Download as pdf or txt
Download as pdf or txt
You are on page 1of 36

DES, AES &

Diffie-Hellman Key
Distribution
Chittaranjan Pradhan

Cryptography 6
DES

DES, AES & Diffie-Hellman Key DES Overview


Initial Permutation (IP) &
Final Permutation (FP)

Distribution Details of One Round in


DES
DES Analysis
Weakness of DES

Double DES
Meet-in-the Middle Attack in
2DES

Triple DES with Three


Keys

Triple DES with Two


Keys

AES (Advanced
Encryption Standard)
One time Initialization
Key Expansion
Round

Diffie- Hellman Key


Agreement
Problems in Diffie- Hellman
Algorithm/

Chittaranjan Pradhan Man-in-the-middle Attack

School of Computer Engineering,


KIIT University
6.1
DES, AES &
DES Diffie-Hellman Key
Distribution
Chittaranjan Pradhan

DES DES
DES Overview

• The Data Encryption Standard (DES) is a symmetric-key Initial Permutation (IP) &
Final Permutation (FP)
Details of One Round in
block cipher published by the National Institute of DES
DES Analysis
Standards and Technology (NIST) in 1975 Weakness of DES

• Modified Lucifer project of IBM was chosen as DES Double DES


Meet-in-the Middle Attack in
2DES
• DES is generally used in ECB, CBC or CFB mode
Triple DES with Three
Keys

Triple DES with Two


Keys

AES (Advanced
Encryption Standard)
One time Initialization
Key Expansion
Round

Diffie- Hellman Key


Agreement
Problems in Diffie- Hellman
Algorithm/
Man-in-the-middle Attack

6.2
DES, AES &
DES Overview Diffie-Hellman Key
Distribution
Chittaranjan Pradhan

DES Overview
The encryption process is made of two permutations (P-boxes) DES
DES Overview
called initial and final permutations, and sixteen Feistel rounds Initial Permutation (IP) &
Final Permutation (FP)
Details of One Round in
DES
DES Analysis
Weakness of DES

Double DES
Meet-in-the Middle Attack in
2DES

Triple DES with Three


Keys

Triple DES with Two


Keys

AES (Advanced
Encryption Standard)
One time Initialization
Key Expansion
Round

Diffie- Hellman Key


Agreement
Problems in Diffie- Hellman
Algorithm/
Man-in-the-middle Attack

6.3
DES, AES &
DES Overview... Diffie-Hellman Key
Distribution
Chittaranjan Pradhan

DES
DES Overview
DES Overview... Initial Permutation (IP) &
Final Permutation (FP)
Details of One Round in
• Original key consists of 64bits DES
DES Analysis

• 56-bit key can be generated by discarding every 8th bit of Weakness of DES

Double DES
the key Meet-in-the Middle Attack in
2DES

Triple DES with Three


Keys

Triple DES with Two


Keys

AES (Advanced
Encryption Standard)
One time Initialization
Key Expansion
Round

Diffie- Hellman Key


Agreement
Problems in Diffie- Hellman
Algorithm/
Man-in-the-middle Attack

6.4
DES, AES &
Initial Permutation (IP) & Final Permutation (FP) Diffie-Hellman Key
Distribution
Initial Permutation (IP) Chittaranjan Pradhan

Initial & Final permutations are keyless straight P-boxes that


are inverse of each other. Happens only once DES
DES Overview
Initial Permutation (IP) &
Final Permutation (FP)
Details of One Round in
DES
DES Analysis
Weakness of DES

Double DES
Meet-in-the Middle Attack in
2DES

Triple DES with Three


Keys

Triple DES with Two


Keys

AES (Advanced
Encryption Standard)
Final Permutation (FP) One time Initialization
Key Expansion
Round

Diffie- Hellman Key


Agreement
Problems in Diffie- Hellman
Algorithm/
Man-in-the-middle Attack

6.5
DES, AES &
Details of One Round in DES Diffie-Hellman Key
Distribution
Chittaranjan Pradhan

DES
Details of One Round in DES DES Overview
Initial Permutation (IP) &

DES uses 16 rounds. Each round of DES is a Feistel cipher Final Permutation (FP)
Details of One Round in
DES
DES Analysis
Weakness of DES

