Cryptography SYMMETRIC CRYPTOSYSTEMS Symmetric Cryptosystems 1272020 pag 2

  • Slides: 51
Download presentation
Cryptography

Cryptography

SYMMETRIC CRYPTOSYSTEMS Symmetric Cryptosystems 12/7/2020 | pag. 2

SYMMETRIC CRYPTOSYSTEMS Symmetric Cryptosystems 12/7/2020 | pag. 2

Block Ciphers: Classical examples • Affine Cipher • Affine Linear and Linear Cipher •

Block Ciphers: Classical examples • Affine Cipher • Affine Linear and Linear Cipher • Vigenère • Hill We needed some linear algebra! Symmetric Cryptosystems 12/7/2020 | pag. 3

Affine Cipher Symmetric Cryptosystems 12/7/2020 | pag. 4

Affine Cipher Symmetric Cryptosystems 12/7/2020 | pag. 4

Example: Cryptanalysis of the Affine Cipher Symmetric Cryptosystems 12/7/2020 | pag. 5

Example: Cryptanalysis of the Affine Cipher Symmetric Cryptosystems 12/7/2020 | pag. 5

Intermezzo: Matrices over Rings Cryptography 12/7/2020 | pag. 6

Intermezzo: Matrices over Rings Cryptography 12/7/2020 | pag. 6

Intermezzo: Invertible Matrices Cryptography 12/7/2020 | pag. 7

Intermezzo: Invertible Matrices Cryptography 12/7/2020 | pag. 7

Intermezzo: Invertible Matrices Cryptography 12/7/2020 | pag. 8

Intermezzo: Invertible Matrices Cryptography 12/7/2020 | pag. 8

Intermezzo: Invertible Matrices Cryptography 12/7/2020 | pag. 9

Intermezzo: Invertible Matrices Cryptography 12/7/2020 | pag. 9

Intermezzo: Invertible Matrices Cryptography 12/7/2020 | pag. 10

Intermezzo: Invertible Matrices Cryptography 12/7/2020 | pag. 10

Intermezzo: Affine Linear Functions Cryptography 12/7/2020 | pag. 11

Intermezzo: Affine Linear Functions Cryptography 12/7/2020 | pag. 11

Intermezzo: Affine Linear Functions Cryptography 12/7/2020 | pag. 12

Intermezzo: Affine Linear Functions Cryptography 12/7/2020 | pag. 12

Affine Linear Cipher Cryptography 12/7/2020 | pag. 13

Affine Linear Cipher Cryptography 12/7/2020 | pag. 13

Affine Linear Cipher Cryptography 12/7/2020 | pag. 14

Affine Linear Cipher Cryptography 12/7/2020 | pag. 14

Example: Affine Linear Cipher - Vigenère Cryptography 12/7/2020 | pag. 15

Example: Affine Linear Cipher - Vigenère Cryptography 12/7/2020 | pag. 15

Example: Linear Cipher - Hill Cryptography 12/7/2020 | pag. 16

Example: Linear Cipher - Hill Cryptography 12/7/2020 | pag. 16

Example: Linear Cipher – Permutation Cipher Cryptography 12/7/2020 | pag. 17

Example: Linear Cipher – Permutation Cipher Cryptography 12/7/2020 | pag. 17

Cryptanalysis of the Affine Linear Cipher Symmetric Cryptosystems 12/7/2020 | pag. 18

Cryptanalysis of the Affine Linear Cipher Symmetric Cryptosystems 12/7/2020 | pag. 18

Cryptanalysis of the Affine Linear Cipher Symmetric Cryptosystems 12/7/2020 | pag. 19

Cryptanalysis of the Affine Linear Cipher Symmetric Cryptosystems 12/7/2020 | pag. 19

Cryptanalysis of the Affine Linear Cipher Symmetric Cryptosystems 12/7/2020 | pag. 20

Cryptanalysis of the Affine Linear Cipher Symmetric Cryptosystems 12/7/2020 | pag. 20

Example: Cryptanalysis of the Affine Linear Cipher FUSS. Symmetric Cryptosystems 12/7/2020 | pag. 21

Example: Cryptanalysis of the Affine Linear Cipher FUSS. Symmetric Cryptosystems 12/7/2020 | pag. 21

Block Ciphers: Remark Secure block ciphers must not be (affine) linear or easy to

Block Ciphers: Remark Secure block ciphers must not be (affine) linear or easy to approximate by linear functions!!! Cryptography 12/7/2020 | pag. 22

Block Ciphers: Remark Implementation of a (non-linear!) substitution in a block cipher often occurs

Block Ciphers: Remark Implementation of a (non-linear!) substitution in a block cipher often occurs through a look-up table, called S-box. Cryptography 12/7/2020 | pag. 23

