Block Ciphers: Workhorses of Cryptography COMP 1721 A Winter 2004.

Slides:



Advertisements
Similar presentations
MAC Raushan. DES simple fiestel network 3131 PlainText Blocks 2*4=8bits 31 f f =0011 xor 0011=0000 = 0 f(r,k)=(2*r+k^2)%8 f(1,5)=(2*1+5^2)%8=3 xor 3 3.
Advertisements

CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
1 CIS 5371 Cryptography 5b. Pseudorandom Objects in Practice Block Ciphers.
Topic 7: Using cryptography in mobile computing. Cryptography basics: symmetric, public-key, hash function and digital signature Cryptography, describing.
Computer Science CSC 474By Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.1 Introduction to Cryptography.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
Cryptography and Network Security Chapter 3
15-1 Last time Internet Application Security and Privacy Public-key encryption Integrity.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cryptographic Security.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
Computer Networking Lecture 21: Security and Cryptography Thanks to various folks from , semester’s past and others.
Cryptography April 20, 2010 MIS 4600 – MBA © Abdou Illia.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Lecture 23 Symmetric Encryption
Computer Science CSC 774Dr. Peng Ning1 CSC 774 Advanced Network Security Topic 2. Review of Cryptographic Techniques.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
Introduction to Public Key Cryptography
1 Cryptography Basics. 2 Cryptography Basic terminologies Symmetric key encryption Asymmetric key encryption Public Key Infrastructure Digital Certificates.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Cryptanalysis of Modern Symmetric-Key Block Ciphers [Based on “A Tutorial on Linear and Differential Cryptanalysis” by Howard Heys.] Modern block ciphers.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Dr. Khalid A. Kaabneh Amman Arab University
I-4 security.
Chapter 1 Introduction Cryptography-Principles and Practice Harbin Institute of Technology School of Computer Science and Technology Zhijun Li
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Network Security Lecture 14 Presented by: Dr. Munam Ali Shah.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Network Security Lecture 17 Presented by: Dr. Munam Ali Shah.
Cryptography, Authentication and Digital Signatures
Review of basic cryptographically algorithm Asymmetric encoding (Private and Public Keys), Hash Function, Digital Signatures and Certification.
CSCE 201 Introduction to Information Security Fall 2010 Data Protection.
Based on Applied Cryptography by Schneier Chapter 1: Foundations Dulal C. Kar.
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
Midterm Review Cryptography & Network Security
Chapter 20 Symmetric Encryption and Message Confidentiality.
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Dr. Reuven Aviv, Nov 2008 Conventional Encryption 1 Conventional Encryption & Message Confidentiality Acknowledgements for slides Henric Johnson Blekinge.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
Lecture 2: Introduction to Cryptography
Overview of Cryptography & Its Applications
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
15-499Page :Algorithms and Applications Cryptography I – Introduction – Terminology – Some primitives – Some protocols.
NEW DIRECTIONS IN CRYPTOGRAPHY Made Harta Dwijaksara, Yi Jae Park.
Lecture 23 Symmetric Encryption
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
Network Security Celia Li Computer Science and Engineering York University.
Module :MA3036NI Symmetric Encryption -3 Lecture Week 4.
Block Ciphers and the Data Encryption Standard. Modern Block Ciphers  One of the most widely used types of cryptographic algorithms  Used in symmetric.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
@Yuan Xue Announcement Project Release Team forming Homework 1 will be released next Tuesday.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Basics of Cryptography
Cryptography.
Introduction to Cryptography
Presentation transcript:

Block Ciphers: Workhorses of Cryptography COMP 1721 A Winter 2004

Basic Scenario Basic Scenario Two communicating parties: Alice Bob insecure channel Attacker

Information Security Services Information Security Services u secrecy - attacker listening cannot gain any useful information from the communication Communicating parties may require: u authentication - communicating parties are ensured to be who/what they claim to be u integrity - data cannot be modified by attacker without detection u non-repudiation - Alice and Bob cannot deny transmission/receipt of certain data

Terminology Terminology Cryptography is the study of mathematical techniques used to provide information security Cryptanalysis is the study of techniques used to thwart (break) cryptographic techniques Cryptology is the field which encompasses both cryptography and cryptanalysis

Cryptographic Primitives Cryptographic Primitives The basic cryptographic “building blocks” used to provide these information security services are called primitives EXAMPLES: è symmetric-key ciphers (block ciphers) è public-key ciphers è digital signatures è cryptographic hash functions

Using Ciphers for Secrecy Using Ciphers for Secrecy A cipher is an encryption/decryption algorithm, parameterized by keys decryption algorithm encryption algorithm kdkd keke plaintext (p) ciphertext (c) Attacker

Categories of Ciphers Categories of Ciphers u Symmetric-key Ciphers u Public-key (Asymmetric) Ciphers u k e = k d (or they are easily derived from each other) u the key is known only to Alice and Bob u the recipient (Bob) has a key pair (k e, k d ) u k e (the public key) is widely distributed - on Bob’s Web page, in a directory, etc u k d (the private key) is known only to Bob

Advantages/Disadvantages Advantages/Disadvantages u Symmetric-key ciphers u Public-key ciphers u Alice and Bob must establish a shared key (key distribution problem) u solves key distribution problem u very fast (used for bulk encryption) u slow (approximately 1/1000 speed of symmetric- key ciphers)

Hybrid Approach Hybrid Approach Suppose Alice has a large file she wants to encrypt and send to Bob 1. Alice randomly generates a key (k) to be used in a symmetric-key cipher 2. Alice encrypts k with Bob’s public key and sends it to Bob 3. Bob decrypts k using his private key 4. Alice and Bob communicate using k and an agreed-upon symmetric-key cipher

Block Ciphers Block Ciphers u Block ciphers are an important class of symmetric-key ciphers u A block cipher maps N bits to N bits (plaintext to ciphertext) and is parameterized by a key u typical block sizes: 64 bits, 128 bits u name comes from fixed-length nature of input (as compared to stream ciphers, which encrypt their input as a continuous stream) u N is called the block size

Block Cipher Architectures Block Cipher Architectures Two fundamental block cipher architectures: u Substitution-Permutation Networks (SPNs) u Feistel Networks è Both encrypt a plaintext through a series of weaker steps called rounds è Feistel networks modify only half the input to each round (simplifies decryption process), whereas SPNs modify the entire input

u An n  n s-box is a mapping from n bits to n bits that can be inverted (so two different inputs must map to two different outputs) S-Boxes and Subkeys S-Boxes and Subkeys u The subkeys (round keys) are typically derived from k via a key-scheduling algorithm u k is sometimes called the master key

u In its simplest form, a linear transformation is simply a permutation (shuffling) of bits (hence the name substitution-permutation network) The Linear Transformation The Linear Transformation u In general, a applying a linear transformation means multiplying the input (an N-bit vector) by a binary N  N matrix