Data Encryption Standard (DES) and Core Cipher Concepts

Data Encryption Standard (DES) Algorithm Explained

The Data Encryption Standard (DES) is a symmetric-key block cipher developed in the 1970s by IBM and adopted by the US government. It encrypts data in 64-bit blocks using a 56-bit key.

How DES Works

  1. Initial Permutation (IP): The 64-bit plaintext goes through an initial permutation, which shuffles the bits according to a fixed table.
  2. Divide into Halves: The permuted text is split into two 32-bit halves: Left (L0) and Right (R0).
  3. 16 Rounds of Feistel Operations:
Read More

Cryptography Fundamentals: Symmetric Ciphers and Block Design

Cryptography and the Symmetric Cipher Model

Cryptography is the science of protecting information by transforming it into a secure format. It ensures data confidentiality, authenticity, integrity, and sometimes non-repudiation during communication or storage.

The Symmetric Cipher Model

In the symmetric cipher model, the same secret key is used for both encryption and decryption of messages.

Key Components of a Symmetric Cipher

  • Plaintext (P): The original readable message or data.
  • Encryption Algorithm:
Read More

Cybersecurity Fundamentals: Authentication, Encryption & Threats

Message Authentication

Message authentication verifies that a message received over a communication channel is from the legitimate sender and has not been altered during transmission. It ensures data integrity, authenticity, and often non-repudiation (in the case of digital signatures).

Goals of Message Authentication

  • Authenticity: Confirms that the message came from the stated sender.
  • Integrity: Ensures the message has not been changed.
  • Non-repudiation (optional): Prevents the sender from denying having
Read More

Secure Key Communication: Methods, Protocols, and Security

Secure Key Communications

Three Methods for Secure Key Exchange:

  1. Trusted Third Party: A central server delegates keys. Every user has a secret key, and the server knows everyone’s keys.
    1. A → T: { A, B }
    2. T → A: { Na, Kab, B, {Kab, A}Kb }Ka
    3. A → B: { Kab }Kb

Problems with Trusted Third Party:

  • B doesn’t know who is communicating.
  • Replay attack.
  • If the server is compromised, it’s a single point of failure, and all user keys are compromised.
  • The server can crash due to a denial-of-service attack.

Needham-

Read More

Cryptography Fundamentals: Encryption, Authentication, PKI

Cryptography Fundamentals

1. General Model for Communication

  • Alice wants to send a message m to Bob.
  • Eve is an adversary who may try to eavesdrop or modify the message.
  • The goal of cryptography is to ensure that Eve cannot read or alter the message without authorization.

2. Encryption: Preventing Eavesdropping

  • Encryption is used to prevent Eve from reading the message.
  • Key Concepts:

    • Secret Key (Ke): A shared key between Alice and Bob. The longer the key, the higher the security.
    • Plaintext (m): The original
Read More

Cryptography: Ciphers, Security, and MAC

Miscellaneous: Secret (Symmetric), Public (Asymmetric).

Math:

  1. XOR (a ⊕ b) is 0 if the values are the same, 1 if they are different. c = (x ⊕ k) is random and independent of the original X.
  2. Addition: Given x is a binary string of length n, and a is an integer, then (a+x) is the n least significant bits of the binary encoding of adding the values a and x.
  3. Given n bits, Pr[any one string] = 1/2n.

Classical Ciphers/Principles:

  1. Shift: Shifts all letters by the same amount (key). It can be cracked by brute-
Read More