SlideShare ist ein Scribd-Unternehmen logo
1 von 117
Cryptography and Network Security. ,[object Object],[object Object],[object Object],[object Object],[object Object]
Chapter 3  & Chapter 6  –  Block Ciphers 、   DES 、 Others 3.1 Simplified DES  3.2 Block Cipher Principles  3.3 The Data Encryption Standard  3.4 The Strength of DES  3.5 Differential and Linear Cryptanalysis  3.6 Block Cipher Design Principles  3.7 Block Cipher Modes of Operation Ch06- Contemporary symmetric ciphers
3.0 Modern Block Ciphers ,[object Object],[object Object],[object Object],[object Object]
Block vs Stream Ciphers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Simplified DES (S-DES) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
S-DES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Simplified DES (cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
Overview of S-DES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sub-key generation
Sub-key generation (cont.) P10 ( k1 k2 k3 k4 k5 k6 k7 k8 k9 k10 )      k3 k5 k2 k7 k4 k10 k1 k9 k8 k6   e.g. K=  10100 00010 P10(K) = P10 ( 10100 00010 )    =  10000 01100   ,[object Object],6 8 9 1 10 4 7 2 5 3 P10
Sub-key generation (cont.) ,[object Object],e.g. LS-1( 10000 ) = 00001 LS-1 ( 01100 ) = 11000
Sub-key generation (cont.) P8 ( k1 k2  k3 k4 k5 k6 k7 k8 k9 k10 )      k6 k3 k7 k4 k8 k5 k10 k9   e.g. K 1 = P8 ( 00001 11000 )    =  010100100 ,[object Object],9 10 5 8 4 7 3 6 P8
Sub-key generation (cont.) ,[object Object],e.g. LS-2( 00001 ) = 00100 LS-2 ( 11000 ) = 00011
Sub-key generation (cont.) P8 ( k1 k2  k3 k4 k5 k6 k7 k8 k9 k10 )      k6 k3 k7 k4 k8 k5 k10 k9   e.g. K 2 = P8 ( 00100 00011 )    =  01000011 ,[object Object],9 10 5 8 4 7 3 6 P8
S-DES encryption
S-DES encryption (cont.) ,[object Object],IP -1  • IP (X) = X = IP • IP -1  (X)  7 5 8 4 1 3 6 2 IP 6 8 2 7 5 3 1 4 IP -1
S-DES encryption (cont.)
S-DES encryption (cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
S-DES encryption (cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object]
S-DES encryption (cont.) ,[object Object],R SK
S-DES encryption (cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object]
S-DES encryption (cont.) ,[object Object],Example: E/P( 1001 )= 11000011 1 4 3 2 3 2 1 4 E/P
S-DES encryption (cont.) ,[object Object],[object Object],S0( b1  b2 b3   b4 ) 10 11 01 11 11 11 01 10 00 10 00 01 10 11 01 10 11 00 01 00 11 10 01 00 b2b3 b1b4
S-DES encryption (cont.) S1( b1  b2 b3   b4 ) Example:   S0(0 01 0)=00, S1(0 01 0)=10 11 00 01 10 11 00 01 00 11 10 11 01 00 10 01 11 10 10 00 00 11 10 01 00 b2b3 b1b4
S-DES encryption (cont.) ,[object Object],3 1 4 2 P4
S-DES encryption (cont.) 1001 1001 1001 1100 0011 0101 1010 01 00 1000
S-DES Encryption (cont.) ,[object Object],[object Object],b1 b2 b3 b4 b5 b6 b7 b8 b1 b2 b3 b4 b5 b6 b7 b8
S-DES Encryption (cont.) ,[object Object],[object Object],[object Object]
S-DES encryption (cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
S-DES encryption (cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
S-DES decryption
S-DES decryption (cont.) ,[object Object],[object Object]
S-DES decryption (cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object]
S-DES decryption (cont.) ,[object Object]
S-DES decryption (cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
S-DES decryption (cont.) ,[object Object],RS-2 RS-2 RS-2 RS-2 K2 K1
S-DES decryption Encrytion/Decryption e/d flag P/ C K 1 / K 2 K 2 / K 1 C/ P
3.2& 3.6  Block Cipher Principles ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Claude Shannon and Substitution-Permutation Ciphers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Shannon introduced the concept of a product cipher. A product cipher is a complex cipher combining substitution, permutation, and other components discussed in previous sections. 5.1.4  Product Ciphers
Diffusion The idea of diffusion is to hide the relationship between the ciphertext and the plaintext.  5.1.4  Continued Diffusion hides the relationship between the ciphertext and the plaintext. Note
Confusion The idea of confusion is to hide the relationship between the ciphertext and the key.  5.1.4  Continued Confusion hides the relationship between the ciphertext and the key. Note
Rounds Diffusion and confusion can be achieved using iterated product ciphers where each iteration is a combination of S-boxes, P-boxes, and other components.  5.1.4  Continued
 
