Security
Security
Integrity
• Data integrity
• Assures that information and programs are changed only in a
specified and authorized manner
• System integrity
• Assures that a system performs its intended function in an
unimpaired manner, free from deliberate or inadvertent
unauthorized manipulation of the system
Availability
• Assures that systems work promptly and service is not denied
to authorized users
Breach of Security
Levels of Impact
• The loss could be expected to have a severe
or catastrophic adverse effect on
organizational operations, organizational
High assets, or individuals
•A passive attack
attempts to learn or make
use of information from
the system but does not
affect system resources
• A security-related transformation on
the information to be sent.
Cryptanalysis Cryptology
• Techniques used for • The areas of
deciphering a cryptography and
message without any cryptanalysis
knowledge of the
enciphering details
A symmetric encryption scheme has five
ingredients
Plaintext: This is the original intelligible message or data that is fed into the
algorithm as input.
Encryption algorithm: The encryption algorithm performs various
substitutions and transformations on the plaintext.
Secret key: The secret key is also input to the encryption algorithm. The key
is a value independent of the plaintext and of the algorithm. The algorithm
will produce a different output depending on the specific key being used at
the time. The exact substitutions and transformations performed by the
algorithm depend on the key.
Ciphertext: This is the scrambled message produced as output. It depends
on the plaintext and the secret key. For a given message, two different keys
will produce two different ciphertexts. The ciphertext is an apparently
random
stream of data and, as it stands, is unintelligible.
Decryption algorithm: This is essentially the encryption algorithm run in
reverse. It takes the ciphertext and the secret key and produces the original
plaintext.
© 2017 Pearson Education, Ltd.,
All rights reserved.
Symmetric Cipher
Model
• There are two requirements for secure
use of conventional encryption:
• A strong encryption algorithm
Symmetric,
single-key,
Substitution secret-key, Block cipher
conventional
encryption
Asymmetric,
two-key, or
Transposition Stream cipher
public-key
encryption
Cryptanalysis and
Brute-Force Attack
Cryptanalysis Brute-force
• Attack relies on attack
the nature of • Attacker tries
the algorithm every possible
plus some key on a piece
knowledge of of ciphertext
the general until an
characteristics intelligible
of the plaintext translation into
• Attack exploits plaintext is
the obtained
characteristics • On average,
of the algorithm half of all
to attempt to possible keys
deduce a must be tried to
specific achieve success
plaintext or to
deduce the key
being used
Table 3.1
Types of
Attacks
on
Encrypted
Messages
Encryption Scheme
Security
• Unconditionally secure
• No matter how much time an opponent
has, it is impossible for him or her to
decrypt the ciphertext simply because
the required information is not there
• Computationally secure
• The cost of breaking the cipher exceeds
the value of the encrypted information
• The time required to break the cipher
exceeds the useful lifetime of the
information
Brute-Force Attack
Involves trying every possible key until an
intelligible translation of the ciphertext into
plaintext is obtained
The majority of
As with a
network-based
stream cipher,
symmetric
the two users
cryptographic
share a
applications
symmetric
make use of
encryption key
block ciphers
Data Encryption Standard
(DES)
6.25
6.1.2 Overview
6.26
6-2 Continue
6.27
6.2.1 Initial and Final Permutations
6.28
6.2.1 Continue
6.29
6.2.2 Rounds
Figure 6.4
A round in DES
(encryption site)
6.30
6.2.2 Continued
DES Function
The heart of DES is the DES function. The DES function
applies a 48-bit key to the rightmost 32 bits to produce a
32-bit output.
Figure 6.5
DES function
6.31
6.2.2 Continue
Expansion P-box
Since RI−1 is a 32-bit input and KI is a 48-bit key, we first
need to expand RI−1 to 48 bits.
6.32
6.2.2 Continue
Whitener (XOR)
After the expansion permutation, DES uses the XOR
operation on the expanded right section and the round
key. Note that both the right section and the key are 48-
bits in length. Also note that the round key is used only in
this operation.
