CSE2203 - Lecture 4 - Modern Cryptography and Cryptographic Mechanisms
CSE2203 - Lecture 4 - Modern Cryptography and Cryptographic Mechanisms
LECTURE 4
Computer and Information
Security Fundamentals
(CSE 2203)
SEMESTER II (2021-2022)
●Email: [email protected]
●Whatsapp: 686-1770
- Assignment 1 (10%)
- Write up due
April 21st, 2022
- BONUS MARKS!!! Up to 5% for
participation in the Online
Tutorial Forum
[Lilien, 2007]
[cf. J. Leiwo]
n * (n -1) /2 keys
door) safe
◼ Need safe door key to get doc from
• Need safe key to deposit doc in
safe safe
• Need safe key to get doc from [Symmetric - cf. Barbara Endicott-Popovsky,
safe U.Washington, Source: D. Frincke, U. of Idaho]
◼ Outline
1. Background and History of DES
2. Overview of DES
3. Double and Triple DES
4. Security of DES
◼ Nov. 1976 – DES adopted as US standard for sensitive but unclassified data /
communication
◼ Later adopted by ISO (Int’l Standards Organization)
◼ Official name: DEA - Data Encryption Algorithm / DEA-1 abroad
S and permutation P
S K
◼ K - user-supplied key
P
◼ Ki - round key:
◼ 56 bits used +8 unused
(unused for E but often used for error checking) L1 R1
K1
◼ Output: 64 bits (a block)
L16 R16
◼ Note: Ri becomes L(i+1) K16
PC-1
PC-2 also extracts 48 of 56 bits
▪ K1 – K16 – round keys (outputs)
C0 D0 ▪ Length(Ki) = 48
▪ Ci / Di – confusion / diffusion (?)
LSH LSH ▪ LSH –left shift (rotation) tables
PC-2 K1
C1 D1
LSH LSH
PC-2 K16
[Fig: cf. Barbara Endicott-Popovsky, U. Washington]
LECTURE 4 / CSE2203 / 2022 / Lecturer: Sandra Khan
Problems with DES
The University of Guyana
Faculty of Natural Sciences
▪ Double DES:
▪ Use double DES encryption
C = E(k2, E(k1, P) )
▪ Expected to multiply difficulty of breaking the encryption
▪ Not true!
▪ In general, 2 encryptions are not better than one
[Merkle, Hellman, 1981]
▪ Only doubles the attacker’s work
▪ Triple DES:
▪ Is it C = E(k3, E(k2, E(k1, P) ) ?
▪ Not soooo simple!
LECTURE 4 / CSE2203 / 2022 / Lecturer: Sandra Khan
Double and Triple DES
The University of Guyana
Faculty of Natural Sciences
▪ Triple DES:
▪ Tricks used:
D not E in the 2nd step, k1 used twice (in steps 1 & 3)
▪ It is:
C = E(k1, D(k2, E(k1, P) )
and
P = D(k1, E(k2, D(k1, C) )
◼ Outline
1. The AES Contest
2. Overview of Rijndael
3. Strength of AES
4. Comparison of DES and AES
◼ Publicly disclosed
◼ Royalty-free worldwide
◼ MARS by IBM
◼ RC6 by RSA Laboratories
◼ Rijndael by Joan Daemen and Vincent Rijmen
◼ Serpent by Ross Anderson, Eli Biham and Lars Knudsen
◼ Twofish by Bruce Schneier, John Kelsey, Doug Whiting, Dawid Wagner,
Chris Hall and Niels Ferguson
◼ Evaluation of finalists
◼ Public and private scrutiny
◼ Key evaluation areas:
security / cost or efficiency of operation /
ease of software implementation
◼ Adopted by US gov’t as
Federal Info Processing Standard 197 (FIPS 197)
DES AES
Date 1976 1999
Block size [bits] 64 128
Key length [bits] 56 (effect.) 128, 192, 256, or more
Encryption substitution, substitution, shift, bit
Primitives permutation mixing
Cryptographic confusion, confusion,
Primitives diffusion diffusion
Design open open
Design closed open
Rationale
Selection secret secret, but accepted
process public comments
Source IBM, enhan- independent Dutch
ced by NSA cryptographers
◼ Weaknesses in AES?
◼ 20+ yrs of experience with DES eliminated fears of its
weakness (intentional or not)
◼ Might be naïve…
◼ Longevity of AES?
◼ DES is 30 yrs old (1976)
◼ DES-encrypted message can be cracked in days
Rivest-Shamir-Adelman Algorithm
Hash functions
Key exchange
Digital signatures
Certificates
It must be unforgeable
It must be authentic
It is not alterable
It is not reusable
Required Readings:
Recommended Reading(s)
Stallings, W. (2007). Network security essentials: applications
and standards. Pearson Education India.
https://www.sans.org/security-resources/glossary-of-terms/
Department of Computer Science / CSE2203 / 2022 / Lecturer: Sandra Khan
The University of Guyana REFERENCES
Faculty of Natural Sciences