1. Trang chủ
  2. » Công Nghệ Thông Tin

Bài giảng Mật mã học: Other block ciphers - Huỳnh Trọng Thưa

19 8 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 19
Dung lượng 0,98 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Bài giảng Mật mã học: Other block ciphers cung cấp cho người học các kiến thức: What will we learn, electronic codebook mode, CBC critics, cipher feedback mode, counter mode, exhaustive key search revisited,... Mời các bạn cùng tham khảo nội dung chi tiết.

Trang 1

Other Block Ciphers

Huỳnh Trọng Thưa htthua@ptithcm.edu.vn

Trang 2

What will we learn?

• The most important modes of operation for block ciphers in practice

• Security pitfalls when using modes of

operations

• The principles of key whitening

• Why double encryption is not a good idea,

and the meet-in-the-middle attack

• Triple encryption

Trang 3

Encryption with Block Ciphers:

Modes of Operation

• Electronic Code Book mode (ECB),

• Cipher Block Chaining mode (CBC),

• Cipher Feedback mode (CFB),

• Output Feedback mode (OFB),

• Counter mode (CTR).

Trang 4

Electronic Codebook Mode (ECB)

Trang 5

ECB critics

• Advantages

– Block synchronization is not necessary

• Problem

– identical plaintext blocks result in identical ciphertext

blocks, as long as the key does not change

– Replay attack

• Usage:

– not recommended to encrypt more than one block of data – encryption in database

Trang 6

Ex of Substitution attack against electronic bank transfer

• Oscar observes the ciphertexts going through the communication network

• After a while he can recognize the five blocks of his own transfer

He now stores blocks 1, 3 and 4 of these transfers

• The same key is used for several other transfers between bank A and B

• By comparing blocks 1 and 3 of all subsequent messages with the ones he has stored, Oscar recognizes all transfers that are made from some account at bank A to some account at bank B

• He now simply replaces block 4 — which contains the receiving account number — with the block 4 that he stored before

Trang 7

Encryption of bitmaps in ECB mode

Trang 8

Cipher Block Chaining Mode (CBC)

Trang 9

CBC critics

Decryption of all subsequent blocks yi, i ≥ 2

Trang 10

CBC critics (cont.)

• Good

– Randomized encryption: repeated text gets

mapped to different encrypted data.

– A ciphertext block depends on all preceding

plaintext blocks blocks

• reorder affects decryption

• Bad

– Errors in one block propagate to two blocks

– Sequential encryption, cannot use parallel

hardware

Trang 11

Encryption of bitmaps in CBC mode

Trang 12

Output Feedback Mode (OFB)

Key stream is not generated bitwise but instead in a blockwise fashion.

Trang 13

Cipher Feedback Mode (CFB)

Trang 14

Counter Mode (CTR)

Trang 15

Exhaustive Key Search Revisited

• A brute-force attack can produce false positive results.

• Ex: A cipher with a block width of 64 bit and a key size of 80 bit we find on average 280/264 =

216 keys that perform the mapping ek(x1)= y1.

Trang 16

Increasing the Security of Block Ciphers

• Multiple encryption

– Double Encryption

– Triple Encryption

– Problem: Meet-in-the-Middle Attack

• Key whitening

Trang 17

Double Encryption and

Meet-in-the-Middle Attack

• Key length: κ bits

• Brute-force attack: require 2κ ·2κ =22κ

encryptions (or decryptions)

• Meet-in-the-middle attack:

– The total complexity is 2κ +2κ = 2·2κ = 2κ+1.

Trang 18

Triple Encryption and

Meet-in-the-Middle Attack

• Key length: κ bits

• Brute-force attack: require 2κ ·2κ ·2κ =23κ encryptions (or

decryptions)

• Meet-in-the-middle attack:

– The total complexity is 22κ

– 3DES;:56 bits key => attacker performs 2112 key tests (not 2168)

Trang 19

Key Whitening

Ngày đăng: 21/05/2021, 12:37

TỪ KHÓA LIÊN QUAN

🧩 Sản phẩm bạn có thể quan tâm