Cryptography and Network Security: Sixth Edition by William Stallings
Cryptography and Network Security: Sixth Edition by William Stallings
and Network
Security
Sixth Edition
by William Stallings
Chapter 6
Block Cipher Operation
“ Many savages at the present day regard their
names as vital parts of themselves, and therefore
take great pains to conceal their real names, lest
these should give to evil-disposed persons a handle
by which to injure their owners.”
— The Golden Bough,
Sir James George Frazer
Double DES
Meet-in-the-Middle Attack
Triple-DES with Two-Keys
• Obvious counter to the meet-in-the-middle attack is to
use three stages of encryption with three different keys
• This raises the cost of the meet-in-the-middle attack to
2112, which is beyond what is practical
• Has the drawback of requiring a key length of 56
x 3 = 168 bits, which may be somewhat unwieldy
• As an alternative Tuchman proposed a triple encryption
method that uses only two keys
• Software efficiency
Advantages
• Preprocessing
of
• Random access
CTR
• Provable security
• Simplicity
Feedback
Characteristics
of
Modes
of
Operation
XTS-AES Mode for Block-Oriented
Storage Devices
• Approved as an additional block cipher mode
of operation by NIST in 2010
• Mode is also an IEEE Standard, IEEE Std 1619-
2007
• Standard describes a method of encryption for
data stored in sector-based devices where the
threat model includes possible access to stored
data by the adversary
• Has received widespread industry support
Tweakable Block Ciphers
• XTS-AES mode is based on the concept of a tweakable block
cipher
• General structure:
• Has three inputs:
Produces
a
ciphertext
output
C