Answered You can hire a professional tutor to get the answer.

QUESTION

There are two types of ciphers - Block and Stream. Block is used to encrypt a block of bits at one time. Stream cipher is used to encrypt one bit at a time. Modes of CiphersUnderstanding ModesElectro

There are two types of ciphers - Block and Stream. Block is used to encrypt a block of bits at one time. Stream cipher is used to encrypt one bit at a time. Modes of CiphersUnderstanding ModesElectronic Code Book (ECB) ModeThis mode is a most straightforward way of processing a series of sequentially listed message blocks.OperationThe user takes the first block of plaintext and encrypts it with the key to produce the first block of ciphertext.He then takes the second block of plaintext and follows the same process with same key and so on so forth.The ECB mode is deterministic, that is, if plaintext block P1, P2,…, Pm are encrypted twice under the same key, the output ciphertext blocks will be the sameCipher Block Chaining (CBC) ModeCBC mode of operation provides message dependence for generating ciphertext and makes the system non-deterministic.OperationThe operation of CBC mode is depicted in the following illustration. The steps are as follows −Load the n-bit Initialization Vector (IV) in the top register.XOR the n-bit plaintext block with data value in top register.Encrypt the result of XOR operation with underlying block cipher with key K.Feed ciphertext block into top register and continue the operation till all plaintext blocks are processed.For decryption, IV data is XORed with first ciphertext block decrypted. The first ciphertext block is also fed into to register replacing IV for decrypting next ciphertext block.Output Feedback (OFB) ModeIt involves feeding the successive output blocks from the underlying block cipher back to it. These feedback blocks provide string of bits to feed the encryption algorithm which act as the key-stream generator as in case of CFB mode.The key stream generated is XOR-ed with the plaintext blocks. The OFB mode requires an IV as the initial random n-bit input block. The IV need not be secret.Counter (CTR) ModeIt can be considered as a counter-based version of CFB mode without the feedback. In this mode, both the sender and receiver need to access to a reliable counter, which computes a new shared value each time a ciphertext block is exchanged. This shared counter is not necessarily a secret value, but challenge is that both sides must keep the counter synchronized.OperationBoth encryption and decryption in CTR mode are depicted in the following illustration. Steps in operation are −Load the initial counter value in the top register is the same for both the sender and the receiver. It plays the same role as the IV in CFB (and CBC) mode.Encrypt the contents of the counter with the key and place the result in the bottom register.Take the first plaintext block P1 and XOR this to the contents of the bottom register. The result of this is C1. Send C1 to the receiver and update the counter. The counter update replaces the ciphertext feedback in CFB mode.Continue in this manner until the last plaintext block has been encrypted.The decryption is the reverse process. The ciphertext block is XORed with the output of encrypted contents of counter value. After decryption of each ciphertext block counter is updated as in case of encryption.(Tutorial.com) Weakness of DES cipherThe launch a brute force on DES, the attacker would need to search 2^56 keys. That is a search for a needle in a haystack of 72 quadrillion straws. In 1977 that was considered an impossible computational task. In 1999 a special-purpose DES search engine combined with 100,000 personal computers on the Internet to find a DES challenge key in 22 hours. FIPS 46-3, Data Encryption Standard (DES), was withdrawn on May 19, 2005 because the cryptographic algorithm no longer provided the security that is needed to protect Federal government information. DES is no longer an Approved algorithm. It was replaces temporarily by 3DES and later by AES Applying CBC ModeCBC-ModeCBC mode for DES -->1. Generation of an Initial Vector (Called an IV).