Overview of Cryptography - PowerPoint PPT Presentation

About This Presentation
Title:

Overview of Cryptography

Description:

Overview of Cryptography Part 1: Concepts and Principles Part 2: Symmetric Cryptography * Random numbers play an important role in the use of encryption for various ... – PowerPoint PPT presentation

Number of Views:290
Avg rating:3.0/5.0
Slides: 81
Provided by: Alber92
Category:

less

Transcript and Presenter's Notes

Title: Overview of Cryptography


1
Overview of Cryptography
  • Part 1 Concepts and Principles
  • Part 2 Symmetric Cryptography

2
Meaning of Cryptography
  • from Greek
  • Cryptos secret, hidden
  • graphos writing
  • cryptography study (some calls science or art
    too) of secret writing

3
Basics
Encryption key
Decryption key
Encryption (Encipherment)
Decryption (Decipherment)
Message (plaintext cleartext)
Ciphertext (cryptogram)
plaintext
4
Basic Terminology
  • plaintext - the original message
  • ciphertext - the coded message
  • cipher - algorithm for transforming plaintext to
    ciphertext
  • key - info used in cipher known only to
    sender/receiver
  • encipher (encrypt) - converting plaintext to
    ciphertext
  • decipher (decrypt) - recovering plaintext from
    ciphertext
  • cryptography - study of encryption
    principles/methods
  • cryptanalysis (codebreaking) - the study of
    principles/ methods of deciphering ciphertext
    without knowing key
  • cryptology - the field of both cryptography and
    cryptanalysis

5
Kerckhoffs principles
  • The security of a cipher must not depend on
    anything that cannot be easily changed
  • The opponent is not to be underestimated. In
    particular, the opponent knows the encryption and
    decryption algorithms. So the strength of a
    cipher system depends on keeping the key
    information secret, not the algorithm
  • Auguste Kerckhoff, 1883

6
Open discussion
  • Published algorithm vs. unpublished algorithm

7
Characteristics of Cryptosystems
  • types of operations for transformation into
    ciphertext
  • substitution
  • transposition
  • product
  • multiple stages of substitutions and
    transpositions
  • number of keys used
  • single-key or private key cryptosystem
  • two-key or public key cryptosystem
  • the way in which plaintext is processed
  • block
  • stream

8
Attacks on Ciphers
  • Brute-force
  • try all possible keys until solved
  • Cryptanalytic attacks
  • use
  • nature of algorithms
  • knowledge about general characteristics of
    plaintext
  • some sample plaintext-ciphertext pairs
  • Generally statistical techniques
  • aim
  • learn a specific plaintext
  • learn the key (that makes all past and future
    communication vulnerable)

9
Types of Cryptanalytic Attacks
10
A good algorithm
  • resists ciphertext-only and known-plaintext
    attacks
  • Actually, no algorithm, but one is proven to be
    unconditionally secure
  • only one-time pad

11
Unconditionally Secure Encryption Scheme
  • No matter
  • how much ciphertext is available to opponent
  • how much time and computing power that opponent
    has
  • it is impossible for the opponent to decrypt the
    ciphertext
  • because there is no statistical relationship
    between the ciphertext and plaintext
  • Only one-time pad is unconditionally secure

12
A Practical Encryption Scheme
  • should be computationally secure
  • the cost of breaking the cipher exceeds the value
    of encrypted information
  • the time required to break the cipher exceeds the
    useful lifetime of the information
  • assumes the processing powers are limited and
    estimated breaking time is impractically long
    (millions of years!)

13
Brute Force Search
  • Simply try every key
  • On average, half of the key space is searched
    until an intelligible translation is found

14
Symmetric Encryption
  • also known as
  • classical
  • conventional
  • private-key
  • single-key
  • sender and recipient share a common key
  • was only type prior to invention of public-key
    cryptography
  • until second half of 1970s

15
Symmetric Cipher Model
there must be a secure mechanism for the
distribution of this key a priori
16
Requirements
  • two requirements for secure use of symmetric
    encryption
  • strong encryption and decryption algorithms
  • a secret key known only to sender / receiver
  • Y EK(X) or Y E (K, X)
  • X DK(Y) or X D (K, Y)
  • assume encryption algorithm is known
  • a secure channel is needed to distribute key

