SlideShare a Scribd company logo
1 of 10
Download to read offline
HASHMI SAFWAN
MODERN SYMMETRIC BLOCK CIPHER(CRYPTOP)
HASHMI SAFWAN
Table of Contents
Moderan Block Cipher.................................................................................................................... 1
1.1 CRYPTON Cipher.....................................................................................................1
1.1.1 Design History.............................................................................................. 1
1.1.2 Mian Features ............................................................................................... 2
1.1.3 High Level Strcuture of CRYPTON ............................................................ 2
1.1.4 Notations.......................................................................................................3
1.1.5 Basic Building Blocks ..................................................................................3
1.1.6 Encryption / Decryption ...............................................................................3
1.1.7 Byte-Wise Subtitution ..................................................................................4
1.1.8 Column Wise Bit Permutation......................................................................4
1.1.9 Column to Row Transpositions....................................................................5
1.1.10 Key Scheduling ..........................................................................................5
1.1.11 Diffusion Property........................................................................................6
1.1.12 Possible Attacks............................................................................................ 6
1.1.13 Conclision.....................................................................................................6
Referebces......................................................................................................................................... 7
HASHMI SAFWAN
List of Figures
Fig 1.1 High Level Structure of Crypton ............................................................................2
Fig 1.2 Data Representation Array.......................................................................................3
Fig 1.3 Byte-Wise Substitution ...........................................................................................4
Fig 1.4 Byte-Wise Permutation(a) .......................................................................................4
Fig 1.4 Byte-Wise Permutation(b) .......................................................................................5
Fig 1.5 Colum to Row Transposition ..................................................................................5
Fig 1.6 Key Scheduling........................................................................................................5
Fig 1.7 Minimum Diffusion Patterns ..................................................................................6
MODERAN BLOCK CIPHER
HASHMI SAFWAN
In cryptography, a block cipher is a deterministic algorithm operational on fixed-length
groups of bits, referred to as blocks, with associate unvarying transformation that's
specified by a symmetric key. Block ciphers operate as necessary elementary
elements within the design of the many cryptological protocols, widely used to
implement encryption of bulk data.
The modern design of block ciphers is predicated on the conception of associate
degree iterated product cipher. In his seminal 1949 publication, communications of
Secrecy Systems, technologist analysed product ciphers and instructed them as a way
of effectively rising security by combining easy operations like substitutions and
permutations.[1] Iterated product ciphers perform encoding in multiple rounds, every of
that uses a distinct sub key derived from the first key. One widespread implementation
of such ciphers, named a Feistel network once crust Feistel, is notably implemented
within the DES cipher [2]. several alternative realizations of block ciphers, like the AES,
are classified as substitution-permutation networks [3].
1.1 Crypton Cipher
The block cipher Crypton is design base on the latter approach. Each block is
representing it into 4 x 4 byte arrays. The round transformation of Crypton
consists of 4 parallelizable step.
1. Byte-Wise substitution.
2. Column wise bit permutation
3. Column to row transposition and
so
4. key additions.
The decryption process can be
created identical as encryptions
method except that sub keys are
applied on every round.
1.1.1 Design History
Main Objective of this cipher are,
• An efficient and Secure block cipher
• Security: high enough to defeat numerous existing attacks like
differential and linear cryptanalysis.
• Simplicity
• Efficiency:
o high performance in code on giant microprocessors
o efficient implementation on cheap 8-bit microprocessors
HASHMI SAFWAN
o very high speed in hardware low hardware quality
• Design Choices
o Substitution Permutation Network (SPN)
SPN more parallelism then Feistel, More hardware-efficient and
more constraint in round function design.
1.1.2 Main Features
• Secure against existing attacks
• A simple, fine-grained design: straightforward to implement/analyze
• Symmetry in encryption and decryption
• High performance on most hardware architectures
• Fast key scheduling: a lot of quicker than one-block encryption
efficient hardware implementation and low complexity.
• High degree of similarity, terribly high speed in hardware: are able
to do many Gbits/sec exploitation concerning 30000 gates
1.1.3 High Level Structure of Crypton
Fig. 1.1 High Level Structure of Crypton
1.1.4 Notation
HASHMI SAFWAN
Data representation in 4 x 4-byte array.
Fig 1.2 Data Representation Array
1.1.5 Basic Building Blocks
• Components of Round Transformation
o Byte-wise Substitution 
o Column-wise Bit Permutation 
o Column-to-Row Transposition 
o Key Xoring 
• Round Transformation 
o Even round rounds: eK = K o  o e o e
o Odd rounds: oK = K o  o o o o
1.1.6 Encryption/Description
• Round keys
o i-th round encryption: Ke
i = {Ke [4i+j]}(0  j  3)
o i-th round decryption: Kd
i = {Kd [4i+j]}(0  j  3)
o e =  o e o , o =  o o o 
o Kd
i = e(Ke
i) for even i, o(Ke
i) for odd i.
• Encryption EK
0121112
eeeee KeKeKeKeKe   
• Decryption DK
Same as encryption except for using Kd instead of Ke.
1.1.7 Byte wise Substitution 
HASHMI SAFWAN
Fig 1.3 Byte-Wise Substitution
1.1.8 Column-wise Bit Permutation  (1)
Fig 1.3 Byte-Wise Permutation (a)
HASHMI SAFWAN
Fig 1.4 Byte-Wise Permutation (b)
1.1.9 Column-to-Row Transposition  / Key Add 
Fig 1.5 Colum to Row Transposition
1.1.10 Key Scheduling
Two step key generation
Fig 1.6 Key Scheduling
HASHMI SAFWAN
1.1.11 Diffusion Property of (1)
Active diffusion order 4/(at least 4 active bytes on average per round)
Fig 1.7 Minimum Diffusion Patterns by  o 
1.1.12 Possible Attacks
• interpolation attacks: no simple algebraic description
• Dedicated SQUARE attacks:
a. the best known attack up to 6 rounds
b. can’t be extended to more round versions
• Side-channel cryptanalysis:
c. timing attacks
d. differential fault analysis
e. differential power analysis
f. Key schedule cryptanalysis
g. weak keys, semi-weak keys, equivalent keys
h. simple relations, related keys
1.1.13 Conclusions
• Advantages:
o strong security against various known attacks (with at least 3-round
safety margin)
o symmetry in encryption and decryption
o uniformly fast on various architectures in software
o efficiently implementable in hardware
o high degree of parallelism: very high speed in hardware
• Remarks:
Can be freely used: royalty-free
HASHMI SAFWAN
References:
1. Shannon, Claude (1949). "Communication Theory of Secrecy Systems".
Bell System Technical Journal. 28 (4): 656–715.
2. Jump up ^ van Tilborg, Henk C. A.; Jajodia, Sushil, eds. (2011).
Encyclopedia of Cryptography and Security. Springer. ISBN 978-1-4419-
5905-8., p. 455.
3. Jump up ^ van Tilborg & Jajodia 2011, p. 1268.
4. Chae Hoon Lim, CRYPTON: A New 128-bit Block Cipher p.1-30

