SlideShare a Scribd company logo
1
Symmetric Encryption and message
confidentiality
ITSY3104 COMPUTER SECURITY - A - LECTURE 3 Symmetric Encryption and Message Confidentiality
Mr. RAJASEKAR RAMALINGAM
Department of IT, College of Applied
Sciences, Sur.
Sultanate of Oman.
http://vrrsekar.wixsite.com/raja
Based on
William Stallings, Lawrie Brown, Computer Security:
Principles and Practice, Third Edition
CONTENT
ITSY3104 COMPUTER SECURITY - A - LECTURE 3 Symmetric Encryption and Message Confidentiality
2
3.1 Symmetric Encryption Principles
3.2 Data Encryption Standard
3.3 Advanced Encryption Standard
3.4 Stream Ciphers and RC4
3.5 Cipher Block Modes of Operation
3.6 Key Distribution
3.1 Symmetric Encryption Principles
Symmetric Encryption and Message Confidentiality
• also known as: conventional encryption, secret-key, or
single-key encryption
– only alternative before public-key crypto in 70’s
• still most widely used alternative
• has ingredients:
– plaintext,
– encryption algorithm,
– secret key,
– ciphertext, and
– decryption algorithm
3ITSY3104 COMPUTER SECURITY - A - LECTURE 3 Symmetric Encryption and Message Confidentiality
3.1.1 Symmetric Encryption and Message Confidentiality
3.1.2 Cryptography
Classified along three independent
dimensions:
The type of operations
used for transforming
plaintext to ciphertext
• substitution – each element
in the plaintext is mapped
into another element
• transposition – elements in
plaintext are rearranged
The number of keys
used
• sender and receiver use
same key – symmetric
• sender and receiver each
use a different key -
asymmetric
The way in which the
plaintext is processed
• block cipher – processes
input one block of elements
at a time
• stream cipher – processes
the input elements
continuously
ITSY3104 COMPUTER SECURITY - A - LECTURE 3 Symmetric Encryption and Message Confidentiality 4
3.1.3 Cryptanalysis
ITSY3104 COMPUTER SECURITY - A - LECTURE 3 Symmetric Encryption and Message Confidentiality 5
3.1.4 Computationally Secure Algs.
• only weak algs fail a ciphertext-only attack
• usually design algs to withstand a known-plaintext attack
• encryption is computationally secure if:
– cost of breaking cipher exceeds info value
– time required to break cipher exceeds the useful lifetime of the
info
• usually very difficult to estimate the amount of effort
required to break
• can estimate time/cost of a brute-force attack
6ITSY3104 COMPUTER SECURITY - A - LECTURE 3 Symmetric Encryption and Message Confidentiality
3.1.5 Block Cipher Structure
• Symmetric block cipher consists of:
– A sequence of rounds
– With substitutions and permutations controlled by key
• Parameters and design features:
Block size Key size
Number of
rounds
Subkey
generation
algorithm
Round
function
Fast
software
encryption/d
ecryption
Ease of
analysis
ITSY3104 COMPUTER SECURITY - A - LECTURE 3 Symmetric Encryption and Message Confidentiality 7
3.2 Data Encryption Standard (DES)
 Most widely used
encryption scheme
 Adopted in 1977 by
National Bureau of
Standards (now NIST)
 Algorithm is referred to
as the Data Encryption
Algorithm (DEA)
 Minor variation of the
Feistel network
8ITSY3104 COMPUTER SECURITY - A - LECTURE 3 Symmetric Encryption and Message Confidentiality
3.2.1 Triple DES (3DES)
• standardized in 1999
• uses two or three keys
– C = E(K3, D(K2, E(K1, P)))
• decryption same
– with keys reversed
• use of decryption in second stage gives
compatibility with original DES users
• effective 168-bit key length, slow, secure
9ITSY3104 COMPUTER SECURITY - A - LECTURE 3 Symmetric Encryption and Message Confidentiality
10
3.3
Advanced
Encryption
Standard
ITSY3104 COMPUTER SECURITY - A - LECTURE 3 Symmetric Encryption and Message Confidentiality
AES Round Structure
11ITSY3104 COMPUTER SECURITY - A - LECTURE 3 Symmetric Encryption and Message Confidentiality
Substitute Bytes
• a simple table lookup in S-box
– a 1616 matrix of byte values
– mapping old byte to a new value
• e.g. {95} maps to {2A}
– a permutation of all possible 256 8-bit values
• constructed using finite field properties
– designed to be resistant to known cryptanalytic attacks
