Computer Security IT423 Semester II

Slides:



Advertisements
Similar presentations
6.1.2 Overview DES is a block cipher, as shown in Figure 6.1.
Advertisements

6.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 2 Data Encryption Standard (DES)
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
Data Encryption Standard (DES)
1 CIS 5371 Cryptography 5b. Pseudorandom Objects in Practice Block Ciphers.
Rachana Y. Patil 1 Data Encryption Standard (DES) (DES)
Data Encryption Standard (DES)
Advanced Encryption Standard
1 Chapter 3 – Block Ciphers and the Data Encryption Standard Modern Block Ciphers  now look at modern block ciphers  one of the most widely used types.
1 Chapter 3 – Block Ciphers and the Data Encryption Standard Modern Block Ciphers  now look at modern block ciphers  one of the most widely used types.
Dr. Lo’ai Tawalbeh 2007 Chapter 5: Advanced Encryption Standard (AES) Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus.
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Data Encryption Standard (DES). Symmetric Cryptography  C = E(P,K)  P = D(C,K)  Requirements  Given C, the only way to obtain P should be with  the.
The Digital Encryption Standard CSCI 5857: Encoding and Encryption.
A Cryptography Education Tool Anna Yu Department of Computer Science College of Engineering North Carolina A&T State University June 18, 2009.
Dr. Khalid A. Kaabneh Amman Arab University
Advance Encryption Standard. Topics  Origin of AES  Basic AES  Inside Algorithm  Final Notes.
Chapter 20 Symmetric Encryption and Message Confidentiality.
TE/CS 536 Network Security Spring 2006 – Lectures 6&7 Secret Key Cryptography.
Chapter 20 Symmetric Encryption and Message Confidentiality.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Feistel Cipher Structure
Introduction to Modern Symmetric-key Ciphers
Le Trong Ngoc Security Fundamentals (2) Encryption mechanisms 4/2011.
Chapter 3 Encryption Algorithms & Systems (Part D)
Fifth Edition by William Stallings
Computer and Network Security Rabie A. Ramadan Lecture 3.
5.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 5 Introduction to Modern Symmetric-key Ciphers.
Module :MA3036NI Symmetric Encryption -3 Lecture Week 4.
Block Ciphers and the Data Encryption Standard. Modern Block Ciphers  One of the most widely used types of cryptographic algorithms  Used in symmetric.
Information and Network Security Lecture 2 Dr. Hadi AL Saadi.
Information and Computer Security CPIS 312 Lab 6 & 7 1 TRIGUI Mohamed Salim Symmetric key cryptography.
Lecture 4 Data Encryption Standard (DES) Dr. Nermin Hamza
CS480 Cryptography and Information Security
CS480 Cryptography and Information Security
Provides Confidentiality
Chapter3: Block Ciphers and the Data Encryption Standard
Triple DES.
School of Computer Science and Engineering Pusan National University
6b. Practical Constructions of Symmetric-Key Primitives.
Symmetric Algorithm of Cryptography
Data Encryption Standard
Topics discussed in this section: 30-2 SYMMETRIC-KEY CRYPTOGRAPHY Symmetric-key cryptography started thousands of years ago when people needed.
SYMMETRIC KEY ALGORITHMS
Networks and Communication Systems Department
NET 311 Information Security
NET 311 Information Security
Cryptography and Network Security Chapter 3
AES Objectives ❏ To review a short history of AES
Advanced Encryption Standard (Symmetric key Algorithm)
PART VII Security.
Unit 2 “Implementation of a RC5 block cipher algorithm and implementing an attack on it”
ICS 454: Principles of Cryptography
Introduction to Modern Symmetric-key Ciphers
Block Ciphers and the Data Encryption Standard (DES)
DES Examples Chater#3 DES.
Chapter -2 Block Ciphers and the Data Encryption Standard
DES (Data Encryption Standards)
SYMMETRIC KEY ALGORITHMS
About Blowfish Encryption Video made by: Tudor Mare Sorin Nita Valentina Sociu Stefan Stefanescu.
SYMMETRIC ENCRYPTION.
DES (Data Encryption Standard)
Cryptography and Network Security Chapter 5 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
SOHAIL SHAHUL HAMEED Dr. BHARGAVI GOSWAMI
Florida State University
ICS 555: Block Ciphers & DES Sultan Almuhammadi.
Advanced Encryption Standard
Feistel Cipher Structure
Data Encryption Standard (DES)
Presentation transcript:

Computer Security IT423 Semester II 2017 - 2018 Dr. Saman Mirza Abdullah saman.mirza@ishik.edu.iq