More Related Content

What's hot

Guardians of your CODE
Guardians of your CODEGuardians of your CODE
Guardians of your CODEPeter Hlavaty
 
One Shellcode to Rule Them All: Cross-Platform Exploitation
One Shellcode to Rule Them All: Cross-Platform ExploitationOne Shellcode to Rule Them All: Cross-Platform Exploitation
One Shellcode to Rule Them All: Cross-Platform ExploitationQuinn Wilton
 
Software to the slaughter
Software to the slaughterSoftware to the slaughter
Software to the slaughterQuinn Wilton
 
2010 vampir workshop_iu_configuration
2010 vampir workshop_iu_configuration2010 vampir workshop_iu_configuration
2010 vampir workshop_iu_configurationPTIHPA
 
Александр Зайцев - Port Knocking, short notes
Александр Зайцев - Port Knocking, short notes Александр Зайцев - Port Knocking, short notes
Александр Зайцев - Port Knocking, short notes Positive Hack Days
 
For the Greater Good: Leveraging VMware's RPC Interface for fun and profit by...
For the Greater Good: Leveraging VMware's RPC Interface for fun and profit by...For the Greater Good: Leveraging VMware's RPC Interface for fun and profit by...
For the Greater Good: Leveraging VMware's RPC Interface for fun and profit by...CODE BLUE
 
