SlideShare a Scribd company logo
1 of 15
Download to read offline
By
Name:S.Bakiyalakshmi
Class: II Msc Computer Science
Batch:2017-2019
Incharge Staff:Ms. M.Florence Dayana
STREAM CIPHER
 A stream cipher is a symmetric key cipher where
plaintext digits are combined with
a pseudorandom cipher digit stream (keystream)
 In a stream cipher each plain text is encrypted one at a time with the
corresponding digit of the key stream, to give a digit of the cipher text
stream.
 An alternative name is a state cipher, as the encryption of each digit is
dependent on the current state.
 In practice, a digit is typically a bit and the combining operation
an exclusive -or (XOR).
Example Stream Ciphers
BLOCK CIPHER
 A block of plaintext is treated as a wholeand used to
producea ciphertext block of equal length
 Typicallya block size of 64 or 128 bits is used
 As with astream cipher, the two usersshare a
symmetric encryption key
Example Block Ciphers
A block cipheroperateson a plaintext block of n bits toproduce
a ciphertext blockof n bits. Thereare 2n possible different
plaintext blocks and, for the encryption to be reversible (i.e., for
decryption to be possible), each must produce a unique
ciphertext block. Such a transformation is called reversible, or
nonsingular.
Encryption and Decryption Tables for Substitution Cipher
THE FEISTAL CIPHER
 Feistel cipher is theexecution of twoor moresimple
ciphers in sequence in such a way that the final
result or product is cryptographically stronger than
any of the componentciphers.
 Feistel ciphers are a special class of iterated block
cipherswhere theciphertext is calculated from the
plaintext by repeated application of the same
transformation or roundfunction.
 In a Feistel cipher, the text being encrypted is split into
two halves. The round function f is applied to one half
using a subkey and theoutputof f is exclusive ORed with
other half.
 The two halves are then swapped. Eachround follows the
same pattern except forthe last round there is no swap
 A nice feature of a feistel cipher is that encryption and
decryption are structurally identical, though thesubkeys
used during encryption at each round are taken in reverse
order duringdecryption
DIFFUSION AND CONFUSION
Diffusion:
 Diffusion means that if we change a character of the
plaintext, then several characters of the ciphertext
should change, and similarly, if we change a
characterof theciphertext, then several characters of
the plaintext shouldchange
 diffusion refers to dissipating(unwanted) thestatistical
structureof plaintextover bulk of ciphertext.
Confusion:
 Confusion means that each binary digit (bit) of the
ciphertextshould depend on several partsof the key,
obscuring the connections between thetwo.
 Confusion means that each character of the
ciphertextshould depend on several partsof the
key.
DESIGN FEATURES IN FISTEL
CIPHER
 eBlock size
 Larger block sizes mean greater security but reduced encryption/decryption
speed for a givenalgorithm
Keysize
 Larger keysize meansgreatersecurity but maydecreaseencryption/decryption
speeds
Number of rounds
 Theessenceof the Feistel cipher is thata singleround offers inadequatesecurity
but that multipleroundsoffer increasing security. A typical size is 16 rounds.
Subkey generationalgorithm
 Greatercomplexity in thisalgorithmshould lead togreaterdifficultyof
cryptanalysis
eatures
DESIGN FEATURES IN FISTEL
CIPHER
 Round function F
 Greater complexity generally means greater resistance to
cryptanalysis
Fast softwareencryption/decryption
 In many cases, encrypting is embedded in applications or utility
functions in such a way as to make impossible a hardware
implementation; accordingly, the speed of execution of the
algorithm becomes a concernsoftware
Ease of Analysis
 If thealgorithmcan be conciselyand clearly explained, it is easierto
analyze that algorithm for cryptanalytic vulnerabilities and
thereforedevelopa higher level of assuranceas to its strength
FEISTAL EXAMPLE

More Related Content

What's hot

TakeDownCon Rocket City: Cryptanalysis by Chuck Easttom
TakeDownCon Rocket City: Cryptanalysis by Chuck Easttom TakeDownCon Rocket City: Cryptanalysis by Chuck Easttom
TakeDownCon Rocket City: Cryptanalysis by Chuck Easttom
EC-Council
 

What's hot (20)

History of Cipher System
History of Cipher SystemHistory of Cipher System
History of Cipher System
 
