SlideShare una empresa de Scribd logo
1 de 117
Cryptography and Network Security. ,[object Object],[object Object],[object Object],[object Object],[object Object]
Chapter 3  & Chapter 6  –  Block Ciphers 、   DES 、 Others 3.1 Simplified DES  3.2 Block Cipher Principles  3.3 The Data Encryption Standard  3.4 The Strength of DES  3.5 Differential and Linear Cryptanalysis  3.6 Block Cipher Design Principles  3.7 Block Cipher Modes of Operation Ch06- Contemporary symmetric ciphers
3.0 Modern Block Ciphers ,[object Object],[object Object],[object Object],[object Object]
Block vs Stream Ciphers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Simplified DES (S-DES) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
S-DES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Simplified DES (cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
Overview of S-DES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sub-key generation
Sub-key generation (cont.) P10 ( k1 k2 k3 k4 k5 k6 k7 k8 k9 k10 )      k3 k5 k2 k7 k4 k10 k1 k9 k8 k6   e.g. K=  10100 00010 P10(K) = P10 ( 10100 00010 )    =  10000 01100   ,[object Object],6 8 9 1 10 4 7 2 5 3 P10
Sub-key generation (cont.) ,[object Object],e.g. LS-1( 10000 ) = 00001 LS-1 ( 01100 ) = 11000
Sub-key generation (cont.) P8 ( k1 k2  k3 k4 k5 k6 k7 k8 k9 k10 )      k6 k3 k7 k4 k8 k5 k10 k9   e.g. K 1 = P8 ( 00001 11000 )    =  010100100 ,[object Object],9 10 5 8 4 7 3 6 P8
Sub-key generation (cont.) ,[object Object],e.g. LS-2( 00001 ) = 00100 LS-2 ( 11000 ) = 00011
Sub-key generation (cont.) P8 ( k1 k2  k3 k4 k5 k6 k7 k8 k9 k10 )      k6 k3 k7 k4 k8 k5 k10 k9   e.g. K 2 = P8 ( 00100 00011 )    =  01000011 ,[object Object],9 10 5 8 4 7 3 6 P8
S-DES encryption
S-DES encryption (cont.) ,[object Object],IP -1  • IP (X) = X = IP • IP -1  (X)  7 5 8 4 1 3 6 2 IP 6 8 2 7 5 3 1 4 IP -1
S-DES encryption (cont.)
S-DES encryption (cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
S-DES encryption (cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object]
S-DES encryption (cont.) ,[object Object],R SK
S-DES encryption (cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object]
S-DES encryption (cont.) ,[object Object],Example: E/P( 1001 )= 11000011 1 4 3 2 3 2 1 4 E/P
S-DES encryption (cont.) ,[object Object],[object Object],S0( b1  b2 b3   b4 ) 10 11 01 11 11 11 01 10 00 10 00 01 10 11 01 10 11 00 01 00 11 10 01 00 b2b3 b1b4
S-DES encryption (cont.) S1( b1  b2 b3   b4 ) Example:   S0(0 01 0)=00, S1(0 01 0)=10 11 00 01 10 11 00 01 00 11 10 11 01 00 10 01 11 10 10 00 00 11 10 01 00 b2b3 b1b4
S-DES encryption (cont.) ,[object Object],3 1 4 2 P4
S-DES encryption (cont.) 1001 1001 1001 1100 0011 0101 1010 01 00 1000
S-DES Encryption (cont.) ,[object Object],[object Object],b1 b2 b3 b4 b5 b6 b7 b8 b1 b2 b3 b4 b5 b6 b7 b8
S-DES Encryption (cont.) ,[object Object],[object Object],[object Object]
S-DES encryption (cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
S-DES encryption (cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
S-DES decryption
S-DES decryption (cont.) ,[object Object],[object Object]
S-DES decryption (cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object]
S-DES decryption (cont.) ,[object Object]
S-DES decryption (cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
S-DES decryption (cont.) ,[object Object],RS-2 RS-2 RS-2 RS-2 K2 K1
S-DES decryption Encrytion/Decryption e/d flag P/ C K 1 / K 2 K 2 / K 1 C/ P
3.2& 3.6  Block Cipher Principles ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Claude Shannon and Substitution-Permutation Ciphers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Shannon introduced the concept of a product cipher. A product cipher is a complex cipher combining substitution, permutation, and other components discussed in previous sections. 5.1.4  Product Ciphers
Diffusion The idea of diffusion is to hide the relationship between the ciphertext and the plaintext.  5.1.4  Continued Diffusion hides the relationship between the ciphertext and the plaintext. Note
Confusion The idea of confusion is to hide the relationship between the ciphertext and the key.  5.1.4  Continued Confusion hides the relationship between the ciphertext and the key. Note
Rounds Diffusion and confusion can be achieved using iterated product ciphers where each iteration is a combination of S-boxes, P-boxes, and other components.  5.1.4  Continued
 