17
Historical secret key cryptography - 1
  • Pre-DES (before mid-70s)
  • Substitution and Permutation techniques
  • Substitution each letter/symbol is replaced by
    another one
  • Permutation same letters/symbols, but their
    orders are mixed
  • inspired DES and other modern block ciphers. Now,
    only has a theoretical value!
  • Simplest and earliest known is Caesar's cipher
  • used by Julius Caesar
  • replace each letter by the one with 3 letters
    (circularly) down in the alphabet
  • a becomes d, b becomes e, , y becomes b, z
    becomes c
  • no key
  • Substitution technique

18
Historical secret key cryptography - 2
  • Caesar Cipher (cont'd)
  • Example
  • plain meet me after the toga party
  • cipher PHHW PH DIWHU WKH WRJD SDUWB
  • Can define transformation as
  • a b c d e f g h i j k l m n o p q r s t u v w x y
    z
  • D E F G H I J K L M N O P Q R S T U V W X Y Z A B
    C
  • Mathematically give each letter a number
  • a b c d e f g h i j k l m n o p q r s t
    u v w x y z
  • 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19
    20 21 22 23 24 25
  • Algorithm can be expressed as
  • C E(3, p) (p 3) mod 26 //Encryption
  • p D(3, C) (C - 3) mod 26 //Decryption

19
Historical secret key cryptography - 3
  • Make the offset the key (k 1 .. 25)
  • 25 keys easy to try
  • C E(k , p ) (p k ) mod 26
  • p D(k , C ) (C - k ) mod 26
  • Monoalphabetic ciphers
  • shuffle the letters arbitrarily based on a 26
    letters long key
  • Plain abcdefghijklmnopqrstuvwxyz
  • Cipher DKVQFIBJWPESCXHTMYAUOLRGZN
  • Plaintext ifwewishtoreplaceletters
  • Ciphertext WIRFRWAJUHYFTSDVFSFUUFYA

20
Historical secret key cryptography - 4
  • Security of Monoalphabetic ciphers
  • 26! 41026 different keys
  • but still insecure due to redundancies in the
    natural languages
  • some letters or letter pairs/triplets occur more
    than others
  • ciphertext reflects those characteristics
  • cryptanalysis is based on this fact and it really
    works
  • see the example on pages 93, 94, 95 and 96 of the
    textbook

21
Historical secret key cryptography - 5
  • Playfair cipher
  • improves security by encrypting the letters 2 by
    2 (called digrams)
  • e.g. hs encrypts to BP
  • 2626 676 digrams
  • cryptanalysis should be based on the frequency of
    the digrams which is more difficult than
    monoalphabetic crypto
  • invented by Charles Wheatstone in 1854, but named
    after his friend Baron Playfair
  • widely used for many years
  • by British army in WW1 as a standard system
  • also used (among other systems) in WW2 by the US
    Army and other allied forces

22
Historical secret key cryptography - 6
  • Polyalphabetic substitution ciphers
  • different monoalphabetic substitutions as
    proceeding through the plaintext
  • key determines which monoalphabetic substitution
    rule to be applied to each letter
  • Famous example is Vigenère cipher
  • Key K k0, k1, k2, k3, , km-1
  • Plaintext P p0, p1, p2, p3, , pn-1 m lt n
  • Encryption ci (pi ki mod m) mod 26 for
    all 0 lt i lt n
  • Decryption pi (ci - ki mod m) mod 26 for
    all 0 lt i lt n

23
Vigenere Table
24
Vigenere Cipher
  • Example
  • key deceptivedeceptivedeceptive
  • plaintext wearediscoveredsaveyourself
  • ciphertext ZICVTWQNGRZGVTWAVZHCQYGLMGJ
  • makes cryptanalysis harder
  • multiple ciphertext letters for the same
    plaintext letter
  • frequency distribution is kind of obscured, but
    cryptanalysis is still possible

25
Historical secret key cryptography - 7
  • Transposition (or permutation) ciphers
  • hide the message by rearranging the letter order
    without altering the actual letters
  • same frequency distribution as the original text
  • cryptanalysis is possible
  • Example scheme write letters of message out in
    rows over a specified number of columns
  • then reorder the columns according to some key
    before reading off the rows
  • Key 4 3 1 2 5 6 7
  • Plaintext a t t a c k p
  • o s t p o n e
  • d u n t i l t
  • w o a m x y z
  • Ciphertext TTNAAPTMTSUOAODWCOIXKNLYPETZ

26
Towards modern cryptography - 1
  • Vernam cipher
  • ATTs Gilbert Vernam invented in 1918
  • treats the messages as binary data
  • XOR the plaintext with the key
  • reversible
  • very long key in tapes
  • repetitions possible for long messages
  • cryptanalysis is hard but possible with
    sufficient amount of ciphertext

