Alex Lecture 6
Alex Lecture 6
Encryption Modes
❖ Key Characteristics:
Block Cipher – 64-bit block size
Key Length – 128 bits
Encryption Rounds – 17 (or 8 as per description)
Mathematical Operations – XOR , Addition modulo 216 , Multiplication modulo 216 +1
➢ The decryption process in IDEA is identical to the encryption operation, except that the subkeys are
applied in reverse order.
IDEA: One Round Overview
• The encryption process consists of 17 rounds, categorized into even and odd rounds.
• 64-bit input is divided into four 16-bit sub-blocks: Xa, Xb, Xc, Xd.
• Each round performs operations to generate new values: Xa’, Xb’, Xc’, Xd ‘.
• Odd rounds utilize four subkeys (Kᵢ):
• First round: K₁, K₂, K₃, K₄
• Round 3: K₇, K₈, K₉, K₁₀
• Even rounds utilize two subkeys (Kᵢ):
• Round 2: K₅, K₆
• Round 4: K₁₁, K₁₂
IDEA: Key Expansion
❖ The 128-bit key is expanded into multiple subkeys used in encryption rounds.
❖ The key is divided into eight 16-bit subkeys:
➢ First set: K₁, K₂, K₃, K₄, K₅, K₆, K₇, K₈
❑ The decryption process is achieved by applying the inverse operations of the respective round keys.
IDEA: Even Round
The Security of IDEA
IDEA has been around for almost 15 years (1991 – 2006)
• Designed by Xuejia Lai and Jim Massey
• Its only limitation is its small block size
Purposes
• It is available under license
• It is widely used, e.g., in PGP
• its patent expired in 2012
Advanced Encryption Standard (AES)
❑ Developed by: Joan Daemen & Vincent Rijmen (Belgium)
❖ Designed for:
➢ Strong resistance against known cryptographic attacks
➢ High performance with efficient implementation on various CPUs
3. Final Round: Similar to the main rounds but excludes the MixColumns step.
4. Output: The transformed state serves as the encrypted output.
Key Observations:
• Each step is invertible, facilitating straightforward decryption when the key is known.
• The operations primarily rely on XOR and table lookups, ensuring high efficiency and speed.
• This structured process enhances security and performance, making AES a widely adopted standard.
AES Key Expansion Overview
❑ The AES key expansion process derives a set of round keys from the original encryption key:
• In general, the required key columns are (Nr + 1) × Nb, where Nr is the number of encryption rounds, and Nb is the block
size in columns.
• The expansion follows a structured process involving key transformation, substitution, and XOR operations using Rijndael
key-expansion constants.
This method ensures that each round key is unique and cryptographically secure, reinforcing AES's resistance to attacks.
AES State and Round Key Generation
o The AES encryption process initializes a state array from the 128-bit plaintext.
o A round key (rk) array is generated from the 128-bit encryption key.
o The round keys are derived through key expansion and applied sequentially during encryption
rounds to ensure security.
AES MixColumns Transformation
o Lookup-Based Optimization: Uses precomputed tables to accelerate the MixColumns operation.
o Enhances Data Mixing: Applies matrix multiplication over a finite field to strengthen security.
o Improves Efficiency: Reduces computational complexity, making encryption faster.
MixColumn Table
❑ Round keys are applied in reverse order, starting with KN and ending with K0 .
Summary of Symmetric-Key Cryptosystems
➢ Not all cryptographic systems in the market are standard; some, like Rijndael (AES) and Triple DES, are widely accepted as standards.
➢ Non-standard models, such as Blowfish and RC4, are still in use but may have weaknesses or performance issues.
➢ Some algorithms, like Twofish and Serpent, are strong alternatives and remain popular despite not being official standards.
Challenges of Symmetric Key Cryptography
❑ Scalability Issue: Requires 𝑁(𝑁−1)/2 unique keys for communication between 𝑁 users.
➢ Distribution of keys.
➢ Secure storage and backup.
➢ Proper key disposal.
➢ Frequent key changes.
Quantum Cryptography: The Ultimate Unbreakable Security
Quantum Communication: Photon Polarization and Basis
Alignment
✓ Alice and Bob use polarizers to encode and decode photons in horizontal/vertical and diagonal bases for secure communication.
✓ Bit transmission relies on photon polarization, with detection results ensuring information accuracy through basis alignment.
The Quantum Advantage: Unhackable Cryptographic Systems
▪ The lecture covered advanced cryptographic techniques, focusing on block ciphers like
IDEA and AES, highlighting their structures, encryption processes, and security strengths.
▪ The importance of robust encryption standards like AES was emphasized, ensuring
resistance to brute-force and cryptanalysis attacks.
▪ Symmetric key cryptography faces challenges such as key management and scalability,
despite its efficiency and widespread use.
❑ Books:
➢ Schneier, Bruce. Applied Cryptography. 2nd ed., Wiley, 1996.
➢ Stallings, William. Cryptography and Network Security: Principles and Practice. 8th ed., Pearson,
2020.
➢ Kaye, Phillip, Raymond Laflamme, and Michele Mosca. An Introduction to Quantum Computing.
Oxford University Press, 2007.
THANK YOU