Lecture 2.2: Private Key Cryptography II

Slides:



Advertisements
Similar presentations
6.1.2 Overview DES is a block cipher, as shown in Figure 6.1.
Advertisements

CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
1 Lecture 3: Secret Key Cryptography Outline concepts DES IDEA AES.
Cryptography and Network Security Chapter 3
Rachana Y. Patil 1 Data Encryption Standard (DES) (DES)
Data Encryption Standard (DES)
Lecture 3.3: Public Key Cryptography III CS 436/636/736 Spring 2012 Nitesh Saxena.
Cryptography and Network Security
DES 1 Data Encryption Standard DES 2 Data Encryption Standard  DES developed in 1970’s  Based on IBM Lucifer cipher  U.S. government standard  DES.
ICS 454: Principles of Cryptography
Computer Networking Lecture 21: Security and Cryptography Thanks to various folks from , semester’s past and others.
CS Network Security Lecture 2 Prof. Katz. 9/7/2000Lecture 2 - Data Encryption2 DES – Data Encryption Standard Private key. Encrypts by series of.
Lecture 2.2: Private Key Cryptography II CS 436/636/736 Spring 2012 Nitesh Saxena.
Chapter 3 – Block Ciphers and the Data Encryption Standard
CSE 651: Introduction to Network Security
Data Encryption Standard (DES). Symmetric Cryptography  C = E(P,K)  P = D(C,K)  Requirements  Given C, the only way to obtain P should be with  the.
Network Security Lecture 14 Presented by: Dr. Munam Ali Shah.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
Cryptography Chapter 7 Part 2 Pages 781 to 812. Symmetric Cryptography Secret Key Figure 7-10 on page 782 Key distribution problem – Secure courier Many.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Lecture 23 Symmetric Encryption
Fifth Edition by William Stallings
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Lecture 3 Overview. Ciphers The intent of cryptography is to provide secrecy to messages and data Substitutions – ‘hide’ letters of plaintext Transposition.
CSE 5/7353 – January 25 th 2006 Cryptography. Conventional Encryption Shared Key Substitution Transposition.
Lecture 4 Data Encryption Standard (DES) Dr. Nermin Hamza
CS480 Cryptography and Information Security
Lecture 2: Private Key Cryptography II CS 436/636/736 Spring 2016 Nitesh Saxena.
Chapter3: Block Ciphers and the Data Encryption Standard
DATA ENCRYPTION STANDARD (DES)
Triple DES.
6b. Practical Constructions of Symmetric-Key Primitives.
Understanding Cryptography – A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl Chapter 3 – The Data Encryption.
Data Encryption Standard
Topics discussed in this section: 30-2 SYMMETRIC-KEY CRYPTOGRAPHY Symmetric-key cryptography started thousands of years ago when people needed.
Chapter-2 Classical Encryption Techniques.
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Lecture 2: Cryptography I
Lecture 3: Symmetric Key Encryption
Networks and Communication Systems Department
NET 311 Information Security
Cryptography after DES
Symmetric Key Block Ciphers
Cryptography and Network Security Chapter 3
مروري برالگوريتمهاي رمز متقارن(كليد پنهان)
PART VII Security.
ICS 454: Principles of Cryptography
Fifth Edition by William Stallings
Block Ciphers and the Data Encryption Standard (DES)
Algorithm Types & Algorithm Modes
ADVANCED ENCRYPTION STANDARDADVANCED ENCRYPTION STANDARD
Chapter -2 Block Ciphers and the Data Encryption Standard
Advanced Encryption Standard
DES (Data Encryption Standards)
Chapter -4 STREAM CIPHERS
Advanced Encryption Standard
Introduction to Cryptography I
DES (Data Encryption Standard)
Cryptography and Network Security Chapter 5 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
DATA ENCRYPTION STANDARD (DES)
Cryptography Lecture 17.
Florida State University
ICS 555: Block Ciphers & DES Sultan Almuhammadi.
Advanced Encryption Standard
Data Encryption Standard (DES)
Presentation transcript:

Lecture 2.2: Private Key Cryptography II 9/19/2018 Lecture 2.2: Private Key Cryptography II CS 436/636/736 Spring 2013 Nitesh Saxena