• decrypt uses inverse of S-box
12ITSY3104 COMPUTER SECURITY - A - LECTURE 3 Symmetric Encryption and Message Confidentiality
S-box
ITSY3104 COMPUTER SECURITY - A - LECTURE 3 Symmetric Encryption and Message Confidentiality 13
Inverse S-box
ITSY3104 COMPUTER SECURITY - A - LECTURE 3 Symmetric Encryption and Message Confidentiality 14
On encryption left
rotate each row of
State by 0,1,2,3
bytes respectively
Decryption
does
reverse
To move
individual
bytes from one
column to
another and
spread bytes
over columns
Shift
Rows
ITSY3104 COMPUTER SECURITY - A - LECTURE 3 Symmetric Encryption and Message Confidentiality 15
Mix Columns & Add Key
• Mix Columns
– operates on each column individually
– mapping each byte to a new value that is a function of all
four bytes in the column
– use of equations over finite fields
– to provide good mixing of bytes in column
• Add Round Key
– simply XOR State with bits of expanded key
– security from complexity of round key expansion and other
stages of AES
16ITSY3104 COMPUTER SECURITY - A - LECTURE 3 Symmetric Encryption and Message Confidentiality
3.4 Stream Ciphers
• processes input elements continuously
• key input to a pseudorandom bit generator
– produces stream of random like numbers
– unpredictable without knowing input key
– XOR keystream output with plaintext bytes
• are faster and use far less code
• design considerations:
– encryption sequence should have a large period
– keystream approximates random number properties
– uses a sufficiently long key
17ITSY3104 COMPUTER SECURITY - A - LECTURE 3 Symmetric Encryption and Message Confidentiality
Speed Comparisons of Symmetric Ciphers
• on a Pentium 4
Source: http://www.cryptopp.com/benchmarks.html
ITSY3104 COMPUTER SECURITY - A - LECTURE 3 Symmetric Encryption and Message Confidentiality 18
RC4
https://www.youtube.com/watch?v=KM-xZYZXElkITSY3104 COMPUTER SECURITY - A - LECTURE 3 Symmetric Encryption and Message Confidentiality
3.5 Modes of Operation
• block ciphers process data in blocks
– e.g. 64-bits (DES, 3DES) or 128-bits (AES)
• for longer messages must break up
– and possibly pad end to block size multiple
• have 5 five modes of operation for this
– defined in NIST SP 800-38A
– modes are: ECB, CBC, CFB, OFB, CTR
20ITSY3104 COMPUTER SECURITY - A - LECTURE 3 Symmetric Encryption and Message Confidentiality
3.5.1 Block Cipher Modes of Operation
ITSY3104 COMPUTER SECURITY - A - LECTURE 3 Symmetric Encryption and Message Confidentiality 21
3.5.2 Electronic Codebook (ECB)
• simplest mode
• split plaintext into blocks
• encrypt each block using the same key
• “codebook” because have unique ciphertext value
for each plaintext block
– not secure for long messages since repeated plaintext is
seen in repeated ciphertext
– to overcome security deficiencies you need a technique
where the same plaintext block, if repeated, produces
different ciphertext blocks
22ITSY3104 COMPUTER SECURITY - A - LECTURE 3 Symmetric Encryption and Message Confidentiality
3.5.3 Cipher Block Chaining (CBC)
23
Cj = E(K, [Cj–1  Pj])
ITSY3104 COMPUTER SECURITY - A - LECTURE 3 Symmetric Encryption and Message Confidentiality
3.5.4 Cipher Feedback (CFB)
24
C1 = P1  Ss[E(K, IV)]
ITSY3104 COMPUTER SECURITY - A - LECTURE 3 Symmetric Encryption and Message Confidentiality
3.5.5 Counter (CTR)
25ITSY3104 COMPUTER SECURITY - A - LECTURE 3 Symmetric Encryption and Message Confidentiality
3.6 Key Distribution
• symmetric crypto needs a shared key:
• two parties A & B can achieve this by:
– A selects key, physically delivers to B
– 3rd party select keys, physically delivers to A, B
• reasonable for link crypto, bad for large no’s users
– A selects new key, sends encrypted using previous old key to B
• good for either, but security fails if any key discovered
– 3rd party C selects key, sends encrypted to each of A & B using
existing key with each
• best for end-to-end encryption
26ITSY3104 COMPUTER SECURITY - A - LECTURE 3 Symmetric Encryption and Message Confidentiality
Key Distribution…
27ITSY3104 COMPUTER SECURITY - A - LECTURE 3 Symmetric Encryption and Message Confidentiality

