Decryption Algorithms Characterization Project ECE 526 spring 2007

  • Slides: 18
Download presentation
Decryption Algorithms Characterization Project ECE 526 spring 2007 Ravimohan Boggula, Rajesh reddy Bandala Southern

Decryption Algorithms Characterization Project ECE 526 spring 2007 Ravimohan Boggula, Rajesh reddy Bandala Southern Illinois University Carbondale

Goal n The goal of this project is to evaluate the processing and energy

Goal n The goal of this project is to evaluate the processing and energy requirement for two different decryption algorithms.

Introduction n In order to maintain information security and integration across the internet researchers

Introduction n In order to maintain information security and integration across the internet researchers have developed a process named cryptography CRYPTOGRAPHY is an algorithmic process of converting a plain text or clear text message to a cipher text or cipher message based on an algorithm that both the sender and receiver know, so that the cipher text message can be returned to its original, plain text form. The act of converting a plain text message to its cipher text form is called enciphering. Reversing that act (i. e. , cipher text form to plain text message) is deciphering.

Introduction… n A key is simply a parameter to the algorithm that allows the

Introduction… n A key is simply a parameter to the algorithm that allows the encryption and decryption process to occur n cryptographic techniques are divided into two classes: symmetric and asymmetric (also called public/private) key cryptography n n In symmetric key algorithms encryption key == decryption key In asymmetric key algorithms encryption key! == decryption key

Introduction…

Introduction…

Introduction…

Introduction…

Introduction… n Symmetric-key algorithms are generally much less computationally intensive than asymmetric key algorithms.

Introduction… n Symmetric-key algorithms are generally much less computationally intensive than asymmetric key algorithms. In practice, this means that a quality asymmetric key algorithm is hundreds or thousands of times slower than a quality symmetric key algorithm

Data Encryption Standard (DES) n n DES encrypts and decrypts data in 64 -bit

Data Encryption Standard (DES) n n DES encrypts and decrypts data in 64 -bit blocks, using a 64 -bit key (although the effective key strength is only 56 bits, as explained below). It takes a 64 -bit block of plaintext as input and outputs a 64 -bit block of ciphertext. Since it always operates on blocks of equal size and it uses both permutations and substitutions in the algorithm, DES is both a block cipher and a product cipher. DES has 16 rounds, meaning the main algorithm is repeated 16 times to produce the ciphertext. It has been found that the number of rounds is exponentially proportional to the amount of time required to find a key using a brute-force attack. So as the number of rounds increases, the security of the algorithm increases exponentially

Structure of DES

Structure of DES

Disadvantages of DES n DES is now considered to be insecure for many applications.

Disadvantages of DES n DES is now considered to be insecure for many applications. This is chiefly due to the 56 -bit key size being too small; DES keys have been broken in less than 24 hours. There also some analytical results which demonstrate theoretical weaknesses in the cipher, although they are infeasible to mount in practice. The algorithm is believed to be practically secure in the form of Triple DES, although there are theoretical attacks. In recent years, the cipher has been superseded by the Advanced Encryption Standard (AES).

Advanced Encryption Standard n n n Uses 128 bits, 192 bits and 256 bits,

Advanced Encryption Standard n n n Uses 128 bits, 192 bits and 256 bits, instead of 56 bits The AES specifies three key sizes: 128, 192 and 256 bits. In decimal terms, this means that there approximately: 3. 4 x 1038 possible 128 -bit keys; 6. 2 x 1057 possible 192 -bit keys; and 1. 1 x 1077 possible 256 -bit keys. In comparison, DES keys are 56 bits long, which means there approximately 7. 2 x 1016 possible DES keys. Thus, there are on the order of 1021 times more AES 128 -bit keys than DES 56 -bit key

Approach n Hardware approach is difficult to implement as it requires loads of time.

Approach n Hardware approach is difficult to implement as it requires loads of time. n Using a software approach: Rindeal and serpent algorithms

Brief Description n Rijndael is an iterated block cipher with a variable block length

Brief Description n Rijndael is an iterated block cipher with a variable block length and a variable key length. The block length and the key length can be independently specified to 128, 192 or 256 bits. Serpent is a 32 -round SP-network operating on four 32 -bit words, thus giving a block size of 128 bits. All values used in the cipher are represented as bitstreams. Serpent encrypts a 128 -bit plaintext P to a 128 -bit ciphertext C in 32 rounds under the control of 33 128 -bit subkeys ^K 0; : : : ; ^K 32. The user key length is variable,

Methodology n n Using wattch tool we have to evaluate the processing and energy

Methodology n n Using wattch tool we have to evaluate the processing and energy requirement for two different decryption algorithms. “WATTCH” is an architectural simulator that estimates CPU power consumption. The power estimates are based on a suite of parametrizable power models for different hardware structures and on per-cycle resource usage counts generated through cycle level simulation. The power models have been integrated into the “Simple Scalar” architectural simulator.

Expected results n n The expected results include what is the relationship of energy

Expected results n n The expected results include what is the relationship of energy requirement/processing cost with encryption key length and file size.

Summary n Cryptography is an algorithimic process of converting a plain text to a

Summary n Cryptography is an algorithimic process of converting a plain text to a cipher text. n The act of converting a plain text in to cipher text is Encryption. n And the act of converting the cipher text back to original text is Decryption. n We basically use two kinds of key algorithms Syymetric and Assymetric.

References n n n http: //herongyang. com/crypto (cryptographic tutorials) http: //fp. gladman. plus. com/cryptography_technology/index.

References n n n http: //herongyang. com/crypto (cryptographic tutorials) http: //fp. gladman. plus. com/cryptography_technology/index. htm http: //en. wikipedia. org/wiki/data_encryption_standard http: //en. wikipedia. org/wiki/advanced_encryption_standard http: //csrc. nist. gov/Crypto. Toolkit/aes/rijndael/Rijndael. pdf http: //www. cl. cam. ac. uk/~rja 14/Papers/serpent. pdf

Thank you

Thank you