Crypingrephiy and Network security
UNIT-1 ' .
| PART-A: Banic principles .
\. Security goals
R. Cayplo graphic ailacks
3. senvies amd mechanism -
4. Mateemabis of Cryptography”
a& Snleque , ‘
be attematic |
¢ extended Euckedian Algonifm.
a. Modulan Aniiermaltt -
e- Morice:
$ Limcae Conquuence
PARI-8 = Symmetric Encuyption
1. okemokcs Of symmebic key Cryploqrapy -
a. Aigeinoie shuclunes:
Group
| Ring
| ds Field,
e. GF Ca") Field.
2. Jnbodsuckon ko Modren symimekric. teuy ciphers:
a Modren Glock. ciphwus Erengption
| b: tompontnts of Modver Block ciphers:
ce wd choses of product ciphers
& Atlatks daxignid par block, cipro
© stream ciphuus :
3. DES Coala Encupstion stendarda: HistoTy of DES
b- Des shuctwie
ec. DES anolyvis
a: Securely of DES
e Mulkipl. DES.
a Advanced Encryption | standard CAES)
a:
b-
e
qd
e
History of AES
“Proms for malay ured by "AES
Kay expamsioye
AES ciphur-
, Avaliysts, of AESUNITS) = ,
PART-A* Baric principles * as ‘
"1. Secumihy Gols. |
The. secuvity goals Ma Network axe. caleqoniged imibo
Three. dypos ie one
| I confidentiality
2. Imtequlty :
3 Maley Cpbtare - r | =
1 comfédentioli
—5 Gh reloles % protect) the reformation by riding “Whe
content from unawlfowdzed waiter
=> comAden aly is applied while storing he rofrimalion
and also applied dwiing We Tpamamission | of enfermalien
| 2 Snkeqruliy : ‘
— When we cl oy wm ‘Re MMermdlion are bo be done ~
“conviantly > $ howd be dime only by Wie, auifounized *
VRS process Lends Jo dnheqriby -
13 Availability :
(We inbomolum whith wcrealed and, stored by am ©
“ exgonizadbione ru be made available fo De outrourited
Evetiby -
a Cruplogaaphic obec. |
Whe cryptoopaphic allacks ave categorized mto 400 |
Hyp Whey are
r 1, 4 creyph - analiptt. ableucks:
aN Supt choalie atlocks ”Lo
bCryph- Analyte oblacks :
> Ware atlcks uses sdatistical omd vatgebraic dechniques
along wilh a secrel Key of he cipher, text.
—? ‘Ihe. Objective of the cayplanabytics C crypt -aneliysis ) e
to find “AUG propeshes of he ciphwe Jext-
> Wc obkackerr A00kS “for MU distinquished propery a
| quuosses De Kty which iw appdied oa the cipher ‘Tex
| most of The cryptanaljhe aliacks ws divide omd.
| CoNqULIL Poliay. “which, yedeces Re complexity: OF quessing
Jhe Key, which linds to Brake Force attack:
2 now-Cryptonalylic atiucks : :
> The ron-cryglonaly He allacks yeomly
Confidential , imtegrity and availabitily
— The confidantialily freaks ore Snooping a
emolysis, hoes
— The inequity vhreals axe modt
seplaying ana vepudiokion. _—
ailability “Wreok v daniol of sovie :
refers to unauthorized occews ot intersection]
focus oF whe
nd Wathic
Ricolion + manque reading »
— We, 0N
> snooping :H
Se peas ye i naon wy ig
| he. online WORe He tee nea
5 Moditiealion © Aktot Acceing fe rakermesion The allacker
motlifies The information for bs benefit r
> masque Gadurg : gle AML proces of impersinake ‘Some one
ue ity the oftackex Meals the ob cand wrtber amd
pin from a persow and pretend “hinwell fruwclh cu o
Castor: 7LR ‘ =
eplaying : Th ailackor obtain o copy Of & MeMage uptel
by O uner and Soler tie AO wre Sat massage
+ Repudiation: Jk» Performed by Two, pares during communication
une To ORs ow sender and Rctiver wWhuU “hey Sometimes
do aot acctpt Ia Arampackion + !
Loenial of sewvite : Fe Denicl of sewice U& very common allack|
whuw wer Yequayts are not accipted by a senver -
3B Sewias and Michanism - .
Seovtity Senvices and secuxily Mechanisms ow provided, by
“tyu-7" (Srtemational Telicemmunication union fer,
Telecommunicalionw Sector ) Qo
Secwnly Servier : j i
“Tha Secuvilly Senvids ane defined by TTU-T (x, 800)
The Securily cenvills ae calegoni zed ints 5 types. Theey a
w fate confidentiality
ay deden Snteqpily
@) Awltenticodiov
un Non - Repudiadion.
