SlideShare a Scribd company logo
Chapter 2 Conventional Encryption Message Confidentiality Henric Johnson Blekinge Institute of Technology, Sweden http://www.its.bth.se/staff/hjo/ [email_address]
Outline Conventional Encryption  Principles Conventional Encryption  Algorithms Cipher Block Modes of Operation Location of Encryption Devices Key Di s tribution
Conventional Encryption  Principles An encryption scheme has five ingredients: Plaintext Encryption  algorithm Secret Key Ciphertext Decryption algorithm Security depends on the secrecy of the key, not the secrecy of the algorithm
Conventional Encryption  Principles
Cryptography Classified along three independent dimensions: The type of operations used for transforming plaintext to ciphertext The number of keys used symmetric (single key) asymmetric (two-keys, or public-key encryption) The way in which the plaintext is processed
Average time required for exhaustive  key search  2.15 milliseconds 2 32  = 4.3 x 10 9 32 5.9  x  10 30   years 2 168  = 3.7 x 10 50 168 5.4 x 10 18   years 2 128  = 3.4 x 10 38 128 10 hours 2 56  = 7.2 x 10 16 56 Time required at 10 6  Decryption/ µs Number of Alternative Keys Key Size (bits)
Feistel Cipher Structure Virtually all conventional block encryption algorithms, including DES have a structure first described by Horst Feistel of IBM in 1973 The realisation of a Fesitel Network depends on the choice of the following parameters and desi gn  features (see next slide) :
Feistel Cipher Structure Block size:  larger block sizes mean greater security Key Size:  larger key size means  greater security Number of rounds:   multiple rounds offer increasing security Subkey generation algorithm:  greater complexity will lead to greater difficulty of cryptanalysis. Fast software encryption/decryption:  the speed of execution of the algorithm becomes a concern
 
Conventional Encryption Algorithms Data Encryption Standard (DES) The most widely used encryption scheme The algorithm is reffered to the Data Encryption Algorithm (DEA) DES is a block cipher The plaintext is processed in 64-bit blocks The key is 56-bits in length
 
 
DES The overall processing at each iteration: L i   = R i-1 R i  = L i-1   F(R i-1 , K i ) Concerns about: The algorithm and the key length (56-bits)
Time to break a code (10 6  decryptions/µs)
Triple DEA Use three keys and three executions of the DES algorithm (encrypt-decrypt-encrypt) C = ciphertext P = Plaintext EK[X] = encryption of X using key K DK[Y] = decryption of Y using key K Effective key length of 168 bits C = E K3 [D K2 [E K1 [P]]]
Triple DEA
Other Symmetric Block Ciphers International Data Encryption Algorithm (IDEA) 128-bit key Used in PGP Blowfish Easy to implement High execution speed  Run in less than 5K of memory
Other Symmetric Block Ciphers RC5 Suitable for hardware and software Fast, simple Adaptable to processors of different word lengths Variable number of rounds Variable-length key Low memory requirement High security Data-dependent rotations Cast-128 Key size from 40 to 128 bits The round function differs from round to round
Cipher Block Modes of Operation Cipher Block Chaining Mode (CBC) The input to the encryption algorithm is the XOR of the current plaintext block and the preceding ciphertext block. Repeating pattern of 64-bits are not exposed
 
Location of Encryption Device Link encryption: A lot of encryption devices High level of security Decrypt each packet at every switch  End-to-end encryption The source encrypt and the receiver decrypts Payload encrypted Header in the clear High Security:  Both link and end-to-end encryption are needed (see Figure 2.9)
 
Key Distribution A key could be selected by A and physically delivered to B. A third party could select the key and physically deliver it to A and B. If A and B have previously used a key, one party could transmit the new key to the other, encrypted using the old key. If A and B each have an encrypted connection to a third party C, C could deliver a key on the encrypted links to A and B.
Key Distribution (See Figure 2.10) Session key: Data encrypted with a one-time session key.At the conclusion of the session the key is destroyed Permanent key: Used between entities for the purpose of distributing session keys
 
Recommended Reading Stallings, W.  Cryptography and Network Security: Principles and Practice, 2 nd  edition . Prentice Hall, 1999 Scneier, B.  Applied Cryptography , New York: Wiley, 1996 Mel, H.X. Baker, D.  Cryptography Decrypted . Addison Wesley, 2001

