The document discusses various cryptographic techniques including symmetric and asymmetric encryption. Symmetric encryption uses the same key for encryption and decryption, while asymmetric encryption uses two different keys. The document then describes the Data Encryption Standard (DES) algorithm and its variants, including Triple DES. It also covers the Advanced Encryption Standard (AES) algorithm, its design principles, and modes of operation for block ciphers like ECB, CBC, CFB and OFB.
S-DES is a simplified version of DES used for educational purposes. It operates on 8-bit blocks with a 10-bit key. The key is permuted and shifted to generate two 8-bit subkeys. Encryption applies an initial permutation to the plaintext, then the function fK which xors the left half with a substitution of the right half and subkey, switches the halves, applies fK again, before a final inverse permutation. Decryption reverses these steps. While a brute force attack is feasible due to the small key size, cryptanalysis of the nonlinear substitutions is still difficult due to the complex polynomial equations involved.
This document discusses AES (Advanced Encryption Standard), a symmetric encryption algorithm. It explains the AES encryption process which involves:
1) Performing rounds of substitution, shifting rows, mixing columns and adding a round key on the plaintext
2) The number of rounds depends on the key size (10 rounds for 128-bit keys)
3) The round keys are derived from the original key through an expansion process
The document discusses the Advanced Encryption Standard (AES), which is a block cipher adopted as an encryption standard by the U.S. government. AES uses a substitution-permutation network, which performs mathematical operations like substitutions and permutations on blocks of data. The AES algorithm consists of key expansion, initial round, rounds involving subbytes, shiftrows, mixcolumns and addroundkey steps, and a final round.
This document summarizes a presentation on fault detection in the Advanced Encryption Standard (AES) algorithm. It begins with an introduction to AES, which is a symmetric key algorithm that operates on 128-bit blocks using 128, 192, or 256-bit keys. It then discusses related work on improving AES performance and fault detection. The proposed system describes the AES algorithm and its transformations in more detail. A fault detection scheme is proposed that calculates parities of blocks in the AES S-box and inverse S-box. Implementation results show the proposed scheme achieves high error coverage for single and multiple faults with low area and delay costs.
Using Cipher Key to Generate Dynamic S-Box in AES Cipher SystemCSCJournals
The Advanced Encryption Standard (AES) is using in a large scale of applications that need to protect their data and information. The S-Box component that used in AES is fixed, and not changeable. If we can generate this S-Box dynamically, we increase the cryptographic strength of AES cipher system. In this paper we intend to introduce new algorithm that generate S-Box dynamically from cipher key. We describe how S-Box can be generated dynamically from cipher key and finally analyze the results and experiments.
The document discusses Turing machines and languages. It introduces the concept of a universal Turing machine, which can simulate any other Turing machine. It then discusses countable and uncountable sets, proving that the set of all Turing machines and the set of rational numbers are countable, while the power set of any infinite countable set is uncountable. This implies that the set of all possible languages is uncountable, but the set of languages accepted by Turing machines is countable. Therefore, there must exist at least one language that is not accepted by any Turing machine.
The document summarizes cryptographic algorithms DES and AES. It describes the basic concepts of encryption, the history and workings of DES including key generation and encryption/decryption processes. It then explains the AES cipher which was selected to replace DES, including the cipher structure involving substitution, shifting, mixing and adding round keys in multiple rounds of processing. The key expansion process is also summarized, which derives the round keys from the main encryption key.
S-DES is a simplified version of DES used for educational purposes. It operates on 8-bit blocks with a 10-bit key. The key is permuted and shifted to generate two 8-bit subkeys. Encryption applies an initial permutation to the plaintext, then the function fK which xors the left half with a substitution of the right half and subkey, switches the halves, applies fK again, before a final inverse permutation. Decryption reverses these steps. While a brute force attack is feasible due to the small key size, cryptanalysis of the nonlinear substitutions is still difficult due to the complex polynomial equations involved.
This document discusses AES (Advanced Encryption Standard), a symmetric encryption algorithm. It explains the AES encryption process which involves:
1) Performing rounds of substitution, shifting rows, mixing columns and adding a round key on the plaintext
2) The number of rounds depends on the key size (10 rounds for 128-bit keys)
3) The round keys are derived from the original key through an expansion process
The document discusses the Advanced Encryption Standard (AES), which is a block cipher adopted as an encryption standard by the U.S. government. AES uses a substitution-permutation network, which performs mathematical operations like substitutions and permutations on blocks of data. The AES algorithm consists of key expansion, initial round, rounds involving subbytes, shiftrows, mixcolumns and addroundkey steps, and a final round.
This document summarizes a presentation on fault detection in the Advanced Encryption Standard (AES) algorithm. It begins with an introduction to AES, which is a symmetric key algorithm that operates on 128-bit blocks using 128, 192, or 256-bit keys. It then discusses related work on improving AES performance and fault detection. The proposed system describes the AES algorithm and its transformations in more detail. A fault detection scheme is proposed that calculates parities of blocks in the AES S-box and inverse S-box. Implementation results show the proposed scheme achieves high error coverage for single and multiple faults with low area and delay costs.
Using Cipher Key to Generate Dynamic S-Box in AES Cipher SystemCSCJournals
The Advanced Encryption Standard (AES) is using in a large scale of applications that need to protect their data and information. The S-Box component that used in AES is fixed, and not changeable. If we can generate this S-Box dynamically, we increase the cryptographic strength of AES cipher system. In this paper we intend to introduce new algorithm that generate S-Box dynamically from cipher key. We describe how S-Box can be generated dynamically from cipher key and finally analyze the results and experiments.
The document discusses Turing machines and languages. It introduces the concept of a universal Turing machine, which can simulate any other Turing machine. It then discusses countable and uncountable sets, proving that the set of all Turing machines and the set of rational numbers are countable, while the power set of any infinite countable set is uncountable. This implies that the set of all possible languages is uncountable, but the set of languages accepted by Turing machines is countable. Therefore, there must exist at least one language that is not accepted by any Turing machine.
The document summarizes cryptographic algorithms DES and AES. It describes the basic concepts of encryption, the history and workings of DES including key generation and encryption/decryption processes. It then explains the AES cipher which was selected to replace DES, including the cipher structure involving substitution, shifting, mixing and adding round keys in multiple rounds of processing. The key expansion process is also summarized, which derives the round keys from the main encryption key.
The document discusses the Advanced Encryption Standard (AES) algorithm, which is used for encryption and involves several processes applied to a rectangular array called the state. AES uses a variable number of rounds depending on the key size, with each round consisting of sub bytes, shift rows, mix columns, and add round key transformations except for the last round which excludes mix columns. The Rijndael cipher which was selected as the AES algorithm operates on a 4x4 byte state and supports key sizes of 128, 192, and 256 bits.
Iaetsd an survey of efficient fpga implementation of advanced encryptionIaetsd Iaetsd
This document discusses the FPGA implementation of the Advanced Encryption Standard (AES) algorithm using Verilog for encryption. It provides details on the AES algorithm which encrypts data in 128-bit blocks using round transformations including substitution, shifting, mixing, and adding round keys. The document describes how each round transformation works in both encryption and decryption. It explains that FPGA implementation is better suited for cryptographic algorithms like AES compared to general processors or ASICs as FPGAs are reprogrammable and provide faster hardware solutions. The AES algorithm core is implemented on FPGA to encrypt/decrypt data in a single clock cycle using proper control signals and round keys generated from the block key and load key.
The document provides an overview of the Advanced Encryption Standard (AES) algorithm. It defines key terms like block, state, and XOR used in AES. It then describes the AES algorithm which works by repeating rounds that include byte substitution, shifting rows, mixing columns, and adding a round key. The number of rounds depends on the key size, being 10 for a 16-byte key and 14 for a 32-byte key. Encryption and decryption are similar processes performed in reverse order.
This document provides an overview of a cryptography course, including:
- The course name, code, credits, instructor details.
- An introduction to modern symmetric-key block ciphers, which encrypt blocks of plaintext/ciphertext using a key.
- The basic components of block ciphers, including substitution boxes (S-boxes), permutation boxes (P-boxes), and exclusive-or operations.
