پنهان)
Cryptography II Jagdish S. Gangolly School of Business
AES Objectives ❏ To review a short history of AES
Advanced Encryption Standard (Symmetric key Algorithm)
Unit 2 “Implementation of a RC5 block cipher algorithm and implementing an attack on it”
Cryptography Team Presentation 1
Security.
ICS 454 Principles of Cryptography
Chapter -3 ADVANCED ENCRYPTION STANDARD & BLOCK CIPHER OPERATION
Advanced Encryption Standard
SYMMETRIC ENCRYPTION.
BlowFish Algorithm.
Advanced Encryption Standard
International Data Encryption Algorithm
Cryptography Lecture 17.
Triple DES Network Security.
Advanced Encryption Standard
Blowfish Encryption Algorithm
Cryptography and Network Security
Presentation transcript:

Information Security and Management (Abstract) 5 Information Security and Management (Abstract) 5. Advanced Encryption Standard 6. Contemporary Symmetric Ciphers Chih-Hung Wang Fall 2011

Famous Symmetric Ciphers AES (Advanced Encryption Standard) Triple DES Other symmetric block ciphers (ex. IDEA、Blowfish、RC5、CAST- 128…etc.)

AES Next generation encryption standard of NIST/FIPS It will replace the use of DES in the following 30 years The sensitive information protected by AES cannot be revealed within 100 years It is selected by the competition from international selection process

Calendar of AES

AES Requirements Block cipher 128-bit block 128/192/256-bit keys It is equal to Triple DES at least on security and is more efficient Provide descriptions and analysis Provide three implementations in two languages (reference and optimized in C,optimized in Java) IF selected, royalty free world wide

The 15 Submission for AES (1)

The 15 Submission for AES (2)

Final AES Selection Rijndael Block cipher with block size 128 bits Accept 128-, 192-, 256-bit length keys Easy to implement in H/W

The Implementation of Crypto Algorithms (W32) http://us.cryptosoft.de/ Different platforms: win16, win32, linux, OS/2,… Triple DES, Rijndael, Safer+, Blowfish, Cast-128, … Old version Crypto++: a C++ Class Library of Cryptographic Primitives Version 5.6.1 (2010/8/9) http://www.cryptopp.com/ Microsoft CryptoAPI

More AES Information NIST AES Homepage AES proposal http://csrc.nist.gov/encryption/aes/ Rijndael Specification Those who are interested in the AES specification (i.e., what will be in the standard) should refer to the Draft FIPS for the AES. Test Values Supporting Documentation Rijndael Developers' Contact Information Rijndael Code: C/C++/Java/Visual Basic FIPS 197 http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf AES proposal http://csrc.nist.gov/archive/aes/rijndael/Rijndael- ammended.pdf

Practice Reading Project Programming/testing Project Rijndael Specification : download from http://csrc.nist.gov/encryption/aes/ Programming/testing Project Download Rijndael source code (C/C++) from Rijndael homepage or other web sites. Modify and refine the source code from web sites such that it can be used to encipher and decipher a message. Write a report that includes the address of web sits, source code and testing results.

Triple DES Double DES

Triple DES Double DES: reduction to a single key It would be possible to find a key K3 such that With 264 possible inputs, how may different mappings? (264)! > (101020) It is reasonable to assume that if DES is used twice with different keys, it will produce one of the many mappings that is not defined by a single application of DES.

Meet-in-the-Middle Attack Works whenever use a cipher twice [DIFF77] Since X = EK1[P] = DK2[C] Attack by encrypting P with all keys and store Then decrypt C with keys and match X value Can show takes O(256) steps

Triple DES Triple DES with two keys C=EK1[DK2[EK1[P]]] P=DK1[EK2[DK1[C]]]

Triple DES Standardized in ANSI X9.17 & ISO 8732 No current known practical attacks The cost of a brute-force key search on triple DES: 2112 (51033) Has been adopted by some Internet applications, eg PGP, S/MIME

Known-Plaintext Attack

Other symmetric block ciphers IDEA International Data Encryption Algorithm A symmetric block cipher developed by Xuejia Lai and James Massey of the Swiss Federal Institute of Technology. One of a number of conventional encryption algorithms that have been proposed in recent years to replace DES. IDEA is included in PGP. 128-bit key to encrypt data in blocks of 64 bits

Other symmetric block ciphers Blowfish A symmetric block cipher developed by Bruce Schneier. Characteristics Fast Compact: can run less than 5K of memory. Simple Variably secure: the key length is variable and can be as long as 448 bits. This allows a tradeoff between higher speed and higher security. 64-bits block cipher

Other symmetric block ciphers RC5 A symmetric encryption algorithm developed by Ron Rivest. Adaptable to processors of different word lengths. Variable number of rounds. Variable-length key Low memory requirement Suitable for smart cards

Comparison