SlideShare a Scribd company logo
1 of 27
Information System SecurityInformation System Security
Lecture 2Lecture 2
Symmetric cryptographySymmetric cryptography
22
ReferencesReferences
1.1. Cryptography and Network SecurityCryptography and Network Security , By W., By W.
Stallings. Prentice Hall, 2003.Stallings. Prentice Hall, 2003.
2.2. Handbook of applied CryptographyHandbook of applied Cryptography by A. Menezes,by A. Menezes,
P. Van Oorschot and S. Vanstone. 5P. Van Oorschot and S. Vanstone. 5thth
printing, 2001printing, 2001
http://www.cacr.math.uwaterloo.ca/hachttp://www.cacr.math.uwaterloo.ca/hac
1.1. Cryptography: A Very Short Introduction (VeryCryptography: A Very Short Introduction (Very
Short Introduction S.)Short Introduction S.) , by, by Fred Piper and SeanFred Piper and Sean
Murphy, Oxford University Press, 2002.Murphy, Oxford University Press, 2002.
33
OutlineOutline
1.1. CryptographyCryptography
2.2. Symmetric Cipher systemsSymmetric Cipher systems
3.3. Stream CipherStream Cipher
– Vernam CipherVernam Cipher
– One-time padOne-time pad
1.1. Block cipherBlock cipher
– DESDES
– Triple DESTriple DES
– AESAES
1.1. Modes of operationModes of operation
– ECBECB
– CBCCBC
44
1. Cryptography1. Cryptography
 Cryptography is a means of providing information security.Cryptography is a means of providing information security.
 Cryptography is the study of mathematical techniques related toCryptography is the study of mathematical techniques related to
aspects of information security such as confidentiality, integrity,aspects of information security such as confidentiality, integrity,
authentication, and non-repudiation which form the mainauthentication, and non-repudiation which form the main
objectives of ISSobjectives of ISS
 Other ISS objectives are derived upon these four aspectsOther ISS objectives are derived upon these four aspects
55
CryptographyCryptography
 Cryptanalysis: the study of mathematical techniques forCryptanalysis: the study of mathematical techniques for
attempting to defeat cryptographic techniques.attempting to defeat cryptographic techniques.
 Cryptanalyst: is the one who engages in cryptanalysis.Cryptanalyst: is the one who engages in cryptanalysis.
 Cryptology: the study of cryptanalysis and cryptography.Cryptology: the study of cryptanalysis and cryptography.
 Cryptosystem (Cryptographic system): is a general termCryptosystem (Cryptographic system): is a general term
referring to a set of cryptographic primitives used to providereferring to a set of cryptographic primitives used to provide
information security services.information security services.
– Also called aAlso called a ciphercipher..
66
A cipher modelA cipher model
 A (Symmetric) cipher model consists of:A (Symmetric) cipher model consists of:
– Plaintext,Plaintext, mm: the original intelligible message fed into the encryption algo.: the original intelligible message fed into the encryption algo.
– Encryption algo.,Encryption algo., EE: performs various substitutions and transformation on: performs various substitutions and transformation on mm..
– Secret key,Secret key, KK: an input to: an input to EE, and a value independent of, and a value independent of mm..
– Ciphertext,Ciphertext, CC: scrambled message produced as output of: scrambled message produced as output of EE. it depends on. it depends on mm andand
KK..
– Decryption algo.,Decryption algo., DD: the reverse of: the reverse of EE. it takes. it takes CC andand KK and producesand produces mm..
ciphertextciphertextEncryption
Algorithm
(eg, AES)
Decryption
algorithm
secret key secret key
plaintextplaintext
Sender Receiver
77
Symmetric-key systemsSymmetric-key systems
 Symmetric cipher
– Encryption key and decryption key are exactly the same, or
– Decryption key is easily obtained from the encryption key.
 All practical cipher systems prior to the 1980’s were symmetric
cipher systems.
 The study of symmetric cipher systems is often referred to as
symmetric cryptography.
– Also referred to as conventional cryptography, single-key
cryptography, or secret-key cryptography.
88
Public-key systemsPublic-key systems
 In public-key cipher systems
– Computationally infeasible (in other words, practically impossible)
to determine the decryption key from the encryption key.
 In this case the encryption key and the decryption key
must be different. For this reason, public key cipher
systems are sometimes referred to as asymmetric cipher
systems.
 The study of public key cipher systems is often referred to
as public-key or asymmetric cryptography.
99
CryptographyCryptography
 Cryptographic techniques are divided into 2 types:Cryptographic techniques are divided into 2 types:
– Symmetric-key CryptographySymmetric-key Cryptography
 Symmetric-key ciphersSymmetric-key ciphers
– Block cipherBlock cipher
– Stream cipherStream cipher
 Arbitrary length Hash functions (MACs)Arbitrary length Hash functions (MACs)
 SignaturesSignatures
 IdentificationIdentification
 Pseudorandom sequencesPseudorandom sequences
– Public-key CryptographyPublic-key Cryptography
 Asymmetric-key ciphersAsymmetric-key ciphers
– Integer Factorization
– Discrete logarithmDiscrete logarithm
 SignaturesSignatures
 IdentificationIdentification
1010
2. Symmetric ciphers2. Symmetric ciphers
 There are two classes: Block cipher and Stream cipher.There are two classes: Block cipher and Stream cipher.
1 …… 1 …… 0 ……0 ……0
E
1……...1……..1…….0…….1
100110110100010111010010
110010011101010010001001
E E E E
100110110100010111010010
110010011101010010001001
100110 110100 010111 010010
E E E E
110010 011101 010010 001001
… … … …
Stream cipher Block cipher
1111
3. Stream Ciphers3. Stream Ciphers
 AA stream cipherstream cipher is an encryption scheme which treats theis an encryption scheme which treats the
plaintext symbol-by-symbol (e.g., bit or character)plaintext symbol-by-symbol (e.g., bit or character)
– AA keystreamkeystream is a sequence of symbolsis a sequence of symbols ee11ee22ee33….…. ∈∈ KK (the key space for a(the key space for a
set of encryption transformations)set of encryption transformations)
