Professional Documents
Culture Documents
Crypto 6
Crypto 6
Diffie-Hellman Key
Distribution
Chittaranjan Pradhan
Cryptography 6
DES
Double DES
Meet-in-the Middle Attack in
2DES
AES (Advanced
Encryption Standard)
One time Initialization
Key Expansion
Round
DES DES
DES Overview
• The Data Encryption Standard (DES) is a symmetric-key Initial Permutation (IP) &
Final Permutation (FP)
Details of One Round in
block cipher published by the National Institute of DES
DES Analysis
Standards and Technology (NIST) in 1975 Weakness of DES
AES (Advanced
Encryption Standard)
One time Initialization
Key Expansion
Round
6.2
DES, AES &
DES Overview Diffie-Hellman Key
Distribution
Chittaranjan Pradhan
DES Overview
The encryption process is made of two permutations (P-boxes) DES
DES Overview
called initial and final permutations, and sixteen Feistel rounds Initial Permutation (IP) &
Final Permutation (FP)
Details of One Round in
DES
DES Analysis
Weakness of DES
Double DES
Meet-in-the Middle Attack in
2DES
AES (Advanced
Encryption Standard)
One time Initialization
Key Expansion
Round
6.3
DES, AES &
DES Overview... Diffie-Hellman Key
Distribution
Chittaranjan Pradhan
DES
DES Overview
DES Overview... Initial Permutation (IP) &
Final Permutation (FP)
Details of One Round in
• Original key consists of 64bits DES
DES Analysis
• 56-bit key can be generated by discarding every 8th bit of Weakness of DES
Double DES
the key Meet-in-the Middle Attack in
2DES
AES (Advanced
Encryption Standard)
One time Initialization
Key Expansion
Round
6.4
DES, AES &
Initial Permutation (IP) & Final Permutation (FP) Diffie-Hellman Key
Distribution
Initial Permutation (IP) Chittaranjan Pradhan
Double DES
Meet-in-the Middle Attack in
2DES
AES (Advanced
Encryption Standard)
Final Permutation (FP) One time Initialization
Key Expansion
Round
6.5
DES, AES &
Details of One Round in DES Diffie-Hellman Key
Distribution
Chittaranjan Pradhan
DES
Details of One Round in DES DES Overview
Initial Permutation (IP) &
DES uses 16 rounds. Each round of DES is a Feistel cipher Final Permutation (FP)
Details of One Round in
DES
DES Analysis
Weakness of DES
Double DES
Meet-in-the Middle Attack in
2DES
AES (Advanced
Encryption Standard)
One time Initialization
Key Expansion
Round
6.6
DES, AES &
a. Key Transformation Diffie-Hellman Key
Distribution
a. Key Transformation Chittaranjan Pradhan
• From the 56- bit key, a 48- bit sub key is generated during DES
each round DES Overview
Initial Permutation (IP) &
• 56- bit key is divided into 2 halves, each of 28- bits. These Final Permutation (FP)
Details of One Round in
DES
halves are circularly shifted left by 1 or 2 positions, DES Analysis
Double DES
Meet-in-the Middle Attack in
2DES
AES (Advanced
Encryption Standard)
6.7
DES, AES &
b. Expansion Permutation Diffie-Hellman Key
Distribution
Chittaranjan Pradhan
DES
b. Expansion Permutation DES Overview
Initial Permutation (IP) &
Final Permutation (FP)
• After Initial Permutation, we have 32- bit LPT & 32- bit RPT Details of One Round in
DES
AES (Advanced
Encryption Standard)
One time Initialization
Key Expansion
Round
6.8
DES, AES &
b. Expansion Permutation... Diffie-Hellman Key
Distribution
Chittaranjan Pradhan
DES
DES Overview
Initial Permutation (IP) &
Final Permutation (FP)
Details of One Round in
DES
DES Analysis
Weakness of DES
Double DES
Meet-in-the Middle Attack in
2DES
AES (Advanced
