Based on Bruce Schneier Chapter 7: Key Length Dulal C. Kar.

Slides:



Advertisements
Similar presentations
Conventional Encryption: Algorithms
Advertisements

Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
Cryptanalysis on FPGA Based Hardware
Cryptography Introduction Last Updated: Aug 20, 2013.
Cryptography and Network Security Chapter 3
First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown and edited by Archana Chidanandan Cryptographic Tools.
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cryptographic Security.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
Chapter 4  Hash Functions 1 Overview  Cryptographic hash functions are functions that: o Map an arbitrary-length (but finite) input to a fixed-size output.
Henric Johnson1 Chapter3 Public-Key Cryptography and Message Authentication Henric Johnson Blekinge Institute of Technology, Sweden
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
Csci5233 Computer Security & Integrity 1 Cryptography: Basics (2)
CS1001 Lecture 24. Overview Encryption Encryption Artificial Intelligence Artificial Intelligence Homework 4 Homework 4.
CS Network Security Lecture 2 Prof. Katz. 9/7/2000Lecture 2 - Data Encryption2 DES – Data Encryption Standard Private key. Encrypts by series of.
Session 6: Introduction to cryptanalysis part 1. Contents Problem definition Symmetric systems cryptanalysis Particularities of block ciphers cryptanalysis.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Lecture 23 Symmetric Encryption
Lecture 2.2: Private Key Cryptography II CS 436/636/736 Spring 2012 Nitesh Saxena.
Introduction to Computer and Network Security Iliano Cervesato 26 August 2008 – Modern Cryptography.
ASYMMETRIC CIPHERS.
Lecture 5 Overview Does DES Work? Differential Cryptanalysis Idea – Use two plaintext that barely differ – Study the difference in the corresponding.
Chapter 12 Cryptography (slides edited by Erin Chambers)
Cryptanalysis. The Speaker  Chuck Easttom  
1 Public-Key Cryptography and Message Authentication Ola Flygt Växjö University, Sweden
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
13-1 Last time Security in Networks Network Security Controls Firewalls Honeypots Intrusion Detection Systems.
Crypto Bro Rigby. History
Chapter 20 Symmetric Encryption and Message Confidentiality.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
Midterm Review Cryptography & Network Security
Chapter 20 Symmetric Encryption and Message Confidentiality.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Cracking DES Cryptosystem A cryptosystem is made of these parts: Two parties who want to communicate over an insecure channel An encryption algorithm that.
Strength of Cryptographic Systems Dr. C F Chong, Dr. K P Chow Department of Computer Science and Information Systems The University of Hong Kong.
DES Attacks and Triple DES
1 Public-Key Cryptography and Message Authentication.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
Dr. Reuven Aviv, Nov 2008 Conventional Encryption 1 Conventional Encryption & Message Confidentiality Acknowledgements for slides Henric Johnson Blekinge.
Description of a New Variable-Length Key, 64-Bit Block Cipher (BLOWFISH) Bruce Schneier BY Sunitha Thodupunuri.
Data Security and Encryption (CSE348) 1. Lecture # 3 2.
Public / Private Keys was a big year… DES: Adopted as an encryption standard by the US government. It was an open standard. The NSA calls it “One.
Based on Bruce Schneier Chapter 8: Key Management Dulal C Kar.
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
15-499Page :Algorithms and Applications Cryptography I – Introduction – Terminology – Some primitives – Some protocols.
Lecture 23 Symmetric Encryption
Cracking the DES Encryption
Information Assurance Management Cryptographic Techniques Week 12-2.
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 Principles Applications Requirements RSA Algorithm Description.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Intro to Cryptography Lesson Introduction
DES Analysis and Attacks CSCI 5857: Encoding and Encryption.
7. Key Length Public key length Kim Hyoung-Shick.
Cryptography and Its Algorithms Scott Chappell. What is Cryptography?  Definition: the art of writing or solving codes.
Computer Security Lecture 5 Ch.9 Public-Key Cryptography And RSA Prepared by Dr. Lamiaa Elshenawy.
CS426Fall 2010/Lecture 51 Computer Security CS 426 Lecture 5 Cryptography: Cryptographic Hash Function.
1 Cryptography Troy Latchman Byungchil Kim. 2 Fundamentals We know that the medium we use to transmit data is insecure, e.g. can be sniffed. We know that.
Introduction to Pubic Key Encryption CSCI 5857: Encoding and Encryption.
Lecture 3 (Chapter 9) Public-Key Cryptography and RSA Prepared by Dr. Lamiaa M. Elshenawy 1.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
Lecture 3 Page 1 CS 236 Online Introduction to Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Lecture 5 Page 1 CS 236 Online More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Presentation transcript:

Based on Bruce Schneier Chapter 7: Key Length Dulal C. Kar

Symmetric Key Length For a block cipher –Cryptanalyst needs a small amount of ciphertext and the corresponding plaintext (known plaintext attack) –Getting this plaintext and ciphertext is easy –Just intercept standard header of an or a standard header of file formatted by a word processor Complexity –For 64 bits, 2 64 keys possible –Assuming a million keys a second, it will take 2285 years –Algorithm must be secure so that there is no alternative to break any other way except using brute- force attack

Time and Cost Estimates for Brute-Force Attack Michael Wiener (1995) –Designed 56-bit DES cracking, specialized parallel processing machine for $1 million, which can crack a key in 3.5 hours. –Moore’s Law –Computing power doubles approximately every 18 months, which means costs go down by a factor of 10 every 5 years –$1 million of machine of 1995 will cost $10000 today –Check table 7.1 for time estimates in 1995

Software Crackers Slower than hardware (1000 times slower) Distributed attack making use of idle time of microcomputers Easy to crack a 40-bit key Using 200 million giant Cray mainframe- like computers, each performing a million encryptions per second –To recover a 128-bit key would take a million times the age of the universe

The Chinese Lottery Imagine, a brute-force, million-test-per second cracking chip was built into every radio and television sold in china See table 7.2 for results

Thermodynamic Limitations Second law of thermodynamics To record a single bit requires amount of energy no less than kT (k = 1.38* erg/deg-Kelvin and T = absolute temp) With T = 3.2 deg-Kelvin, to set/reset a bit, it would consume 4.4* ergs Annual output of our sun is about 1.21*10 41 ergs –enough to power 2.7*10 56 single bit changes –Enough to put a 187-bit counter through all its values –Implies that 256-bit keys will be infeasible for cracking using brute-force attack

Public-Key Key Length Hard to factorize a product to obtain two large prime numbers Idea is used to make a trap-door one-way function Breaking public-key algorithms involve trying to factor the large number (or taking discrete logarithms in a very large finite field) Factoring large numbers is hard but getting easier faster than mathematicians expected If you want your keys to remain secure for 20 years, 1024 bits is likely too short

Recommended Public-Key Key Length Years –Individual: 1280 bits –Corporation: 1536 bits –Government: 2048 bits Year 2015 –Individual: 1536 bits –Corporation: 2048 bits –Government: 2048 bits

Comparing Symmetric and Public-Key Key Length A cryptosystem is likely to be attacked at its weakest point In a system that uses both symmetric and public-key cryptography, key lengths for each should be chosen to make both equally difficult to attack See table 7.9 In general, choose a more secure public key length than your symmetric key length. Public keys stays longer

Birthday Attacks Against One-way Hash Functions Two brute-force attacks 1.Given the hash of message, H(M), create another document M’ such that H(M) = H(M’) 2.Find two random messages, M and M’ such that H(M) = H(M’) Second one is far easier attack Assume the hash function produces an m-bit output 1.Finding a message that hashes to a given hash value would require hashing 2 m random messages 2.Finding two messages that hash to the same value would require 2 m/2 random messages Example, if you want to drop the odds of someone breaking to less than 1 in 2 80, use a 160-bit one-way hash function