Data Encryption Standard (DES) Computer Security - Ishik 4/10/2019

Class Objective The main objective of this class is to: To review a short history of DES To define the basic structure of DES To describe the details of building elements of DES To describe the round keys generation process Computer Security - Ishik 4/10/2019

Confusion and Diffusion Make relation between statistics of ciphertext and the value of the encryption key as complex as possible. diffusion Diffuse statistical property of plaintext digit across a range of ciphertext digits Each plaintext digits affects value of many ciphertext digits, or has same relation with many ciphertext digits. Computer Security - Ishik 4/10/2019

Feistel Cipher It is a design model, not specific method. Uses same algorithm for encryption and decryption. Has multiple round of processing plaintext. Each round consists S-box and P-box step. Computer Security - Ishik 4/10/2019

DES The Data Encryption Standard (DES) is a symmetric-key block cipher published in 1973 by the National Institute of Standards and Technology (NIST), as a proposal. It has been accepted by as a draft of the Federal Information Processing Standard (FIPS), in March 1975 . Although the draft was criticized, on 1977 the drafted has been published. Ask them what is the difference between symmetric and asymmetric key block Symmetric is one secret key using between sender and receiver. Asymmetric is using public key at sender side and private key at receiver side. So, it utilizes two keys. Computer Security - Ishik 4/10/2019

Overview DES takes: A 64-bit plaintext and creates a 64-bit ciphertext; at the decryption site, A 64-bit ciphertext and creates a 64-bit block of plaintext. The same 56-bit cipher key is used for both encryption and decryption. Computer Security - Ishik 4/10/2019

DES Structure Encryption Has two P-boxes: Initial and final permutation. Each is inverse to the other. Has 16 rounding or (S-box). Accepts 64 bit Plaintext. Has 56 bit cipher key, 48 bit used. Based on some predefined algorithms. Computer Security - Ishik 4/10/2019

DES Structure Encryption / (P-box ) Has two P-boxes: Initial and final permutation. Each is inverse to the other. It is applied directly on 64 bit of the plaintext. They are keyless. Increases the role of hardware in encryption process. Computer Security - Ishik 4/10/2019

DES Structure Encryption / (P-box ) Find the output of the initial permutation box when the input is given in hexadecimal 0x0002 000 0000 0001 We have only the 15th bit and 64th bit are one. 15  63 6425 Computer Security - Ishik 4/10/2019

DES Structure Encryption / (P-box ) Find the output of the Final permutation box when the input is given in hexadecimal 0x 0000 0080 0000 0002 We have only the 25th bit and 63rd bit are one. 63  15 2564 Computer Security - Ishik 4/10/2019

DES Structure Encryption Done What are going on inside the rounds? Done Computer Security - Ishik 4/10/2019

DES Structure Encryption / Rounds The input to the rounds will be divided into two parts (Left and Right). The round has Swapper and Mixer processes. Swapper inverted the right half of the input with left. Mixer uses a Function to mix the first half with a key. 𝑓( 𝑅 𝑖−1 , 𝐾 𝑖 ) Computer Security - Ishik 4/10/2019

DES Structure …/ Rounds/ 𝑓( 𝑅 𝑖−1 , 𝐾 𝑖 ) This Called the DSE function. It is the hart of the DES structure. It is apply a 48 bit key to the 32 bit input. Always the rightmost bit. It gives at output 32 bit. It comes in different steps. Computer Security - Ishik 4/10/2019

DES Structure …/ …/ 𝑓( 𝑅 𝑖−1 , 𝐾 𝑖 )/𝑠𝑡𝑒𝑝𝑠 These steps are occurred in the DES Function Expansion D-box. Whitener XOR S-Box Straight D-box Computer Security - Ishik 4/10/2019

𝑓( 𝑅 𝑖−1 , 𝐾 𝑖 )/𝐸𝑥𝑝𝑎𝑛𝑠𝑖𝑜𝑛 Why Expansion is needed? Input to the round steps has 32 bits size, the Key has 48 bits. So, expansion needed. Computer Security - Ishik 4/10/2019

𝑓( 𝑅 𝑖−1 , 𝐾 𝑖 )/𝐸𝑥𝑝𝑎𝑛𝑠𝑖𝑜𝑛 Input will be divided into 8 four bit sections. Each 4 bit section expends to 6 bits section. Computer Security - Ishik 4/10/2019

