1. Trang chủ
  2. » Cao đẳng - Đại học

Slide an toàn và hệ thống bảo mật thông tin chapter 4 cryptography symmetric modern dec

41 18 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Nội dung

.c om cu u du o ng th an co ng SYMMETRIC CIPHERS CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Contents Block Cipher Principles 2) Feistel Cipher 3) Data Encryption Standard (DEC) cu u du o ng th an co ng 1) CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om ng CRYPTOLOGY an co CRYPTOGRAPHY Transposition ng du o u Substitution ASYMMETRIC MODERN Block ciphers cu CLASSICAL th SYMMETRIC CRYPTANALYSIS Stream ciphers CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om cu u du o ng th an co ng Block Cipher Principles CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Stream Ciphers and Block Ciphers  A stream cipher is a type pf symmetric encryption in which input data is cu u du o ng th an co ng encrypted one bit (byte) at a time CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Stream Ciphers and Block Ciphers  Block Ciphers is one in which the plaintext is divided in blocks and one cu  Block size? u du o ng th an co ng block is encrypted at a time producing a ciphertext of equal length CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om cu u du o ng th an co ng Feistel Cipher CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om The Feistel Cipher  Horst Feistel devised the feistel cipher co ng  Most symmetric block ciphers are based on a feistel cipher structure an  Feistel proposed the use of a cipher that alternates substitutions and ng th permutations, where these terms are defined as follows: du o  Substitution: Each plaintext element or group of elements is uniquely replaced cu u by a corresponding ciphertext element or group of elements  Permutation: A sequence of plaintext elements is replaced by a permutation of that sequence CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Feistel Cipher Structure ng  The Plaintext block: 2w bits co  The plaintext block is divided into two halves, th an L0 and R0 du o ng  L, R pass through n rounds of processing and u then combine to produce the ciphertext block cu  Each round i (1->16): CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Feistel Cipher Principles The exact realization of a Feistel network depends on the choice of the co ng following parameters and design features: th an  Block size: Larger block sizes mean greater security but reduced du o ng encryption/decryption speed for a given algorithm  Key size: Larger key size means greater security but may decrease cu u encryption/decryption speed  Number of rounds: increase number improves security, but slows cipher CuuDuongThanCong.com https://fb.com/tailieudientucntt cu u du o ng th an co ng c om S-Boxes (cont.) CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om ng co an th ng du o u cu CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om ng co an th ng du o u cu CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om S-Boxes (cont.) ng  The input to S-box is 100011 What is the output? cu u du o ng th an co  The input to S-box is 000000 What is the output? CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Permutation Function (P)  The 32-bit output is permutated as defined in the permutation table also to cu u du o ng th an co ng produce the output CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om ng co an th ng du o u cu CuuDuongThanCong.com https://fb.com/tailieudientucntt cu u du o ng th an co ng c om Key Generation CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Key Generation (cont.)  Permuted Choice One (PC-1): co ng  Input: 64-bit cu u du o ng th an  Ouput: 56-bit (Discard the parity-check bits) CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Key Generation (cont.)  The resulting 56-bit key is then treated as co ng two 28-bit quantities, labeled C0 and D0 th an  At each round, Ci-1 and Di-1 are separately ng subjected to a circular left shift or (rotation) u cu calculation table du o of or bits governed by the DES key CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om ng co an th ng du o u cu CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Permuted Choice Two (PC-2) cu u du o ng th an co ng  PC-2 changes the 58 bits to 48 bits, which are used as a key for a round CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om The Strength Of Des  Brute-force attack: With a key length of 56 bits, there are 256 possible co ng keys, which is approximately 7.2 * 106 keys th an  1997 on alarge network of computers in afew months ng  1998 on dedicated H/W in a few days du o  1999 aboved combined in 22 hours (DES cracker + 100,000 computers) cu u  => double DES, triple DES, AES CuuDuongThanCong.com https://fb.com/tailieudientucntt cu u du o ng th an co ng c om Double DES CuuDuongThanCong.com https://fb.com/tailieudientucntt cu u du o ng th an co ng c om Triple DES CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om ng co an th ng du o u cu CuuDuongThanCong.com https://fb.com/tailieudientucntt ... Encryption Standard (DEC) cu u du o ng th an co ng 1) CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om ng CRYPTOLOGY an co CRYPTOGRAPHY Transposition ng du o u Substitution ASYMMETRIC MODERN. .. cryptanalysis th an  Round function F: greater complexity generally means greater resistance cu u du o ng to cryptanalysis CuuDuongThanCong.com https://fb.com/tailieudientucntt cu u du o ng th an. .. Data Encryption Standard - DEC  The Data Encryption Standard (DES) is a symmetric- key block cipher co ng published by the National Institute of Standards and Technology (NIST) th an  A block cipher

Ngày đăng: 18/09/2021, 15:53

TỪ KHÓA LIÊN QUAN

TÀI LIỆU CÙNG NGƯỜI DÙNG

TÀI LIỆU LIÊN QUAN