Thursday, May 23, 2019

Contemporary Symmetric Ciphers

Jordan University of Science and Technology Computer Engineering Department Cryptography & Network Security CPE (541) HW5 present-day(a) Symmetric Ciphers (Double-DES, Triple-DES & Blowfish) Supervised by Dr Loai Tawalbeh Eng. Sulaiman Al-Basheer Simsam R. Hijjawi 20022171043 Review Problems 6. 1 What is the triple encryption? It is a triplet-stages encryption with three different keys, to avoid costly requirements arises from apply three different keys with total length of 356 = 186 bits a triple encryption with two keys maybe used. 6. 2 What is the meet in the middle blast?Its that fight doesnt depend on any particular property of the DES, instead, it will work against any type of block ciphers. For the double-DES cipher & a given (P,C) pair, this fervidness works as follow 1. Encrypt the plaintext P with all possibilities of K1, store the results in a table, & sort that table by the value of X. 2. Decrypt C with all possible values of K2, check each resulted value with the e ntries in the table, in case of match, check these two keys against another known pair (P1,C1), if match, remove them as the correct keys. 6. Why is the middle hazard of 3DES is a decryption rather than an encryption ? 1. Its a decryption process in order to salmagundi the traditional nature of the DES, if its an encryption, itll stay a DES but with longer key size. 2. In the cryptography, there is no significance of using the decryption in the middle stage, the only advantage of doing so is to allow users of 3DES to decrypt data encrypted by the users of the older single DES ( C = Ek1Dk2Ek1P = Ek1P. Suppose that the middle portion is decryption instead of encryption, ( C = Ek1Ek2Ek1PThe previous assumption in comparability 1 will not be ever met. On the other perish 3. If an encryption process is done instead of decryption the meet-in-the-middle attack becomes possible. 6. 6 What primitive operations are used in Blowfish? adjunct Addition the words, it is performed modulo 23 2. Bitwise exclusive-OR. Problems 6. 1 For the two design cominges introduced in the textbook, which is the preferred in the followings Note the suggested block cipher in my considerations below is DES. security. The single loop league access code single CBC loop is to a greater extent secure, this is because the EDE block contains the encryption function C = E k1D k2Ek1P without simplifications, this makes the cryptanalysis resembling derivative instrument attack more difficult than doing it on a simple loop with encryption or decryption process because each loop in the second approach appears like a simple DES that may be attacked alone in a chosen plain-text attack i. e. differential attack. performance.The second 3 simple approach is the preferred from the performance wise point of view, this is because each block in each loop contains either encryption or decryption processes so it is red-hot than the first approach. But as I mentioned above, it is more vulnerable to cr yptanalysis than the first approach because each loop is a single DES with differential attack possibility. We can also distinguish between the two approaches based on error propagation. 6. 2 Can you suggest security improvements to either option, using three DES chips & some number of XOR functions? comport you are still limited to two keys.Changing the mode sounds a good solution 1. For the first approach that contain only a single independent loop, using Counter mode seems to be simpler, because we deal with counters that less longer than plain texts & have no linear or statistical relationship, this may increase the performance of the 3DES in this case. 2. For the second approach, the dependency between stages prevents using the counter mode as an enhancement, a more secure mode is required in this case, using the CFB may eliminate the possibility of differential cryptanalysis because chosen plain text attack is not worth. . 4 Demonstrate that the blowfish decryption is the inv erse of the blowfish encryption. Taking in consideration the following The decryption process is applied in the same direction as the encryption but with reverse order use of the sub keys. Encryption 1. Assume the following plain text P with E-PL0 & E-PR0 portions. 2. After the ith round, the output of that round will be E-PRi = E-PLi Xor Pi (1) E-PLi = F E-PRi Xor E-PRi-1 (2) 3. The cipher text will be E-PR17 = E-PL16 Xor P18 E-PL17 = E-PR16 Xor P17 C = E-PR17 + E-PL17+ sign is a mountain chainIt will be the input of the decryption algorithm which is the same as the encryption algorithm but with reverse order key fashion. Decryption 1. Assume the following cipher text C with D-CL0 & D-CR0 portions. 2. After the ith round, the output of that round will be D-CRi = D-CLi Xor P19-I . (3) D-CLi = F D-CRi Xor D-CRi-1 . (4) 3. the outputs of equation 1 & equation 3 and equation 2 & equation 4 are the same for each round, this implies the reversibility in the blowfish algorithm betw een the encryption & the decryption algorithms.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.