henric johnson1 chapter 2 conventional encryption message confidentiality

30
Henric Johnson 1 Chapter 2 Chapter 2 Conventional Conventional Encryption Encryption Message Message Confidentiality Confidentiality

Upload: brandon-daniels

Post on 19-Jan-2016

223 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Henric Johnson1 Chapter 2 Conventional Encryption Message Confidentiality

Henric Johnson 1

Chapter 2Chapter 2Conventional Conventional Encryption Encryption Message Message

ConfidentialityConfidentiality

Page 2: Henric Johnson1 Chapter 2 Conventional Encryption Message Confidentiality

Henric Johnson 2

OutlineOutline

• Conventional Encryption Principles• Conventional Encryption

Algorithms• Cipher Block Modes of Operation• Location of Encryption Devices• Key Distribution

Page 3: Henric Johnson1 Chapter 2 Conventional Encryption Message Confidentiality

Henric Johnson 3

Conventional Conventional Encryption Encryption PrinciplesPrinciples

• An encryption scheme has five ingredients:– Plaintext– Encryption algorithm– Secret Key– Ciphertext– Decryption algorithm

• Security depends on the secrecy of the key, not the secrecy of the algorithm

Page 4: Henric Johnson1 Chapter 2 Conventional Encryption Message Confidentiality

Henric Johnson 4

Conventional Conventional Encryption Encryption PrinciplesPrinciples

Page 5: Henric Johnson1 Chapter 2 Conventional Encryption Message Confidentiality

Henric Johnson 5

Conventional Conventional Encryption Encryption PrinciplesPrinciples

Page 6: Henric Johnson1 Chapter 2 Conventional Encryption Message Confidentiality

Henric Johnson 6

CryptographyCryptography

• Classified along three independent dimensions:– The type of operations used for

transforming plaintext to ciphertext– The number of keys used

• symmetric (single key)• asymmetric (two-keys, or public-key encryption)

– The way in which the plaintext is processed

Page 7: Henric Johnson1 Chapter 2 Conventional Encryption Message Confidentiality

Henric Johnson 7

Average time required Average time required for exhaustivefor exhaustive key key

search search Key Size (bits)

Number of Alternative Keys

Time required at 106 Decryption/µs

32 232 = 4.3 x 109 2.15 milliseconds

56 256 = 7.2 x 1016 10 hours

128 2128 = 3.4 x 1038 5.4 x 1018 years

168 2168 = 3.7 x 1050 5.9 x 1030 years

Page 8: Henric Johnson1 Chapter 2 Conventional Encryption Message Confidentiality

Henric Johnson 8

Feistel Cipher StructureFeistel Cipher Structure

• Virtually all conventional block encryption algorithms, including DES have a structure first described by Horst Feistel of IBM in 1973

• The realization of a Fesitel Network depends on the choice of the following parameters and design features (see next slide):

Page 9: Henric Johnson1 Chapter 2 Conventional Encryption Message Confidentiality

Henric Johnson 9

Feistel Cipher StructureFeistel Cipher Structure• Block size: larger block sizes mean greater

security• Key Size: larger key size means greater

security• Number of rounds: multiple rounds offer

increasing security• Subkey generation algorithm: greater

complexity will lead to greater difficulty of cryptanalysis.

• Fast software encryption/decryption: the speed of execution of the algorithm becomes a concern

Page 10: Henric Johnson1 Chapter 2 Conventional Encryption Message Confidentiality

Henric Johnson 10

Page 11: Henric Johnson1 Chapter 2 Conventional Encryption Message Confidentiality

Henric Johnson 11

Conventional Conventional Encryption AlgorithmsEncryption Algorithms

• Data Encryption Standard (DES)– The most widely used encryption

scheme– The algorithm is reffered to the Data

Encryption Algorithm (DEA)– DES is a block cipher– The plaintext is processed in 64-bit

blocks– The key is 56-bits in length

Page 12: Henric Johnson1 Chapter 2 Conventional Encryption Message Confidentiality

Henric Johnson 12

Page 13: Henric Johnson1 Chapter 2 Conventional Encryption Message Confidentiality

Henric Johnson 13

Page 14: Henric Johnson1 Chapter 2 Conventional Encryption Message Confidentiality

Henric Johnson 14

DESDES

• The overall processing at each iteration:– Li = Ri-1

– Ri = Li-1 F(Ri-1, Ki)

• Concerns about:– The algorithm and the key length

(56-bits)

Page 15: Henric Johnson1 Chapter 2 Conventional Encryption Message Confidentiality

Henric Johnson 15

Time to break a code Time to break a code (10(1066 decryptions/µs) decryptions/µs)

Page 16: Henric Johnson1 Chapter 2 Conventional Encryption Message Confidentiality

Henric Johnson 16

Triple DEATriple DEA

• Use three keys and three executions of the DES algorithm (encrypt-decrypt-encrypt)

• C = ciphertext• P = Plaintext• EK[X] = encryption of X using key K• DK[Y] = decryption of Y using key K

• Effective key length of 168 bits

C = EK3[DK2[EK1[P]]]

