Well established needs for secure communication


DES run in reverse to decrypt


Download 280 Kb.
bet11/12
Sana05.01.2022
Hajmi280 Kb.
#213462
1   ...   4   5   6   7   8   9   10   11   12
Bog'liq
7-cryptography

DES run in reverse to decrypt

  • DES run in reverse to decrypt
  • Cracking DES
    • 1997: 140 days
    • 1999: 14 hours
  • TripleDES uses DES 3 times in tandem
    • Output from 1 DES is input to next DES
  • Data Encryption Standard (DES) Basics
  • 64-bit input
  • L1
  • R1
  • F(L1, R1, K1)
  • L2
  • R2
  • L3
  • R3
  • L17
  • R17
  • 56-bit key
  • 48-bit k1
  • 48-bit k2
  • 48-bit k3
  • 48-bit k16
  • F(L2, R2, K2)
  • F(L16, R16, K16)
  • Algorithm
  • Type
  • Key Size
  • Features
  • DES
  • Block Cipher
  • 56 bits
  • Most Common, Not strong enough
  • TripleDES
  • Block Cipher
  • 168 bits
  • (112 effective)
  • Modification of DES, Adequate Security
  • Blowfish
  • Block Cipher
  • Variable
  • (Up to 448 bits)
  • AES
  • Block Cipher
  • Variable
  • (128, 192, or 256 bits)
  • Replacement for DES, Excellent Security
  • RC4
  • Stream Cipher
  • Variable
  • (40 or 128 bits)
  • Fast Stream Cipher, Used in most SSL implementations

Any exposure to the secret key compromises secrecy of ciphertext

  • Any exposure to the secret key compromises secrecy of ciphertext
  • A key needs to be delivered to the recipient of the coded message for it to be deciphered
    • Potential for eavesdropping attack during transmission of key
  • Symmetric Encryption Limitations

Uses a pair of keys for encryption

  • Uses a pair of keys for encryption
    • Public key for encryption
    • Private key for decryption
  • Messages encoded using public key can only be decoded by the private key
    • Secret transmission of key for decryption is not required
    • Every entity can generate a key pair and release its public key
  • Asymmetric Encryption Basics
  • Plain Text
  • Cipher
  • Public Key
  • Private Key
  • Cipher Text
  • Plain Text
  • Cipher

Two most popular algorithms are RSA & El Gamal

  • Two most popular algorithms are RSA & El Gamal
    • RSA
      • Developed by Ron Rivest, Adi Shamir, Len Adelman
      • Both public and private key are interchangable
      • Variable Key Size (512, 1024, or 2048 buts)
      • Most popular public key algorithm
    • El Gamal
      • Developed by Taher ElGamal
      • Variable key size (512 or 1024 bits)
      • Less common than RSA, used in protocols like PGP
  • Asymmetric Encryption Types

Download 280 Kb.

Do'stlaringiz bilan baham:
1   ...   4   5   6   7   8   9   10   11   12




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling