33
CSCE 715: Network Systems Security Chin-Tser Huang [email protected] University of South Carolina

ppt

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: ppt

CSCE 715:Network Systems Security

Chin-Tser [email protected]

University of South Carolina

Page 2: ppt

9/12/2007 2

After DES…

More symmetric encryption algorithms Triple-DES Advanced Encryption Standards

Page 3: ppt

9/12/2007 3

Triple DES Clearly a replacement for DES was

needed theoretical attacks that can break it demonstrated exhaustive key search

attacks Use multiple encryptions with DES

implementations Triple-DES is the chosen form

Page 4: ppt

9/12/2007 4

Why Triple-DES? Double-DES may suffer from meet-in-

the-middle attack works whenever use a cipher twice assume C = EK2[EK1[P]], so X = EK1[P] = DK2[C]

given a know pair (P, C), attack by encrypting P with all keys and store

then decrypt C with keys and match X value can show attack takes O(256) steps

Page 5: ppt

9/12/2007 5

Triple-DES with Two Keys Must use 3 encryptions

would seem to need 3 distinct keys But can use 2 keys with E-D-E sequence

encrypt & decrypt equivalent in security C = EK1[DK2[EK1[P]]] if K1=K2 then can work with single DES

Standardized in ANSI X9.17 & ISO8732 No current known practical attacks

Page 6: ppt

9/12/2007 6

Triple-DES with Three Keys Some proposed attacks on two-key

Triple-DES, although none of them practical

Can use Triple-DES with Three-Keys to avoid even these C = EK3[DK2[EK1[P]]]

Has been adopted by some Internet applications, e.g. PGP, S/MIME

Page 7: ppt

9/12/2007 7

Origins ofAdvanced Encryption Standard

Triple-DES is slow with small blocks US NIST issued call for ciphers in 1997 15 candidates accepted in Jun 1998 5 were shortlisted in Aug 1999 Rijndael was selected as the AES in Oct

2000 Issued as FIPS PUB 197 standard in Nov

2001

Page 8: ppt

9/12/2007 8

AES Requirements Private key symmetric block cipher 128-bit data, 128/192/256-bit keys Stronger and faster than Triple-DES Active life of 20-30 years (+ archival use) Provide full specification and design

details Both C and Java implementations NIST has released all submissions and

unclassified analyses

Page 9: ppt

9/12/2007 9

AES Evaluation Criteria Initial criteria

security – effort to practically cryptanalyze cost – computational algorithm & implementation characteristics

Final criteria general security software & hardware implementation ease implementation attacks flexibility (in en/decrypt, keying, other factors)

Page 10: ppt

9/12/2007 10

AES Shortlist Shortlist in Aug 99 after testing and evaluation

MARS (IBM) - complex, fast, high security margin RC6 (USA) - very simple, very fast, low security margin Rijndael (Belgium) - clean, fast, good security margin Serpent (Euro) - slow, clean, very high security margin Twofish (USA) - complex, very fast, high security

margin Subject to further analysis and comment Contrast between algorithms with

few complex rounds verses many simple rounds refined existing ciphers verses new proposals

Page 11: ppt

9/12/2007 11

The Winner - Rijndael Designed by Rijmen-Daemen in Belgium Has 128/192/256 bit keys, 128 bit data An iterative rather than feistel cipher

treats data in 4 groups of 4 bytes operates an entire block in every round

Designed to be resistant against known attacks speed and code compactness on many CPUs design simplicity

Use finite field

Page 12: ppt

9/12/2007 12

Abstract Algebra Background

Group Ring Field

Page 13: ppt

9/12/2007 13

Group A set of elements or “numbers” With a binary operation whose result is

also in the set (closure) Obey following axioms

associative law: (a.b).c = a.(b.c) has identity e: e.a = a.e = a has inverses a-1: a.a-1 = e

Abelian group if commutative a.b = b.a

Page 14: ppt

9/12/2007 14

Ring A set of elements with two operations

(addition and multiplication) which are: an abelian group with addition operation multiplication

has closure is associative distributive over addition: a(b+c) = ab + ac

Commutative ring if multiplication operation is commutative

Integral domain if multiplication operation has identity and no zero divisors

Page 15: ppt

9/12/2007 15

Field A set of numbers with two operations

abelian group for addition abelian group for multiplication

(ignoring 0) integral domain multiplicative inverse: aa-1 = a-1a= 1

Infinite field if infinite number of elements

Finite field if finite number of elements

Page 16: ppt

9/12/2007 16

Modular Arithmetic Define modulo operator a mod n to be

remainder when a is divided by n Use the term congruence for: a ≡ b mod n

when divided by n, a and b have same remainder

e.g. 100 34 mod 11 b is called the residue of a mod n if 0 b n-1 with integers can write a = qn + b

Page 17: ppt

9/12/2007 17

Divisor

A non-zero number b is a divisor of a if for some m have a=mb (a,b,m all integers)