TakeDownCon Rocket City: Cryptanalysis by Chuck Easttom
TakeDownCon Rocket City: Cryptanalysis by Chuck Easttom TakeDownCon Rocket City: Cryptanalysis by Chuck Easttom
TakeDownCon Rocket City: Cryptanalysis by Chuck Easttom
 
Elementary cryptography
Elementary cryptographyElementary cryptography
Elementary cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptanalysis and Attacks
Cryptanalysis and AttacksCryptanalysis and Attacks
Cryptanalysis and Attacks
 
Applied Cryptography
Applied CryptographyApplied Cryptography
Applied Cryptography
 
Introduction to Cryptography and the Public Key Infrastructure
Introduction to Cryptography and the Public Key InfrastructureIntroduction to Cryptography and the Public Key Infrastructure
Introduction to Cryptography and the Public Key Infrastructure
 
What is Cryptography?
What is Cryptography?What is Cryptography?
What is Cryptography?
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography and applications
Cryptography and applicationsCryptography and applications
Cryptography and applications
 
Cryptography
CryptographyCryptography
Cryptography
 
cryptography
cryptographycryptography
cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
 
Encryption
EncryptionEncryption
Encryption
 
My cryptography
My cryptographyMy cryptography
My cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Classical Encryption Techniques
Classical Encryption TechniquesClassical Encryption Techniques
Classical Encryption Techniques
 
Cryptography
Cryptography Cryptography
Cryptography
 
Cryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipherCryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipher
 

Similar to Bakiya

Introduction to Cryptography Week4 Part1-ISrevisionSu.docx
Introduction to Cryptography  Week4 Part1-ISrevisionSu.docxIntroduction to Cryptography  Week4 Part1-ISrevisionSu.docx
Introduction to Cryptography Week4 Part1-ISrevisionSu.docx
mariuse18nolet
 
Cryptographic Tunneling and the OSI ModelWrite a paper consisting .docx
Cryptographic Tunneling and the OSI ModelWrite a paper consisting .docxCryptographic Tunneling and the OSI ModelWrite a paper consisting .docx
Cryptographic Tunneling and the OSI ModelWrite a paper consisting .docx
mydrynan
 

Similar to Bakiya (20)

Block Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption StandardBlock Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption Standard
 
presentation based on data encryption standards
presentation based on data encryption standardspresentation based on data encryption standards
presentation based on data encryption standards
 
Confusion and Diffusion.pptx
Confusion and Diffusion.pptxConfusion and Diffusion.pptx
Confusion and Diffusion.pptx
 
Secure Encryption Technique (SET): A Private Key Cryptosystem
Secure Encryption Technique (SET): A Private Key CryptosystemSecure Encryption Technique (SET): A Private Key Cryptosystem
Secure Encryption Technique (SET): A Private Key Cryptosystem
 
RIT701_CGNS_L5.pptx
RIT701_CGNS_L5.pptxRIT701_CGNS_L5.pptx
RIT701_CGNS_L5.pptx
 
Computer Cryptography and Encryption [by: Magoiga].pptx
Computer Cryptography and Encryption [by: Magoiga].pptxComputer Cryptography and Encryption [by: Magoiga].pptx
Computer Cryptography and Encryption [by: Magoiga].pptx
 
Introduction to Cryptography Week4 Part1-ISrevisionSu.docx
Introduction to Cryptography  Week4 Part1-ISrevisionSu.docxIntroduction to Cryptography  Week4 Part1-ISrevisionSu.docx
Introduction to Cryptography Week4 Part1-ISrevisionSu.docx
 
CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Encryption
EncryptionEncryption
Encryption
 
Cryptographic Tunneling and the OSI ModelWrite a paper consisting .docx
Cryptographic Tunneling and the OSI ModelWrite a paper consisting .docxCryptographic Tunneling and the OSI ModelWrite a paper consisting .docx
Cryptographic Tunneling and the OSI ModelWrite a paper consisting .docx
 
Symmetric and asymmetric key cryptography
Symmetric and asymmetric key cryptographySymmetric and asymmetric key cryptography
Symmetric and asymmetric key cryptography
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
Secret key cryptography
Secret key cryptographySecret key cryptography
Secret key cryptography
 
is 2.pptx
is 2.pptxis 2.pptx
is 2.pptx
 
Secured algorithm for gsm encryption & decryption
Secured algorithm for gsm encryption & decryptionSecured algorithm for gsm encryption & decryption
Secured algorithm for gsm encryption & decryption
 
