1 CIS 5371 Cryptography 5a. Pseudorandom Objects in Practice Block Ciphers B ased on: Jonathan Katz and Yehuda Lindell Introduction to Modern Cryptography.

Slides:



Advertisements
Similar presentations
6.1.2 Overview DES is a block cipher, as shown in Figure 6.1.
Advertisements

CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
1 CIS 5371 Cryptography 5b. Pseudorandom Objects in Practice Block Ciphers.
CIS 5371 Cryptography 3b. Pseudorandomness.
Cryptography and Network Security Chapter 3
Block Ciphers and the Data Encryption Standard
Rachana Y. Patil 1 Data Encryption Standard (DES) (DES)
Data Encryption Standard (DES)
1 CIS 5371 Cryptography 4. Collision Resistant Hash Functions B ased on: Jonathan Katz and Yehuda Lindell Introduction to Modern Cryptography.
SYMMETRIC CRYPTOSYSTEMS Symmetric Cryptosystems 10/06/2015 | pag. 2.
CMSC 414 Computer (and Network) Security Lecture 5 Jonathan Katz.
1 The AES block cipher Niels Ferguson. 2 What is it? Block cipher: encrypts fixed-size blocks. Design by two Belgians. Chosen from 15 entries in a competition.
Cryptography1 CPSC 3730 Cryptography Chapter 3 DES.
1 Chapter 3 – Block Ciphers and the Data Encryption Standard Modern Block Ciphers  now look at modern block ciphers  one of the most widely used types.
1 Chapter 3 – Block Ciphers and the Data Encryption Standard Modern Block Ciphers  now look at modern block ciphers  one of the most widely used types.
CS470, A.SelcukLucifer & DES1 Block Ciphers Lucifer & DES CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Lecture 23 Symmetric Encryption
6. Practical Constructions of Symmetric-Key Primitives
CSCE 790G: Computer Network Security Chin-Tser Huang University of South Carolina.
CS555Spring 2012/Topic 91 Cryptography CS 555 Topic 9: Block Cipher Construction & DES.
Chapter 3 – Block Ciphers and the Data Encryption Standard
CSE 651: Introduction to Network Security
The Digital Encryption Standard CSCI 5857: Encoding and Encryption.
IT 221: Classical and Modern Encryption Techniques Lecture 2: Classical and Modern Encryption Techniques For Educational Purposes Only Revised: September.
Cryptography and Network Security
CSCI 5857: Encoding and Encryption
1 CIS 5371 Cryptography 3. Private-Key Encryption and Pseudorandomness B ased on: Jonathan Katz and Yehuda Lindel Introduction to Modern Cryptography.
Chapter 20 Symmetric Encryption and Message Confidentiality.
TE/CS 536 Network Security Spring 2006 – Lectures 6&7 Secret Key Cryptography.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Hashing Algorithms: Basic Concepts and SHA-2 CSCI 5857: Encoding and Encryption.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Chapter 2 (B) – Block Ciphers and Data Encryption Standard.
DES Algorithm Data Encryption Standard. DES Features Block cipher, 64 bits per block 64-bit key, with only 56 bits effective ECB mode and CBC mode.
Stream Ciphers and Block Ciphers A stream cipher is one that encrypts a digital data stream one bit or one byte at a time. Examples of classical stream.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Description of a New Variable-Length Key, 64-Bit Block Cipher (BLOWFISH) Bruce Schneier BY Sunitha Thodupunuri.
Introduction to Modern Symmetric-key Ciphers
Le Trong Ngoc Security Fundamentals (2) Encryption mechanisms 4/2011.
1 CIS 5371 Cryptography 4. Message Authentication Codes B ased on: Jonathan Katz and Yehuda Lindell Introduction to Modern Cryptography.
1 Data Encryption Standard (DES) An example of secret key (i.e., symmetric) encryption system Note: These figures are meant to help illustrating a few.
Introduction to Information Security Lect. 6: Block Ciphers.
Lecture 23 Symmetric Encryption
Fifth Edition by William Stallings
Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.
Computer and Network Security Rabie A. Ramadan Lecture 3.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
5.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 5 Introduction to Modern Symmetric-key Ciphers.
CS519, © A.SelcukDifferential & Linear Cryptanalysis1 CS 519 Cryptography and Network Security Instructor: Ali Aydin Selcuk.
CS555Spring 2012/Topic 81 Cryptography CS 555 Topic 8: Pseudorandom Functions and CPA Security.
Module :MA3036NI Symmetric Encryption -3 Lecture Week 4.
Data Encryption Standard 1977 “New Directions in Cryptography” 1976.
Block Ciphers and the Data Encryption Standard. Modern Block Ciphers  One of the most widely used types of cryptographic algorithms  Used in symmetric.
CSE 5/7353 – January 25 th 2006 Cryptography. Conventional Encryption Shared Key Substitution Transposition.
Information and Network Security Lecture 2 Dr. Hadi AL Saadi.
Information and Computer Security CPIS 312 Lab 6 & 7 1 TRIGUI Mohamed Salim Symmetric key cryptography.
@Yuan Xue CS 285 Network Security Block Cipher Principle Fall 2012 Yuan Xue.
@Yuan Xue Announcement Project Release Team forming Homework 1 will be released next Tuesday.
Lecture 4 Data Encryption Standard (DES) Dr. Nermin Hamza
CS480 Cryptography and Information Security
Cryptography Lecture 18.
Cryptography Lecture 17.
Chapter -2 Block Ciphers and the Data Encryption Standard
Block Ciphers (Crypto 2)
Cryptography Lecture 16.
Cryptography Lecture 17.
Presentation transcript:

