03-CH20-CompSec2e-ver02 Symmetric Encryption PDF
03-CH20-CompSec2e-ver02 Symmetric Encryption PDF
and Cryptography
Basics of Information Security
Professor dr.sc.ing. Viktor Gopejenko
Department of Computer Technologies and Natural Sciences
ISMA University of Applied Science, Riga, Latvia
Lecture 3
Symmetric Encryption and
Message Confidentiality
Learning Objectives
The basic principles of symmetric encryption
Key Distribution
Symmetric Encryption
also referred to as:
conventional encryption
secret-key or single-key encryption
only alternative before public-key encryption in 1970’s
still most widely used alternative
has five ingredients:
plaintext
encryption algorithm
secret key
ciphertext
decryption algorithm
Cryptography
C a
r l
y
y
p
s
t
a i
n s
Computationally Secure Encryption
Schemes
FIPS PUB 46
decryption
does reverse
mix columns
operates on each column individually
mapping each byte to a new value that is a function of all
four bytes in the column
use of equations over finite fields
to provide good mixing of bytes in column
design considerations:
encryption sequence should have a large period
keystream approximates random number properties
uses a sufficiently long key
Speed Comparisons of Symmetric Ciphers on a Pentium 4
Source: http://www.cryptopp.com/benchmarks.html
The RC4 Algorithm
Modes of Operation
Block cipher mode of operation
Original image Encrypted using ECB mode Modes other than ECB
result in pseudo-randomness
The image on the right is how the image might appear encrypted with CBC, CTR or any of the
other more secure modes - indistinguishable from random noise. Note that the random
appearance of the image on the right does not ensure that the image has been securely
encrypted; many kinds of insecure encryption have been developed which would produce
output just as "random-looking".
(https://en.wikipedia.org/wiki/Block_cipher_mode_of_operation)
Electronic Codebook (ECB)
simplest mode
• a third party could select the key and physically deliver it to A and B
2
• if A and B have previously and recently used a key, one party could
3 transmit the new key to the other, encrypted using the old key