Confusion and Diffusion ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Feistel Cipher Structure ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Feistel Cipher Structure
Feistel Cipher Design Principles ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Feistel Cipher Decryption
Average time required for exhaustive  key search  2.15 milliseconds 2 32  = 4.3 x 10 9 32 5.9  x  10 30   years 2 168  = 3.7 x 10 50 168 5.4 x 10 18   years 2 128  = 3.4 x 10 38 128 10 hours 2 56  = 7.2 x 10 16 56 Time required at 10 6  Decryption/ µs Number of Alternative Keys Key Size (bits)
3.3 Data Encryption Standard (DES) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DES History ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Security analysis of DES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
A single round
6.2.3   Continued Figure 6.10 Key generation
 
 
 
 
Avalanche effect ,[object Object],[object Object]
Avalanche effect (cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Fast avalanche effect ,[object Object]
3.7  Modes of Operation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Modes of operations  (Overview) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
ECB mode ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ECB mode (cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ECB mode (cont.)
ECB mode (cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object]
ECB mode (cont.)
Advantages and Limitations of ECB ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cipher Block Chaining (CBC)  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CBC mode (Cont….) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CBC mode (cont.)
CBC mode (cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CBC mode (cont.)
Advantages and Limitations of CBC ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CFB mode (Cipher feedback) ,[object Object],[object Object],[object Object],[object Object],[object Object]
CFB mode (cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CFB mode (cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
Advantages and Limitations of CFB ,[object Object],[object Object],[object Object],[object Object],[object Object]
OFB mode (Output feedback)   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
Counter (CTR) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Counter (CTR)
Advantages and Limitations of CTR ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Modes of operations ( Summary )  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Ch06 - Double DES ,[object Object],[object Object]
The first approach is to use double DES (2DES).  6.4.1  Double DES Meet-in-the-Middle Attack However, using a known-plaintext attack called  meet-in-the-middle attack  proves that double DES improves this vulnerability slightly (to 2 57  tests), but not tremendously (to 2 112 ).
Double DES (cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
6.4.1   Continued Figure 6.14  Meet-in-the-middle attack for double DES
6.4.1   Continued Figure 6.15  Tables for meet-in-the-middle attack
6.4.2   Triple DES Figure 6.16  Triple DES with two keys
Triple DES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
6.4.2   Continuous Triple DES with Three Keys The possibility of known-plaintext attacks on triple DES with two keys has enticed some applications to use triple DES with three keys. Triple DES with three keys is used by many applications such as PGP (See Chapter 16).
IDEA… (International Data Encryption Algorithm) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Design  Issues  ,[object Object],[object Object],[object Object],[object Object]
 
Encryption Key Generation.
Encryption Algorithm.
Sequence of operation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Continue.. ,[object Object],[object Object],[object Object],[object Object]
Operation in output transformation  ,[object Object],[object Object],[object Object],[object Object]
Next generation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Stream Ciphers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Stream Cipher Properties ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Stream Cipher :  RC4 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
WLAN WEP (WLAN security requirement and some attacks.ppt) ,[object Object],[object Object]
WLAN WEP (WLAN security requirement and some attacks.ppt) ,[object Object],[object Object],[object Object],[object Object],[object Object]
WLAN WEP (WLAN security requirement and some attacks.ppt) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
WLAN WEP (WLAN security requirement and some attacks.ppt) IEEE802.1X None Key Management Michael  Enforcing IV sequencing CRC-32 None Packet Data Replay detection 48-bit IV TKIP mixing function 24-bit wrapping IV  Concatenate IV to base key Key Lifetime Per-packet-key RC4 128-bit  encryption 64-bit authentication RC4 40  or 104-bit encryption Cipher Key Size(s) TKIP WEP
WLAN EAP (EAP series methods on wireless security.ppt) ,[object Object],EAP RADIUS
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],WLAN EAP (EAP series methods on wireless security.ppt)

