cse 5/7353 – january 25 th 2006
DESCRIPTION
CSE 5/7353 – January 25 th 2006. Cryptography. Conventional Encryption. Shared Key Substitution Transposition. 5 Types Cryptanalysis. Strength of Cipher. Unconditionally Secure Computationally Secure. Steganography. List Types. General Cipher Characteristics. Key Size - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: CSE 5/7353 – January 25 th 2006](https://reader036.vdocuments.net/reader036/viewer/2022062520/56815cbf550346895dcac338/html5/thumbnails/1.jpg)
CSE 5/7353 – January 25th 2006
Cryptography
![Page 2: CSE 5/7353 – January 25 th 2006](https://reader036.vdocuments.net/reader036/viewer/2022062520/56815cbf550346895dcac338/html5/thumbnails/2.jpg)
Conventional Encryption
• Shared Key
• Substitution
• Transposition
![Page 3: CSE 5/7353 – January 25 th 2006](https://reader036.vdocuments.net/reader036/viewer/2022062520/56815cbf550346895dcac338/html5/thumbnails/3.jpg)
5 Types Cryptanalysis
![Page 4: CSE 5/7353 – January 25 th 2006](https://reader036.vdocuments.net/reader036/viewer/2022062520/56815cbf550346895dcac338/html5/thumbnails/4.jpg)
Strength of Cipher
• Unconditionally Secure
• Computationally Secure
![Page 5: CSE 5/7353 – January 25 th 2006](https://reader036.vdocuments.net/reader036/viewer/2022062520/56815cbf550346895dcac338/html5/thumbnails/5.jpg)
Steganography
• List Types
![Page 6: CSE 5/7353 – January 25 th 2006](https://reader036.vdocuments.net/reader036/viewer/2022062520/56815cbf550346895dcac338/html5/thumbnails/6.jpg)
General Cipher Characteristics
• Key Size• Transposition / Substitution• Block / Stream• Avalanche Effect• Surviving Plain Text Structure – Attacks• Historical Uses• Practical Observations
![Page 7: CSE 5/7353 – January 25 th 2006](https://reader036.vdocuments.net/reader036/viewer/2022062520/56815cbf550346895dcac338/html5/thumbnails/7.jpg)
Caesar Cipher
![Page 8: CSE 5/7353 – January 25 th 2006](https://reader036.vdocuments.net/reader036/viewer/2022062520/56815cbf550346895dcac338/html5/thumbnails/8.jpg)
Caesar Cipher Characteristics
• Key Size• Transposition / Substitution• Block / Stream• Avalanche Effect• Surviving Plain Text Structure – Attacks• Historical Uses• Practical Observations
![Page 9: CSE 5/7353 – January 25 th 2006](https://reader036.vdocuments.net/reader036/viewer/2022062520/56815cbf550346895dcac338/html5/thumbnails/9.jpg)
Letter Substitution
![Page 10: CSE 5/7353 – January 25 th 2006](https://reader036.vdocuments.net/reader036/viewer/2022062520/56815cbf550346895dcac338/html5/thumbnails/10.jpg)
Cipher Characteristics
• Key Size• Transposition / Substitution• Block / Stream• Avalanche Effect• Surviving Plain Text Structure – Attacks• Historical Uses• Practical Observations
![Page 11: CSE 5/7353 – January 25 th 2006](https://reader036.vdocuments.net/reader036/viewer/2022062520/56815cbf550346895dcac338/html5/thumbnails/11.jpg)
Play Fair Cipher
![Page 12: CSE 5/7353 – January 25 th 2006](https://reader036.vdocuments.net/reader036/viewer/2022062520/56815cbf550346895dcac338/html5/thumbnails/12.jpg)
Play Fair Cipher Characteristics
• Key Size• Transposition / Substitution• Block / Stream• Avalanche Effect• Surviving Plain Text Structure – Attacks• Historical Uses• Practical Observations
![Page 13: CSE 5/7353 – January 25 th 2006](https://reader036.vdocuments.net/reader036/viewer/2022062520/56815cbf550346895dcac338/html5/thumbnails/13.jpg)
Vigenere Cipher
![Page 14: CSE 5/7353 – January 25 th 2006](https://reader036.vdocuments.net/reader036/viewer/2022062520/56815cbf550346895dcac338/html5/thumbnails/14.jpg)
Cipher Characteristics