Encryption Standard)
One time Initialization
Key Expansion
Round
6.9
DES, AES &
c. S- Box Substitution Diffie-Hellman Key
Distribution
Chittaranjan Pradhan
c. S- Box Substitution
DES
Double DES
Meet-in-the Middle Attack in
2DES
AES (Advanced
Encryption Standard)
One time Initialization
Key Expansion
Round
6.10
DES, AES &
c. S- Box Substitution... Diffie-Hellman Key
Distribution
Chittaranjan Pradhan
DES
DES Overview
Initial Permutation (IP) &
Final Permutation (FP)
Details of One Round in
DES
DES Analysis
Weakness of DES
Double DES
Meet-in-the Middle Attack in
2DES
AES (Advanced
Encryption Standard)
One time Initialization
Key Expansion
Round
6.11
DES, AES &
c. S- Box Substitution... Diffie-Hellman Key
Distribution
Chittaranjan Pradhan
DES
DES Overview
Initial Permutation (IP) &
Final Permutation (FP)
Details of One Round in
DES
DES Analysis
Weakness of DES
Double DES
Meet-in-the Middle Attack in
2DES
AES (Advanced
Encryption Standard)
One time Initialization
Key Expansion
Round
6.12
DES, AES &
c. S- Box Substitution... Diffie-Hellman Key
Distribution
Chittaranjan Pradhan
DES
DES Overview
Initial Permutation (IP) &
Final Permutation (FP)
Details of One Round in
DES
DES Analysis
Weakness of DES
Double DES
Meet-in-the Middle Attack in
2DES
AES (Advanced
Encryption Standard)
One time Initialization
Key Expansion
Round
6.13
DES, AES &
d. P- Box Permutation Diffie-Hellman Key
Distribution
Chittaranjan Pradhan
DES
DES Overview
Initial Permutation (IP) &
Final Permutation (FP)
Details of One Round in
DES
d. P- Box Permutation DES Analysis
Weakness of DES
The last operation in DES round is a permutation with a 32-bit Double DES
input and a 32-bit output Meet-in-the Middle Attack in
2DES
AES (Advanced
Encryption Standard)
One time Initialization
Key Expansion
Round
6.14
DES, AES &
e. XOR & Swap Diffie-Hellman Key
Distribution
Chittaranjan Pradhan
DES
DES Overview
Initial Permutation (IP) &
Final Permutation (FP)
Details of One Round in
DES
DES Analysis
Weakness of DES
Double DES
Meet-in-the Middle Attack in
2DES
AES (Advanced
Encryption Standard)
One time Initialization
Key Expansion
Round
6.15
DES, AES &
DES Analysis Diffie-Hellman Key
Distribution
Chittaranjan Pradhan
DES
DES Overview
Initial Permutation (IP) &
DES Analysis Final Permutation (FP)
Details of One Round in
DES
Avalance Effect: a small change in the PT (or key) should DES Analysis
Weakness of DES
create a significant change in CT. DES has been proved to be Double DES
strong w.r.t. this property Meet-in-the Middle Attack in
2DES
many bits on PT. The diffusion and confusion produced by AES (Advanced
Encryption Standard)
P-boxes and S-boxes in DES, show a very strong One time Initialization
6.16
DES, AES &
Weakness of DES Diffie-Hellman Key
Distribution
Chittaranjan Pradhan
DES
Weakness of DES DES Overview
Initial Permutation (IP) &
Final Permutation (FP)
• Key size is 56 bit Details of One Round in
DES
DES Analysis
Weakness of DES
• Brute force attack needs to check 2 keys, i.e. a computer
56
Double DES
performing one DES encryption per microsecond would Meet-in-the Middle Attack in
2DES
require more than 1000 years to break DES Triple DES with Three
Keys
AES (Advanced
find the key in 20 hours Encryption Standard)
One time Initialization
Key Expansion
• In 1998, a special computer was built, which found the key Round
6.17
DES, AES &
Double DES Diffie-Hellman Key
