Lecture 3
Encryption I
Suggested Readings:
- Chs 3 & 4 in KPS (recommended)
- Ch 3 in Stinson (optional)
1
[lecture slides are adapted from previous slides by Prof. Gene Tsudik]
Lecture 3 Encryption I Suggested Readings: Chs 3 & 4 in KPS - - PowerPoint PPT Presentation
Lecture 3 Encryption I Suggested Readings: Chs 3 & 4 in KPS (recommended) Ch 3 in Stinson (optional) [lecture slides are adapted from previous slides by Prof. Gene Tsudik] 1 Crypto Ba Cr Basi sics 2 Cryptosystems Classified
1
[lecture slides are adapted from previous slides by Prof. Gene Tsudik]
2
Cr Crypto Ba Basi sics
3
Classified along three dimensions:
ciphertext
– Binary arithmetic: shifts, XORs, ANDs, etc.
– Integer arithmetic
– Symmetric or conventional (single key used) – Asymmetric or public-key (2 keys: 1 to encrypt, 1 to decrypt)
– One bit at a time – “stream cipher” – A block of bits – “block cipher”
4
Conventional/Symmetric Encryption Principles
upon (how?)
5
plaintext ciphertext
K AB
encryption algorithm decryption algorithm
K AB
plaintext m K (m)
AB
K (m)
AB
m = K (
)
AB
without revealing it:
6
7
K AB
challenge
K AB
challenge reply
challenge challenge reply
without revealing it:
secret key cryptography
8
9
“encrypt” message digest/hash -- h(m) -- with private key
10
Public K Key ey ( (As Asymmetric) Cr Cryptogr graphy
12
plaintext message, m ciphertext encryption algorithm decryption algorithm
Bob’s public key
plaintext message PK (m)
B
PK
B
Bob’s private key
SK
B
m = SK (PK (m))
B B
SKb.
decrypt with own private key
for every person one communicates with
repudiation)
13
14
computational problems
Public K c Key C Cryptography
15
management
RSA) than those in conventional crypto (e.g., 112 bits for 3-DES
exhaustive key search (brute force)
factoring large numbers in RSA)
Compar arison S Summa mmary
20
including DES, have a structure first described by Horst Feistel of IBM in 1973
choice of the following parameters and features:
18
security
leads to greater difficulty of cryptanalysis
19
20
“Round Keys” are generated from
subkey generation algorithm
21
security systems
and block size
reversible
security (to a point)
22
25
26
64 Bit Plaintext Initial Permutation 32 Bit L0 32 Bit R0 F(R0,K1) + 32 Bit L1 32 Bit R1 32 Bit L15 32 Bit R15 F(R15,K16) + 32 Bit L16 32 Bit R16 Final Permutation 64 Bit Ciphertext
Encryption Process
64 Bit Key Permutation Choice 1 56 Bit Key 28 Bit C0 28 Bit D0 Left Shift Left Shift C1 D1 Building Blocks Permuted Choice 2 K1(48 bits) C16 D16 Permuted Choice 2
Key Schedule
K16(48 bits)
27
Li-1 32 bits Ri-1 32 bits
S-Box Substitution choses 32 bits
P-box Permutation Li 32 bits Ri 32 bits 56 bits Key Permuted Choice 48 bits
Expansion (E) Permutation 48 bits
28
28
29
29
30