Top Banner
Chapter 2 Symmetric Ciphers Lecture slides by Lawrie Brown Modifications by Nguyen Cao Da
54

Chapter 2 Symmetric Ciphers Lecture slides by Lawrie Brown Modifications by Nguyen Cao Dat.

Dec 28, 2015

Download

Documents

Conrad Dean
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Chapter 2 Symmetric Ciphers Lecture slides by Lawrie Brown Modifications by Nguyen Cao Dat.

Chapter 2

Symmetric Ciphers

Lecture slides by Lawrie BrownModifications by Nguyen Cao Dat

Page 2: Chapter 2 Symmetric Ciphers Lecture slides by Lawrie Brown Modifications by Nguyen Cao Dat.

BKTP.HCM

Symmetric Encryption

or conventional / private-key / single-keysender and recipient share a common keyall classical encryption algorithms are private-

keywas only type prior to invention of public-key in

1970’sand by far most widely used

2

Page 3: Chapter 2 Symmetric Ciphers Lecture slides by Lawrie Brown Modifications by Nguyen Cao Dat.

BKTP.HCM

Some Basic Terminologyplaintext - original message ciphertext - coded message cipher - algorithm for transforming plaintext to ciphertext key - info used in cipher known only to sender/receiver encipher (encrypt) - converting plaintext to ciphertext decipher (decrypt) - recovering ciphertext from

plaintextcryptography - study of encryption principles/methodscryptanalysis (codebreaking) - study of principles/

methods of deciphering ciphertext without knowing keycryptology - field of both cryptography and

cryptanalysis

3

Page 4: Chapter 2 Symmetric Ciphers Lecture slides by Lawrie Brown Modifications by Nguyen Cao Dat.

BKTP.HCM

Symmetric Cipher Model

4

Page 5: Chapter 2 Symmetric Ciphers Lecture slides by Lawrie Brown Modifications by Nguyen Cao Dat.

BKTP.HCM

Requirementstwo requirements for secure use of symmetric

encryption:▫a strong encryption algorithm▫a secret key known only to sender / receiver

mathematically have:Y = EK(X)X = DK(Y)

assume encryption algorithm is knownimplies a secure channel to distribute key

5

Page 6: Chapter 2 Symmetric Ciphers Lecture slides by Lawrie Brown Modifications by Nguyen Cao Dat.

BKTP.HCM

Secure channel

6

Page 7: Chapter 2 Symmetric Ciphers Lecture slides by Lawrie Brown Modifications by Nguyen Cao Dat.

BKTP.HCM

Types of attacksType of Attack

Known to Cryptanalyst

Ciphertext only

Encryption algorithmCiphertext

Known plaintext

Encryption algorithmCiphertextOne or more plaintext-ciphertext pairs formed with the secret key

Chosen plaintext

Encryption algorithmCiphertextPlaintext message chosen by cryptanalyst, together with its corresponding ciphertext generated with the secret key

Chosen ciphertext

Encryption algorithmCiphertextPurported ciphertext chosen by cryptanalyst, together with its corresponding decrypted plaintext generated with the secret key

Chosen text

Chosen plaintext + Chosen ciphertext

7

Page 8: Chapter 2 Symmetric Ciphers Lecture slides by Lawrie Brown Modifications by Nguyen Cao Dat.

BKTP.HCM

How secure is secure ? (1)

Unconditionally secure▫ciphertext generated by the scheme not contain

enough information to determine uniquely the corresponding plaintext, no matter how much ciphertext is available

▫ no encryption algorithm that is unconditionally secure

8

Page 9: Chapter 2 Symmetric Ciphers Lecture slides by Lawrie Brown Modifications by Nguyen Cao Dat.

BKTP.HCM

How secure is secure ? (2)

computationally secure: at least one below met▫The cost of breaking the cipher exceeds the value

of the encrypted information▫The time required to break the cipher exceeds the

useful lifetime of the information

9

Page 10: Chapter 2 Symmetric Ciphers Lecture slides by Lawrie Brown Modifications by Nguyen Cao Dat.

BKTP.HCM

Classical Substitution Ciphers

where letters of plaintext are replaced by other letters or by numbers or symbols

or if plaintext is viewed as a sequence of bits, then substitution involves replacing plaintext bit patterns with ciphertext bit patterns

10

Page 11: Chapter 2 Symmetric Ciphers Lecture slides by Lawrie Brown Modifications by Nguyen Cao Dat.