(5) Accetss control
(ala. coder: yng
| Ty tw used to protect the dota amd. prevent snooping. -
[Wher preventing, discloumew of ofamalion 40 unautioon! Fed
[pasties vy weeded » Wr properby of compid entioity is requited-
qo provide confjclontiallity ihe cryptoqvaphic algolGnr and
mode of operation needs to be designed ond implemen
&® Data gequly :
44 desigd to protect Ake dokx prom modificalliw ,
‘iwavctiow or delétior ete~) Onda sSrteqrily provides aymanceWe data has not been modified im an unauthori2ect
manner after it was created , Tamsmilled or stored -
(3) Aulentication:
Hw used to give to provide access of data ko n authorided
wos only aitien ti coctiow Services Qe ,
wo antequilly authenticator
@) gowree- Auten tica tio
(4) Non - Repudiobon-
This Service protects the dota -eitfion by a sender oT &
receiver by verifying “Rem wii a valid. pool gh, vegies digital
Signatwue key
(5) Access cmunol *
TAL sewier Provide protechon again the unanifivdted access
| dp te dota: :
| Seowaly Madhamt set:
sme secunbly michontsms one dipind by TIV-7T (x= 800) Wie |
| Vanlow, Secuvuly mechamismas ore
(1) enciphownen +
Ty ib te pours Of Wi
ding or convening ihe dole - SL Provils
| confdentioily Sahih com be dome, by vag. & Techniquis: Way a
(0) cryplogreapy ‘ ity
(o>) Stegomoqraphy.
(@ dala sukeqputliy “oo
Sn This madnomism short cack value 1% appended fo he
vy he send wilde will be revalued, ony fo The
ackuol data
yeceiver vIhe TeCLIVUL verifies We chick values cmd prownes he dot
3) Digital signature a :
dy, his wudvontlie AGL Sendyt sends ao digital siqnakwie
edecrmically 40 % receiver(a) Audbenkicediow exchamge +
| Sn Audfinnkicaliovl exchange Awo entities exchange data
i] or mmaages and puvst prove ‘Whew identity to each offer:
i] coy Trahyic paddines =
44 revolves adding some relevant dala inko We actual dala
| Traggic amd fries to ditect the Walhic onaliysis-
1 (6) Rooting conkrol -
lo provide Move Secvuly , varuow> routing
on to be Used ond Frequently chamged
ca Aceuss control +
Various oterrs Control mectonisms oF
ov better: secuouty vahich ont provided iw Wie fom of bo
and pusword - .
4. Malaemolicn Of Crypho graphy.
+ Gnleque Avifamalie
- extendicl Eusteddian Algoritim-
© Modular Au tfumallie
* Menkyi Cey-
Livwan Congruence +
(0) Srkegen. Ayifemakic : :
~ S_nkeger Avigemalic » we Wt a set of integov, ond apply,
| som operations -
— A Set of integers are clenoteel by Z which contain
cowrol Strategies
“ramiques are to be wre
in nome.
ce anse
s all
| inleger yumbers ranging from Negolive infinity to positive
Infinity - ben Be Fem yet BBV ON 2s Be OS>
2 In cryptography , Ie mostly use whe arthematic operations
like addition » subtraction . multiplication and division: ,
To Perfom a binary operation on any two inputs will Neael
|A
2 ‘Jour possible outputs -
ex: tet woo mpats 8 and a, By applying addition on Jhese Two
1 inputs will provide foun possible oulpts-
Addition + gaps 5 449
rs) + Ga = 4
ca sceay 74
as 4+ ca) 74
5) + Gay =
Nence » the possible outputs eve for © and ave (ay, 4, 4 1u)
Integer Division ;
~» In Integer Arvthematic » th We divide a number with
another , we get a temdinder Quotient " “
TE The ter number we divide ie denoted by “A and
| devisoy ts clenoted by “n” | Quotient ie denoted by a and
| mainder 1s denoted hy ie rere The relationship, between above
| four integers which are denotect, by A, Q. 1, and Ris devoted
yang
ex: let A> 255 and =) calculate the clivisibility rule by Using
“ine above formula -
ass > (23x) ar
= 253 42
& 255
(> GcD cory HCE
4 > Hiahest Common facto -
Grealest Commen Divisoy
:
— the Geo of Stee is caleulatecl om two values, ustere. the
Common multiplts of eadn value ave extracted ancl multiplied to
Produ GUD-
‘ atau 7 ans
ex: calculate Whe GCO -fors au and 4g. Ar a
Somwnon fedors MH AKAVAX SKI ZY ae
he ond i Exe 38
GUD dh ay ue ou 3 e
2y T 3
aRyaxgerl xo vexatlll(b) extended Eucledian Algorithm -
= Eucladion Algorithm. An Cucledion Algorithm is Used to find the gcd
of two posilive numbers based on the fillewing facts.
Fock -
From the above fact , ip ine second imtegey s ero , then
The GOD of, The: Tuo Numbers is the first mleger
Cron ~ zero)
2X gcd Cazuc,o> = 2346
Fack -2 + acd Cab) = ged (9,9)
From ‘he above fact ,aand b ave positive meager
Valuts and “ri ip whe vernainder -wohich is obtained by
dividing alp
oe 9cd C 36,105 royae (3°
= gat bE) remaindon
= gtd (6,4)
= god (42)
= 9d ( 2,0)
Fa Coy applying’ Fecl-1)
Fock - 3; gid Carb) =1) where ar ow prime numbers.
From The above fact . it will bE valid when tae two Numbers
ane relalively prime -
ex ged (34) = 1
> Extended Euclidian Algoritim:
> the extended Eucudian Algorithm wy wad to colewate the
BEd Of ab avd aso calewall dhe, voles of ‘s’and “F-
> Given Two inteqows ‘oma Wy We wud to Find. “6 ond “f
Aven Anot
ged (ab) =Gxaj+E Xb)
= Sat Eb .
