Ch04 Crypto7e
Ch04 Crypto7e
Ch04 Crypto7e
Network Security
Seventh Edition, Global Edition
by William Stallings
A block of
plaintext is treated
Typically a block
as a whole and
size of 64 or 128
used to produce a
bits is used
ciphertext block of
equal length
The majority of
As with a stream network-based
cipher, the two symmetric
users share a cryptographic
symmetric applications make
encryption key use of block
ciphers
Confusion
•Seeks to make the relationship between the statistics of the ciphertext and the value
of the encryption key as complex as possible
•Even if the attacker can get some handle on the statistics of the ciphertext, the way in
which the key was used to produce that ciphertext is so complex as to make it
difficult to deduce the key
DES
Example
Note: DES subkeys are shown as eight 6-bit values in hex format
© 2017 Pearson Education, Ltd., All rights reserved.
Table 4.3 Avalanche Effect in DES: Change in Plaintext
© 2017 Pearson Education, Ltd., All rights reserved.
Table 4.4 Avalanche Effect in DES: Change in Key
© 2017 Pearson Education, Ltd., All rights reserved.
Table 4.5
Average Time Required for Exhaustive Key Search
In general, the
criterion should be
If DES had 15 or
that the number of
The greater the fewer rounds,
rounds is chosen so
number of rounds, differential
that known
the more difficult it cryptanalysis would
cryptanalytic efforts
is to perform require less effort
require greater
cryptanalysis than a brute-force
effort than a simple
key search
brute-force key
search attack