37
Encryption only the basics

Crypto.ppt

Embed Size (px)

Citation preview

Page 1: Crypto.ppt

Encryptiononly the basics

Page 2: Crypto.ppt

Reading Assignment

• Why crypto is hard http://www.counterpane.com/whycrypto.html

Page 3: Crypto.ppt

Topics

• What is Cryptology?• Conventional Encryption (secret key)

– Terminology and Properties

• Public Key Encryption– Terminology– Usage– Properties

• Cryptanalysis

Page 4: Crypto.ppt

Cryptology Definition

• Cryptography is the making of ciphers and codes.

• Cryptanalysis is the analysis and breaking of those ciphers.

• Cryptology is the study of both.

Page 5: Crypto.ppt

CryptographyCryptography

• Classified along three independent dimensions:– The type of operations used for transforming

plaintext to ciphertext– The number of keys used

• symmetric (single key)

• asymmetric (two-keys, or public-key encryption)

– The way in which the plaintext is processed

Page 6: Crypto.ppt

Secret Key Cryptography

• An encryption scheme has five ingredients:– Plaintext– Encryption algorithm– Secret Key– Ciphertext– Decryption algorithm

• Security depends on the secrecy of the key, not the secrecy of the algorithm

Page 7: Crypto.ppt

Use of Conventional Encryption

Page 8: Crypto.ppt

Average time required Average time required for exhaustivefor exhaustive key key

search search Key Size (bits)

Number of Alternative Keys

Time required at 106 Decryption/µs

32 232 = 4.3 x 109 2.15 milliseconds

56 256 = 7.2 x 1016 10 hours

128 2128 = 3.4 x 1038 5.4 x 1018 years

168 2168 = 3.7 x 1050 5.9 x 1030 years

Page 9: Crypto.ppt

Feistel Cipher StructureFeistel Cipher Structure

• Many conventional block encryption algorithms, including DES have a structure first described by Horst Feistel of IBM in 1973

• The realization of a Fesitel Network depends on the choice of the following parameters and design features (see next slide):

Page 10: Crypto.ppt

Feistel Cipher StructureFeistel Cipher Structure

• Block size: larger block sizes mean greater security

• Key Size: larger key size means greater security• Number of rounds: multiple rounds offer

increasing security• Subkey generation algorithm: greater

complexity will lead to greater difficulty of cryptanalysis.

• Fast software encryption/decryption: the speed of execution of the algorithm becomes a concern

Page 11: Crypto.ppt
Page 12: Crypto.ppt

Conventional Encryption Conventional Encryption AlgorithmsAlgorithms

• Data Encryption Standard (DES)– The most widely used encryption scheme– The algorithm is referred to as the Data

Encryption Algorithm (DEA)– DES is a block cipher– The plaintext is processed in 64-bit blocks– The key is 56-bits in length

Page 13: Crypto.ppt
Page 14: Crypto.ppt
Page 15: Crypto.ppt

Time to break a code (10Time to break a code (1066 decryptions/µs)decryptions/µs)

Page 16: Crypto.ppt

Triple DEATriple DEA

• Use three keys and three executions of the DES algorithm (encrypt-decrypt-encrypt)

• C = ciphertext

• P = Plaintext

• EK[X] = encryption of X using key K

• DK[Y] = decryption of Y using key K

• Effective key length of 168 bits

C = EK3[DK2[EK1[P]]]

Page 17: Crypto.ppt

Other Symmetric Block Other Symmetric Block CiphersCiphers

• International Data Encryption Algorithm (IDEA)– 128-bit key– Used in PGP

• Blowfish– Easy to implement– High execution speed – Run in less than 5K of memory

Page 18: Crypto.ppt

Other Symmetric Block Other Symmetric Block CiphersCiphers

• RC5– Suitable for hardware and software– Fast, simple– Adaptable to processors of different word lengths– Variable number of rounds– Variable-length key– Low memory requirement– High security– Data-dependent rotations

• Cast-128– Key size from 40 to 128 bits– The round function differs from round to round

Page 19: Crypto.ppt

Analysis of DES

• Advantages– Attacks well known– 3DES has effective key length of 168

• Disadvantages– No efficient software implementation– Must use 64 bit block

Page 20: Crypto.ppt

AES

• AES (Advanced Encryption Standard) was adopted by NIST in November 2001. Also called the Rijndael algorithm.

