Transcript
Page 1: Computer and Data Security · Converts block cipher into stream cipher ! Similar to CFB, except input to encryption algorithm is preceding encryption output ! Typical applications:

Computer and Data Security

Lecture 4 Block Cipher Operation

Page 2: Computer and Data Security · Converts block cipher into stream cipher ! Similar to CFB, except input to encryption algorithm is preceding encryption output ! Typical applications:

Modes of Operation

l  Block cipher: operates on fixed length b-bit input to produce b-bit ciphertext

l  What about encrypting plaintext longer than b bits? l  Break plaintext into b-bit blocks (padding if

necessary) and apply cipher on each block l  Security issues arise: different modes of operation

have been developed

Page 3: Computer and Data Security · Converts block cipher into stream cipher ! Similar to CFB, except input to encryption algorithm is preceding encryption output ! Typical applications:

ECB Encryption

Page 4: Computer and Data Security · Converts block cipher into stream cipher ! Similar to CFB, except input to encryption algorithm is preceding encryption output ! Typical applications:

ECB Decryption

Page 5: Computer and Data Security · Converts block cipher into stream cipher ! Similar to CFB, except input to encryption algorithm is preceding encryption output ! Typical applications:

Summary

l  Each block of 64 plaintext bits is encoded independently using same key

l  Typical applications: secure transmission of single values (e.g. encryption key)

l  Problem: with long message, repetition in plaintext may cause repetition in ciphertext

Page 6: Computer and Data Security · Converts block cipher into stream cipher ! Similar to CFB, except input to encryption algorithm is preceding encryption output ! Typical applications:

CBC Encryption

Page 7: Computer and Data Security · Converts block cipher into stream cipher ! Similar to CFB, except input to encryption algorithm is preceding encryption output ! Typical applications:

CBC Decryption

Page 8: Computer and Data Security · Converts block cipher into stream cipher ! Similar to CFB, except input to encryption algorithm is preceding encryption output ! Typical applications:

CBC Summary

l  Input to encryption algorithm is XOR of next 64-bits plaintext and preceding 64-bits ciphertext

l  Typical applications: General-purpose block-oriented transmission; authentication

l  Initialisation Vector (IV) must be known by sender/receiver, but secret from attacker

Page 9: Computer and Data Security · Converts block cipher into stream cipher ! Similar to CFB, except input to encryption algorithm is preceding encryption output ! Typical applications:

CFB Encryption

Page 10: Computer and Data Security · Converts block cipher into stream cipher ! Similar to CFB, except input to encryption algorithm is preceding encryption output ! Typical applications:

CFB Decryption

Page 11: Computer and Data Security · Converts block cipher into stream cipher ! Similar to CFB, except input to encryption algorithm is preceding encryption output ! Typical applications:

CFB Summary

l  Converts block cipher into stream cipher Ø  No need to pad message to integral number of blocks Ø  Operate in real-time: each character encrypted and

transmitted immediately

l  Input processed s bits at a time l  Preceding ciphertext used as input to cipher to

produce pseudo-random output l  XOR output with plaintext to produce ciphertext l  Typical applications: General-purpose stream-

oriented transmission; authentication

Page 12: Computer and Data Security · Converts block cipher into stream cipher ! Similar to CFB, except input to encryption algorithm is preceding encryption output ! Typical applications:

OFB Encryption

Page 13: Computer and Data Security · Converts block cipher into stream cipher ! Similar to CFB, except input to encryption algorithm is preceding encryption output ! Typical applications:

OFB Decryption

Page 14: Computer and Data Security · Converts block cipher into stream cipher ! Similar to CFB, except input to encryption algorithm is preceding encryption output ! Typical applications:

OFB Summary

l  Converts block cipher into stream cipher l  Similar to CFB, except input to encryption algorithm is

preceding encryption output l  Typical applications: stream-oriented transmission over

noisy channels (e.g. satellite communications) l  Advantage compared to OFB: bit errors do not

propagate l  Disadvantage: more vulnerable to message stream

modification attack

Page 15: Computer and Data Security · Converts block cipher into stream cipher ! Similar to CFB, except input to encryption algorithm is preceding encryption output ! Typical applications:

CTR Encryption

Page 16: Computer and Data Security · Converts block cipher into stream cipher ! Similar to CFB, except input to encryption algorithm is preceding encryption output ! Typical applications:

CTR Decryption

Page 17: Computer and Data Security · Converts block cipher into stream cipher ! Similar to CFB, except input to encryption algorithm is preceding encryption output ! Typical applications:

CTR Summary

l  Converts block cipher into stream cipher l  Each block of plaintext XORed with encrypted

counter l  Typical applications: General-purpose block-oriented

transmission; useful for high speed requirements l  Efficient hardware and software implementations l  Simple and secure


Top Related