Confusion and Diffusion ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Feistel Cipher Structure ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Feistel Cipher Structure
Feistel Cipher Design Principles ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Feistel Cipher Decryption
Average time required for exhaustive  key search  2.15 milliseconds 2 32  = 4.3 x 10 9 32 5.9  x  10 30   years 2 168  = 3.7 x 10 50 168 5.4 x 10 18   years 2 128  = 3.4 x 10 38 128 10 hours 2 56  = 7.2 x 10 16 56 Time required at 10 6  Decryption/ µs Number of Alternative Keys Key Size (bits)
3.3 Data Encryption Standard (DES) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DES History ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Security analysis of DES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
A single round
6.2.3   Continued Figure 6.10 Key generation
 
 
 
 
Avalanche effect ,[object Object],[object Object]
Avalanche effect (cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Fast avalanche effect ,[object Object]
3.7  Modes of Operation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Modes of operations  (Overview) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
ECB mode ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ECB mode (cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ECB mode (cont.)
ECB mode (cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object]
ECB mode (cont.)
Advantages and Limitations of ECB ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cipher Block Chaining (CBC)  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CBC mode (Cont….) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CBC mode (cont.)
CBC mode (cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CBC mode (cont.)
Advantages and Limitations of CBC ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CFB mode (Cipher feedback) ,[object Object],[object Object],[object Object],[object Object],[object Object]
CFB mode (cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CFB mode (cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
Advantages and Limitations of CFB ,[object Object],[object Object],[object Object],[object Object],[object Object]
OFB mode (Output feedback)   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
Counter (CTR) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Counter (CTR)
Advantages and Limitations of CTR ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Modes of operations ( Summary )  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Ch06 - Double DES ,[object Object],[object Object]
The first approach is to use double DES (2DES).  6.4.1  Double DES Meet-in-the-Middle Attack However, using a known-plaintext attack called  meet-in-the-middle attack  proves that double DES improves this vulnerability slightly (to 2 57  tests), but not tremendously (to 2 112 ).
Double DES (cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
6.4.1   Continued Figure 6.14  Meet-in-the-middle attack for double DES
6.4.1   Continued Figure 6.15  Tables for meet-in-the-middle attack
6.4.2   Triple DES Figure 6.16  Triple DES with two keys
Triple DES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
6.4.2   Continuous Triple DES with Three Keys The possibility of known-plaintext attacks on triple DES with two keys has enticed some applications to use triple DES with three keys. Triple DES with three keys is used by many applications such as PGP (See Chapter 16).
IDEA… (International Data Encryption Algorithm) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Design  Issues  ,[object Object],[object Object],[object Object],[object Object]
 