- An overview of product ciphers, diffusion, confusion and the structure of block ciphers in rounds.
- Descriptions of modern stream ciphers, synchronous stream ciphers like the one-time pad, and nonsynchronous stream ciphers.
11 × 11 Playfair Cipher based on a Cascade of LFSRsIOSR Journals
This document describes an enhancement to the Playfair cipher that uses an 11x11 matrix instead of the traditional 5x5. It aims to support all ASCII characters by using a larger key space. The encryption process encrypts text in pairs using the Playfair cipher rules. It then converts the ciphertext to binary and passes it through a cascade of linear feedback shift registers (LFSRs) to further scramble the bits. This increases security over a basic Playfair cipher by adding more complex permutations of the ciphertext bits. The document provides details on setting up the 11x11 Playfair matrix, the encryption process, converting to binary, and using a cascade of LFSRs to generate the final ciphertext.
This document summarizes a chapter about the Data Encryption Standard (DES). It provides an overview of DES, describing it as a symmetric-key block cipher developed by IBM and adopted by the National Institute of Standards and Technology. The chapter then goes into details about the structure and design of DES, including its use of an initial and final permutation, 16 rounds of encryption using subkey values, and weaknesses like its short key length. It also discusses analyses of DES security, noting brute force, differential cryptanalysis, and linear cryptanalysis as potential attack methods.
The document discusses the Advanced Encryption Standard (AES), which was selected by the U.S. National Institute of Standards and Technology in 2000 to replace the older Data Encryption Standard (DES). It describes the origins and development of AES, including the evaluation process where Rijndael was selected as the winning algorithm. The summary also provides a high-level overview of how AES works, including its conceptual scheme, encryption rounds, key scheduling, and security against known attacks.
DSA (Data Structure and Algorithm) QuestionsRESHAN FARAZ
The document contains questions related to data structures and algorithms. Some questions ask to perform operations on data structures like stacks, queues, trees, graphs and hash tables. Other questions involve algorithms like topological sorting, shortest path algorithms, minimum spanning tree algorithms, and binary search tree operations. The document tests understanding of concepts taught in an algorithms course through examples and problem solving questions.
Modern Block Cipher- Modern Symmetric-Key CipherMahbubur Rahman
Introduction to Modern Symmetric-Key Ciphers- This lecture will cover only "Modern Block Cipher".
Slide Credit: Maleka Khatun & Mahbubur Rahman
Dept. of CSE, JnU, BD.
Abstract
There is great research going on in the field of data security nowadays. Protecting information from disclosure and breach is of high importance to users personally and to organizations and businesses around the world, as most of information currently are sensitive electronic information transferred over the internet and stored in cloud based system. In this paper, we propose a method to increase the security of messages transferred on the internet, or information stored in the cloud. Our proposed method mainly relies on the Triple Data Encryption Standard (TDES) algorithm. TDES is intact the Data Encryption Standard repeated three times in succession to encrypt data. TDES is considered highly secure as there is no applicable method to break the code itself without knowing the key. We propose to encrypt the key using Cipher Feedback Block algorithm, before using TDES to encrypt data. Such that even when the key is disclosed, the key itself cannot decipher the ciphered text without enciphering the key with CFB. This introduces a new dimension of security to the TDES algorithm.
The method introduced in this paper increases the security of the TDES algorithm using CFB algorithm by increasing the key security, such that it is actually not possible to decipher the text without prior knowledge and agreement of key and algorithms used.
Keywords: Data Encryption Standard, Triple Data Encryption Algorithm, Cipher Feedback Block.
1. The document discusses symmetric cipher models and elementary number theory. It provides a set of multiple choice questions and answers about topics like brute force attacks, conventional vs asymmetric cipher systems, Caesar cipher, Vigenere cipher, index of coincidence, simplified data encryption standard (SDES) and more.
2. The questions cover topics like encryption algorithms, key sizes, encryption/decryption processes, analyzing ciphertexts produced by different ciphers, and calculating values like round keys and indexes of coincidence.
3. Correct answers are provided along with explanations to help understand the concepts behind symmetric encryption techniques and number theory principles.
- The document discusses the Advanced Encryption Standard (AES) and its selection as a replacement for the Data Encryption Standard (DES). It describes the selection process conducted by the National Institute of Standards and Technology (NIST).
- Rijndael, designed by Vincent Rijmen and Joan Daemen, was selected as the AES after evaluation of 15 candidate algorithms. It uses 128/192/256-bit keys and 128-bit blocks.
- The AES cipher, based on Rijndael, consists of 10-14 rounds depending on key size. Each round performs byte substitution, shift rows, mix columns, and adds a round key. It can be efficiently implemented in both software and hardware.
The document summarizes the Advanced Encryption Standard (AES). It describes how AES was selected by NIST as a replacement for DES. AES (Rijndael cipher) uses a block size of 128 bits, with key sizes of 128, 192, or 256 bits. It operates on data in rounds that include byte substitution, shifting rows, mixing columns, and adding the round key. The key is expanded into an array of words used for each round.
FPGA Implementation of an Area Optimized Architecture for 128 bit AES AlgorithmIJERA Editor
This paper aims at FPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm. The
conventional designs use a separate module for 32 bit byte substitution and 128 bit byte substitution. The 32 bit
byte substitution is used in round key generation and the 128 bit byte substitution is used in the rounds. This
report presents a modified architecture of 128 bit byte substitution module using a single 32 bit byte substitution
module to reduce area.The AES encryption and decryption algorithm were designed using Verilog HDL. The
functionality of the modules were checked using ModelSim. The simulations were carried out in ModelSim and
Quartus II. The algorithm was implemented in FPGA and achieved a 2% reduction in the total logic element
utilization
Cryptographic Technique Used Lower and Upper Triangular Decomposition MethodIJERA Editor
In this paper, the main cryptographic technique we will use affine cipher used for encryption and also
decryption by using one of the linear algebra technique lower and upper triangular technique
Dijkstra's algorithm is used to find the shortest path between a starting vertex and any other vertex in a graph with positive edge weights. It works by maintaining a distance label for each vertex, with the starting vertex's label set to 0. It then iteratively selects the unprocessed vertex with the smallest distance label and relaxes any incident edges that improve neighboring vertices' distance labels, until all vertices have been processed. Storing predecessor vertices allows reconstruction of the shortest path.
This document summarizes key concepts about inverse Laplace transformations:
1. Inverse Laplace transformations involve using partial fraction expansions and the method of residues to determine the inverse of rational functions with various types of poles.
2. Simple poles, complex conjugate poles, and repeated poles each have specific inverse Laplace transform pairs and procedures.
3. The finger method provides a visual way to apply the method of residues for simple poles.
4. The initial and final value theorems allow determining initial and steady-state conditions without fully computing the inverse Laplace transform.
5. Laplace transforms can be used to solve differential equations by including initial conditions in the solution.
3. The Data Encryption Standard (DES) and AlternativesSam Bowne
A lecture for a college course -- CNIT 140: Cryptography for Computer Networks at City College San Francisco
Based on "Understanding Cryptography: A Textbook for Students and Practitioners" by Christof Paar, Jan Pelzl, and Bart Preneel, ISBN: 3642041000
Instructor: Sam Bowne
More info: https://samsclass.info/141/141_F17.shtml
1) The document proposes a hybrid 128-bit key AES-DES algorithm to enhance data security and transmission security for next generation networks.
2) It discusses some weaknesses in the AES encryption algorithm against algebraic cryptanalysis and outlines a hybrid approach that combines AES and DES algorithms.
3) The hybrid approach integrates the AES encryption process within the Feistel network structure of DES, using AES transformations like byte substitution and shift rows within each round of the DES Feistel network. This is intended to strengthen security by combining the advantages of both algorithms while reducing individual weaknesses.
The document summarizes cryptographic algorithms DES and AES. It describes the basic concepts of encryption, the history and workings of DES including key generation and encryption/decryption processes. It then explains the AES cipher which was selected to replace DES, including the cipher structure involving substitution, shifting, mixing and adding round keys in multiple rounds of processing. The key expansion process is also summarized.