Distribution
Chittaranjan Pradhan
Double DES
DES
DES Overview
• Does twice what DES normally does only once Initial Permutation (IP) &
Final Permutation (FP)
Details of One Round in
DES
Double DES
Meet-in-the Middle Attack in
2DES
AES (Advanced
Encryption Standard)
One time Initialization
Key Expansion
Round
6.18
DES, AES &
Meet-in-the Middle Attack in 2DES Diffie-Hellman Key
Distribution
Meet-in-the Middle Attack in 2DES Chittaranjan Pradhan
AES (Advanced
Encryption Standard)
One time Initialization
Key Expansion
Round
6.19
DES, AES &
Triple DES with Three Keys Diffie-Hellman Key
Distribution
Chittaranjan Pradhan
• Does thrice what DES normally does only once DES Overview
Initial Permutation (IP) &
Final Permutation (FP)
Details of One Round in
DES
• Uses 3 keys K1, K2 & K3 DES Analysis
Weakness of DES
Double DES
Meet-in-the Middle Attack in
2DES
AES (Advanced
Encryption Standard)
One time Initialization
Key Expansion
Round
6.20
DES, AES &
Triple DES with Three Keys... Diffie-Hellman Key
Distribution
Chittaranjan Pradhan
DES
Triple DES with Three Keys... DES Overview
Initial Permutation (IP) &
Double DES
Meet-in-the Middle Attack in
2DES
AES (Advanced
Encryption Standard)
One time Initialization
Key Expansion
Round
6.21
DES, AES &
Triple DES with Two Keys Diffie-Hellman Key
Distribution
Chittaranjan Pradhan
Double DES
Meet-in-the Middle Attack in
2DES
AES (Advanced
Encryption Standard)
One time Initialization
Key Expansion
Round
6.22
DES, AES &
AES (Advanced Encryption Standard) Diffie-Hellman Key
Distribution
Chittaranjan Pradhan
DES
AES (Advanced Encryption Standard) DES Overview
Initial Permutation (IP) &
Final Permutation (FP)
• Developed by Rijndael (Rijmen & Daemen) in Nov 2001 Details of One Round in
DES
• Implementation 2DES
6.23
DES, AES &
One time Initialization Diffie-Hellman Key
Distribution
Chittaranjan Pradhan
DES
One time Initialization DES Overview
Initial Permutation (IP) &
AES (Advanced
Encryption Standard)
One time Initialization
Key Expansion
Round
6.24
DES, AES &
One time Initialization... Diffie-Hellman Key
Distribution
Chittaranjan Pradhan
DES
DES Overview
Initial Permutation (IP) &
Final Permutation (FP)
Details of One Round in
DES
DES Analysis
Weakness of DES
Double DES
Meet-in-the Middle Attack in
2DES
AES (Advanced
Encryption Standard)
One time Initialization
Key Expansion
Round
6.25
DES, AES &
Key Expansion Diffie-Hellman Key
Distribution
Chittaranjan Pradhan
Key Expansion
• The first array (4-words) is initialized by the original key. DES Analysis
Weakness of DES
The other 10 arrays (40-words) are used in the 10 rounds, Double DES
one array per round Meet-in-the Middle Attack in
2DES
AES (Advanced
words at a time Encryption Standard)
One time Initialization
• Each added word w[i] depends on the immediately Key Expansion
Round
preceding word, w[i-1], and the word four positions back,
Diffie- Hellman Key
w[i-4] Agreement
Problems in Diffie- Hellman
• In 3 out of 4 cases, a simple XOR is used. For a word Algorithm/
Man-in-the-middle Attack
• One-byte circular left shift happens on a word; i.e. an input DES Overview
Initial Permutation (IP) &
Final Permutation (FP)
word [B0, B1, B2, B3] is transformed into [B1, B2, B3, B0] Details of One Round in
DES
• Byte substitution on each byte of its input word using DES Analysis
Weakness of DES
S-Box Double DES
• The result of the above 2 steps is XORed with a round Meet-in-the Middle Attack in
