Performance Enhancement of Blowfish and CAST-128 Algorithms and Security Analysis of Improved Blowfish Algorithm Using Avalanche Effect
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
(SAC)25 – a Retrospective
(SAC)25 – A Retrospective Carlisle Adams August 16, 2018 Beginnings Stafford Tavares Idea (early 1990s): • Canadian venue for crypto research • Small, friendly workshop • “discussion atmosphere” What to call it? • Stafford and one of his students, Art Webster, defined a property that they called the “Strict Avalanche Criterion” (SAC) in a paper published at Crypto 1985 – SAC is a formalization of the “avalanche effect” (a concept explored by Shannon and named by Feistel) and incorporates the notion of “completeness” Avalanche Small disturbance leads to large, unpredictable change SAC: if a single input bit is complemented, each output bit changes with probability p = 0.5 http://nsidc.org/cryosphere/snow/science/avalanches.html What to call the workshop? • “Avalanche effect” and “SAC” were fundamental and important work for symmetric cipher design (particularly s-box design), but Crypto and Eurocrypt were receiving lots of submissions from many other exciting advances in the field (zero knowledge protocols, secret sharing schemes, digital signatures, elliptic curve computations, etc., etc.) • “Selected Areas in Cryptography” (SAC) Organizers of the first SAC Workshop Stafford Tavares Henk Meijer Paul Van Oorschot Carlisle Adams Walter Light Hall Queen’s University at Kingston May 5-6, 1994 Governance • SAC Organizing Board – 9 members, each serving a 3-year term. One member is the Board Chair. – Each year, the terms of 3 members end. Each of these members may be replaced, or may serve another term. • SAC Conference – 3 permanent topics, plus a 4th topic that can vary from year to year. • SAC Co-Chairs – Normally 2 fully-cooperating co-chairs, although from 2001 typically one (Canadian) has primary responsibility for local arrangements, and one (residing outside Canada) focuses on the technical program. -
The CAST-256 Encryption Algorithm Carlisle Adams
The CAST-256 Encryption Algorithm Carlisle Adams CAST-256 is a symmetric cipher designed in accordance with the CAST design procedure as outlined in [A97]. It is an extension of the CAST-128 cipher and has been submitted as a candidate for NIST’s Advanced Encryption Standard (AES) effort -- see http://csrc.nist.gov/encryption/aes/aes_home.htm for details. This document contains several sections of the CAST-256 AES Submission Package delivered to NIST on June 9th, 1998. All complete submissions received by NIST will be made public in late August at the First AES Candidate Conference, but the following material is being made available now so that public analysis of the CAST-256 algorithm may begin (see, for example, http://www.ii.uib.no/~larsr/aes.html for the current status of submitted algorithms). Many thanks are due to those who worked with me in the (long, challenging, frustrating, and very enjoyable!) design and analysis phases that ultimately led to the detailed specification given below: Howard Heys (Memorial University); Stafford Tavares (Queen’s University); and Michael Wiener (Entrust Technologies). As well, many thanks are due to the two who did the various implementations on a variety of platforms (Reference C, Optimized C, Optimized Java, and even M6811 Assembler): Serge Mister and Ian Clysdale (both of Entrust Technologies). [A97] C. Adams, “Constructing Symmetric Ciphers Using the CAST Design Procedure”, in Selected Areas in Cryptography, Kluwer Academic Publishers, 1997, pp.71-104 (reprinted from Designs, Codes and Cryptography, vol. 12, no. 3, November 1997). CAST-256 Algorithm Specification 1. Algorithm Specification 1.1 CAST-128 Notation The following notation from CAST-128 [A97b, A97c] is relevant to CAST-256. -
An Overview of Cryptography (Updated Version, 3 March 2016)
Publications 3-3-2016 An Overview of Cryptography (Updated Version, 3 March 2016) Gary C. Kessler Embry-Riddle Aeronautical University, [email protected] Follow this and additional works at: https://commons.erau.edu/publication Part of the Information Security Commons Scholarly Commons Citation Kessler, G. C. (2016). An Overview of Cryptography (Updated Version, 3 March 2016). , (). Retrieved from https://commons.erau.edu/publication/127 This Report is brought to you for free and open access by Scholarly Commons. It has been accepted for inclusion in Publications by an authorized administrator of Scholarly Commons. For more information, please contact [email protected]. An Overview of Cryptography Gary C. Kessler 3 March 2016 © 1998-2016 — A much shorter, edited version of this paper appears in the 1999 Edition of Handbook on Local Area Networks , published by Auerbach in September 1998. Since that time, this paper has taken on a life of its own... CONTENTS FIGURES 1. INTRODUCTION 1. Three types of cryptography: secret-key, public key, and hash 2. THE PURPOSE OF CRYPTOGRAPHY function. 3. TYPES OF CRYPTOGRAPHIC ALGORITHMS 2. Sample application of the three cryptographic techniques for 3.1. Secret Key Cryptography secure communication. 3.2. Public-Key Cryptography 3. Kerberos architecture. 3.3. Hash Functions 4. VeriSign Class 3 certificate. 3.4. Why Three Encryption Techniques? 5. Sample entries in Unix/Linux password files. 3.5. The Significance of Key Length 6. DES enciphering algorithm. 4. TRUST MODELS 7. A PGP signed message. 4.1. PGP Web of Trust 8. A PGP encrypted message. 4.2. Kerberos 9. The decrypted message. -
