SlideShare a Scribd company logo
Bishop: Chapter 11 An Overview of Cipher Techniques  (in the context of networks)  (11.1-11.3)
Topics Problems with Design of Ciphers Stream and Block Ciphers A Brief Overview of Network Security     more in Chapter 26 Privacy-enhanced E-Mails (PEM) Advanced Topics: SSL, IPsec    next course ( Web Security )
Context-related Vulnerability Key point: How a crypto system is  used  will affect its strength. Sample Problems Pre-computing the possible messages Assumption: The plaintext corresponding to intercepted ciphertext is drawn from a relatively small set of possible plaintexts. The cryptanalyst can encipher the set of possible plaintexts and simply search that set for the intercepted ciphertext.
Context-related Vulnerability Sample Problems (cont.) Polluted  Blocks Parts of a ciphertext message may be deleted, replayed, or reordered. Unless different parts are  bound  together, their order may be changed by the attacker, without being detected by the receiver. Example: Reordered RSA data blocks ‘LIVE’ can be reordered to ‘EVIL’. Source of problem: Each block is independently enciphered, so integrity of each part does not guarantee the integrity of the whole. Solution? ‘binding’ of blocks + digital signature
Context-related Vulnerability Sample Problems (cont.) Statistical Regularities Such regularities may exist when each part of the ciphertext was generated from independent part of the plaintext. Example: DES in ECB mode Solution?
Stream vs Block Ciphers Block ciphers : Plaintexts are encoded into ciphertexts  block-by-block .  Each block is encrypted by the same key. See definition 11-1. Example: DES Stream ciphers : The plaintext characters are encoded by the sender  unit-by-unit , usually with different key for each unit. Each letter may be encrypted by different key. (See definition 11-2) Example: one-time pad, where a random, infinitely long key is used.  If the key stream repeats itself     periodic cipher Questions: Is  Vigen è re cipher  a block or stream cipher? How about  RSA ?
Stream Ciphers Approaches in simulating a random, infinitely long key Synchronous Stream Ciphers Generates bits (of the key) from a source other than the message itself. See definition 11-3:  LFSR  ( n-stage linear feedback shift register ) Example on p.278 Definition 11-4:  NLFSR  ( n-stage nonlinear feedback shift register ) Example on p.279 Purpose?  To eliminate  lineality c.f., LFSR vs NLFSR:  How the new bit is inserted into the register r.
Stream Ciphers Alternative approaches in eliminating  linearity : Output Feedback Mode (OFM) The register, r, is never shifted. It is repeatedly enciphered. Counter Method:  a variant of OFM
Stream Ciphers Self-Synchronous Stream Ciphers The key is obtained from the message itself. Example:  autokey  cipher (p.280) Problems?  The selection of the key. Statistical regularities in the plaintext show up in the key. An alternative: Use the ciphertext as the key stream Problems?  Weak cipher, because plaintext can be deducted from the ciphertext Another alternative: CFM (cipher feedback mode)  See Fig. 11-1, p.281
Block Ciphers A block of multiple bits are enciphered each time. Faster than stream cipher (?). Problem? Encipherment of the same plaintexts result in the same ciphertexts (because the same key is used for each block). Solution: Cipher block chaining (CBC) IV is needed for the first block encipherment
Block Ciphers Multiple Encryption e.g., c = E k’  (E k (m)) Suppose the length of k and k’ are both n. [Merkle/Hellman, 1981] The effective strenghth of the above encryption is 2 n+1 , not 2 2n . EDE  Triple encryption mode
Next A Brief Overview of Network Security  Privacy-enhanced E-Mails (PEM)

More Related Content

PPTX
Information and data security block cipher operation
PPTX
Cryptography - Block cipher & stream cipher
PDF
Block cipher modes of operations
PPTX
Modes of Operation
PPTX
Block cipher modes of operation
PDF
Chap06 block cipher operation
PDF
Block Cipher Modes of Operation And Cmac For Authentication
PDF
Comparative analysis on different DES model
Information and data security block cipher operation
Cryptography - Block cipher & stream cipher
Block cipher modes of operations
Modes of Operation
Block cipher modes of operation
Chap06 block cipher operation
Block Cipher Modes of Operation And Cmac For Authentication
Comparative analysis on different DES model

What's hot (20)

