Shannon’s strategy
-
Upload
sri-vidhya -
Category
Documents
-
view
75 -
download
0
Transcript of Shannon’s strategy
Shannon’s strategy• thwart cryptanalysis that is based on
statistical analysis
• hacker has some knowledge of statistical characteristic of plaintext
• if statistics are reflected in ciphertext, then analyst may be able to deduce encryption key, or part of it
• In Shannon’s ideal cipher, statistics of ciphertext are independent of plaintext
Shannon’s building blocks
confusion
make relation between statistics of ciphertext and the value of the encryption key as complex as possible
diffusion
diffuse statistical property of plaintext digit across a range of ciphertext digits
i.e. each plaintext digits affects value of many ciphertext digits
Feistel cipher• input plaintext of 2w bits • key K = n sub-keys: K1, K2, …, Kn• The plain text is divided into 2 halves Lo and Ro• sequence of n “rounds” each using Ki• substitution followed by a permutation• apply function F(Ki) to right half of data, then
exclusive-OR it to left half of data• permutation: interchange two result halves of
data• Li+1=Ri
Ri+1=Li F(Li+1,Ki)
Feistel Cipher Structure
Feistel Cipher Design Principles
• block size– increasing size improves security, but slows cipher
• key size– increasing size improves security, makes exhaustive key searching harder, but
may slow cipher
• number of rounds– increasing number improves security, but slows cipher
• subkey generation– greater complexity can make analysis harder, but slows cipher
• round function– greater complexity can make analysis harder, but slows cipher
• fast software en/decryption & ease of analysis– are more recent concerns for practical use and testing
Feistel Cipher Encryption and Decryption
Decryption
• Ri=Li+1
Li=Ri+1 F(Li+1,Ki)