Page 17: Henric Johnson1 Chapter 2 Conventional Encryption Message Confidentiality

Henric Johnson 17

Triple DEATriple DEA

Page 18: Henric Johnson1 Chapter 2 Conventional Encryption Message Confidentiality

Henric Johnson 18

Advanced Encryption Standard

• The key length must be of 128,192,256

• The block size must be 128-bit• The alg must be public• Iplemented with h/w and s/w

• Rajindael implemented

Page 19: Henric Johnson1 Chapter 2 Conventional Encryption Message Confidentiality

Henric Johnson 19

Other Symmetric Block CiphersOther Symmetric Block Ciphers

• International Data Encryption Algorithm (IDEA)– Developed by James Messey & Xueji Lai– 128-bit key– It differs with DES algorithm in both round function

and sub key generation– It does not use S-Boxes– Rather it depends on the 3 mathematical operations

- XOR- Binary Addition of 16-bit number- Binary Multiplicatrion of 16-bit number

- These three functions are combined in such way that ,it is difficult to analyze.

- The Subkey generation algorithm depends on the use of the circular shifts .

– Used in PGP and Commercial Products

Page 20: Henric Johnson1 Chapter 2 Conventional Encryption Message Confidentiality

Henric Johnson 20

S-Boxes and P-Boxes

• Substitutions and Transpositions can be implemented with simple electrical circuits.

P-box S-box

Page 21: Henric Johnson1 Chapter 2 Conventional Encryption Message Confidentiality

Henric Johnson 21

Other Symmetric Block CiphersOther Symmetric Block Ciphers

• Blowfish– Developed by Bruce in 1993– Easy to implement– High execution speed – Run in less than 5K of memory– It uses s-boxes and XOR functions and also uses

binary addtions – Sub keys and S-Boxes are generated by repeated

application – 521 executions are needed to produce S-Boxes and

sub keys– It is also used for number of commercial applications – It is not suitable for the applications where the key frequently

changes

Page 22: Henric Johnson1 Chapter 2 Conventional Encryption Message Confidentiality

Henric Johnson 22

Other Symmetric Block Other Symmetric Block CiphersCiphers

• RC5– Developed by Ron Rivest in 1994– Suitable for hardware and software– Fast, simple– Adaptable to processors of different word lengths– Variable number of rounds– Variable-length key– Low memory requirement– High security– Data-dependent rotations– Used in the Products from RSA Data Security

• Cast-128– Key size from 40 to 128 bits– The round function differs from round to round

Page 23: Henric Johnson1 Chapter 2 Conventional Encryption Message Confidentiality

Henric Johnson 23

Cipher Block Modes of Cipher Block Modes of OperationOperation

• Cipher Block Chaining Mode (CBC)– The input to the encryption algorithm is the

XOR of the current plaintext block and the preceding ciphertext block.

– Repeating pattern of 64-bits are not exposed

ii1i1iiK1i

i1iiK

i1iKKiK

i1iki

PPCC][CDC

)P(C][CD

)]P(C[ED][CD

]P[CEC

Page 24: Henric Johnson1 Chapter 2 Conventional Encryption Message Confidentiality

Henric Johnson 24

Page 25: Henric Johnson1 Chapter 2 Conventional Encryption Message Confidentiality

Henric Johnson 25

Location of Encryption Location of Encryption DeviceDevice

• Link encryption:– A lot of encryption devices– High level of security– Decrypt each packet at every switch

• End-to-end encryption– The source encrypt and the receiver decrypts– Payload encrypted– Header in the clear

• High Security: Both link and end-to-end encryption are needed (see Figure 2.9)

Page 26: Henric Johnson1 Chapter 2 Conventional Encryption Message Confidentiality

Henric Johnson 26

Page 27: Henric Johnson1 Chapter 2 Conventional Encryption Message Confidentiality

Henric Johnson 27

Key DistributionKey Distribution

1. A key could be selected by A and physically delivered to B.

2. A third party could select the key and physically deliver it to A and B.

3. If A and B have previously used a key, one party could transmit the new key to the other, encrypted using the old key.

4. If A and B each have an encrypted connection to a third party C, C could deliver a key on the encrypted links to A and B.

Page 28: Henric Johnson1 Chapter 2 Conventional Encryption Message Confidentiality

Henric Johnson 28

Key Distribution (See Key Distribution (See Figure 2.10)Figure 2.10)

• Session key:– Data encrypted with a one-time

session key.At the conclusion of the session the key is destroyed

• Permanent key:– Used between entities for the purpose

of distributing session keys

Page 29: Henric Johnson1 Chapter 2 Conventional Encryption Message Confidentiality

Henric Johnson 29

Page 30: Henric Johnson1 Chapter 2 Conventional Encryption Message Confidentiality

Henric Johnson 30

Recommended ReadingRecommended Reading

• Stallings, W. Cryptography and Network Security: Principles and Practice, 2nd edition. Prentice Hall, 1999

• Scneier, B. Applied Cryptography, New York: Wiley, 1996

• Mel, H.X. Baker, D. Cryptography Decrypted. Addison Wesley, 2001