E Commerce 4
E Commerce 4
E Commerce 4
Lecture 4
SECURE MESSAGING
Threats
- Authentication of message
- Integrity of message.
Confidentiality of message
- Later may claim that it was not sent by him or her, or that
the items ordered and the quantity supplied by the vendor
are not what he or she ordered. In other words, a vendor
must be sure that a customer does not repudiate the actual
order.
Integrity of message
• Basic idea: convert clear text (also called plain text – the
original message) to ciphertext (the encrypted message)
• DES is called a block cipher, as the input bit string is divided into
64-bit blocks.
• Each 64-bit block is transformed using the same key.
• DES is also called a symmetric encryption algorithm as the same
key is used for encryption as well as decryption.
• The algorithm used by DES is designed in such a way that the
operations performed for encryption and decryption can easily be
performed by hardware circuits. Thus, integrated circuit chips can
be designed to perform DES encryption of binary strings fed to it.
• DES transforms blocks of 64-bits corresponding to binary
encoding of ASCII characters of messages text.
• The algorithm uses exclusive OR operation.
Digital Encryption Standard (DES)
Basic Idea
The whole process is represented by the equation: Ri = Li−1 f(Ri−1, Ki). This
algorithm is called Fiestel cypher.
• The key transformation from 56 bits to 48 bits in each round,
extension of bits and contraction of bits are all done by a set of
tables.
Initial Permutation IP
58 50 42 34 26 18 10 2 40 8 48 16 56 24 64 32
60 52 44 36 28 20 12 4 39 7 47 15 55 23 63 31
62 54 46 38 30 22 14 6 38 6 46 14 54 22 62 30
64 56 48 40 32 24 16 8 37 5 45 13 53 21 61 29
57 49 41 33 25 17 9 1 36 4 44 12 52 20 60 28
59 51 43 35 27 19 11 3 35 3 43 11 51 19 59 27
61 53 45 37 29 21 13 5 34 2 42 10 50 18 58 26
63 55 47 39 31 23 15 7 33 1 41 9 49 17 57 25
32 1 2 3 4 5
4 5 6 7 8 9
8 9 10 11 12 13
12 13 14 15 16 17
16 17 18 19 20 21
20 21 22 23 24 25
24 25 26 27 28 29
28 29 30 31 32 1
DES Decryption
27
Meet-in-the-Middle Attack
• Assume C=Ek2(Ek1(P))
• Given the plaintext P and ciphertext C
• Encrypt P using all possible keys k1
• Decrypt C using all possible keys k2
– Check the result with the encrypted plaintext lists
– If found match, they test the found keys again for another
plaintext and ciphertext pair
– If it turns correct, then find the keys
– Otherwise keep decrypting C
28
Triple DES
29
Triple DES
30