Encryption Key Generation.
Encryption Algorithm.
Sequence of operation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Continue.. ,[object Object],[object Object],[object Object],[object Object]
Operation in output transformation  ,[object Object],[object Object],[object Object],[object Object]
Next generation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Stream Ciphers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Stream Cipher Properties ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Stream Cipher :  RC4 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
WLAN WEP (WLAN security requirement and some attacks.ppt) ,[object Object],[object Object]
WLAN WEP (WLAN security requirement and some attacks.ppt) ,[object Object],[object Object],[object Object],[object Object],[object Object]
WLAN WEP (WLAN security requirement and some attacks.ppt) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
WLAN WEP (WLAN security requirement and some attacks.ppt) IEEE802.1X None Key Management Michael  Enforcing IV sequencing CRC-32 None Packet Data Replay detection 48-bit IV TKIP mixing function 24-bit wrapping IV  Concatenate IV to base key Key Lifetime Per-packet-key RC4 128-bit  encryption 64-bit authentication RC4 40  or 104-bit encryption Cipher Key Size(s) TKIP WEP
WLAN EAP (EAP series methods on wireless security.ppt) ,[object Object],EAP RADIUS
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],WLAN EAP (EAP series methods on wireless security.ppt)

Weitere ähnliche Inhalte

Was ist angesagt?

DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationsarhadisoftengg
 
Block Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption StandardBlock Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption StandardDr.Florence Dayana
 
Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Hardik Manocha
 
Block Cipher Modes of Operation And Cmac For Authentication
Block Cipher Modes of Operation And Cmac For AuthenticationBlock Cipher Modes of Operation And Cmac For Authentication
Block Cipher Modes of Operation And Cmac For AuthenticationVittorio Giovara
 
Cryptography
CryptographyCryptography
CryptographyEmaSushan
 
Rsa algorithm key generation
Rsa algorithm key generation Rsa algorithm key generation
Rsa algorithm key generation swarnapatil
 
Hashing vs Encryption vs Encoding
Hashing vs Encryption vs EncodingHashing vs Encryption vs Encoding
Hashing vs Encryption vs EncodingCheapSSLsecurity
 
Block cipher modes of operation
Block cipher modes of operation Block cipher modes of operation
Block cipher modes of operation harshit chavda
 
Information and data security block cipher and the data encryption standard (...
Information and data security block cipher and the data encryption standard (...Information and data security block cipher and the data encryption standard (...
Information and data security block cipher and the data encryption standard (...Mazin Alwaaly
 
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere CipherCaesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere CipherMona Rajput
 
Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)Soham Kansodaria
 
Secret key cryptography
Secret key cryptographySecret key cryptography
Secret key cryptographyPrabhat Goel
 
Modern Block Cipher- Modern Symmetric-Key Cipher
Modern Block Cipher- Modern Symmetric-Key CipherModern Block Cipher- Modern Symmetric-Key Cipher
Modern Block Cipher- Modern Symmetric-Key CipherMahbubur Rahman
 
Symmetric Encryption Techniques
Symmetric Encryption Techniques Symmetric Encryption Techniques
Symmetric Encryption Techniques Dr. Kapil Gupta
 

Was ist angesagt? (20)

DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
 
Block Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption StandardBlock Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption Standard
 
DES
DESDES
DES
 
Cryptography - 101
Cryptography - 101Cryptography - 101
Cryptography - 101
 
Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES)
 
Rc4
Rc4Rc4
Rc4
 
Block Cipher Modes of Operation And Cmac For Authentication
Block Cipher Modes of Operation And Cmac For AuthenticationBlock Cipher Modes of Operation And Cmac For Authentication
Block Cipher Modes of Operation And Cmac For Authentication
 
Modes of Operation
Modes of Operation Modes of Operation
Modes of Operation
 
Cryptography
CryptographyCryptography
Cryptography
 
Rsa algorithm key generation
Rsa algorithm key generation Rsa algorithm key generation
Rsa algorithm key generation
 
Hashing vs Encryption vs Encoding
Hashing vs Encryption vs EncodingHashing vs Encryption vs Encoding
Hashing vs Encryption vs Encoding
 
Block cipher modes of operation
Block cipher modes of operation Block cipher modes of operation
Block cipher modes of operation
 
Password based cryptography
Password based cryptographyPassword based cryptography
Password based cryptography
 
Information and data security block cipher and the data encryption standard (...
Information and data security block cipher and the data encryption standard (...Information and data security block cipher and the data encryption standard (...
Information and data security block cipher and the data encryption standard (...
 