More Related Content

What's hot

Block cipher modes of operation
Block cipher modes of operation Block cipher modes of operation
Block cipher modes of operation
harshit chavda
 
block ciphers
block ciphersblock ciphers
block ciphers
Asad Ali
 
Message authentication
Message authenticationMessage authentication
Message authentication
CAS
 
Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security
Dr. Kapil Gupta
 
Intro to modern cryptography
Intro to modern cryptographyIntro to modern cryptography
Intro to modern cryptography
zahid-mian
 
Hash Function
Hash Function Hash Function
Hash Function
ssuserdfb2da
 
Message Authentication
Message AuthenticationMessage Authentication
Message Authentication
chauhankapil
 
Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key Cryptosystem
Devakumar Kp
 
Message Authentication Code & HMAC
Message Authentication Code & HMACMessage Authentication Code & HMAC
Message Authentication Code & HMAC
Krishna Gehlot
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securitypatisa
 
Information and network security 13 playfair cipher
Information and network security 13 playfair cipherInformation and network security 13 playfair cipher
Information and network security 13 playfair cipher
Vaibhav Khanna
 
Cryptography - 101
Cryptography - 101Cryptography - 101
Web Security
Web SecurityWeb Security
Web Security
Dr.Florence Dayana
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distribution
Riya Choudhary
 
Program security
Program securityProgram security
Program security
G Prachi
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
Dr. Loganathan R
 
Basic cryptography
Basic cryptographyBasic cryptography
Basic cryptography
Perfect Training Center
 
Cryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie BrownCryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie Brown
Information Security Awareness Group
 

What's hot (20)

Block cipher modes of operation
Block cipher modes of operation Block cipher modes of operation
Block cipher modes of operation
 
block ciphers
block ciphersblock ciphers
block ciphers
 
Message authentication
Message authenticationMessage authentication
Message authentication
 
Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security
 
Intro to modern cryptography
Intro to modern cryptographyIntro to modern cryptography
Intro to modern cryptography
 
Hash Function
Hash Function Hash Function
Hash Function
 
Message Authentication
Message AuthenticationMessage Authentication
Message Authentication
 
Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key Cryptosystem
 
Message Authentication Code & HMAC
Message Authentication Code & HMACMessage Authentication Code & HMAC
Message Authentication Code & HMAC
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
IP Security
IP SecurityIP Security
IP Security
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Information and network security 13 playfair cipher
Information and network security 13 playfair cipherInformation and network security 13 playfair cipher
Information and network security 13 playfair cipher
 
Cryptography - 101
Cryptography - 101Cryptography - 101
Cryptography - 101
 
Web Security
Web SecurityWeb Security
Web Security
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distribution
 
Program security
Program securityProgram security
Program security
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Basic cryptography
Basic cryptographyBasic cryptography
Basic cryptography
 
Cryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie BrownCryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie Brown
 

