Lecture5

  • June 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Lecture5 as PDF for free.

More details

  • Words: 474
  • Pages: 22
Inam Ul Haq

 The

Strength of DES.  There are two concern 



Cryptography by exploiting the characteristics of the algorithm until now there is no (at least public acknowledged ) weakness in the algorithm. The key lenght.

 The

national Institute for Security Technology (NIST), after 4 years of consideration has introduce Advance Encryption starndard to replace previous DES.  Introduced in November 2001, the standard use Rijndael algorithm.  Developed by joan and Vicent Rijmen (Belgium)

Rijndeal is a an iterated block cipher, Each Intermediate cipher result is called a state.  Rijndeal can operate over a variable-lenght block using variable-lenght key; (128,192,256 bits) ( AES only support a 128-bits block size)  The algorithm is written so that block length and/or key lenght can easily be extended in multiples of 32 bits.  Do not use a feistel structure as it process the entire data block in parallel during each round using substitutions and liner transformations.  In classic Feistel structure, half of the data block is used to modify the other half of data block and then haves are swapped. 

 Electronic

Code Book. A block cipher processes one bit block of data at a time.

 Example:DES 

This mode of DES algorithm should avoided as far as possible why ?

 CFM

converts DES into a stream Cipher. If the unit of transmission is j-bits (i.e j=8bits)      

Start with an initial vector (iv) given Shift j bits Encrypt using DES Select first j bits Xor it with the j bits of the message Use the encrypted message as new iV

 The

block cipher security depends on the secrecy of the key.  The weakest part of all existing crypto system is key negotiation. Once the key negotiation is broken the encryption is worthless.

 Problem 





There is no message signature. That is a sender cannot prove to his partner that he has sent the message. (e.g important problem in E-commerce) The key have to be negotiated on a channel whose security is higher than the channel used for the normal transmission. The number of keys. For a network with n partners that exchange messages with everyone n(n-1) keys needed. (i.e if n=1000 then number of keys=999 000)

 Partner

A selects the key and physically delivered to partner B.  Third party partner C selects the key and physically delivered to A and B.  If A and B previously and recently used a key, A (or B) can transmit a new key to other, encrypted using the old key.  A and B have an encrypted connection to C,C deliver the new key on the encrypted links to A and B.

 Conventional

Encryption. DES and Rijndeal  Mode of operation  Key distribution

Related Documents

Lecture5
June 2020 4
Lecture5
June 2020 7
Lecture5
June 2020 8
Mark7375-lecture5
May 2020 11
Avr Lecture5
November 2019 34
Lecture5 Bearings
May 2020 8