𝑓( 𝑅 𝑖−1 , 𝐾 𝑖 )/Whitener XOR Computer Security - Ishik 4/10/2019

𝑓 𝑅 𝑖−1 , 𝐾 𝑖 /𝑆−𝑏𝑜𝑥𝑒𝑠 S-boxes are doing real mixing. (Confusion). 𝑓 𝑅 𝑖−1 , 𝐾 𝑖 /𝑆−𝑏𝑜𝑥𝑒𝑠 S-boxes are doing real mixing. (Confusion). DSE has 8 S-boxes, each. Has 6 inputs and 4 outputs. How the process is going on inside each S-boxes. Computer Security - Ishik 4/10/2019

𝑓 𝑅 𝑖−1 , 𝐾 𝑖 /𝑆−𝑏𝑜𝑥𝑒𝑠 For each S-box, we have a truth table. 𝑓 𝑅 𝑖−1 , 𝐾 𝑖 /𝑆−𝑏𝑜𝑥𝑒𝑠 For each S-box, we have a truth table. The truth table for S-box 1 is differ from others. There is no similar truth table among the eight boxes. Computer Security - Ishik 4/10/2019

𝑓 𝑅 𝑖−1 , 𝐾 𝑖 /𝑆−𝑏𝑜𝑥𝑒𝑠 Use the S-box below to get the output of the 110001 The 1st bit is (1) and the 6th bit is (1), so the row is 11 which means (3) The rest of the bits are (1000) which means (8). The box with index (3,8) has a value of (05). Converting (05) to binary, it will be (0101). Computer Security - Ishik 4/10/2019

𝑓 𝑅 𝑖−1 , 𝐾 𝑖 𝑆𝑡𝑟𝑎𝑖𝑔ℎ𝑡 𝑃𝑒𝑟𝑚𝑢𝑡𝑎𝑡𝑖𝑜𝑛 𝑓 𝑅 𝑖−1 , 𝐾 𝑖 𝑆𝑡𝑟𝑎𝑖𝑔ℎ𝑡 𝑃𝑒𝑟𝑚𝑢𝑡𝑎𝑡𝑖𝑜𝑛 It is the final stage of DES function. Sometimes called as Final Permutation. It is the 32 bits input / 32 bites output permutation operation. It follows a straight permutation truth table, as shown below: According to the above table, the 7th bit of the input will be the 2nd bit of the output. Computer Security - Ishik 4/10/2019

Key Generation First step is Parity drop: Removing the parity bit. (if Available). Do permutation according to a give table. Output is 64 bits input becomes 56 bits. Divide the 56 bits into two parts, each 28 bits. Left part and right part. Do left bit shifting. Given permutation / compression table, do permutation to reduce the size to 48 bits. Computer Security - Ishik 4/10/2019

Key Generation Example A 10 bits key is shared between sender and receiver. Use the following information to generate K1 and K2, which each has 8 bits sizes. K=(10100 00010) is the main key. No parity bits are there. P10 permutation is (3 5 2 7 4 10 1 9 8 6) P8 permutation is (6 3 7 4 8 5 10 9). ========================================== No parity bits will be removed. P10 (K) = P10 (10100 00010) = (10000 01100). Left part is (10000) and Right part is (01100). Applying left shifting on both part L = 00001 and R = 11000. Combining the L and R = 0000111000 P8( L and R) = P8 (00001 11000) = (10100100) Therefore, the sub-key k1 is (10100100) Computer Security - Ishik 4/10/2019

Key Generation Example No parity bits will be removed. P10 (K) = P10 (10100 00010) = (10000 01100). Left part is (10000) and Right part is (01100). Applying left shifting on both part L = 00001 and R = 11000. Combining the L and R = 0000111000 P8( L and R) = P8 (00001 11000) = (10100100) Therefore, the sub-key k1 is (10100100) With which of the above information we should start for computing the set values of sub-key k2? Computer Security - Ishik 4/10/2019

Key Generation Example No parity bits will be removed. P10 (K) = P10 (10100 00010) = (10000 01100). Left part is (10000) and Right part is (01100). Applying left shifting on both part L = 00001 and R = 11000. Do left shifting bit. L=00010 and R= 10001 Combining the L and R = 00010 10001 P8 permutation is (6 3 7 4 8 5 10 9). P8( L and R) = P8 (00010 10001) = (10010010) Therefore, the sub-key k1 is (10010010) Computer Security - Ishik 4/10/2019

Quiz ? When need to find the sub-key K3, Which information will be taken in consideration? Dose the process of round 3 will go as round or not? If any change is there show and highlight the change. Computer Security - Ishik 4/10/2019

Read More The DES Algorithm Illustrated.pdf in the same folder. Computer Security - Ishik 4/10/2019

Class End Computer Security - Ishik 4/10/2019