









Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
The concept of block cyphers in computer security, focusing on their idea, characteristics, and issues. The process of encrypting and decrypting plaintext using block cyphers, the importance of one-to-one functions, and the challenges of selecting mappings. The document also discusses popular block cyphers like des and aes, their key sizes, and the methods used to crack them. Students will gain a solid understanding of block cyphers and their role in computer security.
Typology: Study notes
1 / 17
This page cannot be seen from the preview
Don't miss anything!
Jan 31, 2005 -- Lecture 6
Douglas W. Jones Department of Computer Science
An Idea for Symmetric Key Cyphers Block of plaintext: P 1 P 2 P 3 P 4 | | V Key - Encypher | | V Cyphertext block: C 1 C 2 C 3 C 4 | | V Key - Decypher | | V Block of plaintext: P 1 P 2 P 3 P 4
Block Cypher Issues Block size: Same plaintext likely twice in message, Too Small Much larger than key size, Limits universe of mappings Typically Similar to key size
DES - First widely used block cypher 1974, adopted as FIPS 46, 1977 Developed by IBM with NSA "help" Block size = 64 bits Key size = 48 bits (why so short?) Idea: Multiround permutation and XOR EFF built a DES cracking engine, 1998 cost: under $250, speed: 3 days to crack
Top level view of DES (2-round version)
Function blocks in each stage of DES
Cracking DES (RSA DES Challenge) First public crack, 1997 39 days using over 10,000 computers Team lead by Rocke Verser of Loveland Colorado Second public crack, 1998 3 days using array of Deep-Crack chips
What To Do? Triple DES: DES(k 1 , DES(k 2 , DES(k 3 ,t))) Warning : What if DES(k 1 , DES(k 2 , t)) = DES(f(k 1 , k 2 ), t) Proofs are difficult!
One AES Round Substitute Bytes Uses a table lookup to do one-to-one Shift Rows Shift each 4-byte row Mix Columns Linear transformation of 4-byte column Add Round Key Key for this round combined with bytes
AES Substitute Bytes Step b = S[a], where S is a 265 entry table
The AES Mix Columns Step Fixed linear transform of 32-bit column
The AES Add Round Key Step XOR