Double DES
Meet-in-the Middle Attack in
2DES

Triple DES with Three


Keys

Triple DES with Two


Keys

AES (Advanced
Encryption Standard)
One time Initialization
Key Expansion
Round

Diffie- Hellman Key


Agreement
Problems in Diffie- Hellman
Algorithm/
Man-in-the-middle Attack

6.6
DES, AES &
a. Key Transformation Diffie-Hellman Key
Distribution
a. Key Transformation Chittaranjan Pradhan

• From the 56- bit key, a 48- bit sub key is generated during DES
each round DES Overview
Initial Permutation (IP) &

• 56- bit key is divided into 2 halves, each of 28- bits. These Final Permutation (FP)
Details of One Round in
DES
halves are circularly shifted left by 1 or 2 positions, DES Analysis

depending on the round Weakness of DES

Double DES
Meet-in-the Middle Attack in
2DES

Triple DES with Three


Keys

Triple DES with Two


Keys

AES (Advanced
Encryption Standard)

It is also called as compression permutation One time Initialization


Key Expansion

In each round, a different subset of key bits is used Round

Diffie- Hellman Key


Agreement
Problems in Diffie- Hellman
Algorithm/
Man-in-the-middle Attack

6.7
DES, AES &
b. Expansion Permutation Diffie-Hellman Key
Distribution
Chittaranjan Pradhan

DES
b. Expansion Permutation DES Overview
Initial Permutation (IP) &
Final Permutation (FP)
• After Initial Permutation, we have 32- bit LPT & 32- bit RPT Details of One Round in
DES

• Now, RPT will be expanded to 48- bit DES Analysis


Weakness of DES

• After expansion permutation, DES uses XOR operation on Double DES


Meet-in-the Middle Attack in
expanded RPT and round key 2DES

Triple DES with Three


Keys

Triple DES with Two


Keys

AES (Advanced
Encryption Standard)
One time Initialization
Key Expansion
Round

Diffie- Hellman Key


Agreement
Problems in Diffie- Hellman
Algorithm/
Man-in-the-middle Attack

6.8
DES, AES &
b. Expansion Permutation... Diffie-Hellman Key
Distribution
Chittaranjan Pradhan

DES
DES Overview
Initial Permutation (IP) &
Final Permutation (FP)
Details of One Round in
DES
DES Analysis
Weakness of DES

Double DES
Meet-in-the Middle Attack in
2DES

Triple DES with Three


Keys

Triple DES with Two


Keys

AES (Advanced
Encryption Standard)
One time Initialization
Key Expansion
Round

Diffie- Hellman Key


Agreement
Problems in Diffie- Hellman
Algorithm/
Man-in-the-middle Attack

6.9
DES, AES &
c. S- Box Substitution Diffie-Hellman Key
Distribution
Chittaranjan Pradhan

c. S- Box Substitution
DES

• The S-boxes do the real mixing (confusion) DES Overview


Initial Permutation (IP) &
Final Permutation (FP)
• DES uses 8 S-boxes, each with a 6-bit input and a 4-bit Details of One Round in
DES

output DES Analysis


Weakness of DES

Double DES
Meet-in-the Middle Attack in
2DES

Triple DES with Three


Keys

Triple DES with Two


Keys

AES (Advanced
Encryption Standard)
One time Initialization
Key Expansion
Round

Diffie- Hellman Key


Agreement
Problems in Diffie- Hellman
Algorithm/
Man-in-the-middle Attack

6.10
DES, AES &
c. S- Box Substitution... Diffie-Hellman Key
Distribution
Chittaranjan Pradhan

DES
DES Overview
Initial Permutation (IP) &
Final Permutation (FP)
Details of One Round in
DES
DES Analysis
Weakness of DES

