Introduction to Symmetric Block Cipher
seminar class Active In SP Posts: 5,361 Joined: Feb 2011 
16022011, 09:33 AM
7000_1.ppt (Size: 344.5 KB / Downloads: 262) Introduction to Symmetric Block Cipher Cryptography • Encryption algorithm also called a cipher • Cryptography has evolved so that modern encryption and decryption use secret keys • Cryptographic algorithms can be openly published • Only have to protect the keys SymmetricKey Cryptography • Both sender and receiver keys are the same: KA=KB • The keys must be kept secret and securely distributed • Thus, also called “Secret Key Cryptography” • Data Encryption Standard (DES) Cryptanalysis • Brute force: try every key • Ciphertextonly attack: • Attacker knows ciphertext of several messages encrypted with same key (but doesn’t know plaintext). • Possible to recover plaintext (also possible to deduce key) by looking at frequency of ciphertext letters • Knownplaintext attack: • Attackers observes pairs of plaintext/ciphertext encrypted with same key. • Possible to deduce key and/or devise algorithm to decrypt ciphertext. Cryptanalysis (2) • Chosenplaintext attack: • Attacker can choose the plaintext and look at the paired ciphertext • Attacker has more control than knownplaintext attack and may be able to gain more info about key • Adaptive ChosenPlaintext attack: • Attacker chooses a series of plaintexts, basing the next plaintext on the result of previous encryption • Examples • Differential cryptanalysis – DES is resistant it • Linear cryptanalysis • Cryptanalysis attacks often exploit the redundancy of natural language • Lossless compression before encryption removes redundancy Examples • Simple and nonsecure ciphers – Shift Cipher – Caesar Cipher – Affine Cipher – Vigenere Cipher – Hill Cipher • Informationsecure cipher – OneTime Pad Confusion and Diffusion • Terms courtesy of Claude Shannon, father of Information Theory • “Confusion” = Substitution • a > b • Caesar cipher • “Diffusion” = Transposition or Permutation • abcd > dacb • DES Confusion and Diffusion (2) Confusion” : a classical Substitution Cipher • Modern substitution ciphers take in N bits and substitute N bits using lookup table: called SBoxes Confusion and Diffusion (3) Diffusion” : a classical Transposition cipher • modern Transposition ciphers take in N bits and permute using lookup table : called PBoxes Block Cipher • Divide input bit stream into nbit sections, encrypt only that section, no dependency/history between sections In a good block cipher, each output bit is a function of all n input bits and all k key bits Example: DES • Data Encryption Standard (DES) • Encodes plaintext in 64bit chunks using a 64bit key (56 bits + 8 bits parity) • Uses a combination of diffusion and confusion to achieve security • Was cracked in 1997 • Parallel attack – exhaustively search key space • Decryption in DES – it’s symmetric! Use KA again as input and then the same keys except in reverse order Example: DES (2) • DES • 64bit input is permuted • 16 stages of identical operation • differ in the 48bit key extracted from 56bit key  complex • R2= R1 is encrypted with K1 and XOR’d with L1 • L2=R1, … • Final inverse permutation stage Beyond DES • TripleDES: put the output of DES back as input into DES again with a different key, loop again: 3*56 = 168 bit key • Advanced Encryption Standard (AES) – Requirements: • shall be designed so that the key length may be increased as needed. • block size n = 128 bits, key size k = 128, 192, 256 bits – Candidates: MARS, twofish, RC6, Serpent, Rijndael – successor (Rijndael) Encryption Mode (ECB) • Electronic Code Book (ECB) mode for block ciphers of a long digital sequence • Vulnerable to replay attacks: if an attacker thinks block C2 corresponds to $ amount, then substitute another Ck • Attacker can also build a codebook of <Ck, guessed Pk> pairs Encryption Mode (CBC) • Cipher Block Chaining (CBC) mode for block ciphers • Inhibits replay attacks and codebook building: identical input plaintext Pi =Pk won’t result in same output code due to memorybased chaining • IV = Initialization Vector – use only once Stream Cipher • Stream ciphers • Rather than divide bit stream into discrete blocks, as block ciphers do, XOR each bit of your plaintext continuous stream with a bit from a pseudorandom sequence • At receiver, use same symmetric key, XOR again to extract plaintext Encryption Mode (OFB) 


