ch03 Block Ciphers and the Data Encryption Standard.pptVIP

  • 8
  • 0
  • 约2.6万字
  • 约 37页
  • 2017-04-04 发布于江苏
  • 举报

ch03 Block Ciphers and the Data Encryption Standard.ppt

ch03 Block Ciphers and the Data Encryption Standard

Cryptography and Network Security Chapter 3 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 3 – Block Ciphers and the Data Encryption Standard All the afternoon Mungo had been working on Sterns code, principally with the aid of the latest messages which he had copied down at the Nevin Square drop. Stern was very confident. He must be well aware London Central knew about that drop. It was obvious that they didnt care how often Mungo read their messages, so confident were they in the impenetrability of the code. —Talking to Strange Men, Ruth Rendell Modern Block Ciphers now look at modern block ciphers one of the most widely used types of cryptographic algorithms provide secrecy /authentication services focus on DES (Data Encryption Standard) to illustrate block cipher design principles Block vs Stream Ciphers block ciphers process messages in blocks, each of which is then en/decrypted like a substitution on very big characters 64-bits or more stream ciphers process messages a bit or byte at a time when en/decrypting many current ciphers are block ciphers broader range of applications Block Cipher Principles most symmetric block ciphers are based on a Feistel Cipher Structure needed since must be able to decrypt ciphertext to recover messages efficiently block ciphers look like an extremely large substitution would need table of 264 entries for a 64-bit block instead create from smaller building blocks using idea of a product cipher Ideal Block Cipher Claude Shannon and Substitution-Permutation Ciphers Claude Shannon introduced idea of substitution-permutation (S-P) networks in 1949 paper form basis of modern block ciphers S-P nets are based on the two primitive cryptographic operations seen before: substitution (S-box) permutation (P-box) provide confusion diffusion of message key Confusion and Diffusion cipher needs to completely obscure statistical properties of original message a one-time pad does this more practically

文档评论(0)

1亿VIP精品文档

相关文档