CH15 - PowerPoint PPT Presentation

About This Presentation
Title:

CH15

Description:

Ciphertext Only The intruder can only see ciphertext. ... Known Plaintext The intruder has some corresponding plaintext-ciphertext pairs. ... – PowerPoint PPT presentation

Number of Views:21
Avg rating:3.0/5.0
Slides: 8
Provided by: anupam8
Category:
Tags: ch15 | intruder

less

Transcript and Presenter's Notes

Title: CH15


1
CH15 Security Crypto

2
Basics
  • What if protection is broken by unauthorized
    user, or system is subverted
  • Crypting information can help
  • Definitions of Cryptology
  • Cryptography, Cryptanalysis
  • Model
  • Ciphertext E(Plaintext,Ke)
  • Sent over unsecured channel
  • Plaintext D(Ciphertext, Kd)
  • Cryptanalyst can see C, knows D and E, sometimes
    even Ke, and has extra information

3
Threats
  • Ciphertext Only The intruder can only see
    ciphertext. This is the easiest kind of attack to
    mount
  • Known Plaintext The intruder has some
    corresponding plaintext-ciphertext pairs.
  • Perhaps as the side information
  • Chosen Plaintext The intruder can find out the
    encryption of any arbitrary plaintext
  • Limited breakin ?

4
Some Design Principles
  • Shannons Principles
  • Diffusion spread correlations and dependencies
    between keys and strings so that length of
    plaintext needed to break the code is maximized
  • Confusion make functional dependencies amongst
    related variables as complex as possible
  • Exhaustive Search Principle

5
Classification of CrytoSystems
  • Conventional
  • Geared towards languages
  • Caesar (E Mk mod size of alphabet)
  • Substitution Cipher (size! keys)
  • Polyalphabetic ( periodic sequence of
    substitution ciphers vignere, onetime pad)
  • Modern
  • Geared towards binary information
  • Private Key
  • Public Key

6
Private Key/DES
  • Basic operations
  • Permutation diffuse information by permuting
    bits
  • Substitution replace an m bit input with an n
    bit output such that there is no simple relation
    between them to cause confusion
  • DES works on 64 bit Data blocks using 56 bit
    key8 parity bits (keylength an issue)

7
DES Steps
  • Permute the 64 bits using IP
  • 16 iterations of
  • Li Ri-1
  • Ri L i-1 XOR f(R i-1, Ki)
Write a Comment
User Comments (0)
About PowerShow.com