Double DES
Meet-in-the Middle Attack in
2DES

Triple DES with Three


Keys

Triple DES with Two


Keys

AES (Advanced
Encryption Standard)
One time Initialization
Key Expansion
Round

Diffie- Hellman Key


Agreement
Problems in Diffie- Hellman
Algorithm/
Man-in-the-middle Attack

6.11
DES, AES &
c. S- Box Substitution... Diffie-Hellman Key
Distribution
Chittaranjan Pradhan

DES
DES Overview
Initial Permutation (IP) &
Final Permutation (FP)
Details of One Round in
DES
DES Analysis
Weakness of DES

Double DES
Meet-in-the Middle Attack in
2DES

Triple DES with Three


Keys

Triple DES with Two


Keys

AES (Advanced
Encryption Standard)
One time Initialization
Key Expansion
Round

Diffie- Hellman Key


Agreement
Problems in Diffie- Hellman
Algorithm/
Man-in-the-middle Attack

6.12
DES, AES &
c. S- Box Substitution... Diffie-Hellman Key
Distribution
Chittaranjan Pradhan

DES
DES Overview
Initial Permutation (IP) &
Final Permutation (FP)
Details of One Round in
DES
DES Analysis
Weakness of DES

Double DES
Meet-in-the Middle Attack in
2DES

Triple DES with Three


Keys

Triple DES with Two


Keys

AES (Advanced
Encryption Standard)
One time Initialization
Key Expansion
Round

Diffie- Hellman Key


Agreement
Problems in Diffie- Hellman
Algorithm/
Man-in-the-middle Attack

6.13
DES, AES &
d. P- Box Permutation Diffie-Hellman Key
Distribution
Chittaranjan Pradhan

DES
DES Overview
Initial Permutation (IP) &
Final Permutation (FP)
Details of One Round in
DES
d. P- Box Permutation DES Analysis
Weakness of DES
The last operation in DES round is a permutation with a 32-bit Double DES
input and a 32-bit output Meet-in-the Middle Attack in
2DES

Triple DES with Three


Keys

Triple DES with Two


Keys

AES (Advanced
Encryption Standard)
One time Initialization
Key Expansion
Round

Diffie- Hellman Key


Agreement
Problems in Diffie- Hellman
Algorithm/
Man-in-the-middle Attack

6.14
DES, AES &
e. XOR & Swap Diffie-Hellman Key
Distribution
Chittaranjan Pradhan

DES
DES Overview
Initial Permutation (IP) &
Final Permutation (FP)
Details of One Round in
DES
DES Analysis
Weakness of DES

Double DES
Meet-in-the Middle Attack in
2DES

Triple DES with Three


Keys

Triple DES with Two


Keys

AES (Advanced
Encryption Standard)
One time Initialization
Key Expansion
Round

Diffie- Hellman Key


Agreement
Problems in Diffie- Hellman
Algorithm/
Man-in-the-middle Attack

6.15
DES, AES &
DES Analysis Diffie-Hellman Key
Distribution
Chittaranjan Pradhan

DES
DES Overview
Initial Permutation (IP) &
DES Analysis Final Permutation (FP)
Details of One Round in
DES
Avalance Effect: a small change in the PT (or key) should DES Analysis
Weakness of DES
create a significant change in CT. DES has been proved to be Double DES
strong w.r.t. this property Meet-in-the Middle Attack in
2DES

Triple DES with Three


Keys

Triple DES with Two


Completeness Effect: each bit of CT needs to depend on Keys

many bits on PT. The diffusion and confusion produced by AES (Advanced
Encryption Standard)
P-boxes and S-boxes in DES, show a very strong One time Initialization

completeness effect Key Expansion


Round

Diffie- Hellman Key


Agreement
Problems in Diffie- Hellman
Algorithm/
Man-in-the-middle Attack

6.16
DES, AES &
Weakness of DES Diffie-Hellman Key
Distribution
Chittaranjan Pradhan

DES
Weakness of DES DES Overview
Initial Permutation (IP) &
Final Permutation (FP)
• Key size is 56 bit Details of One Round in
DES
DES Analysis
Weakness of DES
• Brute force attack needs to check 2 keys, i.e. a computer
56
Double DES

performing one DES encryption per microsecond would Meet-in-the Middle Attack in
2DES

require more than 1000 years to break DES Triple DES with Three
Keys

Triple DES with Two


• A computer with 1 million chips (parallel processing) can Keys

AES (Advanced
find the key in 20 hours Encryption Standard)
One time Initialization
Key Expansion

