SlideShare a Scribd company logo
1 of 20
Download to read offline
1
Algorithm Types
&
Algorithm Modes
2
 Algorithm types
 Stream Cipher
 Block Cipher
 Confusion
 The idea of confusion is to hide the relationship between the
cipher text and the key
 Confusion is achieved by means of the substitution techniques.
 Diffusion
 Diffusion hide the relationship between the cipher text and plain
text.
 diffusion is achieved by means of the transposition techniques.
Must know about:
3
Algorithm modes
 The algorithm modes defines the details of the
cryptographic algorithm, once the types is
decided.
 There are four modes of operation (algorithm
modes) of block cipher have been defined.
 It is a technique for enhancing the effect of a
cryptographic algorithm.
Block cipher modes
 Electronic Code Book(ECB)
 Cipher Block Chaining(CBC)
 Cipher Feedback(CFB)
 Output Feedback(OFB)
 Also discuss a variation of the OFB mode,
called as Counter(CTR)
5
Block cipher modes of operation
Algorithm modes
Electronic code
Book(ECB)
Cipher Block
Chaining(CBC)
Cipher feedback
(CFB)
Output Feedback
(OFB)
This two modes work on block
Ciphers.
These two modes work on block
Ciphers acting as stream ciphers
6
Electronic code book (ECB)
 Simplest mode of operation.
 Plain text message is divided into blocks of 64
bits each.
 Each block then encrypted independently of the
other blocks.
 For each blocks same key used for encryption.
7
Electronic code book (ECB)
Encryption
 Reverse process is used for Decryption.
8
Electronic code book (ECB)
 ECB is useful only for small message. (?)
9
Cipher block chaining mode(CBC)
Note: Random Block of text is called as Initialization Vector (IV)
10
Cipher block chaining mode(CBC)
11
Cipher feedback mode(CFB)
Step-1
 Like CBC, a 64 bit initialization vector (IV) is used in
CFB. IV is kept in shift register.
 IV first encrypted and produced 64 bit IV cipher text.
IV Encrypt Encrypted IV
KEY
12
Cipher feedback mode(CFB)
Step-2
 Now, the leftmost j bits of the encrypted IV are XORed
with the first j bits of the plain text.
 This produces the first portion of cipher text (say C) then
transmitted to the receiver.
First j bits of the encrypted IV
XOR
First j bits of the plain text
Cipher text 1 (say C)
13
Cipher feedback mode(CFB)
Step-3
 Now, the bits of IV are shifted left by j positions. Thus the
rightmost j positions of the shift register now contain
unpredictable data. These right most j positions are now
filled with C.
Left shift IV by j positions
Move j bits of C into the
rightmost side of IV
IV
IV
C
14
Cipher feedback mode(CFB)
Step-4
 Now, step 1 through 3 continue until all the plain
text units are encrypted.
15
Cipher feedback mode(CFB)
IV IV IV
Encrypt
Plain text/bits
Take just the
Leftmost j bits
XOR
Cipher text
J bits
Encrypt
Plain text/bits
Take just the
Leftmost j bits
XOR
Cipher text
J bits
Encrypt
Plain text/bits
Take just the
Leftmost j bits
XOR
Cipher text
J bits
Key K K
16
Output feedback mode(OFB)
 Extremely similar to the CFB.
 Only difference is that in the case of OFB, the
output of the IV encryption process is fed into
the next stage of encryption process.
18
Counter Mode(CTR)
 Similar to the OFB with one variation.
 It uses sequence number called counters as the
input to the algorithm.
 After each block is encrypted to fill the register,
the next counter value is used.
 Size of counter value is same as plain text block.
Counter Mode(CTR)
4. algorithm modes (1)

More Related Content

What's hot

Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...
Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...
Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...Madhumita Tamhane
 
Pulse code modulation
Pulse code modulationPulse code modulation
Pulse code modulationGec bharuch
 
Digital Image Processing: Image Restoration
Digital Image Processing: Image RestorationDigital Image Processing: Image Restoration
Digital Image Processing: Image RestorationMostafa G. M. Mostafa
 
Image compression standards
Image compression standardsImage compression standards
Image compression standardskirupasuchi1996
 
Block cipher modes of operation
Block cipher modes of operation Block cipher modes of operation
Block cipher modes of operation harshit chavda
 
video compression techique
video compression techiquevideo compression techique
video compression techiqueAshish Kumar
 
