11.07.2015 Views

Cryptography - Sage

Cryptography - Sage

Cryptography - Sage

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

5.2 Digital Encryption Standard OverviewThe DES is a 16-round Feistel cipher, which is preceeded and followed by an initial permutationIP and its inverse IP −1 . That is, we start with a message M, and take L 0 R 0 = IP (M)as input to the Feistel cipher, with output IP −1 (R 16 L 16 ). The 64-bits of the key are usedto generate 16 internal keys, each of 48 bits. The steps of the round function f K is givenby the following sequence, taking on 32-bit strings, expanding them to 48-bit strings, andapplying a 48-bit block function.1. Apply a fixed expansion permutation E — this function is a permutation the 32 bitswith repetitions to generate a 48-bit block E(R i ).2. Compute the bit-sum of E(R i ) with the 48-bit key K i , and write this as 8 blocksB 1 , . . . , B 8 of 6 bits each.3. Apply to each block B j = b 1 b 2 b 3 b 4 b 5 b 6 a substitution S j . These substitutions arespecified by S-boxes, which describe the substitution as a look-up table. The outputof the substitution cipher is a 4-bit string C j , which results in the 32-bit stringC 1 C 2 C 3 C 4 C 5 C 6 C 7 C 8 .4. Apply a fixed 32-bit permutation P to C 1 C 2 C 3 C 4 C 5 C 6 C 7 C 8 , and output the resultas f Ki (R).This completes the description of the round function f Ki .5.3 Advanced Encryption Standard OverviewIn 1997, the NIST called for submissions for a new standard to replace the aging DES.The contest terminated in November 2000 with the selection of the Rijndael cryptosystemas the Advanced Encryption Standard (AES).The Rijndael cryptosystem operates on 128-bit blocks, arranged as 4 × 4 matrices with8-bit entries. The algorithm consists of multiple iterations of a round cipher, each of whichis the composition of the following four basic steps:• ByteSub transformation. This step is a nonlinear substition, given by a S-box (lookuptable), designed to resist linear and differential cryptanalysis.• ShiftRow transformation. Provides a linear mixing for diffusion of plaintext bits.• MixColumn transformation. Provides a similar mixing as in the ShiftRow step.• AddRoundKey transformation. Bitwise XOR with the round key.40 Chapter 5. Block Ciphers

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!