Similar to Symmetric encryption and message confidentiality

Classical cryptographic techniques, Feistel cipher structure
Classical cryptographic techniques, Feistel cipher structureClassical cryptographic techniques, Feistel cipher structure
Classical cryptographic techniques, Feistel cipher structure
Adri Jovin
 
Slide Deck Class Session 8 – FRSecure CISSP Mentor Program
Slide Deck Class Session 8 – FRSecure CISSP Mentor ProgramSlide Deck Class Session 8 – FRSecure CISSP Mentor Program
Slide Deck Class Session 8 – FRSecure CISSP Mentor Program
FRSecure
 
Slide Deck – Session 8 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 8 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 8 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 8 – FRSecure CISSP Mentor Program 2017
FRSecure
 
key distribution in network security
key distribution in network securitykey distribution in network security
key distribution in network security
babak danyal
 
Slidecast - Workshop
Slidecast - WorkshopSlidecast - Workshop
Slidecast - Workshop
Samant Khajuria
 
Information System Security.pptx
Information System  Security.pptxInformation System  Security.pptx
Information System Security.pptx
GIT
 
Lecture3a symmetric encryption
Lecture3a symmetric encryptionLecture3a symmetric encryption
Lecture3a symmetric encryptionrajakhurram
 
Cryptographic tools
Cryptographic toolsCryptographic tools
Cryptographic tools
CAS
 
Unit V network management and security
Unit V network management and securityUnit V network management and security
Unit V network management and securitysangusajjan
 
5967073.ppt
5967073.ppt5967073.ppt
5967073.ppt
MuhammadFahadNaeem1
 
Multiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisMultiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity Analysis
IJCERT
 
CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2
Hamed Moghaddam
 
Fundamentals of Information Encryption
Fundamentals of Information EncryptionFundamentals of Information Encryption
Fundamentals of Information Encryption
Amna Magzoub
 
14_526_topic04.ppt
14_526_topic04.ppt14_526_topic04.ppt
14_526_topic04.ppt
wwww63
 
NETWORK SECURITY
NETWORK SECURITY NETWORK SECURITY
NETWORK SECURITY
TouseeqHaider11
 
Symmetric ciphermodel
Symmetric ciphermodelSymmetric ciphermodel
Symmetric ciphermodel
priyapavi96
 
CRYPTOGRAPHY & NETWORK SECURITY [Autosaved].pptx
CRYPTOGRAPHY & NETWORK SECURITY [Autosaved].pptxCRYPTOGRAPHY & NETWORK SECURITY [Autosaved].pptx
CRYPTOGRAPHY & NETWORK SECURITY [Autosaved].pptx
asjadzaki2021
 
MAJOR PROJECT FORMAT--2013(new 1)
MAJOR PROJECT FORMAT--2013(new 1)MAJOR PROJECT FORMAT--2013(new 1)
MAJOR PROJECT FORMAT--2013(new 1)Neelabja Manna
 
Computer Cryptography and Encryption [by: Magoiga].pptx
Computer Cryptography and Encryption [by: Magoiga].pptxComputer Cryptography and Encryption [by: Magoiga].pptx
Computer Cryptography and Encryption [by: Magoiga].pptx
magoigamtatiro1
 

Similar to Symmetric encryption and message confidentiality (20)

Classical cryptographic techniques, Feistel cipher structure
Classical cryptographic techniques, Feistel cipher structureClassical cryptographic techniques, Feistel cipher structure
Classical cryptographic techniques, Feistel cipher structure
 
Slide Deck Class Session 8 – FRSecure CISSP Mentor Program
Slide Deck Class Session 8 – FRSecure CISSP Mentor ProgramSlide Deck Class Session 8 – FRSecure CISSP Mentor Program
Slide Deck Class Session 8 – FRSecure CISSP Mentor Program
 
Slide Deck – Session 8 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 8 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 8 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 8 – FRSecure CISSP Mentor Program 2017
 
key distribution in network security
key distribution in network securitykey distribution in network security
key distribution in network security
 
Slidecast - Workshop
Slidecast - WorkshopSlidecast - Workshop
Slidecast - Workshop
 