More Related Content

PPT
Diffiehellman
PPTX
Email security
PPTX
Symmetric encryption and message confidentiality
 
PPTX
Cryptography - Block cipher & stream cipher
PPTX
Introduction to Cryptography
PPT
Ch01
 
PPTX
Public Key Cryptosystem
PPTX
One time pad Encryption:
Diffiehellman
Email security
Symmetric encryption and message confidentiality
 
Cryptography - Block cipher & stream cipher
Introduction to Cryptography
Ch01
 
Public Key Cryptosystem
One time pad Encryption:

What's hot (20)

PPTX
Idea(international data encryption algorithm)
PDF
Web Security
PPTX
RSA algorithm
PPTX
Data Encryption Standard (DES)
PDF
CNS - Unit - 2 - Stream Ciphers and Block Ciphers
PPTX
Cryptography and Information Security
PPTX
Cryptography.ppt
PPT
Secure Socket Layer
PDF
Email security presentation
ODP
Email security
PPTX
Different types of Symmetric key Cryptography
PPT
DES (Data Encryption Standard) pressentation
PPTX
Block cipher modes of operation
PPTX
Cryptography
PDF
Elliptic curve cryptography
PPT
Network Security and Cryptography
PDF
AES-Advanced Encryption Standard
PPTX
Data encryption
PPT
Cryptography and Network Security William Stallings Lawrie Brown
PPT
Cryptography Fundamentals
Idea(international data encryption algorithm)
Web Security
RSA algorithm
Data Encryption Standard (DES)
CNS - Unit - 2 - Stream Ciphers and Block Ciphers
Cryptography and Information Security
Cryptography.ppt
Secure Socket Layer
Email security presentation
Email security
Different types of Symmetric key Cryptography
DES (Data Encryption Standard) pressentation
Block cipher modes of operation
Cryptography
Elliptic curve cryptography
Network Security and Cryptography
AES-Advanced Encryption Standard
Data encryption
Cryptography and Network Security William Stallings Lawrie Brown
Cryptography Fundamentals
Ad

Viewers also liked (20)

PDF
latest IEEE 2015 wireless security
PPTX
Recording formats and_editing_softwares
PPT
Information Security Lesson 5 - Network Infrastructure - Eric Vanderburg
PPT
Network security & information security maintainence modified
PPTX
international data encryption Algoritm (IDEA) and RC-4
PDF
Block Cipher Modes of Operation And Cmac For Authentication
PPT
Unit V network management and security
KEY
Cipher block modes
PPTX
Introduction of cryptography and network security
PPTX
Byte Rotation Algorithm
PPT
euclids division lemma
PPTX
Idea (international data encryption algorithm)
PPT
C08 crypto-digital signature13
PPTX
Hash function
PPTX
Hash function
PPTX
Cryptography
PPT
Information and Network Security
PPT
Digital signature schemes
PPTX
Hash Techniques in Cryptography
latest IEEE 2015 wireless security
Recording formats and_editing_softwares
Information Security Lesson 5 - Network Infrastructure - Eric Vanderburg
Network security & information security maintainence modified
international data encryption Algoritm (IDEA) and RC-4
Block Cipher Modes of Operation And Cmac For Authentication
Unit V network management and security
Cipher block modes
Introduction of cryptography and network security
Byte Rotation Algorithm
euclids division lemma
Idea (international data encryption algorithm)
C08 crypto-digital signature13
Hash function
Hash function
Cryptography
Information and Network Security
Digital signature schemes
Hash Techniques in Cryptography
Ad

Similar to Conventional Encryption NS2 (20)

