复旦大学:《密码学基础》课程教学资源(课件讲稿)03 Modern Block Ciphers

密码学基础(03) Modern Block Ciphers 復大辱软件学院 LiJT
LiJT 1 密码学基础(03) Modern Block Ciphers

Outline-Modern Block Ciphers now look at modern block ciphers one of the most widely used types of cryptographic algorithms provide confidentiallauthentication services focus on DES (Data Encryption Standard) to illustrate block cipher design principles 復大辱软件学院 LiST
LiJT 2 Outline-Modern Block Ciphers • now look at modern block ciphers • one of the most widely used types of cryptographic algorithms • provide confidential/authentication services • focus on DES (Data Encryption Standard) • to illustrate block cipher design principles

ef Review: Symmetric Cipher Model Secret key shared by Secret key shared by sender and recipient sender and recipient Transmitted ciphertext Plaintext Plaintext Input Encryption algorithm Decryption algorithm output (e.g, DES) (reverse of encryption algorithm) 3 復大辱软件学院 LiST
LiJT 3 Review: Symmetric Cipher Model

Review Monoalphabetic Cipher Playfair Vigenere Cipher 復大辱软件学院 LiJT
LiJT 4 Review • Monoalphabetic Cipher • Playfair • Vigenère Cipher

o Review: Product Ciphers ciphers using substitutions or transpositions are not secure because of language characteristics hence consider using several ciphers in succession to make harder but 'o substitutions make a more complex substitution two transpositions make more complex transposition but a substitution followed by a transposition makes a new much harder cipher this is bridge from classical to modern ciphers 復大辱软件学院 LiJT
LiJT 5 Review: Product Ciphers • ciphers using substitutions or transpositions are not secure because of language characteristics • hence consider using several ciphers in succession to make harder, but: – two substitutions make a more complex substitution – two transpositions make more complex transposition – but a substitution followed by a transposition makes a new much harder cipher • this is bridge from classical to modern ciphers

ota Block vs Stream Ciphers block ciphers process messages in blocks each of which is then en/decrypted like a substitution on very big characters 64-bits or more stream ciphers process messages a bit or byte at a time when en/decrypting many current ciphers are block ciphers broader range of applications 復大辱软件学院 LiJT
LiJT 6 Block vs Stream Ciphers • block ciphers process messages in blocks, each of which is then en/decrypted • like a substitution on very big characters – 64-bits or more • stream ciphers process messages a bit or byte at a time when en/decrypting • many current ciphers are block ciphers • broader range of applications

Block Cipher Principles most symmetric block ciphers are based on a Feistel Cipher structure needed since must be able to decrypt ciphertext to recover messages efficientl block ciphers look like an extremely large substitution would need table of 264 entries for a 64-bit block instead create from smaller building blocks using idea of a product cipher 復大辱软件学院 LiJT
LiJT 7 Block Cipher Principles • most symmetric block ciphers are based on a Feistel Cipher Structure • needed since must be able to decrypt ciphertext to recover messages efficiently • block ciphers look like an extremely large substitution • would need table of 264 entries for a 64-bit block • instead create from smaller building blocks • using idea of a product cipher

Ideal Block Cipher 4-Bit Input 4 to 16 Decoder 8910 12131415 23456789101112131415 16 to 4 Encoder 4-Bit Output 8 復大辱软件学院 LiJT
LiJT 8 Ideal Block Cipher

Ideal Block Cipher Plaintext Ciphertext Ciphertext Plaintext 0000 1110 0000 1110 0001 0100 0001 0011 0010 1101 0010 0100 0011 0001 1000 0100 0010 0100 0001 0101 1111 0101 1100 0110 1011 0110 1010 011l 1000 0111 l111 1000 0011 1000 0111 1001 1010 1001 1101 1010 0110 1010 1001 1011 1100 1011 0110 1100 0101 1100 1011 1101 1001 1101 0010 1110 0000 1110 0000 1111 0111 0101 1、I一
LiJT 9 Ideal Block Cipher