:.. onAlqoxitim :
1 Snitialention °
Hee; MEBs
S474 5 S29 |
hoo 7 dpe
eotile
a. if (29)
{ @=rpas 5
v= -
AVRKAr » NEN: 5 Me % FF
S =5-QxXS2 5 S35, 5 SSG,
£ f@x bry ye biny dae by
5 ee Cabyem 7 SESS kek; .
Example: Give a= 16) an br 2g, Firth The ged. Carb)
“Hy volus of S amd 7 :
Hee $= S27! ; e 8
ring aa
gcd Corb) = A * S + kx 1.
=1GLA-} + 6X28 oo
= = lel 168
=4
Hee aed
a Heater yoved- ;
ieee, PO : Aae
Fiom the above example, We infer m=] 4 S21 > beer”
al the final eration where %2 70° :
fence thé assumption S=-Yand t-c6 er
a= el and b:2¢8
\s Wue
ex2: Given asia and bro , fd The gcc Cayb) and The Values of
Sand .
mM] He | A | @ | se
wlofx]x 4
Me sss) 21 Bodiroe..
Aceh Cabd=Sxa4 AXE
+
a = (41ID)+ (9 %0D
v .
a eOVbe ag
Lis = RMS
Hence proved-
From ‘the above example » We mfer met), Sho So
for Gert and b=o oo
2x23: Given oxo “and b=45 , find The ged Cary and the Nolues
a [fle [sis sh tha]
o lusfolo | 1 [eli o Lt Lo
1 Zz — 4 @ C ©
us| oO] * x | of} «| Flo x
AN=MS S=S|r0 dade) ,
acd ae) = Sxa +4 %b
my -(oxa) +) 445)
us = US
tus = RIS
Hence proved:
From the above example » We infer asus, so om kes
fox azo and b=45- 8(0) Modular Aremoalic:
Tn medular Arifematic, after we divide one integer with
another inlegey , we Consider only The Yemoinder vobut «sWle,sailimot
Comsider the auotient m9 ‘The modular AVmemal.c -
Syutax : [a _med “n= 7) when a7
From “he above syntax, we divide “o’ yours eta” value
and consider the remainder "5".
ex: 34 mad 5 %
ze mod 1a = 0
s mod as = 5 Loken agen Wen ow
12 mat Be + 1d
From he above exampie , ib the*a® value is greater Then
tle caleulate The division for a Temaindedy. iy a” Value 15 less Thon
WW", The remoinedo will be “a”
For Negative Values:
ex\t —1@ mod Wy = 10 . : 7 ; ¥ yi!
From The obove example 5 Since ‘a’ value is veqdve. Cve) Slee first
colewlatL a Mod nw ond Wen ausign Uke Negative sign toy ond
pds aad tan” 20 “Sy -
step-1: Caleulale a mad = %
ye mot We & OD
step-2: Assign -ve sig dome 4 0%)
Step-3: Add on HA = 14+ (4) 4
ween
o ¢
€X2! -a moh 1 = 3
Stepl + colculatt: oo wmod n ~ 2
4 moins FCW
step-2: Aswgh ve Sign tow = -7C AY ;
sepa: Add ® #9 n= toe)
= =3(a) Matrices 4
—vA malux & collection At i
we ae runts which are vepresertted w The.
rows amd Columms- Rows ane mdicated “an am
columns ave indicated by “C” ty oY andl
ex: -] 2
& e %
Row mani = eokit ie mahig which ha» only one You (ap))-
x [23 4] a
en mobix: A coum ynalix Uo vvabix which Was only“ ove colurniy
=) ex: |;
2
‘
3
SOYLONL. Naokvix : 10us will be
4 Folly 5 aus
vo. soudne rnahiy,, Bat number of
wa mahix (H=C)-
equal to The number of columns
ex: 12 3
as 6
[es 4
a . 3x8 : ,
Additive ddentity mahiX? Tw a malik tolich contains alll 2e'oes and
wher addid fo a walix volll produce De 40m aul nF
. oe o by eat
= (eaters)
v
Soy snabix .
Multiplicakive “dally pmabix «the mulhipaicabve Wants, smoky ombains
wh The AJagoval voli, with t's awd he numaning Nobuo Ore
wn
Os- . - [of
an (! “] x\\ eye a , _ {--
34 ol) 7\s 4h... ba ed
7 ay . ‘
mudd ipAicakive .
eanhty Mabix |~ Adelibiovy amo Subhactuan: — 4 , oa
teehee) Eg] ae
(rifts
Scalar Multiplication ;
Qe scalar multiplication , we Wuuliply a wabix wil a scalor Value
x , fl 2 3 _
~ 3% \s «J ea |
Scalar tohix 7 aa ; /
Determinonl: m= ad-be < pe
4 me(33] Wun |m] = ad-be
. = (xu) - (2%3)
=u-G
red
©) Linear Gomqauenee :
Conqrucner: Two imbegers aw Adid 4d be congauent if one integer
mops mulple rwmbers of oflwr inleguas -
> amonuce % mdicaltd by congruence operator Cx).