• Key Size• Transposition / Substitution• Block / Stream• Avalanche Effect• Surviving Plain Text Structure – Attacks• Historical Uses• Practical Observations
![Page 15: CSE 5/7353 – January 25 th 2006](https://reader036.vdocuments.net/reader036/viewer/2022062520/56815cbf550346895dcac338/html5/thumbnails/15.jpg)
Vernam Cipher
![Page 16: CSE 5/7353 – January 25 th 2006](https://reader036.vdocuments.net/reader036/viewer/2022062520/56815cbf550346895dcac338/html5/thumbnails/16.jpg)
Vernam Cipher Characteristics
• Key Size• Transposition / Substitution• Block / Stream• Avalanche Effect• Surviving Plain Text Structure – Attacks• Historical Uses• Practical Observations
![Page 17: CSE 5/7353 – January 25 th 2006](https://reader036.vdocuments.net/reader036/viewer/2022062520/56815cbf550346895dcac338/html5/thumbnails/17.jpg)
Transposition Ciphers
![Page 18: CSE 5/7353 – January 25 th 2006](https://reader036.vdocuments.net/reader036/viewer/2022062520/56815cbf550346895dcac338/html5/thumbnails/18.jpg)
Transposition Cipher Characteristics
• Key Size• Transposition / Substitution• Block / Stream• Avalanche Effect• Surviving Plain Text Structure – Attacks• Historical Uses• Practical Observations
![Page 19: CSE 5/7353 – January 25 th 2006](https://reader036.vdocuments.net/reader036/viewer/2022062520/56815cbf550346895dcac338/html5/thumbnails/19.jpg)
Rotor Machines
![Page 20: CSE 5/7353 – January 25 th 2006](https://reader036.vdocuments.net/reader036/viewer/2022062520/56815cbf550346895dcac338/html5/thumbnails/20.jpg)
Rotor Cipher Characteristics
• Key Size• Transposition / Substitution• Block / Stream• Avalanche Effect• Surviving Plain Text Structure – Attacks• Historical Uses• Practical Observations
![Page 21: CSE 5/7353 – January 25 th 2006](https://reader036.vdocuments.net/reader036/viewer/2022062520/56815cbf550346895dcac338/html5/thumbnails/21.jpg)
Shannon
![Page 22: CSE 5/7353 – January 25 th 2006](https://reader036.vdocuments.net/reader036/viewer/2022062520/56815cbf550346895dcac338/html5/thumbnails/22.jpg)
Shannon
• Diffusion– Plain Text “Smearing”– Not Permutation
• Confusion– Key Obfuscation
![Page 23: CSE 5/7353 – January 25 th 2006](https://reader036.vdocuments.net/reader036/viewer/2022062520/56815cbf550346895dcac338/html5/thumbnails/23.jpg)
Feistel Cipher
![Page 24: CSE 5/7353 – January 25 th 2006](https://reader036.vdocuments.net/reader036/viewer/2022062520/56815cbf550346895dcac338/html5/thumbnails/24.jpg)
Fiestel Cipher Characteristics
• Key Size• Transposition / Substitution• Block / Stream• Avalanche Effect• Surviving Plain Text Structure – Attacks• Historical Uses• Practical Observations
![Page 25: CSE 5/7353 – January 25 th 2006](https://reader036.vdocuments.net/reader036/viewer/2022062520/56815cbf550346895dcac338/html5/thumbnails/25.jpg)
Modern Ciphers
![Page 26: CSE 5/7353 – January 25 th 2006](https://reader036.vdocuments.net/reader036/viewer/2022062520/56815cbf550346895dcac338/html5/thumbnails/26.jpg)
DES
• Currently the most widely used block cipher in the world
• IBM’s LUCIFER was the precursor• One of the largest users of the DES is
the banking industry, particularly with EFT
• Although the standard is public, the design criteria used are classified
![Page 27: CSE 5/7353 – January 25 th 2006](https://reader036.vdocuments.net/reader036/viewer/2022062520/56815cbf550346895dcac338/html5/thumbnails/27.jpg)
DES Security
• Recent analysis has shown that DES is well designed (diffusion & confusion)
• Rapid advances in computing speed though have rendered the 56 bit key susceptible to exhaustive key search – 1999 in 22hrs! – 3 DES
