12
Symmetric-Key Cryptography CS 161: Computer Security Prof. David Wagner March 12, 2013

Symmetric-Key Cryptographycs161/sp14/slides/3.12.Symmetric.pdf · Symmetric-Key Cryptography ... Original image . ... CTR decryption uses block cipher’s encryption functionality,

Embed Size (px)

Citation preview

Page 1: Symmetric-Key Cryptographycs161/sp14/slides/3.12.Symmetric.pdf · Symmetric-Key Cryptography ... Original image . ... CTR decryption uses block cipher’s encryption functionality,

Symmetric-Key Cryptography

CS 161: Computer Security Prof. David Wagner

March 12, 2013

Page 2: Symmetric-Key Cryptographycs161/sp14/slides/3.12.Symmetric.pdf · Symmetric-Key Cryptography ... Original image . ... CTR decryption uses block cipher’s encryption functionality,

P1 P2 P3

C1 C2 C3

Page 3: Symmetric-Key Cryptographycs161/sp14/slides/3.12.Symmetric.pdf · Symmetric-Key Cryptography ... Original image . ... CTR decryption uses block cipher’s encryption functionality,

P1 P2 P3

C1 C2 C3

Page 4: Symmetric-Key Cryptographycs161/sp14/slides/3.12.Symmetric.pdf · Symmetric-Key Cryptography ... Original image . ... CTR decryption uses block cipher’s encryption functionality,

Original image

Page 5: Symmetric-Key Cryptographycs161/sp14/slides/3.12.Symmetric.pdf · Symmetric-Key Cryptography ... Original image . ... CTR decryption uses block cipher’s encryption functionality,

Encrypted with ECB

Page 6: Symmetric-Key Cryptographycs161/sp14/slides/3.12.Symmetric.pdf · Symmetric-Key Cryptography ... Original image . ... CTR decryption uses block cipher’s encryption functionality,

Later (identical) message again encrypted with ECB

Page 7: Symmetric-Key Cryptographycs161/sp14/slides/3.12.Symmetric.pdf · Symmetric-Key Cryptography ... Original image . ... CTR decryption uses block cipher’s encryption functionality,

P1 P2 P3

C1 C2 C3

Page 8: Symmetric-Key Cryptographycs161/sp14/slides/3.12.Symmetric.pdf · Symmetric-Key Cryptography ... Original image . ... CTR decryption uses block cipher’s encryption functionality,

P1 P2 P3

C1 C2 C3

Page 9: Symmetric-Key Cryptographycs161/sp14/slides/3.12.Symmetric.pdf · Symmetric-Key Cryptography ... Original image . ... CTR decryption uses block cipher’s encryption functionality,

Original image

Page 10: Symmetric-Key Cryptographycs161/sp14/slides/3.12.Symmetric.pdf · Symmetric-Key Cryptography ... Original image . ... CTR decryption uses block cipher’s encryption functionality,

Encrypted with CBC

Page 11: Symmetric-Key Cryptographycs161/sp14/slides/3.12.Symmetric.pdf · Symmetric-Key Cryptography ... Original image . ... CTR decryption uses block cipher’s encryption functionality,

(Nonce = Same as IV)

C1 C2 C3

P1 P2 P3

Page 12: Symmetric-Key Cryptographycs161/sp14/slides/3.12.Symmetric.pdf · Symmetric-Key Cryptography ... Original image . ... CTR decryption uses block cipher’s encryption functionality,

(Note, CTR decryption uses block cipher’s encryption functionality, not decryption)

C1 C2 C3

P1 P2 P3