0% found this document useful (0 votes)
41 views

Ns c2p2

This document discusses symmetric encryption techniques for ensuring message confidentiality. It describes the basic requirements for cryptographic systems including the type of operations used for encryption, the number of keys involved, and how the plaintext is processed. It also defines different types of attacks on encrypted messages such as brute force attacks and cryptanalysis. Finally, it examines common symmetric block encryption algorithms like the Data Encryption Standard (DES) and how they work.

Uploaded by

nishongopothik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
41 views

Ns c2p2

This document discusses symmetric encryption techniques for ensuring message confidentiality. It describes the basic requirements for cryptographic systems including the type of operations used for encryption, the number of keys involved, and how the plaintext is processed. It also defines different types of attacks on encrypted messages such as brute force attacks and cryptanalysis. Finally, it examines common symmetric block encryption algorithms like the Data Encryption Standard (DES) and how they work.

Uploaded by

nishongopothik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 10

Chapter 2

Symmetric Encryption and


Message Confidentiality
Cryptography

• The type of operations used for transforming plaintext to ciphertext


• Substitution
• Each element in the plaintext is mapped into another element
• Transposition
Cryptographic • Elements in the plaintext are rearranged
• Fundamental requirement is that no information be lost
systems are • Product systems
generically • Involve multiple stages of substitutions and transpositions
• The number of keys used
classified along • Referred to as symmetric, single-key, secret-key, or conventional
encryption if both sender and receiver use the same key
three • Referred to as asymmetric, two-key, or public-key encryption if the
independent sender and receiver each use a different key
• The way in which the plaintext is processed
dimensions: • Block cipher processes the input one block of elements at a time,
producing an output block for each input block
• Stream cipher processes the input elements continuously, producing
output one element at a time, as it goes along
Table 2.1
Types of Attacks on Encrypted Messages
cryptanalysis

• An encryption scheme is computationally secure if the ciphertext


generated by the scheme meets one or both of the following criteria:
• The cost of breaking the cipher exceeds the value of the encrypted
information
• The time required to break the cipher exceeds the useful lifetime of the
information
Brute Force attack

• Involves trying every possible key until an intelligible translation of


the ciphertext into plaintext is obtained
• On average, half of all possible keys must be tried to achieve
success
• Unless known plaintext is provided, the analyst must be able to
recognize plaintext as plaintext
• To supplement the brute-force approach
• Some degree of knowledge about the expected plaintext is needed
• Some means of automatically distinguishing plaintext from garble is also
needed
Feistel Cipher Design Elements
Subkey generation
• The essence of a algorithm
• Larger block sizes Key size symmetric block
mean greater cipher is that a • Greater
security but • Larger key size single round offers complexity in this
reduced means greater inadequate security algorithm should
encryption/decry security but may but that multiple lead to greater
ption speed decrease rounds offer difficulty of
encryption/decryptio increasing security cryptanalysis
Block size n speed
Number of rounds

Fast software • If the algorithm can be


• Greater encryption/decrypt
complexity concisely and clearly
ion
generally means explained, it is easier to
greater resistance • In many cases, encryption is analyze that algorithm for
to cryptanalysis embedded in applications or cryptanalytic
utility functions in such a way as vulnerabilities and
to preclude a hardware therefore develop a higher
Round function implementation; accordingly, level of assurance as to its
the seed of execution of the strength
algorithm becomes a concern
Ease of analysis
Symmetric Block encryption algorithms

• Block cipher
• The most commonly used Data
symmetric encryption Encryption
algorithms Standard
(DES)
• Processes the plaintext input
in fixed-sized blocks and
produces a block of ciphertext The three most
of equal size for each plaintext
block
important
symmetric
Advanced block ciphers
Encryption Triple DES
Standard (3DES)
(AES)
Data Encryption Standard (DES)

• Most widely used encryption scheme


• Issued in 1977 as Federal Information Processing Standard 46 (FIPS
46) by the National Institute of Standards and Technology (NIST)
• The algorithm itself is referred to as the Data Encryption Algorithm
(DEA)
DES algorithm

• Description of the algorithm:


• Plaintext is 64 bits in length
• Key is 56 bits in length
• Structure is a minor variation of the Feistel network
• There are 16 rounds of processing
• Process of decryption is essentially the same as the encryption process
• The strength of DES:
• Concerns fall into two categories
• The algorithm itself
• Refers to the possibility that cryptanalysis is possible by exploiting the characteristics of
the algorithm
• The use of a 56-bit key
• Speed of commercial, off-the-shelf processors threatens the
security

You might also like