Information System Security.pptx
Information System  Security.pptxInformation System  Security.pptx
Information System Security.pptx
 
Lecture3a symmetric encryption
Lecture3a symmetric encryptionLecture3a symmetric encryption
Lecture3a symmetric encryption
 
Cryptographic tools
Cryptographic toolsCryptographic tools
Cryptographic tools
 
Unit V network management and security
Unit V network management and securityUnit V network management and security
Unit V network management and security
 
5967073.ppt
5967073.ppt5967073.ppt
5967073.ppt
 
Multiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisMultiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity Analysis
 
CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2
 
Fundamentals of Information Encryption
Fundamentals of Information EncryptionFundamentals of Information Encryption
Fundamentals of Information Encryption
 
14_526_topic04.ppt
14_526_topic04.ppt14_526_topic04.ppt
14_526_topic04.ppt
 
NETWORK SECURITY
NETWORK SECURITY NETWORK SECURITY
NETWORK SECURITY
 
Symmetric ciphermodel
Symmetric ciphermodelSymmetric ciphermodel
Symmetric ciphermodel
 
CRYPTOGRAPHY & NETWORK SECURITY [Autosaved].pptx
CRYPTOGRAPHY & NETWORK SECURITY [Autosaved].pptxCRYPTOGRAPHY & NETWORK SECURITY [Autosaved].pptx
CRYPTOGRAPHY & NETWORK SECURITY [Autosaved].pptx
 
MAJOR PROJECT FORMAT--2013(new 1)
MAJOR PROJECT FORMAT--2013(new 1)MAJOR PROJECT FORMAT--2013(new 1)
MAJOR PROJECT FORMAT--2013(new 1)
 
Iss lecture 2
Iss lecture 2Iss lecture 2
Iss lecture 2
 
Computer Cryptography and Encryption [by: Magoiga].pptx
Computer Cryptography and Encryption [by: Magoiga].pptxComputer Cryptography and Encryption [by: Magoiga].pptx
Computer Cryptography and Encryption [by: Magoiga].pptx
 

More from CAS

CCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CCNA 200-301 IPv6 addressing and subnetting MCQs CollectionCCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CAS
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
CAS
 
RRB JE Stage 2 Computer and Applications Questions Part 4
RRB JE Stage 2 Computer and Applications Questions Part 4RRB JE Stage 2 Computer and Applications Questions Part 4
RRB JE Stage 2 Computer and Applications Questions Part 4
CAS
 
RRB JE Stage 2 Computer and Applications Questions part 3
RRB JE Stage 2 Computer and Applications Questions part 3RRB JE Stage 2 Computer and Applications Questions part 3
RRB JE Stage 2 Computer and Applications Questions part 3
CAS
 
RRB JE Stage 2 Computer and Applications Questions Part 2
RRB JE Stage 2 Computer and Applications Questions Part 2RRB JE Stage 2 Computer and Applications Questions Part 2
RRB JE Stage 2 Computer and Applications Questions Part 2
CAS
 
RRB JE Stage 2 Computer and Applications Questions Part 1
RRB JE Stage 2 Computer and Applications  Questions Part 1RRB JE Stage 2 Computer and Applications  Questions Part 1
RRB JE Stage 2 Computer and Applications Questions Part 1
CAS
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT Security
CAS
 
Introduction to research methodology
Introduction to research methodologyIntroduction to research methodology
Introduction to research methodology
CAS
 
Can you solve this
Can you solve thisCan you solve this
Can you solve this
CAS
 
Public key cryptography and message authentication
Public key cryptography and message authenticationPublic key cryptography and message authentication
Public key cryptography and message authentication
CAS
 
Malicious software
Malicious softwareMalicious software
Malicious software
CAS
 
Legal and ethical aspects
Legal and ethical aspectsLegal and ethical aspects
Legal and ethical aspects
CAS
 
IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessment
CAS
 
It security controls, plans, and procedures
It security controls, plans, and proceduresIt security controls, plans, and procedures
It security controls, plans, and procedures
CAS
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
CAS
 
