1 / 28

Chapter 20

Chapter 20. Symmetric Encryption and Message Confidentiality. Symmetric Encryption . also referred to as: conventional encryption secret-key or single-key encryption only alternative before public-key encryption in 1970’s still most widely used alternative has five ingredients:

liliha
Download Presentation

Chapter 20

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Chapter 20 Symmetric Encryption and Message Confidentiality

  2. Symmetric Encryption • also referred to as: • conventional encryption • secret-key or single-key encryption • only alternative before public-key encryption in 1970’s • still most widely used alternative • has five ingredients: • plaintext • encryption algorithm • secret key • ciphertext • decryption algorithm

  3. Cryptography

  4. Cryptanalysis type of attack known to cryptanalyst

  5. Computationally Secure Encryption Schemes • encryption is computationally secure if: • cost of breaking cipher exceeds value of information • time required to break cipher exceeds the useful lifetime of the information • usually very difficult to estimate the amount of effort required to break • can estimate time/cost of a brute-force attack

  6. Feistel Cipher Structure

  7. Block Cipher Structure • symmetric block cipher consists of: • a sequence of rounds • with substitutions and permutations controlled by key • parameters and design features:

  8. Data Encryption Standard (DES) most widely used encryption scheme adopted in 1977 by National Bureau of Standards now NIST FIPS PUB 46 algorithm is referred to as the Data Encryption Algorithm (DEA) minor variation of the Feistel network

  9. first used in financial applications • in DES FIPS PUB 46-3 standard of 1999 • uses three keys and three DES executions: C = E(K3, D(K2, E(K1, P))) • decryption same with keys reversed • use of decryption in second stage gives compatibility with original DES users • effective 168-bit key length, slow, secure • AES will eventually replace 3DES Triple DES (3DES)

  10. Advanced Encryption Standard (AES)

  11. AES Round Structure

  12. Table 20.2 (a) S-box

  13. Table 20.2(b) Inverse S-box

  14. ShiftRows

  15. Mix Columns and Add Key • mix columns • operates on each column individually • mapping each byte to a new value that is a function of all four bytes in the column • use of equations over finite fields • to provide good mixing of bytes in column • add round key • simply XOR State with bits of expanded key • security from complexity of round key expansion and other stages of AES

  16. Stream Ciphers • processes input elements continuously • key input to a pseudorandom bit generator • produces stream of random like numbers • unpredictable without knowing input key • XOR keystream output with plaintext bytes • are faster and use far less code • design considerations: • encryption sequence should have a large period • keystream approximates random number properties • uses a sufficiently long key

  17. Table 20.3 Speed Comparisons of Symmetric Ciphers on a Pentium 4 Source: http://www.cryptopp.com/benchmarks.html

  18. The RC4 Algorithm

  19. Modes of Operation

  20. Electronic Codebook (ECB) • simplest mode • plaintext is handled b bits at a time and each block is encrypted using the same key • “codebook” because have unique ciphertext value for each plaintext block • not secure for long messages since repeated plaintext is seen in repeated ciphertext • to overcome security deficiencies you need a technique where the same plaintext block, if repeated, produces different ciphertext blocks

  21. Cipher Block Chaining (CBC)

  22. Cipher Feedback (CFB)

  23. Counter (CTR)

  24. Location of Encryption

  25. Key Distribution • the means of delivering a key to two parties that wish to exchange data without allowing others to see the key • two parties (A and B) can achieve this by:

  26. Key Distribution

  27. Summary • symmetric encryption principles • cryptography • cryptanalysis • Feistel cipher structure • data encryption standard • triple DES • advanced encryption standard • algorithm details • key distribution • stream ciphers and RC4 • stream cipher structure • RC4 algorithm • cipher block modes of operation • electronic codebook mode • cipher block chaining mode • cipher feedback mode • counter mode • location of symmetric encryption devices

More Related