Lecture 10: Multiple Encryption and Brute-Force Attacks by Christof Paar

Lecture 10: Multiple Encryption and Brute-Force Attacks by Christof Paar

54,500 Просмотров

Ссылки и html тэги не поддерживаются


Комментарии:

@AlinaLapina
@AlinaLapina - 01.10.2014 13:53

Christof, your English is very good! With this naïve thing and so forth. But please, if you don't want to pronounce the "th" correctly, use "t"- and "d"-sounds. Like 'this' -> 'dis' and 'thing -> 'ting'. Because the word 'sink' has its own meaning... Besides, I love you, mr Paar, and the way you gives the material.

Ответить
@davidkachoui
@davidkachoui - 19.10.2014 07:24

Why not just use much longer keys?

Ответить
@PhuNguyen-bi7pi
@PhuNguyen-bi7pi - 07.11.2014 16:55

You are the best teacher. Thank you :D

Ответить
@amitk3646
@amitk3646 - 10.07.2015 14:10

I think it's important to mention that double encryption breaks down specifically against known plaintext attacks. I haven't noticed that it was mentioned where "x1" comes from. You only have it if  you have a known plaintext-ciphertext pair ...

Ответить
@buddhamanify
@buddhamanify - 13.10.2015 00:11

These videos are very well done and refreshing....from las vegas

Ответить
@simranaggarwal500
@simranaggarwal500 - 30.12.2015 20:56

In DES decryption, we use k(16) of encryption in the first round of decryption. When we encrypt the plain-text twice using the same key, how are we getting the plain-text? Won't we be using k(1) in round 1 of second encryption?

Ответить
@moati123
@moati123 - 26.08.2016 21:34

Danke schön Professor Paar, are there any videos/book that you would recommend that would help me understand linear cryptanalysis? Thanks!

Ответить
@mayankpratapsingh5256
@mayankpratapsingh5256 - 17.09.2016 16:30

Hello sir, I have a question which may be stupid. Suppose Oscar tries all 2^56 keys on the cipher text . And for every key he will get some plain text . How will he know the actual plain text ?

Ответить
@pihi42
@pihi42 - 25.09.2016 20:42

I'm sorry to be harsh : a quite terrible presentation of relatively simple concepts. Feels like an W3C specification .. lost in notations, distracted by irrelevant sidetracks, pulling the tables, writing instead of talking..
Sorry again. I hope someone can learn from this how not to teach.

Ответить
- 26.09.2016 04:14

Prof. Paar, can we just reduce the complexity of lookup table by O(1) using hash functions?

Ответить
@pervanadurdyeva2721
@pervanadurdyeva2721 - 30.11.2016 12:59

I am waiting video lectures from other lessons.Thank you dear Cristof Paar for your free of charge lectures.

Ответить
@lesbekshagi3911
@lesbekshagi3911 - 09.03.2017 18:58

Thank you alot.

Ответить
@neiloza7501
@neiloza7501 - 19.10.2017 04:45

I feel like I've learned so much so quickly watching your lectures. Thank you

Ответить
@roseb2105
@roseb2105 - 24.02.2018 18:46

why the 2 ^256 i get the 256 but why 2?

Ответить
@roseb2105
@roseb2105 - 12.03.2018 06:15

would somone please care to explain this to me: I do not understand how when the attacker tries to bread double DES how does he tell if he hit the correct keys. suppose the attacker tries a bunch of keys of the left store it in a table then tries the keys on the right there is a match from what he tried on the right side to what is found on the left side ( as mentioned...) might that just mean that the attacker just has attempted the same key twice how does that let him know he hit the correct key?

Ответить
@eliatkinson7528
@eliatkinson7528 - 15.03.2018 20:37

Another brilliant explanation, feel like Im finally getting this, thanks Professor!

Ответить
@roseb2105
@roseb2105 - 17.03.2018 19:31

so the zr value is the plain text value you get after trying to match your yi against a second set of keys untill you find a corresponding set of cipher text from phase 1 of the attack?

Ответить
@BrunoVernay
@BrunoVernay - 22.03.2018 00:08

Excellent point just 1 min before the end, about block cipher, being used as a stream cipher ! So obvious ... once you said it.

Ответить
@nikolailoboda3444
@nikolailoboda3444 - 30.05.2018 19:42

Search in hashtable is not log(n) it's 1.does not matter whether it RAM/HDD/Punch cards . The worst part is that mr. Paar does not seem to be confused by the fact that in his lecture n*log(n)=2n.

Long explanation:
let's fill our hdd of size 2^64 sectors, so that each sector contain a pointer(an offset) to another sector containing key, that was used for encryption followed by pointer to a next key in case of collision or 0 otherwise. Write complexity is o(1) at best, o(n) at worst (if your cypher gives you same value disregard of the key that suck) so it's o(1). reading is the same. if you've cyphertext you can find correct sector and it's also o(1).
Using 2^64 instead of 2^56 space is not nice, but there are more elaborate workarounds for this I'm too lazy to describe here.

