CH02-CompSec4e
CH02-CompSec4e
Principles and
Practice
Fourth Edition, Global Edition
Cryptographic Tools
Symmetric Encryption
• The universal technique for providing
confidentiality for transmitted or stored data
• Also referred to as conventional encryption or
single-key encryption
• Two requirements for secure use:
• Need a strong encryption algorithm
• Sender and receiver must have obtained copies
of the secret key in a secure fashion
and must keep the key secure
Attacking Symmetric
Encryption
Cryptanalytic Attacks Brute-Force Attacks
● Rely on:
● Try all possible keys on some
● Nature of the algorithm ciphertext until an intelligible
● Some knowledge of the translation into plaintext is
general characteristics of the obtained
plaintext ● On average half of all
possible keys must be tried to
● Some sample plaintext- achieve success
ciphertext pairs
● Exploits the characteristics of
the algorithm to attempt to
deduce a specific plaintext or
the key being used
● If successful all future and past
messages encrypted with that
key are compromised
Table 2.1
Strength concerns:
• Concerns about the algorithm itself
•DES is the most studied encryption
algorithm in existence
• Concerns about the use of a 56-bit
key
•The speed of commercial off-the-shelf
processors makes this key length woefully
inadequate
Table 2.2
Significantly
3DES was not improved efficiency
Published as
reasonable for
long term use FIPS 197
Symmetric block
cipher
Stream Cipher
• Processes the input elements continuously
• Produces output one element at a time
• Primary advantage is that they are almost always faster
and use far less code
• Encrypts plaintext one byte at a time
• Pseudorandom stream is one that is unpredictable
without knowledge of the input key
Message
Authentication
Protects against
active attacks
Can use
•Only sender and receiver
conventional share a key
encryption
Message Authentication
Without Confidentiality
• Message encryption by itself does not provide a secure
form of authentication
• It is possible to combine authentication and confidentiality
in a single algorithm by encrypting a message plus its
authentication tag
• Typically message authentication is provided as a separate
function from message encryption
• Situations in which message authentication without
confidentiality may be preferable include:
• There are a number of applications in which the same message is broadcast to
a number of destinations
• An exchange in which one side has a heavy load and cannot afford the time to
decrypt all incoming messages
• Authentication of a computer program in plaintext is an attractive service
Cryptanalysis Passwords
•Exploit logical •Hash of a password is
weaknesses in the stored by an operating
algorithm system
Computationally
Useful if either key easy for sender
can be used for knowing public key
each role to encrypt
messages
Computationally Computationally
infeasible for easy for receiver
opponent to knowing private key
otherwise recover to decrypt
original message ciphertext
Computationally
infeasible for
opponent to
determine private
key from public key
Asymmetric Encryption
Algorithms
RSA (Rivest, Shamir, Developed in 1977
Most widely accepted and Block cipher in which the plaintext and
implemented approach to public-key
ciphertext are integers between 0 and
Adleman) encryption n-1 for some n.
Numbers algorithms
● Stream key for
symmetric stream
Uses include cipher