复旦大学:《信息安全》教学课件_03 Modern Block Ciphers

信息安全(03) Introduction to Cryptography Modern Block Ciphers 復大软件学院 LiT
LiJT 1 信息安全(03) Introduction to Cryptography - Modern Block Ciphers

og Outline-Modern Block Ciphers now look at modern block ciphers one of the most widely used types of cryptographic algorithms provide confidential/authentication services focus on DES Data Encryption Standard) to illustrate block cipher design principles 復大软件学院 LiT
LiJT 2 Outline-Modern Block Ciphers • now look at modern block ciphers • one of the most widely used types of cryptographic algorithms • provide confidential/authentication services • focus on DES (Data Encryption Standard) • to illustrate block cipher design principles

Cee Review: Symmetric Cipher Model Secret key shared by Secret key shared by sender and recipient sender and recipient Transmitted ciphertext Plaintext Plaintext Input Encryption algorithm Decryption algorithm output e,g…DES) (reverse of encryption algorithm) 3 復大软件学院 LiT
LiJT 3 Review: Symmetric Cipher Model

Review Monoalphabetic Cipher Playfair Vigenere cipher 復大软件学院 LiT
LiJT 4 Review • Monoalphabetic Cipher • Playfair • Vigenère Cipher

o Review: Product Ciphers ciphers using substitutions or transpositions are not secure because of language characteristics hence consider using several ciphers in succession to make harder but two substitutions make a more complex substitution two transpositions make more complex transposition but a substitution followed by a transposition makes a new much harder cipher this is bridge from classical to modern ciphers 5 復大软件学院 LiT
LiJT 5 Review: Product Ciphers • ciphers using substitutions or transpositions are not secure because of language characteristics • hence consider using several ciphers in succession to make harder, but: – two substitutions make a more complex substitution – two transpositions make more complex transposition – but a substitution followed by a transposition makes a new much harder cipher • this is bridge from classical to modern ciphers

Block vs Stream Ciphers block ciphers process messages in blocks each of which is then en/decrypted like a substitution on very big characters 64-bits or more stream ciphers process messages a bit or byte at a time when en/decrypting many current ciphers are block ciphers broader range of applications 6 復大软件学院 LiT
LiJT 6 Block vs Stream Ciphers • block ciphers process messages in blocks, each of which is then en/decrypted • like a substitution on very big characters – 64-bits or more • stream ciphers process messages a bit or byte at a time when en/decrypting • many current ciphers are block ciphers • broader range of applications

Block Cipher Principles most symmetric block ciphers are based on a Feistel Cipher Structure needed since must be able to decrypt ciphertext to recover messages efficiently block ciphers look like an extremely large substitution would need table of 264 entries for a 64-bit block instead create from smaller building blocks using idea of a product cipher 復大软件学院 LiT
LiJT 7 Block Cipher Principles • most symmetric block ciphers are based on a Feistel Cipher Structure • needed since must be able to decrypt ciphertext to recover messages efficiently • block ciphers look like an extremely large substitution • would need table of 264 entries for a 64-bit block • instead create from smaller building blocks • using idea of a product cipher

Ideal Block Cipher np 4 to 16 Decoder 8910 23456789101112131415 16 to 4 Encoder 4-Bit Output 8 復大软件学院 LiT
LiJT 8 Ideal Block Cipher

Ideal Block Cipher Plaintext Ciphertext Ciphertext Plaintext 0000 1110 0000 1110 0001 0011 0010 1101 0010 0100 0011 0001 0011 1000 0100 0010 0100 0001 0101 0101 1100 0110 1011 0110 1010 0111 1000 0111 l111 1000 0011 1000 0111 1001 1010 1001 1101 1010 0110 1010 1001 1011 1100 1011 0110 0101 1100 1011 1101 1001 1101 0010 1110 0000 1110 0000 1111 0111 l111 0101
LiJT 9 Ideal Block Cipher