– AA an alphabet of definition ofan alphabet of definition of qq symbolssymbols
– Encryption:Encryption: EEee is a simple substitution cipher with block length 1, where eis a simple substitution cipher with block length 1, where e
∈∈ KK EEee == EEee11
(m(m11)) EEee22
(m(m22) …= c) …= c11cc22……
 PlaintextPlaintext m= mm= m11 mm22.... and ciphertextand ciphertext c = cc = c11cc22……
– Decryption:Decryption: DDdd == DDdd11
(c(c11) D) Ddd22
(c(c22) …= m) …= m11mm22…… ,, ddii=e=eii
-1-1
 The security stream ciphers depends on the changing keysteamThe security stream ciphers depends on the changing keysteam
rather than the encryption function (may be simple, e.g., XOR).rather than the encryption function (may be simple, e.g., XOR).
1212
Vernam CipherVernam Cipher
random key bits k1, k2,…, kn
plaintext bits p1, p2,…, pn
+
p1 ⊕ k1 p2 ⊕ k2…pn ⊕ Kn
ciphertext bits
 A stream cipher defined on the alphabet A={0,1}
 The keystream is a binary string (k=k1…kt) of the same length as
the plaintext m (=m1 … mt)
 Encryption ccii=mi ⊕ ki , Decryption mmii=ci ⊕ ki
1313
One-time padOne-time pad
 If the key string is randomly chosen and never used again then
Vernam cipher is called a one-time pad
 One-time pad’s drawback: The keystream must be as long as theOne-time pad’s drawback: The keystream must be as long as the
plaintext.plaintext.
– This increases the difficulty of key distribution and key managementThis increases the difficulty of key distribution and key management
 Solution: generate the key stream pseudorandomly (Solution: generate the key stream pseudorandomly (i.e.i.e., keystream, keystream
generated from a smaller secret key).generated from a smaller secret key).
Keystream
generator
key random key bits
k1 k2… kn
plaintext bits
p1 p2… pn
+
p1 ⊕ k1,…, pn ⊕ kn
ciphertext bits
Model
of a
stream
cipher
1414
Properties of stream ciphersProperties of stream ciphers
 Advantages:Advantages:
– No error propagation: a ciphertext digit is modified during transmissionNo error propagation: a ciphertext digit is modified during transmission
doesn’t affect the decryption of other ciphertext digitsdoesn’t affect the decryption of other ciphertext digits
– Easy for implementationEasy for implementation
– FastFast
 Drawbacks:Drawbacks:
– Requirement for synchronization: sender and receiver must beRequirement for synchronization: sender and receiver must be
synchronizedsynchronized (ie, they must use the same key and operate on the same(ie, they must use the same key and operate on the same
position (digit)). If synchronization is lost due to digit insertion orposition (digit)). If synchronization is lost due to digit insertion or
deletion then re-synchronization is required.deletion then re-synchronization is required.
 They are suitable for applications where errors are intolerable.They are suitable for applications where errors are intolerable.
– GSM and phone networks.GSM and phone networks.
 A Modern Stream cipher: RC4 (1987).A Modern Stream cipher: RC4 (1987).
1515
4. Block ciphers4. Block ciphers
 AA block cipherblock cipher is an encryption scheme which breaks up theis an encryption scheme which breaks up the
plaintext message into blocks of a fixed length and producesplaintext message into blocks of a fixed length and produces
ciphertext blocks of the same length.ciphertext blocks of the same length.
 Block ciphers encrypt one block at a time, using a complexBlock ciphers encrypt one block at a time, using a complex
encryption functionencryption function
 ExamplesExamples
– DES: operates on blocks of 64 bitsDES: operates on blocks of 64 bits
– AES: operates on blocks of 128 bitsAES: operates on blocks of 128 bits
 Block ciphers can be used in various modes (Block ciphers can be used in various modes (modes ofmodes of
operationoperation).).
1616
Data Encryption Standard (DES)Data Encryption Standard (DES)
 DES design is based on two general concepts:DES design is based on two general concepts:
– product cipher: combination of two or more operationsproduct cipher: combination of two or more operations
(transposition, translation (e.g., XOR), arithmetic operations,(transposition, translation (e.g., XOR), arithmetic operations,
modular multiplication, simple substitutions.)modular multiplication, simple substitutions.)
– Feistel Concept:Feistel Concept:
Block of ciphertextBlock of ciphertextEncryption
Algorithm
(DES)
Encryption key
Block of plaintext
64
56
64
1717
Feistel principleFeistel principle
 AnAn iterated block cipheriterated block cipher is a block cipher involving theis a block cipher involving the
sequential repetition of an internal function calledsequential repetition of an internal function called roundround
functionfunction. Parameters include:. Parameters include:rr, number of rounds,, number of rounds,nn block sizeblock size
andand kk, the input key from which, the input key from which rr subkeyssubkeys kkii ((round keysround keys) are) are
derived.derived.
 AA Feistel CipherFeistel Cipher is an iterated cipher mapping a 2is an iterated cipher mapping a 2tt-bit plaintext-bit plaintext
((LL00, R, R00), for), for tt-bit blocks-bit blocks LL00 andand RR00, to a ciphertext (, to a ciphertext (RRrr, L, L rr),),
through anthrough an rr-round process (-round process (rr ≥≥ 11) for each) for each 11 ≤≤ ii ≤≤ rr, round, round ii
maps (maps (LLi-1i-1,R,Ri-1i-1))→→((LLii,R,Rii) as follows:) as follows:
– LLii = R= Ri-1i-1
– RRii = L= Li-1i-1 + f(R+ f(Ri-1i-1,k,kii))
 Decryption is achieved by the same r-round process but withDecryption is achieved by the same r-round process but with
subkeys in reverse order.subkeys in reverse order.
1818
Feistel principleFeistel principle
L0 R0
f
L1=R0 R1 = L0 ⊕ f (R0, k1)
f
L2= R1
Key k1
Key k2
R2 = L1⊕ f (R1,k2)
plaintext
⊕
⊕
1
3
45
6
7
2
round 1
round 2
1919
DES EncryptionDES Encryption (ch 7 ,[2])(ch 7 ,[2])
L0 R0
f
L1=R0
R1 = L0 ⊕ f (R0, k1)
Key k1
Plaintext
⊕
IP
L16 = R15
IP-1
R16 = L15 ⊕ f (R15, k16)
Ciphertext
64
3232
48
32 32
64
3232
2020
DES’sDES’s ff functionfunction
Ri-1 (32 bits)
Expansion
Permutation
Ri-1 (48 bits)
Ki (48 bits)
⊕
S1 S2 S3 S4 S5 S6 S7 S8
6 bits into each
P
32 bits
4 bits out of each
2121
DES propertiesDES properties
 DES has 4 weak keys and six pairs of semi-weak keysDES has 4 weak keys and six pairs of semi-weak keys
– A DES weak key is a keyA DES weak key is a key kk such thatsuch that EEkk(E(Ekk(x))=x(x))=x for allfor all xx
– A pair of DES semi weak keys is a pair (A pair of DES semi weak keys is a pair (KK11,K,K22) with) with EEkk11
(E(Ekk22
(x))=x(x))=x Tables 7.5Tables 7.5
and 7.6, of weak and semi-weak keys on pp. 258 of [2].and 7.6, of weak and semi-weak keys on pp. 258 of [2].
 DES TodayDES Today
– A DES key can be found by anyone determined enough.A DES key can be found by anyone determined enough.
 In 1998 Electronic Frontier Foundation managed to break DES (using DESIn 1998 Electronic Frontier Foundation managed to break DES (using DES
Cracker, costing < $250,000 ) in less than 3 days.Cracker, costing < $250,000 ) in less than 3 days.
– Differential and linear cryptanalysis provide academic attacks on DES.Differential and linear cryptanalysis provide academic attacks on DES.
– However, DES is still in use in many applications.However, DES is still in use in many applications.
– Triple DES or AES are commonly recommended instead of DES.Triple DES or AES are commonly recommended instead of DES.
2222
Triple DESTriple DES
ciphertextciphertext
Encrypt
Using DES
plaintext
Key K1
Decrypt
Using DES
Encrypt
Using DES
Key K2
Key K3
3
2
4
• Key =k1 k2k3
• Key are longer (192 bits)
• Three times slower than
DES
2323
Advanced EncryptionAdvanced Encryption
StandardStandard
 In November 2001 the USA NIST announcedIn November 2001 the USA NIST announced RijndaelRijndael algorithm asalgorithm as
the AES to replace DES as a FIPS 197the AES to replace DES as a FIPS 197
 Became effective in May 2002Became effective in May 2002
 AES is a symmetric encryption algorithmAES is a symmetric encryption algorithm
 Block size 128, rounds 10, 12, or 14 depending on the key size (128,Block size 128, rounds 10, 12, or 14 depending on the key size (128,
192, or 256)192, or 256)
 AES will probably be worldwide used very soonAES will probably be worldwide used very soon
 It’s security not proved yetIt’s security not proved yet
Block of ciphertextBlock of ciphertext
AES
Encryption key
Block of plaintext
128
128, 196, or 256
128
2424
Other Block ciphersOther Block ciphers
 IDEA (International Data Encryption Algorithm)IDEA (International Data Encryption Algorithm)
– Published in 1991Published in 1991
– Operates on 64-bit blocks, and 128-bit key and produces blocks ofOperates on 64-bit blocks, and 128-bit key and produces blocks of
64 bits64 bits
 Other ciphers: FEAL, SAFER, RC5, …Other ciphers: FEAL, SAFER, RC5, …
Block of ciphertextBlock of ciphertext
IDEA
Encryption key
Block of plaintext
64
128
64
2525
5. Modes of operation5. Modes of operation
1.1. Electronic CodeBookElectronic CodeBook
(ECB):(ECB):
 Identical plaintext blocks (under the sameIdentical plaintext blocks (under the same
key) result in identical ciphertext.key) result in identical ciphertext.
 Chaining dependency: blocks areChaining dependency: blocks are
enciphered independently of other blocks.enciphered independently of other blocks.
 Error propagation: one or more bit errorsError propagation: one or more bit errors
in a single ciphertext affect deciphermentin a single ciphertext affect decipherment
of that block only.of that block only.
 ECB is not recommended for messagesECB is not recommended for messages
longer than one block, or if keys arelonger than one block, or if keys are
reused for more than one-block message.reused for more than one-block message.
 Security of ECB may be improved bySecurity of ECB may be improved by
inclusion of random padding bits in eachinclusion of random padding bits in each
block.block.
E E
key
xj
n
-1
n
cj
Encryption Decryption
Electronic CodeBookElectronic CodeBook
(ECB)(ECB)
key
xj
2626
6. Modes of operation6. Modes of operation
2.2. Cipher-Block ChainingCipher-Block Chaining
(CBC):(CBC):
E E
key
n
-1
n
Encryption decryption
+
key
c0=IV
+
Cipher-Block ChainingCipher-Block Chaining
(CBC)(CBC)
cj-1
xj
xj
cj
cj-1
 Identical plaintexts: identical ciphertext
blocks result when the same plaintext is
enciphered under the key and IV.
 Chaining dependency: a ciphertext cj
depends on xj and all preceding plaintext
blocks ⇒ rearranging the order of
ciphertext blocks affects decryption.
 Error propagation: a single bit error in
ciphertext block cj affects decipherment of cj
and cj+1.
 Error recovery: CBC is self-synchronizing
in the sense that if an error occurs in block
cj, cj+2 is correctly recovered.
 IV is not secret but needs integrity.
2727
Properties of block ciphersProperties of block ciphers
 Block ciphers do propagate errors (to a limited extent), but areBlock ciphers do propagate errors (to a limited extent), but are
quite flexible and can be used in different ways in order toquite flexible and can be used in different ways in order to
provide different security properties.provide different security properties.
 The properties of cryptographic algorithms are not only affectedThe properties of cryptographic algorithms are not only affected
by algorithm design, but also by the ways in which theby algorithm design, but also by the ways in which the
algorithms are used. Different modes of operation canalgorithms are used. Different modes of operation can
significantly change the properties of a block cipher.significantly change the properties of a block cipher.
 The security of block ciphers mainly depends on the complexityThe security of block ciphers mainly depends on the complexity
of the encryption function whereas thus of stream ciphersof the encryption function whereas thus of stream ciphers
depend on the keystream randomness.depend on the keystream randomness.
 They can be used to provide confidentiality, data integrity, orThey can be used to provide confidentiality, data integrity, or
user authentication, and can even be used to provide theuser authentication, and can even be used to provide the
keystream generator for stream cipherskeystream generator for stream ciphers

More Related Content

What's hot

Secret key cryptography
Secret key cryptographySecret key cryptography
Secret key cryptographyPrabhat Goel
 
Basic techniques in cryptography
Basic techniques in cryptographyBasic techniques in cryptography
Basic techniques in cryptographyShraddha Gupta
 
Cryptography and Information Security
Cryptography and Information SecurityCryptography and Information Security
Cryptography and Information SecurityDr Naim R Kidwai
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network SecurityRamki M
 
Cryptanalysis and Attacks
Cryptanalysis and AttacksCryptanalysis and Attacks
Cryptanalysis and AttacksShahbaz Anjam
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptographyVaibhav Khanna
 
Cryptography and applications
Cryptography and applicationsCryptography and applications
Cryptography and applicationsthai
 
Cissp d5-cryptography v2012-mini coursev2
Cissp d5-cryptography v2012-mini coursev2Cissp d5-cryptography v2012-mini coursev2
Cissp d5-cryptography v2012-mini coursev2infosecedu
 
TakeDownCon Rocket City: Cryptanalysis by Chuck Easttom
TakeDownCon Rocket City: Cryptanalysis by Chuck Easttom TakeDownCon Rocket City: Cryptanalysis by Chuck Easttom
TakeDownCon Rocket City: Cryptanalysis by Chuck Easttom EC-Council
 
overview of cryptographic techniques
overview of cryptographic techniquesoverview of cryptographic techniques
overview of cryptographic techniquesShubham Jain
 
Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overviewppd1961
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securitypatisa
 
Network security Encryption
Network security EncryptionNetwork security Encryption
Network security EncryptionJoel Briza
 

What's hot (20)

Secret key cryptography
Secret key cryptographySecret key cryptography
Secret key cryptography
 
Ppt cns
Ppt cnsPpt cns
Ppt cns
 
Basic techniques in cryptography
Basic techniques in cryptographyBasic techniques in cryptography
Basic techniques in cryptography
 
Cryptography and Information Security
Cryptography and Information SecurityCryptography and Information Security
Cryptography and Information Security
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
Cryptanalysis and Attacks
Cryptanalysis and AttacksCryptanalysis and Attacks
Cryptanalysis and Attacks
 
Cryptography
CryptographyCryptography
Cryptography
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptography
 
Cryptography and applications
Cryptography and applicationsCryptography and applications
Cryptography and applications
 
Cissp d5-cryptography v2012-mini coursev2
Cissp d5-cryptography v2012-mini coursev2Cissp d5-cryptography v2012-mini coursev2
Cissp d5-cryptography v2012-mini coursev2
 
Cryptography cse,ru
Cryptography cse,ruCryptography cse,ru
Cryptography cse,ru
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
TakeDownCon Rocket City: Cryptanalysis by Chuck Easttom
TakeDownCon Rocket City: Cryptanalysis by Chuck Easttom TakeDownCon Rocket City: Cryptanalysis by Chuck Easttom
TakeDownCon Rocket City: Cryptanalysis by Chuck Easttom
 
overview of cryptographic techniques
overview of cryptographic techniquesoverview of cryptographic techniques
overview of cryptographic techniques
 
Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overview
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Cryptography - 101
Cryptography - 101Cryptography - 101
Cryptography - 101
 
Cryptography
Cryptography Cryptography
Cryptography
 
Network security Encryption
Network security EncryptionNetwork security Encryption
Network security Encryption
 
Kleptography
KleptographyKleptography
Kleptography
 

Similar to Iss lecture 2

Information System Security.pptx
Information System  Security.pptxInformation System  Security.pptx
Information System Security.pptxGIT
 
DOCS ON NETWORK SECURITY
DOCS ON NETWORK SECURITYDOCS ON NETWORK SECURITY
DOCS ON NETWORK SECURITYTuhin_Das
 
CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2Hamed Moghaddam
 
Computer Cryptography and Encryption [by: Magoiga].pptx
Computer Cryptography and Encryption [by: Magoiga].pptxComputer Cryptography and Encryption [by: Magoiga].pptx
Computer Cryptography and Encryption [by: Magoiga].pptxmagoigamtatiro1
 
A study of cryptography for satellite applications
A study of cryptography for satellite applicationsA study of cryptography for satellite applications
A study of cryptography for satellite applicationsRajesh Ishida
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointJanet Robinson
 
Introduction to Cryptography Week4 Part1-ISrevisionSu.docx
Introduction to Cryptography  Week4 Part1-ISrevisionSu.docxIntroduction to Cryptography  Week4 Part1-ISrevisionSu.docx
Introduction to Cryptography Week4 Part1-ISrevisionSu.docxmariuse18nolet
 
crypto-105058445051058480051448005540405
crypto-105058445051058480051448005540405crypto-105058445051058480051448005540405
crypto-105058445051058480051448005540405ukd789555
 
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...ams1ams11
 

Similar to Iss lecture 2 (20)

Information System Security.pptx
Information System  Security.pptxInformation System  Security.pptx
Information System Security.pptx
 
Encryption
EncryptionEncryption
Encryption
 
DOCS ON NETWORK SECURITY
DOCS ON NETWORK SECURITYDOCS ON NETWORK SECURITY
DOCS ON NETWORK SECURITY
 
CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2
 
Computer Cryptography and Encryption [by: Magoiga].pptx
Computer Cryptography and Encryption [by: Magoiga].pptxComputer Cryptography and Encryption [by: Magoiga].pptx
Computer Cryptography and Encryption [by: Magoiga].pptx
 
A study of cryptography for satellite applications
A study of cryptography for satellite applicationsA study of cryptography for satellite applications
A study of cryptography for satellite applications
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
 
Unit 1
Unit 1Unit 1
Unit 1
 
Pavan
PavanPavan
Pavan
 
Cryptography
CryptographyCryptography
Cryptography
 
Introduction to Cryptography Week4 Part1-ISrevisionSu.docx
Introduction to Cryptography  Week4 Part1-ISrevisionSu.docxIntroduction to Cryptography  Week4 Part1-ISrevisionSu.docx
Introduction to Cryptography Week4 Part1-ISrevisionSu.docx
 
Cryptography
CryptographyCryptography
Cryptography
 
encrption.PDF
encrption.PDFencrption.PDF
encrption.PDF
 
encrption.PDF
encrption.PDFencrption.PDF
encrption.PDF
 
encrption.PDF
encrption.PDFencrption.PDF
encrption.PDF
 
crypto-105058445051058480051448005540405
crypto-105058445051058480051448005540405crypto-105058445051058480051448005540405
crypto-105058445051058480051448005540405
 
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
 
Cns 1
Cns 1Cns 1
Cns 1
 
Unit 2
Unit 2Unit 2
Unit 2
 
Day5
Day5Day5
Day5
 

More from Ali Habeeb

Anonymous Connections And Onion Routing
Anonymous Connections And Onion RoutingAnonymous Connections And Onion Routing
Anonymous Connections And Onion RoutingAli Habeeb
 
Opinion Mining
Opinion MiningOpinion Mining
Opinion MiningAli Habeeb
 
Cloud Security
Cloud SecurityCloud Security
Cloud SecurityAli Habeeb
 
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyData-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyAli Habeeb
 
Secure erasure code based distributed storage system with secure data forwarding
Secure erasure code based distributed storage system with secure data forwardingSecure erasure code based distributed storage system with secure data forwarding
Secure erasure code based distributed storage system with secure data forwardingAli Habeeb
 
Organizing User Search Histories
Organizing User Search HistoriesOrganizing User Search Histories
Organizing User Search HistoriesAli Habeeb
 
Detecting and Resolving Firewall Policy Anomalies
Detecting and Resolving Firewall Policy AnomaliesDetecting and Resolving Firewall Policy Anomalies
Detecting and Resolving Firewall Policy AnomaliesAli Habeeb
 
Bit Torrent Protocol
Bit Torrent ProtocolBit Torrent Protocol
Bit Torrent ProtocolAli Habeeb
 
A study of Data Quality and Analytics
A study of Data Quality and AnalyticsA study of Data Quality and Analytics
A study of Data Quality and AnalyticsAli Habeeb
 
Adhoc and Sensor Networks - Chapter 10
Adhoc and Sensor Networks - Chapter 10Adhoc and Sensor Networks - Chapter 10
Adhoc and Sensor Networks - Chapter 10Ali Habeeb
 
Adhoc and Sensor Networks - Chapter 09
Adhoc and Sensor Networks - Chapter 09Adhoc and Sensor Networks - Chapter 09
Adhoc and Sensor Networks - Chapter 09Ali Habeeb
 
Adhoc and Sensor Networks - Chapter 08
Adhoc and Sensor Networks - Chapter 08Adhoc and Sensor Networks - Chapter 08
Adhoc and Sensor Networks - Chapter 08Ali Habeeb
 
Adhoc and Sensor Networks - Chapter 07
Adhoc and Sensor Networks - Chapter 07Adhoc and Sensor Networks - Chapter 07
Adhoc and Sensor Networks - Chapter 07Ali Habeeb
 
Adhoc and Sensor Networks - Chapter 06
Adhoc and Sensor Networks - Chapter 06Adhoc and Sensor Networks - Chapter 06
Adhoc and Sensor Networks - Chapter 06Ali Habeeb
 
Adhoc and Sensor Networks - Chapter 05
Adhoc and Sensor Networks - Chapter 05Adhoc and Sensor Networks - Chapter 05
Adhoc and Sensor Networks - Chapter 05Ali Habeeb
 
Adhoc and Sensor Networks - Chapter 04
Adhoc and Sensor Networks - Chapter 04Adhoc and Sensor Networks - Chapter 04
Adhoc and Sensor Networks - Chapter 04Ali Habeeb
 

More from Ali Habeeb (20)

Anonymous Connections And Onion Routing
Anonymous Connections And Onion RoutingAnonymous Connections And Onion Routing
Anonymous Connections And Onion Routing
 
Opinion Mining
Opinion MiningOpinion Mining
Opinion Mining
 
WAP
WAPWAP
WAP
 
USB 3.0
USB 3.0USB 3.0
USB 3.0
 
Blue Eyes
Blue EyesBlue Eyes
Blue Eyes
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyData-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
 
Web Security
Web SecurityWeb Security
Web Security
 
Secure erasure code based distributed storage system with secure data forwarding
Secure erasure code based distributed storage system with secure data forwardingSecure erasure code based distributed storage system with secure data forwarding
Secure erasure code based distributed storage system with secure data forwarding
 
Organizing User Search Histories
Organizing User Search HistoriesOrganizing User Search Histories
Organizing User Search Histories
 
Detecting and Resolving Firewall Policy Anomalies
Detecting and Resolving Firewall Policy AnomaliesDetecting and Resolving Firewall Policy Anomalies
Detecting and Resolving Firewall Policy Anomalies
 
Bit Torrent Protocol
Bit Torrent ProtocolBit Torrent Protocol
Bit Torrent Protocol
 
A study of Data Quality and Analytics
A study of Data Quality and AnalyticsA study of Data Quality and Analytics
A study of Data Quality and Analytics
 
Adhoc and Sensor Networks - Chapter 10
Adhoc and Sensor Networks - Chapter 10Adhoc and Sensor Networks - Chapter 10
Adhoc and Sensor Networks - Chapter 10
 
Adhoc and Sensor Networks - Chapter 09
Adhoc and Sensor Networks - Chapter 09Adhoc and Sensor Networks - Chapter 09
Adhoc and Sensor Networks - Chapter 09
 
Adhoc and Sensor Networks - Chapter 08
Adhoc and Sensor Networks - Chapter 08Adhoc and Sensor Networks - Chapter 08
Adhoc and Sensor Networks - Chapter 08
 
Adhoc and Sensor Networks - Chapter 07
Adhoc and Sensor Networks - Chapter 07Adhoc and Sensor Networks - Chapter 07
Adhoc and Sensor Networks - Chapter 07
 
Adhoc and Sensor Networks - Chapter 06
Adhoc and Sensor Networks - Chapter 06Adhoc and Sensor Networks - Chapter 06
Adhoc and Sensor Networks - Chapter 06
 
Adhoc and Sensor Networks - Chapter 05
Adhoc and Sensor Networks - Chapter 05Adhoc and Sensor Networks - Chapter 05
Adhoc and Sensor Networks - Chapter 05
 
Adhoc and Sensor Networks - Chapter 04
Adhoc and Sensor Networks - Chapter 04Adhoc and Sensor Networks - Chapter 04
Adhoc and Sensor Networks - Chapter 04
 

Recently uploaded

Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 

Recently uploaded (20)

Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 

Iss lecture 2

  • 1. Information System SecurityInformation System Security Lecture 2Lecture 2 Symmetric cryptographySymmetric cryptography
  • 2. 22 ReferencesReferences 1.1. Cryptography and Network SecurityCryptography and Network Security , By W., By W. Stallings. Prentice Hall, 2003.Stallings. Prentice Hall, 2003. 2.2. Handbook of applied CryptographyHandbook of applied Cryptography by A. Menezes,by A. Menezes, P. Van Oorschot and S. Vanstone. 5P. Van Oorschot and S. Vanstone. 5thth printing, 2001printing, 2001 http://www.cacr.math.uwaterloo.ca/hachttp://www.cacr.math.uwaterloo.ca/hac 1.1. Cryptography: A Very Short Introduction (VeryCryptography: A Very Short Introduction (Very Short Introduction S.)Short Introduction S.) , by, by Fred Piper and SeanFred Piper and Sean Murphy, Oxford University Press, 2002.Murphy, Oxford University Press, 2002.
  • 3. 33 OutlineOutline 1.1. CryptographyCryptography 2.2. Symmetric Cipher systemsSymmetric Cipher systems 3.3. Stream CipherStream Cipher – Vernam CipherVernam Cipher – One-time padOne-time pad 1.1. Block cipherBlock cipher – DESDES – Triple DESTriple DES – AESAES 1.1. Modes of operationModes of operation – ECBECB – CBCCBC
  • 4. 44 1. Cryptography1. Cryptography  Cryptography is a means of providing information security.Cryptography is a means of providing information security.  Cryptography is the study of mathematical techniques related toCryptography is the study of mathematical techniques related to aspects of information security such as confidentiality, integrity,aspects of information security such as confidentiality, integrity, authentication, and non-repudiation which form the mainauthentication, and non-repudiation which form the main objectives of ISSobjectives of ISS  Other ISS objectives are derived upon these four aspectsOther ISS objectives are derived upon these four aspects
  • 5. 55 CryptographyCryptography  Cryptanalysis: the study of mathematical techniques forCryptanalysis: the study of mathematical techniques for attempting to defeat cryptographic techniques.attempting to defeat cryptographic techniques.  Cryptanalyst: is the one who engages in cryptanalysis.Cryptanalyst: is the one who engages in cryptanalysis.  Cryptology: the study of cryptanalysis and cryptography.Cryptology: the study of cryptanalysis and cryptography.  Cryptosystem (Cryptographic system): is a general termCryptosystem (Cryptographic system): is a general term referring to a set of cryptographic primitives used to providereferring to a set of cryptographic primitives used to provide information security services.information security services. – Also called aAlso called a ciphercipher..
  • 6. 66 A cipher modelA cipher model  A (Symmetric) cipher model consists of:A (Symmetric) cipher model consists of: – Plaintext,Plaintext, mm: the original intelligible message fed into the encryption algo.: the original intelligible message fed into the encryption algo. – Encryption algo.,Encryption algo., EE: performs various substitutions and transformation on: performs various substitutions and transformation on mm.. – Secret key,Secret key, KK: an input to: an input to EE, and a value independent of, and a value independent of mm.. – Ciphertext,Ciphertext, CC: scrambled message produced as output of: scrambled message produced as output of EE. it depends on. it depends on mm andand KK.. – Decryption algo.,Decryption algo., DD: the reverse of: the reverse of EE. it takes. it takes CC andand KK and producesand produces mm.. ciphertextciphertextEncryption Algorithm (eg, AES) Decryption algorithm secret key secret key plaintextplaintext Sender Receiver
  • 7. 77 Symmetric-key systemsSymmetric-key systems  Symmetric cipher – Encryption key and decryption key are exactly the same, or – Decryption key is easily obtained from the encryption key.  All practical cipher systems prior to the 1980’s were symmetric cipher systems.  The study of symmetric cipher systems is often referred to as symmetric cryptography. – Also referred to as conventional cryptography, single-key cryptography, or secret-key cryptography.
  • 8. 88 Public-key systemsPublic-key systems  In public-key cipher systems – Computationally infeasible (in other words, practically impossible) to determine the decryption key from the encryption key.  In this case the encryption key and the decryption key must be different. For this reason, public key cipher systems are sometimes referred to as asymmetric cipher systems.  The study of public key cipher systems is often referred to as public-key or asymmetric cryptography.
  • 9. 99 CryptographyCryptography  Cryptographic techniques are divided into 2 types:Cryptographic techniques are divided into 2 types: – Symmetric-key CryptographySymmetric-key Cryptography  Symmetric-key ciphersSymmetric-key ciphers – Block cipherBlock cipher – Stream cipherStream cipher  Arbitrary length Hash functions (MACs)Arbitrary length Hash functions (MACs)  SignaturesSignatures  IdentificationIdentification  Pseudorandom sequencesPseudorandom sequences – Public-key CryptographyPublic-key Cryptography  Asymmetric-key ciphersAsymmetric-key ciphers – Integer Factorization – Discrete logarithmDiscrete logarithm  SignaturesSignatures  IdentificationIdentification
  • 10. 1010 2. Symmetric ciphers2. Symmetric ciphers  There are two classes: Block cipher and Stream cipher.There are two classes: Block cipher and Stream cipher. 1 …… 1 …… 0 ……0 ……0 E 1……...1……..1…….0…….1 100110110100010111010010 110010011101010010001001 E E E E 100110110100010111010010 110010011101010010001001 100110 110100 010111 010010 E E E E 110010 011101 010010 001001 … … … … Stream cipher Block cipher