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Cryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie BrownCryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie Brown
 
2. Stream Ciphers
2. Stream Ciphers2. Stream Ciphers
2. Stream Ciphers
 
Operating System Security
Operating System SecurityOperating System Security
Operating System Security
 
Base-64 Presentation
Base-64 PresentationBase-64 Presentation
Base-64 Presentation
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
Hash Function
Hash FunctionHash Function
Hash Function
 
Public key infrastructure
Public key infrastructurePublic key infrastructure
Public key infrastructure
 
Birthday Paradox explained
Birthday Paradox explainedBirthday Paradox explained
Birthday Paradox explained
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
One time pad Encryption:
One time pad Encryption:One time pad Encryption:
One time pad Encryption:
 
CS9222 ADVANCED OPERATING SYSTEMS
CS9222 ADVANCED OPERATING SYSTEMSCS9222 ADVANCED OPERATING SYSTEMS
CS9222 ADVANCED OPERATING SYSTEMS
 
Message digest 5
Message digest 5Message digest 5
Message digest 5
 
Email security
Email securityEmail security
Email security
 
Cryptographic hash function md5
Cryptographic hash function md5Cryptographic hash function md5
Cryptographic hash function md5
 
Message Authentication
Message AuthenticationMessage Authentication
Message Authentication
 
Network security cryptographic hash function
Network security  cryptographic hash functionNetwork security  cryptographic hash function
Network security cryptographic hash function
 
Cryptography and PKI
Cryptography and PKICryptography and PKI
Cryptography and PKI
 
Data encryption standard
Data encryption standardData encryption standard
Data encryption standard
 
Chapter- I introduction
Chapter- I introductionChapter- I introduction
Chapter- I introduction
 
Block Cipher and Operation Modes
Block Cipher  and Operation Modes Block Cipher  and Operation Modes
Block Cipher and Operation Modes
 

Similar a Ch03 Ch06 Des And Others

DES Simplified
DES SimplifiedDES Simplified
DES SimplifiedShiraz316
 
334 recitation3-sdes
334 recitation3-sdes334 recitation3-sdes
334 recitation3-sdesBenny SmKr
 
Cryptography Symmetric Key Algorithm (CSE)
Cryptography Symmetric Key Algorithm (CSE)Cryptography Symmetric Key Algorithm (CSE)
Cryptography Symmetric Key Algorithm (CSE)SoumyaBhattacharyya14
 
Computer Security Lecture 4: Block Ciphers and the Data Encryption Standard
Computer Security Lecture 4: Block Ciphers and the Data Encryption StandardComputer Security Lecture 4: Block Ciphers and the Data Encryption Standard
Computer Security Lecture 4: Block Ciphers and the Data Encryption StandardMohamed Loey
 
Computer Security Lecture 5: Simplified Advanced Encryption Standard
Computer Security Lecture 5: Simplified Advanced Encryption StandardComputer Security Lecture 5: Simplified Advanced Encryption Standard
Computer Security Lecture 5: Simplified Advanced Encryption StandardMohamed Loey
 
class5jf.pptx Block cipher in information security
class5jf.pptx Block cipher in information securityclass5jf.pptx Block cipher in information security
class5jf.pptx Block cipher in information security23017156038
 
Crypto-Presentation jfjfd dkfdnfdj kdfjdjfdjkfd .pptx
Crypto-Presentation jfjfd dkfdnfdj kdfjdjfdjkfd .pptxCrypto-Presentation jfjfd dkfdnfdj kdfjdjfdjkfd .pptx
Crypto-Presentation jfjfd dkfdnfdj kdfjdjfdjkfd .pptxanxiousanoja
 
javaPrimitiveTypes.pptx
javaPrimitiveTypes.pptxjavaPrimitiveTypes.pptx
javaPrimitiveTypes.pptxMattMarino13
 