= To dnote “a and “b” one congruent >» b we ‘Yepreuul it as
ab. , %
ex Q mod W=2
Aw_omo Wor 2
ax mod lo = 2
~3 mod who”! bw
=> From the above example -2,2,12,22 ane Conquunt do eoch
ote simce the aleve vollies ae Applied’ with, modulo, Pritt
ond Gives tue san susull -
THe Covglence for ane above yoluus wut represented os
322812 %2> mad to
~ ilLire :
td ghe Liman conpwnct & wad I cryptography fer solvmg an,
equation’ a, or o sek of equations of ome cr Move, Vaxiables.
29 The Lint Conguunce ton be poWeds: for °
chy single - Vaiable linear equalovs .
Wi) set of timo Equations
wb single -yaiable tintorr eqjucilions :
le Com solve ike singlt vantioble Uneat ‘equaluon udhich, 1s in “the
Sow lax b Cmodnd}.., -
oe solve ‘he, Feuohon Wy% Ay 2 (mod 18)
aol: calculate ged oh (quis) Tht
geo Of (a.m)
=> ged Cauia) =2 ‘ ;
since “We. ged ab Us w) wo Svoucuth tae “2 vou uv divisible by
‘ey (Be & aby ww). , :
since Q divides 12, we have posible soluliovs °
Now wx ge ta(mod '8) —
ou 6 (mod 9)
& mod. a)
we
et
vw
w
6.9 Col 9) > fad
gu (mod 4)
ou mot 4
x
x
x
re @
- BE
Th
Assume 2% OF %e » fo find another % Co) whwees 7
x= Xe * (lad rl =
By applying te, Kyn amd d “m above equaliin we get
w7 tot KinJd) [asec ¢ vay I2) |
= 6+ 1Cis]2)6419
2\S-
Herat 5 ayer \educing Xe Equtation , we have Two solutions.
G awd 1S- whith Salishy fhe Congquunce-
Yr gia (mod is) a :
|
) luxe GQ mod Ie = 12
i exis mod 18 = 12
| PART-8: Symmebic Encryption. * a
| Mathematics of Symmabic key copes
GQ: Algubrade Shuchunes ;
| : b--Group , <
| .
|
tung t
a Rad ‘
e& Gt Oo") Fiedld
(@ Adgebroic structures :
| An Algebraic shuc uw a umbination of the set and
The operations thot ove applied to the Elements of The set-
Alquovaic, shudiows ant of wee Typ “buy ae -
wo Groups ‘ :
@ Rings
() fields.
cb) Groups : :
A Group (G) a st of eluents wil a binary operotion ” ‘es
whide 4alishies four properties - Yay “are oR
3 CLOSUAL
* Asmocalive
¥ Sdenllihy
x Snverse> Abel. Gyoup :
> AN Aodian qaoup wa Qroup whew it sadisfies all “the. for qoup
prparkes along with on. additional propetly Ccommutative propediy)-
> An Abeliam group can also be Called, Os Gasman ive! areup,
Properties : ;
* Closuw property : ‘Th ol nc bo ave | setuments of “GW
“Carb 18 aliO ‘an dimenk of Gs ;
* Associative popedty: Th “ot, and ‘cove elsinerhs ob ‘a, hen
fb>-e = a:Cb-o)
¥ Sdariiky Ppropely : For ol ‘ol in Gs Vou Exists on cleynent ” é
which & Called ‘The ideribity sluvent , whine
eO-ae-a-
*& Swrowe propery For cach ‘alin “Gy Thee wexists em element ;
O whew aatsc.a +e
4 commutative prspelty For all “and bing, We, have.”
ab=ba . .
Finite Gyo alls
za epan we called o finite group ) HF Sme group Gos fereite numb,
of Ouments in a Ss ele it ts talled” infinite qnoup:
ade of group -(lal):
— St indicales he toi number of eumends im & posh
Sub gyoup :
> lek “W be & subcyoup of “Gio fo Ga
> where “Tow ‘a non ety suse Of SS) shew:
WR subgroup Ob Ge:
Cydic Gvoup : . ‘
STE a subgroup of & GHOUP is’genevaded by using The Pusey
of an tlewmenk F Won suo group Callid a aydic pou .(C) Ring: ‘ a
2 a Ring The steond opevcilionn must, be dishibut
ARing & on abgetroic Shuchune.. winidn danoled oy “R! whew |
< rN
R. 4cl4,F Cle
Pa Ring os Two operations , whut Vat first operation mural “salisfy-
he five Propouties of abelion group who as the atcand operation,
must satay only two properties (tlosune > aswociative)-
ec over he first
operation - Dishibutvity —
> dishibutivity moms that -for all aslo and C velo
we ave orshibiat! ty
ao OC) = (atib)-caQe)-
@nac - @de)- (unc) Poy eos
cormmuntative fing : A commutative Ringe obo aning, in which the
commutative property 4 also Aatiified for the somd. opercdliow
(a) Fidds: .