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere CipherCaesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
 
Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)
 
Symmetric encryption
Symmetric encryptionSymmetric encryption
Symmetric encryption
 
Secret key cryptography
Secret key cryptographySecret key cryptography
Secret key cryptography
 
Modern Block Cipher- Modern Symmetric-Key Cipher
Modern Block Cipher- Modern Symmetric-Key CipherModern Block Cipher- Modern Symmetric-Key Cipher
Modern Block Cipher- Modern Symmetric-Key Cipher
 
Symmetric Encryption Techniques
Symmetric Encryption Techniques Symmetric Encryption Techniques
Symmetric Encryption Techniques
 

Ähnlich wie Ch03 Ch06 Des And Others

DES Simplified
DES SimplifiedDES Simplified
DES SimplifiedShiraz316
 
334 recitation3-sdes
334 recitation3-sdes334 recitation3-sdes
334 recitation3-sdesBenny SmKr
 
Cryptography Symmetric Key Algorithm (CSE)
Cryptography Symmetric Key Algorithm (CSE)Cryptography Symmetric Key Algorithm (CSE)
Cryptography Symmetric Key Algorithm (CSE)SoumyaBhattacharyya14
 
Computer Security Lecture 4: Block Ciphers and the Data Encryption Standard
Computer Security Lecture 4: Block Ciphers and the Data Encryption StandardComputer Security Lecture 4: Block Ciphers and the Data Encryption Standard
Computer Security Lecture 4: Block Ciphers and the Data Encryption StandardMohamed Loey
 
Computer Security Lecture 5: Simplified Advanced Encryption Standard
Computer Security Lecture 5: Simplified Advanced Encryption StandardComputer Security Lecture 5: Simplified Advanced Encryption Standard
Computer Security Lecture 5: Simplified Advanced Encryption StandardMohamed Loey
 
class5jf.pptx Block cipher in information security
class5jf.pptx Block cipher in information securityclass5jf.pptx Block cipher in information security
class5jf.pptx Block cipher in information security23017156038
 
Crypto-Presentation jfjfd dkfdnfdj kdfjdjfdjkfd .pptx
Crypto-Presentation jfjfd dkfdnfdj kdfjdjfdjkfd .pptxCrypto-Presentation jfjfd dkfdnfdj kdfjdjfdjkfd .pptx
Crypto-Presentation jfjfd dkfdnfdj kdfjdjfdjkfd .pptxanxiousanoja
 
javaPrimitiveTypes.pptx
javaPrimitiveTypes.pptxjavaPrimitiveTypes.pptx
javaPrimitiveTypes.pptxMattMarino13
 
TCN  5080  -­‐‑  Project  1  Description  C.docx
TCN  5080  -­‐‑  Project  1  Description  C.docxTCN  5080  -­‐‑  Project  1  Description  C.docx
TCN  5080  -­‐‑  Project  1  Description  C.docxssuserf9c51d
 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithmsAnamika Singh
 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithmsAnamika Singh
 
Data Protection Techniques and Cryptography
Data Protection Techniques and CryptographyData Protection Techniques and Cryptography
Data Protection Techniques and CryptographyTalha SAVAS
 
Assignment2 – Simplified DES Encrypt and Decrypt .docx
Assignment2 – Simplified DES Encrypt and Decrypt                  .docxAssignment2 – Simplified DES Encrypt and Decrypt                  .docx
Assignment2 – Simplified DES Encrypt and Decrypt .docxmckellarhastings
 

Ähnlich wie Ch03 Ch06 Des And Others (20)

