lecture 3
play

Lecture 3 Encryption I Suggested Readings: Chs 3 & 4 in KPS - PowerPoint PPT Presentation

Lecture 3 Encryption I Suggested Readings: Chs 3 & 4 in KPS (recommended) Ch 3 in Stinson (optional) [lecture slides are adapted from previous slides by Prof. Gene Tsudik] 1 Crypto Ba Cr Basi sics 2 Cryptosystems Classified


  1. Lecture 3 Encryption I Suggested Readings: • Chs 3 & 4 in KPS (recommended) • Ch 3 in Stinson (optional) [lecture slides are adapted from previous slides by Prof. Gene Tsudik] 1

  2. Crypto Ba Cr Basi sics 2

  3. Cryptosystems Classified along three dimensions: • Type of operations used for transforming plaintext into ciphertext – Binary arithmetic: shifts, XORs, ANDs, etc. • Typical for conventional/symmetric encryption – Integer arithmetic • Typical for public key/asymmetric encryption • Number of keys used – Symmetric or conventional (single key used) – Asymmetric or public-key (2 keys: 1 to encrypt, 1 to decrypt) • How plaintext is processed: – One bit at a time – “stream cipher” – A block of bits – “block cipher” 3

  4. Conventional/Symmetric Encryption Principles 4

  5. Conventional (Symmetri ric) Cryptography K AB K AB decryption encryption ciphertext plaintext plaintext algorithm algorithm m m = K ( ) K (m) K (m) AB AB AB • Alice and Bob share a key K AB which they somehow agree upon (how?) • key distribution / key management problem • ciphertext is roughly as long as plaintext • examples: Substitution, Vernam OTP, DES, AES 5

  6. Uses of Conventi tional/Symmetr tric Cryp yptography y • Message transmission (confidentiality): • Communication over insecure channels • Secure storage: crypt on Unix • Strong authentication: proving knowledge of a secret without revealing it: 6

  7. Challenge-Res espon onse e Authen entication on Exa xample K AB K AB r a challenge K AB (r a ) challenge reply r b challenge K AB (r b ) challenge reply 7

  8. Uses of Conventi tional/Symmetr tric Cryp yptography y • Message transmission (confidentiality): • Communication over insecure channels • Secure storage: crypt on Unix • Strong authentication: proving knowledge of a secret without revealing it: • Eve can obtain chosen <plaintext, ciphertext> pair • Challenge should be chosen from a large pool • Integrity checking: fixed-length checksum for message via secret key cryptography • Send MAC along with the message MAC=H(K, m) 8

  9. Conventional al/S /Sym ymmetr tric c Cryp yptography Advantages • high data throughput • relatively short key size • primitives to construct various cryptographic mechanisms • Disadvantages • key must remain secret at both ends • key must be distributed securely and efficiently • relatively short key lifetime • 9

  10. Public K Key ey ( (As Asymmetric) Cr Cryptogr graphy • Asymmetric cryptography • Invented in 1974-1978 (Diffie-Hellman, Rivest-Shamir-Adleman) • Both win Turing awards (2002, 2015)! • Two keys: private (SK), public (PK) • Encryption: with public key; • Decryption: with private key • Digital Signatures: Signing by private key; Verification by public key. i.e., “encrypt” message digest/hash -- h ( m ) -- with private key • Authorship (authentication) • Integrity: Similar to MAC • Non-repudiation: can’t do with secret/symmetric key cryptography • Much slower (~1000x) than conventional cryptography • Often used together with conventional cryptography, e.g., to encrypt session keys 10

  11. Ge Genes esis of Public Key C y Cryp yptograp aphy: Diffi fie- Hellman Paper 11

  12. Pub ublic K c Key y Cryp yptography Bob’s public key Bob’s private key PK B SK B encryption decryption plaintext ciphertext plaintext algorithm algorithm message, m message PK (m) B m = SK ( PK (m) ) B B 12

  13. Uses of Public c Key y Cryp yptography y • Data transmission (confidentiality): • Alice encrypts m a using PK B , Bob decrypts it to obtain m a using SK b . • Secure Storage: encrypt with own public key, later decrypt with own private key • Authentication: • No need to store secret s , only need public keys. • Secret/symmetric key cryptography: need to share secret key for every person one communicates with • Digital Signatures (authentication, integrity, non- repudiation) 13

  14. Public K c Key C Cryptography Advantages • only the private key must be kept secret • relatively long life time of the key • more security services • relatively efficient digital signatures mechanisms • Disadvantages • low data throughput • much larger key sizes • distribution/revocation of public keys • security based on conjectured hardness of certain • computational problems 14

  15. Compar arison S Summa mmary Public key • encryption, signatures (esp., non-repudiation), and key • management Conventional/symmetric • encryption and some data integrity applications • Key sizes • Keys in public key crypto must be larger ( e.g., 2048 bits for • RSA ) than those in conventional crypto ( e.g., 112 bits for 3-DES or 256 bits for AES ) • most attacks on “good” conventional cryptosystems are exhaustive key search (brute force) • public key cryptosystems are subject to “short-cut” attacks (e.g., factoring large numbers in RSA) 15

  16. “Modern” Block Ciphers Data En Encryption Standard ( (DES)

  17. Generic E Example o of Block Encryption 20

  18. Feistel Ciphe her Structur ure • Virtually all conventional block encryption algorithms, including DES, have a structure first described by Horst Feistel of IBM in 1973 • Specific realization of a Feistel Network depends on the choice of the following parameters and features: 18

  19. Feistel Ciphe her Structur ure • Block Size: larger block sizes mean greater security • Key Size: larger key size means greater security • Number of Rounds: multiple rounds offer increasing security • Subkey Generation Algorithm: greater complexity leads to greater difficulty of cryptanalysis 19

  20. Classic F Feistel N Network rk “Round Keys” are generated from original key via subkey generation algorithm 20

  21. Block Ciphers • Originated with early 1970's IBM effort to develop banking security systems • First result was Lucifer, most common variant has 128-bit key and block size • Was not secure in any of its variants • Called a Feistel or product cipher • F()-function is a simple transformation, does not have to be reversible • Each step is called a round; the more rounds, the greater the security (to a point) • Most famous example of this design is DES 21

  22. Conventional En Encryption Standard Data Encryption Standard (DES) • Most widely used encryption method in 1970s/80s/90s • AES took over in early 2000s • Block cipher (in native ECB mode) • Plaintext processed in 64-bit blocks • Key is 56 bits 22

  23. Data En Encryption Standard ( (DES) • 64 bit input block • 64 bit output block • 16 rounds • 64 (effective 56) bit key • Key schedule computed at startup • Aimed at bulk data • > 16 rounds does not help • Other S-boxes usually hurt … 25

  24. Basic S Stru ructure o of D DES 26

  25. Encryption v En vs Decryption in D DES 25

  26. DES Syst ystem Encryption Process Key Schedule 64 Bit Plaintext 64 Bit Key Initial Permutation Permutation Choice 1 Building 32 Bit L 0 32 Bit R 0 56 Bit Key Blocks + F(R 0 ,K 1 ) 28 Bit C 0 28 Bit D 0 Left Shift Left Shift 32 Bit L 1 32 Bit R 1 K 1 (48 bits) C 1 D 1 32 Bit L 15 32 Bit R 15 Permuted Choice 2 + F(R 15 ,K 16 ) C 16 D 16 K 16 (48 bits) 32 Bit L 16 32 Bit R 16 Permuted Choice 2 Final Permutation 64 Bit Ciphertext 27

  27. Function n F L i-1 R i-1 32 bits 32 bits 56 bits Key Permuted Choice Expansion (E) 48 bits Permutation 48 bits S-Box Substitution choses 32 bits P-box Permutation L i R i 32 bits 32 bits 28

  28. DES S Substi titu tution B Boxes Operation 28 29

  29. Operation Tables o of D DES IP -1 , E (I (IP, IP E and P) P) 29 30

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend