Understanding Symmetric Key Block Ciphers - Overview and Implementation

Slide Note
Embed
Share

Delve into the world of symmetric key block ciphers through a detailed exploration of classical ciphers like substitution and transposition, modern cryptography advancements, DES encryption, Simplified DES, key scheduling, expansion functions, S-Box usage, and more. Discover the intricacies of encryption techniques and key management for secure data transmission.


Uploaded on Sep 08, 2024 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. Download presentation by click this link. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

E N D

Presentation Transcript


  1. Symmetric Key Block Ciphers

  2. Classical Ciphers Substitution Transposition

  3. Modern Cryptography Data Encryption Standard 1977 New Directions in Cryptography 1976

  4. Ciphers Symmetric key block ciphers Public key ciphers Stream ciphers Post-quantum ciphers

  5. Stream Ciphers Stream ciphers

  6. Data Encryption Standard 1977 Horst Feistel (1915 1990) Simplified DES: Wade Trapp and Lawrence Washington

  7. Data Encryption Standard 1976

  8. DES DES Simplified DES 64-bit block 56-bit key (8 parity bits) 8 S-boxes 6 x 4 16 rounds Feistel cipher 12-bit block 9-bit key 2 S-boxes 4 x 3 4 rounds Feistel cipher

  9. Simplified DES FeistelCipher

  10. Key and Message

  11. Key Schedule 9 bits of key 111 010 110 Use the 8 bits on the left for k1 1110 1011 Rotate to the left one bit 110 101 101 Use the 8 bits on the left for k12 1101 0110 Rotate to the left 1 bit 101 011 011 Use the 8 bits on the left for k3 1010 1101 Rotate to the left 1 bit 010 110 111 Use the 8 bits on the left for k4 0101 1011

  12. Expansion Function and XOR

  13. S-Box 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 S S 1 2 0 1 101 010 001 100 110 001 110 011 100 111 000 000 111 101 011 0 1 100 101 000 110 101 111 011 000 111 110 001 011 010 010 001 100 010

  14. DES Encryption L R i i = = , L R R L f R K + + i i i i 1 1 i i

  15. DES Decryption L R i i Encryption = = , L R R L f R K + + i i i i 1 1 i i = = , L R R L f R K + + i i i i 1 1 i i Decryption = = , L R f R K R L + + i i i i 1 1 i i

  16. DES Decryption Encryption Decryption

  17. Secrecy of Algorithm Backdoor?

  18. 3DES 112-bit security 1plaintext K E D E 3 2 K K

  19. Security Level Perfect Security Random key, as long as the message, and used only once. Computational Security Symmetric Key RSA and DH ECC 80 112 128 192 256 1024 2048 3072 7680 15360 160 224 256 384 521 Today 128

  20. Block Cipher Modes

  21. Block Cipher Modes

  22. 64-bit block 80-bit key 32 rounds Unbalanced Feistel cipher Skipjack/Clipper Chip Skipjack declassified 1998 Clipper Chip 1993 -1996

  23. Substitution-Permutation Networks Claude Shannon (1916 2001)

  24. Claude Shannon A Mathematical Theory of Communication 1948 The Theory of Secrecy Systems 1949

  25. The Theory of Secrecy Systems 1949 Diffusion: the statistical structure of [the message] which leads to its redundancy is dissipated into long range statistics. P-box Confusion: make the relation between the simple statistics of [the ciphertext] and the simple description of [the key] a very complex and involved one. S-box

  26. SPN

  27. PRESENT 2007 Many

  28. PRESENT 64-bit block 80- or 128-bit key 1 S-box 4 x 4 31 Rounds Substitution-Permutation Network

  29. Substitution Layer

  30. Permutation Layer

  31. Substitution and Permutation

  32. Key Schedule

  33. Advanced Encryption Standard 2001 Joan Daemen and Vincent Rijmen Simplified AES: Mohammad Musa, Edward Schaefer, and Stephen Wedig

  34. AES (Rijandael) AES Simplified AES 128-bit block 128-bit, 192-bit, or 256-bit key 10, 12, or 14 rounds SPN 16-bit block 16-bit key 2 rounds SPN

  35. S-Box

  36. S-Box 1 x = y xy= 1

  37. 0 1 2 3 k k k k k k k k 8 9 10 11 k k k k k k k k 5 7 4 6 12 13 14 15 W[1] W[0] Add Key

  38. SN, SR, MC

  39. pt S-AES A K 0 NS SR MC A K 1 NS SR A K 2 CT

  40. Simplify the Other AES Finalists Serpent Twofish RC6 MARS

Related


More Related Content