6.33
6.2.2 Continue
S-Boxes
The S-boxes do the real mixing (confusion). DES uses 8
S-boxes, each with a 6-bit input and a 4-bit output. See
Figure 6.7.
6.34
6.2.2 Continue
6.35
6.2.2 Continue
Straight Permutation
6.36
6.2.3 Continued
Figure 6.10
Key generation
6.37
6.2.3 Continued
6.38
6.2.3 Continued
6.39
Given a plaintext P and two encryption keys K1 and K2, ciphertext C
is generated as
The meet-in-
the-middle
attack
algorithm will
The use of
attack this
double DES
scheme and
results in a
does not
mapping that
depend on
is not
any particular
equivalent to
property of
a single DES
DES but will
encryption
work against
any block
encryption
cipher
Triple-DES with Two-
Keys
• Obvious counter to the meet-in-the-middle attack is
to use three stages of encryption with three different
keys
• This raises the cost of the meet-in-the-middle attack to
2112, which is beyond what is practical
• Has the drawback of requiring a key length of
56 x 3 = 168 bits, which may be somewhat unwieldy
• As an alternative Tuchman proposed a triple encryption
method that uses only two keys
7.49
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
7.1.3 Rounds.
Note
7.51
7.1.5 Structure of Each Round
Figure 7.5 Structure of each round at the encryption site
7.52
7-2 TRANSFORMATIONS
7.54
The key-expansion routine creates round keys word by
word, where a word is an array of four bytes. The
routine creates 4X(Nr +1) words that are called
w0, w1, w2, ………, w4(Nr+1)-1
7.55
7-3 Continued
7.56
7.3.1 Key Expansion in AES-128
Figure 7.16 Key expansion in AES
7.57
7.3.1 Continue
7.58
Public Key Cryptography and RSA
Table 9.1
Terminology Related to Asymmetric
Encryption
Decrypti
Encryptio
Public Private Cipherte on
Plaintext n
key key xt algorith
algorithm
m
Accept
The s the
readab ciphert
le ext
Perform
messa The and
s Used Used scrambl
ge or the
various for for ed
data matchi
transfor encrypti encrypt messag
that is ng key
ma-tions on or ion or e
fed produce and
on the decrypti decrypt
into d as produc
plaintex on ion
the output es the
t
algorit origina
hm as l
input plainte
xt
Table 9.2
Conventional and Public-Key
Encryption
Public-Key Cryptosystem:
Secrecy
Public-Key Cryptosystem:
Authentication
Public-Key Cryptosystem:
Authentication and Secrecy
Applications for Public-Key
Cryptosystems
• Public-key cryptosystems can be classified
into three categories:
• Append Length
• C chooses a Directed
Known list of chosen • C may
message messages message request
attack before attack from A
attempting • Similar to the signatures
• C only of
• C is given to break A’s generic
knows signature messages
A’s access to attack,
a set of scheme, that
public except that
messages independent depend on
key the list of
and their of A’s public previously
messages to
Key-only signatures key; C then obtained
be signed is
attack obtains from message-
chosen after
A valid signature
C knows A’s
signatures pairs
public key but
for the before any Adaptive
Generic
chosen signatures chosen
chosen
messages are seen message
message
attack
attack
Forgeries
Universal Selective Existenti
forgery forgery al
Total
forgery
break • C finds an
• C efficient • C forges a • C forges a
determine signing signature signature
s A’s algorithm for a for at least
private that particular one
key provides an message message; C
equivalent chosen by has no
way of C control over
constructin the
g message
signatures
on arbitrary
messages
Digital Signature
Requirements
• The signature must be a bit pattern that depends on the
message being signed
• The signature must use some information unique to the
sender to prevent both forgery and denial
• It must be relatively easy to produce the digital signature