Block Ciphers Modes. Ramki Thurimella

Σχετικά έγγραφα
The Simply Typed Lambda Calculus

ΚΥΠΡΙΑΚΗ ΕΤΑΙΡΕΙΑ ΠΛΗΡΟΦΟΡΙΚΗΣ CYPRUS COMPUTER SOCIETY ΠΑΓΚΥΠΡΙΟΣ ΜΑΘΗΤΙΚΟΣ ΔΙΑΓΩΝΙΣΜΟΣ ΠΛΗΡΟΦΟΡΙΚΗΣ 6/5/2006

Phys460.nb Solution for the t-dependent Schrodinger s equation How did we find the solution? (not required)

Homework 3 Solutions

The challenges of non-stable predicates

Physical DB Design. B-Trees Index files can become quite large for large main files Indices on index files are possible.

CHAPTER 25 SOLVING EQUATIONS BY ITERATIVE METHODS

Instruction Execution Times

Example Sheet 3 Solutions

HOMEWORK 4 = G. In order to plot the stress versus the stretch we define a normalized stretch:

ΚΥΠΡΙΑΚΗ ΕΤΑΙΡΕΙΑ ΠΛΗΡΟΦΟΡΙΚΗΣ CYPRUS COMPUTER SOCIETY ΠΑΓΚΥΠΡΙΟΣ ΜΑΘΗΤΙΚΟΣ ΔΙΑΓΩΝΙΣΜΟΣ ΠΛΗΡΟΦΟΡΙΚΗΣ 19/5/2007

Elements of Information Theory

Other Test Constructions: Likelihood Ratio & Bayes Tests

Concrete Mathematics Exercises from 30 September 2016

Section 8.3 Trigonometric Equations

(C) 2010 Pearson Education, Inc. All rights reserved.

2 Composition. Invertible Mappings

3.4 SUM AND DIFFERENCE FORMULAS. NOTE: cos(α+β) cos α + cos β cos(α-β) cos α -cos β

EE512: Error Control Coding

derivation of the Laplacian from rectangular to spherical coordinates

ΕΛΛΗΝΙΚΗ ΔΗΜΟΚΡΑΤΙΑ ΠΑΝΕΠΙΣΤΗΜΙΟ ΚΡΗΤΗΣ. Ψηφιακή Οικονομία. Διάλεξη 10η: Basics of Game Theory part 2 Mαρίνα Μπιτσάκη Τμήμα Επιστήμης Υπολογιστών

9.09. # 1. Area inside the oval limaçon r = cos θ. To graph, start with θ = 0 so r = 6. Compute dr

Econ 2110: Fall 2008 Suggested Solutions to Problem Set 8 questions or comments to Dan Fetter 1

Υπολογιστική Θεωρία Αριθμών και Κρυπτογραφία

Statistical Inference I Locally most powerful tests

Μηχανική Μάθηση Hypothesis Testing

Συμμετρικά κρυπτοσυστήματα

Διάρκεια μιας Ομολογίας (Duration) Ανοσοποίηση (Immunization)

Main source: "Discrete-time systems and computer control" by Α. ΣΚΟΔΡΑΣ ΨΗΦΙΑΚΟΣ ΕΛΕΓΧΟΣ ΔΙΑΛΕΞΗ 4 ΔΙΑΦΑΝΕΙΑ 1

ΤΕΙ Κρήτης Τμήμα Μηχανικών Πληροφορικής. Συμμετρική Κρυπτογραφία

Matrices and Determinants

b. Use the parametrization from (a) to compute the area of S a as S a ds. Be sure to substitute for ds!

Homework 8 Model Solution Section

the total number of electrons passing through the lamp.

2. THEORY OF EQUATIONS. PREVIOUS EAMCET Bits.

ΚΥΠΡΙΑΚΗ ΕΤΑΙΡΕΙΑ ΠΛΗΡΟΦΟΡΙΚΗΣ CYPRUS COMPUTER SOCIETY ΠΑΓΚΥΠΡΙΟΣ ΜΑΘΗΤΙΚΟΣ ΔΙΑΓΩΝΙΣΜΟΣ ΠΛΗΡΟΦΟΡΙΚΗΣ 24/3/2007

Modbus basic setup notes for IO-Link AL1xxx Master Block

Κρυπτογραφία. Κρυπτοσυστήματα τμήματος (Block ciphers) Άρης Παγουρτζής Στάθης Ζάχος Πέτρος Ποτίκας

DESIGN OF MACHINERY SOLUTION MANUAL h in h 4 0.

