SlideShare une entreprise Scribd logo
1  sur  28
Télécharger pour lire hors ligne
Seminar #3
Block ciphers
Kolybelnikov Alexander
kisttan@gmail.com
Agenda
•
•
•
•
•
•

Field of block ciphers application
Galois fields, operations with polynomials
Feistel scheme
GOST 28147-89
AES
Encryption algorithms application schemes
Field of block ciphers application
Block ciphers advantages
• Effective realization on modern soft-hardware
platforms;
• High speed of encryption/decryption;
• Guaranteed stability.
Galois fields, operations with
polynomials
Galois fields
• Finite field (Galois field) is a field that contains
finite number of elements
• Finite field is commonly expressed as GF(q), q is
a number of the field elements.
• Simple example of finite field is residue ring
modulo a prime number p.
Galois fields
•

Field GF(pn) defining (p is a prime number, n is a natural number) starts with defining
of its prime subfield GF(p) (that is equal to the whole field for n=1).

•

Prime field GF(p) is defined as a residue ring modulo p, that doesn't have zero divisors
and is a field (because p is a prime number).

•

Elements are numbers. Operate with elements like integer numbers, reducting a result on
p modulo.

•

Field GF(pn) for n>1 is defined as a factor ring, f(x) is a prime polynomial of degree n
on the field. So to define a field from pn elements it is enough to find a polynomial of
degree n that is a prime for the field.

•

Field elements are polynomials of degree less than n. Arithmetic operations (addition
and multipliciation) are on modulo of polynomial f(x), so the result corresponding to an
operation is a remainder from division by f(x) with reduction of coefficients on modulo
p.
Operations with polynomials
•

Polynomial of n variables is a finite formal sum:

I = (i1,i2,...,in) is a set of integer non-negative numbers (multiindex), cI is a number
(polynomial coefficient) that depends only on multiindex I.
Feistel scheme
Feistel scheme
GOST 28147-89
GOST 28147-89
• Key length is 256 bits;
• Crypto unit is 64 bits;
• Number of cycles is 32.
Encryption GOST 28147-89
S-block example
• 4, 13, 0, 14, 8, 7, 10, 2, 5, 1, 9, 6, 11, 15, 12, 3
AES
AES
• Key length is 128-256 bits;
• Crypto unit is 128 bits;
• Number of cycles is 10, 12, 14.
AES cycle
•
•
•
•

SubBytes()
ShiftRows()
MixColumns()
AddRoundKey()
SubBytes

SubBytes() procedure processes each status byte,
independently making non-linear bytes replacement
with the use of substitution table (S-box). This operation
provides nonlinearity of encryption algorithm. S-box
construction involves two stages. At first, taking of
inverse number in GF{28} is executed. Secondly, the
operation in the picture above is applied to each byte of
S-box.
SubBytes
bi is i bit of b, ci is i bit of c = {63}
or {01100011}. This provides attack
protection based on simple algebraic
properties.
ShiftRows
• ShiftRows() procedure processes State rows. This
transformation automatically moves state rows cyclically
on r bytes horizontally depending on a row number. For
null row r = 0, for the first row r = 1b etc... So each result
column (after ShiftRows() procedure applying) consists of
bytes of each initial column. For Rijndael algorithm
pattern of rows moving is identical for rows consisting of
128 and 192 bits. But for a block of 256 bits pattern differs
in the way that 2, 3, and 4 rows are moved on 1, 3 and 4
bytes correspondingly.
MixColumns
• In MixColumns() procedure four bytes of each
State column mix using reversible linear
transformation. MixColumns() processes states by
columns interpreting each column as a polynomial
of 4 degree. Multiplying in GF(28) modulo x4 + 1
into fixed polynomial c(x) = 3x3 + x2 + x + 2 is
applied to these polynomials. As ShiftRows()
procedure, MixColumns() also adds diffusion to a
cipher .
AddRoundKey
• In AddRoundKey() procedure RoundKey of each
round is united with State. For each round
Roundkey is received from CipherKey using
KeyExpansion procedure; each RoundKey is of
the same size as State. This procedure executes
bit-mapped XOR of each State byte with each
RoundKey byte.
Ciphers application schemes
Electronic Code Book (ECB)
Cipher block chaining
Cipher Feed back mode
Output feedback mode
XTS mode