A Field is a Comutelative Ring which is Amnoted bay “e" whew
fee Tad yt ,a>
478
antes (abelim) *F
wri 150. poor’ me
Wo Sn a fiddh , te Atéoncl: operation while
propodies cs) Like the first operation -
(2d ga oid, The, Bent oF Fra oper
vanks of “R”
abso. aalialies “all the
akon hows wo inverse:
* GF ees
LD GF Atamas for’ -Gabeis Fields Sovpet i
(D Galois fields are’ Firile fidds whwu the number of olernerla
Aloud be Pp” wwe pu a prime wiriber ama. wa”
positive integer wunber- . a 4
(a) Hewal. Gualou Fields ww, mdicated by GE (p%).”a. Srhoduction to Modten Symmetic Kuy ciphows-
a: Modven Block Ciphuns -
WA Symnmebie ~Kuy modven Block cipher ences ” nit” blocks of
Phoin Text oF decrypts “abit” block of ciphen qext-
(Aa enctyphion or decnyption Algovitinm wits The Same “k-bit” key.
(3 Dectypion Algorithm mut be The inverse Of Encryption Algorithm
usheve both “The Atggriems Wt, rhe same Key.
Sendo
(rebit, filoin text}
[eeigetion Jot kay
|
et
Wink Cighin Text)
Receiver:
(Carb plain text)
Decryptior }
[eat _openiey)
iaThe Tbit lock Values con be try FRE RSE oy S\2 bits
(S Yhe medren block Cipher ss Two Types ef wide bai y
ONS ) Subsituhisn COD “Wensposiion
2) | Permutalion -
W) Subgtitbion tor) Tom position :
5 Tis mechanism gubstiuies bils instead of Chonoctens «
Here, Let or Dil WD We plain Text Con be replaced either by
| s9n permulalion phat » THe vext v ver toy fackoriol “Times
trot “s ih a Wok hor earunis Ten. 0°
> taleuldte vil, whidh give, 3) 7 SKAKV = 6
= ie will hove ‘Tolah pews op eh ws
L
een
(Brome permutation) So ichh whew KS
MBYO3N) C312) C32]>The set of permutations for’ N= 3) is: 6 clenierits +
> he pamutation im modven Block ciphn uses Thyee types of Keys,
“Mey wwe @ full-size -
(&) Pantial size
(©) Key- irs phon. rif
( Full- size Key Cipher: : . oy J
A Tull size K1y Vomsposition cipher ‘Wanxposes bits without
Changing They Values
AB) Pantial ~ side key ciphet
_ The pool uy cipher wa group uvdin “We composition
operations ik Lou a Subgroup Of The. con eapording full-size Ky
cipluy
CO Nata pars _
A Kuys lus ciphor is moslly viol used im soptwant Ercnyption:
ov Decayption , drst&l it cay ye uscd me Hondware “dmpienentadions ;
6. Components of o Modren Glock ciphut-
The main Components which ove iwvolved Ina. Modven Block cipher
ave. Ww p- Box C Diffusion )
“eo S-Box Csubsiitution)
W D-BxX! © piffusim) - . L,
+h Detox a Waditional uchonism yohids s wsed fox Worse
Cipla Cohkonackuw). Me ‘forn of bits. a
) > Jr modien Bleek cipher Whee, are “wee Anjos of D-Box hey oe. |
(@) Shoighk D-eox tg
) Compression D-Box
CD Expanmore D-Box
|
D Straight D-BO*! .
A Straight PES faces San’ inguds amd Produces ‘xv’ oudpuls 8
S pemutalow a
. : ;_y Here We hove 1) possible Mappings
©
toaos 4 5
\
= straight
pbx,
Bis \
ch) Compression O- eo : i
= A compression H-Box “Ya !D-Box wiih Ww’ rq amd ‘mn ‘oulpuls
when men: me
> Were some ob the Mputs ort blockid ond will mot swach the
oukput «
> Vre Compression. D-Box i mostly wxtd with Key -less Block cipr-
Seypm
4 ‘ as uu $s
m peo UR BY
© Expummion De Box « ie
> An cxpamtaion D-Box Ba Dr Box with’? Sls ond antigo
ww M70 : ‘
> Here some HF Leu inpuls gro Umvucked’ 10 MOE ‘han one ‘oul
> The expansion D-Box mortly used wilh euyrless Block iPox.
n \ a 3 .
™m (+ 23 4 5,
NOTE : :
From “the above D-B0xeS , The Straight D-Rox is only invertible 5
WinAD as The compression D-Boy ard ane expansion D-Box ave
Mok invertible «
(2) S-BOK Csubstitulion 80x)
> A substitution Box Cs-tox) is wed when we have dq frerertl
number of inputs and diffeunt number of outpuks « whidh ae
represented os n-bit word as input and mbit word o% output
who “Wand mn’ aw not necesorrily She same :
= ihe warlow, ativities thet are performed By
ce) Toverkbility,
(b> Complement
Cod Toverse.
td Gyawlan-shitt Cexcunive on)
[Link] claws Of product ciphuw,-
Product cipher =
Q) Product ciphwe wos diveloped. by she wore which iy complex
Shuctuxs whew it Combines Aulstilution 3 eprnudeion, ond Other
components also
We “Weo important componints of product cipher anc diffustow and.
Conpusiove
Oiffwion + Th iw wad to bide the sutatiowship belvdeen the Cipher
Text avd We plain text.