Potential Dividers. 46 minutes. 46 marks. Page 1 of 11

TMA4115 Matematikk 3

Κρυπτογραφία. Κρυπτοσυστήματα τμήματος (Block ciphers) Άρης Παγουρτζής Στάθης Ζάχος Πέτρος Ποτίκας

Math 6 SL Probability Distributions Practice Test Mark Scheme

Κρυπτογραφία. Κρυπτοσυστήματα τμήματος (Block ciphers) Άρης Παγουρτζής Στάθης Ζάχος Πέτρος Ποτίκας

Overview. Transition Semantics. Configurations and the transition relation. Executions and computation

Κρυπτογραφία. Κρυπτοσυστήματα τμήματος (Block ciphers) Άρης Παγουρτζής Στάθης Ζάχος Πέτρος Ποτίκας

Κρυπτογραφία. Κρυπτοσυστήματα πακέτου (Block ciphers) Άρης Παγουρτζής Στάθης Ζάχος Πέτρος Ποτίκας

ω ω ω ω ω ω+2 ω ω+2 + ω ω ω ω+2 + ω ω+1 ω ω+2 2 ω ω ω ω ω ω ω ω+1 ω ω2 ω ω2 + ω ω ω2 + ω ω ω ω2 + ω ω+1 ω ω2 + ω ω+1 + ω ω ω ω2 + ω

ΚΥΠΡΙΑΚΟΣ ΣΥΝΔΕΣΜΟΣ ΠΛΗΡΟΦΟΡΙΚΗΣ CYPRUS COMPUTER SOCIETY 21 ος ΠΑΓΚΥΠΡΙΟΣ ΜΑΘΗΤΙΚΟΣ ΔΙΑΓΩΝΙΣΜΟΣ ΠΛΗΡΟΦΟΡΙΚΗΣ Δεύτερος Γύρος - 30 Μαρτίου 2011

[1] P Q. Fig. 3.1

Approximation of distance between locations on earth given by latitude and longitude

Every set of first-order formulas is equivalent to an independent set

Durbin-Levinson recursive method

ΕΙΣΑΓΩΓΗ ΣΤΗ ΣΤΑΤΙΣΤΙΚΗ ΑΝΑΛΥΣΗ

Bayesian statistics. DS GA 1002 Probability and Statistics for Data Science.

Κρυπτογραφία. Κωνσταντίνου Ελισάβετ

Galatia SIL Keyboard Information

6.3 Forecasting ARMA processes

CHAPTER 48 APPLICATIONS OF MATRICES AND DETERMINANTS

SOLUTIONS TO MATH38181 EXTREME VALUES AND FINANCIAL RISK EXAM

Finite Field Problems: Solutions

Business English. Ενότητα # 9: Financial Planning. Ευαγγελία Κουτσογιάννη Τμήμα Διοίκησης Επιχειρήσεων

Lecture 2. Soundness and completeness of propositional logic

Second Order Partial Differential Equations

C.S. 430 Assignment 6, Sample Solutions

Εργαστήριο Ανάπτυξης Εφαρμογών Βάσεων Δεδομένων. Εξάμηνο 7 ο

Fourier Series. MATH 211, Calculus II. J. Robert Buchanan. Spring Department of Mathematics

Numerical Analysis FMN011

Συντακτικές λειτουργίες

Strain gauge and rosettes

Στο εστιατόριο «ToDokimasesPrinToBgaleisStonKosmo?» έξω από τους δακτυλίους του Κρόνου, οι παραγγελίες γίνονται ηλεκτρονικά.

Example of the Baum-Welch Algorithm

Fractional Colorings and Zykov Products of graphs

ΤΕΧΝΟΛΟΓΙΚΟ ΠΑΝΕΠΙΣΤΗΜΙΟ ΚΥΠΡΟΥ ΣΧΟΛΗ ΓΕΩΤΕΧΝΙΚΩΝ ΕΠΙΣΤΗΜΩΝ ΚΑΙ ΔΙΑΧΕΙΡΙΣΗΣ ΠΕΡΙΒΑΛΛΟΝΤΟΣ. Πτυχιακή εργασία

( y) Partial Differential Equations

Ordinal Arithmetic: Addition, Multiplication, Exponentiation and Limit

ΕΛΛΗΝΙΚΗ ΔΗΜΟΚΡΑΤΙΑ ΠΑΝΕΠΙΣΤΗΜΙΟ ΚΡΗΤΗΣ. Ψηφιακή Οικονομία. Διάλεξη 7η: Consumer Behavior Mαρίνα Μπιτσάκη Τμήμα Επιστήμης Υπολογιστών

CRASH COURSE IN PRECALCULUS

Εφαρμοσμένη Κρυπτογραφία Ι

(1) Describe the process by which mercury atoms become excited in a fluorescent tube (3)