Rainbow Over the Windows: More Colors Than You Could Expect
Rainbow Over the Windows: More Colors Than You Could ExpectRainbow Over the Windows: More Colors Than You Could Expect
Rainbow Over the Windows: More Colors Than You Could ExpectPeter Hlavaty
 
ハイパフォーマンスブラウザネットワーキング2
ハイパフォーマンスブラウザネットワーキング2ハイパフォーマンスブラウザネットワーキング2
ハイパフォーマンスブラウザネットワーキング2Shuya Osaki
 
Как мы охотимся на гонки (data races) или «найди багу до того, как она нашла ...
Как мы охотимся на гонки (data races) или «найди багу до того, как она нашла ...Как мы охотимся на гонки (data races) или «найди багу до того, как она нашла ...
Как мы охотимся на гонки (data races) или «найди багу до того, как она нашла ...yaevents
 
Vm ware fuzzing - defcon russia 20
Vm ware fuzzing  - defcon russia 20Vm ware fuzzing  - defcon russia 20
Vm ware fuzzing - defcon russia 20DefconRussia
 
ZeroMQ: Super Sockets - by J2 Labs
ZeroMQ: Super Sockets - by J2 LabsZeroMQ: Super Sockets - by J2 Labs
ZeroMQ: Super Sockets - by J2 LabsJames Dennis
 
LMG Lightning Talks - SFO17-205
LMG Lightning Talks - SFO17-205LMG Lightning Talks - SFO17-205
LMG Lightning Talks - SFO17-205Linaro
 
CNIT 127 Ch 3: Shellcode
CNIT 127 Ch 3: ShellcodeCNIT 127 Ch 3: Shellcode
CNIT 127 Ch 3: ShellcodeSam Bowne
 
Take a Jailbreak -Stunning Guards for iOS Jailbreak- by Kaoru Otsuka
Take a Jailbreak -Stunning Guards for iOS Jailbreak- by Kaoru OtsukaTake a Jailbreak -Stunning Guards for iOS Jailbreak- by Kaoru Otsuka
Take a Jailbreak -Stunning Guards for iOS Jailbreak- by Kaoru OtsukaCODE BLUE
 
September Ethereum Berlin Workshop
September Ethereum Berlin WorkshopSeptember Ethereum Berlin Workshop
September Ethereum Berlin Workshopaeronbuchanan
 
Zn task - defcon russia 20
Zn task  - defcon russia 20Zn task  - defcon russia 20
Zn task - defcon russia 20DefconRussia
 
#Include os - From bootloader to REST API with the new C++
#Include os - From bootloader to REST API with the new C++#Include os - From bootloader to REST API with the new C++
#Include os - From bootloader to REST API with the new C++IncludeOS
 

What's hot (20)

Guardians of your CODE
Guardians of your CODEGuardians of your CODE
Guardians of your CODE
 
One Shellcode to Rule Them All: Cross-Platform Exploitation
One Shellcode to Rule Them All: Cross-Platform ExploitationOne Shellcode to Rule Them All: Cross-Platform Exploitation
One Shellcode to Rule Them All: Cross-Platform Exploitation
 
Racing with Droids
Racing with DroidsRacing with Droids
Racing with Droids
 
Software to the slaughter
Software to the slaughterSoftware to the slaughter
Software to the slaughter
 
2010 vampir workshop_iu_configuration
2010 vampir workshop_iu_configuration2010 vampir workshop_iu_configuration
2010 vampir workshop_iu_configuration
 
Александр Зайцев - Port Knocking, short notes
Александр Зайцев - Port Knocking, short notes Александр Зайцев - Port Knocking, short notes
Александр Зайцев - Port Knocking, short notes
 
For the Greater Good: Leveraging VMware's RPC Interface for fun and profit by...
For the Greater Good: Leveraging VMware's RPC Interface for fun and profit by...For the Greater Good: Leveraging VMware's RPC Interface for fun and profit by...
For the Greater Good: Leveraging VMware's RPC Interface for fun and profit by...
 
