CSE 5/7353 – January 25 th 2006

37
CSE 5/7353 – January 25 th 2006 Cryptography

description

CSE 5/7353 – January 25 th 2006. Cryptography. Conventional Encryption. Shared Key Substitution Transposition. 5 Types Cryptanalysis. Strength of Cipher. Unconditionally Secure Computationally Secure. Steganography. List Types. General Cipher Characteristics. Key Size - PowerPoint PPT Presentation

Transcript of CSE 5/7353 – January 25 th 2006

Page 1: CSE 5/7353 – January 25 th  2006

CSE 5/7353 – January 25th 2006

Cryptography

Page 2: CSE 5/7353 – January 25 th  2006

Conventional Encryption

• Shared Key

• Substitution

• Transposition

Page 3: CSE 5/7353 – January 25 th  2006

5 Types Cryptanalysis

Page 4: CSE 5/7353 – January 25 th  2006

Strength of Cipher

• Unconditionally Secure

• Computationally Secure

Page 5: CSE 5/7353 – January 25 th  2006

Steganography

• List Types

Page 6: CSE 5/7353 – January 25 th  2006

General Cipher Characteristics

• Key Size• Transposition / Substitution• Block / Stream• Avalanche Effect• Surviving Plain Text Structure – Attacks• Historical Uses• Practical Observations

Page 7: CSE 5/7353 – January 25 th  2006

Caesar Cipher

Page 8: CSE 5/7353 – January 25 th  2006

Caesar Cipher Characteristics

• Key Size• Transposition / Substitution• Block / Stream• Avalanche Effect• Surviving Plain Text Structure – Attacks• Historical Uses• Practical Observations

Page 9: CSE 5/7353 – January 25 th  2006

Letter Substitution

Page 10: CSE 5/7353 – January 25 th  2006

Cipher Characteristics

• Key Size• Transposition / Substitution• Block / Stream• Avalanche Effect• Surviving Plain Text Structure – Attacks• Historical Uses• Practical Observations

Page 11: CSE 5/7353 – January 25 th  2006

Play Fair Cipher

Page 12: CSE 5/7353 – January 25 th  2006

Play Fair Cipher Characteristics

• Key Size• Transposition / Substitution• Block / Stream• Avalanche Effect• Surviving Plain Text Structure – Attacks• Historical Uses• Practical Observations

Page 13: CSE 5/7353 – January 25 th  2006

Vigenere Cipher

Page 14: CSE 5/7353 – January 25 th  2006

Cipher Characteristics

• Key Size• Transposition / Substitution• Block / Stream• Avalanche Effect• Surviving Plain Text Structure – Attacks• Historical Uses• Practical Observations

Page 15: CSE 5/7353 – January 25 th  2006

Vernam Cipher

Page 16: CSE 5/7353 – January 25 th  2006

Vernam Cipher Characteristics

• Key Size• Transposition / Substitution• Block / Stream• Avalanche Effect• Surviving Plain Text Structure – Attacks• Historical Uses• Practical Observations

Page 17: CSE 5/7353 – January 25 th  2006

Transposition Ciphers

Page 18: CSE 5/7353 – January 25 th  2006

Transposition Cipher Characteristics

• Key Size• Transposition / Substitution• Block / Stream• Avalanche Effect• Surviving Plain Text Structure – Attacks• Historical Uses• Practical Observations

Page 19: CSE 5/7353 – January 25 th  2006

Rotor Machines

Page 20: CSE 5/7353 – January 25 th  2006

Rotor Cipher Characteristics

• Key Size• Transposition / Substitution• Block / Stream• Avalanche Effect• Surviving Plain Text Structure – Attacks• Historical Uses• Practical Observations

Page 21: CSE 5/7353 – January 25 th  2006

Shannon

Page 22: CSE 5/7353 – January 25 th  2006

Shannon

• Diffusion– Plain Text “Smearing”– Not Permutation

• Confusion– Key Obfuscation

Page 23: CSE 5/7353 – January 25 th  2006

Feistel Cipher

Page 24: CSE 5/7353 – January 25 th  2006

Fiestel Cipher Characteristics

• Key Size• Transposition / Substitution• Block / Stream• Avalanche Effect• Surviving Plain Text Structure – Attacks• Historical Uses• Practical Observations

Page 25: CSE 5/7353 – January 25 th  2006

Modern Ciphers

Page 26: CSE 5/7353 – January 25 th  2006

DES

• Currently the most widely used block cipher in the world

• IBM’s LUCIFER was the precursor• One of the largest users of the DES is

the banking industry, particularly with EFT

• Although the standard is public, the design criteria used are classified

Page 27: CSE 5/7353 – January 25 th  2006

DES Security

• Recent analysis has shown that DES is well designed (diffusion & confusion)

• Rapid advances in computing speed though have rendered the 56 bit key susceptible to exhaustive key search – 1999 in 22hrs! – 3 DES

• DES also theoretically broken using Differential or Linear Cryptanalysis

• In practice, unlikely to be a problem yet

Page 28: CSE 5/7353 – January 25 th  2006

Overview of DES Encryption

• Basic process consists of: – An initial permutation (IP) – 16 rounds of a complex key dependent

calculation F– A final permutation, being the inverse of IP

Page 29: CSE 5/7353 – January 25 th  2006

• 64-bit key (56-bits + 8-bit parity)• 16 rounds

Initial permutation

Round 1

Round 2

Round 16

56-bitkey

Final permutation

+

F

Li – 1 Ri – 1

Ri

Ki

Li

• Each Round

Page 30: CSE 5/7353 – January 25 th  2006

DES Cipher Characteristics

• Key Size• Transposition / Substitution• Block / Stream• Avalanche Effect• Surviving Plain Text Structure – Attacks• Historical Uses• Practical Observations

Page 31: CSE 5/7353 – January 25 th  2006

Advanced Encryption Standard

AES

Page 32: CSE 5/7353 – January 25 th  2006

Origins of AES

• In 1999, NIST issued a new standard that said 3DES should be used– 168-bit key length– Algorithm is the same as DES

• 3DES had drawbacks– Algorithm is sluggish in software– Only uses 64-bit block size

Page 33: CSE 5/7353 – January 25 th  2006

Origins of AES (Cont’d)

• In 1997, NIST issued a CFP for AES– security strength >= 3DES– improved efficiency– must be a symmetric block cipher (128-bit)– key lengths of 128, 192, and 256 bits

Page 34: CSE 5/7353 – January 25 th  2006

Origins of AES (cont’d)

• First round of evaluation– 15 proposed algorithms accepted

• Second round– 5 proposed algorithms accepted

• Rijndael, Serpent, 2fish, RC6, and MARS

• Final Standard - November 2001– Rijndael selected as AES algorithm

Page 35: CSE 5/7353 – January 25 th  2006

The AES Cipher

• Block length is 128 bits• Key length is 128, 192, or 256 bits• NOT a Feistel structure

• Processes entire block in parallel during each round using substitutions and permutations

• The key that is provided as input is expanded• Array of forty-four 32-bit words (w[i])• Four distinct words serve as round key (128 bits)

Page 36: CSE 5/7353 – January 25 th  2006

Decryption

• Not identical to encryption• Equivalent structure exists• May need different implementations if

encryption and decryption are needed• Quite often only encryption needed

– Digest

Page 37: CSE 5/7353 – January 25 th  2006

AES Cipher Characteristics

• Key Size• Transposition / Substitution• Block / Stream• Avalanche Effect• Surviving Plain Text Structure – Attacks• Historical Uses• Practical Observations