Fall 2010 1
Block Ciphers
CS 334: Computer Security
Block Ciphers Fall 2010 CS 334: Computer Security 1 Recall: - - PowerPoint PPT Presentation
Block Ciphers Fall 2010 CS 334: Computer Security 1 Recall: Private-Key Encryption Algorithms Also called single-key or symmetric key algorithms Both parties share the key needed to encrypt and decrypt messages, hence both parties are
Fall 2010 1
CS 334: Computer Security
Fall 2010 2
CS 334: Computer Security
Fall 2010 3
CS 334: Computer Security
Fall 2010 4
CS 334: Computer Security
Fall 2010 5
CS 334: Computer Security
Fall 2010 6
CS 334: Computer Security
Fall 2010 7
CS 334: Computer Security
Fall 2010 8
– For a large block size this is not practical for implementation and performance reasons
CS 334: Computer Security
Fall 2010 9
to any of 2n n-bit binary strings, next to any of 2n-1
CS 334: Computer Security
Fall 2010 10
attacks) this amounts to a key of length 64(264) = 270 = 267 bytes ~ 1.47 × 1020 bytes = 147 TB
CS 334: Computer Security
Fall 2010 11
CS 334: Computer Security
Fall 2010 12 CS 334: Computer Security
Fall 2010 13
– increasing size improves security, but slows cipher – 64 bits reasonable tradeoff. Some use 128 bits
– increasing size improves security, makes exhaustive key searching harder, but may slow cipher – 64 bit considered inadequate. 128 bit is common size (for now)
– increasing number improves security, but slows cipher
CS 334: Computer Security
Fall 2010 14
– greater complexity can make analysis harder, but slows cipher
– greater complexity can make analysis harder, but slows cipher
– are more recent concerns for practical use and testing – Making algorithms easy to analyze helps determine cipher effectiveness (DES functionality is not easily analyzed)
CS 334: Computer Security
Fall 2010 15
CS 334: Computer Security
Fall 2010 16
CS 334: Computer Security
Fall 2010 17
CS 334: Computer Security
Fall 2010 18
CS 334: Computer Security
Fall 2010 19
CS 334: Computer Security
Fall 2010 20
CS 334: Computer Security
Fall 2010 21
CS 334: Computer Security
Fall 2010 22 CS 334: Computer Security
Fall 2010 23
There are four more
CS 334: Computer Security
Fall 2010 24
CS 334: Computer Security
Fall 2010 25
CS 334: Computer Security
Fall 2010 26
depending on the key rotation schedule K
CS 334: Computer Security
Fall 2010 27 CS 334: Computer Security
Fall 2010 28 CS 334: Computer Security
Fall 2010 29
CS 334: Computer Security
Fall 2010 30
CS 334: Computer Security
Fall 2010 31
CS 334: Computer Security
Fall 2010 32
CS 334: Computer Security
Fall 2010 33
CS 334: Computer Security
Fall 2010 34
CS 334: Computer Security
Fall 2010 35
CS 334: Computer Security
Fall 2010 36
ciphertext pair
CS 334: Computer Security
Fall 2010 37
CS 334: Computer Security
Fall 2010 38
CS 334: Computer Security
Fall 2010 39
CS 334: Computer Security
Fall 2010 CS 334: Computer Security 40
Fall 2010 41
CS 334: Computer Security
Fall 2010 42
CS 334: Computer Security
Fall 2010 43
CS 334: Computer Security
Fall 2010 44
CS 334: Computer Security
Fall 2010 45
CS 334: Computer Security
Fall 2010 46
CS 334: Computer Security
Fall 2010 47
CS 334: Computer Security
Fall 2010 48
CS 334: Computer Security