An Introduction of Cryptology (Keeper)
An Introduction of Cryptology (Keeper)
Contents --------------------
1. Introduction-2p
2. Threat method-2p
3. Security services-2p
4. Confidentiality model-3p
5. Classical cryptosystems-3p
6. LFSR systems-5p
7. DES-5p
8. ECB-7p
9. ECS-7p
10. AES-7p
1. Introduction
-conception
Cryptography
designing systems to do secure communication over insecure channels
Cryptanalysis
breaking such systems
2. threat method
3. Security Services.
1. Confidentiality – any person cannot read the middle of transmission
(Encryption algorithm – Symmetric key algorithms, public key algorithms, etc.)
2. Integrity – Receiver check that transmitter‟s sending data has not been changed.
(Digital Signature – RSA, DSA)
3. Authentication – Receiver make sure that communication partner is correct transmitter
4. Access Control – Prevention of unauthorized use of a resource
5. Availability – A system or a system resource should be accessible and usable
4. Confidentiality Model
5. Classical Cryptosystems
A. Shift Ciphers
Encryption method
Eliminate all spaces -> Shift each letter by (N) places
Decryption method
Shift back by (N)spaces
Attack method
Substitution all the 26 ways, known plaintext attack
C. Transposition Ciphers
Encryption method
There are many methods. Rail Fence Cipher, Row Transposition Ciphers are
representative
Key 4 3 1 2 5 6 7
Plaintext a t t a c k P
o s t p o n e
d u n t i l T
w o a m x y z
Ciphertext TTNAAPTMTSUOAODWCOIXKNLYPETZ
D. Rotor Machines.
Before modern ciphers, rotor machines were most common product cipher. Rotor
Machines were widely used in World War II. Used a series of cylinders, each
giving one substitution, which rotated and changed after each letter was
encrypted
German – Enigma, Allied – Hagelin, Japanese – Purple
6. LFSR Sequences.
LFSR means Linear Feedback Shift Register. It‟s defined by a linear recurrence. LFSR
implemented very easily, especially in hardware. And fast encode speed is advantage
point too.
->Improvement : The problem is that the recurrence is linear, and an attacker can
make matrix equation. So, we append some nonlinear elements.
with 128bit key. Then redeveloped as a commericial cipher with input from NSA
and others. In 1973 NBS issued request for proposals for a national cipher
standard. IBM submitted their revised Lucifer which was eventually accepted as
the DES
DES has became widely used, especially in financial applications until 1998. In
1998 Electronic Frontier Foundation (EFF) implemented indiscriminate substitute
attack. And it broke DES in 56hours. Nowadays, AES(Advanced Encryption
Standard) is frequently used.
B. Algorithm
A. Algorithm
1. Key Expansion - round keys are derived from the cipher key using Rijndael's
key schedule
2. Initial Round
a. AddRoundKey - each byte of the state is combined with the round key
using bitwise xor
3. Rounds
a. SubBytes - each byte is replaced with another according to a lookup
table. This operation provides the non-linearity in the cipher.
b. ShiftRows – each row of the state is rotate by a certain number of steps
c. MixColumns - the four bytes of each column of the state are combined
using an invertible linear transformation. The MixColumns function takes
four bytes as input and outputs four bytes, where each input byte affects
all four output bytes. Together with ShiftRows, MixColumns provides
diffusion in the cipher.
d. AddRoundkKey – In the AddRoundKey step, the subkey is combined with
the state. For each round, a subkey is derived from the main key using
Rijndael's key schedule; each subkey is the same size as the state. The
subkey is added by combining each byte of the state with the
corresponding byte of the subkey using bitwise XOR.
그림 1 In the SubBytes step, each byte in the state is replaced with its entry in a fixed 8-
bit lookup table, S; bij = S(aij).
그림 2 In the ShiftRows step, bytes in each row of the state are shifted cyclically to the
left. The number of places each byte is shifted differs for each row.
그림 3 In the MixColumns step, each column of the state is multiplied with a fixed
polynomial c(x).
그림 4 In the AddRoundKey step, each byte of the state is combined with a byte of the
round subkey using the XOR operation (⊕).
11. Reference
http://en.wikipedia.org/wiki/XSL_attack#Application_to_block_ciphers
http://en.wikipedia.org/wiki/Rijndael
http://blog.naver.com/proonan29?Redirect=Log&logNo=130082479064
http://en.wikipedia.org/wiki/Block_cipher_modes_of_operation