Chapter2 Flashcards
- The universal technique for providing confidentiality for transmitted or stored data
- Also referred to as conventional encryption or single key encryption
Symmetric Encryption
Two requirements for secure use:
- Need a strong encryption algorithm
- Sender and receiver must have obtained copies of the secret key in a secure fashion and must keep the key secure
Two ways to attack Symmetric Encryption
- Cryptanalytic Attacks
- Brute Force Attack
Cyptanalytic Attacks rely on:
- Nature of the algorithm
- Some knowledge of the general characteristics of the plaintext
- Some sample plaintext-cipertext pairs
exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or the key being used
Crytanalytic Attacks:
Brute-force attack
Try all possible keys on some ciphertext until an intelligible translation into plaintext is obtained
Data Encryption Standard (DES)
- The most widely used encryption scheme
- Most studied encryption algorithm in existence
DES strength concerns:
- concerns about algorithm
- Uses 56-bit key
- EFF(Electronic Frontier foundation) announced in July 1998 that it had broked a DES encryption
Triple DES (3DES)
- Repeats basic DES algorithm three times using either two or three unique keys
- First standardized for use in financial applications in ANSI standard X9.17 in 1985
Attractions in 3DES
- 168-bit key length overcomes the vulnerability to brute-force attack of DES
- Underlying encryption algorithm is the same as in DES
Drawback of 3DES
- Algorithm is sluggish in software
- Uses a 64-bit block size
Advanced Encryption Standard (AES)
- have security strength equal to or better than 3DES
- improved efficiency
- symmetric block cipher
- 128 bit data and 128/192/256 bit keys
- Published as FIPS 197
- Rijndael
Practical Security Issues:
- Typical symmetric encryption is applied to a unit of data larger than a single 64-bit or 128-bit block
- Electronic codebook (ECB) mode is the simplest approach to multiple-block encryption which is not secure
- Modes of operation instead of ECB
Electronic CodeBook (ECB)
- Each block of plaintext is encrypted using the same key
- Cryptanalyst may be able to exploit regularities in the plaintext
Modes of operation
- Alternative technique to increase security
- overcame weakness of ECB