DOC PREVIEW
WUSTL CSE 571S - Modes of Operation

This preview shows page 1-2-14-15-30-31 out of 31 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 31 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 31 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 31 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 31 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 31 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 31 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 31 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

6-1©2007 Raj JainCSE571SWashington University in St. LouisModes of Modes of OperationOperationRaj Jain Washington University in Saint LouisSaint Louis, MO [email protected]/Video recordings of this lecture are available at :http://www.cse.wustl.edu/~jain/cse567-06/6-2©2007 Raj JainCSE571SWashington University in St. LouisOverviewOverview1. Modes of Operation: ECB, CBC, OFB, CFB, CTR2. Privacy+Integrity3. DES Attacks4. 3DES and its designRef: Chapter 4 of textbook.6-3©2007 Raj JainCSE571SWashington University in St. LouisModes of OperationModes of Operation1. Electronic Code Book (ECB)2. Cipher Block Chaining (CBC)3. Cipher Feedback Mode (CFB)4. Output Feedback Mode (OFB)5. Counter Mode (CTR)6-4©2007 Raj JainCSE571SWashington University in St. Louis1. Electronic Code Book (ECB)1. Electronic Code Book (ECB)! Each block is independently encoded! Problem:" Identical Input ⇒ Identical Output" Can insert encoded blocks6-5©2007 Raj JainCSE571SWashington University in St. LouisCipher Block Chaining (CBC)Cipher Block Chaining (CBC)! Add a random number before encoding6-6©2007 Raj JainCSE571SWashington University in St. LouisCBC (Cont)CBC (Cont)! Use Cias random number for i+1! Need Initial Value (IV)! If no IV, then one can guess changed blocks! Example: Continue Holding, Start Bombing6-7©2007 Raj JainCSE571SWashington University in St. LouisCBC (Cont)CBC (Cont)! Attack 1: Change selected bits in encrypted message" Garbled text not detected by computers! Attack 2: Attacker knows plain text and cipher text. Can change plain text." 32-bit CRC may not detect. 64-bit CRC may be better.6-8©2007 Raj JainCSE571SWashington University in St. Louiskk--Bit Output Feedback Mode (OFB)Bit Output Feedback Mode (OFB)! IV is used to generate a stream of blocks! Stream is used a one-time pad and XOR'ed to plain text6-9©2007 Raj JainCSE571SWashington University in St. LouisOFB (Cont)OFB (Cont)! Advantages:" Stream can be generated in advance" 1-bit error in transmission affects only one bit of plain text" Message can be any size" All messages are immediately transmitted! Disadvantage: Plain text can be trivially modified! Only left-most k-bits of the block can be used6-10©2007 Raj JainCSE571SWashington University in St. Louiskk--Bit Cipher Feedback Mode (CFB)Bit Cipher Feedback Mode (CFB)! Key Stream blocks use previous block as IV! k-bits of encoded streams are used to generate next block6-11©2007 Raj JainCSE571SWashington University in St. LouisCFB (Cont)CFB (Cont)! Stream cannot be generated in advance.! In practice, k=8 bit or 64 bit! If a byte is added or deleted, that byte and next 8 bytes will be affected! No block rearranging effect6-12©2007 Raj JainCSE571SWashington University in St. LouisCounter Mode (CTR)Counter Mode (CTR)! If the same IV and key is used again," Xor of two encrypted messages = Xor of plain text! IV is incremented and used to generated one-time pad! Advantage: Pre-computed6-13©2007 Raj JainCSE571SWashington University in St. LouisMessage Authentication Code (MAC)Message Authentication Code (MAC)! Cryptographic checksum or Message Integrity Code (MIC)! CBC residue is sent