The document discusses the Data Encryption Standard (DES) and its encryption process. It then summarizes the Rijndael cipher, which was selected as the Advanced Encryption Standard (AES) in 2001. The AES uses a block cipher structure of iterative rounds involving byte substitution, shifting rows of bytes, mixing columns of bytes, and adding round keys.
The document discusses the Advanced Encryption Standard (AES) algorithm, which is used for encryption and involves several processes applied to a rectangular array called the state. AES uses a variable number of rounds depending on the key size, with each round consisting of sub bytes, shift rows, mix columns, and add round key transformations except for the last round which excludes mix columns. The Rijndael cipher which was selected as the AES algorithm operates on a 4x4 byte state and supports key sizes of 128, 192, and 256 bits.
Iaetsd an survey of efficient fpga implementation of advanced encryptionIaetsd Iaetsd
This document discusses the FPGA implementation of the Advanced Encryption Standard (AES) algorithm using Verilog for encryption. It provides details on the AES algorithm which encrypts data in 128-bit blocks using round transformations including substitution, shifting, mixing, and adding round keys. The document describes how each round transformation works in both encryption and decryption. It explains that FPGA implementation is better suited for cryptographic algorithms like AES compared to general processors or ASICs as FPGAs are reprogrammable and provide faster hardware solutions. The AES algorithm core is implemented on FPGA to encrypt/decrypt data in a single clock cycle using proper control signals and round keys generated from the block key and load key.
The document provides an overview of the Advanced Encryption Standard (AES) algorithm. It defines key terms like block, state, and XOR used in AES. It then describes the AES algorithm which works by repeating rounds that include byte substitution, shifting rows, mixing columns, and adding a round key. The number of rounds depends on the key size, being 10 for a 16-byte key and 14 for a 32-byte key. Encryption and decryption are similar processes performed in reverse order.
This document provides an overview of a cryptography course, including:
- The course name, code, credits, instructor details.
- An introduction to modern symmetric-key block ciphers, which encrypt blocks of plaintext/ciphertext using a key.
- The basic components of block ciphers, including substitution boxes (S-boxes), permutation boxes (P-boxes), and exclusive-or operations.
- An overview of product ciphers, diffusion, confusion and the structure of block ciphers in rounds.
- Descriptions of modern stream ciphers, synchronous stream ciphers like the one-time pad, and nonsynchronous stream ciphers.
11 × 11 Playfair Cipher based on a Cascade of LFSRsIOSR Journals
This document describes an enhancement to the Playfair cipher that uses an 11x11 matrix instead of the traditional 5x5. It aims to support all ASCII characters by using a larger key space. The encryption process encrypts text in pairs using the Playfair cipher rules. It then converts the ciphertext to binary and passes it through a cascade of linear feedback shift registers (LFSRs) to further scramble the bits. This increases security over a basic Playfair cipher by adding more complex permutations of the ciphertext bits. The document provides details on setting up the 11x11 Playfair matrix, the encryption process, converting to binary, and using a cascade of LFSRs to generate the final ciphertext.
This document summarizes a chapter about the Data Encryption Standard (DES). It provides an overview of DES, describing it as a symmetric-key block cipher developed by IBM and adopted by the National Institute of Standards and Technology. The chapter then goes into details about the structure and design of DES, including its use of an initial and final permutation, 16 rounds of encryption using subkey values, and weaknesses like its short key length. It also discusses analyses of DES security, noting brute force, differential cryptanalysis, and linear cryptanalysis as potential attack methods.
The document discusses the Advanced Encryption Standard (AES), which was selected by the U.S. National Institute of Standards and Technology in 2000 to replace the older Data Encryption Standard (DES). It describes the origins and development of AES, including the evaluation process where Rijndael was selected as the winning algorithm. The summary also provides a high-level overview of how AES works, including its conceptual scheme, encryption rounds, key scheduling, and security against known attacks.
DSA (Data Structure and Algorithm) QuestionsRESHAN FARAZ
The document contains questions related to data structures and algorithms. Some questions ask to perform operations on data structures like stacks, queues, trees, graphs and hash tables. Other questions involve algorithms like topological sorting, shortest path algorithms, minimum spanning tree algorithms, and binary search tree operations. The document tests understanding of concepts taught in an algorithms course through examples and problem solving questions.
Modern Block Cipher- Modern Symmetric-Key CipherMahbubur Rahman
Introduction to Modern Symmetric-Key Ciphers- This lecture will cover only "Modern Block Cipher".
Slide Credit: Maleka Khatun & Mahbubur Rahman
Dept. of CSE, JnU, BD.
Abstract
There is great research going on in the field of data security nowadays. Protecting information from disclosure and breach is of high importance to users personally and to organizations and businesses around the world, as most of information currently are sensitive electronic information transferred over the internet and stored in cloud based system. In this paper, we propose a method to increase the security of messages transferred on the internet, or information stored in the cloud. Our proposed method mainly relies on the Triple Data Encryption Standard (TDES) algorithm. TDES is intact the Data Encryption Standard repeated three times in succession to encrypt data. TDES is considered highly secure as there is no applicable method to break the code itself without knowing the key. We propose to encrypt the key using Cipher Feedback Block algorithm, before using TDES to encrypt data. Such that even when the key is disclosed, the key itself cannot decipher the ciphered text without enciphering the key with CFB. This introduces a new dimension of security to the TDES algorithm.
The method introduced in this paper increases the security of the TDES algorithm using CFB algorithm by increasing the key security, such that it is actually not possible to decipher the text without prior knowledge and agreement of key and algorithms used.
Keywords: Data Encryption Standard, Triple Data Encryption Algorithm, Cipher Feedback Block.
1. The document discusses symmetric cipher models and elementary number theory. It provides a set of multiple choice questions and answers about topics like brute force attacks, conventional vs asymmetric cipher systems, Caesar cipher, Vigenere cipher, index of coincidence, simplified data encryption standard (SDES) and more.
2. The questions cover topics like encryption algorithms, key sizes, encryption/decryption processes, analyzing ciphertexts produced by different ciphers, and calculating values like round keys and indexes of coincidence.
3. Correct answers are provided along with explanations to help understand the concepts behind symmetric encryption techniques and number theory principles.
- The document discusses the Advanced Encryption Standard (AES) and its selection as a replacement for the Data Encryption Standard (DES). It describes the selection process conducted by the National Institute of Standards and Technology (NIST).
- Rijndael, designed by Vincent Rijmen and Joan Daemen, was selected as the AES after evaluation of 15 candidate algorithms. It uses 128/192/256-bit keys and 128-bit blocks.
- The AES cipher, based on Rijndael, consists of 10-14 rounds depending on key size. Each round performs byte substitution, shift rows, mix columns, and adds a round key. It can be efficiently implemented in both software and hardware.
The document summarizes the Advanced Encryption Standard (AES). It describes how AES was selected by NIST as a replacement for DES. AES (Rijndael cipher) uses a block size of 128 bits, with key sizes of 128, 192, or 256 bits. It operates on data in rounds that include byte substitution, shifting rows, mixing columns, and adding the round key. The key is expanded into an array of words used for each round.
FPGA Implementation of an Area Optimized Architecture for 128 bit AES AlgorithmIJERA Editor
This paper aims at FPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm. The
conventional designs use a separate module for 32 bit byte substitution and 128 bit byte substitution. The 32 bit
byte substitution is used in round key generation and the 128 bit byte substitution is used in the rounds. This
report presents a modified architecture of 128 bit byte substitution module using a single 32 bit byte substitution
module to reduce area.The AES encryption and decryption algorithm were designed using Verilog HDL. The
functionality of the modules were checked using ModelSim. The simulations were carried out in ModelSim and
Quartus II. The algorithm was implemented in FPGA and achieved a 2% reduction in the total logic element
utilization
Cryptographic Technique Used Lower and Upper Triangular Decomposition MethodIJERA Editor
In this paper, the main cryptographic technique we will use affine cipher used for encryption and also
decryption by using one of the linear algebra technique lower and upper triangular technique
Dijkstra's algorithm is used to find the shortest path between a starting vertex and any other vertex in a graph with positive edge weights. It works by maintaining a distance label for each vertex, with the starting vertex's label set to 0. It then iteratively selects the unprocessed vertex with the smallest distance label and relaxes any incident edges that improve neighboring vertices' distance labels, until all vertices have been processed. Storing predecessor vertices allows reconstruction of the shortest path.
