Symmetric Key Block Ciphers - Overview and Implementation

 
 
Substitution
 
 
Transposition
 
Data Encryption
Standard  1977
 
“New Directions in
Cryptography”  1976
 
 
Symmetric key block ciphers
 
Public key ciphers
 
Stream ciphers
 
Post-quantum ciphers
 
 
 
Stream ciphers
 
 
Horst Feistel (1915 – 1990)
Simplified DES: Wade Trapp and Lawrence Washington
 
 
DES
 
 
64-bit block
56-bit key (8 parity bits)
8 S-boxes 6 x 4
16 rounds
Feistel cipher
 
 
12-bit block
9-bit key
2 S-boxes 4 x 3
4 rounds
Feistel cipher
 
Simplified DES
 
 
 
9 bits of key 111 010 110
 
Use the 8 bits on the left for k1  1110 1011
Rotate to the left one bit 110 101 101
Use the 8 bits on the left for k12  1101 0110
Rotate to the left 1 bit 101 011 011
Use the 8 bits on the left for k3  1010 1101
Rotate to the left 1 bit  010 110 111
Use the 8 bits on the left for k4  0101 1011
 
 
 
Encryption
 
Decryption
 
Encryption
 
Decryption
 
 
 
 
Backdoor?
 
 
Perfect Security
Random key, as long as the message, and used only once.
 
Computational Security
 
 
 
 
Today
128
 
 
 
Skipjack declassified 1998
Clipper Chip 1993 -1996
 
64-bit block
80-bit key
32 rounds
Unbalanced Feistel cipher
 
 Claude Shannon (1916 – 2001)
 
 
 
 
“A Mathematical Theory of Communication”  1948
 
“The Theory of Secrecy Systems”  1949
 
Diffusion
:  “… the statistical structure of [the message]
which leads to its redundancy is dissipated into long
range statistics.”
 
P-box
 
Confusion
:  “… make the relation between the simple
statistics of [the ciphertext] and the simple description
of [the key] a very complex and involved one.”
 
S-box
 
 
 
Many
 
 
 
 
 
64-bit block
80- or 128-bit key
1 S-box 4 x 4
31 Rounds
Substitution-Permutation Network
 
 
 
 
 
Joan Daemen and Vincent Rijmen
Simplified AES: Mohammad Musa, Edward Schaefer, and
Stephen Wedig
 
AES
 
 
128-bit block
128-bit, 192-bit, or 256-bit
 
key
10, 12, or 14 rounds
SPN
 
 
16-bit block
16-bit key
 
2 rounds
SPN
 
Simplified AES
 
 
 
 
 
 
 
 
 
Serpent
 
Twofish
 
RC6
 
MARS
Slide Note
Embed
Share

Delve into the world of symmetric key block ciphers through a detailed exploration of classical ciphers like substitution and transposition, modern cryptography advancements, DES encryption, Simplified DES, key scheduling, expansion functions, S-Box usage, and more. Discover the intricacies of encryption techniques and key management for secure data transmission.

  • Symmetric Ciphers
  • Block Ciphers
  • Modern Cryptography
  • DES Encryption
  • Key Management

Uploaded on Sep 08, 2024 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. Download presentation by click this link. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

E N D

Presentation Transcript


  1. Symmetric Key Block Ciphers

  2. Classical Ciphers Substitution Transposition

  3. Modern Cryptography Data Encryption Standard 1977 New Directions in Cryptography 1976

  4. Ciphers Symmetric key block ciphers Public key ciphers Stream ciphers Post-quantum ciphers

  5. Stream Ciphers Stream ciphers

  6. Data Encryption Standard 1977 Horst Feistel (1915 1990) Simplified DES: Wade Trapp and Lawrence Washington

  7. Data Encryption Standard 1976

  8. DES DES Simplified DES 64-bit block 56-bit key (8 parity bits) 8 S-boxes 6 x 4 16 rounds Feistel cipher 12-bit block 9-bit key 2 S-boxes 4 x 3 4 rounds Feistel cipher

  9. Simplified DES FeistelCipher

  10. Key and Message

  11. Key Schedule 9 bits of key 111 010 110 Use the 8 bits on the left for k1 1110 1011 Rotate to the left one bit 110 101 101 Use the 8 bits on the left for k12 1101 0110 Rotate to the left 1 bit 101 011 011 Use the 8 bits on the left for k3 1010 1101 Rotate to the left 1 bit 010 110 111 Use the 8 bits on the left for k4 0101 1011

  12. Expansion Function and XOR

  13. S-Box 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 S S 1 2 0 1 101 010 001 100 110 001 110 011 100 111 000 000 111 101 011 0 1 100 101 000 110 101 111 011 000 111 110 001 011 010 010 001 100 010

  14. DES Encryption L R i i = = , L R R L f R K + + i i i i 1 1 i i

  15. DES Decryption L R i i Encryption = = , L R R L f R K + + i i i i 1 1 i i = = , L R R L f R K + + i i i i 1 1 i i Decryption = = , L R f R K R L + + i i i i 1 1 i i

  16. DES Decryption Encryption Decryption

  17. Secrecy of Algorithm Backdoor?

  18. 3DES 112-bit security 1plaintext K E D E 3 2 K K

  19. Security Level Perfect Security Random key, as long as the message, and used only once. Computational Security Symmetric Key RSA and DH ECC 80 112 128 192 256 1024 2048 3072 7680 15360 160 224 256 384 521 Today 128

  20. Block Cipher Modes

  21. Block Cipher Modes

  22. 64-bit block 80-bit key 32 rounds Unbalanced Feistel cipher Skipjack/Clipper Chip Skipjack declassified 1998 Clipper Chip 1993 -1996

  23. Substitution-Permutation Networks Claude Shannon (1916 2001)

  24. Claude Shannon A Mathematical Theory of Communication 1948 The Theory of Secrecy Systems 1949

  25. The Theory of Secrecy Systems 1949 Diffusion: the statistical structure of [the message] which leads to its redundancy is dissipated into long range statistics. P-box Confusion: make the relation between the simple statistics of [the ciphertext] and the simple description of [the key] a very complex and involved one. S-box

  26. SPN

  27. PRESENT 2007 Many

  28. PRESENT 64-bit block 80- or 128-bit key 1 S-box 4 x 4 31 Rounds Substitution-Permutation Network

  29. Substitution Layer

  30. Permutation Layer

  31. Substitution and Permutation

  32. Key Schedule

  33. Advanced Encryption Standard 2001 Joan Daemen and Vincent Rijmen Simplified AES: Mohammad Musa, Edward Schaefer, and Stephen Wedig

  34. AES (Rijandael) AES Simplified AES 128-bit block 128-bit, 192-bit, or 256-bit key 10, 12, or 14 rounds SPN 16-bit block 16-bit key 2 rounds SPN

  35. S-Box

  36. S-Box 1 x = y xy= 1

  37. 0 1 2 3 k k k k k k k k 8 9 10 11 k k k k k k k k 5 7 4 6 12 13 14 15 W[1] W[0] Add Key

  38. SN, SR, MC

  39. pt S-AES A K 0 NS SR MC A K 1 NS SR A K 2 CT

  40. Simplify the Other AES Finalists Serpent Twofish RC6 MARS

More Related Content

giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#