Presentation is loading. Please wait.

Presentation is loading. Please wait.

History Applications Attacks Advantages & Disadvantages Conclusion.

Similar presentations


Presentation on theme: "History Applications Attacks Advantages & Disadvantages Conclusion."— Presentation transcript:

1 History Applications Attacks Advantages & Disadvantages Conclusion

2 Based on Rijndael algorithm Designed by Vincent Rijmen and Joan Daemen Successor of DES ( Why not Triple-DES )Triple-DES 128-bit key minimum

3 15 different designs 5 final nominees Rijndael (86 positive, 10 negative) Serpent (59 positive, 7 negative) Twofish (31 positive, 21 negative) RC6 (23 positive, 37 negative) MARS (13 positive, 83 negative)

4 A standard by NIST Archive and compression tools Disk encryption Local Area Network security Programming language C : Cryptography API C++: Botan, Crypto++ Java: Java Cryptography Extension (JCE) A standard by NIST Archive and compression tools Disk encryption Local Area Network security Programming language C : Cryptography API C++: Botan, Crypto++ Java: Java Cryptography Extension (JCE) On June 2003, AES 128-bit was approved for SECRET level document, and AES 256-bit approved for “TOP SECRET” level

5 Side channel attack Power analysis Timing analysis Fault analysis Acoustic analysis Radiation analysis (TEMPEST) Exhaustive search (Brute force attack) XSL attack ( Extended Sparse Linearization )

6 Published in 2002 Requiring fewer known plaintext Faster than an exhaustive search No real-world implementation “no one knows for certain if XSL can break Rijndael, and no one knows for certain that XSL cannot break Rijndael either..” Bruce Schneier, Twofish designer

7 Advantages Safe Brute Force (128 Bit = 2 128 attempts) Unbreakable, for now.. Disadvantages Too simple algebraic structure

8

9 Will be used until there is any indication that the cipher system could be broken. Safe for now..

10 [1] AES : http://en.wikipedia.org/wiki/Advanced_Encryption_Standardhttp://en.wikipedia.org/wiki/Advanced_Encryption_Standard [2] WinZip AES Encryption Information: http://www.winzip.com/aes_info.htmhttp://www.winzip.com/aes_info.htm [3] AES Implementations: http://en.wikipedia.org/wiki/AES_implementationshttp://en.wikipedia.org/wiki/AES_implementations [4] Cryptosystem: http://www.cryptosystem.net/aes/http://www.cryptosystem.net/aes/ [5] AES Animations: http://www.cs.bc.edu/~straubin/cs381- 05/blockciphers/rijndael_ingles2004.swfhttp://www.cs.bc.edu/~straubin/cs381- 05/blockciphers/rijndael_ingles2004.swf [6] XSL Attack: http://en.wikipedia.org/wiki/XSL_attackhttp://en.wikipedia.org/wiki/XSL_attack

11 Thank you for your attention!

12 Very slow in software Unsuitable in limited resources platform Only 64 bits block size Back


Download ppt "History Applications Attacks Advantages & Disadvantages Conclusion."

Similar presentations


Ads by Google