A seminar on INTRODUCTION TO MULTI-RESOLUTION AND WAVELET TRANSFORM
A seminar on INTRODUCTION TO MULTI-RESOLUTION AND WAVELET TRANSFORMA seminar on INTRODUCTION TO MULTI-RESOLUTION AND WAVELET TRANSFORM
A seminar on INTRODUCTION TO MULTI-RESOLUTION AND WAVELET TRANSFORMमनीष राठौर
 
Wavelet transform in image compression
Wavelet transform in image compressionWavelet transform in image compression
Wavelet transform in image compressionjeevithaelangovan
 
digital image processing
digital image processingdigital image processing
digital image processingAbinaya B
 
DES-lecture (1).ppt
DES-lecture (1).pptDES-lecture (1).ppt
DES-lecture (1).pptMrsPrabhaBV
 
Data Communication & Computer Networks : Unipolar & Polar coding
Data Communication & Computer Networks : Unipolar & Polar codingData Communication & Computer Networks : Unipolar & Polar coding
Data Communication & Computer Networks : Unipolar & Polar codingDr Rajiv Srivastava
 
Fundamentals and image compression models
Fundamentals and image compression modelsFundamentals and image compression models
Fundamentals and image compression modelslavanya marichamy
 
Discrete cosine transform
Discrete cosine transform   Discrete cosine transform
Discrete cosine transform Rashmi Karkra
 
Information Theory and Coding Question Bank
Information Theory and Coding Question BankInformation Theory and Coding Question Bank
Information Theory and Coding Question Bankmiraclebabu
 

What's hot (20)

Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...
Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...
Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...
 
Pulse code modulation
Pulse code modulationPulse code modulation
Pulse code modulation
 
Digital Image Processing: Image Restoration
Digital Image Processing: Image RestorationDigital Image Processing: Image Restoration
Digital Image Processing: Image Restoration
 
Image compression standards
Image compression standardsImage compression standards
Image compression standards
 
Block cipher modes of operation
Block cipher modes of operation Block cipher modes of operation
Block cipher modes of operation
 
video compression techique
video compression techiquevideo compression techique
video compression techique
 
A seminar on INTRODUCTION TO MULTI-RESOLUTION AND WAVELET TRANSFORM
A seminar on INTRODUCTION TO MULTI-RESOLUTION AND WAVELET TRANSFORMA seminar on INTRODUCTION TO MULTI-RESOLUTION AND WAVELET TRANSFORM
A seminar on INTRODUCTION TO MULTI-RESOLUTION AND WAVELET TRANSFORM
 
Wavelet transform in image compression
Wavelet transform in image compressionWavelet transform in image compression
Wavelet transform in image compression
 
4. block coding
4. block coding 4. block coding
4. block coding
 
digital image processing
digital image processingdigital image processing
digital image processing
 
Shannon Fano
Shannon FanoShannon Fano
Shannon Fano
 
Subband Coding
Subband CodingSubband Coding
Subband Coding
 
Data Redundacy
Data RedundacyData Redundacy
Data Redundacy
 
Equalization
EqualizationEqualization
Equalization
 
DES-lecture (1).ppt
DES-lecture (1).pptDES-lecture (1).ppt
DES-lecture (1).ppt
 
Data Communication & Computer Networks : Unipolar & Polar coding
Data Communication & Computer Networks : Unipolar & Polar codingData Communication & Computer Networks : Unipolar & Polar coding
Data Communication & Computer Networks : Unipolar & Polar coding
 
Fundamentals and image compression models
Fundamentals and image compression modelsFundamentals and image compression models
Fundamentals and image compression models
 
Hit and-miss transform
Hit and-miss transformHit and-miss transform
Hit and-miss transform
 
Discrete cosine transform
Discrete cosine transform   Discrete cosine transform
Discrete cosine transform
 
Information Theory and Coding Question Bank
Information Theory and Coding Question BankInformation Theory and Coding Question Bank
Information Theory and Coding Question Bank
 

Similar to 4. algorithm modes (1)

Block Cipher and Operation Modes
Block Cipher  and Operation Modes Block Cipher  and Operation Modes
Block Cipher and Operation Modes SHUBHA CHATURVEDI
 
block ciphermodes of operation.pptx
block ciphermodes of operation.pptxblock ciphermodes of operation.pptx
block ciphermodes of operation.pptxDEEPAK948083
 
Block Cipher Modes of Operation And Cmac For Authentication
Block Cipher Modes of Operation And Cmac For AuthenticationBlock Cipher Modes of Operation And Cmac For Authentication
Block Cipher Modes of Operation And Cmac For AuthenticationVittorio Giovara
 