• DES also theoretically broken using Differential or Linear Cryptanalysis
• In practice, unlikely to be a problem yet
![Page 28: CSE 5/7353 – January 25 th 2006](https://reader036.vdocuments.net/reader036/viewer/2022062520/56815cbf550346895dcac338/html5/thumbnails/28.jpg)
Overview of DES Encryption
• Basic process consists of: – An initial permutation (IP) – 16 rounds of a complex key dependent
calculation F– A final permutation, being the inverse of IP
![Page 29: CSE 5/7353 – January 25 th 2006](https://reader036.vdocuments.net/reader036/viewer/2022062520/56815cbf550346895dcac338/html5/thumbnails/29.jpg)
• 64-bit key (56-bits + 8-bit parity)• 16 rounds
Initial permutation
Round 1
Round 2
Round 16
56-bitkey
Final permutation
…
+
F
Li – 1 Ri – 1
Ri
Ki
Li
• Each Round
![Page 30: CSE 5/7353 – January 25 th 2006](https://reader036.vdocuments.net/reader036/viewer/2022062520/56815cbf550346895dcac338/html5/thumbnails/30.jpg)
DES Cipher Characteristics
• Key Size• Transposition / Substitution• Block / Stream• Avalanche Effect• Surviving Plain Text Structure – Attacks• Historical Uses• Practical Observations
![Page 31: CSE 5/7353 – January 25 th 2006](https://reader036.vdocuments.net/reader036/viewer/2022062520/56815cbf550346895dcac338/html5/thumbnails/31.jpg)
Advanced Encryption Standard
AES
![Page 32: CSE 5/7353 – January 25 th 2006](https://reader036.vdocuments.net/reader036/viewer/2022062520/56815cbf550346895dcac338/html5/thumbnails/32.jpg)
Origins of AES
• In 1999, NIST issued a new standard that said 3DES should be used– 168-bit key length– Algorithm is the same as DES
• 3DES had drawbacks– Algorithm is sluggish in software– Only uses 64-bit block size
![Page 33: CSE 5/7353 – January 25 th 2006](https://reader036.vdocuments.net/reader036/viewer/2022062520/56815cbf550346895dcac338/html5/thumbnails/33.jpg)
Origins of AES (Cont’d)
• In 1997, NIST issued a CFP for AES– security strength >= 3DES– improved efficiency– must be a symmetric block cipher (128-bit)– key lengths of 128, 192, and 256 bits
![Page 34: CSE 5/7353 – January 25 th 2006](https://reader036.vdocuments.net/reader036/viewer/2022062520/56815cbf550346895dcac338/html5/thumbnails/34.jpg)
Origins of AES (cont’d)
• First round of evaluation– 15 proposed algorithms accepted
• Second round– 5 proposed algorithms accepted
• Rijndael, Serpent, 2fish, RC6, and MARS
• Final Standard - November 2001– Rijndael selected as AES algorithm
![Page 35: CSE 5/7353 – January 25 th 2006](https://reader036.vdocuments.net/reader036/viewer/2022062520/56815cbf550346895dcac338/html5/thumbnails/35.jpg)
The AES Cipher
• Block length is 128 bits• Key length is 128, 192, or 256 bits• NOT a Feistel structure
• Processes entire block in parallel during each round using substitutions and permutations
• The key that is provided as input is expanded• Array of forty-four 32-bit words (w[i])• Four distinct words serve as round key (128 bits)
![Page 36: CSE 5/7353 – January 25 th 2006](https://reader036.vdocuments.net/reader036/viewer/2022062520/56815cbf550346895dcac338/html5/thumbnails/36.jpg)
Decryption
• Not identical to encryption• Equivalent structure exists• May need different implementations if
encryption and decryption are needed• Quite often only encryption needed
– Digest
![Page 37: CSE 5/7353 – January 25 th 2006](https://reader036.vdocuments.net/reader036/viewer/2022062520/56815cbf550346895dcac338/html5/thumbnails/37.jpg)
AES Cipher Characteristics
• Key Size• Transposition / Substitution• Block / Stream• Avalanche Effect• Surviving Plain Text Structure – Attacks• Historical Uses• Practical Observations