This document summarizes key concepts about inverse Laplace transformations:
1. Inverse Laplace transformations involve using partial fraction expansions and the method of residues to determine the inverse of rational functions with various types of poles.
2. Simple poles, complex conjugate poles, and repeated poles each have specific inverse Laplace transform pairs and procedures.
3. The finger method provides a visual way to apply the method of residues for simple poles.
4. The initial and final value theorems allow determining initial and steady-state conditions without fully computing the inverse Laplace transform.
5. Laplace transforms can be used to solve differential equations by including initial conditions in the solution.
3. The Data Encryption Standard (DES) and AlternativesSam Bowne
A lecture for a college course -- CNIT 140: Cryptography for Computer Networks at City College San Francisco
Based on "Understanding Cryptography: A Textbook for Students and Practitioners" by Christof Paar, Jan Pelzl, and Bart Preneel, ISBN: 3642041000
Instructor: Sam Bowne
More info: https://samsclass.info/141/141_F17.shtml
1) The document proposes a hybrid 128-bit key AES-DES algorithm to enhance data security and transmission security for next generation networks.
2) It discusses some weaknesses in the AES encryption algorithm against algebraic cryptanalysis and outlines a hybrid approach that combines AES and DES algorithms.
3) The hybrid approach integrates the AES encryption process within the Feistel network structure of DES, using AES transformations like byte substitution and shift rows within each round of the DES Feistel network. This is intended to strengthen security by combining the advantages of both algorithms while reducing individual weaknesses.
The document summarizes cryptographic algorithms DES and AES. It describes the basic concepts of encryption, the history and workings of DES including key generation and encryption/decryption processes. It then explains the AES cipher which was selected to replace DES, including the cipher structure involving substitution, shifting, mixing and adding round keys in multiple rounds of processing. The key expansion process is also summarized.
The document discusses the Data Encryption Standard (DES) and its encryption process. It then summarizes the Rijndael cipher, which was selected as the Advanced Encryption Standard (AES) in 2001. The AES uses a block cipher structure of iterative rounds involving byte substitution, shifting rows of bytes, mixing columns of bytes, and adding round keys.
Advanced Encryption Standard, Multiple Encryption and Triple DES, Block Cipher Modes of
operation, Stream Ciphers and RC4, Confidentiality using Symmetric Encryption, Introduction
to Number Theory: Prime Numbers, Fermat’s and Euler’s Theorems, Testing for Primality, The
Chinese Remainder Theorem, Discrete Logarithms, Public-Key Cryptography and RSA
1) The AES (Advanced Encryption Standard) cipher was selected by NIST in 2001 to replace the older DES standard. AES uses 128-bit blocks and supports key sizes of 128, 192, and 256 bits.
2) AES operates on a 4x4 column-major order state and undergoes 10-14 rounds of transformations including byte substitution, shifting rows, mixing columns, and adding a round key.
3) The Rijndael cipher was selected as the AES standard. It was chosen for its security, performance, and design simplicity compared to other finalists like Serpent and Twofish.
Block Ciphering
Confusion and Diffusion Theory
Understand the algebra of AES e.g. finding inverse etc.
AES and its importance in security
Efficient implementation of AES.
Implementation of AES
This document provides an overview of block ciphers and the Data Encryption Standard (DES) algorithm. It begins with definitions of stream ciphers and block ciphers. It then discusses the principles of confusion and diffusion in encryption algorithms. The document introduces the Feistel cipher structure and how it was developed based on Claude Shannon's work. It provides details on the DES algorithm, including its history, design, encryption process using rounds and subkeys, decryption process, and the avalanche effect property.
The document discusses stream ciphers and block ciphers. It explains that stream ciphers encrypt data bit-by-bit or byte-by-byte, requiring a randomly generated keystream, while block ciphers encrypt fixed-length blocks, allowing for broader applications. It then focuses on the Feistel cipher structure for block ciphers, proposed by Feistel to approximate an ideal block cipher for large block sizes. The Feistel structure uses a product cipher approach involving substitutions and permutations to provide diffusion and confusion and resist statistical cryptanalysis.
This document summarizes key aspects of block ciphers and the Data Encryption Standard (DES). It discusses Feistel ciphers, DES encryption which uses a 56-bit key on 64-bit blocks, and cryptanalysis techniques like differential and linear cryptanalysis. Block cipher design principles emphasize choosing an appropriate number of rounds, designing a nonlinear round function F, and implementing an effective key scheduling algorithm to generate unique subkeys for each round.
This document provides an introduction to block cipher systems, including the Data Encryption Standard (DES) and the Advanced Encryption Standard (AES). It describes the basic structure and processes of block ciphers, including the use of secret keys, encryption/decryption algorithms, and block sizes. For DES, it outlines the key size, number of rounds, and encryption flow. For AES, it compares the different key sizes and number of rounds, and provides details on the cryptographic functions used in a single round of encryption.
The document discusses block ciphers and the Data Encryption Standard (DES). It begins by explaining the differences between block ciphers and stream ciphers. It then covers the principles of Feistel ciphers and their structure, using DES as a specific example. DES encryption, decryption, and key scheduling are described. The document also discusses attacks on DES like differential and linear cryptanalysis. It concludes by covering modern block cipher design principles.
Block ciphers like DES encrypt data in blocks and are based on the Feistel cipher structure. DES encrypts 64-bit blocks using a 56-bit key and 16 rounds of encryption. Modern cryptanalysis techniques like differential and linear cryptanalysis use statistical analysis to reveal weaknesses in block ciphers, though DES remains relatively secure against these attacks. Careful design of block ciphers, including aspects like non-linear substitution boxes and complex key scheduling, aims to provide security against cryptanalysis.
This document discusses various error correcting codes used in fault-tolerant computing. It begins with an overview of error correction and a multilevel model of impairments. It then provides details on specific codes like Hamming codes, BCH codes, Reed-Solomon codes, and arithmetic codes. Hamming codes can correct single bit errors using parity checks. BCH and Reed-Solomon codes can correct multiple errors using generator polynomials over finite fields. Arithmetic codes represent data as residues to correct errors in arithmetic operations. Overall the document covers the concepts, encoding, decoding, and properties of different error correcting codes.
The document discusses the Data Encryption Standard (DES) algorithm. It was adopted in 1977 and encrypts 64-bit blocks using a 56-bit key. The algorithm uses permutations and substitutions to encrypt data in multiple rounds. Weak keys that reduce the algorithm's security are identified. Attacks like differential and linear cryptanalysis have been developed against DES. Alternatives like triple DES and extending the key length were proposed to strengthen it against attacks.
Triple-DES and RC4 are discussed as encryption algorithms. Triple-DES uses a keying option of E-D-E encryption with two keys for improved security over single DES. Modes of operation like CBC, CFB, and OFB are covered as they define how block ciphers encrypt arbitrary amounts of data. Stream ciphers like RC4 generate a keystream that is XORed with the plaintext bit-by-bit. RC4 is a simple but effective stream cipher, though it must never reuse keys.
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTScsandit
The Elliptic Curve Digital Signature Algorithm (ECDSA) is an elliptic curve variant of the
Digital Signature Algorithm (DSA). It gives cryptographically strong digital signatures making
use of Elliptic curve discrete logarithmic problem. It uses arithmetic with much smaller
numbers 160/256 bits instead of 1024/2048 bits in RSA and DSA and provides the same level of
security. The ECDSA was accepted in 1999 as an ANSI standard, and was accepted in 2000 as
IEEE and NIST standards. It was also accepted in 1998 as an ISO standard. Many cryptologist
have studied security aspects of ECDSA and proposed different variants. In this paper, we
discuss a detailed analysis of the original ECDSA and all its available variants in terms of the
security level and execution time of all the phases. To the best of our knowledge, this is a unique
attempt to juxtapose and compare the ECDSA with all of its variants.
