symmetric and asymmetric (public) key encryption week-8

18

Click here to load reader

Upload: sheila-powell

Post on 23-Dec-2015

218 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: Symmetric and Asymmetric (Public) key Encryption Week-8

Symmetric and Asymmetric (Public) key

EncryptionWeek-8

Page 2: Symmetric and Asymmetric (Public) key Encryption Week-8

Symmetric Key EncryptionThe same key is used to encrypt and decrypt messages

• This means key is shared between sender & receiver

• Typically, a company will have many keys, a separate key for each of its

clients (Why?)

• All keys must be recorded but kept secure from theft

• Disclosure of keys compromises message since algorithm is publicly

known

Page 3: Symmetric and Asymmetric (Public) key Encryption Week-8

Symmetric Key EncryptionSimple Model

Plaintext, P EncryptionMethod, E

Ciphertext, C = Ek(P)

Plaintext, PDecryptionMethod, D

EncryptionKey, K

DecryptionKey, K

Passive intruderJust listens

Active intruderAlter messages

Page 4: Symmetric and Asymmetric (Public) key Encryption Week-8

Symmetric Key EncryptionAlgorithm

• Encryption of plaintext P using key K gives ciphertext C

C = Ek (P)

• Decryption of ciphertext C using key K gives plaintext P

P = Dk (C)

• Therefore:

Dk (Ek (P)) = P

Page 5: Symmetric and Asymmetric (Public) key Encryption Week-8

Data Encryption Standard (DES)Most widely used encryption standard – Data Encryption Algorithm

(DEA)

• A joint National Security Agency (NSA) and IBM development (mid-70s)

• Maintained by National Institute of Standards and Technology (NIST)

• DES based on 56-bit key (no longer secure!)

Page 6: Symmetric and Asymmetric (Public) key Encryption Week-8

Data Encryption Standard (DES)DES brute-force attack

• Broken in 22 hours by Electronic Foundation Machine (EFF)

• Using special-purpose supercomputer assisted by 10,000 machines

distributed over internet

• Some commercial organisation continue to use DES for less sensitive

messages

Page 7: Symmetric and Asymmetric (Public) key Encryption Week-8

Data Encryption Standard (DES)Algorithm

• It is a complex combination of two fundamental building blocks of

encryption: Substitution and Transposition.

• The algorithm derives its strength from repeated application of these

two techniques, one on top of the other, for a total of 16 cycles.

• The algorithm begins by encrypting the plaintext as blocks of 64 bits.

• The key is 64 bits long, but in fact it can be any 56-bit number.

• The extra 8 bits are often used as check digits and do not affect

encryption in normal implementations.

Page 8: Symmetric and Asymmetric (Public) key Encryption Week-8

Data Encryption Standard (DES)Algorithm

Page 9: Symmetric and Asymmetric (Public) key Encryption Week-8

Triple DESA newer DES standard harder to break (i.e. stronger level of security)

• Involves using original DES 3 times with different keys

• Several versions (i.e. variants of 3DES)

• 3DES - Encryption, Encryption, Encryption

• 3DES - Encryption, Decryption, Encryption

Page 10: Symmetric and Asymmetric (Public) key Encryption Week-8

Advance Encryption Standard (AES)A newer DES standard harder to break (i.e. stronger level of security)

• NIST’s (National Institute of Standards and Technology) new standard

designed to replace DES and 3DES

• Rijndael (pronounced “rain doll”) (Daemen and Rijmen, 1998)

algorithm based on AES

• Cracking AES by brute force takes 150 trillion years!

Page 11: Symmetric and Asymmetric (Public) key Encryption Week-8

Comparing AES and DESStructure

• Both are block ciphers, with an adaptation permitting them to be used

as stream ciphers

• AES designed for growth: longer key, more cycles for added security

Speed

• DES is table-driven, uses simple operations, lends itself to hardware

implementation

• AES is less table driven; uses even simpler operations; lends itself to

machine implementation

Page 12: Symmetric and Asymmetric (Public) key Encryption Week-8

Comparing AES and DESKeys

• DES: fixed 56 bit key (the biggest problem of the algorithm

• AES: can use key of 128, 192, 256 bits; algorithm extends naturally to

even longer keys

Concerns

• Key distribution problem: Key is shared between sender and receiver

• Introduces trusted third party KDC

Page 13: Symmetric and Asymmetric (Public) key Encryption Week-8

Comparing AES and DESWeaknesses

• DES: No significant ones discovered in almost 30 years of scrutiny

• Design rational secret

• AES: None discovered, but scrutiny since 1998

• Design rational public

Page 14: Symmetric and Asymmetric (Public) key Encryption Week-8

Asymmetric (Public) Key EncryptionOne key to encrypt, another to decrypt

• Based on two keys, called “public” and “private” keys (i.e.

mathematical related pair)

• Public key is widely and openly distributed and used to encrypt

message

• Private key is kept confidential and used to decrypt message

• Addressed problem of key distribution and management with

symmetric encryption

Page 15: Symmetric and Asymmetric (Public) key Encryption Week-8

Asymmetric (Public) Key EncryptionProcess

• Alice uses Bob’s public key k to encrypt her message Ek(M), which

sends to Bob

• Bob uses his private key s to decrypt message Alice encrypted using his

public key k: Ds (Ek (M)) = M

• Bob reads message and uses same method as Alice to send a reply

• Alice and Bob can communicate securely

Page 16: Symmetric and Asymmetric (Public) key Encryption Week-8

Asymmetric (Public) Key EncryptionProperties

• Computationally infeasible to deduce the private key from the public

key

• Key pair mathematically related (permanently matched to each other)

• The difficulty in deriving private key is based on Number Theory

• Alice and Bob can communicate securely

• Key management problem reduced to the one-site protection of

private key

Page 17: Symmetric and Asymmetric (Public) key Encryption Week-8

AlgorithmsSymmetric:

• DES/3DES

• Blowfish

• IDEA (International Data

Encryption Algorithm)

• RC4 / RC5 / RC6 …

• Serpent

• Towfish

• Asymmetric

• Knapsack (old)

• RSA (popular)

• El Gamal

• Other ...

Page 18: Symmetric and Asymmetric (Public) key Encryption Week-8

Thank You !