SINGLE-KEY CRYPTOSYSTEMS There are two types of cryptosystems: single key and public key. In a single-key cryptosystem, the encryption and decryption keys are the same (or readily derived from each other) and are kept secret. Single-key systems are also called secret-key systems and symmetric systems. Because all publicly known cryptosystems before the late 70s were single-key systems, they are also called traditional or conventional cryptosystems. Exhibit 2 illustrates single-key cryptosystems.
In addition to secrecy, requirements for secure communications often include integrity and authenticity protection against message tampering and against injection of bogus messages by a third party. Single-key cryptosystems provide authenticity because the secret key is needed to modify or create ciphertext that decrypts into meaningful plaintext. If meaningful plaintext is not automatically recognizable, a message authentication code (MAC) can be computed and appended to the message. The computation is a function of the entire message and a secret key; it is practically impossible to find another message with the same authenticator. The receiver checks the authenticity of the message by computing the MAC using the same secret key and then verifying that the computed value is the same as the one transmitted with the message. A MAC can be used to provide authenticity for unencrypted messages as well as for encrypted ones. The National Institute of Standards and Technology (NIST) has adopted a standard for computing a MAC. (It is found in Computer Data Authentication, Federal Information Processing Standards Publication (FIPS PUB) 113.) Single-key systems are often used during the process of authenticating users to a system. Systems that use passwords usually store those passwords in encrypted form, using the password as the key so that the ciphertext passwords cannot be decrypted. When encryption is used this way, it effectively implements a one-way function of the secret information that cannot be reversed. (If a user forgets the password between login sessions, the password must be replaced with a new one because not even the system administrator can determine the plaintext password from the ciphertext password.) Stronger forms of user authentication are possible using access tokens and smart cards that have cryptographic capabilities. The Data Encryption Standard The Data Encryption Standard (DES) developed by IBM Corp. and adopted by NIST as a government standard in 1977 (FIPS PUB 46-1) is a single-key system that encrypts 64-bit blocks with a 56-bit key. After an initial permutation of the bits, a plaintext block goes through 16 iterations of a complex function and then passes through a final permutation that yields the ciphertext block. During each round, the bits undergo further permutations and are transformed by S-boxes, which define bit substitutions. The security of the algorithm depends on the S-boxes, the number of iterations, and the key length (56 bits generates about 72,058 trillion possibilities). The algorithm is public knowledge, though the design of the S-boxes is classified. Complementary metal-oxide semiconductor implementations of DES run at about 200 Mb/s. DES can be used in four different operating modes:
When DES was first introduced in 1975, some critics argued that 56-bit keys were too short and that the S-boxes, which are a critical part of the algorithm, were suspect because of involvement by the National Security Administration (NSA) and because the design documents had been classified. However, 18 years of public scrutiny has shown the algorithm and its S-boxes to be well designed. Although the DES will eventually have to be replaced as exhaustive search attacks become a practical threat, it is likely to be recertified as a government standard for another five years. DES was adopted as a government standard to protect sensitive but unclassified information. It has also been adopted as a standard outside the government, particularly in the banking industry. The American National Standards Institute (ANSI) has adopted standards for encryption, access control, and key management that use DES. Privacy Enhanced Mail, the Internet standard for protecting E-mail, also uses DES.
|
We are proud to bring to all of our members a legal copy of this outstanding book. Of course this version is getting a bit old and may not contain all of the info that the latest version are covering, however it is one of the best tool you have to review the basics of security. Investing in the latest version would help you out in your studies and also show your appreciation to Auerbach for letting me use their book on the site.