T-79.159 Cryptography and Data Security
Lecture 3: Modes of Operation
Helger Lipmaa
Helsinki University of Technology
helger@tcs.hut.fi
T-79.159 Cryptography and Data Security, 04.02.2004 Lecture 3: Modes of Operation, Helger Lipmaa 1
Lecture 3: Modes of Operation Helger Lipmaa Helsinki University of - - PowerPoint PPT Presentation
T-79.159 Cryptography and Data Security Lecture 3: Modes of Operation Helger Lipmaa Helsinki University of Technology helger@tcs.hut.fi T-79.159 Cryptography and Data Security, 04.02.2004 Lecture 3: Modes of Operation, Helger Lipmaa 1
T-79.159 Cryptography and Data Security, 04.02.2004 Lecture 3: Modes of Operation, Helger Lipmaa 1
Plaintext Ciphertext Adversary Sender Receiver Inverse cipher, Decryption Public channel Private channel Cipher, Encryption
K
K
C = EK(M) M = E−1
K (EK(M))
M Preshared key T-79.159 Cryptography and Data Security, 04.02.2004 Lecture 3: Modes of Operation, Helger Lipmaa 2
T-79.159 Cryptography and Data Security, 04.02.2004 Lecture 3: Modes of Operation, Helger Lipmaa 3
T-79.159 Cryptography and Data Security, 04.02.2004 Lecture 3: Modes of Operation, Helger Lipmaa 4
T-79.159 Cryptography and Data Security, 04.02.2004 Lecture 3: Modes of Operation, Helger Lipmaa 5
T-79.159 Cryptography and Data Security, 04.02.2004 Lecture 3: Modes of Operation, Helger Lipmaa 6
T-79.159 Cryptography and Data Security, 04.02.2004 Lecture 3: Modes of Operation, Helger Lipmaa 7
T-79.159 Cryptography and Data Security, 04.02.2004 Lecture 3: Modes of Operation, Helger Lipmaa 8
T-79.159 Cryptography and Data Security, 04.02.2004 Lecture 3: Modes of Operation, Helger Lipmaa 9
T-79.159 Cryptography and Data Security, 04.02.2004 Lecture 3: Modes of Operation, Helger Lipmaa 10
Seed Keystream Plaintext Ciphertext
T-79.159 Cryptography and Data Security, 04.02.2004 Lecture 3: Modes of Operation, Helger Lipmaa 11
T-79.159 Cryptography and Data Security, 04.02.2004 Lecture 3: Modes of Operation, Helger Lipmaa 12
Keystream Plaintext Ciphertext Seed
T-79.159 Cryptography and Data Security, 04.02.2004 Lecture 3: Modes of Operation, Helger Lipmaa 13
T-79.159 Cryptography and Data Security, 04.02.2004 Lecture 3: Modes of Operation, Helger Lipmaa 14
T-79.159 Cryptography and Data Security, 04.02.2004 Lecture 3: Modes of Operation, Helger Lipmaa 15
T-79.159 Cryptography and Data Security, 04.02.2004 Lecture 3: Modes of Operation, Helger Lipmaa 16
T-79.159 Cryptography and Data Security, 04.02.2004 Lecture 3: Modes of Operation, Helger Lipmaa 17
T-79.159 Cryptography and Data Security, 04.02.2004 Lecture 3: Modes of Operation, Helger Lipmaa 18
T-79.159 Cryptography and Data Security, 04.02.2004 Lecture 3: Modes of Operation, Helger Lipmaa 19
T-79.159 Cryptography and Data Security, 04.02.2004 Lecture 3: Modes of Operation, Helger Lipmaa 20
T-79.159 Cryptography and Data Security, 04.02.2004 Lecture 3: Modes of Operation, Helger Lipmaa 21
T-79.159 Cryptography and Data Security, 04.02.2004 Lecture 3: Modes of Operation, Helger Lipmaa 22
T-79.159 Cryptography and Data Security, 04.02.2004 Lecture 3: Modes of Operation, Helger Lipmaa 23
T-79.159 Cryptography and Data Security, 04.02.2004 Lecture 3: Modes of Operation, Helger Lipmaa 24
T-79.159 Cryptography and Data Security, 04.02.2004 Lecture 3: Modes of Operation, Helger Lipmaa 25
Seed
(m − 1)L ⊕ R
mL ⊕ R ⊕ huge · L τ (m − 1)L ⊕ R L ⊕ R 2L ⊕ R 2L ⊕ R L ⊕ R L mL ⊕ R
T-79.159 Cryptography and Data Security, 04.02.2004 Lecture 3: Modes of Operation, Helger Lipmaa 26
Plaintext
x EK(x) E′
K′(EK(x))
Key K′ Key K
T-79.159 Cryptography and Data Security, 04.02.2004 Lecture 3: Modes of Operation, Helger Lipmaa 27
T-79.159 Cryptography and Data Security, 04.02.2004 Lecture 3: Modes of Operation, Helger Lipmaa 28
x Plaintext Key K1 EK1(x) Key K2
EK2(EK1(x))
where yi = EK2(EK1(xi))
⋆ Let A[K] := (K, EK(x1)), and B[K] := (K, DK(y1))
1, z),
(K′
2, z). For every such row we know that y1 = EK′
2(EK′ 1(x1))
⋆ To eliminate wrong keys, test for every such (K′
1, K′ 2) that yi =
EK′
2(EK′ 1(xi)) for i = 2 . . .
T-79.159 Cryptography and Data Security, 04.02.2004 Lecture 3: Modes of Operation, Helger Lipmaa 29
2(EK′ 1(xi))] = 2−64
T-79.159 Cryptography and Data Security, 04.02.2004 Lecture 3: Modes of Operation, Helger Lipmaa 30
x Plaintext Key K1 Key K2
Key K3
EK3(DK2(EK1(x))) EK1(x) DK2(EK1(x))
T-79.159 Cryptography and Data Security, 04.02.2004 Lecture 3: Modes of Operation, Helger Lipmaa 31
T-79.159 Cryptography and Data Security, 04.02.2004 Lecture 3: Modes of Operation, Helger Lipmaa 32
T-79.159 Cryptography and Data Security, 04.02.2004 Lecture 3: Modes of Operation, Helger Lipmaa 33
T-79.159 Cryptography and Data Security, 04.02.2004 Lecture 3: Modes of Operation, Helger Lipmaa 34