Lecture - 6 DES - Cipher Modes - Padding Techniques
Lecture - 6 DES - Cipher Modes - Padding Techniques
Padding Techniques
Agenda
• Triple-DES
• Block Cipher Modes
• Padding Techniques
Agenda
• Triple-DES
• Block Cipher Modes
• Padding Techniques
Why not DES ?
• Block size
• Key size
• Number of rounds
• Subkey generation algorithm
• Round function
• Fast software en/decryption
• Ease of analysis
Triple-DES with Two-Keys
• Triple-DES
• Block Cipher Modes
• Padding Techniques
Modes of Operations : Introduction
Message
DES K
abcdefghabcdefghabcdefghabcdefghabcdefgh
DES K
(M+K)
Same Output
Same Input
Threat:
Traffic Analyses
Replay Attack
Modes of Operations
• One solution to the problems of ECB is to chain the output from one
block to the next. To start the chaining an initial block (unique to each
message) is used (call it C0).
• In this mode, identical message encrypt to different outputs. This
makes replay impossible.
Cipher Block Chaining (CBC)
• Security:
• Plaintext patterns are concealed by XORing with previous ciphertext block.
• Input to the block cipher is randomized by XORing with the previous ciphertext
block.
• More than one message can be encrypted with the same key.
Advantages and Limitations of CBC
• Efficiency:
• Speed is the same as the block cipher (appx).
• No preprocessing is possible.
• Encryption is not parallelizable; decryption is parallelizable
and has a random-access property.
• Fault-tolerance:
•A ciphertext error affects one full block of plaintext and the
corresponding bit in the next block.
Decryption
Advantages and Limitations of CFB
•Security:
• Plaintext patterns are concealed.
• Input to the block cipher is randomized.
• More than one message can be encrypted with the same provided that a
different IV is used.
Advantages and Limitations of CFB
• Efficiency:
• Speed strictly less than the same as the block cipher.
• Ciphertext is the same size as the plaintext, not counting the IV.
• Encryption is not parallelizable; decryption is parallelizable
• Some pre-processing is possible before a block is seen; the previous
ciphertext block can be encrypted.
Output FeedBack (OFB)
• Security:
• Plaintext patterns are concealed.
• Input to the block cipher is randomized.
• More than one message can be encrypted with the same key, provided that a
different IV is used.
• Plaintext is very easy to manipulate; any change in ciphertext directly
affects the plaintext.
Output FeedBack (OFB)
• Efficiency
• Speed is strictly less than the block cipher.
• Ciphertext is the same size as the plaintext, not count
• Ciphertext is the same size as the plaintext, not counting IV
• Processing is possible before the message is seen.
• OFB processing is not parallelizable
• Fault-tolerance:
• A ciphertext error affects only the corresponding bit of
plaintext.
• Synchronization error is unrecoverable.
Agenda
• Triple-DES
• Block Cipher Modes
• Padding Techniques
Padding
• Discussion on 3-DES
• Different modes of operations for block ciphers
• CBC is more practical and suitable for applications
• Padding techniques