Ideal Block Cipher->Feistel Feistel proposed We can approximate the ideal block cipher by product cipher; Develop a block cipher with a key length of k bits and a block length of n bits, allowing a total of 2k possible transformation Rather than 2n 復大软件学院 LiT
LiJT 10 Ideal Block Cipher->Feistel • Feistel proposed – We can approximate the ideal block cipher by product cipher; – Develop a block cipher with a key length of k bits and a block length of n bits, allowing a total of 2 k possible transformation – Rather than 2 n !
按次数下载不扣除下载券;
注册用户24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
- 复旦大学:《信息安全》教学课件_02 Classical Encryption Techniques(cont.).pdf
- 复旦大学:《信息安全》教学课件_01 Classical Encryption Techniques.pdf
- 复旦大学:《程序设计》课程教学资源(PPT课件)Chapter 16 Simple Input and Output.ppt
- 复旦大学:《程序设计》课程教学资源(PPT课件)Chapter 15 Exceptions and Assertions.ppt
- 复旦大学:《程序设计》课程教学资源(PPT课件)Chapter 14 Applets, Images, and Audio.ppt
- 复旦大学:《程序设计》课程教学资源(PPT课件)Chapter 13 Creating User Interfaces.ppt
- 复旦大学:《程序设计》课程教学资源(PPT课件)Chapter 12 Event-Driven Programming.ppt
- 复旦大学:《程序设计》课程教学资源(PPT课件)Chapter 11 Getting Started with GUI Programming.ppt
- 复旦大学:《程序设计》课程教学资源(PPT课件)Chapter 10 Object-Oriented Modeling(oom).ppt
- 复旦大学:《程序设计》课程教学资源(PPT课件)Chapter 9 Abstract Classes and Interfaces.ppt
- 复旦大学:《程序设计》课程教学资源(PPT课件)Chapter 8 Inheritance and Polymorphism.ppt
- 复旦大学:《程序设计》课程教学资源(PPT课件)Chapter 7 String.ppt
- 复旦大学:《程序设计》课程教学资源(PPT课件)Chapter 6 Objects and Classes.ppt
- 复旦大学:《程序设计》课程教学资源(PPT课件)Chapter 5 Arrays.ppt
- 复旦大学:《程序设计》课程教学资源(PPT课件)Chapter 4 Methods.ppt
- 复旦大学:《程序设计》课程教学资源(PPT课件)Chapter 3 Control Statements.ppt
- 复旦大学:《程序设计》课程教学资源(PPT课件)Chapter 2 Primitive Data Types and Operations.ppt
- 复旦大学:《程序设计》课程教学资源(PPT课件)Chapter 1 Introduction to Computers, Programs, and Java.ppt
- 复旦大学:《程序设计》课程教学资源(PPT课件)Chapter 0 course intro Programming Language(Using Java).ppt
- 复旦大学:《程序设计》课程教学资源(Java Lab)Game of Life_题目要求.pdf
- 复旦大学:《信息安全》教学课件_04 Public Key Cryptography, RSA.pdf
- 复旦大学:《信息安全》教学课件_05 Message authentication and Hash function.pdf
- 复旦大学:《信息安全》教学课件_06 The Intro to Information Security.pdf
- 复旦大学:《信息安全》教学课件_07-08 Public Key Infrastructure(PKI)公钥基础设施——公钥技术的应用.pdf
- 复旦大学:《信息安全》教学课件_09 Authentication and supplements.pdf
- 复旦大学:《信息安全》教学课件_10 Authentication Kerberos.pdf
- 复旦大学:《信息安全》教学课件_11.1 IP Security.pdf
- 复旦大学:《信息安全》教学课件_11.2 Web & EC Security.pdf
- 复旦大学:《信息安全》教学课件_12-13 Software Security.pdf
- 复旦大学:《信息安全》教学课件_14 防火墙 Firewall.pdf
- 复旦大学:《信息安全原理》课程教学资源(PPT课件)第1章 信息系统安全概述、第2章 密码学概论(1/3).pdf
- 复旦大学:《信息安全原理》课程教学资源(PPT课件)第2章 密码学概论(2/3).pdf
- 复旦大学:《信息安全原理》课程教学资源(PPT课件)第3章 现代加密算法(2/3).pdf
- 复旦大学:《信息安全原理》课程教学资源(PPT课件)第3章 现代加密算法(2/4).pdf
- 复旦大学:《信息安全原理》课程教学资源(PPT课件)第3章 现代加密算法(3/4).pdf
- 复旦大学:《信息安全原理》课程教学资源(PPT课件)第3章 现代加密算法(4/4)、第4章 密码应用(1/4).pdf
- 复旦大学:《信息安全原理》课程教学资源(PPT课件)第2章 密码学概论(3/3)、第3章 现代加密算法(1/4).pdf
- 复旦大学:《信息安全原理》课程教学资源(PPT课件)第4章 密码应用(2/4).pdf
- 复旦大学:《信息安全原理》课程教学资源(PPT课件)第4章 密码应用(3/4).pdf
- 复旦大学:《信息安全原理》课程教学资源(PPT课件)第4章 密码应用(4/4).pdf