Cracking the DES Encryption

Slides:



Advertisements
Similar presentations
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
Advertisements

1 Lecture 3: Secret Key Cryptography Outline concepts DES IDEA AES.
Cryptography and Network Security Chapter 3
The Advanced Encryption Standard (AES) Simplified.
Block Ciphers and the Data Encryption Standard
Rachana Y. Patil 1 Data Encryption Standard (DES) (DES)
Data Encryption Standard (DES)
Symmetric Encryption Example: DES Weichao Wang. 2 Overview of the DES A block cipher: – encrypts blocks of 64 bits using a 64 bit key – outputs 64 bits.
Cryptography1 CPSC 3730 Cryptography Chapter 3 DES.
Advanced Encryption Standard(AES) Presented by: Venkata Marella Slide #9-1.
DES 1 Data Encryption Standard DES 2 Data Encryption Standard  DES developed in 1970’s  Based on IBM Lucifer cipher  U.S. government standard  DES.
1 Overview of the DES A block cipher: –encrypts blocks of 64 bits using a 64 bit key –outputs 64 bits of ciphertext A product cipher –basic unit is the.
1 Chapter 3 – Block Ciphers and the Data Encryption Standard Modern Block Ciphers  now look at modern block ciphers  one of the most widely used types.
1 Chapter 3 – Block Ciphers and the Data Encryption Standard Modern Block Ciphers  now look at modern block ciphers  one of the most widely used types.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
ICS 454: Principles of Cryptography
CS Network Security Lecture 2 Prof. Katz. 9/7/2000Lecture 2 - Data Encryption2 DES – Data Encryption Standard Private key. Encrypts by series of.
Lecture 23 Symmetric Encryption
Lecture 2.2: Private Key Cryptography II CS 436/636/736 Spring 2012 Nitesh Saxena.
Decryption Algorithms Characterization Project ECE 526 spring 2007 Ravimohan Boggula,Rajesh reddy Bandala Southern Illinois University Carbondale.
Chapter 3 – Block Ciphers and the Data Encryption Standard
CSE 651: Introduction to Network Security
Data Encryption Standard (DES). Symmetric Cryptography  C = E(P,K)  P = D(C,K)  Requirements  Given C, the only way to obtain P should be with  the.
The Digital Encryption Standard CSCI 5857: Encoding and Encryption.
Cryptography and Network Security Chapter 3. Modern Block Ciphers  now look at modern block ciphers  one of the most widely used types of cryptographic.
Cryptography Lecture 4 Stefan Dziembowski
Network Security Lecture 14 Presented by: Dr. Munam Ali Shah.
CHAPTER 6 Cryptography. An Overview It is origin from the Greek word kruptos which means hidden. The objective is to hide information so that only the.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Introduction to Cryptography Techniques How secure is that banking network traffic?
13. Other Block Ciphers 13.1 LUCIFER 13.2 MADRYGA 13.3 NEWDES 13.4 FEAL 13.5 REDOC 13.6 LOKI.
Cracking DES Cryptosystem A cryptosystem is made of these parts: Two parties who want to communicate over an insecure channel An encryption algorithm that.
Cryptography Team Presentation 2
1 Lect. 7 : Data Encryption Standard. 2 Data Encryption Standard (DES)  DES - History 1976 – adopted as a federal standard 1977 – official publication.
Classical &ontemporyryptology 1 Block Cipher Today’s most widely used ciphers are in the class of Block Ciphers Today’s most widely used ciphers are in.
Description of a New Variable-Length Key, 64-Bit Block Cipher (BLOWFISH) Bruce Schneier BY Sunitha Thodupunuri.
TE/CS 536 Network Security Spring 2005 – Lecture 8 Security of symmetric algorithms.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Chapter 3 Encryption Algorithms & Systems (Part D)
Lecture 23 Symmetric Encryption
1 Symmetric key cryptography: DES DES: Data Encryption Standard US encryption standard [NIST 1993] 56-bit symmetric key, 64 bit plaintext input How secure.
Computer and Network Security Rabie A. Ramadan Lecture 3.
Module :MA3036NI Symmetric Encryption -4 Lecture Week 5.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Data Encryption Standard (DES)
Chapter 2 Symmetric Encryption.
Plaintextciphertext encryption algorithmdecryption algorithm plaintext.
© Information Security Group, ICU1 Block Cipher- introduction  DES Description: Feistel, S-box Exhaustive Search, DC and LC Modes of Operation  AES Description:
DES Analysis and Attacks CSCI 5857: Encoding and Encryption.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
Block Cipher- introduction
Data Encryption Standard (DES) most widely used block cipher in world adopted in 1977 by NBS (now NIST) – as FIPS PUB 46 encrypts 64-bit data using 56-bit.
Lecture 2 Page 1 CS 236, Spring 2008 More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
DES: Data Encryption Standard
Block Ciphers and the Data Encryption Standard. Modern Block Ciphers  One of the most widely used types of cryptographic algorithms  Used in symmetric.
CSE 5/7353 – January 25 th 2006 Cryptography. Conventional Encryption Shared Key Substitution Transposition.
Lecture 5 Page 1 CS 236 Online More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Group 01 Foucher, S Thontat, Y Shaduka, S. Encryption History  WWII and breaking the Enigma code  people full time.
1 CPCS425: Information Security (Topic 5) Topic 5  Symmetrical Cryptography  Understand the principles of modern symmetric (conventional) cryptography.
@Yuan Xue Announcement Project Release Team forming Homework 1 will be released next Tuesday.
Data Encryption Standard (DES) Financial companies found the need for a cryptographic algorithm that would have the blessing of the US government (=NSA)
Outline Desirable characteristics of ciphers Uses of cryptography
Outline Desirable characteristics of ciphers Uses of cryptography
Lecture 3: Symmetric Key Encryption
DATA ENCRYPTION STANDARD (DES)
Presentation transcript:

Cracking the DES Encryption

Outline DES Encryption (in general). DES Vulnerabilities. Cracking the DES (DESCHALL). Using Condor Advantages.

DES Encryption In general

History In 1971, LUCIFER algorithm was developed. Cyphers block of 64 bits, using a 128-bit key LUCIFER was refined by IBM researchers. The key was reduced to 56-bit: fits on a chip. In 1977, the IBM project was adopted as the Data Encryption Standard (DES) by NSA.

Encryption Basics – Symmetric Key Encryption Plaintext DEAD 1101 1110 1010 1101 Key BEEF 1011 1110 1110 1111 Ciphertext 0110 0000 0100 0010 = 6042  = Plaintext 1101 1110 1010 1101 = DEAD Ciphertext 6042 0110 0000 0100 0010 Real Simple: Same key to encode and decode Encoding and Decoding algorithms are symmetrical!

DES Algorithm Crypts 64 bits blocks of plain text. Using a 56 bits key. Expands the Symmetric Key Encryption 16 stages of processing Block Ciphers. Initial & Final Permutations (IP, FP) Using Feistel Function & Key Schedule

48 bit subkey Generator Ki(48) = g(i,K(56)) (The key for each round is Li-1 Ri-1 Li Ri 48 bit subkey Generator Ki(48) = g(i,K(56)) (The key for each round is deterministically found from the input 56 bit key). Expansion Permutation S-Box Substitution P-Box Permutation 32 48                         ,                                                                                                                                                        .

IP – Initial Permutation 8 16 24 32 40 48 56 FP – Final Permutation 8 16 24 32 40 48 56

DES Advantages Strong encryption-Confusion and diffusion Using a non linear function (S-Box) Using bit permutation (P-Box) Ideally suited for implementation in hardware (bit shifts, look-ups etc). Suited for video & voice.

DES Vulnerabilities  Are there any disadvantages?

Brute Force Attack Basic attack for deciphering any kind of encrypted data. Trying all possible options. Takes a lot of time and resources. Dedicated hardware is faster than software.

56 bit Key - Advantage or Disadvantage? 256 possible keys = 72,057,594,037,927,936 Moore’s law compatible. Even 20 years later(1997), it would take: 2,285 years to decipher! With a 200 MHz Pentium system that can test approximately 1 million keys/second.

More Efficient Exploitations Differential cryptanalysis Linear cryptanalysis Both require hundreds of Terabytes of cyphered & deciphered messages. Still requires 2^43 iterations. Dedicated machines.

DESCHALL Competition Cracking the algorithm – it’s all about the money

The Challenge RSA Security offered a 10,000$ prize in 1997, for the first who crack the DES. A group of computer scientists involved thousands of volunteers deciphered it! It took only 96 days! (against 2,285 years) How did they manage to get a speedup of 8687 ??? How come the DES developers didn’t see it coming?

The Solution There was no internet when DES was introduced in 1977. Even in 1997 the internet sounded bad. Parallel Computing is the answer! Simply using brute force. With the help of up to 14k computers a day and a total of 78k unique computers. By offering a 4,000$ prize to the computer owner who finds the right key.

DESCHALL Competition How does it works?

Client Flowchart Server Flowchart

Calculation Speed Average user speed is a sine form Computers are more idle on weekends.

Growing popularity. Parabolic growth of total calculated keys. Only ¼ of all key options was needed to be calculate.

Can HTCondor Help? Parallel computing using High Throughput Computing (HTC)

Condor Relevant Advantages Sequential execution of a series of programs without human interaction. Supports many different machines. High throughput computing. Open source and easy to setup.

Conclusions DES was outdated after DESCHALL. Nowadays internet can help us achieve tremendous computing power with the growing amount of computers connected. Longer keys are better - 256 bit key is common and believed to be hard to brute force (78 digits!) Better encryption methods are in use today but they are also vulnerable!

Referances http://lasecwww.epfl.ch/memo/memo_des.shtml http://www.interhack.net/projects/deschall/ http://www.interhack.net/pubs/des-key-crack/ http://linuxgazette.net/issue46/serrao.html http://www.distributed.net/DES http://en.wikipedia.org/wiki/DESCHALL_Project http://en.wikipedia.org/wiki/Data_Encryption_Standard http://en.wikipedia.org/wiki/Brute_force_attack http://www.worldofhacker.com/2013/09/basic-idea-of-creating-password.html http://www.hep.uiuc.edu/home/mats/crypto/crypto.ppt