Confusion + TH is wtd to hide the et between Me ciple
text aud We fay:
Two chaaes of product cplinr :
tt) The qwodven block ciphixs Gre mostly axed on poduct ciples
(The clases Of product ciphuw ‘ave
(@) peislel cpler : ;
b 4
‘ s-Roxes. ore- (BH NOW- Feistel Uphor.-
co) feist Gyr!
0) Feistel cipher ws bol invertible od nov - invertible ontponans .
Jor hack ciphy ;
@ BW yu wid Mm ES (pata ‘noiyplion Stamdond +
2) Th was designed’ by Feistel , Hence callid Fei stad aie i
Feistel stuctwue +
=> Tn feistel Stucture, W number of woUNAS ave poten,
jn each round a subshtution w& performed om falh of The i
followed by permutation - 4
“>on Feistel shuekute Whe Ruy Ww) Expanded » where % differed ray %
wid mm evo Youn mn Po hy? ae “yoo :
A, who f
ain ‘Text
(pion ead a i
se =a 7 e
x ‘
zg ; .3
8 3 :
Fe ky ka.
€ t £
| Ccipher.
text) ..
Enc plow
ipebaypion |
From he above figure j‘the “final design « of a Feistel cipher
orth wo founds for Encyption ard Deciyption gre, Obsened:$$
(Tn Encryption side of Fetstel ‘ciphin » frst’ the ploin Text &
divided into two pants (tr, &\)-
(2) The & CRight Side Of putin Text ) ib now applied with an Eneryphin
functun (J) along with a kay (iy) thal TCR Kr) . ro
(S) Tae above vesulh “OF F(R KT) B_ KOR CE), with Leyte port of
loin Text Ctr) -
(o> “The Yeukant oF KOR if swapped wlth Be ight gank .C&r) of
He quel Text - =F re
Er we vesull of above ov ‘laken as mput for te next round. -
Since ke Feistel ciple consis of Two wounds » Aha samme process
i applied for Dre above resale, But dhe key which & applied fer
Encayptiow oust be difjuent (ka).
(6) “The buultov aftr Round ~ 2 will be sod fo the Reuivet side -
dor Secujpliow »
CA We Deouptun prows oso comisl of Woo Tounds whi
inverse of Enowypow
(b) Non- Feistel shuctarc :
A won feistel shuclunc ciphins « Uste ahe invertolle components:
Acomponmnt im the plain Text er the Comrebpanding component in
ane phen - TMs BG s-Box must hove an equal mumbtr of imputs
awd oukpuks:
7 No Compression of expamsion D-Box ave alles - since Afny one
wot mvertible -
ad AYacks designed for Block cphuws-
3 Te atlacks om block ciphers are bad on the shuchwe of
Fe modlyven block ciphers:
> ‘The atiacks for te block: ciphers mou. use tO digo
“ype of Techniques’ Wey oi oe
L
ch ew theO) diffeuntial Crypt analisis
@ Limar crypt analinis
W Diffountial cup Analysts :
The di frountial cayph analysis attack uy dom ova choosen
pls Text Tae goal OF the differential Crypt analysis allck.
Jo find The cipro key for tte choosen plain Text-
=> Since, we clo mot know the cphy Key we used Jo anolyre the
encryption’ algovittim in odin to collect’ Somme im\pr mation
) ae yelakiowmiup between The plow text and Splat ‘ext
Prowcurc: ,
Considine + §-BOx which is “present i tee cai ishich hax
one KOR and ont Kay. to Convert tiw inane’ S mo ne Text -
Plain Tect | ] ]
KOR key
ciphant Text ‘
7 We tan create the dliffeuntial distribution “whe - for each s-Box
and combine them to create. the distibution for each turd:
> we ton create a dishibution Tale tor the. “complet. ™ma modven seam ciphut >
ove done =o bits of a Ame. ;
> Te ploin Text bit sheam. ib indicoled oy," g “aaee” :
PrPy ree P24 PF
= Te cipher Text bit Stream vb widivated by "ch whine
: C= Cy casey
> The vey. Wt, stream ie widicdted 3 KO whe:
ee Kase Kak, : ‘
> The M1 Wits ove Urtdrfor yh staat ‘of plain yeh ps
_ aioe tee Ca) ont Ck)encryption, Cy = E CK, bi)
pecryetion, = Pj = DCK, Cid
*] ‘
| Lk
} ye Bek De ooaee| ——
J free Beh st Encryption $F Gar GG Decryption > Pre Bh
| The matren stream cipher is cotegovi2ed into Ate aypes » Shey
Om A} sgnehrondus ream ciphwr:
| (® Non Synchitmows » vtreart cipher,
CY Synchronous shreant cipher - ‘
| 4 a Synchronous shea cipher “Whe key stream Ws independ
| of ihe ploin dext on the ophet Texk-
| The synehvonous stream captor. vats
fa) one -Kme pad
w Feedloack, Aral “Register Cese>
Ce) Lior Feedtouck, Shift Register (LFS)
(a) Non - Linu Feed-back stiff Register -CNLFSR)
@ on - Sgnelsionous sheom ciple:
= $n. Novi- Syrchronious Streant ciphor s Dre Kay dapends ovt eft
| dh plain fexk ov the cphwe yext -
| 3. DES CDoka Enoypitiony Stomdand)
| a: Hisbyy of DES.
| history DES stands for data Encrypiion, Samdand, which & >
syromebic KLy lock diphur thol wor developed oy nist Crati
Tune of skamdands amd Technology ):
DES war published boy Firs. C federal ‘ngormaliow proceming. |
Skandord °) wm 145Ererypbivy omd Oeouypuio wilh OES +
Gu Wit plaintext. Ger bit plain rext ;
—— 4 iz t : .