Data Encryption standard in cryptographyNithyasriA2
The document discusses the Data Encryption Standard (DES) algorithm. It provides an overview of DES, including its history, encryption process, key generation process, and decryption process. It describes how DES uses a Feistel cipher structure with a 64-bit block size and 56-bit key. It also discusses various attacks that have been performed on DES, such as differential cryptanalysis and linear cryptanalysis, and how DES has been shown to be insecure due to increases in computational power allowing brute force attacks. Improved versions of DES using multiple encryptions, such as triple DES, are also summarized to increase the key size and security.
This document provides an overview of block ciphers and the Data Encryption Standard (DES) algorithm. It discusses how block ciphers work by encrypting messages in blocks, unlike stream ciphers which encrypt messages bit-by-bit. It then describes the key components of the DES algorithm, including its Feistel network structure, use of substitution boxes and permutation functions to provide diffusion and confusion, and its key schedule for generating subkeys. The document provides details on how each step of the DES algorithm operates to encrypt 64-bit blocks using a 56-bit key.
The document summarizes the Advanced Encryption Standard (AES) cipher. It describes AES's origins as a replacement for DES, outlines the structure and steps of AES including substitution bytes, shift rows, mix columns, and add round key. It also covers AES's key expansion process and notes AES can be efficiently implemented using table lookups and byte operations.
The document summarizes the Advanced Encryption Standard (AES) cipher. It describes AES's origins as a replacement for DES, outlines the structure and steps of AES including substitution bytes, shift rows, mix columns, and add round key. It also covers AES's key expansion process and notes AES can be efficiently implemented using table lookups and operations on 32-bit words.
This document is a table of contents and introduction for a book titled "jQuery Fundamentals" by Rebecca Murphey. The book covers jQuery basics, core concepts, events, effects, Ajax, plugins, and advanced topics. It includes over 50 code examples to demonstrate jQuery syntax and techniques. The book is available under a Creative Commons license and the source code is hosted on GitHub.
This document provides a preface and table of contents for a book on jQuery concepts. The preface explains that the book is intended to teach intermediate and advanced jQuery concepts through code examples. It highlights some stylistic approaches used in the book, such as emphasizing code over text explanations and using color coding. It also defines some key terms that will be used, and recommends reviewing the jQuery documentation and understanding how the text() method works before reading the book. The table of contents then outlines the book's 12 chapters and their respective sections, which cover topics like selecting, traversing, manipulating, events, plugins and more.
This document proposes techniques for embedding unique codewords in electronic documents to discourage illicit copying and distribution. It describes three coding methods - line-shift coding, word-shift coding, and feature coding - that alter document formatting or text elements in subtle, hard-to-detect ways. Experimental results show the line-shift coding method can reliably decode documents even after photocopying, enabling identification of the intended recipient. The techniques aim to make unauthorized distribution at least as difficult as obtaining documents legitimately from the publisher.
This document discusses the field of computer forensics. It defines computer forensics as the collection, preservation, and analysis of computer-related evidence. The goal is to provide solid legal evidence that can be admitted in court and understood by laypeople. Computer forensics is used to investigate various incidents including human behavior like fraud, physical events like hardware failures, and organizational issues like staff changes. It aims to determine the root cause of system disruptions and failures.
This document discusses techniques for data hiding, which involves embedding additional data into digital media files like images, audio, or text. It describes several constraints on data hiding, such as the amount of data to hide, ensuring the data remains intact if the file is modified, and preventing unauthorized access to the hidden data. The document outlines traditional and novel data hiding techniques and evaluates them for applications like copyright protection, tamper-proofing, and adding supplemental data to files. It also discusses tradeoffs between hiding more data versus making the data more robust against modifications to the file.
This document summarizes an analysis of over 200,000 websites engaged in badware behavior according to Google's Safe Browsing initiative. The analysis found that over half of infected sites were located in China, with the top three Chinese network blocks accounting for 68% of infections in that country. In contrast, infected sites in the US were more distributed. Compared to the previous year, the total number of infected sites increased, likely due to expanded scanning and increased malware distribution through websites.
Steganography has been used for over 2500 years to hide secret messages. The paper explores steganography's history from ancient times through modern digital applications. It discusses early examples like Johannes Trithemius' steganographic treatise in the 15th century. Modern uses include microdots, digital images, audio, and digital watermarks for copyright protection. Terrorist groups may use steganography but there is no public evidence yet. Steganography continues to evolve with technology while attackers work to defeat new techniques.
This document discusses the topic of steganography, which is hiding secret messages within other harmless messages. It outlines different techniques for hiding messages in text, images, and audio files. For text, it describes line shift coding, word shift coding, and feature coding methods. For images, it explains least significant bit insertion and exploiting the limitations of the human visual system. For audio, it mentions low-bit encoding and other techniques like phase coding and spread spectrum. It also discusses steganalysis, which aims to detect and destroy hidden messages within files.
This document discusses the need for computer security and provides an introduction to key concepts. It explains that security is necessary to protect vital information, provide authentication and access control, and ensure availability of resources. The document then outlines common security threats like firewall exploits, software bugs, and denial of service attacks. It also discusses basic security components of confidentiality, integrity, and availability as well as goals of preventing attacks, detecting violations, and enabling recovery.
The document discusses various types of malicious programs including buffer overflows, viruses, worms, Trojan horses, backdoors, and logic bombs. It describes how buffer overflows can corrupt the program stack and be exploited by attackers. It explains that viruses attach themselves to other programs and replicate, worms replicate across networks, and Trojan horses masquerade as legitimate programs. It also outlines different approaches for antivirus software including signature-based, heuristic, activity monitoring, and full-featured protection.
This document discusses various topics relating to web security, including:
1) Different types of web pages like static, dynamic, and active pages and the technologies used to create them like JavaScript, Java, and CGI.
2) Security issues associated with technologies like ActiveX, Java applets, JavaScript, and cookies.
3) Protocols for secure communication like HTTPS, digital certificates, and single sign-on systems.
4) Methods for secure electronic commerce including SET and digital cash technologies.
This document provides an overview of network security topics including attacks like diffing, sniffing, session hijacking and spoofing. It discusses protocols for secure communication including SSL, TLS and IPSec. SSL and TLS provide security at the transport layer by encrypting data between a client and server. IPSec provides security at the network layer for both transport and tunnel modes. Authentication Header and Encapsulating Security Payload are the two security protocols used in IPSec.
This document provides an overview of network security topics including diffing, sniffing, session hijacking, spoofing, SSL, TLS, IPSec, and VPNs. It discusses how these attacks work and methods to protect against them, such as encryption. Network layer security protocols like IPSec are described, which uses authentication headers or encapsulating security payloads to provide security services to packets. Transport layer security protocols SSL and TLS are also summarized, including how they establish encrypted sessions between clients and servers.
This document discusses various topics related to computer security authorization, including multilevel security models like Bell-LaPadula and Biba's model, covert channels, inference control, CAPTCHAs, firewalls, and intrusion detection systems. It also provides an overview of network layers like the network layer, transport layer, TCP, and UDP. The key models discussed are Bell-LaPadula for confidentiality and Biba's model for integrity. Covert channels, inference control, and intrusion detection systems are described as techniques for authorization and access control.
This document discusses various methods of authentication, including message authentication, entity authentication, and digital signatures. It describes techniques such as hashing, message authentication codes (MACs), digital signatures using RSA, and challenge-response authentication. It also covers other authentication methods such as passwords, biometrics, and zero-knowledge proofs. The goal of authentication is to verify the identity of entities and ensure the integrity and authenticity of messages.
This document discusses the discrete-time Fourier transform (DTFT). It begins by introducing the DTFT and how it can be used to represent aperiodic signals as the sum of complex exponentials. Several properties of the DTFT are then discussed, including linearity, time/frequency shifting, periodicity, and conjugate symmetry. Examples are provided to illustrate how to compute the DTFT of simple signals. The document also discusses how the DTFT can be used to represent periodic signals and impulse trains.
This document discusses the continuous-time Fourier transform. It begins by developing the Fourier transform representation of aperiodic signals as the limit of Fourier series coefficients as the period increases. It then defines the Fourier transform pairs and discusses properties like convergence. Several examples of calculating the Fourier transform of common signals like exponentials, pulses and periodic signals are provided. Key concepts like the sinc function are also introduced.