Contenu connexe

Tendances

20181204i mlse discussions
20181204i mlse discussions20181204i mlse discussions
20181204i mlse discussionsHiroshi Maruyama
 
Three Address code
Three Address code Three Address code
Three Address code Pooja Dixit
 
18103010 algorithm complexity (iterative)
18103010 algorithm complexity (iterative)18103010 algorithm complexity (iterative)
18103010 algorithm complexity (iterative)AdityaKhandelwal58
 
IIUG 2016 Gathering Informix data into R
IIUG 2016 Gathering Informix data into RIIUG 2016 Gathering Informix data into R
IIUG 2016 Gathering Informix data into RKevin Smith
 
Time series predictions using LSTMs
Time series predictions using LSTMsTime series predictions using LSTMs
Time series predictions using LSTMsSetu Chokshi
 
Two fish & Rijndael (AES) Encryption Algorithm
Two fish & Rijndael (AES) Encryption AlgorithmTwo fish & Rijndael (AES) Encryption Algorithm
Two fish & Rijndael (AES) Encryption AlgorithmRifat Tasnim
 
Polymath: Version 1.0 and Beyond
Polymath: Version 1.0 and BeyondPolymath: Version 1.0 and Beyond
Polymath: Version 1.0 and BeyondESUG
 
0015.register allocation-graph-coloring
0015.register allocation-graph-coloring0015.register allocation-graph-coloring
0015.register allocation-graph-coloringsean chen
 
QUEUE || FUNCTION WRITING BASED ON QUEUE || LINKED LIST || DATA STRUCTURE || ...
QUEUE || FUNCTION WRITING BASED ON QUEUE || LINKED LIST || DATA STRUCTURE || ...QUEUE || FUNCTION WRITING BASED ON QUEUE || LINKED LIST || DATA STRUCTURE || ...
QUEUE || FUNCTION WRITING BASED ON QUEUE || LINKED LIST || DATA STRUCTURE || ...AAKASH KUMAR
 
2 d array(part 2) || 2D ARRAY FUNCTION WRITING || GET 100% MARKS IN CBSE CS
2 d array(part 2) || 2D ARRAY FUNCTION WRITING || GET 100% MARKS IN CBSE CS2 d array(part 2) || 2D ARRAY FUNCTION WRITING || GET 100% MARKS IN CBSE CS
2 d array(part 2) || 2D ARRAY FUNCTION WRITING || GET 100% MARKS IN CBSE CSAAKASH KUMAR
 
2 d array(part 1) || 2D ARRAY FUNCTION WRITING || GET 100% MARKS IN CBSE CS
2 d array(part 1) || 2D ARRAY FUNCTION WRITING || GET 100% MARKS IN CBSE CS2 d array(part 1) || 2D ARRAY FUNCTION WRITING || GET 100% MARKS IN CBSE CS
2 d array(part 1) || 2D ARRAY FUNCTION WRITING || GET 100% MARKS IN CBSE CSAAKASH KUMAR
 
Basic Fresher Algorithm
Basic Fresher AlgorithmBasic Fresher Algorithm
Basic Fresher AlgorithmFairPeSearch
 

Tendances (20)

Aa sort-v4
Aa sort-v4Aa sort-v4
Aa sort-v4
 
20181204i mlse discussions
20181204i mlse discussions20181204i mlse discussions
20181204i mlse discussions
 
Three Address code
Three Address code Three Address code
Three Address code
 
18103010 algorithm complexity (iterative)
18103010 algorithm complexity (iterative)18103010 algorithm complexity (iterative)
18103010 algorithm complexity (iterative)
 
IIUG 2016 Gathering Informix data into R
IIUG 2016 Gathering Informix data into RIIUG 2016 Gathering Informix data into R
IIUG 2016 Gathering Informix data into R
 
Sortingnetworks
SortingnetworksSortingnetworks
Sortingnetworks
 
Time series predictions using LSTMs
Time series predictions using LSTMsTime series predictions using LSTMs
Time series predictions using LSTMs
 
Two fish & Rijndael (AES) Encryption Algorithm
Two fish & Rijndael (AES) Encryption AlgorithmTwo fish & Rijndael (AES) Encryption Algorithm
Two fish & Rijndael (AES) Encryption Algorithm
 