Rainbow Over the Windows: More Colors Than You Could Expect
Rainbow Over the Windows: More Colors Than You Could ExpectRainbow Over the Windows: More Colors Than You Could Expect
Rainbow Over the Windows: More Colors Than You Could Expect
 
ハイパフォーマンスブラウザネットワーキング2
ハイパフォーマンスブラウザネットワーキング2ハイパフォーマンスブラウザネットワーキング2
ハイパフォーマンスブラウザネットワーキング2
 
Как мы охотимся на гонки (data races) или «найди багу до того, как она нашла ...
Как мы охотимся на гонки (data races) или «найди багу до того, как она нашла ...Как мы охотимся на гонки (data races) или «найди багу до того, как она нашла ...
Как мы охотимся на гонки (data races) или «найди багу до того, как она нашла ...
 
Vm ware fuzzing - defcon russia 20
Vm ware fuzzing  - defcon russia 20Vm ware fuzzing  - defcon russia 20
Vm ware fuzzing - defcon russia 20
 
OVS-NFV Tutorial
OVS-NFV TutorialOVS-NFV Tutorial
OVS-NFV Tutorial
 
ZeroMQ: Super Sockets - by J2 Labs
ZeroMQ: Super Sockets - by J2 LabsZeroMQ: Super Sockets - by J2 Labs
ZeroMQ: Super Sockets - by J2 Labs
 
LMG Lightning Talks - SFO17-205
LMG Lightning Talks - SFO17-205LMG Lightning Talks - SFO17-205
LMG Lightning Talks - SFO17-205
 
CNIT 127 Ch 3: Shellcode
CNIT 127 Ch 3: ShellcodeCNIT 127 Ch 3: Shellcode
CNIT 127 Ch 3: Shellcode
 
Take a Jailbreak -Stunning Guards for iOS Jailbreak- by Kaoru Otsuka
Take a Jailbreak -Stunning Guards for iOS Jailbreak- by Kaoru OtsukaTake a Jailbreak -Stunning Guards for iOS Jailbreak- by Kaoru Otsuka
Take a Jailbreak -Stunning Guards for iOS Jailbreak- by Kaoru Otsuka
 
September Ethereum Berlin Workshop
September Ethereum Berlin WorkshopSeptember Ethereum Berlin Workshop
September Ethereum Berlin Workshop
 
Zn task - defcon russia 20
Zn task  - defcon russia 20Zn task  - defcon russia 20
Zn task - defcon russia 20
 
#Include os - From bootloader to REST API with the new C++
#Include os - From bootloader to REST API with the new C++#Include os - From bootloader to REST API with the new C++
#Include os - From bootloader to REST API with the new C++
 
Attack on the Core
Attack on the CoreAttack on the Core
Attack on the Core
 

Similar to MODERAN BLOCK CIPHER

Strength of des & block cipher principle
Strength of des & block cipher principleStrength of des & block cipher principle
Strength of des & block cipher principleSantosh Gupta
 
Block Cipher and its Design Principles
Block Cipher and its Design PrinciplesBlock Cipher and its Design Principles
Block Cipher and its Design PrinciplesSHUBHA CHATURVEDI
 
Block Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption StandardBlock Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption StandardDr.Florence Dayana
 
Information and data security block cipher and the data encryption standard (...
Information and data security block cipher and the data encryption standard (...Information and data security block cipher and the data encryption standard (...
Information and data security block cipher and the data encryption standard (...Mazin Alwaaly
 
Computer security module 2
Computer security module 2Computer security module 2
Computer security module 2Deepak John
 
Next-generation sequencing data format and visualization with ngs.plot 2015
Next-generation sequencing data format and visualization with ngs.plot 2015Next-generation sequencing data format and visualization with ngs.plot 2015
Next-generation sequencing data format and visualization with ngs.plot 2015Li Shen
 
Information and network security 19 feistel cipher
Information and network security 19 feistel cipherInformation and network security 19 feistel cipher
Information and network security 19 feistel cipherVaibhav Khanna
 
Information and network security 28 blowfish
Information and network security 28 blowfishInformation and network security 28 blowfish
Information and network security 28 blowfishVaibhav Khanna
 
DES-lecture (1).ppt
DES-lecture (1).pptDES-lecture (1).ppt
DES-lecture (1).pptMrsPrabhaBV
 
