Shannon’s strategy

7
Shannon’s strategy thwart cryptanalysis that is based on statistical analysis hacker has some knowledge of statistical characteristic of plaintext if statistics are reflected in ciphertext, then analyst may be able to deduce encryption key, or part of it In Shannon’s ideal cipher, statistics of ciphertext are independent of plaintext

Transcript of Shannon’s strategy

Page 1: Shannon’s strategy

Shannon’s strategy• thwart cryptanalysis that is based on

statistical analysis

• hacker has some knowledge of statistical characteristic of plaintext

• if statistics are reflected in ciphertext, then analyst may be able to deduce encryption key, or part of it

• In Shannon’s ideal cipher, statistics of ciphertext are independent of plaintext

Page 2: Shannon’s strategy

Shannon’s building blocks

confusion

make relation between statistics of ciphertext and the value of the encryption key as complex as possible

diffusion

diffuse statistical property of plaintext digit across a range of ciphertext digits

i.e. each plaintext digits affects value of many ciphertext digits

Page 3: Shannon’s strategy

Feistel cipher• input plaintext of 2w bits • key K = n sub-keys: K1, K2, …, Kn• The plain text is divided into 2 halves Lo and Ro• sequence of n “rounds” each using Ki• substitution followed by a permutation• apply function F(Ki) to right half of data, then

exclusive-OR it to left half of data• permutation: interchange two result halves of

data• Li+1=Ri

Ri+1=Li F(Li+1,Ki)

Page 4: Shannon’s strategy

Feistel Cipher Structure

Page 5: Shannon’s strategy

Feistel Cipher Design Principles

• block size– increasing size improves security, but slows cipher

• key size– increasing size improves security, makes exhaustive key searching harder, but

may slow cipher

• number of rounds– increasing number improves security, but slows cipher

• subkey generation– greater complexity can make analysis harder, but slows cipher

• round function– greater complexity can make analysis harder, but slows cipher

• fast software en/decryption & ease of analysis– are more recent concerns for practical use and testing

Page 6: Shannon’s strategy

Feistel Cipher Encryption and Decryption

Page 7: Shannon’s strategy

Decryption

• Ri=Li+1

Li=Ri+1 F(Li+1,Ki)