Lecture 5
Lecture 5
LECTURE 5
Computer Security
Technologies and Principles
The universal technique for providing
SYMMETRIC confidentiality for transmitted or
ENCRYPTION stored data is symmetric encryption.
SYMMETRIC ENCRYPTION
• Plaintext: This is the original message or data that is fed into the algorithm as input.
• Encryption algorithm: The encryption algorithm performs various substitutions and
transformations on the plaintext. Secret key: The secret key is also input to the
encryption algorithm. The exact substitutions and transformations performed by the
algorithm depend on the key.
• Ciphertext: This is the scrambled message produced as output. It depends on the
plaintext and the secret key. For a given message, two different keys will produce two
different ciphertexts.
• Decryption algorithm: This is essentially the encryption algorithm run in reverse. It
takes the ciphertext and the secret key and produces the original plaintext.
Attacks on symmetric encryption scheme
• The most commonly used symmetric encryption algorithms are block ciphers.
• A block cipher processes the plaintext input in fixed-size blocks and produces a block
of ciphertext of equal size for each plaintext block.
• The algorithm processes longer plaintext amounts as a series of fixed-size blocks.
• The most important symmetric algorithms, all of which are block ciphers, are the Data
Encryption Standard (DES), triple DES, and the Advanced Encryption Standard (AES).
Symmetric Block Encryption Algorithms
MESSAGE AUTHENTICATION AND HASH FUNCTIONS
• One authentication technique involves the use of a secret key to generate a small
block of data, known as a message authentication code, that is appended to the
message. This technique assumes that two communicating parties, say A and B, share
a common secret key KAB.
• When A has a message to send to B, it calculates the message authentication code as
a complex function of the message and the key: MACM=F(KAB, M).
• The message plus code are transmitted to the intended recipient. The recipient
performs the same calculation on the received message, using the same secret key, to
generate a new message authentication code. The received code is compared to the
calculated code
ONE WAY HASH FUNCTION
• An alternative to the message authentication code is the one-way hash function. As with the
message authentication code, a hash function accepts a variable-size message M as input and
produces a fixed-size message digest H(M) as output.
• The length field is a security measure to increase the difficulty for an attacker to produce an
alternative message with the same hash value.
• Unlike the MAC, a hash function does not take a secret key as input.
• The message digest can be encrypted using symmetric encryption; if it is assumed that only the
sender and receiver share the encryption key, then authenticity is assured. The message digest
can also be encrypted using public-key encryption.
• The public-key approach has two advantages: It provides a digital signature as well as message
authentication, and it does not require the distribution of keys to communicating parties.
HASH FUNCTION REQUIREMENTS