Ch02 NetSec5e
Ch02 NetSec5e
Ch02 NetSec5e
Fifth Edition
by William Stallings
Chapter 2
Symmetric Encryption and
Message Confidentiality
“I have solved other ciphers of an abstruseness ten thousand times
greater. Circumstances, and a certain bias of mind, have led me to
take interest in such riddles, and it may well be doubted whether
human ingenuity can construct an enigma of the kind which
human ingenuity may not, by proper application, resolve.”
• Block cipher
• The most commonly used Data
symmetric encryption Encryption
algorithms Standard
(DES)
• Processes the plaintext input
in fixed-sized blocks and
produces a block of ciphertext The three most
of equal size for each plaintext
block
important
symmetric
Advanced block ciphers
Encryption Triple DES
Standard (3DES)
(AES)
Data Encryption Standard (DES)
• Hardware efficiency
• Encryption/decryption can be done in parallel on multiple blocks of plaintext or ciphertext
• Throughput is only limited by the amount of parallelism that is achieved
• Software efficiency
• Because of the opportunities for parallel execution, processors that support parallel features can be
effectively utilized
• Preprocessing
• The execution of the underlying encryption algorithm does not depend on input
of the plaintext or ciphertext --- when the plaintext or ciphertext input is
presented, the only computation is a series of XORs, greatly enhancing
throughput
• Random access
• The ith block of plaintext or ciphertext can be processed in random-access fashion
• Provable security
• It can be shown that CTR is at least as secure as the other modes discussed in this
section
• Simplicity
• Requires only the implementation of the encryption algorithm and not the
decryption algorithm
summary