PPT
DATA ENCRTPTION STANDARDS IN CRYPTOGRAPY
PPT
Chapter 2
PPT
Chapter 2
PPT
Conventional Encryption messagge Confendiatilty
PDF
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
PPT
Encryption
PPTX
CH02-CompSec4e.pptx
PPTX
Ch02 NetSec5e Network Security Essential Chapter 2.pptx
PPT
Day5
PPTX
Cryptography
PPTX
Cryptography
PDF
Overview on Symmetric Key Encryption Algorithms
PDF
CNIT 125 Ch 4. Security Engineering (Part 2)
PDF
A Review on Various Most Common Symmetric Encryptions Algorithms
PDF
CISSP Prep: Ch 4. Security Engineering (Part 2)
PDF
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
PPT
crypto22222222222222222222222222222222222222222222.ppt
PPT
cryptography and encryption and decryption
PPTX
NS UNIT 1 Advanced Encryption Standard& RSA
DATA ENCRTPTION STANDARDS IN CRYPTOGRAPY
Chapter 2
Chapter 2
Conventional Encryption messagge Confendiatilty
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
Encryption
CH02-CompSec4e.pptx
Ch02 NetSec5e Network Security Essential Chapter 2.pptx
Day5
Cryptography
Cryptography
Overview on Symmetric Key Encryption Algorithms
CNIT 125 Ch 4. Security Engineering (Part 2)
A Review on Various Most Common Symmetric Encryptions Algorithms
CISSP Prep: Ch 4. Security Engineering (Part 2)
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
crypto22222222222222222222222222222222222222222222.ppt
cryptography and encryption and decryption
NS UNIT 1 Advanced Encryption Standard& RSA

More from koolkampus (20)

PPT
Local Area Networks in Data Communication DC24
PPT
Bit Oriented Protocols in Data Communication DC23
PPT
Data Link Control in Data Communication DC20
PPT
Error Detection and Correction in Data Communication DC18
PPT
TDM in Data Communication DC16
PPT
Radio Communication Band(Data Communication) DC14
PPT
Connectors in Data Communication DC12
PPT
Transmission of Digital Data(Data Communication) DC11
PPT
Analog to Digital Encoding in Data Communication DC9
PPT
Signal with DC Component(Data Communication) DC7
PPT
Layer Examples in Data Communication CD4
PPT
OSI Model (Data Communication) DC3
PPT
Basic Concepts in Data Communication DC1
PPT
Token Passing in Data Communication DC25
PPT
Data Link Protocols in Data Communication DC22
PPT
Flow Control in Data Communication DC21
PPT
CRC in Data Communication DC19
PPT
Telephone Networn in Data Communication DC17
PPT
Multiplexing in Data Communication DC15
PPT
Transmission Media in Data Communication DC13
Local Area Networks in Data Communication DC24
Bit Oriented Protocols in Data Communication DC23
Data Link Control in Data Communication DC20
Error Detection and Correction in Data Communication DC18
TDM in Data Communication DC16
Radio Communication Band(Data Communication) DC14
Connectors in Data Communication DC12
Transmission of Digital Data(Data Communication) DC11
Analog to Digital Encoding in Data Communication DC9
Signal with DC Component(Data Communication) DC7
Layer Examples in Data Communication CD4
OSI Model (Data Communication) DC3
Basic Concepts in Data Communication DC1
Token Passing in Data Communication DC25
Data Link Protocols in Data Communication DC22
Flow Control in Data Communication DC21
CRC in Data Communication DC19
Telephone Networn in Data Communication DC17
Multiplexing in Data Communication DC15
Transmission Media in Data Communication DC13

Recently uploaded (20)

PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
August Patch Tuesday
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
DP Operators-handbook-extract for the Mautical Institute
PPTX
Modernising the Digital Integration Hub
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
Architecture types and enterprise applications.pdf
PDF
STKI Israel Market Study 2025 version august
PPTX
The various Industrial Revolutions .pptx
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
Hindi spoken digit analysis for native and non-native speakers
1 - Historical Antecedents, Social Consideration.pdf
gpt5_lecture_notes_comprehensive_20250812015547.pdf
A comparative study of natural language inference in Swahili using monolingua...
A contest of sentiment analysis: k-nearest neighbor versus neural network
August Patch Tuesday
NewMind AI Weekly Chronicles – August ’25 Week III
Module 1.ppt Iot fundamentals and Architecture
WOOl fibre morphology and structure.pdf for textiles
Zenith AI: Advanced Artificial Intelligence
DP Operators-handbook-extract for the Mautical Institute
Modernising the Digital Integration Hub
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Architecture types and enterprise applications.pdf
STKI Israel Market Study 2025 version august
The various Industrial Revolutions .pptx
Assigned Numbers - 2025 - Bluetooth® Document
Univ-Connecticut-ChatGPT-Presentaion.pdf