Comparative analysis on different DES model
Comparative analysis on different DES modelComparative analysis on different DES model
Comparative analysis on different DES modelSaeed Siddik
 
Information and data security block cipher operation
Information and data security block cipher operationInformation and data security block cipher operation
Information and data security block cipher operationMazin Alwaaly
 
Information Security
Information SecurityInformation Security
Information Securityraxosz
 
Module 2.pptx
Module 2.pptxModule 2.pptx
Module 2.pptxseethal9
 
Cryptography Symmetric Key Algorithm (CSE)
Cryptography Symmetric Key Algorithm (CSE)Cryptography Symmetric Key Algorithm (CSE)
Cryptography Symmetric Key Algorithm (CSE)SoumyaBhattacharyya14
 
CNIT 141: 5. More About Block Ciphers + Modular Arithmetic 2
CNIT 141: 5. More About Block Ciphers + Modular Arithmetic 2CNIT 141: 5. More About Block Ciphers + Modular Arithmetic 2
CNIT 141: 5. More About Block Ciphers + Modular Arithmetic 2Sam Bowne
 
Modern symmetric cipher
Modern symmetric cipherModern symmetric cipher
Modern symmetric cipherRupesh Mishra
 
DCN Error Detection & Correction
DCN Error Detection & CorrectionDCN Error Detection & Correction
DCN Error Detection & CorrectionRohan Bhatkar
 
Analysis and Implementation of Hard-Decision Viterbi Decoding In Wireless Com...
Analysis and Implementation of Hard-Decision Viterbi Decoding In Wireless Com...Analysis and Implementation of Hard-Decision Viterbi Decoding In Wireless Com...
Analysis and Implementation of Hard-Decision Viterbi Decoding In Wireless Com...IJERA Editor
 
Cryptographic Algorithms: DES and RSA
Cryptographic Algorithms: DES and RSACryptographic Algorithms: DES and RSA
Cryptographic Algorithms: DES and RSAaritraranjan
 
Block Ciphers Modes of Operation
Block Ciphers Modes of OperationBlock Ciphers Modes of Operation
Block Ciphers Modes of OperationRoman Oliynykov
 

Similar to 4. algorithm modes (1) (20)

Block Cipher and Operation Modes
Block Cipher  and Operation Modes Block Cipher  and Operation Modes
Block Cipher and Operation Modes
 
block ciphermodes of operation.pptx
block ciphermodes of operation.pptxblock ciphermodes of operation.pptx
block ciphermodes of operation.pptx
 
Block Cipher Modes of Operation And Cmac For Authentication
Block Cipher Modes of Operation And Cmac For AuthenticationBlock Cipher Modes of Operation And Cmac For Authentication
Block Cipher Modes of Operation And Cmac For Authentication
 
Modes of Operation
Modes of Operation Modes of Operation
Modes of Operation
 
Comparative analysis on different DES model
Comparative analysis on different DES modelComparative analysis on different DES model
Comparative analysis on different DES model
 
Information and data security block cipher operation
Information and data security block cipher operationInformation and data security block cipher operation
Information and data security block cipher operation
 
Information Security
Information SecurityInformation Security
Information Security
 
Module 2.pptx
Module 2.pptxModule 2.pptx
Module 2.pptx
 
03 UNIT-2.pdf
03 UNIT-2.pdf03 UNIT-2.pdf
03 UNIT-2.pdf
 
AES Presentation.pptx
AES Presentation.pptxAES Presentation.pptx
AES Presentation.pptx
 
Cryptography Symmetric Key Algorithm (CSE)
Cryptography Symmetric Key Algorithm (CSE)Cryptography Symmetric Key Algorithm (CSE)
Cryptography Symmetric Key Algorithm (CSE)
 
CNIT 141: 5. More About Block Ciphers + Modular Arithmetic 2
CNIT 141: 5. More About Block Ciphers + Modular Arithmetic 2CNIT 141: 5. More About Block Ciphers + Modular Arithmetic 2
CNIT 141: 5. More About Block Ciphers + Modular Arithmetic 2
 
Code Converters & Parity Checker
Code Converters & Parity CheckerCode Converters & Parity Checker
Code Converters & Parity Checker
 
Modern symmetric cipher
Modern symmetric cipherModern symmetric cipher
Modern symmetric cipher
 
DCN Error Detection & Correction
DCN Error Detection & CorrectionDCN Error Detection & Correction
DCN Error Detection & Correction
 
Analysis and Implementation of Hard-Decision Viterbi Decoding In Wireless Com...
Analysis and Implementation of Hard-Decision Viterbi Decoding In Wireless Com...Analysis and Implementation of Hard-Decision Viterbi Decoding In Wireless Com...
Analysis and Implementation of Hard-Decision Viterbi Decoding In Wireless Com...
 
