Lecture 3: Cryptographic Tools modified from slides of Lawrie Brown.

Slides:



Advertisements
Similar presentations
DES The Data Encryption Standard (DES) is a classic symmetric block cipher algorithm. DES was developed in the 1970’s as a US government standard The block.
Advertisements

“Advanced Encryption Standard” & “Modes of Operation”
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
Cryptography and Network Security Chapter 3
Block Ciphers and the Data Encryption Standard
Cryptography and Network Security
Web Security for Network and System Administrators1 Chapter 4 Encryption.
CMSC 414 Computer (and Network) Security Lecture 5 Jonathan Katz.
First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown and edited by Archana Chidanandan Cryptographic Tools.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Chapter 3 – Block Ciphers and the Data Encryption Standard Jen-Chang Liu, 2004 Adopted from lecture slides by Lawrie Brown.
Introduction to Symmetric Block Cipher Jing Deng Based on Prof. Rick Han’s Lecture Slides Dr. Andreas Steffen’s Security Tutorial.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 5 Wenbing Zhao Department of Electrical and Computer Engineering.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Dr Alejandra Flores-Mosri Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Ref: STAL03More Concepts of Cryptography and Cryptanalysis 1 Reference –William Stallings, Cryptography and Network Security, 3rd Edition, Prentice Hall.
Cryptography and Network Security Chapter 11 Fourth Edition by William Stallings Lecture slides by Lawrie Brown/Mod. & S. Kondakci.
Lecture 23 Symmetric Encryption
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
Encryption Schemes Second Pass Brice Toth 21 November 2001.
Symmetric Encryption and Message Confidentiality
Encryption Methods By: Michael A. Scott
Lecture 3: Cryptographic Tools
Network Security Sorina Persa Group 3250 Group 3250.
CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Data Encryption Standard (DES). Symmetric Cryptography  C = E(P,K)  P = D(C,K)  Requirements  Given C, the only way to obtain P should be with  the.
1 Chapter 4 Encryption. 2 Objectives In this chapter, you will: Learn the basics of encryption technology Recognize popular symmetric encryption algorithms.
© Neeraj Suri EU-NSF ICT March 2006 DEWSNet Dependable Embedded Wired/Wireless Networks MUET Jamshoro Computer Security: Principles and Practice Slides.
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
1 Chapter 11: Message Authentication and Hash Functions Fourth Edition by William Stallings Lecture slides by Lawrie Brown (modified by Prof. M. Singhal,
Message Authentication Requirements Disclosure Release of message contents to any person or process not possessing the appropriate cryptographic key Traffic.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 2 “Cryptographic Tools”.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
3DES and Block Cipher Modes of Operation CSE 651: Introduction to Network Security.
Dr. Reuven Aviv, Nov 2008 Conventional Encryption 1 Conventional Encryption & Message Confidentiality Acknowledgements for slides Henric Johnson Blekinge.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
Modes of Usage Dan Fleck CS 469: Security Engineering These slides are modified with permission from Bill Young (Univ of Texas) 11 Coming up: Modes of.
Lecture 2: Introduction to Cryptography
Chapter 11 Message Authentication and Hash Functions.
Cryptography and Network Security Chapter 12 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Overview of Cryptography & Its Applications
Lecture 23 Symmetric Encryption
Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.
Cryptography and Network Security (CS435) Part Nine (Message Authentication)
Intro to Cryptography Lesson Introduction
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
DES: Data Encryption Standard
Cryptography and Network Security
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
CST 312 Pablo Breuer. A block of plaintext is treated as a whole and used to produce a ciphertext block of equal length Typically a block size of 64 or.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
1 CPCS425: Information Security (Topic 5) Topic 5  Symmetrical Cryptography  Understand the principles of modern symmetric (conventional) cryptography.
@Yuan Xue 285: Network Security CS 285 Network Security Message Authentication Code Data integrity + Source authentication.
CS457 Introduction to Information Security Systems
مروري برالگوريتمهاي رمز متقارن(كليد پنهان)
SYMMETRIC ENCRYPTION.
Cryptanalysis Network Security.
Elect. Codebook, Cipher Block Chaining
Stream Cipher Structure
Presentation transcript:

Lecture 3: Cryptographic Tools modified from slides of Lawrie Brown

Cryptographic Tools Cryptographic algorithms – important element in security services review various types of elements – symmetric encryption – public-key (asymmetric) encryption – digital signatures and key management – secure hash functions

Symmetric Encryption universal technique for providing confidentiality also referred to as single-key encryption two requirements for secure use: – need a strong encryption algorithm – sender and receiver must have obtained copies of the secret key in a secure fashion and must keep the key secure

Symmetric Encryption

Cryptanalytic Attacks rely on: – nature of the algorithm – plus some knowledge of the general characteristics of the plaintext – even some sample plaintext- ciphertext pairs exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or the key being used if successful all future and past messages encrypted with that key are compromised Brute-Force Attack try all possible keys on some ciphertext until an intelligible translation into plaintext is obtained on average half of all possible keys must be tried to achieve success Attacking Symmetric Encryption

Average Time for Exhaustive Search

Symmetric Encryption Algorithms

most widely used encryption scheme – referred to as the Data Encryption Algorithm – uses 64 bit plaintext block and 56 bit key to produce a 64 bit ciphertext block strength concerns: – concerns about algorithm DES is the most studied encryption algorithm in existence – use of 56-bit key Electronic Frontier Foundation (EFF) announced in July 1998 that it had broken a DES encryption Data Encryption Standard (DES)

Time to Break a Code assuming 106 decryptions/ms

Triple DES (3DES) repeats basic DES algorithm three times using either two or three unique keys attractions: – 168-bit key length overcomes the vulnerability to brute-force attack of DES – underlying encryption algorithm is the same as in DES drawbacks: – algorithm is sluggish in software – uses a 64-bit block size

Advanced Encryption Standard (AES) needed a replacement for 3DES 3DES was not reasonable for long term use NIST called for proposals for a new AES in 1997 should have a security strength equal to or better than 3DES significantly improved efficiency symmetric block cipher 128 bit data and 128/192/256 bit keys selected Rijndael in November 2001 published as FIPS 197

Practical Security Issues typically data unit is larger than a single 64-bit or 128-bit block electronic codebook (ECB) mode – the simplest approach to multiple-block encryption – each block is encrypted using the same key – exploit regularities in the plaintext modes of operation – alternative techniques to increase the security for large sequences – overcomes the weaknesses of ECB

Block Cipher Encryption Stream Encryption

Block & Stream Ciphers processes the input one block of elements at a time produces an output block for each input block can reuse keys more common Block Cipher processes the input elements continuously produces output one element at a time primary advantage is that they are almost always faster and use far less code encrypts plaintext one byte at a time pseudorandom stream is one that is unpredictable without knowledge of the input key Stream Cipher