Ответить
@nathansherrard4111
@nathansherrard4111 - 02.07.2018 23:20

Prof. Paar, wonderful lectures to date (even though I don't speak German, ha)

One nitpick question - in your Theorem 5.2.1, which describes the expected # of false keys, should there be an extra "minus 1" at the end, to account for the one true positive key?

Or to ask with an example, if in AES we have both an input block size of 128 bits, and a key length of 128 bits, and one PT/CT pair, do we on average expect 2^(128-1*128) = 2^0 = 1 false positives, or NO (2^0 - 1) false positives?

Thanks!

Ответить
@beckychiang2667
@beckychiang2667 - 31.08.2018 01:51

Hats off, Prof Paar! Excellent lectures.

Ответить
@pswalia2u
@pswalia2u - 15.10.2018 22:17

Go to sleep but don't talk 😍😍

Ответить
@anoopmourya3574
@anoopmourya3574 - 06.02.2019 12:45

Thanks a lot.

Ответить
@brod515
@brod515 - 31.08.2020 10:41

I think It's important to point out that the reason The Meet-In-The-Middle attack works efficiently is because we are assuming that searching the table is O(1) complexity or at most O(log(n))

Ответить
@Richard.Andersson
@Richard.Andersson - 23.09.2020 23:26

It is worth noting that the formula in the end to calculate expected number of keys that will be false positives is not correct. It is just a simplified approximation that only works when you have a large discrepancy between the value of H and the sum of t*n.
For example if you assume t = 1, H = 64 and t = 64 you get a result of 1, which is obviously incorrect as the probability of having a false positive should be about 0.64. You get correct values in that case by using the formula: 1-(1-2^-n)^(2^H-1), note that you need a calculator with variable precision arithmetic to handle the huge exponents and the high precisions in the intermediate steps.

Ответить
@jimbob2810
@jimbob2810 - 09.12.2020 22:10

Great explanation. I get the point of the critique of double encryption. However, I wouldn't say it is only "marginally" more secure than DES. Not only does the attacker have to perform 2^57 encrypt/decrypt steps and to obtain something like an exabyte (million terabytes) of storage, he also has to perform 2^56 lookups on a table that takes an exabyte of storage. The NSA and several other intelligence agencies certainly could do that, even Google could probably do that, but it seems like would be prohibitive to any but the most well-funded of evil entities.
I suppose I think like an ordinary engineer rather than a cryptographic computer scientist when thinking about "marginal" improvements.

Ответить
@arkmidis
@arkmidis - 20.12.2020 12:31

Came here for learning about 3DES, stayed for learning German :)

Ответить
@OcteractSG
@OcteractSG - 30.12.2020 09:28

I'm not really sold on the idea that storing 1.08 exabytes of intermediate ciphertext and keys is at all reasonable for an attack, but I suppose it isn't impossible.

Ответить
@TheFrozenblaze_
@TheFrozenblaze_ - 13.06.2021 02:15

Actually, "naïve" isn't really an English word. I think it was actually a French word that was just adopted into the language--similarly to "déjà vu," "cliché," and "fiancé."

Ответить
@damejelyas
@damejelyas - 12.10.2021 23:29

Double Enc Attack we are talking about exabytes of storage which is A LOT!

Ответить
@abbbb5625
@abbbb5625 - 02.11.2021 06:53

Note that the number of phase II 2E56 - 1 because you cannot use the key that was used to encrypt oherwise the X1 would be equal to Y1.

Ответить
@srinivasr3893
@srinivasr3893 - 15.01.2022 14:56

Hello Professor,

I have one question in this lecture. For double and triple encryption, meet in the middle attack, phase 1 is to encrypt X1 for all possible keys. But how does an attacker know whats X1?

Ответить
@yahuiz7877
@yahuiz7877 - 16.02.2022 19:38

Thank you Professor! This is the type of lecture values outstand than reading the textbook by myself!!

Ответить
@florianwege7563
@florianwege7563 - 12.03.2022 18:12

If the problem with DES is that takes a key which is too short in length, is there a way to effectively scale DES like using the same network and principles but with more rounds, more s-boxes etc. so it can be fed a larger key?

Ответить
@ceyhunugur1907
@ceyhunugur1907 - 29.05.2023 07:55

In the triple des, you can also do the meet in the middle attack because we know all the intermediate values. So using intermediate values first we can try to find first two keys, when we find them then we can pass to find the third key. Can we do that? Is my question clear?

Ответить
@sakshamred
@sakshamred - 29.07.2024 20:30

bro's german is very understandable , but huge respect sir , super , Es hat mir viel Spaß gemacht, aber der Vortrag ist okay

Ответить
@dr-Jonas-Birch
@dr-Jonas-Birch - 30.09.2024 22:20

Is it still possible to take your course at uni? JB

Ответить
@justcurious1940
@justcurious1940 - 31.10.2024 18:51

I don't believe that there is no hardware capable of brute forcing a 128 bits encryption.

Ответить
@halildogan6435
@halildogan6435 - 19.11.2024 00:40

Thank you Professor, great lectures

Ответить

Introducing: The Generation Why Podcast Eric Carter-Landin - True Consequences True Crime
5k Azeezbek