Encryption
EncryptionEncryption
Encryption
 
Cryptographic Algorithms: DES and RSA
Cryptographic Algorithms: DES and RSACryptographic Algorithms: DES and RSA
Cryptographic Algorithms: DES and RSA
 
Block Ciphers Modes of Operation
Block Ciphers Modes of OperationBlock Ciphers Modes of Operation
Block Ciphers Modes of Operation
 
module-3.pptx
module-3.pptxmodule-3.pptx
module-3.pptx
 

Recently uploaded

UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 

Recently uploaded (20)

Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 

4. algorithm modes (1)

  • 2. 2  Algorithm types  Stream Cipher  Block Cipher  Confusion  The idea of confusion is to hide the relationship between the cipher text and the key  Confusion is achieved by means of the substitution techniques.  Diffusion  Diffusion hide the relationship between the cipher text and plain text.  diffusion is achieved by means of the transposition techniques. Must know about:
  • 3. 3 Algorithm modes  The algorithm modes defines the details of the cryptographic algorithm, once the types is decided.  There are four modes of operation (algorithm modes) of block cipher have been defined.  It is a technique for enhancing the effect of a cryptographic algorithm.
  • 4. Block cipher modes  Electronic Code Book(ECB)  Cipher Block Chaining(CBC)  Cipher Feedback(CFB)  Output Feedback(OFB)  Also discuss a variation of the OFB mode, called as Counter(CTR)
  • 5. 5 Block cipher modes of operation Algorithm modes Electronic code Book(ECB) Cipher Block Chaining(CBC) Cipher feedback (CFB) Output Feedback (OFB) This two modes work on block Ciphers. These two modes work on block Ciphers acting as stream ciphers
  • 6. 6 Electronic code book (ECB)  Simplest mode of operation.  Plain text message is divided into blocks of 64 bits each.  Each block then encrypted independently of the other blocks.  For each blocks same key used for encryption.
  • 7. 7 Electronic code book (ECB) Encryption  Reverse process is used for Decryption.
  • 8. 8 Electronic code book (ECB)  ECB is useful only for small message. (?)
  • 9. 9 Cipher block chaining mode(CBC) Note: Random Block of text is called as Initialization Vector (IV)
  • 11. 11 Cipher feedback mode(CFB) Step-1  Like CBC, a 64 bit initialization vector (IV) is used in CFB. IV is kept in shift register.  IV first encrypted and produced 64 bit IV cipher text. IV Encrypt Encrypted IV KEY
  • 12. 12 Cipher feedback mode(CFB) Step-2  Now, the leftmost j bits of the encrypted IV are XORed with the first j bits of the plain text.  This produces the first portion of cipher text (say C) then transmitted to the receiver. First j bits of the encrypted IV XOR First j bits of the plain text Cipher text 1 (say C)
  • 13. 13 Cipher feedback mode(CFB) Step-3  Now, the bits of IV are shifted left by j positions. Thus the rightmost j positions of the shift register now contain unpredictable data. These right most j positions are now filled with C. Left shift IV by j positions Move j bits of C into the rightmost side of IV IV IV C
  • 14. 14 Cipher feedback mode(CFB) Step-4  Now, step 1 through 3 continue until all the plain text units are encrypted.
  • 15. 15 Cipher feedback mode(CFB) IV IV IV Encrypt Plain text/bits Take just the Leftmost j bits XOR Cipher text J bits Encrypt Plain text/bits Take just the Leftmost j bits XOR Cipher text J bits Encrypt Plain text/bits Take just the Leftmost j bits XOR Cipher text J bits Key K K
  • 16. 16 Output feedback mode(OFB)  Extremely similar to the CFB.  Only difference is that in the case of OFB, the output of the IV encryption process is fed into the next stage of encryption process.
  • 17.
  • 18. 18 Counter Mode(CTR)  Similar to the OFB with one variation.  It uses sequence number called counters as the input to the algorithm.  After each block is encrypted to fill the register, the next counter value is used.  Size of counter value is same as plain text block.