Network Working Group R. Pereira Request for Comments: 2451 Timestep Corporation Category: Standards Track R
Network Working Group R. Pereira Request for Comments: 2451 TimeStep Corporation Category: Standards Track R. Adams Cisco Systems Inc. November 1998 The ESP CBC-Mode Cipher Algorithms Status of this Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Copyright Notice Copyright (C) The Internet Society (1998). All Rights Reserved. Abstract This document describes how to use CBC-mode cipher algorithms with the IPSec ESP (Encapsulating Security Payload) Protocol. It not only clearly states how to use certain cipher algorithms, but also how to use all CBC-mode cipher algorithms. Table of Contents 1. Introduction...................................................2 1.1 Specification of Requirements...............................2 1.2 Intellectual Property Rights Statement......................2 2. Cipher Algorithms..............................................2 2.1 Mode........................................................3 2.2 Key Size....................................................3 2.3 Weak Keys...................................................4 2.4 Block Size and Padding......................................5 2.5 Rounds......................................................6 2.6 Backgrounds.................................................6 2.7 Performance.................................................8 -
Comparison of Blowfish and Cast-128 Algorithms Using Encryption Quality, Key Sensitivity and Correlation Coefficient Analysis
American Journal of Engineering Research (AJER) 2014 American Journal of Engineering Research (AJER) e-ISSN : 2320-0847 p-ISSN : 2320-0936 Volume-3, Issue-7, pp-161-166 www.ajer.org Research Paper Open Access Comparison of Blowfish and Cast-128 Algorithms Using Encryption Quality, Key Sensitivity and Correlation Coefficient Analysis Shailaja S1, Dr Krishnamurthy G N2 1 (Department of Computer Science and Engineering, PDA College of Engineering, Gulbarga, India, 2 (Department of Information Science and Engineering, B N M Institute of Technology, Bangalore, India, ABSTRACT : This paper demonstrates the performance of well known block ciphers Blowfish and Cast-128, considering different aspects of security namely, Encryption quality, Key sensitivity test and Statistical analysis. Statistical analysis is conducted using images by test on the histogram of encrypted images and correlation of horizontally adjacent pixels in an encrypted image. KEYWORDS: Avalanche, Correlation Coefficient, Decryption, Encryption, Encryption Quality, Key Sensitivity. I. INTRODUCTION Blowfish [1] is a variable-length key [2], 64-bit block cipher developed by Bruce Schneier. The algorithm consists of two parts namely a key-expansion part and a data- encryption part. Key expansion converts a key of utmost 448 bits into several sub key arrays totaling 4168 bytes. Data encryption occurs via a 16-round Feistel network [1]. Each round consists of a key-dependent permutation, a key and data-dependent substitution. All operations are EX-ORs and additions on 32-bit words. CAST-128 [2], [3], [4] is a design procedure for symmetric encryption algorithm developed by Carlisle Adams and Stafford Tavares. CAST has a classical Feistel network consisting of 16 rounds and operating on 64-bit blocks of plaintext to produce 64-bit blocks of cipher text. -
CAST-256 a Submission for the Advanced Encryption Standard
CAST-256 A Submission for the Advanced Encryption Standard Carlisle Adams First AES Candidate Conference August 20-22, 1998 Orchestrating Enterprise Security ã1997 Entrust Technologies “Vital Statistics” FName • CAST-256 FInventors • Carlisle Adams, Howard Heys, Stafford Tavares, Michael Wiener FKey Sizes • 128, 160, 192, 224, 256 bits FBlock Size • 128 bits Orchestrating Enterprise Security ã1997 Entrust Technologies p. 2 Outline FHistory FDescription FAnalysis F“Features and Advantages” FConclusions Orchestrating Enterprise Security ã1997 Entrust Technologies p. 3 History F1985-86 • Advice: “don’t go into crypto.; no future” F1988-90 • design procedure for symmetric ciphers - Boolean functions, s-boxes, round functions, key scheduling, overall framework F1992-93 • the name “CAST” introduced • specification of various parameters • CAST-1, CAST-2 in first Entrust product Orchestrating Enterprise Security ã1997 Entrust Technologies p. 4 History (cont’d) F1993-95 • modified key schedule: CAST-3 • further concentration on round function • further concentration on s-box design, efficient (networked) construction - preliminary s-boxes: CAST-4 - final s-boxes: CAST-5 • CAST-5 published as “CAST-128” F1995-97 • draft paper distributed and on web site • interest begins to rise Orchestrating Enterprise Security ã1997 Entrust Technologies p. 5 History (cont’d) F1997 • CAST paper published (DCC) • CAST-128 cipher published (RFC 2144) • interest rises significantly F1997-98 • CAST-128 used to form basis of CAST-256 F1998 • CSE endorsement of CAST-128 • CAST-256 submitted as AES candidate Orchestrating Enterprise Security ã1997 Entrust Technologies p. 6 Description FBased on CAST-128 • identical round function FExpansion to 128-bit block • simple generalization of Feistel structure FExpansion to 256-bit key • uses encryption (256-bit block) to generate round keys Orchestrating Enterprise Security ã1997 Entrust Technologies p. -