a Ideal Block Cipher->Feistel Feistel proposed We can approximate the ideal block cipher by product cipher Develop a block cipher with a key length of k bits and a block length of n bits, allowing a total of 2 possible transformation Rather than 2n 復大辱软件学院 LiST
LiJT 10 Ideal Block Cipher->Feistel • Feistel proposed – We can approximate the ideal block cipher by product cipher; – Develop a block cipher with a key length of k bits and a block length of n bits, allowing a total of 2k possible transformation – Rather than 2n!
按次数下载不扣除下载券;
注册用户24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
- 复旦大学:《密码学基础》课程教学资源(课件讲稿)02 Introduction to Cryptography -Classical Encryption Techniques(cont.).pdf
- 复旦大学:《密码学基础》课程教学资源(课件讲稿)01 Classical Encryption Techniques.pdf
- 复旦大学:《网络科学导论 Introduction to Network Science》教学课件_14 - Synchronization.pdf
- 复旦大学:《网络科学导论 Introduction to Network Science》教学课件_13- Collective behaviors+Drone flocking.pdf
- 复旦大学:《网络科学导论 Introduction to Network Science》教学课件_12- Community+Opinion dynamics+consensus.pdf
- 复旦大学:《网络科学导论 Introduction to Network Science》教学课件_11- Spreading on networks.pdf
- 复旦大学:《网络科学导论 Introduction to Network Science》教学课件_10- Evolutionary game.pdf
- 复旦大学:《网络科学导论 Introduction to Network Science》教学课件_9- TimeseriesNetworks and ECG.pdf
- 复旦大学:《网络科学导论 Introduction to Network Science》教学课件_8- Modelling networks_image.pdf
- 复旦大学:《网络科学导论 Introduction to Network Science》教学课件_7- Robustness and fragile.pdf
- 复旦大学:《网络科学导论 Introduction to Network Science》教学课件_6- Scale free networks.pdf
- 复旦大学:《网络科学导论 Introduction to Network Science》教学课件_5- NW+Searching+Pagerank.pdf
- 复旦大学:《网络科学导论 Introduction to Network Science》教学课件_4- Small world model.pdf
- 复旦大学:《网络科学导论 Introduction to Network Science》教学课件_3- Erdos Ranyi random graphs.pdf
- 复旦大学:《网络科学导论 Introduction to Network Science》教学课件_2- Classic Network Concepts & Properties.pdf
- 复旦大学:《网络科学导论 Introduction to Network Science》教学课件_1- Introduction.pdf
- 复旦大学:《网络科学导论 Introduction to Network Science》教学参考文献_Synchronization in complex networks.pdf
- 复旦大学:《网络科学导论 Introduction to Network Science》教学参考文献_谷歌背后的数学.pdf
- 复旦大学:《网络科学导论 Introduction to Network Science》教学参考文献_Virus spread in networks.pdf
- 复旦大学:《网络科学导论 Introduction to Network Science》教学参考文献_The structure and function of complex networks.pdf
- 复旦大学:《密码学基础》课程教学资源(课件讲稿)04 Public Key Cryptography, RSA.pdf
- 复旦大学:《密码学基础》课程教学资源(课件讲稿)05 Message authentication and Hash function.pdf
- 复旦大学:《密码学基础》课程教学资源(课件讲稿)06 Stream Cipher.pdf
- 复旦大学:《密码学基础》课程教学资源(课件讲稿)07-08 PKI(Public Key Infrastructure)公钥基础设施——公钥技术的应用.pdf
- 复旦大学:《密码学基础》课程教学资源(课件讲稿)09-10(1/2)Authentication - 身份认证.pdf
- 复旦大学:《密码学基础》课程教学资源(课件讲稿)09-10(2/2)Authentication – Basic protocol constructions – Kerberos.pdf
- 复旦大学:《密码学基础》课程教学资源(课件讲稿)11.1 IP Security.pdf
- 复旦大学:《密码学基础》课程教学资源(课件讲稿)11.2 Web & EC Security.pdf
- 复旦大学:《密码学基础》课程教学资源(课件讲稿)12 Block Chain 区块链 - 密码解决方案集大成者.pdf
- 河南中医药大学:《数据库规划与设计》课程教学资源(Oracle实验指导)实验7 创建及管理Oracle数据表.pdf
- 天津大学:基因序列的比对、挖掘和功能分析(邹权).ppt
- 东南大学:《计算机视觉基础》课程教学资源(课程介绍).pdf
- 《计算机辅助翻译》课程PPT教学课件(Computer Aided Translation)第10讲 计算机辅助翻译的具体工作流程.ppt
- 《计算机辅助翻译》课程PPT教学课件(Computer Aided Translation)第11讲 翻译项目的管理.ppt
- 《计算机辅助翻译》课程PPT教学课件(Computer Aided Translation)第12讲(实践课3).ppt
- 《计算机辅助翻译》课程PPT教学课件(Computer Aided Translation)第13讲(讨论课1).ppt
- 《计算机辅助翻译》课程PPT教学课件(Computer Aided Translation)第14讲 基于CAT翻译记忆库的翻译研究.ppt
- 《计算机辅助翻译》课程PPT教学课件(Computer Aided Translation)第15讲(讨论课2).ppt
- 《计算机辅助翻译》课程PPT教学课件(Computer Aided Translation)第16讲 计算机辅助翻译技术的发展前景.ppt
- 《计算机辅助翻译》课程PPT教学课件(Computer Aided Translation)第17讲 本地化与翻译的发展和革新.ppt