Chapter3 - Fourier Series Representation of Periodic SignalsAttaporn Ninsuwan
This document discusses Fourier series representation of periodic signals. It introduces continuous-time periodic signals and their representation as a linear combination of harmonically related complex exponentials. The coefficients in the Fourier series representation can be determined by multiplying both sides of the representation by complex exponentials and integrating over one period. The key steps are: 1) multiplying both sides by e-jω0t, 2) integrating both sides from 0 to T=2π/ω0, and 3) using the fact that the integral equals T when k=n and 0 otherwise to obtain an expression for the coefficients an. Examples are provided to illustrate these concepts.
This document discusses linear time-invariant (LTI) systems in discrete time. It introduces the convolution sum representation of LTI systems, where the output of an LTI system with impulse response h[n] and input x[n] is given by y[n]=x[n]*h[n]=∑k x[k]h[n-k]. Several examples are worked through to demonstrate calculating the output of an LTI system given its impulse response and input. The document also discusses representing discrete time signals as the sum of shifted unit impulse functions and properties of LTI systems like time-invariance.
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
Thinking of getting a dog? Be aware that breeds like Pit Bulls, Rottweilers, and German Shepherds can be loyal and dangerous. Proper training and socialization are crucial to preventing aggressive behaviors. Ensure safety by understanding their needs and always supervising interactions. Stay safe, and enjoy your furry friends!
The simplified electron and muon model, Oscillating Spacetime: The Foundation...RitikBhardwaj56
Discover the Simplified Electron and Muon Model: A New Wave-Based Approach to Understanding Particles delves into a groundbreaking theory that presents electrons and muons as rotating soliton waves within oscillating spacetime. Geared towards students, researchers, and science buffs, this book breaks down complex ideas into simple explanations. It covers topics such as electron waves, temporal dynamics, and the implications of this model on particle physics. With clear illustrations and easy-to-follow explanations, readers will gain a new outlook on the universe's fundamental nature.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
1. 1
241-427-SV-2-2553-COE-PSU 1
241-427 Computer Security
Chapter III: Cryptography
Dr. Sangsuree Vasupongayya
241-427-SV-2-2553-COE-PSU 2
Cryptography mechanisms
Symmetric-key encryption
Same key for encrypt and decrypt
Based on transformations
Asymmetric-key encryption
Two keys
One for encrypt
One for decrypt
Based on mathematical functions
241-427-SV-2-2553-COE-PSU 3
Symmetric-key cipher
Encryption: C = Ek(P)
Decryption: P = Dk(C)
Where Dk(Ek(x)) = Ek(Dk(x)) = x
Bob and Alice will need another channel, a secured one,
to exchange the secret key.
241-427-SV-2-2553-COE-PSU 4
Symmetric Encryption
Same key used to encrypt and decrypt
E(k) can be derived from D(k), and vice versa
DES is most commonly used symmetric block-
encryption algorithm (created by US Govt)
Encrypts a block of data at a time
Triple-DES considered more secure
Advanced Encryption Standard (AES), twofish up
and coming
RC4 is most common symmetric stream cipher, but
known to have vulnerabilities
Encrypts/decrypts a stream of bytes (i.e wireless
transmission)
Key is a input to psuedo-random-bit generator
Generates an infinite keystream
241-427-SV-2-2553-COE-PSU 5
Substitution-Permutation Ciphers
Claude Shannon introduced idea of substitution-
permutation (S-P) networks in 1949 paper
form basis of modern block ciphers
S-P nets are based on the two primitive
cryptographic operations seen before:
substitution (S-box)
permutation (P-box)
provide confusion & diffusion of message & key
241-427-SV-2-2553-COE-PSU 6
Confusion and Diffusion
cipher needs to completely obscure statistical
properties of original message
a one-time pad does this
more practically Shannon suggested combining S &
P elements to obtain:
diffusion – dissipates statistical structure of
plaintext over bulk of ciphertext
confusion – makes relationship between ciphertext
and key as complex as possible
2. 2
241-427-SV-2-2553-COE-PSU 7
Data Encryption Standard (DES)
most widely used block cipher in world
adopted in 1977 by NBS (now NIST)
as FIPS PUB 46
encrypts 64-bit data using 56-bit key
has widespread use
has been considerable controversy over its security
241-427-SV-2-2553-COE-PSU 8
DES overview
241-427-SV-2-2553-COE-PSU 9
DES structure
241-427-SV-2-2553-COE-PSU 10
Initial and Final Permutations
The initial and final permutations are straight P-
boxes that are inverses of each other. They have
no cryptography significance in DES.
241-427-SV-2-2553-COE-PSU 11
Initial and Final Permutations
The initial and final permutations are straight P-
boxes that are inverses of each other. They have
no cryptography significance in DES.
241-427-SV-2-2553-COE-PSU 12
Rounds
DES uses 16 rounds. Each round of DES is a Feistel
cipher.
3. 3
241-427-SV-2-2553-COE-PSU 13
DES function
Applies a 48-bit key to the rightmost 32 bits (Ri-1)
to produce a 32-bit output.
Found sections: An expansion P-box, A whitener
(need key), A group of S-boxes, A straight P-box
241-427-SV-2-2553-COE-PSU 14
Expansion P-box
Expand 32-bit data to 48-bit data using P-box
241-427-SV-2-2553-COE-PSU 15
S-Boxes
Do the real mixing (confusion)
241-427-SV-2-2553-COE-PSU 16
Straight Permutation
Straight permutation with a 32-bit input and a 32-
bit output
241-427-SV-2-2553-COE-PSU 17 241-427-SV-2-2553-COE-PSU 18
Key generation
Create sixteen 48-
bit keys out of a
56-bit cipher key.
4. 4
241-427-SV-2-2553-COE-PSU 19
Parity-bit drop table
Drop bit 8,16,24,32,40,48,56 & 64
241-427-SV-2-2553-COE-PSU 20
Shift left (circular shift)
Round 1, 2, 9 and 16 shift 1 bit; other rounds shift
2 bits
241-427-SV-2-2553-COE-PSU 21
Compression Permutation
Changes 56-bit to 48-bit, which are used as a key
for a round.
241-427-SV-2-2553-COE-PSU 22
DES analysis
Avalanche effect: a small change in the plaintext
(or key) should create a significant change in the
ciphertext.
Completeness effect: each bit of the ciphertext
needs to depend on many bits on the plaintext.
A brute-force attack on DES is feasible with
available technology and the possibility of parallel
processing.
241-427-SV-2-2553-COE-PSU 23
Variants of DES
Double DES (2DES)
Use DES twice instead of 1 DES
Vulnerable to a known-plain text attack
Triple DES (3DES)
the middle stage use reverse cipher
With 2 keys (DES1 & DES3 use the same key)
With 3 keys (e.g., PGP)
241-427-SV-2-2553-COE-PSU 24
Double-DES?