BKTP.HCM

Transposition Ciphers

now consider classical transposition or permutation ciphers

these hide the message by rearranging the letter order

without altering the actual letters usedcan recognise these since have the same

frequency distribution as the original text

11

Page 12: Chapter 2 Symmetric Ciphers Lecture slides by Lawrie Brown Modifications by Nguyen Cao Dat.

BKTP.HCM

Product Ciphersciphers using substitutions or transpositions are

not secure because of language characteristicshence consider using several ciphers in

succession to make harder, but: ▫ two substitutions make a more complex substitution ▫ two transpositions make more complex transposition ▫but a substitution followed by a transposition makes a

new much harder cipher this is bridge from classical to modern ciphers

12

Page 13: Chapter 2 Symmetric Ciphers Lecture slides by Lawrie Brown Modifications by Nguyen Cao Dat.

BKTP.HCM

Rotor Machinesbefore modern ciphers, rotor machines were

most common complex ciphers in usewidely used in WW2▫German Enigma, Allied Hagelin, Japanese Purple

implemented a very complex, varying substitution cipher

used a series of cylinders, each giving one substitution, which rotated and changed after each letter was encrypted

with 3 cylinders have 263=17576 alphabets

13

Page 14: Chapter 2 Symmetric Ciphers Lecture slides by Lawrie Brown Modifications by Nguyen Cao Dat.

BKTP.HCM

Hagelin Rotor Machine

14

Page 15: Chapter 2 Symmetric Ciphers Lecture slides by Lawrie Brown Modifications by Nguyen Cao Dat.

BKTP.HCM

Modern Block Ciphers

one of the most widely used types of cryptographic algorithms

provide secrecy /authentication servicesfocus on DES (Data Encryption Standard)to illustrate block cipher design principles

15

Page 16: Chapter 2 Symmetric Ciphers Lecture slides by Lawrie Brown Modifications by Nguyen Cao Dat.

BKTP.HCM

Block vs Stream Ciphers

block ciphers process messages in blocks, each of which is then en/decrypted

like a substitution on very big characters▫64-bits or more

stream ciphers process messages a bit or byte at a time when en/decrypting

many current ciphers are block ciphersbroader range of applications

16

Page 17: Chapter 2 Symmetric Ciphers Lecture slides by Lawrie Brown Modifications by Nguyen Cao Dat.

BKTP.HCM

Block Cipher Principlesmost symmetric block ciphers are based on a

Feistel Cipher Structureneeded since must be able to decrypt

ciphertext to recover messages efficientlyblock ciphers look like an extremely large

substitution would need table of 264 entries for a 64-bit block instead create from smaller building blocks using idea of a product cipher

17

Page 18: Chapter 2 Symmetric Ciphers Lecture slides by Lawrie Brown Modifications by Nguyen Cao Dat.

BKTP.HCM

Ideal Block Cipher

18

Page 19: Chapter 2 Symmetric Ciphers Lecture slides by Lawrie Brown Modifications by Nguyen Cao Dat.

BKTP.HCM

Cryptography & Network Security

Reversible mapping

Reversible Irreversible

Plaintext Ciphertext

00 11

01 10

10 00

11 01

Plaintext Ciphertext

00 11

01 10

10 01

11 01

19

Page 20: Chapter 2 Symmetric Ciphers Lecture slides by Lawrie Brown Modifications by Nguyen Cao Dat.

BKTP.HCM

Claude Shannon and Substitution-Permutation Ciphers

Claude Shannon introduced idea of substitution-permutation (S-P) networks in 1949

form basis of modern block ciphers S-P nets are based on the two primitive

cryptographic operations seen before: ▫substitution (S-box)▫permutation (P-box)

provide confusion & diffusion of message & key

20

Page 21: Chapter 2 Symmetric Ciphers Lecture slides by Lawrie Brown Modifications by Nguyen Cao Dat.

BKTP.HCM

Confusion and Diffusioncipher needs to completely obscure statistical

properties of original messagea one-time pad does thismore practically Shannon suggested combining

S & P elements to obtain:diffusion – dissipates statistical structure of

plaintext over bulk of ciphertextconfusion – makes relationship between

ciphertext and key as complex as possible

21

Page 22: Chapter 2 Symmetric Ciphers Lecture slides by Lawrie Brown Modifications by Nguyen Cao Dat.