• In 1998, a special computer was built, which found the key Round

Diffie- Hellman Key


in 112 hours Agreement
Problems in Diffie- Hellman
Algorithm/
Man-in-the-middle Attack

6.17
DES, AES &
Double DES Diffie-Hellman Key
Distribution
Chittaranjan Pradhan

Double DES
DES
DES Overview
• Does twice what DES normally does only once Initial Permutation (IP) &
Final Permutation (FP)
Details of One Round in
DES

• Uses 2 keys K1 & K2 DES Analysis


Weakness of DES

Double DES
Meet-in-the Middle Attack in
2DES

Triple DES with Three


Keys

Triple DES with Two


Keys

AES (Advanced
Encryption Standard)
One time Initialization
Key Expansion
Round

Diffie- Hellman Key


Agreement
Problems in Diffie- Hellman
Algorithm/
Man-in-the-middle Attack

6.18
DES, AES &
Meet-in-the Middle Attack in 2DES Diffie-Hellman Key
Distribution
Meet-in-the Middle Attack in 2DES Chittaranjan Pradhan

• Cryptanalyst needs 2112 keys. It is vulnerable to known-PT


DES
attack, called Meet- in- the middle attack DES Overview
Initial Permutation (IP) &
• Step1 Final Permutation (FP)
Details of One Round in
• Cryptanalyst uses a large memory DES
DES Analysis
• Cryptanalyst tried to find out M by using all possible values Weakness of DES

of K1 and store the values of M in a table in the memory Double DES

• M=Ek 1 (P) Meet-in-the Middle Attack in


2DES

• Step2 Triple DES with Three


Keys
• Cryptanalyst decrypts CT with different keys Triple DES with Two
• M=Dk 2 (C) Keys

AES (Advanced
Encryption Standard)
One time Initialization
Key Expansion
Round

Diffie- Hellman Key


Agreement
Problems in Diffie- Hellman
Algorithm/
Man-in-the-middle Attack

6.19
DES, AES &
Triple DES with Three Keys Diffie-Hellman Key
Distribution
Chittaranjan Pradhan

Triple DES with Three Keys


DES

• Does thrice what DES normally does only once DES Overview
Initial Permutation (IP) &
Final Permutation (FP)
Details of One Round in
DES
• Uses 3 keys K1, K2 & K3 DES Analysis
Weakness of DES

Double DES
Meet-in-the Middle Attack in
2DES

Triple DES with Three


Keys

Triple DES with Two


Keys

AES (Advanced
Encryption Standard)
One time Initialization
Key Expansion
Round

Diffie- Hellman Key


Agreement
Problems in Diffie- Hellman
Algorithm/
Man-in-the-middle Attack

6.20
DES, AES &
Triple DES with Three Keys... Diffie-Hellman Key
Distribution
Chittaranjan Pradhan

DES
Triple DES with Three Keys... DES Overview
Initial Permutation (IP) &

Backward compatibility Final Permutation (FP)


Details of One Round in
DES
DES Analysis
Weakness of DES

Double DES
Meet-in-the Middle Attack in
2DES

Triple DES with Three


Keys

Triple DES with Two


Keys

AES (Advanced
Encryption Standard)
One time Initialization
Key Expansion
Round

Diffie- Hellman Key


Agreement
Problems in Diffie- Hellman
Algorithm/
Man-in-the-middle Attack

6.21
DES, AES &
Triple DES with Two Keys Diffie-Hellman Key
Distribution
Chittaranjan Pradhan

Triple DES with Two Keys DES


DES Overview
Initial Permutation (IP) &
Uses 2 Keys K1 & K2 Final Permutation (FP)
Details of One Round in
DES
DES Analysis
Weakness of DES

