w2s1 DES
w2s1 DES
Chart 2
Block Cipher Principles, Services and
Mechanisms
Chart 3
C. Shannon and Substitution-Permutation Ciphers
Chart 4
Diffusion and Confusion (1)
Chart 5
Diffusion and Confusion (2)
Chart 6
Feistel Cipher Structure
Chart 7
Block Ciphers and
the Data
Encryption
Standard
Chart 8
Feistel Cipher
■ n sequential rounds
■ A substitution on the left half Li
□ 1. Apply a round function F to the right half Ri and
□ 2. Take XOR of the output of (1) and Li
■ The round function is parameterized by the subkey Ki
□ Ki are derived from the overall key K
Block Ciphers and
the Data
Encryption
Standard
Chart 9
Feistel Cipher Design Principles
■ block size
□ increasing size improves security, but slows cipher
■ key size
□ increasing size improves security, makes exhaustive key searching
harder, but may slow cipher
■ number of rounds
□ increasing number improves security, but slows cipher
■ subkey generation
□ greater complexity can make analysis harder, but slows cipher Block Ciphers and
the Data
■ round function Encryption
Standard
□ greater complexity can make analysis harder, but slows cipher
■ fast software en/decryption & ease of analysis
□ are more recent concerns for practical use and testing Chart 10
Feistel Cipher
Decryption
Chart 11
Data Encryption Standard (DES)
Chart 12
DES History
Chart 13
DES Design Controversy
Chart 14
DES Encryption
Chart 15
Initial Permutation IP
Chart 16
DES Round Structure
Chart 17
DES
Round
Chart 18
Permutation
Chart 19
The round function F(R,K)
Chart 20
Substitution Boxes S
Chart 21
S-Boxes
Chart 22
DES Key Schedule (1)
Chart 23
DES Key Schedule (2)
Chart 24
DES Key Schedule (3)
Chart 25
DES Decryption
Chart 26
Avalanche Effect
Chart 27
Strength of DES – Key Size
Chart 28
Strength of DES – Timing Attacks
Chart 29
Strength of DES – Analytic Attacks
■
Chart 31
Differential Cryptanalysis Compares Pairs of
Encryptions
Chart 32
Differential Cryptanalysis
Chart 33
Linear Cryptanalysis
Chart 34
Criteria for S-Boxes
Chart 35
Block Cipher Design Principles
Chart 36
Block Cipher Design Principles
■ function F:
□ provides “confusion”, is nonlinear, avalanche
□ Strict Avalanche Criterion (SAC)
– Any output bit i should change with p=1/2 when any
single input bit j is inverted, for all i,j
– Applies to both S-Boxes and the overall F function
■ key schedule Block Ciphers and
the Data
□ No general rule has been discovered Encryption
Standard
□ complex subkey creation, key avalanche
Chart 37
Modes of Operation
Chart 38
Electronic Codebook Book (ECB)
Chart 40
Advantages and Limitations of ECB
Chart 41
Cipher Block Chaining (CBC)
Chart 42
Cipher Block Chaining (CBC)
Chart 43
Advantages and Limitations of CBC
Chart 44
Cipher FeedBack (CFB)
Chart 46
Advantages and Limitations of CFB
Chart 47
Output FeedBack (OFB)
Chart 49
Advantages and Limitations of OFB
Chart 50
Counter (CTR)
Chart 51
Counter (CTR)
Chart 52
Advantages and Limitations of CTR
■ efficiency
□ can do parallel encryptions
□ in advance of need
□ good for bursty high speed links
■ random access to encrypted data blocks
□ Do not have to decode from the beginning
■ provable security (good as other modes)
Block Ciphers and
■ but must ensure never reuse key/counter values, the Data
otherwise could break (cf OFB) Encryption
Standard
Chart 53
Summary
■ have considered:
□ block cipher design principles
□ DES
– details
– strength
□ Differential & Linear Cryptanalysis
□ Modes of Operation Block Ciphers and
the Data
– ECB, CBC, CFB, OFB, CTR Encryption
Standard
Chart 54
Insert picture by
clicking the icon
Thank you
for your attention!
Johannes Sianipar