02-CH02-CompSec2e-ver02 Cryptographic Tools PDF
02-CH02-CompSec2e-ver02 Cryptographic Tools PDF
and Cryptography
Basics of Information Security
Professor dr.sc.ing. Viktor Gopejenko
Department of Computer Technologies and Natural Sciences
ISMA University of Applied Science, Riga, Latvia
Lecture 2
Cryptographic Tools
Learning Objectives
Public-Key Encryption
strength concerns:
• concerns about algorithm
• DES is the most studied encryption algorithm in
existence
• use of 56-bit key
• Electronic Frontier Foundation (EFF) announced in
July 1998 that it had broken a DES encryption
Time to Break a Code (assuming 106 decryptions/ms) The graph
assumes that a symmetric encryption algorithm is attacked using
a brute-force approach of trying all possible keys
Triple DES (3DES)
repeats basic DES algorithm three times using either two or
three unique keys
first standardized for use in financial applications in ANSI
standard X9.17 in 1985
attractions:
168-bit key length overcomes the vulnerability to brute-force
attack of DES
underlying encryption algorithm is the same as in DES
drawbacks:
algorithm is sluggish in software
uses a 64-bit block size
Advanced Encryption Standard
(AES)
needed a NIST called for selected
replacement for proposals for a Rijndael in
3DES new AES in 1997 November 2001
should have a security
strength equal to or better
than 3DES
significantly improved
3DES was not efficiency
published as FIPS
reasonable for
197
long term use
symmetric block cipher
modes of operation
alternative techniques developed to increase the security of
symmetric block encryption for large sequences
overcomes the weaknesses of ECB
Block Cipher
Encryption
Stream
Encryption Types of Symmetric Encryption
Block & Stream Ciphers
Block Cipher
Stream Cipher
• processes the input elements continuously
• produces output one element at a time
• primary advantage is that they are almost always faster and use far
less code
• encrypts plaintext one byte at a time
• pseudorandom stream is one that is unpredictable without knowledge
of the input key
Message Authentication
protects against
active attacks
computationally easy
useful if either key for sender knowing
can be used for each public key to encrypt
role messages
computationally
computationally easy
infeasible for
for receiver knowing
opponent to
private key to decrypt
otherwise recover
ciphertext
original message
computationally
infeasible for opponent
to determine private
key from public key
RSA (Rivest, most widely accepted and
block cipher in which the
plaintext and ciphertext
Shamir, developed in 1977 implemented approach to
public-key encryption
are integers between 0 and
n-1 for some n.
Adleman)
Elliptic curve
security like RSA, but with
cryptography much smaller keys
(ECC)
Digital Signatures
Digital Envelopes
Random keys for public-key
algorithms
Numbers stream key for
symmetric stream
cipher
symmetric key for use
as a temporary
session key or in
creating a digital
envelope
handshaking to
Uses include prevent replay attacks
session key
generation of:
Random Number Requirements
Randomness Unpredictability
criteria: each number is statistically
uniform distribution independent of other numbers
frequency of occurrence of in the sequence
each of the numbers opponent should not be able
should be approximately
to predict future elements of
the same
the sequence on the basis of
independence
earlier elements
no one value in the
sequence can be inferred
from the others
Random versus Pseudorandom
cryptographic applications typically make use of algorithmic
techniques for random number generation
algorithms are deterministic and therefore produce sequences of
numbers that are not statistically random