Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting...
-
Upload
bennett-wood -
Category
Documents
-
view
238 -
download
0
Transcript of Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting...
![Page 1: Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.](https://reader036.fdocuments.in/reader036/viewer/2022081421/5697bfb91a28abf838c9f899/html5/thumbnails/1.jpg)
Symmetric Encryption Lesson Introduction
●Block cipher primitives
●DES
●AES
●Encrypting large message
●Message integrity
![Page 2: Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.](https://reader036.fdocuments.in/reader036/viewer/2022081421/5697bfb91a28abf838c9f899/html5/thumbnails/2.jpg)
Block Cipher Scheme
![Page 3: Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.](https://reader036.fdocuments.in/reader036/viewer/2022081421/5697bfb91a28abf838c9f899/html5/thumbnails/3.jpg)
Block Cipher Primitives
Confusion: ●An encryption operationwhere the relationship between the key and ciphertext is obscured
•Achieved with substitution
![Page 4: Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.](https://reader036.fdocuments.in/reader036/viewer/2022081421/5697bfb91a28abf838c9f899/html5/thumbnails/4.jpg)
Block Cipher Primitives
Diffusion: ●An encryption operation where the
influence of one plaintext bit is spread over many ciphertext bits with the goal of hiding statistical properties of the plaintext
• Achieved with permutation
![Page 5: Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.](https://reader036.fdocuments.in/reader036/viewer/2022081421/5697bfb91a28abf838c9f899/html5/thumbnails/5.jpg)
Block Cipher Primitives
●Both confusion and diffusion bythemselves cannot provide (strong enough) security
●Round: combination of substitution and permutation, and do so often enough so that a bit change can affect every output bit
![Page 6: Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.](https://reader036.fdocuments.in/reader036/viewer/2022081421/5697bfb91a28abf838c9f899/html5/thumbnails/6.jpg)
Block Cipher Quiz
A block cipher should...
Select all correct answers to complete that statement.
Keep the algorithm secret
Use a few rounds, each with a combination of substitution and permutation
Use permutation to achieve diffusion
Use substitution to achieve confusion
![Page 7: Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.](https://reader036.fdocuments.in/reader036/viewer/2022081421/5697bfb91a28abf838c9f899/html5/thumbnails/7.jpg)
Data Encryption Standard
●Published in 1977, standardized in 1979
●Key: 64 bit quantity=8-bit parity+56-bit key
●Every 8th bit is a parity bit
●64 bit input, 64 bit output
![Page 8: Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.](https://reader036.fdocuments.in/reader036/viewer/2022081421/5697bfb91a28abf838c9f899/html5/thumbnails/8.jpg)
Data Encryption Standard
![Page 9: Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.](https://reader036.fdocuments.in/reader036/viewer/2022081421/5697bfb91a28abf838c9f899/html5/thumbnails/9.jpg)
Data Encryption Standard
![Page 10: Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.](https://reader036.fdocuments.in/reader036/viewer/2022081421/5697bfb91a28abf838c9f899/html5/thumbnails/10.jpg)
Data Encryption Standard
![Page 11: Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.](https://reader036.fdocuments.in/reader036/viewer/2022081421/5697bfb91a28abf838c9f899/html5/thumbnails/11.jpg)
Decryption●Apply the same operations keysequence in reverse:
●Round 1 of decryption uses key of thelast round in encryption
●Each round:●Input: Rn+1|Ln+1
●Due to the swap operation at the end of encryption●Output: Rn|Ln
●The swap operation at the end will produce the correct result: L|R
![Page 12: Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.](https://reader036.fdocuments.in/reader036/viewer/2022081421/5697bfb91a28abf838c9f899/html5/thumbnails/12.jpg)
XOR Quiz
key = FA F2
Hi = FA F2 =
Hi encrypted =
Use the XOR function and the given key to encrypt the word “Hi”.