Emenyption | oe E 56 bil oe
. — i —s} Reverse | Decaypdiowe
js. Mt to |
cu tat . . ok gj
Capra Text : GY bit. aphot text
"pos" Shudive’
“(ODES Slands for Oola tncyphon standand a
CODES UW based on Block ciphers who, the beck size is 4 bit
(3) DES Algaithm vw symmelic , where WsxUs one Super key
(A)-DES Algorithm is Bad on feistel cipher - oo :
Details. k ie : .
C1) Bleck size of plain Text = Gq bit
(@ Block se of Apher Text + Sy bit?
@) Total number of Rounds f ue , _
(4) Number, of Permutations 2.12 C4uithal , Fah)
jr supeky tN, Ceawit) ,
(2) Sub Key ‘ +16 Cus bit each).
; TAL [plain Text al :
Frid Pewnuksbien) Pat p
. ya BE _| }
L I Gulp Key |
= > tai gy
i Bs Keay
UpOAsamenD F gzcorFrom the alcove DES shuctne , tte ‘fivee main components are
W Tribal and final permutations -
(D 16 Rounds
() Round Key Gene valoY
UW) Tnitiel and Final pevinulations :
‘the DES Algorithm we {wo permutakion boxes , Wiey are inital
Permutation anc -final yermutakion.
> he intial, pevmukation takes Gl; Bil Plain Text 5 imput and
produces Gy bk output » who the cutput forwarded to Reund-]
-fancion
she Final pemutation inkey Gy bit mpul fom Round ~16 and praduce
au Wat Giphen Text os oudpul.
whe wenent vere soy
@
=F Round Funcion +
“DA Des shuckure has a total Of Ye Tounds | where each wud takes 64
bik nyo alung with a 48 it Subbuy and prods & 64 wit output:
+s Rik
i <7 va
nh rites ae
AGA) Km
4: e . ie
we bil(2) :
oe a eh eee a The: Gu bit input and divides it into)
CR). usc two a a seeipanls et named as Left. (L) ancl Rit
parts ant 32-bi tach -
Now “The K-32 bil UW fomvmdect to DES furuction
yg-bit subkey which prodivces a 32 bit outpd °
tao The above 32 bit oubpik U x0R’ uel L°3? pit which rents 3
32-tak output -- “ae ‘ 7
(5) The, above. L-32 bil ig
Lar bit ond R32 pit are Combined
NENW cowiwed Gynbit, daka woe output of one sound -
DES Function : ‘ To
wt OES Function -tit ¥ am
ends prodidibia Ba stk, wight and qe bi sublay ou input
Des. Funekor ap tC)
/ yw
J Emrcmsion 000% Ss,
aA
L aleng with &
papped, wth” @as. bil ond bot the
wei
ue bil
Sublecy
(OD The DES funation *
p-tox whidd voulls a ug wi oubpul
care okeve cukpuk & XOR Wilh 4s bit subs Key amd ves uls &
ig lit cotpae:
a The above ue wt output is supplied 40S Box which souls
iS
Ls Lit output:(6) ie above. 32 bit output UW Send to a shraighr 0-#
cody @ 32 Wil output - 9 ied:
(3) Round Key Genouator:
(A round Key gerwrokoy takes osete boil ae Key, 0 rope rom ad
ou bit superk4y + ei oinds 1 shi
it ci : = shit
wer) © Bap (,ai96 / irbit
\ portity pep _/ Remaining | abit
so bit | ciph RY Leet
ag bit
sola HL
@
ty 1b -
a Fromahé above figure » the 56° tat cipher Key is, divided wito
Awo halves Cas bit each):
ts, on Lee sde ond wget Side ‘axe applied voit leh
The | ae-bi
cvewlay shill; 7
@) the oukpuk of le
ore’ Combined Ogoin and.
@) The Compression D-Bo
used as a yYound key:
6) similaty » The Same process is repeated anotnen 1S times te
produce a twhal of 16 Round Keys C sua keys )-
NOTE: The tele Gievdor shih u done with | soit “for fhe”
wounds "1, 2 and No» Whereas jhe left civatar shift u
ir civenlo ys on nay side ond, ng side
senk fo Ane! Compression O-Gox
yx will yesulk a yg -PE ukpok which isdone wilh alits for ine Yemainimg Younds -
C. DES Analysis.
DES Analysis
Q) propention + Avalome Effect |
@ Design = D-Box , $-Box |
@ Weaknus + 0-Box . 5-BOx
d+ Secunily of DES.
Seewuly :
Brut force Atl (>
ww Unto crypt analysis
@D viffeunkial coyptarvalysis
e- Mubbple PEs
mwdkiple OFS
O 2 OES
(> 3 VES:
Examples > The algorithms dna ave implemanted by ving DES ore
© CAST Block cipher
@ Blow-fieh
WEA Ctkomdional Dota Ewuyphaw Algoritim)
G AES (Advanced evnnyphion standoxd ’) i
> AES sands for Advoncd Encxyption sandond whide Us a1 specification
Gor the endiyplion thok wa, vhabdlished by Notional inmtitudte of
Standards and. Tehinaoyy (NIST) in 2001.
