home | articles | links | fun | about
Up to: CS432 Information Security

Ciphers, DES, AES (10/01/02)

                  Alice               Zeke            Bob
                  
     plaintext -> [ E ] -------------/\/\/\/\-------- [ D ] ---> plaintext
                    |    (ciphertext)                   |
                   key                                 key
                   
     |-- assumed secure-|                            |--assumed secure --|  

Review of model

When encryption fails, usually because plaintext gets leaked; find bug in encryption program

Example Block Cipher: DES (Data Encryption Standard)

Speces

History:1978, NSA (Nat'l Security Agency) and IBM design

Making DES keys bigger

Why not double-DES?

Meet in the middle attack (M-I-M).

Attack: Assume you have a few plaintext/ciphertext pairs

Attacker's Method

Table:

        k_2     D_k2(c)                     
  
        0       b_blah1
        1       c_blah2
        2       a_blah3

Table:

        D_k2(c)   k_2
        
        a_blah3   2
        b_blah1   0
        c_blah2   1

Result

Double

           |     |
           |     |
           |     | 2^56 protection
         [...]   V
           |  
           |   
         [...]   ^ 
           |     | 2^56 protection
           |     |
           |     |
         Triple
 
                |
          [  ]  |   2^56
                |
                |
                V
          [  ]  ^
                |
                |   2^112
                |
          [  ]  |
                |
                |

Like tunneling through from both sides... 2 * 2^56 is much much easier than 2^112. Likewise, 2^56 + 2^112 is easier than 2^168

Strength of keys

By number of bits

Every bit doubles search space

Why 160 bits for SHA-1?

Security worries

Advanced Encryption Standard (AES)

US govt standard, 2001

Specs

How it works

Cipher modes

How to encrypt large data, given block cipher?

Electronic code book (ECB)