Conventional Encryption NS2

  • 1. Chapter 2 Conventional Encryption Message Confidentiality Henric Johnson Blekinge Institute of Technology, Sweden http://www.its.bth.se/staff/hjo/ [email_address]
  • 2. Outline Conventional Encryption Principles Conventional Encryption Algorithms Cipher Block Modes of Operation Location of Encryption Devices Key Di s tribution
  • 3. Conventional Encryption Principles An encryption scheme has five ingredients: Plaintext Encryption algorithm Secret Key Ciphertext Decryption algorithm Security depends on the secrecy of the key, not the secrecy of the algorithm
  • 5. Cryptography Classified along three independent dimensions: The type of operations used for transforming plaintext to ciphertext The number of keys used symmetric (single key) asymmetric (two-keys, or public-key encryption) The way in which the plaintext is processed
  • 6. Average time required for exhaustive key search 2.15 milliseconds 2 32 = 4.3 x 10 9 32 5.9 x 10 30 years 2 168 = 3.7 x 10 50 168 5.4 x 10 18 years 2 128 = 3.4 x 10 38 128 10 hours 2 56 = 7.2 x 10 16 56 Time required at 10 6 Decryption/ µs Number of Alternative Keys Key Size (bits)
  • 7. Feistel Cipher Structure Virtually all conventional block encryption algorithms, including DES have a structure first described by Horst Feistel of IBM in 1973 The realisation of a Fesitel Network depends on the choice of the following parameters and desi gn features (see next slide) :
  • 8. Feistel Cipher Structure Block size: larger block sizes mean greater security Key Size: larger key size means greater security Number of rounds: multiple rounds offer increasing security Subkey generation algorithm: greater complexity will lead to greater difficulty of cryptanalysis. Fast software encryption/decryption: the speed of execution of the algorithm becomes a concern
  • 9.  
  • 10. Conventional Encryption Algorithms Data Encryption Standard (DES) The most widely used encryption scheme The algorithm is reffered to the Data Encryption Algorithm (DEA) DES is a block cipher The plaintext is processed in 64-bit blocks The key is 56-bits in length
  • 11.  
  • 12.  
  • 13. DES The overall processing at each iteration: L i = R i-1 R i = L i-1 F(R i-1 , K i ) Concerns about: The algorithm and the key length (56-bits)
  • 14. Time to break a code (10 6 decryptions/µs)
  • 15. Triple DEA Use three keys and three executions of the DES algorithm (encrypt-decrypt-encrypt) C = ciphertext P = Plaintext EK[X] = encryption of X using key K DK[Y] = decryption of Y using key K Effective key length of 168 bits C = E K3 [D K2 [E K1 [P]]]
  • 17. Other Symmetric Block Ciphers International Data Encryption Algorithm (IDEA) 128-bit key Used in PGP Blowfish Easy to implement High execution speed Run in less than 5K of memory
  • 18. Other Symmetric Block Ciphers RC5 Suitable for hardware and software Fast, simple Adaptable to processors of different word lengths Variable number of rounds Variable-length key Low memory requirement High security Data-dependent rotations Cast-128 Key size from 40 to 128 bits The round function differs from round to round
  • 19. Cipher Block Modes of Operation Cipher Block Chaining Mode (CBC) The input to the encryption algorithm is the XOR of the current plaintext block and the preceding ciphertext block. Repeating pattern of 64-bits are not exposed
  • 20.  
  • 21. Location of Encryption Device Link encryption: A lot of encryption devices High level of security Decrypt each packet at every switch End-to-end encryption The source encrypt and the receiver decrypts Payload encrypted Header in the clear High Security: Both link and end-to-end encryption are needed (see Figure 2.9)
  • 22.  
  • 23. Key Distribution A key could be selected by A and physically delivered to B. A third party could select the key and physically deliver it to A and B. If A and B have previously used a key, one party could transmit the new key to the other, encrypted using the old key. If A and B each have an encrypted connection to a third party C, C could deliver a key on the encrypted links to A and B.
  • 24. Key Distribution (See Figure 2.10) Session key: Data encrypted with a one-time session key.At the conclusion of the session the key is destroyed Permanent key: Used between entities for the purpose of distributing session keys
  • 25.  
  • 26. Recommended Reading Stallings, W. Cryptography and Network Security: Principles and Practice, 2 nd edition . Prentice Hall, 1999 Scneier, B. Applied Cryptography , New York: Wiley, 1996 Mel, H.X. Baker, D. Cryptography Decrypted . Addison Wesley, 2001