could use 2 DES encrypts on each block
C = EK2(EK1(P))
issue of reduction to single stage
and have “meet-in-the-middle” attack
works whenever use a cipher twice
since X = EK1(P) = DK2(C)
attack by encrypting P with all keys and store
then decrypt C with keys and match X value
can show takes O(256) steps
5. 5
241-427-SV-2-2553-COE-PSU 25
Triple-DES with Two-Keys
hence must use 3 encryptions
would seem to need 3 distinct keys
but can use 2 keys with E-D-E sequence
C = EK1(DK2(EK1(P)))
nb encrypt & decrypt equivalent in security
if K1=K2 then can work with single DES
standardized in ANSI X9.17 & ISO8732
no current known practical attacks
241-427-SV-2-2553-COE-PSU 26
Triple-DES with Two-Keys
241-427-SV-2-2553-COE-PSU 27
Triple-DES with Three-Keys
although are no practical attacks on two-key Triple-
DES have some indications
can use Triple-DES with Three-Keys to avoid even
these
C = EK3(DK2(EK1(P)))
has been adopted by some Internet applications, eg
PGP, S/MIME
241-427-SV-2-2553-COE-PSU 28
designed by Rijment-Daemen in Belgium
has 128/192/256 bit keys, 128 bit data
designed to be:
resistant against known attacks
speed and code compactness on many CPUs
design simplicity
Basic Algebraic structures
Groups
Rings
Fields
Advanced Encryption Standard (AES)
241-427-SV-2-2553-COE-PSU 29
General Design of AES
241-427-SV-2-2553-COE-PSU 30
Data Units
Bit: a binary digit with a value of 0 or 1
Byte: a group of 8 bits can be
A row matrix (1x8), insert a bit from left to right
A column matrix (8x1), insert a bit from top
Word: a group of 32 bits can be
A row matrix of 4 bytes
A column matrix of 4 bytes
Block: a group of 128 bits or a row matrix of 16
bytes
6. 6
241-427-SV-2-2553-COE-PSU 31
Structure of round in AES
241-427-SV-2-2553-COE-PSU 32
Byte Substitution (ByteSub)
a simple substitution of each byte
uses one table of 16x16 bytes containing a
permutation of all 256 8-bit values
each byte of state is replaced by byte indexed by
row (left 4-bits) & column (right 4-bits)
eg. byte {95} is replaced by byte in row 9
column 5
which has value {2A}
S-box constructed using defined transformation of
values in GF(28)
designed to be resistant to all known attacks
241-427-SV-2-2553-COE-PSU 33
Byte Substitution
241-427-SV-2-2553-COE-PSU 34
Shift Rows
a circular byte shift in each row
1st row is unchanged
2nd row does 1 byte circular shift to left
3rd row does 2 byte circular shift to left
4th row does 3 byte circular shift to left
decrypt inverts using shifts to right
since state is processed by columns, this step
permutes bytes between the columns
241-427-SV-2-2553-COE-PSU 35
Shift Rows
241-427-SV-2-2553-COE-PSU 36
Mix Columns
each column is processed separately
each byte is replaced by a value dependent on all 4
bytes in the column
effectively a matrix multiplication in GF(28) using
prime poly m(x) =x8+x4+x3+x+1
7. 7
241-427-SV-2-2553-COE-PSU 37
Mix Columns
241-427-SV-2-2553-COE-PSU 38
Mix Columns
can express each col as 4 equations
to derive each new byte in col
decryption requires use of inverse matrix
with larger coefficients, hence a little harder
have an alternate characterisation
each column a 4-term polynomial
with coefficients in GF(28)
and polynomials multiplied modulo (x4+1)
241-427-SV-2-2553-COE-PSU 39
Add Round Key
XOR state with 128-bits of the round key
again processed by column (though effectively a
series of byte operations)
inverse for decryption identical
since XOR own inverse, with reversed keys
designed to be as simple as possible
a form of Vernam cipher on expanded key
requires other stages for complexity / security
241-427-SV-2-2553-COE-PSU 40
Add Round Key
241-427-SV-2-2553-COE-PSU 41
AES Round
241-427-SV-2-2553-COE-PSU 42
AES Key Expansion
takes 128-bit (16-byte) key and expands into array
of 44/52/60 32-bit words
start by copying key into first 4 words
then loop creating words that depend on values in
previous & 4 places back
in 3 of 4 cases just XOR these together
1st word in 4 has rotate + S-box + XOR round
constant on previous, before XOR 4th back
designed to resist known attacks
8. 8
241-427-SV-2-2553-COE-PSU 43
AES Key Expansion
241-427-SV-2-2553-COE-PSU 44
Key Expansion Rationale
design criteria included
knowing part key insufficient to find many more
invertible transformation
fast on wide range of CPU’s
use round constants to break symmetry
diffuse key bits into round keys
enough non-linearity to hinder analysis
simplicity of description
241-427-SV-2-2553-COE-PSU 45
AES Decryption
AES decryption is not identical to encryption since
steps done in reverse
but can define an equivalent inverse cipher with
steps as for encryption
but using inverses of each step
with a different key schedule
works since result is unchanged when
swap byte substitution & shift rows
swap mix columns & add (tweaked) round key
241-427-SV-2-2553-COE-PSU 46
Cipher and inverse cipher
241-427-SV-2-2553-COE-PSU 47
Implementation Aspects
can efficiently implement on 8-bit CPU
byte substitution works on bytes using a table of 256
entries
shift rows is simple byte shift
add round key works on byte XOR’s
mix columns requires matrix multiply in GF(28) which
works on byte values, can be simplified to use table
lookups & byte XOR’s
241-427-SV-2-2553-COE-PSU 48
Implementation Aspects
can efficiently implement on 32-bit CPU
redefine steps to use 32-bit words
can precompute 4 tables of 256-words
then each column in each round can be computed
using 4 table lookups + 4 XORs
at a cost of 4Kb to store tables
designers believe this very efficient implementation
was a key factor in its selection as the AES cipher
9. 9
241-427-SV-2-2553-COE-PSU 49
Modes of Operation
block ciphers encrypt fixed size blocks
eg. DES encrypts 64-bit blocks with 56-bit key
need some way to en/decrypt arbitrary amounts of
data in practise
ANSI X3.106-1983 Modes of Use (now FIPS 81)
defines 4 possible modes
subsequently 5 defined for AES & DES
have block and stream modes
241-427-SV-2-2553-COE-PSU 50
Electronic Codebook Book (ECB)
message is broken into independent blocks which are
encrypted
each block is a value which is substituted, like a
codebook, hence name
each block is encoded independently of the other
blocks
Ci = DESK1(Pi)
uses: secure transmission of single values
241-427-SV-2-2553-COE-PSU 51
Electronic Codebook Book (ECB)
241-427-SV-2-2553-COE-PSU 52
ECB Advantages & Limitations
message repetitions may show in ciphertext
if aligned with message block
particularly with data such graphics
or with messages that change very little, which
become a code-book analysis problem
weakness is due to the encrypted message blocks being
independent
main use is sending a few blocks of data
241-427-SV-2-2553-COE-PSU 53
Cipher Block Chaining (CBC)
message is broken into blocks
linked together in encryption operation
each previous cipher blocks is chained with current
plaintext block, hence name
use Initial Vector (IV) to start process
Ci = DESK1(Pi XOR Ci-1)
C-1 = IV
uses: bulk data encryption, authentication
241-427-SV-2-2553-COE-PSU 54
Cipher Block Chaining (CBC)
10. 10
241-427-SV-2-2553-COE-PSU 55
Advantages and Limitations of CBC
a ciphertext block depends on all blocks before it
any change to a block affects all following ciphertext
blocks
need Initialization Vector (IV)
which must be known to sender & receiver
if sent in clear, attacker can change bits of first block, and
change IV to compensate
hence IV must either be a fixed value (as in EFTPOS)
or must be sent encrypted in ECB mode before rest of message
241-427-SV-2-2553-COE-PSU 56
Cipher FeedBack (CFB)
Size of the block in AES or DES is n
Size of the plaintext is r; r <= n
Encrypt or decrypt the contents of a shift register,
S, of size n
Encryption XOR r-bit plaintext w/ r-bits of the shift
register
241-427-SV-2-2553-COE-PSU 57
Cipher FeedBack (CFB)
241-427-SV-2-2553-COE-PSU 58
CFB Advantages & Limitations
appropriate when data arrives in bits/bytes
most common stream mode
limitation is need to stall while do block encryption
after every n-bits
note that the block cipher is used in encryption
mode at both ends
errors propogate for several blocks after the error
241-427-SV-2-2553-COE-PSU 59
Output FeedBack (OFB)
Similar to CFB
Each bit in the ciphertext is independent of the
previous bit or bits
241-427-SV-2-2553-COE-PSU 60
Advantages and Limitations of OFB
bit errors do not propagate
more vulnerable to message stream modification
a variation of a Vernam cipher
hence must never reuse the same sequence
(key+IV)
sender & receiver must remain in sync
originally specified with m-bit feedback
subsequent research has shown that only full
block feedback (ie CFB-64 or CFB-128) should
ever be used
11. 11
241-427-SV-2-2553-COE-PSU 61
Counter (CTR)
similar to OFB but encrypts counter value rather than
any feedback value
must have a different key & counter value for every
plaintext block (never reused)
241-427-SV-2-2553-COE-PSU 62
Advantages and Limitations of CTR
efficiency
can do parallel encryptions in h/w or s/w
can preprocess in advance of need
good for bursty high speed links
random access to encrypted data blocks
provable security (good as other modes)
but must ensure never reuse key/counter values,
otherwise could break (cf OFB)
241-427-SV-2-2553-COE-PSU 63
Asymmetric-key cryptosystem
241-427-SV-2-2553-COE-PSU 64
Conceptual differences
slowfast
numbers are manipulated
(mathematical function)
symbols are permuted or
substituted
only n personal secrets(n-1)n/2 shared secrets
The secret is not sharedThe secret is shared
asymmetricsymmetric
241-427-SV-2-2553-COE-PSU 65
General idea
241-427-SV-2-2553-COE-PSU 66
General idea (cont.)