PPT
Block Cipher and its Design Principles
PDF
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
PDF
PPTX
Block Cipher and Operation Modes
PPTX
Information and data security block cipher and the data encryption standard (...
PPT
block ciphers
PPTX
CS8792 - Cryptography and Network Security
PPT
Block Ciphers Modes of Operation
PDF
Block Ciphers and the Data Encryption Standard
PPTX
Block Cipher
PPT
PPT
Conventional Encryption NS2
PPT
Chapter8 27 nov_2010
PPTX
Introduction to encryption
PPT
13528 l8
PPTX
Secure Encryption Technique (SET): A Private Key Cryptosystem
PDF
Authenticated Encryption Gcm Ccm
PPT
Stream ciphers presentation
PPT
Network Security Lec4
Block Cipher and its Design Principles
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Block Cipher and Operation Modes
Information and data security block cipher and the data encryption standard (...
block ciphers
CS8792 - Cryptography and Network Security
Block Ciphers Modes of Operation
Block Ciphers and the Data Encryption Standard
Block Cipher
Conventional Encryption NS2
Chapter8 27 nov_2010
Introduction to encryption
13528 l8
Secure Encryption Technique (SET): A Private Key Cryptosystem
Authenticated Encryption Gcm Ccm
Stream ciphers presentation
Network Security Lec4
Ad

Similar to Ciphers (20)

PDF
paper5.pdf
PDF
doc5.pdf
PDF
doc5.pdf
PDF
lecture4.pdf
PDF
sheet5.pdf
PDF
lecture4.pdf
PPT
Computer security
PPT
Computer security
PPT
Computer security
PPT
Computer security
PPT
Computer security
PPT
Computer security
PPT
Computer security
PDF
Unit 1_Transposition Techniques_Ciphers.pdf
PPT
PPTX
Ch02 NetSec5e Network Security Essential Chapter 2.pptx
PPTX
Encryption
PPTX
Network Security and Cryptography
PPTX
A study of cryptography for satellite applications
paper5.pdf
doc5.pdf
doc5.pdf
lecture4.pdf
sheet5.pdf
lecture4.pdf
Computer security
Computer security
Computer security
Computer security
Computer security
Computer security
Computer security
Unit 1_Transposition Techniques_Ciphers.pdf
Ch02 NetSec5e Network Security Essential Chapter 2.pptx
Encryption
Network Security and Cryptography
A study of cryptography for satellite applications
Ad

More from phanleson (20)

PDF
Learning spark ch01 - Introduction to Data Analysis with Spark
PPT
Firewall - Network Defense in Depth Firewalls
PPT
Mobile Security - Wireless hacking
PPT
Authentication in wireless - Security in Wireless Protocols
PPT
E-Commerce Security - Application attacks - Server Attacks
PPT
Hacking web applications
PPTX
HBase In Action - Chapter 04: HBase table design
PPT
HBase In Action - Chapter 10 - Operations
PPT
Hbase in action - Chapter 09: Deploying HBase
PPTX
Learning spark ch11 - Machine Learning with MLlib
PPTX
Learning spark ch10 - Spark Streaming
PPTX
Learning spark ch09 - Spark SQL
PPT
Learning spark ch07 - Running on a Cluster
PPTX
Learning spark ch06 - Advanced Spark Programming
PPTX
Learning spark ch05 - Loading and Saving Your Data
PPTX
Learning spark ch04 - Working with Key/Value Pairs
PPTX
Learning spark ch01 - Introduction to Data Analysis with Spark
PPT
Hướng Dẫn Đăng Ký LibertaGia - A guide and introduciton about Libertagia
PPT
Lecture 1 - Getting to know XML
PPTX
Lecture 4 - Adding XTHML for the Web
Learning spark ch01 - Introduction to Data Analysis with Spark
Firewall - Network Defense in Depth Firewalls
Mobile Security - Wireless hacking
Authentication in wireless - Security in Wireless Protocols
E-Commerce Security - Application attacks - Server Attacks
Hacking web applications
HBase In Action - Chapter 04: HBase table design
HBase In Action - Chapter 10 - Operations
Hbase in action - Chapter 09: Deploying HBase
Learning spark ch11 - Machine Learning with MLlib
Learning spark ch10 - Spark Streaming
Learning spark ch09 - Spark SQL
Learning spark ch07 - Running on a Cluster
Learning spark ch06 - Advanced Spark Programming
Learning spark ch05 - Loading and Saving Your Data
Learning spark ch04 - Working with Key/Value Pairs
Learning spark ch01 - Introduction to Data Analysis with Spark
Hướng Dẫn Đăng Ký LibertaGia - A guide and introduciton about Libertagia
Lecture 1 - Getting to know XML
Lecture 4 - Adding XTHML for the Web

Recently uploaded (20)

PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PPTX
1. Introduction to Computer Programming.pptx
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PPTX
Modernising the Digital Integration Hub
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
Hybrid model detection and classification of lung cancer
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Final SEM Unit 1 for mit wpu at pune .pptx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
DP Operators-handbook-extract for the Mautical Institute
Enhancing emotion recognition model for a student engagement use case through...
Getting started with AI Agents and Multi-Agent Systems
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
1. Introduction to Computer Programming.pptx
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Modernising the Digital Integration Hub
1 - Historical Antecedents, Social Consideration.pdf
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
WOOl fibre morphology and structure.pdf for textiles
Hybrid model detection and classification of lung cancer
A novel scalable deep ensemble learning framework for big data classification...
Developing a website for English-speaking practice to English as a foreign la...
A contest of sentiment analysis: k-nearest neighbor versus neural network
Assigned Numbers - 2025 - Bluetooth® Document
Module 1.ppt Iot fundamentals and Architecture
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf

Ciphers

  • 1. Bishop: Chapter 11 An Overview of Cipher Techniques (in the context of networks) (11.1-11.3)
  • 2. Topics Problems with Design of Ciphers Stream and Block Ciphers A Brief Overview of Network Security  more in Chapter 26 Privacy-enhanced E-Mails (PEM) Advanced Topics: SSL, IPsec  next course ( Web Security )
  • 3. Context-related Vulnerability Key point: How a crypto system is used will affect its strength. Sample Problems Pre-computing the possible messages Assumption: The plaintext corresponding to intercepted ciphertext is drawn from a relatively small set of possible plaintexts. The cryptanalyst can encipher the set of possible plaintexts and simply search that set for the intercepted ciphertext.
  • 4. Context-related Vulnerability Sample Problems (cont.) Polluted Blocks Parts of a ciphertext message may be deleted, replayed, or reordered. Unless different parts are bound together, their order may be changed by the attacker, without being detected by the receiver. Example: Reordered RSA data blocks ‘LIVE’ can be reordered to ‘EVIL’. Source of problem: Each block is independently enciphered, so integrity of each part does not guarantee the integrity of the whole. Solution? ‘binding’ of blocks + digital signature
  • 5. Context-related Vulnerability Sample Problems (cont.) Statistical Regularities Such regularities may exist when each part of the ciphertext was generated from independent part of the plaintext. Example: DES in ECB mode Solution?
  • 6. Stream vs Block Ciphers Block ciphers : Plaintexts are encoded into ciphertexts block-by-block . Each block is encrypted by the same key. See definition 11-1. Example: DES Stream ciphers : The plaintext characters are encoded by the sender unit-by-unit , usually with different key for each unit. Each letter may be encrypted by different key. (See definition 11-2) Example: one-time pad, where a random, infinitely long key is used. If the key stream repeats itself  periodic cipher Questions: Is Vigen è re cipher a block or stream cipher? How about RSA ?
  • 7. Stream Ciphers Approaches in simulating a random, infinitely long key Synchronous Stream Ciphers Generates bits (of the key) from a source other than the message itself. See definition 11-3: LFSR ( n-stage linear feedback shift register ) Example on p.278 Definition 11-4: NLFSR ( n-stage nonlinear feedback shift register ) Example on p.279 Purpose? To eliminate lineality c.f., LFSR vs NLFSR: How the new bit is inserted into the register r.
  • 8. Stream Ciphers Alternative approaches in eliminating linearity : Output Feedback Mode (OFM) The register, r, is never shifted. It is repeatedly enciphered. Counter Method: a variant of OFM
  • 9. Stream Ciphers Self-Synchronous Stream Ciphers The key is obtained from the message itself. Example: autokey cipher (p.280) Problems? The selection of the key. Statistical regularities in the plaintext show up in the key. An alternative: Use the ciphertext as the key stream Problems? Weak cipher, because plaintext can be deducted from the ciphertext Another alternative: CFM (cipher feedback mode) See Fig. 11-1, p.281
  • 10. Block Ciphers A block of multiple bits are enciphered each time. Faster than stream cipher (?). Problem? Encipherment of the same plaintexts result in the same ciphertexts (because the same key is used for each block). Solution: Cipher block chaining (CBC) IV is needed for the first block encipherment
  • 11. Block Ciphers Multiple Encryption e.g., c = E k’ (E k (m)) Suppose the length of k and k’ are both n. [Merkle/Hellman, 1981] The effective strenghth of the above encryption is 2 n+1 , not 2 2n . EDE Triple encryption mode
  • 12. Next A Brief Overview of Network Security Privacy-enhanced E-Mails (PEM)