Lecture - Network Security Techniques II
Lecture - Network Security Techniques II
Lecture Week 12
3
Symmetric Cipher Model
Symmetric Encryption Requirements
ciphertext: mnbvcxzasdfghjklpoiuytrewq
Security 8-8
Symmetric key crypto: DES
DES: Data Encryption Standard
• US encryption standard [NIST 1993]
• 56-bit symmetric key, 64-bit plaintext input
• block cipher with cipher block chaining
• how secure is DES?
o DES Challenge: 56-bit-key-encrypted phrase decrypted
(brute force) in less than a day
o no known good analytic attack
• making DES more secure:
o 3DES: encrypt 3 times with 3 different keys
Security 8-9
AES: Advanced Encryption Standard
Security 8-10
The Diffie-Hellman Algorithm
Overview
• Introduction
• Implementation
• Example
• Applications
• Conclusion
Introduction
Security 8-23
Public key encryption - Algorithms
requirements:
1 need K B
+
.-
( ) and K ( B) such that
- + Where:
K (K (m)) = m KB+ public key
B B
KB- private key
2 given public key K +, it should be m message
B
impossible to compute private
-
key K
B
Security 8-25
Prerequisite: modular arithmetic
Security 8-27
RSA: Creating public/private key pair
Security 8-29
RSA example:
Bob chooses p=5, q=7. Then n=35, z=24.
e=5 (so e, z relatively prime).
d=29 (so ed-1 exactly divisible by z).
encrypting 8-bit messages.
e
bit pattern m m c = me mod n
encrypt:
0000l000 12 24832 17
d
c c m = cd mod n
decrypt:
17 481968572106750915091411825223071697 12
Security 8-30
A Simple RSA Example
Security 8-31
RSA: another important property
The following property will be very useful later:
- + + -
K (K (m)) = m = K (K (m))
B B B B
Security 8-32
End.