BKTP.HCM

Example on diffusion

Encipher a message

▫by simple diffusion technique

22

,, 21 mmM

26mod1

k

iinn my

Page 23: Chapter 2 Symmetric Ciphers Lecture slides by Lawrie Brown Modifications by Nguyen Cao Dat.

BKTP.HCM

Feistel Cipher Structure

Horst Feistel devised the feistel cipher▫based on concept of invertible product cipher

partitions input block into two halves▫process through multiple rounds which▫perform a substitution on left data half▫based on round function of right half & subkey▫then have permutation swapping halves

implements Shannon’s S-P net concept

23

Page 24: Chapter 2 Symmetric Ciphers Lecture slides by Lawrie Brown Modifications by Nguyen Cao Dat.

BKTP.HCMFeistel Cipher Structure

24

Page 25: Chapter 2 Symmetric Ciphers Lecture slides by Lawrie Brown Modifications by Nguyen Cao Dat.

BKTP.HCM

Feistel Cipher Design Elements

block size key size number of rounds subkey generation algorithmround function fast software en/decryptionease of analysis

25

Page 26: Chapter 2 Symmetric Ciphers Lecture slides by Lawrie Brown Modifications by Nguyen Cao Dat.

BKTP.HCM

Feistel Cipher Decryption

26

Page 27: Chapter 2 Symmetric Ciphers Lecture slides by Lawrie Brown Modifications by Nguyen Cao Dat.

BKTP.HCM

Data Encryption Standard (DES)most widely used block cipher in world adopted in 1977 by NBS (now NIST)encrypts 64-bit data using 56-bit keyhas widespread usehas been considerable controversy over its

security

27

Page 28: Chapter 2 Symmetric Ciphers Lecture slides by Lawrie Brown Modifications by Nguyen Cao Dat.

BKTP.HCM

DES HistoryIBM developed Lucifer cipher▫by team led by Feistel in late 60’s▫used 64-bit data blocks with 128-bit key

then redeveloped as a commercial cipher with input from NSA and others

in 1973 NBS issued request for proposals for a national cipher standard

IBM submitted their revised Lucifer which was eventually accepted as the DES

28

Page 29: Chapter 2 Symmetric Ciphers Lecture slides by Lawrie Brown Modifications by Nguyen Cao Dat.

BKTP.HCM

DES Design Controversy

although DES standard is publicwas considerable controversy over design ▫ in choice of 56-bit key (vs Lucifer 128-bit)▫and because design criteria were classified

subsequent events and public analysis show in fact design was appropriate

use of DES has flourished▫especially in financial applications▫still standardised for legacy application use

29

Page 30: Chapter 2 Symmetric Ciphers Lecture slides by Lawrie Brown Modifications by Nguyen Cao Dat.

BKTP.HCM

DES Encryption Overview

30

Page 31: Chapter 2 Symmetric Ciphers Lecture slides by Lawrie Brown Modifications by Nguyen Cao Dat.

BKTP.HCM

Initial Permutation - IP

first step of the data computation IP reorders the input data bits even bits to LH half, odd bits to RH half quite regular in structure (easy in h/w)example:

IP(675a6967 5e5a6b5a) = (ffb2194d 004df6fb)

31

Page 32: Chapter 2 Symmetric Ciphers Lecture slides by Lawrie Brown Modifications by Nguyen Cao Dat.

BKTP.HCM

DES Round Structure (1)uses two 32-bit L & R halvesas for any Feistel cipher can describe as:

Li = Ri–1

Ri = Li–1 F(Ri–1, Ki)F takes 32-bit R half and 48-bit subkey:▫expands R to 48-bits using perm E▫adds to subkey using XOR▫passes through 8 S-boxes to get 32-bit result▫finally permutes using 32-bit perm P

32

Page 33: Chapter 2 Symmetric Ciphers Lecture slides by Lawrie Brown Modifications by Nguyen Cao Dat.

BKTP.HCM

DES round structure (2)

33

Page 34: Chapter 2 Symmetric Ciphers Lecture slides by Lawrie Brown Modifications by Nguyen Cao Dat.

BKTP.HCM

DES Round Structure (3)

34

Page 35: Chapter 2 Symmetric Ciphers Lecture slides by Lawrie Brown Modifications by Nguyen Cao Dat.

BKTP.HCM

Substitution Boxes Shave eight S-boxes which map 6 to 4 bits each S-box is actually 4 little 4 bit boxes ▫outer bits 1 & 6 (row bits) select one row of 4 ▫ inner bits 2-5 (col bits) are substituted ▫result is 8 lots of 4 bits, or 32 bits

row selection depends on both data & key▫feature known as autoclaving (autokeying)

example:▫S(18 09 12 3d 11 17 38 39) = 5fd25e03

35

Page 36: Chapter 2 Symmetric Ciphers Lecture slides by Lawrie Brown Modifications by Nguyen Cao Dat.

BKTP.HCM

DES Key Schedule

forms subkeys used in each round▫ initial permutation of the key (PC1) which selects

56-bits in two 28-bit halves ▫16 stages consisting of:

rotating each half separately either 1 or 2 places depending on the key rotation schedule K

selecting 24-bits from each half & permuting them by PC2 for use in round function F

note practical use issues in h/w vs s/w

36

Page 37: Chapter 2 Symmetric Ciphers Lecture slides by Lawrie Brown Modifications by Nguyen Cao Dat.

BKTP.HCM

DES Decryption

decrypt must unwind steps of data computation with Feistel design, do encryption steps again

using subkeys in reverse order (SK16 … SK1)▫ IP undoes final FP step of encryption ▫1st round with SK16 undoes 16th encrypt round▫….▫16th round with SK1 undoes 1st encrypt round ▫ then final FP undoes initial encryption IP ▫ thus recovering original data value

37

Page 38: Chapter 2 Symmetric Ciphers Lecture slides by Lawrie Brown Modifications by Nguyen Cao Dat.

BKTP.HCM

Avalanche Effect

key desirable property of encryption algwhere a change of one input or key bit results in

changing approx half output bitsmaking attempts to “home-in” by guessing keys

impossibleDES exhibits strong avalanche

38

Page 39: Chapter 2 Symmetric Ciphers Lecture slides by Lawrie Brown Modifications by Nguyen Cao Dat.

BKTP.HCM

Strength of DES – Key Size

56-bit keys have 256 = 7.2 x 1016 valuesbrute force search looks hardrecent advances have shown is possible▫ in 1997 on Internet in a few months ▫ in 1998 on dedicated h/w (EFF) in a few days ▫ in 1999 above combined in 22hrs!

still must be able to recognize plaintextmust now consider alternatives to DES

39

Page 40: Chapter 2 Symmetric Ciphers Lecture slides by Lawrie Brown Modifications by Nguyen Cao Dat.

BKTP.HCM

Strength of DES – Analytic Attacksnow have several analytic attacks on DESthese utilise some deep structure of the cipher ▫by gathering information about encryptions ▫can eventually recover some/all of the sub-key bits ▫ if necessary then exhaustively search for the rest

generally these are statistical attacksinclude▫differential cryptanalysis ▫ linear cryptanalysis ▫ related key attacks

40

Page 41: Chapter 2 Symmetric Ciphers Lecture slides by Lawrie Brown Modifications by Nguyen Cao Dat.

BKTP.HCM

Strength of DES – Timing Attacks

attacks actual implementation of cipheruse knowledge of consequences of

implementation to derive information about some/all subkey bits

specifically use fact that calculations can take varying times depending on the value of the inputs to it

particularly problematic on smartcards

41

Page 42: Chapter 2 Symmetric Ciphers Lecture slides by Lawrie Brown Modifications by Nguyen Cao Dat.

BKTP.HCM

Differential Cryptanalysisone of the most significant recent (public)

advances in cryptanalysis known by NSA in 70's cf DES designMurphy, Biham & Shamir published in 90’spowerful method to analyse block ciphers used to analyse most current block ciphers with

varying degrees of successDES reasonably resistant to it, cf Lucifer

42

Page 43: Chapter 2 Symmetric Ciphers Lecture slides by Lawrie Brown Modifications by Nguyen Cao Dat.

BKTP.HCM

Differential Cryptanalysis

a statistical attack against Feistel ciphers uses cipher structure not previously used design of S-P networks has output of function f

influenced by both input & keyhence cannot trace values back through cipher

without knowing value of the key differential cryptanalysis compares two related

pairs of encryptions

43

Page 44: Chapter 2 Symmetric Ciphers Lecture slides by Lawrie Brown Modifications by Nguyen Cao Dat.

BKTP.HCM

Differential Cryptanalysis Compares Pairs of Encryptions with a known difference in the input searching for a known difference in outputwhen same subkeys are used

44

Page 45: Chapter 2 Symmetric Ciphers Lecture slides by Lawrie Brown Modifications by Nguyen Cao Dat.

BKTP.HCM

Differential Cryptanalysis

have some input difference giving some output difference with probability p

if find instances of some higher probability input / output difference pairs occurring

can infer subkey that was used in roundthen must iterate process over many rounds

(with decreasing probabilities)

45

Page 46: Chapter 2 Symmetric Ciphers Lecture slides by Lawrie Brown Modifications by Nguyen Cao Dat.

BKTP.HCM

Differential Cryptanalysis

46

Page 47: Chapter 2 Symmetric Ciphers Lecture slides by Lawrie Brown Modifications by Nguyen Cao Dat.

BKTP.HCM

Differential Cryptanalysisperform attack by repeatedly encrypting plaintext pairs

with known input XOR until obtain desired output XOR when found▫ if intermediate rounds match required XOR have a right pair▫ if not then have a wrong pair, relative ratio is S/N for attack

can then deduce keys values for the rounds▫ right pairs suggest same key bits▫ wrong pairs give random values

for large numbers of rounds, probability is so low that more pairs are required than exist with 64-bit inputs

Biham and Shamir have shown how a 13-round iterated characteristic can break the full 16-round DES

47

Page 48: Chapter 2 Symmetric Ciphers Lecture slides by Lawrie Brown Modifications by Nguyen Cao Dat.

BKTP.HCM

Linear Cryptanalysisanother recent development also a statistical method must be iterated over rounds, with decreasing

probabilitiesdeveloped by Matsui et al in early 90'sbased on finding linear approximationscan attack DES with 243 known plaintexts, easier

but still in practise infeasible

48

Page 49: Chapter 2 Symmetric Ciphers Lecture slides by Lawrie Brown Modifications by Nguyen Cao Dat.

BKTP.HCM

Linear Cryptanalysis

find linear approximations with prob p != ½P[i1,i2,...,ia] C[j1,j2,...,jb] = K[k1,k2,...,kc]

where ia,jb,kc are bit locations in P,C,K gives linear equation for key bitsget one key bit using max likelihood algusing a large number of trial encryptions effectiveness given by: |p–1/2|

49

Page 50: Chapter 2 Symmetric Ciphers Lecture slides by Lawrie Brown Modifications by Nguyen Cao Dat.

BKTP.HCM

DES Design Criteria

as reported by Coppersmith in [COPP94]7 criteria for S-boxes provide for ▫non-linearity▫resistance to differential cryptanalysis▫good confusion

3 criteria for permutation P provide for ▫ increased diffusion

50

Page 51: Chapter 2 Symmetric Ciphers Lecture slides by Lawrie Brown Modifications by Nguyen Cao Dat.

BKTP.HCM

Summary

have considered:▫Symmetric cipher model and terminology▫Classical ciphers▫Modern cipher techniques

block vs stream ciphers Feistel cipher design & structure DES details & strength

▫Differential & Linear Cryptanalysis

51

Page 52: Chapter 2 Symmetric Ciphers Lecture slides by Lawrie Brown Modifications by Nguyen Cao Dat.

BKTP.HCM

Suggested Assignments

Assignments 1: (2 groups) Block Cipher Modes▫ECB - Electronic Codebook▫CBC – Cipher Block Chaining▫CFB – Cipher Feedback▫OFB – Output Feedback▫CTR – Counter▫Implement them with Java

52

Page 53: Chapter 2 Symmetric Ciphers Lecture slides by Lawrie Brown Modifications by Nguyen Cao Dat.

BKTP.HCM

Suggested Assignments (con’t)

Assignments 2: (2 groups) Double DES & Triple DES▫Double DES ▫Meet-in-the-Middle Attack▫Triple DES▫Implement them with Java

53

Page 54: Chapter 2 Symmetric Ciphers Lecture slides by Lawrie Brown Modifications by Nguyen Cao Dat.

BKTP.HCM

Suggested Assignments (con’t)

Assignments 3: (2 groups) Other modern Symmetric Ciphers▫RC4▫TEA – Tiny Encryption Algorithm▫Implement them with Java

54