2DES
6.27
DES, AES &
Key Expansion... Diffie-Hellman Key
Distribution
Chittaranjan Pradhan
DES
DES Overview
Initial Permutation (IP) &
Final Permutation (FP)
Details of One Round in
DES
Double DES
XOR the state with the key block Meet-in-the Middle Attack in
2DES
AES (Advanced
Encryption Standard)
One time Initialization
Key Expansion
Round
6.28
DES, AES &
Round Diffie-Hellman Key
Distribution
Chittaranjan Pradhan
DES
DES Overview
Initial Permutation (IP) &
Final Permutation (FP)
Details of One Round in
DES
DES Analysis
Weakness of DES
Double DES
Meet-in-the Middle Attack in
2DES
AES (Advanced
Encryption Standard)
One time Initialization
Key Expansion
Round
6.29
DES, AES &
R1. Byte Substitution Diffie-Hellman Key
Distribution
Chittaranjan Pradhan
value from the S-box. Only one S- box is used in AES Final Permutation (FP)
Details of One Round in
DES
DES Analysis
Weakness of DES
Double DES
Meet-in-the Middle Attack in
2DES
AES (Advanced
Encryption Standard)
One time Initialization
Key Expansion
Round
6.30
DES, AES &
R2. Shift Row Diffie-Hellman Key
Distribution
Chittaranjan Pradhan
R2. Shift Row
• Each row of the 4 rows of the state array are rotated to the DES
DES Overview
left. Row 0 by 0B, row 1 by 1B, row 2 by 2B and row 3 by Initial Permutation (IP) &
Final Permutation (FP)
3B Details of One Round in
DES
DES Analysis
Weakness of DES
Double DES
Meet-in-the Middle Attack in
2DES
AES (Advanced
Encryption Standard)
One time Initialization
Key Expansion
Round
6.31
DES, AES &
R3. Mix- Column Diffie-Hellman Key
Distribution
Chittaranjan Pradhan
Double DES
Meet-in-the Middle Attack in
2DES
AES (Advanced
Encryption Standard)
One time Initialization
Key Expansion
Round
6.32
DES, AES &
R4. Add Sub key Diffie-Hellman Key
Distribution
Chittaranjan Pradhan
R4. Add Sub key
• XOR each byte of the round key with its corresponding DES
DES Overview
byte in the state array Initial Permutation (IP) &
Final Permutation (FP)
Details of One Round in
DES
DES Analysis
Weakness of DES
Double DES
Meet-in-the Middle Attack in
2DES
AES (Advanced
Encryption Standard)
One time Initialization
Key Expansion
Round
6.33
DES, AES &
Diffie- Hellman Key Agreement Diffie-Hellman Key
Distribution
Chittaranjan Pradhan
AES (Advanced
• Bob chooses another large random number y such that Encryption Standard)
One time Initialization
• Alice sends A to Bob. Similarly, Bob sends B to Alice Diffie- Hellman Key
Agreement
• Alice calculates key K= B x mod n Problems in Diffie- Hellman
Algorithm/
6.34
DES, AES &
Diffie- Hellman Key Agreement... Diffie-Hellman Key
Distribution
Chittaranjan Pradhan
DES
DES Overview
Initial Permutation (IP) &
Final Permutation (FP)
Details of One Round in
DES
DES Analysis
Weakness of DES
Double DES
Meet-in-the Middle Attack in
2DES
AES (Advanced
Encryption Standard)
One time Initialization
Key Expansion
Round
6.35
DES, AES &
Problems in Diffie- Hellman Algorithm/ Man-in-the-middle Diffie-Hellman Key
Distribution
Attack Chittaranjan Pradhan
between himself and Alice & another between himself and Details of One Round in
DES
• Alice and Eve calculates K1=g xz mod n, which becomes a Diffie- Hellman Key
Agreement
shared key between Alice and Eve Problems in Diffie- Hellman
Algorithm/
Man-in-the-middle Attack
• Eve and Bob calculates K2=g zy mod n, which becomes a
shared key between Eve and Bob
6.36