Cryptographic Protocols: Practical revocation and key rotation
Cryptographic Protocols: Practical revocation and key rotationCryptographic Protocols: Practical revocation and key rotation
Cryptographic Protocols: Practical revocation and key rotationPriyanka Aash
 
Scaling ingest pipelines with high performance computing principles - Rajiv K...
Scaling ingest pipelines with high performance computing principles - Rajiv K...Scaling ingest pipelines with high performance computing principles - Rajiv K...
Scaling ingest pipelines with high performance computing principles - Rajiv K...SignalFx
 
High performance network programming on the jvm oscon 2012
High performance network programming on the jvm   oscon 2012 High performance network programming on the jvm   oscon 2012
High performance network programming on the jvm oscon 2012 Erik Onnen
 
Lightweight cryptography
Lightweight cryptographyLightweight cryptography
Lightweight cryptographyShivam Singh
 
Information and network security 18 modern techniques block ciphers
Information and network security 18 modern techniques block ciphersInformation and network security 18 modern techniques block ciphers
Information and network security 18 modern techniques block ciphersVaibhav Khanna
 
CNIT 141 5. Stream Ciphers
CNIT 141 5. Stream CiphersCNIT 141 5. Stream Ciphers
CNIT 141 5. Stream CiphersSam Bowne
 

Similar to MODERAN BLOCK CIPHER (20)

3.pptx
3.pptx3.pptx
3.pptx
 
Strength of des & block cipher principle
Strength of des & block cipher principleStrength of des & block cipher principle
Strength of des & block cipher principle
 
Block Cipher and its Design Principles
Block Cipher and its Design PrinciplesBlock Cipher and its Design Principles
Block Cipher and its Design Principles
 
Block Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption StandardBlock Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption Standard
 
Information and data security block cipher and the data encryption standard (...
Information and data security block cipher and the data encryption standard (...Information and data security block cipher and the data encryption standard (...
Information and data security block cipher and the data encryption standard (...
 
Ch03
Ch03Ch03
Ch03
 
Computer security module 2
Computer security module 2Computer security module 2
Computer security module 2
 
cns 2marks
cns 2markscns 2marks
cns 2marks
 
Next-generation sequencing data format and visualization with ngs.plot 2015
Next-generation sequencing data format and visualization with ngs.plot 2015Next-generation sequencing data format and visualization with ngs.plot 2015
Next-generation sequencing data format and visualization with ngs.plot 2015
 
Information and network security 19 feistel cipher
Information and network security 19 feistel cipherInformation and network security 19 feistel cipher
Information and network security 19 feistel cipher
 
Information and network security 28 blowfish
Information and network security 28 blowfishInformation and network security 28 blowfish
Information and network security 28 blowfish
 
DES-lecture (1).ppt
DES-lecture (1).pptDES-lecture (1).ppt
DES-lecture (1).ppt
 
Cryptographic Protocols: Practical revocation and key rotation
Cryptographic Protocols: Practical revocation and key rotationCryptographic Protocols: Practical revocation and key rotation
Cryptographic Protocols: Practical revocation and key rotation
 
Block Ciphers Modes of Operation
Block Ciphers Modes of OperationBlock Ciphers Modes of Operation
Block Ciphers Modes of Operation
 
Scaling ingest pipelines with high performance computing principles - Rajiv K...
Scaling ingest pipelines with high performance computing principles - Rajiv K...Scaling ingest pipelines with high performance computing principles - Rajiv K...
Scaling ingest pipelines with high performance computing principles - Rajiv K...
 
DES.ppt
DES.pptDES.ppt
DES.ppt
 
High performance network programming on the jvm oscon 2012
High performance network programming on the jvm   oscon 2012 High performance network programming on the jvm   oscon 2012
High performance network programming on the jvm oscon 2012
 
Lightweight cryptography
Lightweight cryptographyLightweight cryptography
Lightweight cryptography
 
Information and network security 18 modern techniques block ciphers
Information and network security 18 modern techniques block ciphersInformation and network security 18 modern techniques block ciphers
Information and network security 18 modern techniques block ciphers
 
CNIT 141 5. Stream Ciphers
CNIT 141 5. Stream CiphersCNIT 141 5. Stream Ciphers
CNIT 141 5. Stream Ciphers
 