DES Block Cipher Hao Qi
DES Block Cipher Hao QiDES Block Cipher Hao Qi
DES Block Cipher Hao Qi
 
DES Simplified
DES SimplifiedDES Simplified
DES Simplified
 
334 recitation3-sdes
334 recitation3-sdes334 recitation3-sdes
334 recitation3-sdes
 
S-DES.ppt
S-DES.pptS-DES.ppt
S-DES.ppt
 
Cryptography Symmetric Key Algorithm (CSE)
Cryptography Symmetric Key Algorithm (CSE)Cryptography Symmetric Key Algorithm (CSE)
Cryptography Symmetric Key Algorithm (CSE)
 
Computer Security Lecture 4: Block Ciphers and the Data Encryption Standard
Computer Security Lecture 4: Block Ciphers and the Data Encryption StandardComputer Security Lecture 4: Block Ciphers and the Data Encryption Standard
Computer Security Lecture 4: Block Ciphers and the Data Encryption Standard
 
Computer Security Lecture 5: Simplified Advanced Encryption Standard
Computer Security Lecture 5: Simplified Advanced Encryption StandardComputer Security Lecture 5: Simplified Advanced Encryption Standard
Computer Security Lecture 5: Simplified Advanced Encryption Standard
 
Wepwhacker !
Wepwhacker !Wepwhacker !
Wepwhacker !
 
section-7.ppt
section-7.pptsection-7.ppt
section-7.ppt
 
Ch8a
Ch8aCh8a
Ch8a
 
03 UNIT-2.pdf
03 UNIT-2.pdf03 UNIT-2.pdf
03 UNIT-2.pdf
 
class5jf.pptx Block cipher in information security
class5jf.pptx Block cipher in information securityclass5jf.pptx Block cipher in information security
class5jf.pptx Block cipher in information security
 
Data Formats used by Computers
Data Formats used by ComputersData Formats used by Computers
Data Formats used by Computers
 
Crypto-Presentation jfjfd dkfdnfdj kdfjdjfdjkfd .pptx
Crypto-Presentation jfjfd dkfdnfdj kdfjdjfdjkfd .pptxCrypto-Presentation jfjfd dkfdnfdj kdfjdjfdjkfd .pptx
Crypto-Presentation jfjfd dkfdnfdj kdfjdjfdjkfd .pptx
 
javaPrimitiveTypes.pptx
javaPrimitiveTypes.pptxjavaPrimitiveTypes.pptx
javaPrimitiveTypes.pptx
 
TCN  5080  -­‐‑  Project  1  Description  C.docx
TCN  5080  -­‐‑  Project  1  Description  C.docxTCN  5080  -­‐‑  Project  1  Description  C.docx
TCN  5080  -­‐‑  Project  1  Description  C.docx
 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithms
 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithms
 
Data Protection Techniques and Cryptography
Data Protection Techniques and CryptographyData Protection Techniques and Cryptography
Data Protection Techniques and Cryptography
 
Assignment2 – Simplified DES Encrypt and Decrypt .docx
Assignment2 – Simplified DES Encrypt and Decrypt                  .docxAssignment2 – Simplified DES Encrypt and Decrypt                  .docx
Assignment2 – Simplified DES Encrypt and Decrypt .docx
 

Kürzlich hochgeladen

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 

Kürzlich hochgeladen (20)

