11
BRUTE FORCE CRYPTIC ATTACK ON DES ENCRYPTED DATA Group 01 Foucher, S Thontat, Y Shaduka, S

Brute Force Cryptic Attack on DES encrypted Data

  • Upload
    jeanne

  • View
    94

  • Download
    1

Embed Size (px)

DESCRIPTION

Group 01 Foucher , S Thontat , Y Shaduka , S. Brute Force Cryptic Attack on DES encrypted Data. Encryption History. WWII and breaking the Enigma code 10 000 people full time. DES and Brute Force Attacks. 56 bit keys to stop Birthday Attacks 7.2 x 10^16 possibility 64 bits of Data - PowerPoint PPT Presentation

Citation preview

Page 1: Brute Force Cryptic Attack on DES encrypted Data

BRUTE FORCE CRYPTIC ATTACK

ON DES ENCRYPTED DATA

Group 01Foucher, SThontat, Y

Shaduka, S

Page 2: Brute Force Cryptic Attack on DES encrypted Data

Encryption History WWII and breaking the Enigma code 10 000 people full time

Page 3: Brute Force Cryptic Attack on DES encrypted Data

DES and Brute Force Attacks 56 bit keys to stop Birthday Attacks 7.2 x 10^16 possibility 64 bits of Data

Weakness (advantage):easily implemented in HDW

Page 4: Brute Force Cryptic Attack on DES encrypted Data

Cryptanalysis Partial knowledge about encoded

message“Drea Gro”… (64 bits)

Exploit Human weaknesses“aaaaaaa” to “9999999”20 500 Reduction in Explored key space

Page 5: Brute Force Cryptic Attack on DES encrypted Data

DecrypterNest

64 bit Cyphertext

64 bit Expected Plaintext56 bit Key Used

Match Flag

Highest Order ViewHighest Order View

Page 6: Brute Force Cryptic Attack on DES encrypted Data

Common KeyGen

0-9

Decryption Unit 5

Q-Z

Decryption Unit 4

G-P

Decryption Unit 3

w-F

Decryption Unit 2

l-v

Decryption Unit 1

a-k

Decryption Unit 6

7 ASCII Common key from “aaaaaaa” to “9999999”

aaaaaaaak9999999

laaaaaaav9999999

waaaaaaaF9999999

GaaaaaaaP9999999

QaaaaaaaZ9999999

0aaaaaaa99999999

8 charactersASCII key

56 b

it K

EY

DO

NE

MA

TCH

AND EXHAUSTED LIST OR MATCH FOUND

56 b

it K

EY

DO

NE

MA

TCH

56 b

it K

EY

DO

NE

MA

TCH

56 b

it K

EY

DO

NE

MA

TCH

56 b

it K

EY

DO

NE

MA

TCH

56 b

it K

EY

DO

NE

MA

TCH

DONE MATCH KEY

CYPHERDATA

EXPECTEDTEXT

64 bits

64 bits

NEST

8 charactersASCII key

8 charactersASCII key

8 charactersASCII key

8 charactersASCII key

8 charactersASCII key

Page 7: Brute Force Cryptic Attack on DES encrypted Data

Probabilities 56 bit key space: 2^56 = 7.2 * 10^16 Collisions Expected every:

2^(OutputSz/2) = 2^32 = 4.3 * 10^9 p(collision) = 2.33 * 10^-10 p(2 simultaneous collisions) =

8.14 * 10^-19 (Every 779 years) E(collisions) = 50,794

Page 8: Brute Force Cryptic Attack on DES encrypted Data

How to deal with 50,000 Keys

DecrypterNest

64 bit Cyphertext

64 bit Expected Plaintext

Potential Key 2nd StageSingle Decrypter

Match Flag

2nd Block of 64 bit Cyphertext

Key

DATA Integrity Lookup

Page 9: Brute Force Cryptic Attack on DES encrypted Data

Structure of the Encrypter

•18 pipelined stages

• The first and final stages are key independent permutations

• Encryption is performed in the 16 middle stages

• Subkeys are applied to the middle stages in order, from K1 to K16

Page 10: Brute Force Cryptic Attack on DES encrypted Data

DES Core Algorithm

•Feistel structure:Encryption and Decryption are similar processes

• The Feistel function operates on the right-half block and consists of four stages:

1. Expansion2. Key mixing3. Substitution4. Permutation

Page 11: Brute Force Cryptic Attack on DES encrypted Data

Structure of the Decrypter

• Same algorithm used for encryption/decryption

•Subkeys are applied in reverse order, from K16 to K1

• Keys are aged

•Decrypted data block is applied to a look-up