Enhancing security of caesar cipher using different
Enhancing security of caesar cipher using differentEnhancing security of caesar cipher using different
Enhancing security of caesar cipher using different
 
cns 2marks
cns 2markscns 2marks
cns 2marks
 
Unit 2
Unit 2Unit 2
Unit 2
 
Network Security UNIT-II
Network Security UNIT-IINetwork Security UNIT-II
Network Security UNIT-II
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Recently uploaded (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

Bakiya

  • 1. By Name:S.Bakiyalakshmi Class: II Msc Computer Science Batch:2017-2019 Incharge Staff:Ms. M.Florence Dayana
  • 2. STREAM CIPHER  A stream cipher is a symmetric key cipher where plaintext digits are combined with a pseudorandom cipher digit stream (keystream)  In a stream cipher each plain text is encrypted one at a time with the corresponding digit of the key stream, to give a digit of the cipher text stream.  An alternative name is a state cipher, as the encryption of each digit is dependent on the current state.  In practice, a digit is typically a bit and the combining operation an exclusive -or (XOR).
  • 4. BLOCK CIPHER  A block of plaintext is treated as a wholeand used to producea ciphertext block of equal length  Typicallya block size of 64 or 128 bits is used  As with astream cipher, the two usersshare a symmetric encryption key
  • 6.
  • 7. A block cipheroperateson a plaintext block of n bits toproduce a ciphertext blockof n bits. Thereare 2n possible different plaintext blocks and, for the encryption to be reversible (i.e., for decryption to be possible), each must produce a unique ciphertext block. Such a transformation is called reversible, or nonsingular.
  • 8. Encryption and Decryption Tables for Substitution Cipher
  • 9. THE FEISTAL CIPHER  Feistel cipher is theexecution of twoor moresimple ciphers in sequence in such a way that the final result or product is cryptographically stronger than any of the componentciphers.  Feistel ciphers are a special class of iterated block cipherswhere theciphertext is calculated from the plaintext by repeated application of the same transformation or roundfunction.
  • 10.  In a Feistel cipher, the text being encrypted is split into two halves. The round function f is applied to one half using a subkey and theoutputof f is exclusive ORed with other half.  The two halves are then swapped. Eachround follows the same pattern except forthe last round there is no swap  A nice feature of a feistel cipher is that encryption and decryption are structurally identical, though thesubkeys used during encryption at each round are taken in reverse order duringdecryption
  • 11. DIFFUSION AND CONFUSION Diffusion:  Diffusion means that if we change a character of the plaintext, then several characters of the ciphertext should change, and similarly, if we change a characterof theciphertext, then several characters of the plaintext shouldchange  diffusion refers to dissipating(unwanted) thestatistical structureof plaintextover bulk of ciphertext.
  • 12. Confusion:  Confusion means that each binary digit (bit) of the ciphertextshould depend on several partsof the key, obscuring the connections between thetwo.  Confusion means that each character of the ciphertextshould depend on several partsof the key.
  • 13. DESIGN FEATURES IN FISTEL CIPHER  eBlock size  Larger block sizes mean greater security but reduced encryption/decryption speed for a givenalgorithm Keysize  Larger keysize meansgreatersecurity but maydecreaseencryption/decryption speeds Number of rounds  Theessenceof the Feistel cipher is thata singleround offers inadequatesecurity but that multipleroundsoffer increasing security. A typical size is 16 rounds. Subkey generationalgorithm  Greatercomplexity in thisalgorithmshould lead togreaterdifficultyof cryptanalysis eatures
  • 14. DESIGN FEATURES IN FISTEL CIPHER  Round function F  Greater complexity generally means greater resistance to cryptanalysis Fast softwareencryption/decryption  In many cases, encrypting is embedded in applications or utility functions in such a way as to make impossible a hardware implementation; accordingly, the speed of execution of the algorithm becomes a concernsoftware Ease of Analysis  If thealgorithmcan be conciselyand clearly explained, it is easierto analyze that algorithm for cryptanalytic vulnerabilities and thereforedevelopa higher level of assuranceas to its strength