DES Description: Feistel, S-box Exhaustive Search, DC and LC Modes of Operation AES Description:...

26
DES Description: Feistel, S-box Exhaustive Search, DC and LC Modes of Operation AES Description: SPN, Branch number Security and Efficiency Modes of Operation Other Ciphers Linear layer Confusion layer 1

Transcript of DES Description: Feistel, S-box Exhaustive Search, DC and LC Modes of Operation AES Description:...

Page 1: DES Description: Feistel, S-box Exhaustive Search, DC and LC Modes of Operation  AES Description: SPN, Branch number Security and Efficiency Modes of.

DESDescription: Feistel, S-box Exhaustive Search, DC and LCModes of Operation

AESDescription: SPN, Branch numberSecurity and EfficiencyModes of Operation

Other CiphersLinear layer Confusion layer

1

Page 2: DES Description: Feistel, S-box Exhaustive Search, DC and LC Modes of Operation  AES Description: SPN, Branch number Security and Efficiency Modes of.

2

DES(Data Encryption Standard)

DES(Data Encryption Standard)

http://en.wikipedia.org/wiki/Data_Encryption_Standard

Page 3: DES Description: Feistel, S-box Exhaustive Search, DC and LC Modes of Operation  AES Description: SPN, Branch number Security and Efficiency Modes of.

Confusion: The ciphertext statistics should depend on the

plaintext statistics in a manner too complicated to be exploited by the enemy cryptanalyst

Diffusion:Each digit of the plaintext should influence many

digits of the ciphertext, and/orEach digit of the secret key should influence

many digits of the the ciphertext.

Block cipher: ◦ A repetition of confusion(Substitution) and

diffusion(Permutation)◦ Iteration: Weak Strong

3

Claude Shannon

Page 4: DES Description: Feistel, S-box Exhaustive Search, DC and LC Modes of Operation  AES Description: SPN, Branch number Security and Efficiency Modes of.

4

Page 5: DES Description: Feistel, S-box Exhaustive Search, DC and LC Modes of Operation  AES Description: SPN, Branch number Security and Efficiency Modes of.

Definition: Let Bn denote the set of bit strings of length n. A block cipher is an encryption algorithm E such that EK is

a permutation of Bn for each key K

Characteristics ◦ Based on Shannon’s Theorem(1949)◦ Same P => Same C ◦ {|P| = |C|} 64 bit, |P| |K| 56 bit◦ Memoryless configuration◦ Operate as stream cipher depending on mode ◦ Shortcut cryptanalysis (DC, LC etc) in 90’s

* DC: Differential Cryptanalysis, LC: Linear Cryptanalysis

5

Page 6: DES Description: Feistel, S-box Exhaustive Search, DC and LC Modes of Operation  AES Description: SPN, Branch number Security and Efficiency Modes of.

Provide a high level of security Completely specify and easy to understand Security must depend on hidden key, not

algorithm Available to all users Adaptable for use in diverse applications Economically implementable in electronic

device Efficient to use Able to be validated Exportable * Federal Register, May 15, 1973

6

Page 7: DES Description: Feistel, S-box Exhaustive Search, DC and LC Modes of Operation  AES Description: SPN, Branch number Security and Efficiency Modes of.

Based on Lucifer (1972) Developed by IBM and intervened by NSA Adopted Federal Standard by NIST, revised

every 5 years (~’98), 64bit block cipher, 56bit key 16 Round, Nonlinearity : S-box Cryptanalysis like DC, LC, etc. after 1992

* DC:Differential Cryptanalysis, LC : Linear Cryptanalysis

7

Page 8: DES Description: Feistel, S-box Exhaustive Search, DC and LC Modes of Operation  AES Description: SPN, Branch number Security and Efficiency Modes of.

FIPS PUB 46-3, Data Encryption Standard”, 1977(83,88,93) (*)

FIPS PUB 81, “DES modes of operation”,1980(*) FIPS PUB 74, “Guidelines for implementing and using the NBS

Data Encryption Standard”, 1981(*) FIPS PUB 113, “Computer Data Authentication”, 1985 FIPS PUB 140-2, “Security Requirements for Cryptographic

Modules”, 2001

* Federal Notice (July 26, 2004) Announcing Proposed Withdrawal of Federal Information Processing Standard (FIPS) for the Data Encryption Standard (DES) and Request for Comments

“NIST determined that the strength of the DES algorithm is no longer sufficient to adequately protect Federal government information. As a result, NIST proposes to withdraw FIPS 46-3, and the associated FIPS 74 and FIPS 81. Future use of DES by Federal agencies is to be permitted only as a component function of the Triple Data Encryption Algorithm (TDEA). TDEA may be used for the protection of Federal information; however, NIST encourages agencies to implement the faster and stronger algorithm specified by FIPS 197, Advanced Encryption Standard (AES) instead. NIST proposes issuing TDEA implementation guidance as a NIST Recommendation via its ``Special Publication'' series (rather than as a FIPS) as Special Publication 800-67, Recommendation for Implementation of the Triple Data Encryption Algorithm (TDEA). “

FIPS: Federal Information Processing Standard

8

Page 9: DES Description: Feistel, S-box Exhaustive Search, DC and LC Modes of Operation  AES Description: SPN, Branch number Security and Efficiency Modes of.

