In symmetric encryption, a single shared secret key is used for encryption and decryption, as shown in Figure 11.2. These dual-use keys can be used to lock and unlock data. Symmetric encryption is the oldest form of encryption. Systems such as scytale and Caesar's cipher are examples of symmetric encryption. Symmetric encryption provides confidentiality by keeping individuals who do not have the key from knowing the true contents of the message.
Figure 11.2. Symmetric encryption.
For symmetric encryption systems to be effective, there must be a secure method in which to transfer keys; therein lies the weakness of symmetric encryption. Movement of the secret key from one party to another must typically be done in some type of out-of-band method. If email is to be secured, it does little good to send the key via unsecured email because anyone could intercept the email and thereby compromise the security of the encrypted information. Because of this, an out-of-band key exchange must be used. Common out-of-band methods include in-person delivery and snail mail.
Symmetric encryption also suffers from scalability issues. For example, if you need to communicate details about this book to 10 people in a secure manner, the total keys needed would be calculated as follows: N (N 1) / 2 or [10 (10 1) / 2 = 45 keys]. Therefore, key management becomes the second big issue when dealing with symmetric encryption.
You might be thinking that I have offered you nothing but bad news about symmetric encryption, but it does have features that make it an excellent choice for securing data and providing confidentiality. Symmetric encryption is fast. It can encrypt and decrypt very quickly. It also is considered strong. Symmetric encryption is very hard to break if a large key is used. Symmetric algorithms include these:
Data Encryption Standard (DES)
DES grew out of an early 1970s project that was originally developed by IBM. IBM and the National Institute of Standards and Technology (NIST) modified IBM's original encryption standard, known as Lucifer, to use a 56-bit key. The revised standard was endorsed by the NSA. The DES standard was published in 1977 and was released by the American National Standards Institute (ANSI) in 1981.
DES is a symmetric encryption standard that is based on a 64-bit block. DES processes 64 bits of plain text at a time to output 64-bit blocks of cipher text. DES uses a 56-bit key and has four modes of operation: Electronic Codebook (ECB) mode, Cipher Block Chaining (CBC) mode, Cipher Feedback (CFB) mode, and Output Feedback (OFB) mode.
All four modes use the 56-bit key. Although the standard reports the key to be 64 bits, 8 bits are actually used for parity; their purpose is to ensure the integrity of the remaining 56 bits. Therefore, for all practical purposes, the key is really only 56 bits long. Each 64-bit plain-text block is separated into two 32-bit blocks and then processed by the 56-bit key. The plain text is processed by the key through 16 rounds of transpositions and substitutions.
Electronic Codebook (ECB) Mode
ECB is the native encryption mode of DES. Although it produces the highest throughput, it is also the easiest form of DES encryption to break. If used with large amounts of data, it can be easily attacked because the same plain text encrypted with the same key will always produce the same cipher text. This is why it is best used on small amounts of data, such as the encryption of PIN numbers at ATM machines.
Cipher Block Chaining (CBC) Mode
The CBC mode of DES is widely used and is similar to ECB. CBC processes 64-bit blocks of data but inserts some of the cipher text created from the previous block into the next one. This process is called XORing, and it makes the cipher text more secure and less susceptible to cracking. CBC is aptly named because data from one block is used in the next; therefore, the blocks are chained together. As they are chained, any error in one block can be propagated to others. This can make it impossible to decrypt that block and the following blocks as well.
Cipher Feedback (CFB) Mode
CFB is a stream cipher that can be used to encrypt individual characters. Although it is a stream cipher, it is similar to OFB, in that previously generated cipher text is added to subsequent streams. Because the cipher text is streamed together, errors and corruption can propagate through the encryption process.
Output Feedback (OFB) Mode
OFB is also a stream cipher. Unlike CFB, OFB uses plain text to feed back into stream of cipher text. Transmission errors do not propagate throughout the encryption process. An initialization vector is used to create the seed value for the first encrypted block. DES XORs the plain text with a seed value to be applied with subsequent data.
Although DES remained secure for many years, the Electronic Frontier Foundation (EFF) was able to crack DES in 1998 in about 23 hours. Now that DES has been officially retired, it is recommended that Triple-DES (3DES) be used to ensure security. Triple-DES is scheduled to be replaced by the Advanced Encryption Standard (AES).
Before discussing Triple-DES, some of you must be wondering what happened to Double-DES. Although Double-DES has a 112-bit key, it is no more secure than DES; it requires the same work factor to crack as that of DES.
To extend the usefulness of the DES encryption standard, Triple-DES is now being used. Triple-DES can use two or three keys to encrypt data, depending on how it is implemented. Although it is much more secure, it is up to three times as slow as 56-bit DES:
Advanced Encryption Standard (AES)
All good things must end, and that is what NIST decided in 2002 when Rijindael replaced DES and became the new U.S. standard for encrypting sensitive but unclassified data. Rijindael can be implemented in one of three key sizes, including 128, 192, and 256 bits. It is considered a fast, simple, robust encryption mechanism.
International Data Encryption Algorithm (IDEA)
This 64-bit block cipher uses a 128-bit key. Although it has been patented by a Swiss company, it is freely available for noncommercial use. It is considered a secure encryption standard, and there have been no known attacks against it. It operates in four distinct modes, similar to DES. At one time, it was thought that IDEA would replace DES, but patent fees prevented that from happening.
Other Symmetric Algorithms
Other symmetric algorithms include these:
Be sure to take the time to review the various encryption types, block sizes, and key lengths; you can expect to see these items on the exam.