1. Trang chủ
  2. » Công Nghệ Thông Tin

Cryptography and Network Security Chapter 6 pptx

32 600 0
Tài liệu được quét OCR, nội dung có thể không chính xác
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề Contemporary Symmetric Ciphers
Tác giả William Stallings
Người hướng dẫn Lawrie Brown
Trường học Unknown University
Chuyên ngành Cryptography and Network Security
Thể loại Lecture slides
Năm xuất bản Fourth Edition
Thành phố Unknown City
Định dạng
Số trang 32
Dung lượng 707,5 KB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Electronic Codebook Book ECB message is broken into independent blocks which are encrypted  each block is a value which is substituted, like a codebook, hence name  each block is enco

Trang 1

Cryptography and Network Security

Chapter 6

Fourth Edition

by William StallingsLecture slides by Lawrie Brown

Trang 2

Chapter 6 – Contemporary

Symmetric Ciphers

"I am fairly familiar with all the forms of

secret writings, and am myself the author

of a trifling monograph upon the subject, in which I analyze one hundred and sixty

separate ciphers," said Holmes.

Sir Arthur Conan Doyle

Trang 3

Multiple Encryption & DES

 clear a replacement for DES was needed

 theoretical attacks that can break it

 demonstrated exhaustive key search attacks

 AES is a new cipher alternative

 prior to this alternative was to use multiple encryption with DES implementations

 Triple-DES is the chosen form

Trang 4

 could use 2 DES encrypts on each block

 C = E K2 (E K1 (P))

 issue of reduction to single stage

 and have “meet-in-the-middle” attack

 works whenever use a cipher twice

 since X = E K1 (P) = D K2 (C)

 attack by encrypting P with all keys and store

 then decrypt C with keys and match X value

Trang 5

Triple-DES with Two-Keys

 hence must use 3 encryptions

 would seem to need 3 distinct keys

 but can use 2 keys with E-D-E sequence

 C = E K1 (D K2 (E K1 (P)))

 nb encrypt & decrypt equivalent in security

 if K1=K2 then can work with single DES

 standardized in ANSI X9.17 & ISO8732

 no current known practical attacks

Trang 6

Triple-DES with Three-Keys

 although are no practical attacks on key Triple-DES have some indications

two- can use Triple-DES with Three-Keys to avoid even these

 C = E K3 (D K2 (E K1 (P)))

 has been adopted by some Internet

applications, eg PGP, S/MIME

Trang 7

Modes of Operation

 block ciphers encrypt fixed size blocks

 eg DES encrypts 64-bit blocks with 56-bit key

 need some way to en/decrypt arbitrary

amounts of data in practise

ANSI X3.106-1983 Modes of Use (now

FIPS 81) defines 4 possible modes

 subsequently 5 defined for AES & DES

 have block and stream modes

Trang 8

Electronic Codebook Book (ECB)

 message is broken into independent

blocks which are encrypted

 each block is a value which is substituted, like a codebook, hence name

 each block is encoded independently of

the other blocks

C i = DES K1 (P i )

 uses: secure transmission of single values

Trang 9

Electronic Codebook Book (ECB)

Trang 10

Advantages and Limitations of

ECB

 message repetitions may show in ciphertext

 if aligned with message block

 particularly with data such graphics

 or with messages that change very little, which become a code-book analysis problem

 weakness is due to the encrypted message blocks being independent

 main use is sending a few blocks of data

Trang 11

Cipher Block Chaining (CBC)

 message is broken into blocks

 linked together in encryption operation

 each previous cipher blocks is chained

with current plaintext block, hence name

 use Initial Vector (IV) to start process

C i = DES K1 (P i XOR C i-1 )

C -1 = IV

 uses: bulk data encryption, authentication

Trang 12

Cipher Block Chaining (CBC)

Trang 13

Message Padding

 at end of message must handle a possible last short block

 which is not as large as blocksize of cipher

 pad either with known non-data value (eg nulls)

 or pad last block along with count of pad size

 this may require an extra entire block over

those in message

 there are other, more esoteric modes,

which avoid the need for an extra block

Trang 14

Advantages and Limitations of

 need Initialization Vector (IV)

 which must be known to sender & receiver

 if sent in clear, attacker can change bits of first block, and change IV to compensate

 hence IV must either be a fixed value (as in EFTPOS)

Trang 15

Cipher FeedBack (CFB)

 message is treated as a stream of bits

 added to the output of the block cipher

 result is feed back for next stage (hence name)

 standard allows any number of bit (1,8, 64 or 128 etc) to be feed back

 most efficient to use all bits in block (64 or 128)

 uses: stream data encryption, authentication

Trang 16

Cipher FeedBack (CFB)

Trang 17

Advantages and Limitations of

CFB

 appropriate when data arrives in bits/bytes

 most common stream mode

 limitation is need to stall while do block

encryption after every n-bits

 note that the block cipher is used in

encryption mode at both ends

 errors propogate for several blocks after the error

Trang 18

Output FeedBack (OFB)

 message is treated as a stream of bits

 output of cipher is added to message

 output is then feed back (hence name)

 feedback is independent of message

 can be computed in advance

C i = P i XOR O i

O i = DES K1 (O i-1 )

O -1 = IV

Trang 19

Output FeedBack (OFB)

Trang 20

Advantages and Limitations of

OFB

 bit errors do not propagate

 more vulnerable to message stream modification

 a variation of a Vernam cipher

 hence must never reuse the same sequence (key+IV)

 sender & receiver must remain in sync

 originally specified with m-bit feedback

 subsequent research has shown that only full

Trang 21

Counter (CTR)

 a “new” mode, though proposed early on

 similar to OFB but encrypts counter value rather than any feedback value

 must have a different key & counter value for every plaintext block (never reused)

C i = P i XOR O i

O i = DES K1 (i)

 uses: high-speed network encryptions

Trang 22

Counter (CTR)

Trang 23

Advantages and Limitations of

CTR

 efficiency

 can do parallel encryptions in h/w or s/w

 can preprocess in advance of need

 good for bursty high speed links

 random access to encrypted data blocks

 provable security (good as other modes)

 but must ensure never reuse key/counter values, otherwise could break (cf OFB)

Trang 24

Stream Ciphers

 process message bit by bit (as a stream)

 have a pseudo random keystream

 combined (XOR) with plaintext bit by bit

 randomness of stream key completely

destroys statistically properties in message

 C i = M i XOR StreamKey i

 but must never reuse stream key

 otherwise can recover messages (cf book

cipher)

Trang 25

Stream Cipher Structure

Trang 26

Stream Cipher Properties

 some design considerations are:

 long period with no repetitions

 statistically random

 depends on large enough key

 large linear complexity

 properly designed, can be as secure as a block cipher with same size key

 but usually simpler & faster

Trang 27

 a proprietary cipher owned by RSA DSI

 another Ron Rivest design, simple but effective

 variable key size, byte-oriented stream cipher

 widely used (web SSL/TLS, wireless WEP)

 key forms random permutation of all 8-bit values

 uses that permutation to scramble input info

processed a byte at a time

Trang 28

RC4 Key Schedule

Trang 29

RC4 Encryption

Trang 30

RC4 Overview

Trang 31

RC4 Security

 claimed secure against known attacks

 have some analyses, none practical

 result is very non-linear

 since RC4 is a stream cipher, must never reuse a key

 have a concern with WEP, but due to key handling rather than RC4 itself

Ngày đăng: 06/03/2014, 16:20

TỪ KHÓA LIÊN QUAN