27
Towards modern cryptography - 2
  • One-time pad
  • key is random and as long as the plaintext
  • key is not re-used
  • unconditionally secure
  • ciphertext bears no statistical relationship to
    the plaintext
  • for a given ciphertext, there exists several
    intelligible decryptions that use different keys
  • even brute-force does not work, since it is not
    possible to understand which decryption is the
    correct one
  • generally, data and key are represented in binary
    and they are bitwise XORed
  • Problems of one time pad in practice
  • large amount of random number generation
  • protection and safe distribution of those keys

28
Towards modern cryptography - 3
  • Rotor machines
  • basic idea multiple stages of substitutions
  • were widely used in WW2
  • German (Enigma), Japan (Purple)
  • implemented as a series of cylinders that move
    after each letter is encrypted
  • each cylinder represents a substitution alphabet
  • 3 cylinders 262626 17576 different
    substitution alphabets
  • this number is even bigger for 4 and 5 cylinders

29
Towards modern cryptography - 4
30
Towards modern cryptography - 5
  • Product ciphers
  • general name for having multiple stages of
    substitutions, permutations or both
  • aim to make cryptanalysis difficult by having
    irregularities in the cipher
  • rotor machine is an example
  • this idea led to Fiestel cipher and DES (Data
    Encryption Standard)
  • bridge between classical and modern ciphers

31
Towards modern cryptography - 5
  • Product ciphers

32
Modern Ciphers
  • Block ciphers vs. Stream Ciphers
  • Block ciphers operate on a block of data
  • entire block must be available before processing

33
Modern Ciphers
  • Stream ciphers process messages one bit or byte
    at a time when en/decrypting
  • need not wait the entire block
  • Most ciphers are block ciphers
  • but it is possible to use a block cipher as a
    stream cipher (in some modes of operations that
    we will see later)

34
DES (Data Encryption Standard)
  • most widely used block cipher in world
  • adopted in 1977 by NBS (now NIST)
  • as FIPS PUB 46
  • encrypts 64-bit data using 56-bit key
  • had widespread use
  • There has been considerable controversy over its
    security

35
DES Black box view
36
DES History
  • IBM developed Lucifer cipher
  • by team led by Horst Feistel (1971)
  • used 64-bit data blocks with 128-bit key
  • then redeveloped as a commercial cipher with
    input from NSA and others
  • in 1973 NBS issued request for proposals for a
    national cipher standard
  • IBM submitted their revised Lucifer which was
    eventually accepted as the DES
  • 56-bit key size!
  • recertified in 1983, 1987 and 1993
  • 3-DES (triple DES) has been issued as a new
    standard in 1999

37
DES Controversy
  • Controversy over design
  • in choice of 56-bit key (vs Lucifer 128-bit)
  • design criteria (of the S-boxes) were classified
  • S-boxes were fine
  • but 56-bits became problem for DES as time goes
    by
  • due to advances in cryptanalysis and electronics
  • back in 1998 a project funded (220K) by EFF
    (Electronic Frontier Foundation) broke DES in
    less than three days

38
Design of DES
  • is not our concern in this course
  • neither the details of cryptanalysis of DES
  • will give only basic characteristics of DES in
    the next few slides

39
DES Characteristics
  • DES is basically a product cipher
  • several rounds of substitutions and permutations
  • actually not that simple ?
  • originally designed for hardware implementation
  • software implementations validated in 1993
  • but software DES is slow

40
DES Characteristics
  • DES shows strong avalanche effect
  • one bit change in the input affects on average
    half of the output bits
  • to make attacks based on guessing difficult
  • S-boxes are non-linear
  • provides confusion
  • i.e. makes relationship between ciphertext and
    key as complex as possible

41
Other Important Symmetric Ciphers
  • AES (Rjindael)
  • 3DES (Triple DES)
  • Blowfish
  • RC5
  • IDEA
  • RC4

42
What happened after DES
  • Replacement for DES was needed
  • vulnerability to cryptanalysis and practical
    brute-force attacks
  • AES is the new standard (will see)
  • But took some time to standardize and deploy
  • Meanwhile, some other ciphers are also used in
    practice (will briefly discuss too)
  • But we still needed an immediate replacement of
    DES that can be standardized and deployed easily
  • This was 3DES

43
3DES (Triple DES)
  • Another method for a strong cipher
  • use multiple encryption with DES with different
    keys
  • to preserve the investment in DES
  • for quicker deployment
  • Triple DES is chosen as a standard method
  • Standardized by ANSI, ISO and NIST

