Bài giảng Mật mã học: Other block ciphers - Huỳnh Trọng Thưa
Số trang: 19
Loại file: pdf
Dung lượng: 1,001.35 KB
Lượt xem: 23
Lượt tải: 0
Xem trước 2 trang đầu tiên của tài liệu này:
Thông tin tài liệu:
Bài giảng "Mật mã học: Other block ciphers" cung cấp cho người học các kiến thức: What will we learn, electronic codebook mode, CBC critics, cipher feedback mode, counter mode, exhaustive key search revisited,... Mời các bạn cùng tham khảo nội dung chi tiết.
Nội dung trích xuất từ tài liệu:
Bài giảng Mật mã học: Other block ciphers - Huỳnh Trọng Thưa Other Block Ciphers Huỳnh Trọng Thưa htthua@ptithcm.edu.vn What will we learn? • The most important modes of operation for block ciphers in practice • Security pitfalls when using modes of operations • The principles of key whitening • Why double encryption is not a good idea, and the meet-in-the-middle attack • Triple encryption 2 Encryption with Block Ciphers: Modes of Operation • Electronic Code Book mode (ECB), • Cipher Block Chaining mode (CBC), • Cipher Feedback mode (CFB), • Output Feedback mode (OFB), • Counter mode (CTR). 3 Electronic Codebook Mode (ECB) 4 ECB critics • Advantages – Block synchronization is not necessary. • Problem – identical plaintext blocks result in identical ciphertext blocks, as long as the key does not change – Replay attack • Usage: – not recommended to encrypt more than one block of data – encryption in database 5 Ex of Substitution attack against electronic bank transfer • Oscar observes the ciphertexts going through the communication network. • After a while he can recognize the five blocks of his own transfer. He now stores blocks 1, 3 and 4 of these transfers. • The same key is used for several other transfers between bank A and B. • By comparing blocks 1 and 3 of all subsequent messages with the ones he has stored, Oscar recognizes all transfers that are made from some account at bank A to some account at bank B. • He now simply replaces block 4 — which contains the receiving account number — with the block 4 that he stored before. 6 Encryption of bitmaps in ECB mode 7 Cipher Block Chaining Mode (CBC) 8 CBC critics Decryption of all subsequent blocks yi, i ≥ 2 9 CBC critics (cont.) • Good – Randomized encryption: repeated text gets mapped to different encrypted data. – A ciphertext block depends on all preceding plaintext blocks blocks • reorder affects decryption • Bad – Errors in one block propagate to two blocks – Sequential encryption, cannot use parallel hardware 10 Encryption of bitmaps in CBC mode 11 Output Feedback Mode (OFB) Key stream is not generated bitwise but instead in a blockwise fashion. 12 Cipher Feedback Mode (CFB) 13 Counter Mode (CTR) 14 Exhaustive Key Search Revisited • A brute-force attack can produce false positive results. • Ex: A cipher with a block width of 64 bit and a key size of 80 bit. we find on average 280/264 = 216 keys that perform the mapping ek(x1)= y1. Multiple keys map between one plaintext and one ciphertext 15 Increasing the Security of Block Ciphers • Multiple encryption – Double Encryption – Triple Encryption – Problem: Meet-in-the-Middle Attack • Key whitening 16 Double Encryption and Meet-in- the-Middle Attack • Key length: κ bits • Brute-force attack: require 2κ ·2κ =22κ encryptions (or decryptions) • Meet-in-the-middle attack: – The total complexity is 2κ +2κ = 2·2κ = 2κ+1. 17 Triple Encryption and Meet-in-the- Middle Attack • Key length: κ bits • Brute-force attack: require 2κ ·2κ ·2κ =23κ encryptions (or decryptions) • Meet-in-the-middle attack: – The total complexity is 22κ. – 3DES;:56 bits key => attacker performs 2112 key tests (not 2168) 18 Key Whitening 19
Nội dung trích xuất từ tài liệu:
Bài giảng Mật mã học: Other block ciphers - Huỳnh Trọng Thưa Other Block Ciphers Huỳnh Trọng Thưa htthua@ptithcm.edu.vn What will we learn? • The most important modes of operation for block ciphers in practice • Security pitfalls when using modes of operations • The principles of key whitening • Why double encryption is not a good idea, and the meet-in-the-middle attack • Triple encryption 2 Encryption with Block Ciphers: Modes of Operation • Electronic Code Book mode (ECB), • Cipher Block Chaining mode (CBC), • Cipher Feedback mode (CFB), • Output Feedback mode (OFB), • Counter mode (CTR). 3 Electronic Codebook Mode (ECB) 4 ECB critics • Advantages – Block synchronization is not necessary. • Problem – identical plaintext blocks result in identical ciphertext blocks, as long as the key does not change – Replay attack • Usage: – not recommended to encrypt more than one block of data – encryption in database 5 Ex of Substitution attack against electronic bank transfer • Oscar observes the ciphertexts going through the communication network. • After a while he can recognize the five blocks of his own transfer. He now stores blocks 1, 3 and 4 of these transfers. • The same key is used for several other transfers between bank A and B. • By comparing blocks 1 and 3 of all subsequent messages with the ones he has stored, Oscar recognizes all transfers that are made from some account at bank A to some account at bank B. • He now simply replaces block 4 — which contains the receiving account number — with the block 4 that he stored before. 6 Encryption of bitmaps in ECB mode 7 Cipher Block Chaining Mode (CBC) 8 CBC critics Decryption of all subsequent blocks yi, i ≥ 2 9 CBC critics (cont.) • Good – Randomized encryption: repeated text gets mapped to different encrypted data. – A ciphertext block depends on all preceding plaintext blocks blocks • reorder affects decryption • Bad – Errors in one block propagate to two blocks – Sequential encryption, cannot use parallel hardware 10 Encryption of bitmaps in CBC mode 11 Output Feedback Mode (OFB) Key stream is not generated bitwise but instead in a blockwise fashion. 12 Cipher Feedback Mode (CFB) 13 Counter Mode (CTR) 14 Exhaustive Key Search Revisited • A brute-force attack can produce false positive results. • Ex: A cipher with a block width of 64 bit and a key size of 80 bit. we find on average 280/264 = 216 keys that perform the mapping ek(x1)= y1. Multiple keys map between one plaintext and one ciphertext 15 Increasing the Security of Block Ciphers • Multiple encryption – Double Encryption – Triple Encryption – Problem: Meet-in-the-Middle Attack • Key whitening 16 Double Encryption and Meet-in- the-Middle Attack • Key length: κ bits • Brute-force attack: require 2κ ·2κ =22κ encryptions (or decryptions) • Meet-in-the-middle attack: – The total complexity is 2κ +2κ = 2·2κ = 2κ+1. 17 Triple Encryption and Meet-in-the- Middle Attack • Key length: κ bits • Brute-force attack: require 2κ ·2κ ·2κ =23κ encryptions (or decryptions) • Meet-in-the-middle attack: – The total complexity is 22κ. – 3DES;:56 bits key => attacker performs 2112 key tests (not 2168) 18 Key Whitening 19
Tìm kiếm theo từ khóa liên quan:
Bài giảng Mật mã học Mật mã học Other block ciphers Other block ciphers Electronic codebook mode Cipher feedback mode Counter modeTài liệu liên quan:
-
Giáo trình Mật mã học - PGS.TS. Nguyễn Bình (chủ biên)
325 trang 112 0 0 -
Giáo trình Cơ sở mật mã học: Phần 1
85 trang 47 0 0 -
Hệ mật mã dựa trên đường cong Elliptic
12 trang 30 0 0 -
Bài giảng An toàn an ninh thông tin: Bài 2 - Bùi Trọng Tùng
42 trang 30 0 0 -
Bài giảng Phát triển ứng dụng web: Chương 8 - Lê Đình Thanh
70 trang 29 0 0 -
Bài giảng Mật mã học: Mật mã cơ sở - Huỳnh Trọng Thưa
7 trang 27 0 0 -
Giáo trình An toàn và bảo mật thông tin – ĐH Hàng Hải
145 trang 27 0 0 -
Bài giảng An toàn thông tin - Chương 2: Mật mã học
39 trang 26 0 0 -
Giáo trình Mật mã học: Phần 2 – HV Bưu chính Viễn thông
168 trang 26 0 0 -
Bài giảng An toàn bảo mật hệ thống: Chủ đề 1 - Nguyễn Xuân Vinh
43 trang 25 0 0