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 

Ch03 Ch06 Des And Others

  • 1.
  • 2. Chapter 3 & Chapter 6 – Block Ciphers 、 DES 、 Others 3.1 Simplified DES 3.2 Block Cipher Principles 3.3 The Data Encryption Standard 3.4 The Strength of DES 3.5 Differential and Linear Cryptanalysis 3.6 Block Cipher Design Principles 3.7 Block Cipher Modes of Operation Ch06- Contemporary symmetric ciphers
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.  
  • 9.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 17.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25. S-DES encryption (cont.) S1( b1 b2 b3 b4 ) Example: S0(0 01 0)=00, S1(0 01 0)=10 11 00 01 10 11 00 01 00 11 10 11 01 00 10 01 11 10 10 00 00 11 10 01 00 b2b3 b1b4
  • 26.
  • 27. S-DES encryption (cont.) 1001 1001 1001 1100 0011 0101 1010 01 00 1000
  • 28.
  • 29.
  • 30.
  • 31.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38. S-DES decryption Encrytion/Decryption e/d flag P/ C K 1 / K 2 K 2 / K 1 C/ P
  • 39.
  • 40.
  • 41. Shannon introduced the concept of a product cipher. A product cipher is a complex cipher combining substitution, permutation, and other components discussed in previous sections. 5.1.4 Product Ciphers
  • 42. Diffusion The idea of diffusion is to hide the relationship between the ciphertext and the plaintext. 5.1.4 Continued Diffusion hides the relationship between the ciphertext and the plaintext. Note
  • 43. Confusion The idea of confusion is to hide the relationship between the ciphertext and the key. 5.1.4 Continued Confusion hides the relationship between the ciphertext and the key. Note
  • 44. Rounds Diffusion and confusion can be achieved using iterated product ciphers where each iteration is a combination of S-boxes, P-boxes, and other components. 5.1.4 Continued
  • 45.  
  • 46.
  • 47.
  • 49.
  • 51. Average time required for exhaustive key search 2.15 milliseconds 2 32 = 4.3 x 10 9 32 5.9 x 10 30 years 2 168 = 3.7 x 10 50 168 5.4 x 10 18 years 2 128 = 3.4 x 10 38 128 10 hours 2 56 = 7.2 x 10 16 56 Time required at 10 6 Decryption/ µs Number of Alternative Keys Key Size (bits)
  • 52.
  • 53.
  • 54.
  • 55.  
  • 57. 6.2.3 Continued Figure 6.10 Key generation
  • 58.  
  • 59.  
  • 60.  
  • 61.  
  • 62.
  • 63.
  • 64.
  • 65.
  • 66.
  • 67.  
  • 68.
  • 69.
  • 71.
  • 73.
  • 74.
  • 75.
  • 77.
  • 79.
  • 80.
  • 81.
  • 82.
  • 83.  
  • 84.
  • 85.
  • 86.  
  • 87.
  • 89.
  • 90.
  • 91.
  • 92. The first approach is to use double DES (2DES). 6.4.1 Double DES Meet-in-the-Middle Attack However, using a known-plaintext attack called meet-in-the-middle attack proves that double DES improves this vulnerability slightly (to 2 57 tests), but not tremendously (to 2 112 ).
  • 93.
  • 94. 6.4.1 Continued Figure 6.14 Meet-in-the-middle attack for double DES
  • 95. 6.4.1 Continued Figure 6.15 Tables for meet-in-the-middle attack
  • 96. 6.4.2 Triple DES Figure 6.16 Triple DES with two keys
  • 97.
  • 98.  
  • 99. 6.4.2 Continuous Triple DES with Three Keys The possibility of known-plaintext attacks on triple DES with two keys has enticed some applications to use triple DES with three keys. Triple DES with three keys is used by many applications such as PGP (See Chapter 16).
  • 100.
  • 101.
  • 102.  
  • 105.
  • 106.
  • 107.
  • 108.
  • 109.
  • 110.
  • 111.
  • 112.
  • 113.
  • 114.
  • 115. WLAN WEP (WLAN security requirement and some attacks.ppt) IEEE802.1X None Key Management Michael Enforcing IV sequencing CRC-32 None Packet Data Replay detection 48-bit IV TKIP mixing function 24-bit wrapping IV Concatenate IV to base key Key Lifetime Per-packet-key RC4 128-bit encryption 64-bit authentication RC4 40 or 104-bit encryption Cipher Key Size(s) TKIP WEP
  • 116.
  • 117.