Saturday, August 31, 2019
Contemporary Symmetric Ciphers
Jordan University of Science and Technology Computer Engineering Department Cryptography & Network Security CPE (541) HW#5 Contemporary Symmetric Ciphers (Double-DES, Triple-DES & Blowfish) Supervised by: Dr Loai Tawalbeh Eng. Sulaiman Al-Basheer Simsam R. Hijjawi 20022171043 Review Problems: 6. 1 What is the triple encryption? It is a three-stages encryption with three different keys, to avoid costly requirements arises from using three different keys with total length of 3Ãâ"56 = 186 bits a triple encryption with two keys maybe used. 6. 2 What is the meet in the middle attack?It's that attack doesn't depend on any particular property of the DES, instead, it will work against any type of block ciphers. For the double-DES cipher & a given (P,C) pair, this attack works as follow: 1. Encrypt the plaintext P with all possibilities of K1, store the results in a table, & sort that table by the value of X. 2. Decrypt C with all possible values of K2, check each resulted value with the en tries in the table, in case of match, check these two keys against another known pair (P1,C1), if match, accept them as the correct keys. 6. Why is the middle portion of 3DES is a decryption rather than an encryption ? 1. It's a decryption process in order to change the traditional nature of the DES, if it's an encryption, it'll stay a DES but with longer key size. 2. In the cryptography, there is no significance of using the decryption in the middle stage, the only advantage of doing so is to allow users of 3DES to decrypt data encrypted by the users of the older single DES ( C = Ek1[Dk2[Ek1[P]]] = Ek1[P]. Suppose that the middle portion is decryption instead of encryption, ( C = Ek1[Ek2[Ek1[P]]]The previous assumption in equation 1 will not be ever met. On the other hand 3. If an encryption process is done instead of decryption the meet-in-the-middle attack becomes possible. 6. 6 What primitive operations are used in Blowfish? â⬠¢ Addition: Addition the words, it is performed modulo 2^32. â⬠¢ Bitwise exclusive-OR. Problems: 6. 1 For the two design approaches introduced in the textbook, which is the preferred in the followings: Note: the suggested block cipher in my considerations below is DES. security. The single loop compact approach ââ¬Å"single CBC loopâ⬠is more secure, this is because the EDE block contains the encryption function C = E k1[D k2[Ek1[P]]] without simplifications, this makes the cryptanalysis like differential attack more difficult than doing it on a simple loop with encryption or decryption process because each loop in the second approach appears like a simple DES that may be attacked alone in a chosen plain-text attack i. e. differential attack. ââ¬â performance.The second 3 simple approach is the preferred from the performance wise point of view, this is because each block in each loop contains either encryption or decryption processes so it is faster than the first approach. But as I mentioned above, it is more vulne rable to cryptanalysis than the first approach because each loop is a single DES with differential attack possibility. We can also distinguish between the two approaches based on error propagation. 6. 2 Can you suggest security improvements to either option, using three DES chips & some number of XOR functions? Assume you are still limited to two keys.Changing the mode sounds a good solution: 1. For the first approach that contain only a single independent loop, using Counter mode seems to be simpler, because we deal with counters that less longer than plain texts & have no linear or statistical relationship, this may increase the performance of the 3DES in this case. 2. For the second approach, the dependency between stages prevents using the counter mode as an enhancement, a more secure mode is required in this case, using the CFB may eliminate the possibility of differential cryptanalysis because chosen plain text attack is not worth. . 4 Demonstrate that the blowfish decryption is the inverse of the blowfish encryption. Taking in consideration the following: The decryption process is applied in the same direction as the encryption but with reverse order use of the sub keys. Encryption: 1. Assume the following plain text P with E-PL0 & E-PR0 portions. 2. After the ith round, the output of that round will be E-PRi = E-PLi Xor Pi â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦ (1) E-PLi = F [E-PRi] Xor E-PRi-1 â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦ (2) 3. The cipher text will be: E-PR17 = E-PL16 Xor P18 E-PL17 = E-PR16 Xor P17 C = E-PR17 + E-PL17â⬠³+ sign is a concatenationâ⬠It will be the input of the decryption algorithm which is the same as the encryption algorithm but with reverse order key fashion. Decryption: 1. Assume the following cipher text C with D-CL0 & D-CR0 portions. 2. After the ith round, the output of that round will be D-CRi = D-CLi Xor P19-I â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦. (3) D-CLi = F [D-CRi] Xor D-CRi-1 â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦. (4) 3. the outputs of equation # 1 & equation # 3 and equation # 2 & equation # 4 are the same for each round, this implies the reversibility in the blowfish algorithm between the encryption & the decryption algorithms.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.