1 CIS 5371 Cryptography 5a. Pseudorandom Objects in Practice Block Ciphers B ased on: Jonathan Katz and Yehuda Lindell Introduction to Modern Cryptography

2 Block ciphers as encryption schemes or pseudorandom permutations  Block ciphers should be viewed as pseudorandom permutations and not as encryption schemes.  Block ciphers should be viewed as basic building blocks for symmetric key applications as not just as encryption schemes themselves.

3 Block ciphers in practice and Definition 3.28  Although we consider block ciphers as pseudorandom permutations, practical constructions of block ciphers do not quite meet the definition.  Practical block ciphers are defined for one (or a few) key and block lengths.  This is in contrast to Definition 3.28 that refers to all possible key and block lengths.

4 Substitution-Permutation Networks

5  A substitution-permutation network is a direct implementation of this paradigm.  The substitution component refers to small random functions, called S-boxes and the permutation component refers to the mixing of the outputs of the random functions.  The permutation involves the reordering of the output bits and are called mixing permutations.

6  The secret key  One possibility is to have the key specify the S-boxes and mixing permutations.  Another possibility is to mix the key into the computation in between each round of substitution- permutation. This option is commonly used.

7  The basic idea is to break the input up into small parts and then feed these parts through different S-boxes (random permutations).  The outputs are then mixed together  The process is repeated a given number of times, called a rounds.  The S-boxes introduce confusion into the construction.  In order to spread the confusion throughout, the results are mixed together, achieving diffusion.

8 Single round of substitution-permutation network

9 The avalanche effect  An important property in any block cipher is that small changes to the input must result in large changes to the output.  To ensure this, block ciphers are designed so that small changes in the input propagate quickly to very large changes in the intermediate values.

10 The avalanche effect It is easy to demonstrate that the avalanche effect holds in a substitution-permutation network, when the following hold: 1.The S-boxes are designed so that any change of at least a single bit to the input to an S-box results in a change of at least two bits in the output. 2.The mixing permutations are designed so that the output bits of any given S-box are spread into different S-boxes in the next round.

11 Feistel Networks  A Feistel network is an alternative way of constructing a block cipher.  The low-level building blocks (S-boxes, mixing permutations and key schedule) are the same.  The difference is in the high-level design.  The advantage of Feistel networks over substitution permutation networks is that they enable the use of S-boxes that are not necessarily invertible.

12 Feistel Networks  This is important because a good block cipher has chaotic behavior (it should look random).  Requiring that all of the components of the construction be invertible inherently introduces structure, which contradicts the need for chaos.

13 Feistel Networks  A Feistel network is thus a way of constructing an invertible function from non-invertible components.  This seems like a contradiction in terms---if you cannot invert the components, how can you invert the overall structure.  Nevertheless, the Feistel design ingeniously overcomes this obstacle.

14 A Feistel network

15 mmm mm mmm m mm mmm m Feistel Network.