Week 3 Crypto
Week 3 Crypto
Week 3 Crypto
IP(m1m2.......m64) ⇒ = m58m50......m7
Algorithm of f function
f(Ri,Ki)=Xi+1 where Ri is 32 bit
ki is 48 bit
xi+1 is 32 bit
f(Ri,ki)=P(S(E(Ri) + ki))
E(x1x2x3......x32)=y1y2y3.........y48
S-box of f
X=B1B2B3B4B5B6B7B8
length of Bi=6bit
S1S2S3S4S6S7S8
S(Bi(6bit))=Ci(4bit)
S(x)=(S1(B1)S2(B2).....S8(B8))
r=(2*b1+b6) 0¡=r¡=3
1
Key Scheduling Algorithm of DES
input : 64bit key k=k1k2k3....k64 output : 16 round keys ki 1¡=i¡=16 where length of ki is 8bit
v) for i=1 to 16
Ci ⇐= (Ci-1 ⇐= Vi )
Di ⇐= (Di-1 ⇐= Vi )
Ki=PC2(Ci,Di)
PC1(k1.....k64)=PC1(K1......k63) =k49k41....k58...k4
DES(M,K)=c
DES(M̃,K̃)=c̃
Ks(K)=k1....k16
ks(k̃)=k̃1........k̃16
Ip(M),Ĩp(M̃)
DES(M,K)=c1
DES(M̃,K)=c2
attacker DES(Mi,Ki)=c if C != C1 discard ki from S
Attack Model
2
1.Ciphertext Only Attack
Attacker choose plaintext of his/her choise and he/she will allowed to get corresponding cipher-
text.
Goal: generate a new plaintext ciphertext pair or find the secret key.
k1k2k3........k256
M =⇒ DES(M, K) = c1
M̃ =⇒ DES( M, K) = c2
2*56=112bit security
Double DES
P,C ⇒ DoubleDES
3
Algorithm which can find n-bit key in 2n/2
to get an n-bit security you need to use 2n bit triple layer setup
R∈y
A binary operation * on a set s is a mapping from SXS to S that is * is a rule which assigns to
each ordered pair of elements form s to an element of S
Group
A group (G,*) consist of a set G with a binary operation on G satisfying three azions
2. There is an element I belongs to G called as identity element such that a*I=I*a for all a
belongs to G
3. for each a belongs to G there exits an element a−1 belong to G called the inverse of a such
that
a x a−1 =1= a−1 x a for all a belongs to G