S-Box Modifications and Their Effect in DES-Like Encryption Systems Joe Gargiulo GSEC V1.4 Option1 July 25, 2002
S-Box Modifications and Their Effect in DES-like Encryption Systems Joe Gargiulo GSEC v1.4 option1 July 25, 2002 1.0 Summary This paper presents the substitution boxes (s-boxes) found in many block ciphers, and more specifically in DES-like encryption systems. It begins with a brief history of the Data Encryption Standard (DES) and the first public question on the chosen s-boxes. An outline of the DES algorithm is presented, along with a more detailed look of the cipher function that uses the s-boxes. The major methodsKey fingerprint of cryptanalysis = AF19 FA27 are 2F94 reviewed, 998D FDB5 including DE3D how F8B5 they 06E4 use A169 the 4Es-boxes46 for their attacks, and how the risk can be mitigated by alternate schemes. Potential changes to s-boxes described, as well as how these changes may or may not strengthen DES-like encryption systems. Finally, there is a brief example of how some researchers underwent rigorous DES-like s-box construction testing. 2.0 DES and S-Box History In the early 1970s, the National Bureau of Standards (now known as the National Institute of Standards and Technology) requested from the public any proposals for a cryptographic algorithm following certain specific criteria.1 Some of the requirements included that the algorithm must be completely specified, and available to all users. A team from IBM responded to the request, and the details of the algorithm were published after the National Security Agency (NSA) evaluated its suitability. This NSA involvement raises some questions in the design of the mysterious s-boxes used in the algorithm, which will be described in more detail in the following sections. -
Comparative Study of AES, Blowfish, CAST-128 and DES Encryption Algorithm
IOSR Journal of Engineering (IOSRJEN) www.iosrjen.org ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 06, Issue 06 (June. 2016), ||V1|| PP 01-07 Comparative Study Of AES, Blowfish, CAST-128 And DES Encryption Algorithm Youssouf Mahamat koukou, Siti Hajar Othman, Maheyzah MD Siraj. Herve Nkiama I. Faculty of Computing, University Technology Malaysia Abstract This paper provides a fair comparison between four most common symmetric key cryptography algorithms: AES, DES, CAST 128 and Blowfish. The comparison takes into consideration the behavior and the performance of the algorithm when different data load are used as the main concern here, is to study the performance of the algorithms under different settings. The comparison is made on the basis of these parameters: speed, block size, and key size. This paper aims to compare the Avalanche Effect and integrity checking using ECB and CBC mode of the different algorithms: Blowfish, Cast-128, DES and AES for one bit change in key and one bit changed in the cipher text. Crypto tool will be used for implementing the performance analysis for all algorithms mentioned above. After analysis has been conducted we found that AES gives the best security. The experiment shown that in both modes DES gives strong avalanche affect and AES and Cast 128 gives strong change in term of integrity checking compared with others algorithms using ECB and CBC mode. Keywords: Comparison, Avalanche Effect, Integrity Check, Symmetric Encryption Algorithm I. INTRODUCTION Cryptography is the practice and study of hiding information. Prior to the modern age, cryptography was almost synonymous with encryption i.e. -
A Comprehensive Comparison of Symmetric Cryptographic Algorithms by Using Multiple Types of Parameters
IJCSNS International Journal of Computer Science and Network Security, VOL.18 No.12, December 2018 131 A Comprehensive Comparison of Symmetric Cryptographic Algorithms by Using Multiple Types of Parameters Muhammad Usman1, Ijaz Ali Shoukat2, Muhammad Sheraz Arshad Malik3, Mahwish Abid4, Muhammad Mashhood ul Hasan5, Zainab Khalid6 Department of Computer Science, Riphah International University Faisalabad Campus, Pakistan1,2,4,5,6 Department of Information Technology, Government College University Faisalabad, Pakistan3 Abstract data integrity, authentication, and non-repudiation. The In modern world the use of internet is increasingly rapidly and process to convert plain text into unintelligible text or data exchanged over internet is increasing on daily basis. More cipher text in cryptography is called encryption. The the data or transactions carried out over internet more there’s a cipher text is understandable only to someone who knows need to secure data. Security is a main concern as they play with how to decrypt it. Message or information is encrypted confidentiality of data either in every field. Cryptography is one of the best option to overcome this as it maintain the privacy of using an encryption algorithm. Usually this is done with user and this cannot be implemented with use of encryption the use of an encryption key, which specifies how the process. There are two types of cryptographic techniques namely message is to be encoded. Any intruder that can see the symmetric and asymmetric. In this study a comprehensive cipher text should not be able to analyze the original comparison among multiple symmetric techniques is discussed message[3]. in detail. Data owner is able to decipher the text using a decryption Key-terms: algorithm which usually requires a secret decryption key.