SEs ‘w much shougar than DES ond. tiple DES “eterpite bang han
Ae implant - i
Acs betas:
> AES w & block Gphwe
> Enorypts dota in Wocks of (28 wits each.
> Tho key see Can be lag |iaz Jase bits:
at imeonrs Vi take jag bits on mpd ond odpuds Re, tats of]encrypted ciphivr Text oa outpuk. ] Ln 7
AES velit of culshituhion: - pernuiialion. network. principle hich.
mugerb UL we petkprmed using O° Antics Of Linked. operakiows whidy involve,
replacing and shifting of the input data. : ;
+ y2e bik plain Text cbs
; Rourd Keys | ' ’
i 4 fe cagats? fr |e etl a ogg :
: ge “round ee ; cipher Fey os
sali
teow! y -—~(Crasitqe ov. 286: biED
|... Reura '' Ee an
uy x
|= team re ey sad |
3 jas
eure he i Me >|
Lea aut an” . ase |
~d —— 7 Relalionvup belween
\2¢ bit cipher Text ¢ ; Sumber ob wounds
Working of the cipho: | di ore Spr key Se
AES peryona operations on eyes of dota. voll tnamn wm cits.
nen, the ‘block sie, vs. 129, bits. IRL Shor Procimes ae wits GF Ie ya)
of the inpuk dada of of ime - " Wh py Maw .
The wimber of rounds dupends onthe Key length ax “plows: |
+ 128 bit key ~1o vounds
eta bik Reyisnla wounds fo pent ona
ease bit ky AG younds...+ 7 ;
Encryption « :
nes considow eieh woik at’ a 16 byte(lu byte x 4 byte) Sulaytes
-> shift rows
~> mix columns : :
= Add wound Key.’ I yok ToyNOTE the Leuk your doeant hove tho. fax cour vound F
She sulbbytes dues The stbstidution owed shift 1s and Mix @ lus
Performs te’ pomudadiion iW the algorithyr- . ;
+ Sutblay les: eae any tell Ne : “ope a
ST atte implammis the substitwlion how. “each lyte ‘U. subsiluted,
by anotwr byte
SVs perjomued using 0 beokup fable alka called. Mt, S-Box Thy
substitution ts dom “ma way hal o byte & Ne substibiled tay itselp
ened alts not subifiluted ey anothur lyfe esis is ¢ Complimu’ of the
| tunand byl we rau Of this shp wa 16 bye CHX¥) mobi
= Shipl Lows - |
Each Yow U shifted a puvicwer wurnioer of times:
Vu Ft vow 'w nal shifted
The cuamd ow bs shubted one. forthe Wt:
“The Thiid ‘row is shifted twice cfothe Wits
TW fourth vow we chifed thvice tp the LL
eo MAX Cetus toda se the oe
S This stip ‘U lonsically, 0 mabix, mulliptentinn «cach coluvnih is siwbiplled |
anit oF Specie MahiX ad. tus tne poriiony of waa bye inthe toumn,
vw changed ab ayeyudt . i
+ Add round keys + ae : ‘
Shrew the Rualmt oulpul of the previows stage ib XOR with the
Lnrepoding round kay -Here ste 6 bytes is, not conpidued Ona gid
bul jwA o» 129 bits of dota - .
> ‘Pyler old Whee Younds 128 vis oh encrypted dota te given lack, %
oudpak This prows repeated unlil all Me doa. ty be onowypted
uNdbagors Ws pros: a
Ww shogyes in Une younds can be wasiy undore fox Shwe Sages
More on wpe tL wich ulun pabormed viet Aw |
= Each tag blots gou TWvough the 10512 oF 1) wounds soe
ieTon te Key size - l
ey day 8} each Yound WM LR OWPtiON 1 a Follows.
* Add vound Key
| # Soverge UK GODIN,
e wit OWS
| * Soverse subegte *
o Sverre MIX Colts : a
J—> Twos stig & siivilan to te mix Columns sb encaliphion ye ditfers in
Jana mnah\x used fo Cony oul bs operabow . ;
+ Spverve sublytis + . :
Js Inverse Stax 1 und ox a bo Leokup fable and wing wshidh Me
} wyts art substituted diving ducuption i ny rot
| enouyption and ducnyphion of AE Poin ext Ciphury,
Ciphor Kay Plain Text rz . ao
| [wet Md tnd | 6 8
| i or
el |
[ Smee Aid round tay) war 3 |
cen |
[Rrvevic ix cottons J |
4 [sevense Shakt wass | : 3
a | - E (ane ehbyts | 3
) 2) | s Cube #
| S|) | 3] Cstaitano— — P
| 2 S| (Mx tetumns_| remereree ppc
wey | batted eae | 1 Fro i ar |
= wy
2) ——_—_—_ | © | Saverte shaye few ] |
Zz — Shift rons — — =——"
yg ttyg todd round Buy] | <--> CARA Roun eaty Ja ew
Ss