Potential Locations For Confidentiality Attacks
Potential Locations For Confidentiality Attacks
•An eavesdropper can monitor the traffic on the LAN and capture any
traffic desired on the basis of source and destination addresses.
•If part or all of the LAN is wireless, then the potential for
eavesdropping is greater.
Active attacks, the attacker needs to gain physical control of a portion
of the link and be able to insert and capture transmissions.
The block size is 64 bits, and the key can be any length up to 448
bits.
Blowfish has a 64-bit block size and a variable key length from 32
up to 448 bits. It is a 16-round Feistel cipher and uses large key-
dependent S-boxes
•Manipulates data in large blocks
• Has a 64-bit block size.
• Has a scalable key, from 32 bits to at least 256 bits.
• Uses simple operations that are efficient on microprocessors.
The digits of the 128-bit key are shifted 25 bits to the left to
make a new key which is split into the next eight 16-bit
subkeys
The encryption involves modular multiplication with a
modulus of ((2^16)+1) and addition with a modulus of (2^16).
The 64-bit plaintext block is split into four 16-bit segment which
we'll call p1, p2, p3 and p4. The subkeys are s1, s2, s3, s4
....s52.
The encryption consists of eight rounds with each round involving
the following steps:
p1 x s1 --> d1
p2 + s2 --> d2
p3 + s3 --> d3
p4 x s4 --> d4
d1 XOR d3 --> d5
d2 XOR d4 --> d6
d5 x s5 --> d7
d6 + d7 --> d8
d8 x s6 --> d9
d7 + d9 --> d10
d1 XOR d9 --> d11
d3 XOR d9 --> d12
d2 XOR d10 --> d13
d4 XOR d10 --> d14
After this process the output blocks d12, d13 are exchanged so that
d11, d13, d12 and d14 are used as input to the next round (in that
order) along with the next 6 subkeys, s7 to s12.
This procedure is followed for eight rounds in total giving four output
blocks which we'll call e1, e2, e3 and e4.
Four more steps using the last four subkeys complete the
encryption:
e1 x s49 --> c1
e2 + s50 --> c2
e3 + s51 --> c3
e4 x s52 --> c4
Design – Mixing operations from different algebraic groups
- XOR
- Addition modulo 216
- Multiplication modulo 216 + 1
Description of IDEA
64 bit sub blocks: p1, p2, p3, p4. 4 sub-block become the I/P to the first
round of the algorithm. There are 8 rounds total
Each round the four 4 sub blocks are XORed, added, and multiplied
with one another and with six 16 bit sub-keys
Traffic Confidentiality
Knowledge about the number and length of messages between
nodes may enable an opponent to determine who is talking to
whom.
•Identities of partners