44
Why not double DES?
  • Double DES
  • use DES two times with two different keys
  • Does not work due to meet-in-the-middle attack
    (which is a known-plaintext type of an attack)
  • X EK1P DK2C
  • Try all possible K1s on P to create all possible
    Xs and store them sorted
  • Try all possible K2s on C and match with above
    table
  • may create some false-alarms, so do the same
    attack for another plaintext-ciphertext pair
  • If the same K1-K2 pairs match for the second
    plaintext-ciphertext pair, then the correct keys
    are most probably found
  • complexity of this attack is close to the
    complexity of the single-DES brute-force attack,
    so double-DES is useless

45
3DES (Triple-DES)
  • Three stages of DES
  • with two different keys
  • some attacks are possible but impractical
  • Merkle and Hellman, 1981
  • 256 trials, but requires 256 plaintext-ciphertext
    pairs
  • Oorschot and Wiener, 1990
  • 2120/n trials, where n is the number of
    plaintext-ciphertext pairs
  • with three different keys
  • Attack complexity increases and becomes
    impractical

46
Triple-Des with two/three keys
Caution There is an error in the book
  • E-D-E sequence
  • use of decryption at the second stage does not
    reduce/increase the security
  • Why decryption in the middle stage?

47
Triple-DES with three keys
  • For those who feel some concern about the attacks
    on two-key 3-DES
  • E-D-E sequence
  • C EK3DK2EK1P
  • has been adopted by some Internet applications,
    eg PGP, S/MIME

48
Blowfish
  • Developed by Bruce Schneier
  • author of the book Applied Cryptography
  • 64-bit of block size
  • Key size is variable
  • one to fourteen 32-bit blocks
  • 32 to 448 bits
  • provides a good trade-off between security and
    performance
  • Fast and compact
  • Has been implemented in numerous products
  • including GnuPG, SSH
  • see http//www.schneier.com/blowfish-products.html
  • Not so recommended anymore due to small block
    size and some cryptanalytic attacks

49
RC5
  • Rons Code 5
  • developed by Ron Rivest who is also co-inventor
    of RSA cryptosystem
  • owned and extensively used by RSA Inc.
  • highly parametric
  • word oriented processing that uses primitive
    operations that can be found in instruction sets
    of almost all microprocessors

50
RC5-w/r/b
  • RC5 is actually a family of algorithms
  • Parameters w, r, b
  • w Word size
  • 16, 32 or 64 bits
  • block size is 2w
  • r Number of rounds
  • 0 .. 255
  • b key size in octets
  • 0 .. 255
  • RC5 as suggested by Rivest is
  • RC5-32/12/16
  • 32-bit words (i.e. 64 bit blocks), 12 rounds,
    128-bit key size

51
IDEA
  • International Data Encryption Algorithm
  • Lai and Massey of ETH Zurich (Swiss Federal
    Institute of Technology), 1990/91
  • 64-bit blocks, 128-bit key size
  • one of the early 128-bit algorithms
  • not US originated, so no export restrictions
  • used widely in PGP

52
AES (Advanced Encryption Standard)
  • Replacement needed for DES
  • reasons discussed before
  • 3DES is a solution, but temporary
  • 3DES is slow in software
  • 3DES uses small blocks that makes even slower
  • Need a new standard cipher

53
AES Events in Chronological Order
  • NIST issued call for a standard cipher in 1997
  • international
  • 15 candidates (out of 21) accepted in June 98
  • A shortlist of 5 selected in August 99
  • Rijndael (from Belgium) was selected as the AES
    in October 2000
  • issued as FIPS PUB 197 standard in November 2001

54
AES Requirements
  • private key symmetric block cipher
  • 128-bit data (block size)
  • 128/192/256-bit keys
  • stronger faster than Triple-DES
  • active life of 20-30 years
  • provide full specification and design details

55
5 AES candidates
  • MARS (IBM)
  • RC6 (USA)
  • Rijndael (Belgium)
  • Serpent (Europe)
  • Twofish (USA)
  • Europe vs. USA
  • commercial vs. academic
  • US based ones were all of commercial origin

56
AES Evaluation Criteria
  • final criteria (used to select the winner)
  • general security
  • NIST relied on evaluation done by cryptographic
    community
  • software implementation performance
  • execution speed, performance across different
    platforms (8 to 64 bit platforms)
  • hardware implementation
  • not only timings, but also cost is important
  • especially for restricted space environments
    (such as smartcards)
  • implementation (timing and power) attacks

