CSE331: Introduction to Networks and Security Lecture 18 Fall 2002.

Slides:



Advertisements
Similar presentations
DES The Data Encryption Standard (DES) is a classic symmetric block cipher algorithm. DES was developed in the 1970’s as a US government standard The block.
Advertisements

“Advanced Encryption Standard” & “Modes of Operation”
CSE331: Introduction to Networks and Security Lecture 19 Fall 2002.
1 Counter-measures Threat Monitoring Cryptography as a security tool Encryption Digital Signature Key distribution.
Web Security for Network and System Administrators1 Chapter 4 Encryption.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
CSE331: Introduction to Networks and Security Lecture 21 Fall 2002.
1 Overview of the DES A block cipher: –encrypts blocks of 64 bits using a 64 bit key –outputs 64 bits of ciphertext A product cipher –basic unit is the.
Introduction to Symmetric Block Cipher Jing Deng Based on Prof. Rick Han’s Lecture Slides Dr. Andreas Steffen’s Security Tutorial.
Computer Networking Lecture 21: Security and Cryptography Thanks to various folks from , semester’s past and others.
CS Network Security Lecture 2 Prof. Katz. 9/7/2000Lecture 2 - Data Encryption2 DES – Data Encryption Standard Private key. Encrypts by series of.
Cryptography April 20, 2010 MIS 4600 – MBA © Abdou Illia.
Chapter 3 Encryption Algorithms & Systems (Part C)
Lecture 23 Symmetric Encryption
Lecture 2.2: Private Key Cryptography II CS 436/636/736 Spring 2012 Nitesh Saxena.
What is Cryptography? Definition: The science or study of the techniques of secret writing, esp. code and cipher systems, methods, and the like Google.
Dr. Lo’ai Tawalbeh 2007 Chapter 5: Advanced Encryption Standard (AES) Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Decryption Algorithms Characterization Project ECE 526 spring 2007 Ravimohan Boggula,Rajesh reddy Bandala Southern Illinois University Carbondale.
Encryption Schemes Second Pass Brice Toth 21 November 2001.
CSE 651: Introduction to Network Security
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
1 Chapter 4 Encryption. 2 Objectives In this chapter, you will: Learn the basics of encryption technology Recognize popular symmetric encryption algorithms.
Security. Cryptography Why Cryptography Symmetric Encryption – Key exchange Public-Key Cryptography – Key exchange – Certification.
Dr. Khalid A. Kaabneh Amman Arab University
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
Network Security. Cryptography Cryptography functions Secret key (e.g., DES) Public key (e.g., RSA) Message digest (e.g., MD5) Security services Privacy:
Advance Encryption Standard. Topics  Origin of AES  Basic AES  Inside Algorithm  Final Notes.
Network Security Lecture 14 Presented by: Dr. Munam Ali Shah.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Cryptography, Authentication and Digital Signatures
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Cryptography Chapter 7 Part 2 Pages 781 to 812. Symmetric Cryptography Secret Key Figure 7-10 on page 782 Key distribution problem – Secure courier Many.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
Description of a New Variable-Length Key, 64-Bit Block Cipher (BLOWFISH) Bruce Schneier BY Sunitha Thodupunuri.
Lecture 2: Introduction to Cryptography
Chapter 3 Encryption Algorithms & Systems (Part D)
Lecture 23 Symmetric Encryption
1 Symmetric key cryptography: DES DES: Data Encryption Standard US encryption standard [NIST 1993] 56-bit symmetric key, 64 bit plaintext input How secure.
Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.
Plaintextciphertext encryption algorithmdecryption algorithm plaintext.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
1 Symmetric-Key Encryption CSE 5351: Introduction to Cryptography Reading assignment: Chapter 2 Chapter 3 (sections ) You may skip proofs, but are.
Lecture 2 Page 1 CS 236, Spring 2008 More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
Network Security Lecture 3 Secret Key Cryptography
1 Cryptography Troy Latchman Byungchil Kim. 2 Fundamentals We know that the medium we use to transmit data is insecure, e.g. can be sniffed. We know that.
EE 122: Lecture 24 (Security) Ion Stoica December 4, 2001.
Lecture 5 Page 1 CS 236 Online More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
Security. Security Needs Computers and data are used by the authorized persons Computers and their accessories, data, and information are available to.
1 CPCS425: Information Security (Topic 5) Topic 5  Symmetrical Cryptography  Understand the principles of modern symmetric (conventional) cryptography.
Lecture 4 Data Encryption Standard (DES) Dr. Nermin Hamza
Symmetric Cryptography
Outline Desirable characteristics of ciphers Uses of cryptography
Symmetric Algorithm of Cryptography
Chapter-2 Classical Encryption Techniques.
Basic Network Encryption
Outline Desirable characteristics of ciphers Uses of cryptography
Cryptography Basics and Symmetric Cryptography
مروري برالگوريتمهاي رمز متقارن(كليد پنهان)
Basic Network Encryption
Advanced Encryption Standard
Presentation transcript:

CSE331: Introduction to Networks and Security Lecture 18 Fall 2002

CSE331 Fall Announcements Prof. Zdancewic will be out of town Nov. 5 th – 14 th Lectures will be covered by Prof. Gunter Aditya Chadha (course TA) will cover projects

CSE331 Fall Recap Cracking Polyalphabetic Ciphers –Kasiski Method of determining key length –Index of Coincidence Today: –Industrial Strength Encryption –Shared Key Cryptography

CSE331 Fall Kinds of Industrial Strength Crypto Shared Key Cryptography Public Key Cryptography Cryptographic Hashes

CSE331 Fall Shared Key Cryptography Sender & receiver use the same key Key must remain private Also called symmetric or secret key cryptography Often are block-ciphers –Process plaintext data in blocks Examples: DES, Triple-DES, Blowfish, Twofish, Rijndael, …

CSE331 Fall Shared Key Notation Encryption algorithm E : key x plain  cipher Notation: K{msg} = E(K, msg) Decryption algorithm D : key x cipher  plain D inverts E D(K, E(K, msg)) = msg Use capital “K” for shared (secret) keys Sometimes E is the same algorithm as D

CSE331 Fall Secure Channel: Shared Keys K AB AliceBart K AB {Hello!} K AB {Hi!}

CSE331 Fall Problems with Shared Key Crypto Compromised key means interceptors can decrypt any ciphertext they’ve acquired. –Change keys frequently to limit damage Distribution of keys is problematic –Keys must be transmitted securely –Use couriers? –Distribute in pieces over separate channels? Number of keys is O(n 2 ) where n is # of participants Potentially easier to break?

CSE331 Fall Data Encryption Standard (DES) Adopted as a standard in 1976 Security analyzed by the National Security Agency (NSA) – Key length is 56 bits –padded to 64 bits by using 8 parity bits Uses simple operators on (up to) 64 bit values –Simple to implement in software or hardware Input is processed in 64 bit blocks Based on a series of 16 rounds –Each cycle uses permutation & substitution to combine plaintext with the key

CSE331 Fall DES Encryption

CSE331 Fall One Round of DES (f of previous slide) Expansion S-box Permutation Permuted choice of key

CSE331 Fall Types of Permutations in DES Permutation Permuted Choice Expansion Permutation

CSE331 Fall DES S-Boxes Substitution table 6 bits of input replaced by 4 bits of output Which substitution is applied depends on the input bits Implemented as a lookup table –8 S-Boxes –Each S-Box has a table of 64 entries –Each entry specifies a 4-bit output

14 Use the same algorithm as encryption, but use k 16 … k 1 instead of k 1 … k 16 Proof that this works: –To obtain round j from j-1: –Rewrite in terms of round j-1: (1) R j-1 = L j (2) L j-1  f(R j-1, k j ) = R j L j-1  f(R j-1, k j )  f(R j-1, k j ) = R j  f(R j-1, k j ) L j-1 = R j  f(R j-1, k j ) L j-1 = R j  f(L j, k j ) DES Decryption (1) L j = R j-1 (2) R j = L j-1  f(R j-1, k j )

CSE331 Fall Problems with DES Key length too short: 56 bits – broke a DES challenge in 1999 in under 24 hours (parallel attack) Other problems –Bit-wise complementation of key produces bit-wise complemented ciphertext –Not all keys are good (half 0’s half 1’s) –Differential cryptanalysis: Carefully choose pairs of plaintext that differ in particular known ways (I.e. they are

CSE331 Fall Block Cipher Performance AlgorithmKey LengthBlock Size Rounds Clks/Byte Twofishvariable Blowfishvariable Square RC5-32/16variable CAST DES Serpent128,192, SAFER (S)K FEAL-3264, IDEA Triple-DES

CSE331 Fall Advanced Encryption Standard (AES) National Institute of Standards & Technology NIST –Computer Security Research Center (CSRC) – – Uses the Rijndael algorithm –Invented by Belgium researchers Dr. Joan Daemen & Dr. Vincent Rijmen –Adopted May 26, 2002 –Key length: 128, 192, or 256 bits –Block size: 128, 192, or 256 bits

CSE331 Fall Public Key Cryptography Sender encrypts using a private key Receiver decrypts using a public key Only the private key must be kept secret –Public key can be distributed at will Also called asymmetric cryptography Can be used for digital signatures Examples: RSA, El Gamal, DSA Usually more expensive than secret key cryptography

CSE331 Fall Public Key Notation Encryption algorithm E : keyPub x plain  cipher Notation: K{msg} = E(K, msg) Decryption algorithm D : keyPriv x cipher  plain Notation: k{msg} = D(k,msg) D inverts E D(k, E(K, msg)) = msg Use capital “K” for public keys Use lower case “k” for private keys Sometimes E is the same algorithm as D

CSE331 Fall Secure Channel: Private Key K A,K B k A K A, K B k B AliceBart K B {Hello!} K A {Hi!}

CSE331 Fall Cryptographic Hashes Creates a hard-to-invert summary of input data Useful for integrity properties –Sender computes the hash of the data, transmits data and hash –Receiver uses the same hash algorithm, checks the result Like a check-sum or error detection code –Uses a cryptographic algorithm internally –More expensive to compute Sometimes called a Message Digest Examples: –Secure Hash Algorithm (SHA) –Message Digest (MD4, MD5)