![Page 13: Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.](https://reader036.fdocuments.in/reader036/viewer/2022081421/5697bfb91a28abf838c9f899/html5/thumbnails/13.jpg)
Mangler Function
![Page 14: Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.](https://reader036.fdocuments.in/reader036/viewer/2022081421/5697bfb91a28abf838c9f899/html5/thumbnails/14.jpg)
S-Box (Substitute and Shrink)
![Page 15: Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.](https://reader036.fdocuments.in/reader036/viewer/2022081421/5697bfb91a28abf838c9f899/html5/thumbnails/15.jpg)
S-Box
Quiz
Output: Input: 011011
For the given input, determine the output.
![Page 16: Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.](https://reader036.fdocuments.in/reader036/viewer/2022081421/5697bfb91a28abf838c9f899/html5/thumbnails/16.jpg)
Security of DES
●Key space is too small (256 keys)●Exhaustive key search relative easy with today’s computers
●S-box design criteria have been kept secret
●Highly resistant to cryptanalysis techniques published years after DES
![Page 17: Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.](https://reader036.fdocuments.in/reader036/viewer/2022081421/5697bfb91a28abf838c9f899/html5/thumbnails/17.jpg)
Triple DES
●K1=K3 results in an equivalent 112-bit DES which provides a sufficient key space
●Distinct K1, K2, K3 results in an even stronger 168-bit DES
●Can run as a single DES with K1 = K2
![Page 18: Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.](https://reader036.fdocuments.in/reader036/viewer/2022081421/5697bfb91a28abf838c9f899/html5/thumbnails/18.jpg)
DES
Quiz
To decrypt using DES, same algorithm is used, but with per-round keys used in the reversed order
Check all the statements that are true:
The logics behind the S-boxes are well-known and verified
Each round of DES contains both substitution and permutation operations
With Triple DES the effective key length can be 56, 112, and 168
![Page 19: Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.](https://reader036.fdocuments.in/reader036/viewer/2022081421/5697bfb91a28abf838c9f899/html5/thumbnails/19.jpg)
Advanced Encryption Standard
●In 1997, the U.S. National Institute for Standards and Technology (NIST) put out a public call for a replacement to DES
●It narrowed down the list of submissions to five finalists, and ultimately chose an algorithm (Rijndael) that is now known as the Advanced Encryption Standard (AES)
●New (Nov. 2001) symmetric-key NIST standard, replacing DES
●Processes data in 128 bit blocks●Key length can be 128, 192, or 256 bits
![Page 20: Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.](https://reader036.fdocuments.in/reader036/viewer/2022081421/5697bfb91a28abf838c9f899/html5/thumbnails/20.jpg)
Advanced Encryption Standard
![Page 21: Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.](https://reader036.fdocuments.in/reader036/viewer/2022081421/5697bfb91a28abf838c9f899/html5/thumbnails/21.jpg)
AES Round
![Page 22: Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.](https://reader036.fdocuments.in/reader036/viewer/2022081421/5697bfb91a28abf838c9f899/html5/thumbnails/22.jpg)
![Page 23: Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.](https://reader036.fdocuments.in/reader036/viewer/2022081421/5697bfb91a28abf838c9f899/html5/thumbnails/23.jpg)
●A Stick Figure Guide to AES● http://www.moserware.com/2009/09/stick-figure-guide-to-advanced.html
![Page 24: Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.](https://reader036.fdocuments.in/reader036/viewer/2022081421/5697bfb91a28abf838c9f899/html5/thumbnails/24.jpg)
![Page 25: Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.](https://reader036.fdocuments.in/reader036/viewer/2022081421/5697bfb91a28abf838c9f899/html5/thumbnails/25.jpg)
![Page 26: Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.](https://reader036.fdocuments.in/reader036/viewer/2022081421/5697bfb91a28abf838c9f899/html5/thumbnails/26.jpg)
![Page 27: Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.](https://reader036.fdocuments.in/reader036/viewer/2022081421/5697bfb91a28abf838c9f899/html5/thumbnails/27.jpg)
![Page 28: Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.](https://reader036.fdocuments.in/reader036/viewer/2022081421/5697bfb91a28abf838c9f899/html5/thumbnails/28.jpg)
![Page 29: Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.](https://reader036.fdocuments.in/reader036/viewer/2022081421/5697bfb91a28abf838c9f899/html5/thumbnails/29.jpg)
![Page 30: Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.](https://reader036.fdocuments.in/reader036/viewer/2022081421/5697bfb91a28abf838c9f899/html5/thumbnails/30.jpg)
![Page 31: Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.](https://reader036.fdocuments.in/reader036/viewer/2022081421/5697bfb91a28abf838c9f899/html5/thumbnails/31.jpg)
AES Encryption
Quiz
To decrypt using AES, just run the same algorithm in the same order of operations
Check all the statements that are true:
AES is much more efficient than Triple DES
AES can support key length of 128, 192, 256
Each operation or stage in AES is reversible
![Page 32: Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.](https://reader036.fdocuments.in/reader036/viewer/2022081421/5697bfb91a28abf838c9f899/html5/thumbnails/32.jpg)
Encrypting a Large Message
●Break a message into blocks
●Apply block cipher on the blocks
●Is that it?
