modern symmetric cipher

50
Modern Symmetric Key Algorithm By Prof : Rupesh Mishra

Upload: rupesh-mishra

Post on 03-Jul-2015

177 views

Category:

Technology


2 download

DESCRIPTION

Modern symmetric techniques

TRANSCRIPT

Page 1: Modern symmetric cipher

Modern Symmetric Key

AlgorithmBy Prof : Rupesh Mishra

Page 2: Modern symmetric cipher
Page 3: Modern symmetric cipher

Algorithm Type

Stream Cipher

Block Cipher

Page 4: Modern symmetric cipher

Stream Cipher

• Bit by Bit encryption and Decryption

• Encoding and Decoding

• XOR Logic Operation

• RC4

Page 5: Modern symmetric cipher

Block Cipher

• Block of text encrypted and decrypted

Page 6: Modern symmetric cipher
Page 7: Modern symmetric cipher

Confusion

• Substitution Technique

• No clue about Key from ciphertext

Page 8: Modern symmetric cipher

Diffusion

• No clue about plaintext from ciphertext

• Transposition Technique

Page 9: Modern symmetric cipher

Modes of Algorithm

• Electronic Code Book (ECB)

• Cipher Block Chaining (CBC)

• Cipher Feedback Mode (CFB)

• Output Feedback Mode (OFB)

• Counter Mode

Page 10: Modern symmetric cipher

Electronic Code Book

Page 11: Modern symmetric cipher

Drawback of ECB

• Identical blocks of ciphertext.

• An eavesdropper notices that blocks 23 and

95 of the ciphertext are equal.

• If, in addition, he knows (or can guess) the

value of block 23 of plaintext, he can then

deduce the content of block 95 of the

plaintext

Page 12: Modern symmetric cipher

Cipher Block Chaining

Page 13: Modern symmetric cipher

Cipher Feedback Mode

Page 14: Modern symmetric cipher

Cipher Feedback Mode

Page 15: Modern symmetric cipher

Output Feedback Mode

Page 16: Modern symmetric cipher
Page 17: Modern symmetric cipher

Counter Mode

Page 18: Modern symmetric cipher

Counter Mode • A b-bit counter is initialized to a random value.

This value is encrypted with the secret key.

• Encrypted value is XORed with the first block of

plaintext

• The counter is then incremented.

• the incremented value is encrypted and XORed

with the next block of plaintext to create the

ciphertext and so on.

Page 19: Modern symmetric cipher

Original ECB CBC

Page 20: Modern symmetric cipher
Page 21: Modern symmetric cipher

DES

• Data Encryption Standard/Algorithm

• Adopted in 1977 by National Institute of

Standards and Technology (NIST)

• Plaintext 64 bit/Block

• Key 56 bit

Page 22: Modern symmetric cipher

64 bit

Plaintext

DES

64 bit

Ciphertext

56 bit

Key

Page 23: Modern symmetric cipher

L0 R0

F

L1 R1

𝑲𝒆𝒚

Page 24: Modern symmetric cipher

Steps in DES1. Initial Permutation

2. 16 Round of Feistel Function

3. Final Permutation

Page 25: Modern symmetric cipher
Page 26: Modern symmetric cipher
Page 27: Modern symmetric cipher

Feistel Function

1. Expansion Permutation

2. S – Box Substitution

3. P – Box Permutation

Page 28: Modern symmetric cipher
Page 29: Modern symmetric cipher
Page 30: Modern symmetric cipher
Page 31: Modern symmetric cipher

Key Generation

• Key Discarding Process

• Key Transformation

• Sub - Key Generation

Page 32: Modern symmetric cipher
Page 33: Modern symmetric cipher
Page 34: Modern symmetric cipher

• DES Decryption

• DES Cryptanalysis

o Keyspace

o Diffrential and Linear cryptanalysis

• Variations of DES

o Double DES

o Triple DES

Page 35: Modern symmetric cipher

Advanced Encryption Standard (AES)

Page 36: Modern symmetric cipher

Introduction

• Regular DES is not very secure and triple

DES is slow. The block size in both is 64 bits

• A more secure secret key algorithm with a

larger block size is desirable

• In 2001, Rijndael was selected by NIST from

among 5 finalists as the new standard

Page 37: Modern symmetric cipher

AES features

• Block size = 128 bits

• Key size = 128/192/256 bits

• No of rounds = 10, 12 or 14

• Does not have a Fiestal structure

Page 38: Modern symmetric cipher

AES Encryption• Each round includes

– Byte substitution

– Row shift

– Column mixing

– Subkey Addition

Page 39: Modern symmetric cipher

Byte Substitution

Page 40: Modern symmetric cipher
Page 41: Modern symmetric cipher

S-Box Operation

B

(Input)

GF(28) Inverse

Affine Mapping

B’

(Output)

Page 42: Modern symmetric cipher
Page 43: Modern symmetric cipher

Row Shift

Page 44: Modern symmetric cipher

MixCol

Page 45: Modern symmetric cipher

Mix Column

Page 46: Modern symmetric cipher

Add Round Key

Page 47: Modern symmetric cipher

Add Round Key

Page 48: Modern symmetric cipher
Page 49: Modern symmetric cipher

Symmetric Key Cipher

• Single Shared Key is used for Encryption and

Decryption.

• Fast and Effective

• DES , AES , Salsa20

• Limitation

o Key Exchange

o Repetition of Key

Page 50: Modern symmetric cipher