csc 386 – computer security scott heggen. agenda cryptography (i.e., confusion and diffusion)

10
CSC 386 – Computer Security Scott Heggen

Upload: herbert-williams

Post on 18-Jan-2016

213 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: CSC 386 – Computer Security Scott Heggen. Agenda Cryptography (i.e., Confusion and Diffusion)

CSC 386 – Computer Security

Scott Heggen

Page 2: CSC 386 – Computer Security Scott Heggen. Agenda Cryptography (i.e., Confusion and Diffusion)

Agenda

• Cryptography (i.e., Confusion and Diffusion)

Page 3: CSC 386 – Computer Security Scott Heggen. Agenda Cryptography (i.e., Confusion and Diffusion)

The Fundamental Flaw of Ciphers

Original Alphabet

Caesar Offset

(shift +2)

RandomSubstitution

A C L

B E K

C F M

D G Y

E H A

F I J

G J F

… … …

k =

Message index

Pseudo-Random

Offset

0 Shift +4

1 Shift -4

2 Shift +6

3 Shift +22

4 Shift +1

5 Shift -14

6 Shift -8

… …

Page 4: CSC 386 – Computer Security Scott Heggen. Agenda Cryptography (i.e., Confusion and Diffusion)

Frequency Analysis

• The English language has trends:• “e” appears in English about 12% of the time• “t” = ~9%• “a” = ~8%•

• Common digrams:• “he”• “an”• “in”• “th”

Page 5: CSC 386 – Computer Security Scott Heggen. Agenda Cryptography (i.e., Confusion and Diffusion)

Data Encryption Standard (DES)

• Developed by IBM in the 70s as the standard for encryption by the U.S. government• Based on Feistel networks• Remained the standard for 20+ years• Has since been broken by exhaustive search and replaced with a new

standard

Page 6: CSC 386 – Computer Security Scott Heggen. Agenda Cryptography (i.e., Confusion and Diffusion)

Feistel Network

Reversible function! (meaning the decryption method is the same as encryption)

Page 7: CSC 386 – Computer Security Scott Heggen. Agenda Cryptography (i.e., Confusion and Diffusion)

The Key

• A single key is permutated into 16 subkeys• A series of left-shifts on the original key• Each subkey is then permuted (diffused)

Page 8: CSC 386 – Computer Security Scott Heggen. Agenda Cryptography (i.e., Confusion and Diffusion)

The F-function

• First, the block is expanded• Second, the expanded block is X-

OR’ed with the subkey• Next, fed into “S boxes” which

map 6 bits to 4 bits• Based on a table

• Finally, output is permuted• bits are diffused

Page 9: CSC 386 – Computer Security Scott Heggen. Agenda Cryptography (i.e., Confusion and Diffusion)

DES

Page 10: CSC 386 – Computer Security Scott Heggen. Agenda Cryptography (i.e., Confusion and Diffusion)

Assignment

• For Wednesday:• Read up on DES (Chapter 14, Page 265 – 266). I highly suggest reading up on

additional sources on the web, such as: • http://en.wikipedia.org/wiki/Data_Encryption_Standard• http://www.youtube.com/watch?v=qHZKze24kVo• http://people.eku.edu/styere/Encrypt/JS-DES.html

• Quiz on DES:• 1 question on The Feistel Structure• 1 question on the f-function• 1 question on Sub-key Generation