0% found this document useful (0 votes)
12 views

Lecture On AES

Uploaded by

Muhammad Usman
Copyright
© © All Rights Reserved
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views

Lecture On AES

Uploaded by

Muhammad Usman
Copyright
© © All Rights Reserved
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 24

DATA SECURITY &

CRYPTOGRAPHY
By: Dr. Danish Shehzad
CLASSIFICATION OF CRYPTOLOGY
TODAY’S LECTURE
 Block Ciphers
 Data Encryption Standard (DES)
 DES Encryption / Decryption
 Strength of DES

 Weakness of DES

 Multiple DES Encryption


 Double DES
 Meet-in-the Middle Attack
 Triple DES
 Advance Encryption Standard (AES)
DES WEAKNESS
 DES is vulnerable to brute force attack due to small key
size
 Alternative block cipher that makes use of DES
software/equipment/knowledge: encrypt multiple times
with different keys
 Options:
1. Double DES
2. Triple DES
DOUBLE DES

 For DES, 2 × 56-bit keys, meaning 112-bit key length


 Meet-in-the-middle attack makes it easier
MEET-IN-THE-MIDDLE ATTACK
 Double DES Encryption: C = E(K2; E(K1; P))
 Say X = E(K1; P) = D(K2; C)
 Attacker knows two plaintext, ciphertext pairs (Pa; Ca) and (Pb; Cb)
1. Encrypt Pa using all 256 values of K1 to get multiple values of
X
2. Store results in table and sort by X
3. Decrypt Ca using all 256 values of K2
4. As each decryption result produced, check against table
5. If match, check current K1; K2 on Cb. If Pb obtained, then accept
the keys
 With two known plaintext, ciphertext pairs, probability of successful attack
is almost 1
 Encrypt/decrypt operations required: 256 (twice as many as single DES)
EXAMPLE: MEET-IN-THE-MIDDLE
ATTACK
TRIPLE DES (3DES)

We saw that Double-DES has a key length of 112 bits,


but meet-in-the-middle attack against Double-DES
reduces its work factor to about the same as DES.
Thus, it is no more secure than DES. So let’s move on
to 3DES.
TRIPLE DES (3DES)

Many successful attacks against DES and the


realization that the useful lifetime of DES was about
up; brought much support for 3DES. NIST knew that
a new standard had to be created, which ended up
being AES, but a quick fix was needed in the
meantime to provide more protection for sensitive
data. The result: 3DES (also known as TDEA—Triple
Data Encryption Algorithm).
3DES PERFORMANCE

3DES uses 48 rounds in its computation, which makes


it highly resistant to differential cryptanalysis.
However, because of the extra work 3DES performs,
there is a heavy performance hit. It can take up to three
times longer than DES to perform encryption and
decryption.
3DES MODES
 DES-EEE3 Uses three different keys for encryption, and
the data are encrypted, encrypted, encrypted
 DES-EDE3 Uses three different keys for encryption, and
the data are encrypted, decrypted, and encrypted
 DES-EEE2 The same as DES-EEE3 but uses only two
keys, and the first and third encryption processes use the
same key
 DES-EDE2 The same as DES-EDE3 but uses only two
keys, and the first and third encryption processes use the
same key
ADVANCED ENCRYPTION STANDARD
(AES)

After DES was used as an encryption standard for


over 20 years and it was cracked in a relatively short
time once the necessary technology was available,
NIST decided a new standard, the Advanced
Encryption Standard (AES), needed to be put into
place.
AES
 Rijndael chosen, standard called AES created in 2001
 AES:
 Block size: 128 bits (others possible)
 Key size: 128, 192, 256 bits
 Rounds: 10, 12, 14 (depending on key)
 Operations: XOR with round key, substitutions using S-Boxes, mixing
using Galois Field arithmetic
 Widely used in file encryption, network communications
 Generally considered secure
ADVANCED ENCRYPTION STANDARD
(AES)

Advanced Encryption Standard (AES, Rijndael block cipher).exe


AES ENCRYPTION VS. DECRYPTION
SOME KEY APPLICATIONS
 RAR
 Winzip
 VPNs
 IEEE 802.11e
 Signal Protocol
 Facebook Messenger
 Whatsapp

Hopefully, you are now beginning to realize just how integral AES in
running the entire framework of modern society.
STRENGTHS OF AES
 As it is implemented in both hardware and software, it is most
robust security protocol.
 It uses higher length key sizes such as 128, 192 and 256 bits for
encryption. Hence it makes AES algorithm more robust against
hacking.
 It is most common security protocol used for wide various of
applications such as wireless communication, financial transactions,
e-business, encrypted data storage etc.
 It is one of the most spread commercial and open source solutions
used all over the world.
 For 128 bit, about 2128 attempts are needed to break. This makes it
very difficult to hack it as a result it is very safe protocol.

You might also like