Chap 2 2 Conventional Encryption Message Confidentiality Symmetric
- Slides: 58
Chap 2 -2 Conventional Encryption Message Confidentiality (Symmetric, Block) 1
DES (Data Encryption Standard) 요구사항 1. It must provide a high level of security. 2. It must be completely specified and easy to understand. 3. The security provided by the algorithm must not be based on the secrecy of the algorithm. 4. It must be all users and suppliers. 2
DES (Data Encryption Standard) 5. It must be adaptable for use in diverse applications. 6. It must be economical to implement in electronic devices and be efficient to use. 7. It must be amenable to validation. 8. It must be exportable. 3
S-DES 의 구성 및 흐름도 IP: initial permutation SW: Switch 4
Part 1. Key 값 생성 Key generation for simplified DES 5
Part 2. 평문 의 암호화 Simplified DES Scheme Encryption Detail 11
2. E/P (expansion/permutation) 입력된 4비트 값을 8비트로 확장 시키는 연산을 수행한다. 값 0 0 1 0 Index 4 1 2 3 값 1 0 0 0 Index 2 3 4 1 결과값 00101000 13
Feistel Cipher Structure Virtually all conventional block encryption algorithms, including DES have a structure first described by Horst Feistel of IBM in 1973 The realization of a Fesitel Network depends on the choice of the following parameters and design features (see next slide): 37
Feistel Cipher Structure Block size: larger block sizes mean greater security Key Size: larger key size means greater security Number of rounds: multiple rounds offer increasing security Subkey generation algorithm: greater complexity will lead to greater difficulty of cryptanalysis. Fast software encryption/decryption: the speed of execution of the algorithm becomes a concern 38
Classical Feistel Network K 1 Ki 39
40
41
Conventional Encryption Algorithms Data Encryption Standard (DES) w The most widely used encryption scheme w The algorithm is reffered to the Data Encryption Algorithm (DEA) w DES is a block cipher w The plaintext is processed in 64 -bit blocks w The key is 56 -bits in length 42
General Depiction of DES Encryption Algorithm 43
44
DES The overall processing at each iteration: w Li = Ri-1 w Ri = Li-1 F(Ri-1, Ki) Concerns about: w The algorithm and the key length (56 -bits) 45
Time to break a code (106 decryptions/µs) 46
Triple DEA Use three keys and three executions of the DES algorithm (encrypt-decrypt-encrypt) C = EK 3[DK 2[EK 1[P]]] w w C = ciphertext P = Plaintext EK[X] = encryption of X using key K DK[Y] = decryption of Y using key K Effective key length of 168 bits 47
Triple DEA 48
Other Symmetric Block Ciphers International Data Encryption Algorithm (IDEA) w 128 -bit key w Used in PGP(Pretty Good in Privacy) Blowfish w Easy to implement w High execution speed w Run in less than 5 K of memory 49
Other Symmetric Block Ciphers RC 5 w Suitable for hardware and software w Fast, simple w Adaptable to processors of different word lengths w Variable number of rounds w Variable-length key w Low memory requirement w High security w Data-dependent rotations Cast-128 w Key size from 40 to 128 bits w The round function differs from round to round 50
Cipher Block Modes of Operation Cipher Block Chaining Mode (CBC) w The input to the encryption algorithm is the XOR of the current plaintext block and the preceding ciphertext block. w Repeating pattern of 64 -bits are not exposed w For first block, need “initialization vector”, IV w IV must be known to sender and receiver (often all 0’s) 51
52
Cipher Feedback (CFB) Mode Allows use of DES as a stream cipher (appropriate when data inherently arrives in bits/bytes) Start with IV Encrypt XOR (MSB) j bits of output with j bit plaintext w Result is ciphertext Shift IV by j bits, insert ciphertext J-bit CFM Mode (Encryption) 53
Location of Encryption Device Link encryption: w A lot of encryption devices w High level of security w Decrypt each packet at every switch End-to-end encryption w The source encrypt and the receiver decrypts w Payload encrypted w Header in the clear High Security: Both link and end-to-end encryption are needed (see Figure 2. 9) 54
55
Key Distribution 1. 2. 3. 4. A key could be selected by A and physically delivered to B. A third party could select the key and physically deliver it to A and B. If A and B have previously used a key, one party could transmit the new key to the other, encrypted using the old key. If A and B each have an encrypted connection to a third party C, C could deliver a key on the encrypted links to A and B. 56
Key Distribution (See Figure 2. 10) Session key: w Data encrypted with a one-time session key. At the conclusion of the session the key is destroyed Permanent key: w Used between entities for the purpose of distributing session keys 57
58
- Conventional encryption and message confidentiality
- Confidentiality with symmetric encryption
- Chap chap slide
- Key distribution and management
- Searchable symmetric encryption
- Asymmetric key cryptography
- Symmetric vs asymmetric encryption performance
- Symmetric encryption java
- Searchable symmetric encryption
- What is skew symmetric matrix
- Conventional encryption model
- Conventional encryption
- What is conventional encryption
- Uams sap
- Confidentiality disclaimer presentation
- Confidentiality
- Confidentiality statement
- Confidentiality in ethics
- Concepts of medical ethics
- Ferpa quiz answers
- Julia lane coleridge
- Motion to determine confidentiality of court records
- Dr rubina yasmin
- Texas confidentiality laws for minors
- Confidentiality integrity availability
- Fidelity ethical principle
- Netiquette of confidentiality
- Symmetric key
- Potential tension between maintaining confidentiality
- Dr smith
- Confidentiality
- Confidentiality and privacy controls
- Texas address confidentiality program
- Confidentiality chapter 5
- Chap tree
- Which do you prefer chapter 4
- The origin of species chap 18
- Cell chap 14
- Tree switch
- Chap a to z
- Family values chapter 3
- A thousand splendid suns how many chapters
- Breath the same air ch 5
- Summerize
- Hình cắt kết hợp
- Chap tools
- Rivalry 1 chapter 6
- C chap
- Mad dog ch25
- Responsible relationships are based on
- Assumptions of clrm gujarati
- Payback ch 9
- Weather station model examples
- Define the relationship chapter 12
- Fitness chap 3
- Hf chap
- I was in that state when a chap easily turns nasty analysis
- Chap counter
- The origin of species manga chapter 24