That is, b divides a with no remainder

Denote as b|a E.g. all of 1,2,3,4,6,8,12,24 divide

24

Page 18: ppt

9/12/2007 18

Modular Arithmetic Can do modular arithmetic with any

group of integers Zn = {0, 1, … , n-1}

Form a commutative ring for addition With a multiplicative identity Some peculiarities

if (a+b)≡(a+c) mod n then b≡c mod n but (ab)≡(ac) mod n then b≡c mod n

only if a is relatively prime to n

Page 19: ppt

9/12/2007 19

Modulo 8 Example

Page 20: ppt

9/12/2007 20

Greatest Common Divisor (GCD)

GCD (a,b) of a and b is the largest number that divides evenly into both a and b e.g. GCD(60,24) = 12

Two numbers are called relatively prime if they have no common factors (except 1) e.g. 8 and 15 relatively prime as GCD(8,15)

= 1

Page 21: ppt

9/12/2007 21

Euclid's GCD Algorithm

Use following theorem GCD(a,b) = GCD(b, a mod b)

Euclid's Algorithm to compute GCD(a,b) A=a, B=b while B>0

R = A mod B A = B, B = R

return A

Page 22: ppt

9/12/2007 22

Galois Fields Finite fields play a key role in cryptography Number of elements in a finite field must

be a power of a prime pn

Known as Galois fields Denoted GF(pn) In particular often use the following forms

GF(p) GF(2n)

Page 23: ppt

9/12/2007 23

Galois Fields GF(p) GF(p) is set of integers {0,1, … , p-1}

with arithmetic operations modulo prime p

Form a finite field have multiplicative inverses

Hence arithmetic is “well-behaved” and can do addition, subtraction, multiplication, and division without leaving the field GF(p)

Page 24: ppt

9/12/2007 24

Arithmetic in GF(7)

Page 25: ppt

9/12/2007 25

Finding Multiplicative Inverses By extending Euclid’s algorithm

1.(A1, A2, A3)=(1, 0, m); (B1, B2, B3)=(0, 1, b)

2. if B3 = 0return A3 = gcd(m, b); no inverse

3. if B3 = 1 return B3 = gcd(m, b); B2 = b–1 mod m

4. Q = A3 div B35. (T1, T2, T3)=(A1 – Q B1, A2 – Q B2, A3 – Q B3)

6. (A1, A2, A3)=(B1, B2, B3)7. (B1, B2, B3)=(T1, T2, T3)8. goto 2

Page 26: ppt

9/12/2007 26

Polynomial Arithmetic Can compute using polynomials

Several alternatives available ordinary polynomial arithmetic poly arithmetic with coords mod p poly arithmetic with coords mod p

and polynomials mod M(x)

Page 27: ppt

9/12/2007 27

Ordinary Polynomial Arithmetic

Add or subtract corresponding coefficients

Multiply all terms by each other E.g.

let f(x) = x3 + x2 + 2 and g(x) = x2 – x + 1

f(x) + g(x) = x3 + 2x2 – x + 3f(x) – g(x) = x3 + x + 1f(x) x g(x) = x5 + 3x2 – 2x + 2

Page 28: ppt

9/12/2007 28

Polynomial Arithmetic with Modulo Coefficients

Compute value of each coefficient as modulo some value

Could be modulo any prime But we are most interested in mod 2

i.e. all coefficients are 0 or 1 e.g. let f(x) = x3 + x2, g(x) = x2 + x + 1f(x) + g(x) = x3 + x + 1f(x) x g(x) = x5 + x2

Page 29: ppt

9/12/2007 29

Modular Polynomial Arithmetic Can write any polynomial in the form

f(x) = q(x) g(x) + r(x) can interpret r(x) as being a remainder r(x) = f(x) mod g(x)

If no remainder say g(x) divides f(x) If g(x) has no divisors other than itself

and 1 say it is irreducible (or prime) polynomial

Arithmetic modulo an irreducible polynomial forms a field

Page 30: ppt

9/12/2007 30

Polynomial GCD Can find greatest common divisor for polys

c(x) = GCD(a(x), b(x)) if c(x) is the poly of greatest degree which divides both a(x), b(x)

can adapt Euclid’s Algorithm to find it: EUCLID[a(x), b(x)]1. A(x) = a(x); B(x) = b(x)2. if B(x) = 0 return A(x) = gcd[a(x), b(x)]3. R(x) = A(x) mod B(x)4. A(x) B(x)5. B(x) R(x)6. goto 2

Page 31: ppt

9/12/2007 31

Modular Polynomial Arithmetic Can compute in field GF(2n)

polynomials with coefficients modulo 2 whose degree is less than n hence must reduce modulo an irreducible

poly of degree n (for multiplication only) Form a finite field Can always find an inverse

can extend Euclid’s Inverse algorithm to find

Page 32: ppt

9/12/2007 32

Arithmetic in GF(23)

Page 33: ppt

9/12/2007 33

Next Class

AES algorithm Confidentiality of symmetric

encryption Read Chapters 7, 8, 9