Double DES
Meet-in-the Middle Attack in
2DES

Triple DES with Three


Keys

Triple DES with Two


Keys

AES (Advanced
Encryption Standard)
One time Initialization
Key Expansion
Round

Diffie- Hellman Key


Agreement
Problems in Diffie- Hellman
Algorithm/
Man-in-the-middle Attack

6.22
DES, AES &
AES (Advanced Encryption Standard) Diffie-Hellman Key
Distribution
Chittaranjan Pradhan

DES
AES (Advanced Encryption Standard) DES Overview
Initial Permutation (IP) &
Final Permutation (FP)
• Developed by Rijndael (Rijmen & Daemen) in Nov 2001 Details of One Round in
DES

• Security DES Analysis


Weakness of DES

• Cost Double DES


Meet-in-the Middle Attack in

• Implementation 2DES

Triple DES with Three


Keys

• PT block size: 128 bits Triple DES with Two


Keys

• No of rounds: 10 or 12 or 14 AES (Advanced


Encryption Standard)

• Key size: 128 or 192 or 256 bits One time Initialization


Key Expansion
Round

Diffie- Hellman Key


• AES-128, AES-192 & AES-256 Agreement
Problems in Diffie- Hellman
Algorithm/
Man-in-the-middle Attack

6.23
DES, AES &
One time Initialization Diffie-Hellman Key
Distribution
Chittaranjan Pradhan

DES
One time Initialization DES Overview
Initial Permutation (IP) &

• Generation of State Final Permutation (FP)


Details of One Round in
DES
• 16-byte PT block is copied into a 2-D 4X4 array called as DES Analysis
Weakness of DES
state. The order is in the column order
Double DES
Meet-in-the Middle Attack in
2DES

Triple DES with Three


Keys

Triple DES with Two


Keys

AES (Advanced
Encryption Standard)
One time Initialization
Key Expansion
Round

Diffie- Hellman Key


Agreement
Problems in Diffie- Hellman
Algorithm/
Man-in-the-middle Attack

6.24
DES, AES &
One time Initialization... Diffie-Hellman Key
Distribution
Chittaranjan Pradhan

DES
DES Overview
Initial Permutation (IP) &
Final Permutation (FP)
Details of One Round in
DES
DES Analysis
Weakness of DES

Double DES
Meet-in-the Middle Attack in
2DES

Triple DES with Three


Keys

Triple DES with Two


Keys

AES (Advanced
Encryption Standard)
One time Initialization
Key Expansion
Round

Diffie- Hellman Key


Agreement
Problems in Diffie- Hellman
Algorithm/
Man-in-the-middle Attack

6.25
DES, AES &
Key Expansion Diffie-Hellman Key
Distribution
Chittaranjan Pradhan
Key Expansion

• Expands the 4-words (16-byte) key into 11 array, each of DES


DES Overview
size 4X4, i.e. original 16-byte key is expanded to 44-words Initial Permutation (IP) &
Final Permutation (FP)
(11X4X4=176 bytes) Details of One Round in
DES

• The first array (4-words) is initialized by the original key. DES Analysis
Weakness of DES
The other 10 arrays (40-words) are used in the 10 rounds, Double DES
one array per round Meet-in-the Middle Attack in
2DES

Triple DES with Three


Keys
• The key is copied into the first four words of the expanded Triple DES with Two
key. The reminder of the expanded key is filled in four Keys

AES (Advanced
words at a time Encryption Standard)
One time Initialization
• Each added word w[i] depends on the immediately Key Expansion
Round
preceding word, w[i-1], and the word four positions back,
Diffie- Hellman Key
w[i-4] Agreement
Problems in Diffie- Hellman
• In 3 out of 4 cases, a simple XOR is used. For a word Algorithm/
Man-in-the-middle Attack

whose position in the w array is a multiple of 4, a more


complex function is used.
6.26
DES, AES &
Key Expansion... Diffie-Hellman Key
Distribution
Chittaranjan Pradhan
Key Expansion...
The function consists of: DES

• One-byte circular left shift happens on a word; i.e. an input DES Overview
Initial Permutation (IP) &
Final Permutation (FP)
word [B0, B1, B2, B3] is transformed into [B1, B2, B3, B0] Details of One Round in
DES
• Byte substitution on each byte of its input word using DES Analysis
Weakness of DES
S-Box Double DES

