Professional Documents
Culture Documents
Slide 29
Slide 29
Security
Security Topics
Chapters
Chapter 29 Cryptography
Chapter 29
Cryptography
Cryptography
Symmetric-Key Cryptography
Asymmetric-key Cryptography
Symmetric-key cryptography
Traditional Ciphers
Substitution Cipher
Monoalphabetic Substitution
Polyalphabetic Substitution
Transpositional Cipher
Block Cipher
Monoalphabetic Substitution
11
Polyalphabetic Substitution
Transpositional cipher
Block cipher
14
Block cipher
P-box
Product block
17
Figure 29.14
Iteration block
In each block, the previous right 32 bits become the next left 32 bits
(swapping). The next right 32 bits, however, come from first applying
an operation (a function) on the previous right 32 bits and then
XORing the result with the left 32 bits.
18
To lengthen the key and at the same time keep the new
block compatible with that of the original DES.
The DES cipher uses the same concept as the Caesar
cipher, but the encryption/decryption algorithm is much
more complex due to the sixteen 48-bit keys derived from
a 56-bit key
Triple DES uses three DES blocks and two 56-bit keys.
19
Operation Modes
20
CBC mode
21
CFM
22
CSM
23
Public-key cryptography
Public-key cryptography
25
RSA Algorithm
27