with plain text6-14©2007 Raj JainCSE571SWashington University in St. LouisWeak and SemiWeak and Semi--Weak KeysWeak Keys! Recall that 56-bit DES key is divided in two halves and permuted to produce C0 and D0! Keys are weak if C0 and D0 (after permutation) result in:" All 0's" All 1's" Alternating 10 or 01! Four possibilities for each half ⇒ 16 week keys6-15©2007 Raj JainCSE571SWashington University in St. LouisPrivacy + IntegrityPrivacy + Integrity! Can't send encrypted message and CBC residue.1. Use strong CRC2. Use CBC residue with another key." The 2nd CBC can be weak, as in Kerberos." Kerberos uses K+F0F0…F0F0 as the 2nd key.6-16©2007 Raj JainCSE571SWashington University in St. LouisPrivacy + Integrity (Cont)Privacy + Integrity (Cont)3. Use hash with another key. Faster than encryption.4. Use Offset Code Book (OCB), http://www.cs.ucdavis.edu/~rogaway/papers/draft-krovetz-ocb-00.txt6-17©2007 Raj JainCSE571SWashington University in St. LouisMISTY1MISTY1! Block cipher with 128 bit keys! With 4 to 8 rounds. Each round consists of 3 sub-rounds.! Secure against linear and differential cryptanalysis! Named after the inventors: Matsui Mitsuru, Ichikawa Tetsuya, Sorimachi Toru, Tokita Toshio, and Yamagishi Atsuhiro ! A.k.a. Mitsubishi Improved Security Technology ! Recommended for Japanese government use. Patented! Described in RFC 2994! Ref: http://en.wikipedia.org/wiki/MISTY16-18©2007 Raj JainCSE571SWashington University in St. LouisKASUMIKASUMI! Selected by 3GPP! 64-bit block cipher with 128 bit key ! A variant of MISTY1! Needs limited computing power ! Works in real time (voice)! KASUMI with counter mode and output feedback modes. This algorithm is known as f8.6-19©2007 Raj JainCSE571SWashington University in St. LouisGSM EncryptionGSM Encryption! Three stream ciphers: A5/1, A5/2, A5/3! Description of A5/1 and A5/2 were never released to public but were reverse engineered and broken! A5/3 is based KASUMI6-20©2007 Raj JainCSE571SWashington University in St. LouisDES AttacksDES Attacks! 1997 RSA Lab set a prize of $10k! Curtin and Dolske used combined power of Internet computers to find the key using a brute force method.! 1998 Electronic Frontier Foundation (EFF) showed that a $250k machine could find any DES key in max 1 week. Avg 3 days.! 2001 EFF combined the cracker with Internet to crack DES in 1 day.! Differential Cryptanalysis and Linear cryptanalysis can be used to crack DES! NIST recommended 3DES6-21©2007 Raj JainCSE571SWashington University in St. Louis3DES3DES! c = ek1(dk2(ek3(m)))! m = dk3(ek2(dk1(c)))! k1 and k2 should be independent but k3 can be independent or k3=k1! k3 = k1 results in 112 bit strength6-22©2007 Raj JainCSE571SWashington University in St. LouisCBC: Outside vs. InsideCBC: Outside vs. Inside6-23©2007 Raj JainCSE571SWashington University in St. LouisCBC: Outside vs. Inside (Cont)CBC: Outside vs. Inside (Cont)6-24©2007 Raj JainCSE571SWashington University in St. LouisKey 3DES Design DecisionsKey 3DES Design Decisions1. 3 stages2. Two keys3. E-D-E4. CBC Outside6-25©2007 Raj JainCSE571SWashington University in St. Louis1. Why not 2DES?1. Why not 2DES?! ek1(ek2(m))! 2DES is only twice as secure as DES (57-bit key)! Suppose you know (m1,c1), (m2,c2), ...! c1=ek1(ek2(m1))! dk1(c1)=ek2(m1)! k1 and k2 can be found by preparing two 2^56 entry tables!


View Full Document

WUSTL CSE 571S - Modes of Operation

Documents in this Course
IP sec

IP sec

28 pages

Load more
Download Modes of Operation
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Modes of Operation and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Modes of Operation 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?