Module 2 Block Cipher
Module 2 Block Cipher
and
Data Encryption Standard,
Block Cipher modes
Groups Contd
• A group is said to be abelian if it satisfies the
following additional condition: (A5) Commutative:
a*b=b*a for all a, b in G.
Pseudorandom stream
The more random-appearing the key stream is, the more randomized the
cipher text is, making cryptanalysis more difficult.
3. The output of the pseudorandom number generator is
conditioned on the value of the input key.
Each round i has as inputs Li-1 and Ri-1, derived from the
previous round, as well as a subkey Ki, derived from the
overall K. In general, the subkeys Ki are different from K
and from each other.
• Substitution is performed on the left half of the data. This is
done by applying a round function F to the right half of the
data and then taking the exclusive-OR of the output of that
function and the left half of the data. The round function has
the same general structure.
After the last iteration of the encryption process, the two halves
of the output are swapped, so that the cipher text is RE16 || LE16.
The output of that round is the cipher text. Now take the cipher
text and use it as input to the same algorithm. The input to the
first round is RE16 || LE16 which is equal to 32 bit swap of the
output of the sixteenth round of the encryption process.
LE16 = RE15
RE16 = LE15 F(RE15, K16)
The cipher text is RE16 || LE16.
On the decryption side,
LD0=RE16
RD0=LE16
LD1 = RD0 = LE16 = RE15
RD1 = LD0 F(RD0, K16)
= RE16 F(RE15, K16)
= [LE15 F(RE15, K16)] F(RE15, K16)
= LE15
The XOR has the following properties:
[A B] C =A [B C]
D D=0
E0=E
We have LD1 = RE15 and RD1 = LE15. Therefore the output of the
first round of the decryption process is RE15 || LE15, which is 32
bit swap of the input to the sixteenth round of the encryption.
For the ith iteration of the encryption algorithm.
LEi = REi-1
REi = LEi-1 F(REi-1, Ki)
Rearranging terms,
REi-1 = LEi
LEi-1 = REi F(REi-1, Ki) = REi F(LEi, Ki)
The output of the last round of the decryption process is RE 0 ||
LE0. A 32 bit swap recovers the original plaintext,
demonstrating the validity of the Feistel decryption process.
The Data Encryption Standard
Most widely used encryption scheme is based on the Data
Encryption Standard (DES) adopted in 1977 by the National
Bureau of Standards
The second area of concern was that the design criteria for the
internal structure of DES, the S-Boxes, were classified. Thus,
users could not be sure that the internal structure of DES was
free of any hidden weak points that would enable NSA to
decipher messages without benefit of the key.
• DES has flourished and is widely used, especially in financial
applications.
•NIST reaffirmed DES for federal use for another five years.
DES
Looking at the left-hand side of the figure, we can see
that the processing of the plaintext proceeds in three
phases.
Li= Ri-1
Ri=Li-1 F(Ri-1, Ki)
• The round key Ki is 48 bits
• The first and last bits of the input to box Si form a 2-bit
binary number to select one of four substitutions defined by the
four rows in the table for Si.
• The decimal value in the cell selected by the row and column
is then converted to its 4-bit representation to produce the
output.
Definition of DES S-Boxes
• For example, in Si, for input 011001, the row is 01(row 1)
and the column is 1100(column 12). The value in row 1,
column 12 is 9, so the output is 1001.
• If you examine the expansion table, you see that the 32 bits
of input are split into groups of 4 bits, and then become
groups of 6 bits by taking the outer bits from the two
adjacent groups.
• For example, if part of the input word is
• ………….efgh ijkl mnop….
This becomes
… defghi hijklm lmnopq ….
• The outer two bits of each group select one of four possible
substitutions (one row of an S-box).
•Input Key
•If the change were small, this might provides a way to reduce
the size of the plaintext or key space to be searched.
• With a key length of 56 bits, there are 256 possible keys, which is
approximately 7.2 X 1016 keys.
Diffie and Hellman estimated that the cost would be about $20
million in 1977 .