If we apply its operation 2 times, it returns to the original value, e.g., f(f(x)) = x.

Type of f-1(x) = f(x)

9

x1 x2

(a) (b)

y1 y2 y1=x1x2

(c)

y1=x1 g(x2)or x1 g(x2,k)

(d)

g

x1 x1 x1x2 x2x2

y2 y2 = x2y1 y2 = x2

Page 10: DES Description: Feistel, S-box Exhaustive Search, DC and LC Modes of Operation  AES Description: SPN, Branch number Security and Efficiency Modes of.

10

P

K

IP

f

FP

PC-2

C

16 Round

PC-1

Rot RotR0(32)L0(32)

R16 L16

PC-2

64 56

64

Round function

Key Scheduling

Page 11: DES Description: Feistel, S-box Exhaustive Search, DC and LC Modes of Operation  AES Description: SPN, Branch number Security and Efficiency Modes of.

11

* Decryption is done by executing round key in the reverse order.

Page 12: DES Description: Feistel, S-box Exhaustive Search, DC and LC Modes of Operation  AES Description: SPN, Branch number Security and Efficiency Modes of.

58 50 42 34 26 18 10 260 52 44 36 28 20 12 462 54 46 38 30 22 14 664 56 48 40 32 24 16 857 49 41 33 25 17 9 159 51 43 35 27 19 11 361 53 45 37 29 21 13 563 55 47 39 31 23 15 7

12

cf.) The 58th bit of x is the first bit of IP(x)

40 8 48 16 56 24 64 3239 7 47 15 55 23 63 3138 6 46 14 54 22 62 3037 5 45 13 53 21 61 2936 4 44 12 52 20 60 2835 3 43 11 51 19 59 2734 2 42 10 50 18 58 2633 1 41 9 49 17 57 25

IP & FP have no cryptanalytic significance.

IP FP= IP-1

Page 13: DES Description: Feistel, S-box Exhaustive Search, DC and LC Modes of Operation  AES Description: SPN, Branch number Security and Efficiency Modes of.

13

Page 14: DES Description: Feistel, S-box Exhaustive Search, DC and LC Modes of Operation  AES Description: SPN, Branch number Security and Efficiency Modes of.

Permutes the order of 32 bits

16 7 20 2 29 12 28 17 1 15 23 26 5 18 31 10 2 8 24 14 32 27 3 919 13 30 6 22 11 4 25

14

Page 15: DES Description: Feistel, S-box Exhaustive Search, DC and LC Modes of Operation  AES Description: SPN, Branch number Security and Efficiency Modes of.

Expands 32 -> 48 bits by duplicating 16 bits twice

32 1 2 3 4 5 4 5 6 7 8 9 8 9 10 11 12 13 12 13 14 15 16 17 16 17 18 19 20 21 20 21 22 23 24 25 24 25 26 27 28 29 28 29 30 31 32 1

15

cf.) The first 4 bits are expanded into 6 bits by adding the last bit of the last 4 bits at first and the first bit of the second 4 bits at last.

Page 16: DES Description: Feistel, S-box Exhaustive Search, DC and LC Modes of Operation  AES Description: SPN, Branch number Security and Efficiency Modes of.

16

Page 17: DES Description: Feistel, S-box Exhaustive Search, DC and LC Modes of Operation  AES Description: SPN, Branch number Security and Efficiency Modes of.

64 -> 56 bits57 49 41 33 25 17 9 1 58 50 42 34 26 1810 2 59 51 43 35 2719 11 3 60 52 44 3663 55 47 39 31 23 15 7 62 54 46 38 30 2214 6 61 53 45 37 2921 13 5 28 20 12 4

17

cf.) Do not use the parity check bits.

Page 18: DES Description: Feistel, S-box Exhaustive Search, DC and LC Modes of Operation  AES Description: SPN, Branch number Security and Efficiency Modes of.