Bob must create two keys; distribute to others
Eve should not be able to advertise her public key
pretending to be Bob’s key
Each key pair can be used for one-way
communication
Bob only needs one private key to receive message
from anyone
Bob needs n public keys to talk to n people
(one for each person)
The plaintext and ciphertext are treated as integers
C = f(Kpublic, P) while P = g(Kprivate, C)
And f must be a trapdoor one-way function
12. 12
241-427-SV-2-2553-COE-PSU 67
Trapdoor one-way function
One-way function
f is easy
given x compute y = f(x) is easy
f-1 is difficult
given y, it is computationally infeasible to calculate x
= f-1(y)
Trapdoor one-way function
A one-way function that
given y and a trapdoor (secret), x can be easily
computed
E.g., y = xk mod n when n is large
241-427-SV-2-2553-COE-PSU 68
y = xk mod n
Given x, k and n, it is easy to calculate y
Square-and multiply method
Given y, k and n, it is very difficult to compute x
Discrete logarithm problem
However if a trapdoor k’ such that
k’ • k = 1 mod Ф(n) is known
x can be easily calculated by
x = yk’ mod n
This is used in RSA
241-427-SV-2-2553-COE-PSU 69
RSA cryptosystem
Named for its inventors (Rivest, Shamir, Adleman)
241-427-SV-2-2553-COE-PSU 70
RSA: key generation
Recommended size
n should be at least 1024 bits
e and d should be at least 512 bits
Key generation
1. Select two large prime p and q
2. n ← p • q
3. Ф(n) = (p-1)(q-1)
4. Select e such that
1 < e < Ф(n) and gcd(e, Ф(n)) = 1
5. d ← e-1 mod Ф(n)
{e,n} is the public key
{d,n} is the private key
241-427-SV-2-2553-COE-PSU 71
Exponentiation
can use the Square and Multiply Algorithm
a fast, efficient algorithm for exponentiation
concept is based on repeatedly squaring base
and multiplying in the ones that are needed to
compute the result
look at binary representation of exponent
only takes O(log2 n) multiples for number n
eg. 75 mod 11 = 10
241-427-SV-2-2553-COE-PSU 72
square-and-multiply
Square-and-multiply (x, k, n)
y ← 1
for i=0 to nb-1
if(ki = 1)
y ← x • y mod n
x ← x2 mod n
return y
Where nb is the number of bits in k
13. 13
241-427-SV-2-2553-COE-PSU 73
RSA Example - Key Setup
1. Select primes: p=17 & q=11
2. Compute n = pq =17 x 11=187
3. Compute ø(n)=(p–1)(q-1)=16 x 10=160
4. Select e: gcd(e,160)=1; choose e=7
5. Determine d: de=1 mod 160 and d < 160 Value is
d=23 since 23x7=161= 10x160+1
6. Publish public key PU={7,187}
7. Keep secret private key PR={23,187}
241-427-SV-2-2553-COE-PSU 74
Attacking RSA
possible approaches:
brute force key search
(infeasible given size of numbers)
mathematical attacks
(based on difficulty of computing ø(n), by factoring
modulus n)
timing attacks (on running of decryption)
chosen ciphertext attacks
(given properties of RSA)
If the ciphertext is a permutation of the plaintext
Continuous encryption of the ciphertext will eventually
results in the plaintext
241-427-SV-2-2553-COE-PSU 75
Man-in-the-middle Attack
241-427-SV-2-2553-COE-PSU 76
Symmetric-key distribution
How to distribute and maintain secret keys
Two approach
Use a trusted third party
Use no third party
241-427-SV-2-2553-COE-PSU 77
Use a trusted third party
Key-distribution center (KDC)
Each user has a shared secret key wit the KDC
Problems
Not scale
Bottleneck problem
241-427-SV-2-2553-COE-PSU 78
Example of KDC approach
14. 14
241-427-SV-2-2553-COE-PSU 79
No third party
Diffie-Hellman key agreement
241-427-SV-2-2553-COE-PSU 80
Diffie-Hellman
Initial: choose two number p and g
p: a large prime number > 300 decimal digits
1024 bits
g: an integer < p such that foe every number n
between 1 to p-1, there is a power k of g such that n
= gk mod p
Idea
Key is gxy mod p
where one party knows x and the other knows y
Problems
Discrete logarithm attack
Man-in-the-middle attack
241-427-SV-2-2553-COE-PSU 81
Man-in-the-middle-attack
241-427-SV-2-2553-COE-PSU 82
Public-key distribution
Public announcement
simple and easy
Subject to forgery
Anyone can pretend to be
anyone
The key can be switched
during the communication
241-427-SV-2-2553-COE-PSU 83
Public-key distribution (cont.)
Trusted center: keep
information of public key
and dynamically updated
the information
Each user must prove
his/her identity
The user’s public key is
kept at the trusted
center
241-427-SV-2-2553-COE-PSU 84
Public-key distribution (cont.)
Controlled trusted center
15. 15
241-427-SV-2-2553-COE-PSU 85
Public-key distribution (cont.)
Both trusted center models
Create heavy load on the trusted center
Objectives
A person wants people to know his public-key
Wants no one to accept a forged key as his
Solutions
Certification authority (CA): a federal or state
organization that binds a public key to an entity and
issues a certificate
The CA checks Bob’s identity
The CA issue the certificate by signing Bob’s public
key using the center private key
241-427-SV-2-2553-COE-PSU 86
Certification authority
241-427-SV-2-2553-COE-PSU 87
Public-Key Infrastructures (PKI)
A model for creating, distributing and revoking
certificates based on the X.509
Duties
Certificates’ issuing, renewal and revocation
Keys’ storage and update: store members’ private
keys and update these keys on members’ demands
Providing services to other protocols
e.g., IPSec, TLS
Providing access control
different access levels
241-427-SV-2-2553-COE-PSU 88
PKI: trust model
Reason: not possible to have a single CA
Q1: how user1 can trust user3?
Q2: how user1 can trust user4?
241-427-SV-2-2553-COE-PSU 89
X.509
the Internationally accepted standard for how to
construct a public key certificate
used by S/MIME secure email, SSL/TLS secure
Internet links (e.g., for secure web)
241-427-SV-2-2553-COE-PSU 90
X.509 Certificates
16. 16
241-427-SV-2-2553-COE-PSU 91
X.509 Certificates
issued by a Certification Authority (CA), containing:
version (1, 2, or 3)
serial number (unique within CA) identifying certificate
signature algorithm identifier
issuer X.500 name (CA)
period of validity (from - to dates)
subject X.500 name (name of owner)
subject public-key info (algorithm, parameters, key)
issuer unique identifier (v2+)
subject unique identifier (v2+)
extension fields (v3)
signature (of hash of all fields in certificate)
notation CA<<A>> : certificate for A signed by CA
241-427-SV-2-2553-COE-PSU 92
X.509: certificate revocation
Reasons
Compromised key
The CA is no longer willing to certify the user
The CA private key is compromised
Actions:
Issue a certificate revocation list (CRL)
Before using any certificate, the user must check
this list
241-427-SV-2-2553-COE-PSU 93
References
W. Stallings, Cryptography and Network Security,
3rd ed.
B.A. Forouzan, Cryptograhpy and Network Security,
McGraw-Hill, 2008.
A.Kahate, Cryptography and network Security,
McGraw-Hill, 2003.