Today’s fun/informative bit – The Smudge Attack 9/19/2018 Today’s fun/informative bit – The Smudge Attack See: http://www.usenix.org/event/woot10/tech/full_papers/Aviv.pdf 9/19/2018 Lecture 2.2 - Private Key Cryptography II

Course Administration 9/19/2018 Course Administration Everything seems to be under control  Any questions? 9/19/2018 Lecture 2.2 - Private Key Cryptography II

Outline of today’s lecture 9/19/2018 Outline of today’s lecture Block Ciphers Data Encryption Standard (DES) 9/19/2018 Lecture 2.2 - Private Key Cryptography II

Block Ciphers and Stream Ciphers 9/19/2018 Block Ciphers and Stream Ciphers Block ciphers partition plaintext into blocks and encrypt each block independently (with the same key) to produce ciphertext blocks. A stream cipher generates a keystream and encrypts by combining the keystream with the plaintext, usually with the bitwise XOR operation. We will focus mostly on Block Ciphers 9/19/2018 Lecture 2.2 - Private Key Cryptography II

DES – Data Encryption Standard 9/19/2018 DES – Data Encryption Standard Encrypts by series of substitution and transpositions. Based on Feistel Structure Worldwide standard for more than 20 years. Designed by IBM (Lucifer) with later help from NSA. No longer considered secure for highly sensitive applications. Replacement standard AES (advanced encryption standard) recently completed. 9/19/2018 Lecture 2.2 - Private Key Cryptography II

DES – Overview (Block Operation) 9/19/2018 DES – Overview (Block Operation) 9/19/2018 Lecture 2.2 - Private Key Cryptography II

9/19/2018 DES – Each Round 9/19/2018

Lecture 2.2 - Private Key Cryptography II 9/19/2018 DES – Function F 9/19/2018 Lecture 2.2 - Private Key Cryptography II

Lecture 2.2 - Private Key Cryptography II 9/19/2018 DES – Key Schedule (KS) 9/19/2018 Lecture 2.2 - Private Key Cryptography II

Operation Tables of DES: Key Schedule, PC-1, PC-2 9/19/2018 Operation Tables of DES: Key Schedule, PC-1, PC-2 9/19/2018 Lecture 2.2 - Private Key Cryptography II

Operation Tables (IP, IP-1, E and P) 9/19/2018 Operation Tables (IP, IP-1, E and P) 9/19/2018 Lecture 2.2 - Private Key Cryptography II

S-boxes: S1 (as an example) 9/19/2018 S-boxes: S1 (as an example) 0000 0001 0010 0011 0100 0101 0110 0111 1000 1001 1010 1011 1100 1101 1110 1111 00 01 10 11 Is the table entry from 9/19/2018 Lecture 2.2 - Private Key Cryptography II

Lecture 2.2 - Private Key Cryptography II 9/19/2018 DES Decryption Same as the encryption algorithm with the “reversed” key schedule – NEXT! 9/19/2018 Lecture 2.2 - Private Key Cryptography II

Initial permutation (IP) 9/19/2018 Plain text Initial permutation (IP) Round-1 (key K1) Rounds 2-15 Round-16 (key K16) swap IP inverse Cipher text 9/19/2018

Lecture 2.2 - Private Key Cryptography II 9/19/2018 encrypt IP inverse Cipher text IP Round-1 (K16) decrypt = Since 9/19/2018 Lecture 2.2 - Private Key Cryptography II

Lecture 2.2 - Private Key Cryptography II 9/19/2018 DES Example We choose a random plaintext block and a random key, and determine what the ciphertext block would be (all in hexadecimal): 9/19/2018 Lecture 2.2 - Private Key Cryptography II

Example (contd) -- encryption 9/19/2018 Example (contd) -- encryption 9/19/2018 Lecture 2.2 - Private Key Cryptography II

Example (contd) -- decryption 9/19/2018 Example (contd) -- decryption Let us see how Bob, at the destination, can decipher the ciphertext received from Alice using the same key. Table 6.16 shows some interesting points. 9/19/2018 Lecture 2.2 - Private Key Cryptography II

DES Security: Avalanche Effect 9/19/2018 DES Security: Avalanche Effect 9/19/2018 Lecture 2.2 - Private Key Cryptography II

Lecture 2.2 - Private Key Cryptography II 9/19/2018 Further Reading Chapter 7.4 of HAC Chapter 3 of Stallings 9/19/2018 Lecture 2.2 - Private Key Cryptography II