Human resources security
Human resources securityHuman resources security
Human resources security
CAS
 
Database security
Database securityDatabase security
Database security
CAS
 
Internet security association and key management protocol (isakmp)
Internet security association and key management protocol (isakmp)Internet security association and key management protocol (isakmp)
Internet security association and key management protocol (isakmp)
CAS
 
IP Security Part 2
IP Security   Part 2IP Security   Part 2
IP Security Part 2
CAS
 
IP security Part 1
IP security   Part 1IP security   Part 1
IP security Part 1
CAS
 

More from CAS (20)

CCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CCNA 200-301 IPv6 addressing and subnetting MCQs CollectionCCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CCNA 200-301 IPv6 addressing and subnetting MCQs Collection
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
RRB JE Stage 2 Computer and Applications Questions Part 4
RRB JE Stage 2 Computer and Applications Questions Part 4RRB JE Stage 2 Computer and Applications Questions Part 4
RRB JE Stage 2 Computer and Applications Questions Part 4
 
RRB JE Stage 2 Computer and Applications Questions part 3
RRB JE Stage 2 Computer and Applications Questions part 3RRB JE Stage 2 Computer and Applications Questions part 3
RRB JE Stage 2 Computer and Applications Questions part 3
 
RRB JE Stage 2 Computer and Applications Questions Part 2
RRB JE Stage 2 Computer and Applications Questions Part 2RRB JE Stage 2 Computer and Applications Questions Part 2
RRB JE Stage 2 Computer and Applications Questions Part 2
 
RRB JE Stage 2 Computer and Applications Questions Part 1
RRB JE Stage 2 Computer and Applications  Questions Part 1RRB JE Stage 2 Computer and Applications  Questions Part 1
RRB JE Stage 2 Computer and Applications Questions Part 1
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT Security
 
Introduction to research methodology
Introduction to research methodologyIntroduction to research methodology
Introduction to research methodology
 
Can you solve this
Can you solve thisCan you solve this
Can you solve this
 
Public key cryptography and message authentication
Public key cryptography and message authenticationPublic key cryptography and message authentication
Public key cryptography and message authentication
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Legal and ethical aspects
Legal and ethical aspectsLegal and ethical aspects
Legal and ethical aspects
 
IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessment
 
It security controls, plans, and procedures
It security controls, plans, and proceduresIt security controls, plans, and procedures
It security controls, plans, and procedures
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Human resources security
Human resources securityHuman resources security
Human resources security
 
Database security
Database securityDatabase security
Database security
 
Internet security association and key management protocol (isakmp)
Internet security association and key management protocol (isakmp)Internet security association and key management protocol (isakmp)
Internet security association and key management protocol (isakmp)
 
IP Security Part 2
IP Security   Part 2IP Security   Part 2
IP Security Part 2
 
IP security Part 1
IP security   Part 1IP security   Part 1
IP security Part 1
 

Recently uploaded

Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 

Recently uploaded (20)

Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 

Symmetric encryption and message confidentiality

  • 1. 1 Symmetric Encryption and message confidentiality ITSY3104 COMPUTER SECURITY - A - LECTURE 3 Symmetric Encryption and Message Confidentiality Mr. RAJASEKAR RAMALINGAM Department of IT, College of Applied Sciences, Sur. Sultanate of Oman. http://vrrsekar.wixsite.com/raja Based on William Stallings, Lawrie Brown, Computer Security: Principles and Practice, Third Edition
  • 2. CONTENT ITSY3104 COMPUTER SECURITY - A - LECTURE 3 Symmetric Encryption and Message Confidentiality 2 3.1 Symmetric Encryption Principles 3.2 Data Encryption Standard 3.3 Advanced Encryption Standard 3.4 Stream Ciphers and RC4 3.5 Cipher Block Modes of Operation 3.6 Key Distribution
  • 3. 3.1 Symmetric Encryption Principles Symmetric Encryption and Message Confidentiality • also known as: conventional encryption, secret-key, or single-key encryption – only alternative before public-key crypto in 70’s • still most widely used alternative • has ingredients: – plaintext, – encryption algorithm, – secret key, – ciphertext, and – decryption algorithm 3ITSY3104 COMPUTER SECURITY - A - LECTURE 3 Symmetric Encryption and Message Confidentiality 3.1.1 Symmetric Encryption and Message Confidentiality
  • 4. 3.1.2 Cryptography Classified along three independent dimensions: The type of operations used for transforming plaintext to ciphertext • substitution – each element in the plaintext is mapped into another element • transposition – elements in plaintext are rearranged The number of keys used • sender and receiver use same key – symmetric • sender and receiver each use a different key - asymmetric The way in which the plaintext is processed • block cipher – processes input one block of elements at a time • stream cipher – processes the input elements continuously ITSY3104 COMPUTER SECURITY - A - LECTURE 3 Symmetric Encryption and Message Confidentiality 4
  • 5. 3.1.3 Cryptanalysis ITSY3104 COMPUTER SECURITY - A - LECTURE 3 Symmetric Encryption and Message Confidentiality 5
  • 6. 3.1.4 Computationally Secure Algs. • only weak algs fail a ciphertext-only attack • usually design algs to withstand a known-plaintext attack • encryption is computationally secure if: – cost of breaking cipher exceeds info value – time required to break cipher exceeds the useful lifetime of the info • usually very difficult to estimate the amount of effort required to break • can estimate time/cost of a brute-force attack 6ITSY3104 COMPUTER SECURITY - A - LECTURE 3 Symmetric Encryption and Message Confidentiality
  • 7. 3.1.5 Block Cipher Structure • Symmetric block cipher consists of: – A sequence of rounds – With substitutions and permutations controlled by key • Parameters and design features: Block size Key size Number of rounds Subkey generation algorithm Round function Fast software encryption/d ecryption Ease of analysis ITSY3104 COMPUTER SECURITY - A - LECTURE 3 Symmetric Encryption and Message Confidentiality 7
  • 8. 3.2 Data Encryption Standard (DES)  Most widely used encryption scheme  Adopted in 1977 by National Bureau of Standards (now NIST)  Algorithm is referred to as the Data Encryption Algorithm (DEA)  Minor variation of the Feistel network 8ITSY3104 COMPUTER SECURITY - A - LECTURE 3 Symmetric Encryption and Message Confidentiality
  • 9. 3.2.1 Triple DES (3DES) • standardized in 1999 • uses two or three keys – C = E(K3, D(K2, E(K1, P))) • decryption same – with keys reversed • use of decryption in second stage gives compatibility with original DES users • effective 168-bit key length, slow, secure 9ITSY3104 COMPUTER SECURITY - A - LECTURE 3 Symmetric Encryption and Message Confidentiality
  • 10. 10 3.3 Advanced Encryption Standard ITSY3104 COMPUTER SECURITY - A - LECTURE 3 Symmetric Encryption and Message Confidentiality
  • 11. AES Round Structure 11ITSY3104 COMPUTER SECURITY - A - LECTURE 3 Symmetric Encryption and Message Confidentiality
  • 12. Substitute Bytes • a simple table lookup in S-box – a 1616 matrix of byte values – mapping old byte to a new value • e.g. {95} maps to {2A} – a permutation of all possible 256 8-bit values • constructed using finite field properties – designed to be resistant to known cryptanalytic attacks • decrypt uses inverse of S-box 12ITSY3104 COMPUTER SECURITY - A - LECTURE 3 Symmetric Encryption and Message Confidentiality
