CH02-Cryptographic Tools - 2
CH02-Cryptographic Tools - 2
CH02-Cryptographic Tools - 2
Cryptographic Tools
Cryptographic algorithms and protocols
can be grouped into four main areas:
Symmetric encryption
Asymmetric encryption
• Used to conceal small blocks of data, such as encryption keys and hash
function values, which are used in digital signatures
Authentication protocols
Stream
Transposition
cipher
© 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
Attacking Symmetric
Encryption
Cryptanalytic Attacks Brute-Force Attack
Rely on: Try all possible keys on some
Nature of the algorithm ciphertext until an intelligible
Some knowledge of the general translation into plaintext is obtained
characteristics of the plaintext On average half of all possible keys
must be tried to achieve success
Some sample plaintext-ciphertext
pairs
Exploits the characteristics of the
algorithm to attempt to deduce a
specific plaintext or the key being
used
If successful all future and past
messages encrypted with that key are
compromised
© 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
Table 2.1
Strength concerns:
Concerns about algorithm
DES is the most studied encryption algorithm in existence
Use of 56-bit key
Electronic Frontier Foundation (EFF) announced in July
1998 that it had broken a DES encryption
General structure of DES
6.12
Figure DES cipher and reverse cipher for the first approach
6.13
Table 4.3 Avalanche Effect in DES: Change in Plaintext
© 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
Triple DES (3DES)
Repeats basic DES algorithm three times using either two or
three unique keys
First standardized for use in financial applications in ANSI
standard X9.17 in 1985
Attractions:
168-bit key length overcomes the vulnerability to brute-force attack of
DES
Underlying encryption algorithm is the same as in DES
Drawbacks:
Algorithm is sluggish in software
Uses a 64-bit block size
The Advanced Encryption
Standard (AES)
Needed a NIST called for Selected
replacement for proposals for a Rijndael in
3DES new AES in 1997 November 2001
Should have a security
strength equal to or better
than 3DES
Significantly improved
3DES was not efficiency
Published as
reasonable for long
term use FIPS 197
Symmetric block cipher
7.18
Modes of Operation
Typically symmetric encryption is applied to a unit of data
larger than a single 64-bit or 128-bit block
Electronic codebook (ECB) mode is the simplest approach to
multiple-block encryption
Each block of plaintext is encrypted using the same key
Cryptanalysts may be able to exploit regularities in the plaintext
Modes of operation
Alternative techniques developed to increase the security of symmetric
block encryption for large sequences
Overcomes the weaknesses of ECB
© 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
Table 2.2
Stream Cipher
• Processes the input elements continuously
• Produces output one element at a time
• Primary advantage is that they are almost always faster and use far less
code
• Encrypts plaintext one byte at a time
• Pseudorandom stream is one that is unpredictable without knowledge of
the input key
© 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
The RC4 Stream Cipher
• Designed in 1987 by Ron Rivest for RSA Security
Protects against
active attacks
Can use
• Only sender & receiver share a
conventional key
encryption
© 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
Hash Functions
• A hash function H accepts a variable-length
block of data M as input and produces a fixed-
size hash value : h = H(M)
• Principal object is data integrity
Asymmetric
• Uses two
Publicly separate keys
• Public key Some form of
proposed by Based on
and private protocol is
Diffie and mathematical
key needed for
Hellman in functions • Public key is distribution
1976 made public
for others to
use
Plaintext
Readable message or data that is fed into the algorithm as input
Encryption algorithm
Performs transformations on the plaintext
Public and private key
Pair of keys, one for encryption, one for decryption
Ciphertext
Scrambled message produced as output
Decryption key
Produces the original plaintext
User encrypts data using his or her own
private key
Computationally easy
Useful if either key can for sender knowing
be used for each role public key to encrypt
messages
Computationally
infeasible for opponent to
determine private key
from public key
Applications for Public-Key
Cryptosystems
• Public-key cryptosystems can be classified into
three categories:
• The sender encrypts a message
Encryption/decryption with the recipient’s public key
n = 309 digits.
distribution of
public keys.
Virtually all these
proposals can be Public-key Public-key
grouped into the authority certificates
following
general schemes:
© 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
Summary
• Confidentiality with
symmetric encryption • Public-key encryption
Structure
Symmetric encryption
Applications for public-key
Symmetric block encryption cryptosystems
algorithms Requirements for public-key
Stream ciphers cryptography
Asymmetric encryption
• Message authentication algorithms
and hash functions • Digital signatures and
Authentication using symmetric key management
encryption Digital signature
Message authentication without Public-key certificates
message encryption Symmetric key exchange using
Secure hash functions public-key encryption
Digital envelopes
Other applications of hash
functions
• Random and
pseudorandom numbers
The use of random numbers