Lecture 9, using block and stream ciphers for secure wired and wifi communications. The goals of this chapter are: To present 2DES and its vulnerability to the meet-in-the-middle attack, to present two-key 3DES and three-key 3DES, to present the five different modes in which a block cipher can be used in practical systems for secure communications,. | Lecture 9: Using Block and Stream Ciphers for Secure Wired and WiFi Communications Lecture Notes on “Computer and Network Security” by Avi Kak (kak@) February 11, 2016 9:19am c 2016 Avinash Kak, Purdue University Goals: • To present 2DES and its vulnerability to the meet-in-the-middle attack • To present two-key 3DES and three-key 3DES • To present the five different modes in which a block cipher can be used in practical systems for secure communications • To discuss stream ciphers and to review RC4 stream cipher algorithm • To review problems with the WEP protocol for home wireless networks • To review the Klein and PTW attacks on WEP • Using aircrack-ng to crack a WEP key CONTENTS Section Title Page Multiple Encryptions with DES for a More Secure Cipher 3 Double DES 4 Can a Double-DES (2DES) Plaintext-to-Ciphertext Mapping be Equivalent to a Single-DES Mapping? 6 Vulnerability of Double DES to the Meet-in-the-Middle Attack 11 Triple DES with Two Keys Possible Ways to Attack 3DES Based on Two Keys 16 18 Triple DES with Three Keys 22 Five Modes of Operation for Block Ciphers 24 The Electronic Codebook Mode (ECB) 28 The Cipher Block Chaining Mode (CBC) 38 The Cipher Feedback Mode (CFB) 40 The Output Feedback Mode (OFB) 43 The Counter Mode (CTR) 45 Stream Ciphers 48 The RC4 Stream Cipher Algorithm 52 WEP for WiFi 57 62 The PTW Attack for Figuring Out the WEP Root Key 71 The Klein Attack for Figuring Out the WEP Root Key Using the aircrack-ng Package to Break WEP in Under a Minute 73 Homework Problems 80 Computer and Network Security by Avi Kak Lecture 9 : MULTIPLE ENCRYPTIONS WITH DES FOR A MORE SECURE CIPHER • As you already know, the DES cryptographic system was shown to not be very secure about 10 years ago. • We can obviously use AES cryptography that is designed to be extremely secure,