TCN  5080  -­‐‑  Project  1  Description  C.docx
TCN  5080  -­‐‑  Project  1  Description  C.docxTCN  5080  -­‐‑  Project  1  Description  C.docx
TCN  5080  -­‐‑  Project  1  Description  C.docxssuserf9c51d
 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithmsAnamika Singh
 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithmsAnamika Singh
 
Data Protection Techniques and Cryptography
Data Protection Techniques and CryptographyData Protection Techniques and Cryptography
Data Protection Techniques and CryptographyTalha SAVAS
 
Assignment2 – Simplified DES Encrypt and Decrypt .docx
Assignment2 – Simplified DES Encrypt and Decrypt                  .docxAssignment2 – Simplified DES Encrypt and Decrypt                  .docx
Assignment2 – Simplified DES Encrypt and Decrypt .docxmckellarhastings
 

Similar a Ch03 Ch06 Des And Others (20)

DES Block Cipher Hao Qi
DES Block Cipher Hao QiDES Block Cipher Hao Qi
DES Block Cipher Hao Qi
 
DES Simplified
DES SimplifiedDES Simplified
DES Simplified
 
334 recitation3-sdes
334 recitation3-sdes334 recitation3-sdes
334 recitation3-sdes
 
S-DES.ppt
S-DES.pptS-DES.ppt
S-DES.ppt
 
Cryptography Symmetric Key Algorithm (CSE)
Cryptography Symmetric Key Algorithm (CSE)Cryptography Symmetric Key Algorithm (CSE)
Cryptography Symmetric Key Algorithm (CSE)
 
Computer Security Lecture 4: Block Ciphers and the Data Encryption Standard
Computer Security Lecture 4: Block Ciphers and the Data Encryption StandardComputer Security Lecture 4: Block Ciphers and the Data Encryption Standard
Computer Security Lecture 4: Block Ciphers and the Data Encryption Standard
 
Computer Security Lecture 5: Simplified Advanced Encryption Standard
Computer Security Lecture 5: Simplified Advanced Encryption StandardComputer Security Lecture 5: Simplified Advanced Encryption Standard
Computer Security Lecture 5: Simplified Advanced Encryption Standard
 
Wepwhacker !
Wepwhacker !Wepwhacker !
Wepwhacker !
 
section-7.ppt
section-7.pptsection-7.ppt
section-7.ppt
 
Ch8a
Ch8aCh8a
Ch8a
 
03 UNIT-2.pdf
03 UNIT-2.pdf03 UNIT-2.pdf
03 UNIT-2.pdf
 
class5jf.pptx Block cipher in information security
class5jf.pptx Block cipher in information securityclass5jf.pptx Block cipher in information security
class5jf.pptx Block cipher in information security
 
Data Formats used by Computers
Data Formats used by ComputersData Formats used by Computers
Data Formats used by Computers
 
Crypto-Presentation jfjfd dkfdnfdj kdfjdjfdjkfd .pptx
Crypto-Presentation jfjfd dkfdnfdj kdfjdjfdjkfd .pptxCrypto-Presentation jfjfd dkfdnfdj kdfjdjfdjkfd .pptx
Crypto-Presentation jfjfd dkfdnfdj kdfjdjfdjkfd .pptx
 
javaPrimitiveTypes.pptx
javaPrimitiveTypes.pptxjavaPrimitiveTypes.pptx
javaPrimitiveTypes.pptx
 
TCN  5080  -­‐‑  Project  1  Description  C.docx
TCN  5080  -­‐‑  Project  1  Description  C.docxTCN  5080  -­‐‑  Project  1  Description  C.docx
TCN  5080  -­‐‑  Project  1  Description  C.docx
 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithms
 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithms
 
Data Protection Techniques and Cryptography
Data Protection Techniques and CryptographyData Protection Techniques and Cryptography
Data Protection Techniques and Cryptography
 
Assignment2 – Simplified DES Encrypt and Decrypt .docx
Assignment2 – Simplified DES Encrypt and Decrypt                  .docxAssignment2 – Simplified DES Encrypt and Decrypt                  .docx
Assignment2 – Simplified DES Encrypt and Decrypt .docx
 