![Page 33: Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.](https://reader036.fdocuments.in/reader036/viewer/2022081421/5697bfb91a28abf838c9f899/html5/thumbnails/33.jpg)
Encrypting a Large Message
![Page 34: Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.](https://reader036.fdocuments.in/reader036/viewer/2022081421/5697bfb91a28abf838c9f899/html5/thumbnails/34.jpg)
Encrypting a Large Message
![Page 35: Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.](https://reader036.fdocuments.in/reader036/viewer/2022081421/5697bfb91a28abf838c9f899/html5/thumbnails/35.jpg)
Encrypting a Large Message
ECB Problem #2
●Lack the basic protection against integrity attacks on the ciphertext at message level (i.e., multiple cipher blocks)
●Without additional integrity protection●cipher block substitution and rearrangement attacks
●fabrication of specific information
![Page 36: Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.](https://reader036.fdocuments.in/reader036/viewer/2022081421/5697bfb91a28abf838c9f899/html5/thumbnails/36.jpg)
Encrypting a Large Message
![Page 37: Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.](https://reader036.fdocuments.in/reader036/viewer/2022081421/5697bfb91a28abf838c9f899/html5/thumbnails/37.jpg)
CBC Decryption
![Page 38: Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.](https://reader036.fdocuments.in/reader036/viewer/2022081421/5697bfb91a28abf838c9f899/html5/thumbnails/38.jpg)
General K-Bit Cipher Feedback Mode
(CFB)
![Page 39: Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.](https://reader036.fdocuments.in/reader036/viewer/2022081421/5697bfb91a28abf838c9f899/html5/thumbnails/39.jpg)
Protecting Message Integrity
●Only send last block of CBC (CBC residue) along with the plaintext
●Any modification in plaintext result in a CBC residue computed by the receiver to be different from the CBC residue from the sender
●Ensures integrity
![Page 40: Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.](https://reader036.fdocuments.in/reader036/viewer/2022081421/5697bfb91a28abf838c9f899/html5/thumbnails/40.jpg)
Protecting Message Integrity●Simply sending all CBC blocks (for confidentiality) replicating last CBC block (for integrity) does not work
●Should use two separate secret keys: one for encryption and the other for generating residue (two encryption passes)
●Or, CBC (message|hash of message)
![Page 41: Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.](https://reader036.fdocuments.in/reader036/viewer/2022081421/5697bfb91a28abf838c9f899/html5/thumbnails/41.jpg)
CBC Quiz
CBC is more secure than ECB
We can have both confidentiality and integrity protection with CBC by using just one key
Put a check next to the statements that are true:
![Page 42: Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.](https://reader036.fdocuments.in/reader036/viewer/2022081421/5697bfb91a28abf838c9f899/html5/thumbnails/42.jpg)
Symmetric Encryption Lesson Summary
●Need both confusion and diffusion ●DES: input 64-bit, key 56-bit; encryption and
decryption same algorithms but reversed per-round key sequence
●AES: input 128-bit, key 128/192/256 bits; decryption the reverse/inverse of encryption
●Use cipher-block-chaining to encrypt a large message●Last CBC block can be use as MIC; use different keys
for integrity and confidentiality