Module 2 Symmetric Des Aes
Module 2 Symmetric Des Aes
Outline
Background and History of DES
Overview of DES
Double and Triple DES
Security of DES
1. Background and History of DES (1)
Output
Background and History of DES (2)
1972 - NBS calls for proposals for a public crypto
system
Criteria:
Highly secure / easy to understand / publishable /
available to all / adaptable to diverse app’s /
economical / efficient to use / able to be validated /
exportable
In truth: Not too strong (for NSA, etc.)
Outline
2F.1. The AES Contest
2F.2. Overview of Rijndael
2F.3. Strength of AES
2F.4. Comparison of DES and AES
2F.1. The AES Contest (1)
(Nat’l Institute of
1997 – NIST calls for proposals NIST
Standards and Technology)
Criteria:
Unclassifed code
Publicly disclosed
Royalty-free worldwide
Symmetric block cipher for 128-bit blocks
Usable with keys of 128, 192, and 256 bits
Adopted by US gov’t as
Federal Info Processing Standard 197 (FIPS
197)
2F.2. Overview of Rijndael/AES
Similar to DES – cyclic type of approach
128-bit blocks of P
# of iterations based on key length
128-bit key => 9 “rounds” (called rounds, not
cycles)
192-bit key => 11 rounds
256-bit key => 13 rounds
Basic ops for a round:
Substitution – byte level (confusion)
Shift row (transposition) – depends on key length
(diff.)
Mix columns – LSH and XOR (confusion
+diffusion)
2F.3. Strengths of AES
Not much experience so far (since 2001)
But:
Extensive cryptanalysis by US gov’t and
independent experts
Dutch inventors have no ties to NSA or
other US gov’t bodies (less suspicion of
trapdoor)
Solid math basis
Despite seemingly simple steps within rounds
2F.4. Comparison of DES & AES (1)
DES AES
Date 1976 1999
Block size [bits] 64 128
Key length [bits] 56 (effect.) 128, 192, 256, or more
Encryption substitution, substitution, shift, bit
Primitives permutation mixing
Cryptographicconfusion, confusion,
Primitives diffusion diffusion
Design open open
Design closed open
Rationale
Selection secret secret, but accepted
process public comments
Source IBM, enhan-independent Dutch
ced by NSA cryptographers
Comparison of DES & AES (2)
Weaknesses in AES?
20+ yrs of experience with DES eliminated fears
of its weakness (intentional or not)
Might be naïve…
Experts pored over AES for 2-year review period
Comparison of DES & AES (3)
Longevity of AES?
DES is nearly 30 yrs old (1976)
DES-encrypted message can be cracked in days
Longevity of AES more difficult to answer
Can extend key length to > 256 bits (DES:
56)
2 * key length => 4 * number of keys
Can extend number of rounds (DES: 16)
Extensible AES seems to be significantly better
than DES, but..
Human ingenuity is unpredicatble!
=> Need to incessantly search for better and
better
Advanced Encryption Standard