14
Lecture 3: Cryptographic Tools modified from slides of Lawrie Brown

Lecture 3: Cryptographic Tools

  • Upload
    davin

  • View
    53

  • Download
    0

Embed Size (px)

DESCRIPTION

Lecture 3: Cryptographic Tools. modified from slides of Lawrie Brown. Cryptographic Tools. Cryptographic algorithms important element in security services review various types of elements symmetric encryption public-key (asymmetric) encryption digital signatures and key management - PowerPoint PPT Presentation

Citation preview

Page 1: Lecture 3:  Cryptographic Tools

Lecture 3: Cryptographic Tools

modified from slides of Lawrie Brown

Page 2: Lecture 3:  Cryptographic Tools

Cryptographic Tools

• Cryptographic algorithms – important element in security services

• review various types of elements– symmetric encryption– public-key (asymmetric) encryption– digital signatures and key management– secure hash functions

Page 3: Lecture 3:  Cryptographic Tools

Symmetric Encryption• universal technique for providing

confidentiality• also referred to as single-key encryption

• two requirements for secure use:– need a strong encryption algorithm– sender and receiver must have obtained copies of

the secret key in a secure fashion• and must keep the key secure

Page 4: Lecture 3:  Cryptographic Tools

Symmetric Encryption

Page 5: Lecture 3:  Cryptographic Tools

Cryptanalytic Attacks• rely on:

– nature of the algorithm– plus some knowledge of the general

characteristics of the plaintext– even some sample plaintext-

ciphertext pairs• exploits the characteristics of the

algorithm to attempt to deduce a specific plaintext or the key being used

• if successful all future and past messages encrypted with that key are compromised

Brute-Force Attack• try all possible keys on some

ciphertext until an intelligible translation into plaintext is obtained

• on average half of all possible keys must be tried to achieve success

Attacking Symmetric Encryption

Page 6: Lecture 3:  Cryptographic Tools

Average Time for Exhaustive Search

Key Size (bits) Number of

Alternative Keys Time Required at 1

Decryption/µs Time Required at 106 Decryptions/µs

32 232 = 4.3 109 231 µs = 35.8 minutes 2.15 milliseconds

56 256 = 7.2 1016 255 µs = 1142 years 10.01 hours

128 2128 = 3.4 1038 2127 µs = 5.4 1024 years 5.4 1018 years

168 2168 = 3.7 1050 2167 µs = 5.9 1036 years 5.9 1030 years

26 characters (permutation) 26! = 4 1026 2 1026 µs = 6.4 1012 years 6.4 106 years

Page 7: Lecture 3:  Cryptographic Tools

Symmetric Encryption Algorithms

Page 8: Lecture 3:  Cryptographic Tools

• most widely used encryption scheme– referred to as the Data Encryption Algorithm – uses 64 bit plaintext block and 56 bit key to produce

a 64 bit ciphertext block• strength concerns:

– concerns about algorithm• DES is the most studied encryption algorithm in existence

– use of 56-bit key• Electronic Frontier Foundation (EFF) announced in July

1998 that it had broken a DES encryption

Data Encryption Standard (DES)

Page 9: Lecture 3:  Cryptographic Tools

Time to Break a Code

assuming 106 decryptions/ms

Page 10: Lecture 3:  Cryptographic Tools

Triple DES (3DES)• repeats basic DES algorithm three times using

either two or three unique keys• attractions:

– 168-bit key length overcomes the vulnerability to brute-force attack of DES

– underlying encryption algorithm is the same as in DES

• drawbacks:– algorithm is sluggish in software– uses a 64-bit block size

Page 11: Lecture 3:  Cryptographic Tools

Advanced Encryption Standard (AES)

needed a replacement for

3DES

3DES was not reasonable for long

term use

NIST called for proposals for a

new AES in 1997should have a security

strength equal to or better than 3DES

significantly improved efficiency

symmetric block cipher

128 bit data and 128/192/256 bit keys

selected Rijndael in

November 2001

published as FIPS 197

Page 12: Lecture 3:  Cryptographic Tools

Practical Security Issues• typically data unit is larger than a single 64-bit

or 128-bit block• electronic codebook (ECB) mode

– the simplest approach to multiple-block encryption– each block is encrypted using the same key– exploit regularities in the plaintext

• modes of operation– alternative techniques to increase the security

for large sequences– overcomes the weaknesses of ECB

Page 13: Lecture 3:  Cryptographic Tools

Block Cipher Encryption

Stream Encryption

Page 14: Lecture 3:  Cryptographic Tools

Block & Stream Ciphers

• processes the input one block of elements at a time• produces an output block for each input block• can reuse keys• more common

Block Cipher

• processes the input elements continuously• produces output one element at a time• primary advantage is that they are almost always faster

and use far less code• encrypts plaintext one byte at a time• pseudorandom stream is one that is unpredictable

without knowledge of the input key

Stream Cipher