Cryptographic Attacks on Scrambled LZ-Compression and Arithmetic Coding By: RAJBIR SINGH BIKRAM KAHLON.

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Cryptography encryption authentication digital signatures
“Advanced Encryption Standard” & “Modes of Operation”
1 CIS 5371 Cryptography 5b. Pseudorandom Objects in Practice Block Ciphers.
Computer Science 101 Data Encryption And Computer Networks.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
Block Ciphers and the Data Encryption Standard
Cryptography and Network Security
Symmetric Encryption Example: DES Weichao Wang. 2 Overview of the DES A block cipher: – encrypts blocks of 64 bits using a 64 bit key – outputs 64 bits.
Web Security for Network and System Administrators1 Chapter 4 Encryption.
CMSC 414 Computer (and Network) Security Lecture 5 Jonathan Katz.
1 Overview of the DES A block cipher: –encrypts blocks of 64 bits using a 64 bit key –outputs 64 bits of ciphertext A product cipher –basic unit is the.
Introduction to Symmetric Block Cipher Jing Deng Based on Prof. Rick Han’s Lecture Slides Dr. Andreas Steffen’s Security Tutorial.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 5 Wenbing Zhao Department of Electrical and Computer Engineering.
Session 6: Introduction to cryptanalysis part 1. Contents Problem definition Symmetric systems cryptanalysis Particularities of block ciphers cryptanalysis.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Computer Security CS 426 Lecture 3
Computer Science CSC 774Dr. Peng Ning1 CSC 774 Advanced Network Security Topic 2. Review of Cryptographic Techniques.
L1.1. An Introduction to Classical Cryptosystems Rocky K. C. Chang, February 2013.
Encryption Schemes Second Pass Brice Toth 21 November 2001.
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
1 Chapter 4 Encryption. 2 Objectives In this chapter, you will: Learn the basics of encryption technology Recognize popular symmetric encryption algorithms.
Cryptanalysis. The Speaker  Chuck Easttom  
Practical Techniques for Searches on Encrypted Data Yongdae Kim Written by Song, Wagner, Perrig.
Lecture 23 Cryptography CPE 401 / 601 Computer Network Systems Slides are modified from Jim Kurose & Keith Ross.
A Cryptography Education Tool Anna Yu Department of Computer Science College of Engineering North Carolina A&T State University June 18, 2009.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Lecture 2 Overview.
Chapter 2 Data Encryption Algorithms Part I
Chapter 1 Introduction Cryptography-Principles and Practice Harbin Institute of Technology School of Computer Science and Technology Zhijun Li
Differential Cryptanalysis - quite similar to linear cryptanalysis - exploits the relationship between the difference of two inputs and the difference.
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
National Institute of Science & Technology Cryptology and Its Applications Akshat Mathur [1] Cryptology and Its Applications Presented By AKSHAT MATHUR.
Symmetric-Key Cryptography
Terminology and classical Cryptology
Cryptography Team Presentation 2
Cryptography Lynn Ackler Southern Oregon University.
Multiple Encryption & DES  clearly a replacement for DES was needed Vulnerable to brute-force key search attacks Vulnerable to brute-force key search.
Traditional Symmetric-Key Ciphers
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
DIFFERENTIAL CRYPTANALYSIS Chapter 3.4. Ciphertext only attack. The cryptanalyst knows the cryptograms. This happens, if he can eavesdrop the communication.
Description of a New Variable-Length Key, 64-Bit Block Cipher (BLOWFISH) Bruce Schneier BY Sunitha Thodupunuri.
Introduction to Modern Symmetric-key Ciphers
Le Trong Ngoc Security Fundamentals (2) Encryption mechanisms 4/2011.
Lecture 23 Symmetric Encryption
The RC5 Encryption Algorithm: Two Years On Lisa Yin RC5 Encryption –Ron Rivest, December 1994 –Fast Block Cipher –Software and Hardware Implementations.
Block Ciphers and the Advanced Encryption Standard
Intro to Cryptography Lesson Introduction
DES Analysis and Attacks CSCI 5857: Encoding and Encryption.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
1 The Data Encryption Standard. 2 Outline 4.1 Introduction 4.4 DES 4.5 Modes of Operation 4.6 Breaking DES 4.7 Meet-in-the-Middle Attacks.
Linear Cryptanalysis of DES M. Matsui. 1.Linear Cryptanalysis Method for DES Cipher. EUROCRYPT 93, 1994.Linear Cryptanalysis Method for DES Cipher 2.The.
Lecture 3 Overview. Ciphers The intent of cryptography is to provide secrecy to messages and data Substitutions – ‘hide’ letters of plaintext Transposition.
Block Ciphers and the Data Encryption Standard. Modern Block Ciphers  One of the most widely used types of cryptographic algorithms  Used in symmetric.
Lecture 3 Page 1 CS 236 Online Introduction to Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Lecture 2 Overview. Cryptography Secret writing – Disguised data cannot be read, modified, or fabricated easily – Feasibility of complexity for communicating.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
CHAPTER 14 ENCRYPTION AND DECRYPTION Sajina Pradhan
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Cryptanalysis Network Security.
Presentation transcript:

Cryptographic Attacks on Scrambled LZ-Compression and Arithmetic Coding By: RAJBIR SINGH BIKRAM KAHLON

Outline LZ Compression Arithmetic Coding Scrambled Input LZ Compression Scrambled Input Arithmetic Coding Attacks Conclusions References

LZ Compression Algorithm 1. Find the longest substring in the codebook. 2. Output its code. 3. Append the very next character from the input and create a new codebook entry for the resulting string. 4. Advance past the end of the substring just encoded. Until no more character.

