Information Security, How safe is 128 bit Key?

INFORMATION SECURITY 

Constitutes of 4 parts.

  • A. Secrecy/Confidentiality/Encryption
  • B. Authentication: whom you are talking to before revealing sensitive information
  • C. Nonrepudiation: Sender cannot deny that he has not sent the message.
  • D. Integrity: message you received was really the one sent and not something that a malicious adversary Encryption + Integrity

Why DL layer encryption/Link Encryption is not good idea? 

  • With this approach packets have to be decrypted at each router, leaving them vulnerable to attacks from within the router.


Cryptanalysis: Breaking ciphers. 

Kerckhoff’s principle: Whole world should know how crypto algorithm works, All algorithms must be public. Algorithm is parameterized by key only the keys are secret

How safe is 128 bit Key?

The longer the key, higher work to be done by breaking algo.    {Email: 64-bit keys will do, Commercial applications: 128 bits, Govt org: 256 bits}

    bits    No of Unique keys

    2                4

    3                8

    32            4,294,967,296    (4 billion)

   64             18,446,744,073,709,551,616 (18 Quintillion keys)

  128             340,282,366,920,938,463,463,374,607,431,768,211,456  

( 340,282,366,920,938,463,463 Quintillion keys)

1 super computer Operations

  • Per Sec =  10^17 FLOPS (a hundred quadrillion FLOPS floating point operations per second).
  • Per Min = 60 x  10^17
  • Per Hour = 60 x 60 x  10^17
  • Per Day = 24 x 60 x 60 x  10^17
  • Per Month = 30 x 24 x 3600 x  10^17
  • Per Year = 12 x 30 x 24 x 3600 =  31,104,000 x  10^17= 31,104,00 Quintillion 

340,282,366,920,938,463,463 / 31,104,000 = 109,401,481,134,561 (approx) = 109 Trillion 

109 Trillion super computers working parallelly for 1 year can break produce all combinations of 128 bit key


Types of CIPHER ALGORITHMS?

  • 1. Block Ciphers(Mostly used): Encrypt block of characters
  • 2. Stream Ciphers(Obsolete): Encrypt Single character at a time.


How Encryption is performed at H/W Level?

ONLY POSITION OF BITS ARE CHANGED

  • A. PERMUTATION/P-BOX/TRANSPOSITION BOX: Perform internal transposition(change place) and do it at practically the speed of light since no computation is involved, just signal propagation. Internal wiring is not known to world.
  • B. SUBSTITUTION/S-BOX: This can have multiple stages of P-box inside providing more complex method bit position shifting.

Product Cipher: Actual Cipher can use multiple P,S box stages inside to provide better cryptography. With large number of stages output can be a complicated function of the input. Actual implementations have minimum of 10 stages.

 There are more P-boxes at start and end, called Rounds.

No alt text provided for this image


要查看或添加评论,请登录

Amit K.的更多文章

  • Pyunit or Unitest

    Pyunit or Unitest

    Used to test a unit of source code Features: 1. PyUnit is very simple yet very flexible 2.

  • Calling OpenAI APIs from code

    Calling OpenAI APIs from code

    Steps a. Get openAI API Key openaAI API Key b.

    3 条评论
  • FlatList with Example in React Native

    FlatList with Example in React Native

    What is FlatList? displays a scrolling list of changing, but similarly structured, data. Unlike the more generic…

  • Create Postgres Database, Tables, Schema using Diesel(ORM) Rust

    Create Postgres Database, Tables, Schema using Diesel(ORM) Rust

    What is Diesel Diesel is a ORM(object-relational mapping). ORM is programming technique that connects object-oriented…

  • Location Sharing App System Design (Bump)

    Location Sharing App System Design (Bump)

    What is Bump Bump is location sharing Mobile App. Install bump on 2 phones(add as friends).

  • Load Balancers & Caches

    Load Balancers & Caches

    What is Load Balancer? Load Balancer evenly distributes incoming traffic/load among webservers/workers that are defined…

  • REST API / Representation State Transfer

    REST API / Representation State Transfer

    Restful Web Server/Application? Web application that implements HTTP CRUD methods in Restful way. Eg: Twitter, facebook…

  • Inter Thread Communication in Rust using Channels

    Inter Thread Communication in Rust using Channels

    What is Channel? Sender and Receiver are connected via Channel. They can send/recv data via channel.

  • Slices in Rust

    Slices in Rust

    What is Slice Slice is somepart of larger data, it always borrow data(Hence RO) from the sliced type. It gives you a…

  • Traits in Rust

    Traits in Rust

    What is Triat in Rust Interface/class in Rust(declared with keyword trait) having Virtual Functions(not pure Virtual)…

社区洞察

其他会员也浏览了