Code Breaker. TEACHER s NOTES

Advanced Subsidiary Unit 1: Understanding and Written Response

Section 9.2 Polar Equations and Graphs

ΠΑΝΕΠΙΣΤΗΜΙΟ ΚΥΠΡΟΥ ΤΜΗΜΑ ΠΛΗΡΟΦΟΡΙΚΗΣ. ΕΠΛ342: Βάσεις Δεδομένων. Χειμερινό Εξάμηνο Φροντιστήριο 10 ΛΥΣΕΙΣ. Επερωτήσεις SQL

EPL 603 TOPICS IN SOFTWARE ENGINEERING. Lab 5: Component Adaptation Environment (COPE)

EPL475:Εργαστήριο 4, openssl Assymmetric Encryption

Newborn Upfront Payment & Newborn Supplement

UNIVERSITY OF CALIFORNIA. EECS 150 Fall ) You are implementing an 4:1 Multiplexer that has the following specifications:

Section 1: Listening and responding. Presenter: Niki Farfara MGTAV VCE Seminar 7 August 2016

Partial Trace and Partial Transpose

ΟΔΗΓΙΕΣ ΕΓΚΑΤΑΣTΑΣΗΣ ΓΙΑ ΠΑΤΩΜΑ WPC INSTALLATION GUIDE FOR WPC DECKING

ΑΣΦΑΛΕΙΑ & ΔΙΑΧΕΙΡΙΣΗ ΔΙΚΤΥΩΝ(Θ)

Lecture 34 Bootstrap confidence intervals

Calculating the propagation delay of coaxial cable

Συστήματα Διαχείρισης Βάσεων Δεδομένων

5.4 The Poisson Distribution.

Démographie spatiale/spatial Demography

Συμμετρική Κρυπτογραφία

Assalamu `alaikum wr. wb.

Transcript:

Block Ciphers Modes Ramki Thurimella

Only Encryption I.e. messages could be modified Should not assume that nonsensical messages do no harm Always must be combined with authentication 2

Padding Must be reversible Simply adding enough 0s at the end until the length of the padded message is a multiple of the block size is NOT a good idea. This is not reversible Use one of the following two methods instead: First always append 0111 1111 and as many 0s as necessary Let l(p) + n be the shortest multiple of the block length for some n 1. Pad P with n bytes where each byte contains n in binary. 3

ECB C i E(K,P i ) for i = 1,2,,k Serious Weakness: Repetition of plaintext between different blocks translates to repetition of ciphertext For e.g. In Unicode, every other byte is a 0 Fix Many files have repeated 0s Use chaining, i.e. use the ciphertext from the previous block in computing the ciphertext for the current block, or Use a nonce along with K and P i when encrypting 4

Cipher Block Chainig (CBC) Mathematically C i E(K,P i What should C 0 be? C i-1 ) for i=1,2,,k C 0 is called the initialization vector (IV). Some choices: Fixed value Counter Random Nonce-derived 5

IV: how about fixed value? If two messages have the same plaintext, their corresponding ciphertext would be same Not recommended 6

Counter IV Create a message counter starting at, say 0, and use this as the IV If plaintext for two messages starts similarly, then XOR with counter-based IV could cancel out the changes and produce the same ciphertext Not recommended 7

Random IV C 0 random block value C 0 like other C i is NOT a secret Ciphertext is one block longer than the plaintext as C 0 needs to be communicated to the receiver This is a major disadvantage as plaintext messages typically tend to be one block long 8

Nonce-Generated IV Nonce a unique number (stands for number used once) This could constructed, for example, from the message number Nonce should be as long as one block Encrypt the nonce to generate IV IV does not need to be sent separately if the receiver has the message number, key, and the encryption method 9

Output Feedback Mode (OFB) Generate a pseudorandom key stream of length equal to the length of the plaintext P Mathematically K 0 = IV K i E(K,K i-1 C i P i K i C i-1 ) for i=1,2,,k 10

OFB (cont.) Random IV, or Can be generated from a nonce as in CFB Advantages Encryption and decryption the same No need for padding Disadvantage If the same IV is used for two messages, the will be encrypted with the same key stream So what? Eve captures C i and C i and computes their XOR This is P i K i P i K i = P i P i Knowing XOR of two plaintext message, and partial information about one of them, information about the other can be derived 11

OFB (cont.) Second disadvantage If one key block repeats, then the entire stream blocks up until that point repeat A collision is expected to happen after encrypting 2 64 blocks of data assuming a block size of 128 bits 12

Counter (CTR) mode Operates in stream cipher mode Mathematically K i E(K,Nonce i) for i=1,2,,k C i P i Simple K i Nonce and i should fit in one block Nonce should never be repeated 13

Exercise Assuming 48-bit message number 16-bit nonce 64 bits for I How many different messages can be encrypted? How long can be each message? 14

CTR (cont.) Advantages Identical encryption and decryption Key stream computation can be parallelized The security of CTR mode is directly linked to the security of the block cipher 15

Final recommendation CBC with random IV Though there is overhead of increased ciphertext length slow 16