  • 11. 1111 3. Stream Ciphers3. Stream Ciphers  AA stream cipherstream cipher is an encryption scheme which treats theis an encryption scheme which treats the plaintext symbol-by-symbol (e.g., bit or character)plaintext symbol-by-symbol (e.g., bit or character) – AA keystreamkeystream is a sequence of symbolsis a sequence of symbols ee11ee22ee33….…. ∈∈ KK (the key space for a(the key space for a set of encryption transformations)set of encryption transformations) – AA an alphabet of definition ofan alphabet of definition of qq symbolssymbols – Encryption:Encryption: EEee is a simple substitution cipher with block length 1, where eis a simple substitution cipher with block length 1, where e ∈∈ KK EEee == EEee11 (m(m11)) EEee22 (m(m22) …= c) …= c11cc22……  PlaintextPlaintext m= mm= m11 mm22.... and ciphertextand ciphertext c = cc = c11cc22…… – Decryption:Decryption: DDdd == DDdd11 (c(c11) D) Ddd22 (c(c22) …= m) …= m11mm22…… ,, ddii=e=eii -1-1  The security stream ciphers depends on the changing keysteamThe security stream ciphers depends on the changing keysteam rather than the encryption function (may be simple, e.g., XOR).rather than the encryption function (may be simple, e.g., XOR).
  • 12. 1212 Vernam CipherVernam Cipher random key bits k1, k2,…, kn plaintext bits p1, p2,…, pn + p1 ⊕ k1 p2 ⊕ k2…pn ⊕ Kn ciphertext bits  A stream cipher defined on the alphabet A={0,1}  The keystream is a binary string (k=k1…kt) of the same length as the plaintext m (=m1 … mt)  Encryption ccii=mi ⊕ ki , Decryption mmii=ci ⊕ ki
  • 13. 1313 One-time padOne-time pad  If the key string is randomly chosen and never used again then Vernam cipher is called a one-time pad  One-time pad’s drawback: The keystream must be as long as theOne-time pad’s drawback: The keystream must be as long as the plaintext.plaintext. – This increases the difficulty of key distribution and key managementThis increases the difficulty of key distribution and key management  Solution: generate the key stream pseudorandomly (Solution: generate the key stream pseudorandomly (i.e.i.e., keystream, keystream generated from a smaller secret key).generated from a smaller secret key). Keystream generator key random key bits k1 k2… kn plaintext bits p1 p2… pn + p1 ⊕ k1,…, pn ⊕ kn ciphertext bits Model of a stream cipher
  • 14. 1414 Properties of stream ciphersProperties of stream ciphers  Advantages:Advantages: – No error propagation: a ciphertext digit is modified during transmissionNo error propagation: a ciphertext digit is modified during transmission doesn’t affect the decryption of other ciphertext digitsdoesn’t affect the decryption of other ciphertext digits – Easy for implementationEasy for implementation – FastFast  Drawbacks:Drawbacks: – Requirement for synchronization: sender and receiver must beRequirement for synchronization: sender and receiver must be synchronizedsynchronized (ie, they must use the same key and operate on the same(ie, they must use the same key and operate on the same position (digit)). If synchronization is lost due to digit insertion orposition (digit)). If synchronization is lost due to digit insertion or deletion then re-synchronization is required.deletion then re-synchronization is required.  They are suitable for applications where errors are intolerable.They are suitable for applications where errors are intolerable. – GSM and phone networks.GSM and phone networks.  A Modern Stream cipher: RC4 (1987).A Modern Stream cipher: RC4 (1987).
  • 15. 1515 4. Block ciphers4. Block ciphers  AA block cipherblock cipher is an encryption scheme which breaks up theis an encryption scheme which breaks up the plaintext message into blocks of a fixed length and producesplaintext message into blocks of a fixed length and produces ciphertext blocks of the same length.ciphertext blocks of the same length.  Block ciphers encrypt one block at a time, using a complexBlock ciphers encrypt one block at a time, using a complex encryption functionencryption function  ExamplesExamples – DES: operates on blocks of 64 bitsDES: operates on blocks of 64 bits – AES: operates on blocks of 128 bitsAES: operates on blocks of 128 bits  Block ciphers can be used in various modes (Block ciphers can be used in various modes (modes ofmodes of operationoperation).).
  • 16. 1616 Data Encryption Standard (DES)Data Encryption Standard (DES)  DES design is based on two general concepts:DES design is based on two general concepts: – product cipher: combination of two or more operationsproduct cipher: combination of two or more operations (transposition, translation (e.g., XOR), arithmetic operations,(transposition, translation (e.g., XOR), arithmetic operations, modular multiplication, simple substitutions.)modular multiplication, simple substitutions.) – Feistel Concept:Feistel Concept: Block of ciphertextBlock of ciphertextEncryption Algorithm (DES) Encryption key Block of plaintext 64 56 64
  • 17. 1717 Feistel principleFeistel principle  AnAn iterated block cipheriterated block cipher is a block cipher involving theis a block cipher involving the sequential repetition of an internal function calledsequential repetition of an internal function called roundround functionfunction. Parameters include:. Parameters include:rr, number of rounds,, number of rounds,nn block sizeblock size andand kk, the input key from which, the input key from which rr subkeyssubkeys kkii ((round keysround keys) are) are derived.derived.  AA Feistel CipherFeistel Cipher is an iterated cipher mapping a 2is an iterated cipher mapping a 2tt-bit plaintext-bit plaintext ((LL00, R, R00), for), for tt-bit blocks-bit blocks LL00 andand RR00, to a ciphertext (, to a ciphertext (RRrr, L, L rr),), through anthrough an rr-round process (-round process (rr ≥≥ 11) for each) for each 11 ≤≤ ii ≤≤ rr, round, round ii maps (maps (LLi-1i-1,R,Ri-1i-1))→→((LLii,R,Rii) as follows:) as follows: – LLii = R= Ri-1i-1 – RRii = L= Li-1i-1 + f(R+ f(Ri-1i-1,k,kii))  Decryption is achieved by the same r-round process but withDecryption is achieved by the same r-round process but with subkeys in reverse order.subkeys in reverse order.
  • 18. 1818 Feistel principleFeistel principle L0 R0 f L1=R0 R1 = L0 ⊕ f (R0, k1) f L2= R1 Key k1 Key k2 R2 = L1⊕ f (R1,k2) plaintext ⊕ ⊕ 1 3 45 6 7 2 round 1 round 2
  • 19. 1919 DES EncryptionDES Encryption (ch 7 ,[2])(ch 7 ,[2]) L0 R0 f L1=R0 R1 = L0 ⊕ f (R0, k1) Key k1 Plaintext ⊕ IP L16 = R15 IP-1 R16 = L15 ⊕ f (R15, k16) Ciphertext 64 3232 48 32 32 64 3232
  • 20. 2020 DES’sDES’s ff functionfunction Ri-1 (32 bits) Expansion Permutation Ri-1 (48 bits) Ki (48 bits) ⊕ S1 S2 S3 S4 S5 S6 S7 S8 6 bits into each P 32 bits 4 bits out of each