• The result of the above 2 steps is XORed with a round Meet-in-the Middle Attack in
2DES

constant Rcon[j] Triple DES with Three


Keys
• The round constant is a word in which the 3 rightmost Triple DES with Two
Keys
bytes are always 0. Thus, the effect of an XOR of a word
AES (Advanced
with Rcon is to only perform an XOR on the leftmost byte Encryption Standard)
One time Initialization
of the word. Rcon[j] is calculated as (RC[j],0,0,0) Key Expansion
Round

Diffie- Hellman Key


Agreement
Problems in Diffie- Hellman
Algorithm/
Man-in-the-middle Attack

6.27
DES, AES &
Key Expansion... Diffie-Hellman Key
Distribution
Chittaranjan Pradhan

DES
DES Overview
Initial Permutation (IP) &
Final Permutation (FP)
Details of One Round in
DES

Key Expansion... DES Analysis


Weakness of DES

Double DES
XOR the state with the key block Meet-in-the Middle Attack in
2DES

Triple DES with Three


Keys

Triple DES with Two


Keys

AES (Advanced
Encryption Standard)
One time Initialization
Key Expansion
Round

Diffie- Hellman Key


Agreement
Problems in Diffie- Hellman
Algorithm/
Man-in-the-middle Attack

6.28
DES, AES &
Round Diffie-Hellman Key
Distribution
Chittaranjan Pradhan

DES
DES Overview
Initial Permutation (IP) &
Final Permutation (FP)
Details of One Round in
DES
DES Analysis
Weakness of DES

Double DES
Meet-in-the Middle Attack in
2DES

Triple DES with Three


Keys

Triple DES with Two


Keys

AES (Advanced
Encryption Standard)
One time Initialization
Key Expansion
Round

Diffie- Hellman Key


Agreement
Problems in Diffie- Hellman
Algorithm/
Man-in-the-middle Attack

6.29
DES, AES &
R1. Byte Substitution Diffie-Hellman Key
Distribution
Chittaranjan Pradhan

R1. Byte Substitution


DES
• Replace each byte in the state array with its corresponding DES Overview
Initial Permutation (IP) &

value from the S-box. Only one S- box is used in AES Final Permutation (FP)
Details of One Round in
DES
DES Analysis
Weakness of DES

Double DES
Meet-in-the Middle Attack in
2DES

Triple DES with Three


Keys

Triple DES with Two


Keys

AES (Advanced
Encryption Standard)
One time Initialization
Key Expansion
Round

Diffie- Hellman Key


Agreement
Problems in Diffie- Hellman
Algorithm/
Man-in-the-middle Attack

6.30
DES, AES &
R2. Shift Row Diffie-Hellman Key
Distribution
Chittaranjan Pradhan
R2. Shift Row

• Each row of the 4 rows of the state array are rotated to the DES
DES Overview
left. Row 0 by 0B, row 1 by 1B, row 2 by 2B and row 3 by Initial Permutation (IP) &
Final Permutation (FP)
3B Details of One Round in
DES
DES Analysis
Weakness of DES

Double DES
Meet-in-the Middle Attack in
2DES

Triple DES with Three


Keys

Triple DES with Two


Keys

AES (Advanced
Encryption Standard)
One time Initialization
Key Expansion
Round

Diffie- Hellman Key


Agreement
Problems in Diffie- Hellman
Algorithm/
Man-in-the-middle Attack

6.31
DES, AES &
R3. Mix- Column Diffie-Hellman Key
Distribution
Chittaranjan Pradhan

R3. Mix- Column


DES
• Each column of the state is multiplied with a fixed DES Overview
Initial Permutation (IP) &
Polynomial C(x)= 3x 3 +x 2 +x+2 Final Permutation (FP)
Details of One Round in
DES
DES Analysis
Weakness of DES

