Chip cards Contact cards Dual interface cards Contactless

  • Slides: 30
Download presentation

: ﺍﻧﻮﺍﻉ کﺎﺭﺕ ﻫﻮﺷﻤﻨﺪ Chip cards Contact cards Dual interface cards Contactless cards

: ﺍﻧﻮﺍﻉ کﺎﺭﺕ ﻫﻮﺷﻤﻨﺪ Chip cards Contact cards Dual interface cards Contactless cards

DES encryption

DES encryption

Data Encryption Standard • DES developed in 1970’s • Based on IBM Lucifer cipher

Data Encryption Standard • DES developed in 1970’s • Based on IBM Lucifer cipher • U. S. government standard • DES development was controversial • NSA secretly involved • Design process was secret • Key length reduced from 128 to 56 bits • Subtle changes to Lucifer algorithm

DES Numerology • DES is a Feistel cipher with… • 64 bit block length

DES Numerology • DES is a Feistel cipher with… • 64 bit block length • 56 bit key length • 16 rounds • 48 bits of key used each round (subkey) • Each round is simple (for a block cipher) • Security depends heavily on “S-boxes” • Each S-boxes maps 6 bits to 4 bits

One Round of DES

One Round of DES

Advanced Encryption Standard • Replacement for DES • AES competition (late 90’s) • NSA

Advanced Encryption Standard • Replacement for DES • AES competition (late 90’s) • NSA openly involved • Transparent process • Many strong algorithms proposed • Rijndael Algorithm ultimately selected (pronounced like “Rain Doll” or “Rhine Doll”) • Iterated block cipher (like DES) • Not a Feistel cipher (unlike DES)

AES Overview • Block size: 128 bits (192 or 256) • Key length: 128,

AES Overview • Block size: 128 bits (192 or 256) • Key length: 128, 192 or 256 bits (independent of block size) • 10 to 14 rounds (depends on key length) • Each round uses 4 functions • Byte. Sub (nonlinear layer) • Shift. Row (linear mixing layer) • Mix. Column (nonlinear layer) • Add. Round. Key (key addition layer)

AES Byte. Sub q Treat 128 bit block as 4 x 6 byte array

AES Byte. Sub q Treat 128 bit block as 4 x 6 byte array • Byte. Sub is AES’s “S-box” • Can be viewed as nonlinear (but invertible) composition of two math operations

AES “S-box” Last 4 bits of input First 4 bits of input

AES “S-box” Last 4 bits of input First 4 bits of input

AES Shift. Row • Cyclic shift rows

AES Shift. Row • Cyclic shift rows

AES Mix. Column q Nonlinear, invertible operation applied to each column • Implemented as

AES Mix. Column q Nonlinear, invertible operation applied to each column • Implemented as a (big) lookup table

AES Add. Round. Key q XOR subkey with block Block Subkey • Round. Key

AES Add. Round. Key q XOR subkey with block Block Subkey • Round. Key (subkey) determined by key schedule algorithm

: ﻣﻨﺎﺑﻊ Information Security - Principles adnd Practice - 2 nd Edition 2011 Introduction-to-Computer-Security

: ﻣﻨﺎﺑﻊ Information Security - Principles adnd Practice - 2 nd Edition 2011 Introduction-to-Computer-Security www. wikipedia. org/wiki/Smart_card www. wikipedia. org/wiki/DES گﺮﺩآﻮﺭﻧﺪﻩ)ﻋﻠی - کﺎﺭﺑﺮﺩﻫﺎی آﻦ ﻭﺍﻣﻨیﺖ ﺩﺭآﻨﻬﺎ , ﻣﻘﺎﻟﻪ ﺑﺮﺭﺳی کﺎﺭﺗﻬﺎی ﻫﻮﺷﻤﻨﺪ ( ﺗﻮﺳﻠی ü ü ü

Questio n

Questio n