LZ Compression Example abbaabbaababbaaaabaabba Dictionary IndexEntryIndexEntry a b ab bb ba aa abb baa aba abba aaa aab baab bba

Scrambled LZ Compression Algorithm Initialize the pseudo random number generator with encryption key. Add null characters in dictionary. Shuffle the initial values of dictionary. Perform LZ Compression

Arithmetic Coding It takes a stream of input symbols and replaces it with a single floating point output number greater than 0 & less than 1. Algorithm Set low to 0.0 Set high to 1.0 While there are still input symbols do Get an Input symbol Code_range = high - low. high = low + range*high_range(symbol) low = low + range*low_range(symbol) End of While Output low

Scrambled Arithmetic Coding Algorithm Initialize the pseudo random number with encryption key Shuffle the probability table Perform Arithmetic Coding

Ciphertext-Only Attack Attack model, in which access to a set of different ciphertexts is provided. Success If: Plaintext corresponding to the ciphertext being analyzed. The encryption key is revealed. Any information about the plaintext pattern.

Chosen-Ciphertext Attack In this case, cryptanalyst chooses ciphertext of his choice. One of the ciphertext(LZ) taken for analysis: ↕ Ö ↕ r ↕ æ ↕ ☼ ↕ Ç ↕ ↕ ↕ ↕ ↕ ¥ ↕ m ↕ O ↕ ≡ ↕ ∙ ↕ ═ ↕ & ↕ ► ↕ ▒ ↕ ⌡ ↕ ▲ ↕ x ‼

ADAPTIVE-CHOSEN-CIPHERTEXT ATTACK Attacker sends a number of cipher texts to be decrypted and use these decrypted cipher texts to select subsequent cipher texts. Most advanced version of cipher text attacks.

Linear Cryptanalysis A linear relation between bits of plaintext, the ciphertext and the bits of key is determined. The basic idea is to approximate the operation of the cipher with an expression that is linear. Xi1 + Xi2 +..Xiu + Yj1 + Yj2 +..Yjv = 0 where Xi represents the i-th bit of the input and Yj represents the j-th bit of the output and ‘+’ represents the exclusive-OR

Conclusions On LZ-Compression Null characters are part of cipher text, so its hard to distinguish between messages and null strings for traffic flow security. The same encoded strings even within same message bear no resemblance to each other i.e. output is completely random. A part of message can not be treated as separate and every part of message is completely dependant on what came prior to it.

Conclusions On LZ-Compression In case of linear attack on LZ compression, it involves big numbers for computation. For 1076 bytes or possible sequences will generate possible enciphering permutations. The number of possible permutations is huge and hides the plaintext.

Conclusions on Arithmetic Coding No two messages M & M` produce same ciphertext file. Arithmetic Coding does not use fixed codewords to represent symbols. A large keyspace i.e. around 2048 bit encryption key makes it difficult to attack the algorithms introduced by Dr. Wang. In case of linear attack, it requires 2 47 known- plaintext blocks and will result in one key bit.

Chosen-Plaintext Attack A chosen-plaintext attack (CPA) is an attack model for cryptanalysis which presumes that the attacker has the capability to choose arbitrary plaintexts to be encrypted and obtain the corresponding cipher texts.

Adaptive Chosen-Plaintext Attacks This attack is similar to chosen-plaintext attack except that in this case, the cryptanalyst makes an nth query based on output of last (n-1) queries.

Differential Attacks In this kind of cryptanalysis, certain fixed differences between the plaintext and the cipher text are exploited till the last round of the cipher. Certain differences, called "characteristics," in plaintext pairs have a high probability of causing certain differences in the resulting cipher text pairs. To find the correct round key, simply collect enough guesses so that one sub key is suggested more often than all the others.

Conclusions Unicity Distance n = H(K)/[|M| - H(M)] H (K) = entropy of keys used in encryption |M| = maximum possible entropy for the plaintext H (M) = entropy of message

Conclusions Case1: Plaintext is ASCII characters Unicity Distance comes out to be characters (very large). Case2: Plaintext is English Language Unicity Distance is characters. H|M| is only value that changes.

Conclusions Large Keyspace – 2048 bit encryption key. Cipher text Randomness. Regularities Reduction. Increased Entropy. Differential Attacks Impractical. For m chosen-plaintext pairs, the corresponding known-plaintext will need about 2 w/2 (2m 1/2 ) known plaintexts (w is the block size (in bits)). With 64-bit block using only eight chosen-plaintext pairs (very small number practically),the corresponding known-plaintext attack will require 2 34 plaintext-cipher text pairs, a large number. On DES,1.5MB/Sec. data stream of plaintexts for three years to get the data. Less efficient than brute force in DES(2 55 v/s )

Conclusions According to sci.crypt FAQ strong encryption should have following characterstics: Large keyspace. Reasonably Large unicity distance. Randomness in cipher text. Resistant to all known attacks. Dr. Wang’s Algorithm is very strong and resistant to above defined attacks.

References Wang, Chung-E Research paper { Arithmetic Coding Source Code { accessed } Dr. Dobb’s Journal { accessed } Handbook of Applied Cryptography { RSA Laboratories { accessed } Sci.Crypt FAQ { accessed }

ANY QUESTIONS???