Parallel searching
Parallel searchingParallel searching
Parallel searching
 
Matlab
MatlabMatlab
Matlab
 
Polymath: Version 1.0 and Beyond
Polymath: Version 1.0 and BeyondPolymath: Version 1.0 and Beyond
Polymath: Version 1.0 and Beyond
 
0015.register allocation-graph-coloring
0015.register allocation-graph-coloring0015.register allocation-graph-coloring
0015.register allocation-graph-coloring
 
QUEUE || FUNCTION WRITING BASED ON QUEUE || LINKED LIST || DATA STRUCTURE || ...
QUEUE || FUNCTION WRITING BASED ON QUEUE || LINKED LIST || DATA STRUCTURE || ...QUEUE || FUNCTION WRITING BASED ON QUEUE || LINKED LIST || DATA STRUCTURE || ...
QUEUE || FUNCTION WRITING BASED ON QUEUE || LINKED LIST || DATA STRUCTURE || ...
 
2 d array(part 2) || 2D ARRAY FUNCTION WRITING || GET 100% MARKS IN CBSE CS
2 d array(part 2) || 2D ARRAY FUNCTION WRITING || GET 100% MARKS IN CBSE CS2 d array(part 2) || 2D ARRAY FUNCTION WRITING || GET 100% MARKS IN CBSE CS
2 d array(part 2) || 2D ARRAY FUNCTION WRITING || GET 100% MARKS IN CBSE CS
 
Two fish cipher
Two fish cipherTwo fish cipher
Two fish cipher
 
2 d array(part 1) || 2D ARRAY FUNCTION WRITING || GET 100% MARKS IN CBSE CS
2 d array(part 1) || 2D ARRAY FUNCTION WRITING || GET 100% MARKS IN CBSE CS2 d array(part 1) || 2D ARRAY FUNCTION WRITING || GET 100% MARKS IN CBSE CS
2 d array(part 1) || 2D ARRAY FUNCTION WRITING || GET 100% MARKS IN CBSE CS
 
Basic Fresher Algorithm
Basic Fresher AlgorithmBasic Fresher Algorithm
Basic Fresher Algorithm
 
Lecture 3.2 bt
Lecture 3.2 btLecture 3.2 bt
Lecture 3.2 bt
 
Dataflow Analysis
Dataflow AnalysisDataflow Analysis
Dataflow Analysis
 
Sci py india_conference_2019
Sci py india_conference_2019Sci py india_conference_2019
Sci py india_conference_2019
 

Similaire à Information security Seminar #3

Information and network security 25 algorithmic steps of aes
Information and network security 25 algorithmic steps of aesInformation and network security 25 algorithmic steps of aes
Information and network security 25 algorithmic steps of aesVaibhav Khanna
 
Implementation of Various Cryptosystem Using Chaos
Implementation of Various Cryptosystem Using ChaosImplementation of Various Cryptosystem Using Chaos
Implementation of Various Cryptosystem Using ChaosIOSR Journals
 
Iaetsd an survey of efficient fpga implementation of advanced encryption
Iaetsd an survey of efficient fpga implementation of advanced encryptionIaetsd an survey of efficient fpga implementation of advanced encryption
Iaetsd an survey of efficient fpga implementation of advanced encryptionIaetsd Iaetsd
 
Ijmsr 2016-05
Ijmsr 2016-05Ijmsr 2016-05
Ijmsr 2016-05ijmsr
 
Block ciphers & public key cryptography
Block ciphers & public key cryptographyBlock ciphers & public key cryptography
Block ciphers & public key cryptographyRAMPRAKASHT1
 
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDL
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDLA Cryptographic Hardware Revolution in Communication Systems using Verilog HDL
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDLidescitation
 
Aes128 bit project_report
Aes128 bit project_reportAes128 bit project_report
Aes128 bit project_reportNikhil Gupta
 
CR 05 - Advanced Encryption Standard.ppt
CR 05 - Advanced Encryption Standard.pptCR 05 - Advanced Encryption Standard.ppt
CR 05 - Advanced Encryption Standard.pptssuseraaf866
 
“Optimized AES Algorithm Core Using FeedBack Architecture”
“Optimized AES Algorithm Core Using FeedBack Architecture” “Optimized AES Algorithm Core Using FeedBack Architecture”
“Optimized AES Algorithm Core Using FeedBack Architecture” Nirav Desai
 
FPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
FPGA Implementation of an Area Optimized Architecture for 128 bit AES AlgorithmFPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
FPGA Implementation of an Area Optimized Architecture for 128 bit AES AlgorithmIJERA Editor
 
1AES Cryptography Algorithm Based on Intelligent Blum-Blum -Shub PRNGs - Copy...
1AES Cryptography Algorithm Based on Intelligent Blum-Blum -Shub PRNGs - Copy...1AES Cryptography Algorithm Based on Intelligent Blum-Blum -Shub PRNGs - Copy...
1AES Cryptography Algorithm Based on Intelligent Blum-Blum -Shub PRNGs - Copy...ZaidHussein6
 

Similaire à Information security Seminar #3 (20)

Information and network security 25 algorithmic steps of aes
Information and network security 25 algorithmic steps of aesInformation and network security 25 algorithmic steps of aes
Information and network security 25 algorithmic steps of aes
 
Implementation of Various Cryptosystem Using Chaos
Implementation of Various Cryptosystem Using ChaosImplementation of Various Cryptosystem Using Chaos
Implementation of Various Cryptosystem Using Chaos
 
AES.ppt
AES.pptAES.ppt
AES.ppt
 
Iaetsd an survey of efficient fpga implementation of advanced encryption
Iaetsd an survey of efficient fpga implementation of advanced encryptionIaetsd an survey of efficient fpga implementation of advanced encryption
Iaetsd an survey of efficient fpga implementation of advanced encryption
 
chap3.pdf
chap3.pdfchap3.pdf
chap3.pdf
 
E04612529
E04612529E04612529
E04612529
 
694 lecture1aes
694 lecture1aes694 lecture1aes
694 lecture1aes
 
Ijmsr 2016-05
Ijmsr 2016-05Ijmsr 2016-05
Ijmsr 2016-05
 
Block ciphers & public key cryptography
Block ciphers & public key cryptographyBlock ciphers & public key cryptography
Block ciphers & public key cryptography
 
Network Security Lec4
Network Security Lec4Network Security Lec4
Network Security Lec4
 
Cryptography
CryptographyCryptography
Cryptography
 
11
1111
11
 
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDL
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDLA Cryptographic Hardware Revolution in Communication Systems using Verilog HDL
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDL
 
Aes128 bit project_report
Aes128 bit project_reportAes128 bit project_report
Aes128 bit project_report
 
AES.ppt
AES.pptAES.ppt
AES.ppt
 
CR 05 - Advanced Encryption Standard.ppt
CR 05 - Advanced Encryption Standard.pptCR 05 - Advanced Encryption Standard.ppt
CR 05 - Advanced Encryption Standard.ppt
 
Unit 2
Unit  2Unit  2
Unit 2
 
“Optimized AES Algorithm Core Using FeedBack Architecture”
“Optimized AES Algorithm Core Using FeedBack Architecture” “Optimized AES Algorithm Core Using FeedBack Architecture”
“Optimized AES Algorithm Core Using FeedBack Architecture”
 
FPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
FPGA Implementation of an Area Optimized Architecture for 128 bit AES AlgorithmFPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
FPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
 
1AES Cryptography Algorithm Based on Intelligent Blum-Blum -Shub PRNGs - Copy...
1AES Cryptography Algorithm Based on Intelligent Blum-Blum -Shub PRNGs - Copy...1AES Cryptography Algorithm Based on Intelligent Blum-Blum -Shub PRNGs - Copy...
1AES Cryptography Algorithm Based on Intelligent Blum-Blum -Shub PRNGs - Copy...
 

Plus de Alexander Kolybelnikov

вебинар 18102016 архитектура подсистемы обеспечения юр. эдо
вебинар 18102016 архитектура подсистемы обеспечения юр. эдовебинар 18102016 архитектура подсистемы обеспечения юр. эдо
вебинар 18102016 архитектура подсистемы обеспечения юр. эдоAlexander Kolybelnikov
 
Юридическая значимость документооборота
Юридическая значимость документооборотаЮридическая значимость документооборота
Юридическая значимость документооборотаAlexander Kolybelnikov
 
лекция о защите дистанционного банковского обслуживания
лекция о защите дистанционного банковского обслуживаниялекция о защите дистанционного банковского обслуживания
лекция о защите дистанционного банковского обслуживанияAlexander Kolybelnikov
 
безопасность использования электронной подписи
безопасность использования электронной подписибезопасность использования электронной подписи
безопасность использования электронной подписиAlexander Kolybelnikov
 
лекция безопасная разработка приложений
лекция  безопасная разработка приложенийлекция  безопасная разработка приложений
лекция безопасная разработка приложенийAlexander Kolybelnikov
 
Seminar no.1 Information security for 4th course MIPT
Seminar no.1 Information security for 4th course MIPTSeminar no.1 Information security for 4th course MIPT
Seminar no.1 Information security for 4th course MIPTAlexander Kolybelnikov
 
Защита информации семинар №9
Защита информации семинар №9Защита информации семинар №9
Защита информации семинар №9Alexander Kolybelnikov
 
Защита информации семинар №8
Защита информации семинар №8Защита информации семинар №8
Защита информации семинар №8Alexander Kolybelnikov
 
Защита информации семинар №7
Защита информации семинар №7Защита информации семинар №7
Защита информации семинар №7Alexander Kolybelnikov
 
Защита информации семинар №6
Защита информации семинар №6Защита информации семинар №6
Защита информации семинар №6Alexander Kolybelnikov
 
Защита информации семинар №4 МФТИ
Защита информации семинар №4 МФТИЗащита информации семинар №4 МФТИ
Защита информации семинар №4 МФТИAlexander Kolybelnikov
 
Защита информации семинар №3 МФТИ
Защита информации семинар №3 МФТИЗащита информации семинар №3 МФТИ
Защита информации семинар №3 МФТИAlexander Kolybelnikov
 
Защита информации семинар №2 МФТИ
Защита информации семинар №2 МФТИЗащита информации семинар №2 МФТИ
Защита информации семинар №2 МФТИAlexander Kolybelnikov
 
Защита информации семинар №1 МФТИ
Защита информации семинар №1 МФТИЗащита информации семинар №1 МФТИ
Защита информации семинар №1 МФТИAlexander Kolybelnikov
 

Plus de Alexander Kolybelnikov (19)

вебинар 18102016 архитектура подсистемы обеспечения юр. эдо
вебинар 18102016 архитектура подсистемы обеспечения юр. эдовебинар 18102016 архитектура подсистемы обеспечения юр. эдо
вебинар 18102016 архитектура подсистемы обеспечения юр. эдо
 
Юридическая значимость документооборота
Юридическая значимость документооборотаЮридическая значимость документооборота
Юридическая значимость документооборота
 
лекция о защите дистанционного банковского обслуживания
лекция о защите дистанционного банковского обслуживаниялекция о защите дистанционного банковского обслуживания
лекция о защите дистанционного банковского обслуживания
 
Information security Seminar #7
Information security Seminar #7Information security Seminar #7
Information security Seminar #7
 
Information security Seminar #6
Information security Seminar #6 Information security Seminar #6
Information security Seminar #6
 
безопасность использования электронной подписи
безопасность использования электронной подписибезопасность использования электронной подписи
безопасность использования электронной подписи
 
Основы протокола IPsec
Основы протокола IPsecОсновы протокола IPsec
Основы протокола IPsec
 
лекция безопасная разработка приложений
лекция  безопасная разработка приложенийлекция  безопасная разработка приложений
лекция безопасная разработка приложений
 
Seminar no.1 Information security for 4th course MIPT
Seminar no.1 Information security for 4th course MIPTSeminar no.1 Information security for 4th course MIPT
Seminar no.1 Information security for 4th course MIPT
 
Information Security Seminar #2
Information Security Seminar #2Information Security Seminar #2
Information Security Seminar #2
 
Защита информации семинар №9
Защита информации семинар №9Защита информации семинар №9
Защита информации семинар №9
 
Защита информации семинар №8
Защита информации семинар №8Защита информации семинар №8
Защита информации семинар №8
 
Защита информации семинар №7
Защита информации семинар №7Защита информации семинар №7
Защита информации семинар №7
 
Защита информации семинар №6
Защита информации семинар №6Защита информации семинар №6
Защита информации семинар №6
 
Защита информации семинар №4 МФТИ
Защита информации семинар №4 МФТИЗащита информации семинар №4 МФТИ
Защита информации семинар №4 МФТИ
 