• Supports key size of 128, 192, and 256 bits. • Symmetric block cipher with block length

of 128 bits.• Efficient hardware and software

implementations.• Not a Feistal block cipher.

Page 21: Crypto.ppt

Location of Encryption DeviceLocation of Encryption Device• Link encryption:

– A lot of encryption devices– High level of security– Decrypt each packet at every switch

• End-to-end encryption– The source encrypt and the receiver decrypts– Payload encrypted– Header in the clear

• High Security: Both link and end-to-end encryption are needed

Page 22: Crypto.ppt
Page 23: Crypto.ppt

Key DistributionKey Distribution

1. A key could be selected by A and physically delivered to B.

2. A third party could select the key and physically deliver it to A and B.

3. If A and B have previously used a key, one party could transmit the new key to the other, encrypted using the old key.

4. If A and B each have an encrypted connection to a third party C, C could deliver a key on the encrypted links to A and B.

Page 24: Crypto.ppt

Key DistributionKey Distribution

• Session key:– Data encrypted with a one-time session key.

At the conclusion of the session the key is destroyed

• Permanent key:– Used between entities for the purpose of

distributing session keys

Page 25: Crypto.ppt
Page 26: Crypto.ppt

Public-Key Cryptography Principles

• The use of two keys has consequences in: key distribution, confidentiality and authentication.

• The scheme has six ingredients – Plaintext

– Encryption algorithm

– Public and private key

– Ciphertext

– Decryption algorithm

Page 27: Crypto.ppt

Encryption using Public-Key system

Page 28: Crypto.ppt

Authentication using Public-Key System

Page 29: Crypto.ppt

Applications for Public-Key Cryptosystems

• Three categories:– Encryption/decryption: The sender encrypts a

message with the recipient’s public key.– Digital signature: The sender ”signs” a

message with its private key.– Key exchange: Two sides cooperate two

exhange a session key.

Page 30: Crypto.ppt

Requirements for Public-Key Cryptography

1. Computationally easy for a party B to generate a pair (public key KUb, private key KRb)

2. Easy for sender to generate ciphertext:

3. Easy for the receiver to decrypt ciphertext using private key:

)(MEC KUb

)]([)( MEDCDM KUbKRbKRb

Page 31: Crypto.ppt

Requirements for Public-Key Cryptography

4. Computationally infeasible to determine private key (KRb) knowing public key (KUb)

5. Computationally infeasible to recover message M, knowing KUb and ciphertext C

6. Either of the two keys can be used for encryption, with the other used for decryption:

)]([)]([ MEDMEDM KRbKUbKUbKRb

Page 32: Crypto.ppt

Public-Key Cryptographic Algorithms

• RSA and Diffie-Hellman • RSA - Ron Rives, Adi Shamir and Len Adleman

at MIT, in 1977.– RSA is a block cipher– The most widely implemented

• Diffie-Hellman – Exchange a secret key securely– Compute discrete logarithms

Page 33: Crypto.ppt

Diffie-Hellman Key Exchange

Page 34: Crypto.ppt

Other Public-Key Cryptographic Algorithms

• Digital Signature Standard (DSS)– Makes use of the SHA-1– Not for encryption or key exchange

• Elliptic-Curve Cryptography (ECC)– Good for smaller bit size– Low confidence level, compared with RSA– Very complex

Page 36: Crypto.ppt

Cryptanalysis

• If only the ciphertext is available– Pattern and frequency analysis for simple ciphers– Brute force – try all possible keys

• If <plaintext, ciphertext> is available– Previously classified info is unclassified– Encrypted info includes known patterns (packet

headers)

Page 37: Crypto.ppt

For Further Reading

• “Cryptography and Network Security, Principles and Practice” third edition, William Stallings, Prentice Hall

• For more detailed coverage, take the Applied Math course: AMTH 387