Último

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 

Último (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

Ch03 Ch06 Des And Others

  • 1.
  • 2. Chapter 3 & Chapter 6 – Block Ciphers 、 DES 、 Others 3.1 Simplified DES 3.2 Block Cipher Principles 3.3 The Data Encryption Standard 3.4 The Strength of DES 3.5 Differential and Linear Cryptanalysis 3.6 Block Cipher Design Principles 3.7 Block Cipher Modes of Operation Ch06- Contemporary symmetric ciphers
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.  
  • 9.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 17.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25. S-DES encryption (cont.) S1( b1 b2 b3 b4 ) Example: S0(0 01 0)=00, S1(0 01 0)=10 11 00 01 10 11 00 01 00 11 10 11 01 00 10 01 11 10 10 00 00 11 10 01 00 b2b3 b1b4
  • 26.
  • 27. S-DES encryption (cont.) 1001 1001 1001 1100 0011 0101 1010 01 00 1000
  • 28.
  • 29.
  • 30.
  • 31.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38. S-DES decryption Encrytion/Decryption e/d flag P/ C K 1 / K 2 K 2 / K 1 C/ P
  • 39.
  • 40.
  • 41. Shannon introduced the concept of a product cipher. A product cipher is a complex cipher combining substitution, permutation, and other components discussed in previous sections. 5.1.4 Product Ciphers
  • 42. Diffusion The idea of diffusion is to hide the relationship between the ciphertext and the plaintext. 5.1.4 Continued Diffusion hides the relationship between the ciphertext and the plaintext. Note
  • 43. Confusion The idea of confusion is to hide the relationship between the ciphertext and the key. 5.1.4 Continued Confusion hides the relationship between the ciphertext and the key. Note
  • 44. Rounds Diffusion and confusion can be achieved using iterated product ciphers where each iteration is a combination of S-boxes, P-boxes, and other components. 5.1.4 Continued
  • 45.  
  • 46.
  • 47.
  • 49.
  • 51. Average time required for exhaustive key search 2.15 milliseconds 2 32 = 4.3 x 10 9 32 5.9 x 10 30 years 2 168 = 3.7 x 10 50 168 5.4 x 10 18 years 2 128 = 3.4 x 10 38 128 10 hours 2 56 = 7.2 x 10 16 56 Time required at 10 6 Decryption/ µs Number of Alternative Keys Key Size (bits)
  • 52.
  • 53.
  • 54.
  • 55.  
  • 57. 6.2.3 Continued Figure 6.10 Key generation
  • 58.  
  • 59.  
  • 60.  
  • 61.  
  • 62.
  • 63.
  • 64.
  • 65.
  • 66.
  • 67.  
  • 68.
  • 69.
  • 71.
  • 73.
  • 74.
  • 75.
  • 77.
  • 79.
  • 80.
  • 81.
  • 82.
  • 83.  
  • 84.
  • 85.
  • 86.  
  • 87.
  • 89.
  • 90.
  • 91.
  • 92. The first approach is to use double DES (2DES). 6.4.1 Double DES Meet-in-the-Middle Attack However, using a known-plaintext attack called meet-in-the-middle attack proves that double DES improves this vulnerability slightly (to 2 57 tests), but not tremendously (to 2 112 ).
  • 93.
  • 94. 6.4.1 Continued Figure 6.14 Meet-in-the-middle attack for double DES
  • 95. 6.4.1 Continued Figure 6.15 Tables for meet-in-the-middle attack
  • 96. 6.4.2 Triple DES Figure 6.16 Triple DES with two keys
  • 97.
  • 98.  
  • 99. 6.4.2 Continuous Triple DES with Three Keys The possibility of known-plaintext attacks on triple DES with two keys has enticed some applications to use triple DES with three keys. Triple DES with three keys is used by many applications such as PGP (See Chapter 16).
  • 100.
  • 101.
  • 102.  
  • 105.
  • 106.
  • 107.
  • 108.
  • 109.
  • 110.
  • 111.
  • 112.
  • 113.
  • 114.
  • 115. WLAN WEP (WLAN security requirement and some attacks.ppt) IEEE802.1X None Key Management Michael Enforcing IV sequencing CRC-32 None Packet Data Replay detection 48-bit IV TKIP mixing function 24-bit wrapping IV Concatenate IV to base key Key Lifetime Per-packet-key RC4 128-bit encryption 64-bit authentication RC4 40 or 104-bit encryption Cipher Key Size(s) TKIP WEP
  • 116.
  • 117.