More from Safwan Hashmi

More from Safwan Hashmi (16)

Dark web
Dark webDark web
Dark web
 
CEASER & VIGENERE CIPHER IMPLEMENTATION
CEASER & VIGENERE CIPHER IMPLEMENTATIONCEASER & VIGENERE CIPHER IMPLEMENTATION
CEASER & VIGENERE CIPHER IMPLEMENTATION
 
Incident managment plan
Incident managment planIncident managment plan
Incident managment plan
 
Business continuity plan
Business continuity planBusiness continuity plan
Business continuity plan
 
Sql injection
Sql injectionSql injection
Sql injection
 
Soap xp-wg
Soap xp-wgSoap xp-wg
Soap xp-wg
 
Sql security
Sql securitySql security
Sql security
 
Database design
Database designDatabase design
Database design
 
Alpha beta prouning
Alpha beta prouningAlpha beta prouning
Alpha beta prouning
 
Color and color models
Color and color modelsColor and color models
Color and color models
 
Introduction to SOAP
Introduction to SOAPIntroduction to SOAP
Introduction to SOAP
 
Democracy.s
Democracy.sDemocracy.s
Democracy.s
 
Democracy01
Democracy01Democracy01
Democracy01
 
Democracy.ppt
Democracy.pptDemocracy.ppt
Democracy.ppt
 
Calunization
CalunizationCalunization
Calunization
 
Development
DevelopmentDevelopment
Development
 

Recently uploaded

Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 

MODERAN BLOCK CIPHER

  • 1. HASHMI SAFWAN MODERN SYMMETRIC BLOCK CIPHER(CRYPTOP)
  • 2. HASHMI SAFWAN Table of Contents Moderan Block Cipher.................................................................................................................... 1 1.1 CRYPTON Cipher.....................................................................................................1 1.1.1 Design History.............................................................................................. 1 1.1.2 Mian Features ............................................................................................... 2 1.1.3 High Level Strcuture of CRYPTON ............................................................ 2 1.1.4 Notations.......................................................................................................3 1.1.5 Basic Building Blocks ..................................................................................3 1.1.6 Encryption / Decryption ...............................................................................3 1.1.7 Byte-Wise Subtitution ..................................................................................4 1.1.8 Column Wise Bit Permutation......................................................................4 1.1.9 Column to Row Transpositions....................................................................5 1.1.10 Key Scheduling ..........................................................................................5 1.1.11 Diffusion Property........................................................................................6 1.1.12 Possible Attacks............................................................................................ 6 1.1.13 Conclision.....................................................................................................6 Referebces......................................................................................................................................... 7
  • 3. HASHMI SAFWAN List of Figures Fig 1.1 High Level Structure of Crypton ............................................................................2 Fig 1.2 Data Representation Array.......................................................................................3 Fig 1.3 Byte-Wise Substitution ...........................................................................................4 Fig 1.4 Byte-Wise Permutation(a) .......................................................................................4 Fig 1.4 Byte-Wise Permutation(b) .......................................................................................5 Fig 1.5 Colum to Row Transposition ..................................................................................5 Fig 1.6 Key Scheduling........................................................................................................5 Fig 1.7 Minimum Diffusion Patterns ..................................................................................6 MODERAN BLOCK CIPHER
  • 4. HASHMI SAFWAN In cryptography, a block cipher is a deterministic algorithm operational on fixed-length groups of bits, referred to as blocks, with associate unvarying transformation that's specified by a symmetric key. Block ciphers operate as necessary elementary elements within the design of the many cryptological protocols, widely used to implement encryption of bulk data. The modern design of block ciphers is predicated on the conception of associate degree iterated product cipher. In his seminal 1949 publication, communications of Secrecy Systems, technologist analysed product ciphers and instructed them as a way of effectively rising security by combining easy operations like substitutions and permutations.[1] Iterated product ciphers perform encoding in multiple rounds, every of that uses a distinct sub key derived from the first key. One widespread implementation of such ciphers, named a Feistel network once crust Feistel, is notably implemented within the DES cipher [2]. several alternative realizations of block ciphers, like the AES, are classified as substitution-permutation networks [3]. 1.1 Crypton Cipher The block cipher Crypton is design base on the latter approach. Each block is representing it into 4 x 4 byte arrays. The round transformation of Crypton consists of 4 parallelizable step. 1. Byte-Wise substitution. 2. Column wise bit permutation 3. Column to row transposition and so 4. key additions. The decryption process can be created identical as encryptions method except that sub keys are applied on every round. 1.1.1 Design History Main Objective of this cipher are, • An efficient and Secure block cipher • Security: high enough to defeat numerous existing attacks like differential and linear cryptanalysis. • Simplicity • Efficiency: o high performance in code on giant microprocessors o efficient implementation on cheap 8-bit microprocessors
  • 5. HASHMI SAFWAN o very high speed in hardware low hardware quality • Design Choices o Substitution Permutation Network (SPN) SPN more parallelism then Feistel, More hardware-efficient and more constraint in round function design. 1.1.2 Main Features • Secure against existing attacks • A simple, fine-grained design: straightforward to implement/analyze • Symmetry in encryption and decryption • High performance on most hardware architectures • Fast key scheduling: a lot of quicker than one-block encryption efficient hardware implementation and low complexity. • High degree of similarity, terribly high speed in hardware: are able to do many Gbits/sec exploitation concerning 30000 gates 1.1.3 High Level Structure of Crypton Fig. 1.1 High Level Structure of Crypton 1.1.4 Notation
  • 6. HASHMI SAFWAN Data representation in 4 x 4-byte array. Fig 1.2 Data Representation Array 1.1.5 Basic Building Blocks • Components of Round Transformation o Byte-wise Substitution  o Column-wise Bit Permutation  o Column-to-Row Transposition  o Key Xoring  • Round Transformation  o Even round rounds: eK = K o  o e o e o Odd rounds: oK = K o  o o o o 1.1.6 Encryption/Description • Round keys o i-th round encryption: Ke i = {Ke [4i+j]}(0  j  3) o i-th round decryption: Kd i = {Kd [4i+j]}(0  j  3) o e =  o e o , o =  o o o  o Kd i = e(Ke i) for even i, o(Ke i) for odd i. • Encryption EK 0121112 eeeee KeKeKeKeKe    • Decryption DK Same as encryption except for using Kd instead of Ke. 1.1.7 Byte wise Substitution 
  • 7. HASHMI SAFWAN Fig 1.3 Byte-Wise Substitution 1.1.8 Column-wise Bit Permutation  (1) Fig 1.3 Byte-Wise Permutation (a)
  • 8. HASHMI SAFWAN Fig 1.4 Byte-Wise Permutation (b) 1.1.9 Column-to-Row Transposition  / Key Add  Fig 1.5 Colum to Row Transposition 1.1.10 Key Scheduling Two step key generation Fig 1.6 Key Scheduling
  • 9. HASHMI SAFWAN 1.1.11 Diffusion Property of (1) Active diffusion order 4/(at least 4 active bytes on average per round) Fig 1.7 Minimum Diffusion Patterns by  o  1.1.12 Possible Attacks • interpolation attacks: no simple algebraic description • Dedicated SQUARE attacks: a. the best known attack up to 6 rounds b. can’t be extended to more round versions • Side-channel cryptanalysis: c. timing attacks d. differential fault analysis e. differential power analysis f. Key schedule cryptanalysis g. weak keys, semi-weak keys, equivalent keys h. simple relations, related keys 1.1.13 Conclusions • Advantages: o strong security against various known attacks (with at least 3-round safety margin) o symmetry in encryption and decryption o uniformly fast on various architectures in software o efficiently implementable in hardware o high degree of parallelism: very high speed in hardware • Remarks: Can be freely used: royalty-free
  • 10. HASHMI SAFWAN References: 1. Shannon, Claude (1949). "Communication Theory of Secrecy Systems". Bell System Technical Journal. 28 (4): 656–715. 2. Jump up ^ van Tilborg, Henk C. A.; Jajodia, Sushil, eds. (2011). Encyclopedia of Cryptography and Security. Springer. ISBN 978-1-4419- 5905-8., p. 455. 3. Jump up ^ van Tilborg & Jajodia 2011, p. 1268. 4. Chae Hoon Lim, CRYPTON: A New 128-bit Block Cipher p.1-30