21-NetworkSecurity

Deduce plaintext or key try every possible key until

Info icon This preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: sible key until plaintext is recovered rapidly becomes infeasible as key size increases 56-bit key is not secure brute force Block Ciphers Block most common symmetric algorithms process plain text in fixed block sizes process producing block of cipher text of equal size producing most important current block ciphers: Data Encryption Standard (DES) Data (DES) Advanced Encryption Standard Data Encryption Standard Data US standard 64 bit plain text blocks 56 bit key broken in 1998 by Electronic Frontier broken Foundation Foundation special purpose US$250,000 machine with detailed published description less than three days DES now worthless Triple DEA Triple ANSI X9.17 (1985) incorporated in DEA standard 1999 uses 2 or 3 keys uses 3 executions of DEA algorithm effective key length effective slow block size (64 bit) now too small 112 or 168 bit 168 Advanced Encryption Standard Standard NIST issued call for proposals for an Advanced NIST Encryption Standard (AES) in 1997 Encryption security strength equal to or better than 3DES significantly improved efficiency symmetric block cipher with block length 128 bits block key lengths 128, 192, and 256 bits evaluation include security, computational efficiency, evaluation memory requirements, hardware and software suitability, and flexibility suitability, AES issued as FIPS 197 in 2001 issued AES Description AES assume key length 128 bits input a 128-bit block (square matrix of bytes) copied into state array, modified at each stage after final stage, state copied to output expanded into array of 44 32-bit key schedule words 1st 4 bytes of 128-bit input occupy 1st column 128-bit 1st 4 bytes of expanded key occupy 1st column occupy 128-bit key (square matrix of bytes) byte ordering by column AES Encryption and Decryption Decryption AES Encryption Round AES Location of Encryption Devices Devices Link Encryption Link each communication link equipped at both ends all tr...
View Full Document

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern