ch06 Contemporary Symmetric Ciphers.pptVIP

  • 6
  • 0
  • 约1.72万字
  • 约 32页
  • 2017-04-04 发布于江苏
  • 举报
ch06 Contemporary Symmetric Ciphers

Cryptography and Network Security Chapter 6 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 6 – Contemporary Symmetric Ciphers I am fairly familiar with all the forms of secret writings, and am myself the author of a trifling monograph upon the subject, in which I analyze one hundred and sixty separate ciphers, said Holmes. —The Adventure of the Dancing Men, Sir Arthur Conan Doyle Multiple Encryption DES clear a replacement for DES was needed theoretical attacks that can break it demonstrated exhaustive key search attacks AES is a new cipher alternative prior to this alternative was to use multiple encryption with DES implementations Triple-DES is the chosen form Double-DES? could use 2 DES encrypts on each block C = EK2(EK1(P)) issue of reduction to single stage and have “meet-in-the-middle” attack works whenever use a cipher twice since X = EK1(P) = DK2(C) attack by encrypting P with all keys and store then decrypt C with keys and match X value can show takes O(256) steps Triple-DES with Two-Keys hence must use 3 encryptions would seem to need 3 distinct keys but can use 2 keys with E-D-E sequence C = EK1(DK2(EK1(P))) nb encrypt decrypt equivalent in security if K1=K2 then can work with single DES standardized in ANSI X9.17 ISO8732 no current known practical attacks Triple-DES with Three-Keys although are no practical attacks on two-key Triple-DES have some indications can use Triple-DES with Three-Keys to avoid even these C = EK3(DK2(EK1(P))) has been adopted by some Internet applications, eg PGP, S/MIME Modes of Operation block ciphers encrypt fixed size blocks eg. DES encrypts 64-bit blocks with 56-bit key need some way to en/decrypt arbitrary amounts of data in practise ANSI X3.106-1983 Modes of Use (now FIPS 81) defines 4 possible modes subsequently 5 defined for AES DES have block and stream modes Electronic Codebook Book (ECB) message is broken into independent blocks which are encrypted each block is a value which is

文档评论(0)

1亿VIP精品文档

相关文档