Double DES
Meet-in-the Middle Attack in
2DES

Triple DES with Three


Keys

Triple DES with Two


Keys

AES (Advanced
Encryption Standard)
One time Initialization
Key Expansion
Round

Diffie- Hellman Key


Agreement
Problems in Diffie- Hellman
Algorithm/
Man-in-the-middle Attack

6.32
DES, AES &
R4. Add Sub key Diffie-Hellman Key
Distribution
Chittaranjan Pradhan
R4. Add Sub key

• XOR each byte of the round key with its corresponding DES
DES Overview
byte in the state array Initial Permutation (IP) &
Final Permutation (FP)
Details of One Round in
DES
DES Analysis
Weakness of DES

Double DES
Meet-in-the Middle Attack in
2DES

Triple DES with Three


Keys

Triple DES with Two


Keys

AES (Advanced
Encryption Standard)
One time Initialization
Key Expansion
Round

Diffie- Hellman Key


Agreement
Problems in Diffie- Hellman
Algorithm/
Man-in-the-middle Attack

6.33
DES, AES &
Diffie- Hellman Key Agreement Diffie-Hellman Key
Distribution
Chittaranjan Pradhan

Diffie- Hellman Key Agreement


DES

• Devised by Whitefield Diffie and Martin Hellman in 1976 DES Overview


Initial Permutation (IP) &
Final Permutation (FP)
for the solution to the key exchange problem Details of One Round in
DES
• Two parties create a symmetric session key without the DES Analysis
Weakness of DES
need of a KDC Double DES
• Two parties choose two large prime numbers n and g, Meet-in-the Middle Attack in
2DES

which need not be kept secret Triple DES with Three


Keys
• Alice chooses a large random number x such that Triple DES with Two

0≤x≤n-1 and calculates A = g x mod n Keys

AES (Advanced
• Bob chooses another large random number y such that Encryption Standard)
One time Initialization

0≤y≤n-1 and calculates B = g y mod n Key Expansion


Round

• Alice sends A to Bob. Similarly, Bob sends B to Alice Diffie- Hellman Key
Agreement
• Alice calculates key K= B x mod n Problems in Diffie- Hellman
Algorithm/

• Bob calculates key K= Ay mod n Man-in-the-middle Attack

6.34
DES, AES &
Diffie- Hellman Key Agreement... Diffie-Hellman Key
Distribution
Chittaranjan Pradhan

DES
DES Overview
Initial Permutation (IP) &
Final Permutation (FP)
Details of One Round in
DES
DES Analysis
Weakness of DES

Double DES
Meet-in-the Middle Attack in
2DES

Triple DES with Three


Keys

Triple DES with Two


Keys

AES (Advanced
Encryption Standard)
One time Initialization
Key Expansion
Round

Diffie- Hellman Key


Agreement
Problems in Diffie- Hellman
Ex: n=23, g=7, x=3, y=6 Algorithm/
Man-in-the-middle Attack

6.35
DES, AES &
Problems in Diffie- Hellman Algorithm/ Man-in-the-middle Diffie-Hellman Key
Distribution
Attack Chittaranjan Pradhan

Problems in Diffie- Hellman Algorithm/ Man-in-the-middle Attack


DES
DES Overview
• Eve can fool Alice and Bob by creating 2 keys: one Initial Permutation (IP) &
Final Permutation (FP)

between himself and Alice & another between himself and Details of One Round in
DES

Bob DES Analysis


Weakness of DES

• n and g are public Double DES


Meet-in-the Middle Attack in
• Alice chooses x, calculates A = g x mod n and sends A to 2DES

Triple DES with Three


Bob Keys

• Eve intercepts A. He chooses z, calculates C = g z mod n Triple DES with Two


Keys
and sends C to both Alice and Bob AES (Advanced
Encryption Standard)
• Bob chooses y, calculates B = g y mod n and sends B to One time Initialization
Key Expansion
Alice. But, B is intercepted by the Eve Round

• Alice and Eve calculates K1=g xz mod n, which becomes a Diffie- Hellman Key
Agreement
shared key between Alice and Eve Problems in Diffie- Hellman
Algorithm/
Man-in-the-middle Attack
• Eve and Bob calculates K2=g zy mod n, which becomes a
shared key between Eve and Bob

6.36

You might also like