  • 13. S-box ITSY3104 COMPUTER SECURITY - A - LECTURE 3 Symmetric Encryption and Message Confidentiality 13
  • 14. Inverse S-box ITSY3104 COMPUTER SECURITY - A - LECTURE 3 Symmetric Encryption and Message Confidentiality 14
  • 15. On encryption left rotate each row of State by 0,1,2,3 bytes respectively Decryption does reverse To move individual bytes from one column to another and spread bytes over columns Shift Rows ITSY3104 COMPUTER SECURITY - A - LECTURE 3 Symmetric Encryption and Message Confidentiality 15
  • 16. Mix Columns & Add Key • Mix Columns – operates on each column individually – mapping each byte to a new value that is a function of all four bytes in the column – use of equations over finite fields – to provide good mixing of bytes in column • Add Round Key – simply XOR State with bits of expanded key – security from complexity of round key expansion and other stages of AES 16ITSY3104 COMPUTER SECURITY - A - LECTURE 3 Symmetric Encryption and Message Confidentiality
  • 17. 3.4 Stream Ciphers • processes input elements continuously • key input to a pseudorandom bit generator – produces stream of random like numbers – unpredictable without knowing input key – XOR keystream output with plaintext bytes • are faster and use far less code • design considerations: – encryption sequence should have a large period – keystream approximates random number properties – uses a sufficiently long key 17ITSY3104 COMPUTER SECURITY - A - LECTURE 3 Symmetric Encryption and Message Confidentiality
  • 18. Speed Comparisons of Symmetric Ciphers • on a Pentium 4 Source: http://www.cryptopp.com/benchmarks.html ITSY3104 COMPUTER SECURITY - A - LECTURE 3 Symmetric Encryption and Message Confidentiality 18
  • 19. RC4 https://www.youtube.com/watch?v=KM-xZYZXElkITSY3104 COMPUTER SECURITY - A - LECTURE 3 Symmetric Encryption and Message Confidentiality
  • 20. 3.5 Modes of Operation • block ciphers process data in blocks – e.g. 64-bits (DES, 3DES) or 128-bits (AES) • for longer messages must break up – and possibly pad end to block size multiple • have 5 five modes of operation for this – defined in NIST SP 800-38A – modes are: ECB, CBC, CFB, OFB, CTR 20ITSY3104 COMPUTER SECURITY - A - LECTURE 3 Symmetric Encryption and Message Confidentiality
  • 21. 3.5.1 Block Cipher Modes of Operation ITSY3104 COMPUTER SECURITY - A - LECTURE 3 Symmetric Encryption and Message Confidentiality 21
  • 22. 3.5.2 Electronic Codebook (ECB) • simplest mode • split plaintext into blocks • encrypt each block using the same key • “codebook” because have unique ciphertext value for each plaintext block – not secure for long messages since repeated plaintext is seen in repeated ciphertext – to overcome security deficiencies you need a technique where the same plaintext block, if repeated, produces different ciphertext blocks 22ITSY3104 COMPUTER SECURITY - A - LECTURE 3 Symmetric Encryption and Message Confidentiality
  • 23. 3.5.3 Cipher Block Chaining (CBC) 23 Cj = E(K, [Cj–1  Pj]) ITSY3104 COMPUTER SECURITY - A - LECTURE 3 Symmetric Encryption and Message Confidentiality
  • 24. 3.5.4 Cipher Feedback (CFB) 24 C1 = P1  Ss[E(K, IV)] ITSY3104 COMPUTER SECURITY - A - LECTURE 3 Symmetric Encryption and Message Confidentiality
  • 25. 3.5.5 Counter (CTR) 25ITSY3104 COMPUTER SECURITY - A - LECTURE 3 Symmetric Encryption and Message Confidentiality
  • 26. 3.6 Key Distribution • symmetric crypto needs a shared key: • two parties A & B can achieve this by: – A selects key, physically delivers to B – 3rd party select keys, physically delivers to A, B • reasonable for link crypto, bad for large no’s users – A selects new key, sends encrypted using previous old key to B • good for either, but security fails if any key discovered – 3rd party C selects key, sends encrypted to each of A & B using existing key with each • best for end-to-end encryption 26ITSY3104 COMPUTER SECURITY - A - LECTURE 3 Symmetric Encryption and Message Confidentiality
  • 27. Key Distribution… 27ITSY3104 COMPUTER SECURITY - A - LECTURE 3 Symmetric Encryption and Message Confidentiality