Lecture 3: Modern Ciphers (DES)
Focus on Data Encryption Standard (DES) as a modern cipher for securing messages in cyber security.
Block Cipher vs Stream Cipher
Block Ciphers:
Process messages in blocks (64 bits or more).
Each block undergoes separate en/decryption.
Stream Ciphers:
Process messages one bit or byte at a time.
Current focus of the course is on block ciphers.
Introduction:
Most modern block ciphers operate on the Feistel structure devised by Horst Feistel.
Input block is split into two halves.
Process:
Multiple rounds of processing:
Substitution is performed on the left half based on a round function of the right half and a subkey.
Halves are permuted and swapped.
Implements Shannon’s substitution-permutation concept.
Illustration of the class Feistel network with multiple rounds.
Structure of Feistel includes:
Initial splitting, multiple rounds, function application, and final permutation.
Security Factors:
Block Size: Larger sizes enhance security.
Key Size: Increased key length improves security.
Number of Rounds: More rounds contribute to security.
Subkey Generation Algorithm: Complexity increases resistance to cryptanalysis.
Speed: Efficient execution of encryption/decryption methods is critical.
Recognition:
Most popular encryption scheme, especially in financial applications.
Referred to as Data Encryption Algorithm (DEA).
Parameters:
Processes plaintext in 64-bit blocks.
Uses a 56-bit key.
Overview:
DES uses initial permutation, key sub-keys through rounds, and final output permutation.
Process Details:
Initial Permutation rearranges bits before rounds begin.
Each round involves key mixing, substitutions through S-boxes, and permuting.
Functionality:
Each of the 8 S-boxes maps 6 bits to 4 bits, crucial for the substitution step.
Inputs are determined by both current data and key.
The process includes:
Inputting data into the S-boxes.
Each S-box returns a specific output based on the applied inputs.
Collectively, the outputs from all boxes create a single 32-bit block used in further permutations.
Key Generation:
Key scheduling involves the initial permutation to derive subtasks.
Process is repeated for 16 rounds to maintain security.
Similar to Encryption:
Utilizes the same algorithm but with sub-keys applied in reverse order (K16...K1).
Weaknesses:
56-bit key is vulnerable; advances in technology shortened expected break time.
Solutions:
Double DES and Triple DES enhance security by applying the encryption process multiple times.
Different Modes:
Electronic Codebook (ECB): Encrypts data in independent blocks,
Cipher Block Chaining (CBC): Links blocks for enhanced security.
Cipher Feedback (CFB): Treats data as a stream, allowing feedback.
Output Feedback (OFB): Allows stream encryption over unreliable channels.
Counter Mode (CTR): Encrypts counter instead of data feedback, suitable for high-speed networks.
DES serves as a foundational learning step for understanding modern cryptography and its applications in cyber security.