(there is a few steps here that I am skipping for simplicity)2. This IV is XOR with the Clear Text3. The resulting ciphered text is used as the seed to generate the next encryption key for the next block. Course ProjectFor this project, you will need to pick a CURRENT topic in Cryptography and proposed a 5-page research paper. You paper will consist of an introduction, a literature review, a methodology and a result. Submit your proposal in the drop box. Galois Finite FieldGalois Fields or Finite FIeldsGalois FieldsSupposed we look at three numbers like 6 3 9 (IN THE DECIMAL BASE)If we look at these types of numbers as a decimal value, it is six hundred and thirty nine…right?SO, it is 6 X 10^2 3 X 10^1 9 X 10^0 = 600 30 9 = 639IN BINARY BASE101010111X2^7 0X2^6 1X2^5 0X2^4 1X2^3 0X2^2 1X2^1 1X2^0Remember X^0 = 1128 0 32 0 8 0 2 1 = 171SO FAR…SO GOODLet’s expand this concept moreLet’s consider the number 5 7 2 (Still decimal)Based on what we learned above 572--> 5X^2 7X^1 2X^0BUT HERE IS THE WRENCH IN GALOIS FIELDSuppose we are adding 5 7 2 6 7 3We are looking at this in the DECIMAL SPACE5 7 26 7 3You start with 2 3 = 5 (right!)Now let focus on the 7 7 = 14 -->you must now drop the 1 and keep the 4. We do not carry over the 1Same thing with the 5 6 = 11 -->you must now drop the 1 and keep the 1. We do not carry over the 1The answer is5 7 26 7 31 4 5 -->HA! (This is the trick)Well, we would never use BASE 10 in Galois field, we would use a Prime numbersSuppose we take the binary number1 0 1 1 0 1 0 1 -->State of your clear text (One byte)1 0 0 1 1 0 1 1 -->KEYRemember here 1 1 = 2 but in base 2 and Galois field, this is equal to 0 (suppose you were looking at 5 5 = 10 à You would drop the 1 and keep the 0.1 0 1 1 0 1 0 11 0 0 1 1 0 1 10 0 1 0 1 1 1 0THINK OF THIS AS AN XOR 00 1 --> 11 0 --> 11 1 --> 0I THINK WE HAVE THE ADDITION UNDER CONTROL -- Right? DOT MATRIXWe know what PRODUCTS are. Now I am adding something new called DOT PRODUCTS. Well, a dot product applies to VECTORS. Well, what are Vectors?Think of a vectors as a set of numbers ( 6 7 2) - > this is a vector with 3 elements. Remember, MATRIX from college algebra and your high school teacher told you to remember MATRIX and you will see it again, well, today is the day. A VECTOR can be a ROW or a COLUMN of a MATRIX.If this make sense, I am ready to define DOT PRODUCT ProductPRODUCT (not DOT Product)MULTIPLICATION IN GALOIS FIELDSuppose we need to multiply two POLYNOMIALS(x^5 X^3 X^2 X^1) times (X^4 X^3 X^2)What do you usually do in Algebra?X^5(X^4 X^3 X^2) X^3(X^4 X^3 X^2) X^2(X^4 X^3 X^2) X^1(X^4 X^3 X^2)THIS IS A LOT OF WORKLet’s try again(x^5 X^3 X^2 X^1) times (X^4 X^3 X^2) 23411 2 = 31 3 = 41 4 = 522 2 = 42 3 = 52 4 = 633 2 = 53 3 = 63 4 = 755 2 = 75 3 = 85 4 = 9 Now it gets trickyWe need to count the numbers (SUM)How many 9s? -> 1 (do not touch)How many 8s? -> 1 (do not touch)How many 7s? -> 2 -> NOW MODULUS 2 (binary) -> 0(Think of it this way -> if your count is EVEN, it becomes Zero and if it is ODD, the count is 1)How many 6s? -> 2 (even) -> 0How many 5s? -> 3 (odd) -> 1How many 4s? -> 2 (even) -> 0How many 3s? -> 1 (odd) -> 1How many 2s? -> 0 (even) -> 0REMEMBER WHERE WE STARTED:(x^5 X^3 X^2 X^1) times (X^4 X^3 X^2)I am going to REWRITE(1X^5 0X^4 1X^3 1X^2 1X^1 0X^0) times (0X^5 1X^4 1X^3 1X^2 0X^1 0X^0)REMEMBER the underlined portions are ZEROsNOW, WE ARE GOING TO READ THE COEEFICIENTS(1 0 1 1 1 0) times ( 0 1 1 1 0 0 ) = 0 1 0 1 0 0 0 (THIS IS WHAT YOU HAVE ABOVE)I USED THIS EXAMPLE RANDOMLY BUT WE WANT TO LIMIT EVERYTHING TO ONE BYTE. IN OUR EXAMPLE, WE ARE GOOD SINCE WE HAVE LESS THAN 8 BITS BUT WHAT IF THE RESULT WAS BIGGER THAN 8 BITS.What if our product was – 10101010100? This is bigger than one byte and it would not fit. FOR AES WE WANT EVERYTHING TO FIT IN ONE BYTE (One character).NOW we have to perform a Polynomial Reduction in Galois FIELD.THE MAGIC AND THE FACINATING PART OF THE ALGORITHM IS TO DIVIDE BYX^8 X^4 X^3 X^1 X^0 ( I am not sure how they came up with this polynomial - they are genius)REWRITING -> 1X^8 0X^7 0X^6 0X^5 1X^4 1X^3 0X^2 1X^1 1X^0Remember LONG DIVISION - We are going to use it in the next section. THE AMAZING REDUCTIONTHE AMAZING REDUCTIONLet me see how to do the reduction.Let start with1010101010100

Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question