Documente Academic
Documente Profesional
Documente Cultură
Standards
R S Jamgekar
Syllabus
Introduction, Encryption Methods: Symmetric, Asymmetric,
Cryptography, Substitution Ciphers. Transposition Ciphers,
Stegnography applications and limitations, Block Ciphers
and methods of operations, Feistal Cipher, Data Encryption
Standard (DES), Triple DES, DES Design Criteria, Weak Keys
in DES Algorithms, Advance Encryption Standard (AES).
Overview
Cryptographic algorithms and protocols
Symmetric encryption-
Asymmetric encryption-
Authentication protocols-
Encryption key
Cipher text
Y = E(K, X)
X = D(K, Y)
Characteristics of cryptographic system
The type of operations used for transforming plaintext to
ciphertext.
Cryptanalysis:
plaintext
Rely on plaintext–ciphertext pairs
Brute-force attack:
Public and private keys: This is a pair of keys that have been
selected so that if one is used for encryption, the other is used for
decryption.
Substitution Method
Transposition Method
SUBSTITUTION TECHNIQUES
Substitution technique is one in which the letters of plaintext are replaced
Caesar cipher
Plain & cipher:
a b c d e f g h i j k l m n o p q r s t u v w x y z
D E F G H I J K L M N O P Q R S T U V WX Y Z A B C
etefeteoaat
Transposition Techniques
Steganography
Steganography is the practice of concealing a file, message,
image, or video within another file.
Steganography is the art and science of invisible
communication.
Various techniques of steganography are
Character marking:
Invisible ink
Pin punctures
Drawbacks:
worthless.
Steganography
Steganography
BLOCK CIPHER PRINCIPLES
A block cipher operates on a plaintext block of n bits to
60.
DIFFUSION AND CONFUSION
original message
bulk of cipher-text
[1]
The F function of DES
P-Box (Permutation Box)
48-bit input
32-bit output
Box S1
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
0 14 4 13 1 2 15 11 8 3 10 6 12 5 9 0 7
1 0 15 7 4 14 2 13 1 10 6 12 11 6 5 3 8
2 4 1 14 8 13 6 2 11 15 12 9 7 3 10 5 0
3 15 12 8 2 4 9 1 7 5 11 3 14 10 0 6 13
36
Avalanche Effect
Avalanche effect:
ciphertext on average.
1-bit change in the key affects 35 bits in the ciphertext on
average.
Attacks on DES
Brute-force key search
Needs only two plaintext-ciphertext samples
Trying 1 key per microsecond would take 1000+ years on average, due to
the large key space size, 256 ≈ 7.2×1016.
Differential cryptanalysis
Possible to find a key with 247 plaintext-ciphertext samples
Known-plaintext attack
Liner cryptanalysis:
Possible to find a key with 243 plaintext-ciphertext samples
Known-plaintext attack
38
Modes of operations
Electronic Codebook (ECB)
Counter (CTR)
Electronic Codebook (ECB)
Enciphering.
Input:
k-bit key K
n-bit plaintext blocks M = M1M2 . . . Mt
Algorithm:
Cj = EK(Mj)
Output
n-bit cipher-text blocks C = C1C2 . . . Ct
Deciphering
Input:
k-bit key K
n-bit cipher-text blocks C = C1C2 . . . Ct
Algorithm:
Mj = DK(Cj).
Electronic Codebook (ECB)
Properties:
k-bit key K
Algorithm:
Cj = E K (Cj−1 ⊕ Mj)
Output:
Input:
k-bit key K
Algorithm:
Mj = Cj−1 ⊕ DK(Cj).
Output:
Algorithm:
Cj = Mj ⊕ Lr(EK(Ij))
Ij+1 = Rn−r(Ij )|| Cj
Deciphering
Mj = Cj ⊕ Lr(EK(Ij))
Cipher Feedback mode
Output Feedback Mode (OFB)
Error propagation is avoided.
Enciphering.
Input:
k-bit key K
Algorithm:
Ij = EK(Ij−1)
Cj = Mj ⊕ Lr(Ij)
Deciphering : Mj = Cj ⊕ Lr(Ij)
Counter
Multiple encryption
Multiple encryption is a technique in which an encryption
algorithm is used multiple times. In the first instance,
plaintext is converted to ciphertext using the encryption
algorithm. This ciphertext is then used as input and the
algorithm is applied again. This process may be repeated
through any number of stages.
Triple DES makes use of three stages of the DES algorithm,
using a total of two or three distinct keys.
Five modes of operation have been standardized by NIST for
use with symmetric block ciphers such as DES
TRIPLE DES
Given the potential vulnerability of DES to a brute-force attack, there
has been considerable interest in finding an alternative.
One approach is to design a completely new algorithm, of which AES
is a prime example or modify existing one DES.
Double DES
Two keys
Encryption
Decryption
and
X = E(K1, P) = D(K2, C)
Triple DES
Use three stages of encryption with three different keys.
2112 ≈ (5 * 1033)
Triple DES
It uses a 128-bit block size and a key size of 128, 192, or 256 bits.
byte substitution,
permutation,
arithmetic operations over a finite field
XOR with a key.
FINITE FIELD ARITHMETIC
In AES, all operations are performed on 8-bit bytes.
arithmetic
AES STRUCTURE
The cipher takes a plaintext block size of 128 bits, or 16 bytes.
The key length can be 16, 24, or 32 bytes (128, 192, or 256 bits).