  • 21. 2121 DES propertiesDES properties  DES has 4 weak keys and six pairs of semi-weak keysDES has 4 weak keys and six pairs of semi-weak keys – A DES weak key is a keyA DES weak key is a key kk such thatsuch that EEkk(E(Ekk(x))=x(x))=x for allfor all xx – A pair of DES semi weak keys is a pair (A pair of DES semi weak keys is a pair (KK11,K,K22) with) with EEkk11 (E(Ekk22 (x))=x(x))=x Tables 7.5Tables 7.5 and 7.6, of weak and semi-weak keys on pp. 258 of [2].and 7.6, of weak and semi-weak keys on pp. 258 of [2].  DES TodayDES Today – A DES key can be found by anyone determined enough.A DES key can be found by anyone determined enough.  In 1998 Electronic Frontier Foundation managed to break DES (using DESIn 1998 Electronic Frontier Foundation managed to break DES (using DES Cracker, costing < $250,000 ) in less than 3 days.Cracker, costing < $250,000 ) in less than 3 days. – Differential and linear cryptanalysis provide academic attacks on DES.Differential and linear cryptanalysis provide academic attacks on DES. – However, DES is still in use in many applications.However, DES is still in use in many applications. – Triple DES or AES are commonly recommended instead of DES.Triple DES or AES are commonly recommended instead of DES.
  • 22. 2222 Triple DESTriple DES ciphertextciphertext Encrypt Using DES plaintext Key K1 Decrypt Using DES Encrypt Using DES Key K2 Key K3 3 2 4 • Key =k1 k2k3 • Key are longer (192 bits) • Three times slower than DES
  • 23. 2323 Advanced EncryptionAdvanced Encryption StandardStandard  In November 2001 the USA NIST announcedIn November 2001 the USA NIST announced RijndaelRijndael algorithm asalgorithm as the AES to replace DES as a FIPS 197the AES to replace DES as a FIPS 197  Became effective in May 2002Became effective in May 2002  AES is a symmetric encryption algorithmAES is a symmetric encryption algorithm  Block size 128, rounds 10, 12, or 14 depending on the key size (128,Block size 128, rounds 10, 12, or 14 depending on the key size (128, 192, or 256)192, or 256)  AES will probably be worldwide used very soonAES will probably be worldwide used very soon  It’s security not proved yetIt’s security not proved yet Block of ciphertextBlock of ciphertext AES Encryption key Block of plaintext 128 128, 196, or 256 128
  • 24. 2424 Other Block ciphersOther Block ciphers  IDEA (International Data Encryption Algorithm)IDEA (International Data Encryption Algorithm) – Published in 1991Published in 1991 – Operates on 64-bit blocks, and 128-bit key and produces blocks ofOperates on 64-bit blocks, and 128-bit key and produces blocks of 64 bits64 bits  Other ciphers: FEAL, SAFER, RC5, …Other ciphers: FEAL, SAFER, RC5, … Block of ciphertextBlock of ciphertext IDEA Encryption key Block of plaintext 64 128 64
  • 25. 2525 5. Modes of operation5. Modes of operation 1.1. Electronic CodeBookElectronic CodeBook (ECB):(ECB):  Identical plaintext blocks (under the sameIdentical plaintext blocks (under the same key) result in identical ciphertext.key) result in identical ciphertext.  Chaining dependency: blocks areChaining dependency: blocks are enciphered independently of other blocks.enciphered independently of other blocks.  Error propagation: one or more bit errorsError propagation: one or more bit errors in a single ciphertext affect deciphermentin a single ciphertext affect decipherment of that block only.of that block only.  ECB is not recommended for messagesECB is not recommended for messages longer than one block, or if keys arelonger than one block, or if keys are reused for more than one-block message.reused for more than one-block message.  Security of ECB may be improved bySecurity of ECB may be improved by inclusion of random padding bits in eachinclusion of random padding bits in each block.block. E E key xj n -1 n cj Encryption Decryption Electronic CodeBookElectronic CodeBook (ECB)(ECB) key xj
  • 26. 2626 6. Modes of operation6. Modes of operation 2.2. Cipher-Block ChainingCipher-Block Chaining (CBC):(CBC): E E key n -1 n Encryption decryption + key c0=IV + Cipher-Block ChainingCipher-Block Chaining (CBC)(CBC) cj-1 xj xj cj cj-1  Identical plaintexts: identical ciphertext blocks result when the same plaintext is enciphered under the key and IV.  Chaining dependency: a ciphertext cj depends on xj and all preceding plaintext blocks ⇒ rearranging the order of ciphertext blocks affects decryption.  Error propagation: a single bit error in ciphertext block cj affects decipherment of cj and cj+1.  Error recovery: CBC is self-synchronizing in the sense that if an error occurs in block cj, cj+2 is correctly recovered.  IV is not secret but needs integrity.
  • 27. 2727 Properties of block ciphersProperties of block ciphers  Block ciphers do propagate errors (to a limited extent), but areBlock ciphers do propagate errors (to a limited extent), but are quite flexible and can be used in different ways in order toquite flexible and can be used in different ways in order to provide different security properties.provide different security properties.  The properties of cryptographic algorithms are not only affectedThe properties of cryptographic algorithms are not only affected by algorithm design, but also by the ways in which theby algorithm design, but also by the ways in which the algorithms are used. Different modes of operation canalgorithms are used. Different modes of operation can significantly change the properties of a block cipher.significantly change the properties of a block cipher.  The security of block ciphers mainly depends on the complexityThe security of block ciphers mainly depends on the complexity of the encryption function whereas thus of stream ciphersof the encryption function whereas thus of stream ciphers depend on the keystream randomness.depend on the keystream randomness.  They can be used to provide confidentiality, data integrity, orThey can be used to provide confidentiality, data integrity, or user authentication, and can even be used to provide theuser authentication, and can even be used to provide the keystream generator for stream cipherskeystream generator for stream ciphers

Editor's Notes

  1. Weak keys results in k1=k16, k2=k15, .. (K1,K2) semi weak keys=&gt; k1_1=k2-16, …. For each key of the 4 weak keys there is 2^32 x such that Ek(x)=x (fixed points) 4 of the semi-weak keys, each have 2^32 x such that E(x)=x’ (anti-fixed points)