Secure communication

13
Secure communication Most popular encryption algorithms overview

Transcript of Secure communication

Page 1: Secure communication

Secure communicationMost popular encryption algorithms overview

Page 2: Secure communication

AgendaOne-time padStream ciphers

A5/1Symmetric block ciphers

DES (weak), 3DES (secure), AES (secure)Asymmetric block ciphers

RSA (slow)Elliptic curves (fast)

Page 3: Secure communication

One-time padMain features:

Totally secure crypto technicA key has to be the same length as

a plain textA key has to be truly randomXOR operation is often used to

combine a key and a textImpractical in most cases due to the

above key length requirement

Page 4: Secure communication

Stream ciphersInspiration from the one-time padTypes:

synchronousself-synchronizing

LFSR (linear feedback shift registers)

Page 5: Secure communication

A5/1 stream cipherFeatures:

Used in GSM networks114 bit length keystreamBased on three LSFRsSuccessful attacks exist

Page 6: Secure communication

DESDES, Data Encryption Standard, was developed in the 1970s at IBM and based on design of Horst Feistel.

It is a symmetric-key algorithm based on Feistel network.

Key size is 56 bits only and it is considered insecure now.

Page 7: Secure communication

3DES3DES - Triple DES

Brute force attack on 2DES can use “meet in the middle” technique.

It is a symmetric-key algorithm based on Feistel network.

Key size is 168 bits only and it is considered insecure now.

Page 8: Secure communication

AESAES, Advanced Encryption Standard, established in 2001 by the NIST and based on design of Joan Daemen and Vincent Rijmen.

It is a symmetric-key algorithm based on Galois field.

Supported key sizes are 128, 192 or 256 bits.

Page 9: Secure communication

Block cipher modesA mode of operation is used to encrypt more than one block of plain data. The following is the list of some popular modes:

ECB - Electronic Codebook - the simplest modeCBC - Cipher Block ChainingOFB - Output Feedback - makes a synchronous stream cipherCFB - Cipher Feedback - makes a self-synchronizing stream cipherCTR - Counter - makes a synchronous stream cipher

Page 10: Secure communication

RSARSA, described in 1977, was called after its inventors Ron Rivest, Adi Shamir, and Leonard Adleman.

It is a public key algorithm.

Key size could be in range of 1024 to 4096 bits

It is a relatively slow algorithm and usually used to share keys for symmetric algorithms.

Page 11: Secure communication

Elliptic curve cryptographyIt is based on the algebraic structure of elliptic curves.

This is the fastest public key algorithm as of now.

256 bit ECC public key provides security compared to 3072 bit RSA public key.

Page 12: Secure communication

ReferencesIntroduction to Cryptography by Christof PaarCryptography and Computer Privacy

Page 13: Secure communication

My blogLearning Network Programming