Защита информации семинар №3 МФТИ
Защита информации семинар №3 МФТИЗащита информации семинар №3 МФТИ
Защита информации семинар №3 МФТИ
 
Защита информации семинар №2 МФТИ
Защита информации семинар №2 МФТИЗащита информации семинар №2 МФТИ
Защита информации семинар №2 МФТИ
 
Защита информации семинар №1 МФТИ
Защита информации семинар №1 МФТИЗащита информации семинар №1 МФТИ
Защита информации семинар №1 МФТИ
 
лекция №4
лекция №4лекция №4
лекция №4
 

Dernier

PISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptxPISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptxEduSkills OECD
 
How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17Celine George
 
Practical Research 1 Lesson 9 Scope and delimitation.pptx
Practical Research 1 Lesson 9 Scope and delimitation.pptxPractical Research 1 Lesson 9 Scope and delimitation.pptx
Practical Research 1 Lesson 9 Scope and delimitation.pptxKatherine Villaluna
 
HED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdfHED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdfMohonDas
 
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfMaximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfTechSoup
 
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdf
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdfP4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdf
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdfYu Kanazawa / Osaka University
 
Ultra structure and life cycle of Plasmodium.pptx
Ultra structure and life cycle of Plasmodium.pptxUltra structure and life cycle of Plasmodium.pptx
Ultra structure and life cycle of Plasmodium.pptxDr. Asif Anas
 
The basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptxThe basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptxheathfieldcps1
 
3.21.24 The Origins of Black Power.pptx
3.21.24  The Origins of Black Power.pptx3.21.24  The Origins of Black Power.pptx
3.21.24 The Origins of Black Power.pptxmary850239
 
CapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptxCapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptxCapitolTechU
 
The Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George WellsThe Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George WellsEugene Lysak
 
Philosophy of Education and Educational Philosophy
Philosophy of Education  and Educational PhilosophyPhilosophy of Education  and Educational Philosophy
Philosophy of Education and Educational PhilosophyShuvankar Madhu
 
Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.EnglishCEIPdeSigeiro
 
AUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptxAUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptxiammrhaywood
 
The Singapore Teaching Practice document
The Singapore Teaching Practice documentThe Singapore Teaching Practice document
The Singapore Teaching Practice documentXsasf Sfdfasd
 
Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...raviapr7
 
Education and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptxEducation and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptxraviapr7
 
Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.raviapr7
 
Presentation on the Basics of Writing. Writing a Paragraph
Presentation on the Basics of Writing. Writing a ParagraphPresentation on the Basics of Writing. Writing a Paragraph
Presentation on the Basics of Writing. Writing a ParagraphNetziValdelomar1
 

Dernier (20)

PISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptxPISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
 
Personal Resilience in Project Management 2 - TV Edit 1a.pdf
Personal Resilience in Project Management 2 - TV Edit 1a.pdfPersonal Resilience in Project Management 2 - TV Edit 1a.pdf
Personal Resilience in Project Management 2 - TV Edit 1a.pdf
 
How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17
 
Practical Research 1 Lesson 9 Scope and delimitation.pptx
Practical Research 1 Lesson 9 Scope and delimitation.pptxPractical Research 1 Lesson 9 Scope and delimitation.pptx
Practical Research 1 Lesson 9 Scope and delimitation.pptx
 
HED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdfHED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdf
 
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfMaximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
 
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdf
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdfP4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdf
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdf
 
Ultra structure and life cycle of Plasmodium.pptx
Ultra structure and life cycle of Plasmodium.pptxUltra structure and life cycle of Plasmodium.pptx
Ultra structure and life cycle of Plasmodium.pptx
 
The basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptxThe basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptx
 
3.21.24 The Origins of Black Power.pptx
3.21.24  The Origins of Black Power.pptx3.21.24  The Origins of Black Power.pptx
3.21.24 The Origins of Black Power.pptx
 
CapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptxCapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptx
 
The Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George WellsThe Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George Wells
 
Philosophy of Education and Educational Philosophy
Philosophy of Education  and Educational PhilosophyPhilosophy of Education  and Educational Philosophy
Philosophy of Education and Educational Philosophy
 
Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.
 
AUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptxAUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptx
 
The Singapore Teaching Practice document
The Singapore Teaching Practice documentThe Singapore Teaching Practice document
The Singapore Teaching Practice document
 
Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...
 
Education and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptxEducation and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptx
 
Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.
 
Presentation on the Basics of Writing. Writing a Paragraph
Presentation on the Basics of Writing. Writing a ParagraphPresentation on the Basics of Writing. Writing a Paragraph
Presentation on the Basics of Writing. Writing a Paragraph
 

Information security Seminar #3

  • 1. Seminar #3 Block ciphers Kolybelnikov Alexander kisttan@gmail.com
  • 2. Agenda • • • • • • Field of block ciphers application Galois fields, operations with polynomials Feistel scheme GOST 28147-89 AES Encryption algorithms application schemes
  • 3. Field of block ciphers application
  • 4. Block ciphers advantages • Effective realization on modern soft-hardware platforms; • High speed of encryption/decryption; • Guaranteed stability.
  • 5. Galois fields, operations with polynomials
  • 6. Galois fields • Finite field (Galois field) is a field that contains finite number of elements • Finite field is commonly expressed as GF(q), q is a number of the field elements. • Simple example of finite field is residue ring modulo a prime number p.
  • 7. Galois fields • Field GF(pn) defining (p is a prime number, n is a natural number) starts with defining of its prime subfield GF(p) (that is equal to the whole field for n=1). • Prime field GF(p) is defined as a residue ring modulo p, that doesn't have zero divisors and is a field (because p is a prime number). • Elements are numbers. Operate with elements like integer numbers, reducting a result on p modulo. • Field GF(pn) for n>1 is defined as a factor ring, f(x) is a prime polynomial of degree n on the field. So to define a field from pn elements it is enough to find a polynomial of degree n that is a prime for the field. • Field elements are polynomials of degree less than n. Arithmetic operations (addition and multipliciation) are on modulo of polynomial f(x), so the result corresponding to an operation is a remainder from division by f(x) with reduction of coefficients on modulo p.
  • 8. Operations with polynomials • Polynomial of n variables is a finite formal sum: I = (i1,i2,...,in) is a set of integer non-negative numbers (multiindex), cI is a number (polynomial coefficient) that depends only on multiindex I.
  • 12. GOST 28147-89 • Key length is 256 bits; • Crypto unit is 64 bits; • Number of cycles is 32.
  • 14. S-block example • 4, 13, 0, 14, 8, 7, 10, 2, 5, 1, 9, 6, 11, 15, 12, 3
  • 15. AES
  • 16. AES • Key length is 128-256 bits; • Crypto unit is 128 bits; • Number of cycles is 10, 12, 14.
  • 18. SubBytes SubBytes() procedure processes each status byte, independently making non-linear bytes replacement with the use of substitution table (S-box). This operation provides nonlinearity of encryption algorithm. S-box construction involves two stages. At first, taking of inverse number in GF{28} is executed. Secondly, the operation in the picture above is applied to each byte of S-box.
  • 19. SubBytes bi is i bit of b, ci is i bit of c = {63} or {01100011}. This provides attack protection based on simple algebraic properties.
  • 20. ShiftRows • ShiftRows() procedure processes State rows. This transformation automatically moves state rows cyclically on r bytes horizontally depending on a row number. For null row r = 0, for the first row r = 1b etc... So each result column (after ShiftRows() procedure applying) consists of bytes of each initial column. For Rijndael algorithm pattern of rows moving is identical for rows consisting of 128 and 192 bits. But for a block of 256 bits pattern differs in the way that 2, 3, and 4 rows are moved on 1, 3 and 4 bytes correspondingly.
  • 21. MixColumns • In MixColumns() procedure four bytes of each State column mix using reversible linear transformation. MixColumns() processes states by columns interpreting each column as a polynomial of 4 degree. Multiplying in GF(28) modulo x4 + 1 into fixed polynomial c(x) = 3x3 + x2 + x + 2 is applied to these polynomials. As ShiftRows() procedure, MixColumns() also adds diffusion to a cipher .
  • 22. AddRoundKey • In AddRoundKey() procedure RoundKey of each round is united with State. For each round Roundkey is received from CipherKey using KeyExpansion procedure; each RoundKey is of the same size as State. This procedure executes bit-mapped XOR of each State byte with each RoundKey byte.