57
The AES Cipher - Rijndael
  • designed by Vincent Rijmen and Joan Daemen in
    Belgium (UCL)
  • has 128/192/256 bit keys, 128 bit block size
  • Characteristics
  • resistant against known attacks
  • speed and code compactness on many platforms
  • design simplicity

58
Modes of Operations
  • block ciphers encrypt fixed size blocks
  • DES and 3DES encrypt 64-bit blocks
  • AES uses 128-bit blocks
  • in practise, we have arbitrary amount of
    information to encrypt
  • we use DES, 3DES, AES and other symmetric ciphers
    in different modes in order to apply to several
    data blocks
  • NIST SP 800-38A defines 5 modes
  • can be used with any block cipher

59
Electronic Codebook (ECB) Mode
  • each block is encrypted independent of the other
    blocks
  • using the same key
  • not so secure for long messages due to
    repetitions in code

60
Cipher Block Chaining (CBC)
  • each previous cipher block is XORed with current
    plaintext
  • each ciphertext block depends on all previous
    blocks
  • need Initialization Vector (IV) known to sender
    receiver

61
Cipher Block Chaining (CBC)
  • Initialization Vector (IV)
  • both parties should agree on an IV
  • for maximum security, IV should be protected for
    unauthorized changes
  • Otherwise, attackers change in IV also changes
    the decrypted plaintext
  • lets see this on board

62
Cipher FeedBack (CFB)
  • Message is treated as a stream of bits
  • DES, AES (or any other block cipher) is used as a
    stream cipher
  • standard allows any number of bit, s, (1,8 or
    more until the block size) as the unit of
    encryption/decryption
  • But common value for s is 8.
  • Plaintext is divided into block of s bits.
  • uses IV
  • as all other stream ciphers
  • Result of encryption is fed back to the next
    stage
  • transmission errors propagate

63
Cipher FeedBack (CFB) Mode
Encrypt block for both encryption and decryption
64
Output FeedBack (OFB)
  • another stream mode
  • but, s-bit version does not exist anymore
  • Full block is used in the encyption and
    decryption
  • output of cipher is
  • XORed with the message
  • it is also the feedback
  • feedback is independent of transmission, so
    transmission errors do not propagate
  • same IV should not be used twice for the same key
    otherwise, when two ciphertext blocks are XORed
    the random sequence is cancelled and the attacker
    obtains XOR of two plaintexts
  • That is why IV is sometimes called as nonce
    (means "used only once")
  • Lets see if we have this problem in CFB mode as
    well.

65
Output FeedBack (OFB)
IV
Operations in dashed area can be performed a
priori before having plaintext/ciphertext
IV
Encrypt block for both encryption and decryption
66
Counter (CTR)
  • similar to OFB but encrypts counter value rather
    than any feedback value
  • For the same key, the counter value should not
    repeat
  • same problem as in OFB
  • efficient
  • can do parallel encryptions
  • Cryptographic part of the process (encryption
    blocks) is performed in advance of need
  • good for bursty high speed links

67
Counter (CTR)
Operations in dashed area can be performed a
priori before having plaintext/ciphertext
Encrypt block for both encryption and decryption
68
Random Numbers
  • Many uses of random numbers in cryptography
  • nonces in authentication protocols to prevent
    replay
  • session keys
  • public key generation
  • keystream for stream ciphers
  • Characteristics of random numbers
  • Statistical randomness
  • Uniform distribution of zeros and ones
  • Independence of the bits in the sequence
  • Unpredictability of future values from previous
    values
  • True random numbers provide these but very hard
    to obtain and use in practice

69
Pseudorandom Number Generators (PRNGs)
  • often use deterministic algorithmic techniques to
    create random numbers
  • although are not truly random
  • can pass many tests of randomness
  • known as pseudorandom numbers
  • created by Pseudorandom Number Generators
    (PRNGs)

70
Pseudorandom Number Generators (PRNG) and
Psuedorandom Functions (PRF)
  • Not much different
  • PRNG output is open-ended while PRF generates
    fixed size output
  • PRNG is mostly context independent while PRF is
    context dependent
  • Both may use feedback (there are some
    non-feedback ones too)
  • When used in a cryptographic operation, seed must
    be kept secret