56 -> 48 bits

14 17 11 24 1 5 3 28 15 6 21 1023 19 12 4 26 816 7 27 20 13 241 52 31 37 47 5530 40 51 45 33 4844 49 39 56 34 5346 42 50 36 29 32

18

Page 19: DES Description: Feistel, S-box Exhaustive Search, DC and LC Modes of Operation  AES Description: SPN, Branch number Security and Efficiency Modes of.

19

Rnd 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16Rot 1 1 2 2 2 2 2 2 1 2 2 2 2 2 2 1

Total number of rotation = 28 After final rotations, the final round keys

return to the input of the 1st round keys.

Rotation ScheduleRotation Schedule

Page 20: DES Description: Feistel, S-box Exhaustive Search, DC and LC Modes of Operation  AES Description: SPN, Branch number Security and Efficiency Modes of.

8 S-boxes (6 -> 4 bits) each row : permutation of 0-15 4 rows : choose by MSB & LSB of input some known design criteria

◦ not linear (affine)◦ Any one bit of the inputs changes at least two output

bits ◦ S(x) and S(x 001100) differs at least 2bits◦ S(x) S(x 11ef00) for any ef={00.01.10.11}◦ Resistance against DC etc.◦ The actual design principles have never been

revealed (U.S. classified information)

20

Page 21: DES Description: Feistel, S-box Exhaustive Search, DC and LC Modes of Operation  AES Description: SPN, Branch number Security and Efficiency Modes of.

Input values mapping order

21

L R 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 150 0 14 4 13 1 2 15 11 8 3 10 6 12 5 9 0 7

0 1 0 15 7 4 14 2 13 1 10 6 12 11 9 5 3 8 1 0 4 1 14 8 13 6 2 11 15 12 9 7 3 10 5 01 1 15 12 8 2 4 9 1 7 5 11 3 14 10 0 6 13

S1(1 0111 0)=11=(1011)2

Page 22: DES Description: Feistel, S-box Exhaustive Search, DC and LC Modes of Operation  AES Description: SPN, Branch number Security and Efficiency Modes of.

S1-box 14 4 13 1 2 15 11 8 3 10 6 12 5 9 0 7

0 15 7 4 14 2 13 1 10 6 12 11 9 5 3 8 4 1 14 8 13 6 2 11 15 12 9 7 3 10 5 0 15 12 8 2 4 9 1 7 5 11 3 14 10 0 6 13

S2-box 15 1 8 14 6 11 3 4 9 7 2 13 12 0 5 10 3 13 4 7 15 2 8 14 12 0 1 10 6 9 11 5 0 14 7 11 10 4 13 1 5 8 12 6 9 3 2 15 13 8 10 1 3 15 4 2 11 6 7 12 0 5 14 9

22

e.g.) S2(010010)= ?

Page 23: DES Description: Feistel, S-box Exhaustive Search, DC and LC Modes of Operation  AES Description: SPN, Branch number Security and Efficiency Modes of.

S3-box 10 0 9 14 6 3 15 5 1 13 12 7 11 4 2 8 13 7 0 9 3 4 6 10 2 8 5 14 12 11 15 1 13 6 4 9 8 15 3 0 11 1 2 12 5 10 14 7 1 10 13 0 6 9 8 7 4 15 14 3 11 5 2 12

S4-box 7 13 14 3 0 6 9 10 1 2 8 5 11 12 4 15 13 8 11 5 6 15 0 3 4 7 2 12 1 10 14 9 10 6 9 0 12 11 7 13 15 1 3 14 5 2 8 4 3 15 0 6 10 1 13 8 9 4 5 11 12 7 2 14

23

S4-box is most linear than others.!!!

Page 24: DES Description: Feistel, S-box Exhaustive Search, DC and LC Modes of Operation  AES Description: SPN, Branch number Security and Efficiency Modes of.

Short key size : 112 -> 56 bits by NSA

Classified design criteria Revision of standard every 5 yrs after 1977 by NIST

No more standard

24

Page 25: DES Description: Feistel, S-box Exhaustive Search, DC and LC Modes of Operation  AES Description: SPN, Branch number Security and Efficiency Modes of.

(P,C) dependency with fixed Key : after 5 round

(K,C) dependency with fixed plaintext : after 5 round

Avalanche effect Cyclic Test : Random function Algebraic structure : Not a group i.e., E(K1, E(K2,P)) E(K3,P)

25

Page 26: DES Description: Feistel, S-box Exhaustive Search, DC and LC Modes of Operation  AES Description: SPN, Branch number Security and Efficiency Modes of.

Complementary Prop.If C= E(K,P), C = E(K, P)

Weak Key : 4 keysE(K, E(K,P))=P

Semi-weak Keys : 12 keys (6 pairs)E(K1, E(K2,P))=P

Key Exhaustive Search : 255

26