Block Ciphers: Advanced examples • DES – Feistel Cipher • AES – Rijndael Symmetric

Block Ciphers: Advanced examples • DES – Feistel Cipher • AES – Rijndael Symmetric Cryptosystems 12/7/2020 | pag. 24

DES Cryptography 12/7/2020 | pag. 25

DES Cryptography 12/7/2020 | pag. 25

DES: Feistel Cipher An iterated block cipher is a block cipher involving the sequential

DES: Feistel Cipher An iterated block cipher is a block cipher involving the sequential repetition of an internal function called rounds. (iterated) Cryptography 12/7/2020 | pag. 26

DES: Feistel Cipher Cryptography 12/7/2020 | pag. 27

DES: Feistel Cipher Cryptography 12/7/2020 | pag. 27

DES: Feistel Cipher Cryptography 12/7/2020 | pag. 28

DES: Feistel Cipher Cryptography 12/7/2020 | pag. 28

DES: Algorithm Cryptography 12/7/2020 | pag. 29

DES: Algorithm Cryptography 12/7/2020 | pag. 29

DES: Algorithm Cryptography 12/7/2020 | pag. 30

DES: Algorithm Cryptography 12/7/2020 | pag. 30

DES: Algorithm Cryptography 12/7/2020 | pag. 31

DES: Algorithm Cryptography 12/7/2020 | pag. 31

DES: Algorithm Cryptography 12/7/2020 | pag. 32

DES: Algorithm Cryptography 12/7/2020 | pag. 32

DES: Algorithm Cryptography 12/7/2020 | pag. 33

DES: Algorithm Cryptography 12/7/2020 | pag. 33

DES: Algorithm Cryptography 12/7/2020 | pag. 34

DES: Algorithm Cryptography 12/7/2020 | pag. 34

DES: Algorithm Cryptography 12/7/2020 | pag. 35

DES: Algorithm Cryptography 12/7/2020 | pag. 35

DES: Algorithm Cryptography 12/7/2020 | pag. 36

DES: Algorithm Cryptography 12/7/2020 | pag. 36

DES: Algorithm Cryptography 12/7/2020 | pag. 37

DES: Algorithm Cryptography 12/7/2020 | pag. 37

DES: S-Boxes Cryptography 12/7/2020 | pag. 38

DES: S-Boxes Cryptography 12/7/2020 | pag. 38

DES: Algorithm Cryptography 12/7/2020 | pag. 39

DES: Algorithm Cryptography 12/7/2020 | pag. 39

DES: Algorithm Cryptography 12/7/2020 | pag. 40

DES: Algorithm Cryptography 12/7/2020 | pag. 40

DES: Algorithm Cryptography 12/7/2020 | pag. 41

DES: Algorithm Cryptography 12/7/2020 | pag. 41

DES: Algorithm Cryptography 12/7/2020 | pag. 42 Round number Number of left rotations 1

DES: Algorithm Cryptography 12/7/2020 | pag. 42 Round number Number of left rotations 1 1 2 1 3 2 4 2 5 2 6 2 7 2 8 2 9 1 10 2 11 2 12 2 13 2 14 2 15 2 16 1

DES: Algorithm Cryptography 12/7/2020 | pag. 43

DES: Algorithm Cryptography 12/7/2020 | pag. 43

DES: Algorithm Cryptography 12/7/2020 | pag. 44

DES: Algorithm Cryptography 12/7/2020 | pag. 44

DES: Algorithm Cryptography 12/7/2020 | pag. 45

DES: Algorithm Cryptography 12/7/2020 | pag. 45

Example: DES Key Conversion Code - Chart DECI 0 1 2 3 4 5

Example: DES Key Conversion Code - Chart DECI 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 MAL HEX 0 1 2 3 4 5 6 7 8 9 A B C D E F BINA 0000 0001 0010 0011 0100 0101 0110 0111 1000 1001 1010 1011 1100 1101 1110 1111 RY Cryptography 12/7/2020 | pag. 46

Example: S-Box Cryptography 12/7/2020 | pag. 47

Example: S-Box Cryptography 12/7/2020 | pag. 47

Example: DES Cryptography 12/7/2020 | pag. 48

Example: DES Cryptography 12/7/2020 | pag. 48

Example: DES Cryptography 12/7/2020 | pag. 49

Example: DES Cryptography 12/7/2020 | pag. 49

Example: DES Cryptography 12/7/2020 | pag. 50

Example: DES Cryptography 12/7/2020 | pag. 50

Example: DES Cryptography 12/7/2020 | pag. 51

Example: DES Cryptography 12/7/2020 | pag. 51