71
PRNG/PRF Requirements
  • Randomness
  • Uniformity the occurrence of zeros and ones must
    be equally likely
  • Scalability any subseqeunce must pass randomness
    tests as well
  • Consistency must not be dependent on a
    particular seed value
  • Unpredictability
  • forward unpredictability (next bits cannot be
    learned using previous bits)
  • backward unpredictability (seed cannot be learned
    using PRN sequence)
  • There are some standard tests (total 15 of them)
    to check randomness and unpredictability (NIST
    SP800-22)
  • Characteristics of the seed
  • secure (i.e. must be kept secret and must not be
    guessed)
  • if known, adversary can determine output
  • so must be random or pseudorandom number (there
    are some other standard tests for seed randomness
    as well)

72
Linear Congruential Generator
  • Common iterative technique using
  • Xn1 (aXn c) mod m
  • X0 is the seed
  • Standard random number generator function for
    most programming languages
  • Given suitable values of parameters can produce a
    long random-like sequence
  • Suitable criteria to have are
  • function generates a full-period (all values
    between 0 and m-1)
  • generated sequence should appear random
  • Note that an attacker can reconstruct sequence
    given a small number of values
  • So, not a secure mechanism

73
Using Block Ciphers as PRNGs
  • for cryptographic applications, can use a block
    cipher to generate secure random numbers
  • often for creating session keys from master key
  • Standard methods
  • CTR
  • Xi EKVi
  • OFB
  • Xi EKXi-1
  • X0 EKV

(V, K) pair is the seed
74
Stream Ciphers
  • process the message bit by bit
  • Simply stating
  • a key and a Pseudo Random Number Generator
    (PRNG) is used to create a (pseudo) random key
    stream
  • keystream and the plaintext bitwise XORed to
    create the ciphertext
  • ciphertext is XORed with the same keystream to
    restore the plaintext

keystream
keystream
75
Some Stream Cipher Design Considerations
  • A PRNG should eventually repeat
  • long period makes cryptanalysis difficult
  • statistically randomness
  • e.g. approx. equal number of 0s and 1s
  • large enough key (128-bit would be good to guard
    against brute-force attacks)

76
Stream Ciphers
  • randomness of keystream destroys any statistical
    properties in the message
  • as in Vernam cipher and one-time pads
  • Better than block ciphers in terms of
  • code space (implementations are simple)
  • throughput (faster per bit en/decryption)
  • but must never use the same keystream more than
    once
  • otherwise the cryptanalyst can XOR two ciphertext
    streams and find out XOR of two plaintext streams
  • not so difficult to crack

77
Stream Ciphers
  • are useful if data are transferred as a stream
  • web browser
  • voice
  • video
  • actually any block cipher can be used as a stream
    cipher
  • CFB mode of operation (and OFB and CTR )

78
RC4
  • Rons Code 4
  • Yet another cipher designed by Ron Rivest
  • owned by RSA Inc.
  • was kept as a trade secret, but in 1994
    anonymously posted on the Internet
  • variable key size, byte-oriented stream cipher
  • simple but effective
  • 8 to 16 machine operations per output byte
  • widely used (SSL/TLS, WEP/WPA)
  • Some attacks reported, but not so practical for
    key size greater than 128-bit
  • However, WEP has a problem due to RC4 key
    generation
  • not a problem of RC4 in particular

79
and other symmetric ciphers
  • CAST
  • Skipjack
  • Serpent
  • Twofish
  • Camellia
  • RC6
  • Mars
  • SAFER

80
Discussion on Secure Key Length
  • Different academics and organizations propose
    different approaches - see https//www.keylength.
    com/
  • NIST (2016) https//nvlpubs.nist.gov/nistpubs/Spec
    ialPublications/NIST.SP.800-57pt1r4.pdf
  • lt112 bits shall not be used for encryption, but
    can still be used for legacy applications to
    decrypt already encrypted data.
  • 112-bit 3DES is good enough until 2030, but
    beyond that it should be used only for legacy
    applications for decryption.
  • AES key sizes (128, 192, 256) are good until 2030
    and also beyond.
  • ECRYPT (A European Network of Excellence on
    Crypto) (2018) http//www.ecrypt.eu.org/csa/docume
    nts/D5.4-FinalAlgKeySizeProt.pdf
  • A bit more conservative than NIST
  • Mostly analyze algorithms rather than key lengths
  • DES is not to be used whatsoever 3DES, KASUMI,
    Blowfish can be used for legacy reasons but not
    to be used for new applications.
  • AES and some other ciphers are good for today and
    future use.
  • Bottomline Use AES key length does not matter
    too much.
Write a Comment
User Comments (0)
About PowerShow.com