1 / 18

Advanced Encryption Package 2002 Professional

Advanced Encryption Package 2002 Professional. Keith Gittings CS 627. Advanced Encryption Package. Developed by Secure Action Research Available at www.secureaction.com Russian Based Company Based in Russia to avoid US encryption laws. Advanced Encryption Package.

leona
Download Presentation

Advanced Encryption Package 2002 Professional

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Advanced Encryption Package 2002 Professional Keith Gittings CS 627

  2. Advanced Encryption Package • Developed by Secure Action Research • Available at www.secureaction.com • Russian Based Company • Based in Russia to avoid US encryption laws

  3. Advanced Encryption Package • Features 17 different encryption algorithms • Files Encryption / Decryption • Text Encryption / Decryption • File Shredding • Claim to have no backdoors into there software

  4. 17 Encryption Algorithms • DESX 128-bit key • Blowfish 448-bit key • Rijndael (AES) 256-bit key • CAST 256-bit key • Triple-DES 192-bit key • RC2 1024-bit key • Diamond 2 2048-bit key • TEA 128-bit key • SAFER 128-bit key • 3-Way 96-bit key • GOST 256-bit key • Shark 128-bit key • Square 128-bit key • Skipjack 80-bit key • Twofish 256-bit key • Mars 448-bit key • Serpent 128-bit key

  5. 17 Encryption Algorithms • Candidates for the AES • Mars • Developed by IBM • Original Design • Keys Sizes to 448-bits • 16 rounds (Two eight round mixing layers) • Original design made it difficult to assess security • Made it to second round of AES • Rijndael • Developed by Joan Daemon and Vincent Rijmen (Belgium) • Key Sizes 128, 192, 256-bits • 128-bit block size • Well suited for smart cards • Selected as AES • Serpent • Developed by Ross Anderson (United Kingdom), Eli Biham (Israel) and Lars Knudsen (Norway) • 32 rounds • 8 S-boxes (based on DES S-boxes) • Not intended for speed • Low Memory Requirement makes it suitable for smart cards • Made it to second round of AES

  6. 17 Forms of Encryption • Candidates for the AES • Twofish • Developed by Bruce Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall and Niels Fergusion in the United States • Based on Blowfish • Variable Key Length up to 256-bits • Difficult to analyze • Small memory requirement makes it suitable for smart cards • Made it to second round of the AES • CAST 256 • Developed by Entrust Technologies, Inc. in the United States • Based on CAST 128 which was endorsed by Canada as one of there DES replacements • Variable Key Length up to 256-bits • 128-bit block size • First round candidate of the AES • Safer (Safe and Fast Encryption Routine) • Developed by Cylink Corporation of the United States • Variable key size and variable number of rounds • Does not divide plaintext into independent parts • Some recommend against its use because it was developed by Cylink which some feel is tainted by the National Security Agency • First Round candidate for the AES

  7. 17 Forms of Encryption • Non-AES candidates • TEA (Tiny Encryption Algorithm) • Developed by David Wheeler and Roger Needham at the Computer Laboratory of Cambridge University • 128-bit key • 64-bit block size • Fast Algorithm • Uses large number of iterations • Does not make use of S-boxes • Uses word operations rather than bit or 4-bit • Diamond 2 • Developed by Michael Paul Johnson • Variable key size • Variable number of rounds • 128-bit block size • Larger S-Boxes than DES • Every round alters every bit • DESX • Developed by Ron Rivest • Stronger version of traditional DES • Adds and extra step to traditional DES • Bitwise XOR of plaintext with additional 64 bits of key material • Output is XORed with another 64-bits of key material • 64-bit block size • 128 or 192-bit key • No added security against differential or linear attacks than DES • More secure against brute force

  8. 17 Forms of Encryption • GOST • Soviet counterpart to DES (published publicly in 1990) • 64-bit block size • 256-bit key • Works like DES with one of the bits modified at a time • 32 rounds • 512-bit secondary key (S-boxes specific to a particular network not standard) • Weak security if poor tables are chosen • Skipjack • Declassified by the National Security Agency • Former part of the Clipper Chip program • 64-bit block size • 80-bit key • 32 rounds • Twice as fast as DES • No Set up time and is fast on smart cards and hardware • 3-Way • Developed by Joan Daemen • Simple Block Cipher • 96-bit key • 96-bit block size • Repeats simple operations iteratively

  9. 17 Forms of Encryption • SQUARE • Developed by Joan Daemen and Vincent Rijmen • 128-bit block length • 128-bit key • Variable number of rounds with a minimum of eight • Small enough for smart card implementation • Influenced Rijndael • Shark • Vincent Rijmen, Joan Daemen, Bart Preneel, Antoon Bosselaers and Erik De Win • 6 rounds • 64-bit block • 128-bit key • RC2 • Designed by Ron Rivest (Ron’s Code or Rivest’s Cipher) • Drop-in replacement for DES • 64-bit block size • Variable key size to 1024-bits • Has a “salt” (40 to 88 bits) to prevent against large look-up tables • RC2 and RC4 used by software developer who wanted to avoid export laws associated with DES

  10. Advanced Encryption Package Professional 2002 • AEP has options for Encryption/Decryption • Making an .exe file • Zip Archiver • Delete, Shred Standard Interface ofAEP

  11. Advanced Encryption Package • Encryption • User Chooses • password • riddle • Algorithm • What to do with original file • Compression Standard Interface of AEP

  12. AEP Executable File • Make an executable file • Does not need to have software installed to decrypt • Only needs password • Only works with windows

  13. Decryption Choose Decryption Select the file you want decrypted If wrong password is selected it will not decrypt Press GO File is decrypted AEP Decryption

  14. File Shredding Complies with Department of Defenses standard for prevention of hardware restoration Shredding Options Shown in Figure 5 File Shredding Figure 5.Shredding Options

  15. File Options Keep Original Date for encrypted files Show system and hidden files Mark .aep files as hidden Dump used passwords to file Help to remember passwords if you forget Still need to remember password because Dump file is encrypted Other Options

  16. Text Encryption Uses AES with a 256-bit key Allows the sending of confidential text messages Email, ICQ, IM, etc Encrypting Text Simply paste text into upper box Press “Process text encryption” Enter Password Encrypted text appears in lower box AEP Text Encryption

  17. Decryption Will decrypt with wrong password Not correct plaintext of course Decrypting Text Pasted Encrypted text into top window Press “Decrypt Text” Enter Password Plaintext then appears in bottom window AEP Text Decryption

  18. AEP Encryption • Questions?

More Related