SlideShare a Scribd company logo
Classical Cryptographic Techniques,
Feistel Cipher Structure
Adri Jovin J J, M.Tech., Ph.D.
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY
Symmetric Cipher Model
Plaintext
the original intelligible message or data that is fed into the algorithm as input.
Encryption algorithm
performs various substitutions and transformations on the plaintext
Secret key
a value independent of the plaintext and of the algorithm which helps the algorithm to produce a different output
depending on the one being used at the time
Ciphertext
the scrambled message produced as output
Decryption algorithm
essentially the encryption algorithm run in reverse
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 2
A question….
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 3
Why most cryptographic algorithms are open to the public?
The reason is:
Kerckhoff’s Principle
Encryption Scheme is not secret
- The only secret is the key
- The key must be chosen at random and kept secret
Advantages:
• Easier to keep a secret key than a secret algorithm
• Easier to change the key than the algorithm
• Standardization
• Ease of deployment
• Public validation
Cryptography
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 4
Cryptographic systems are characterized along three independent dimensions:
1. The type of operations used for transforming plaintext to ciphertext
2. The number of keys used
3. The way in which the plaintext is processed
Cryptanalysis
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 5
Cryptanalysis
Rely on the nature of the algorithm plus
perhaps some knowledge of the general
characteristics of the plaintext or even some
sample plaintext-ciphertext pairs
Brute-force attack
Attacker tries every possible key on a piece of
ciphertext until an intelligible translation into
plaintext is obtained
Type of attack Known to cryptanalyst
Ciphertext Only • Encryption algorithm
• Ciphertext
Known Plaintext • Encryption algorithm
• Ciphertext
• One or more plaintext–ciphertext pairs formed with the
secret key
Chosen Plaintext • Encryption algorithm
• Ciphertext
• Plaintext message chosen by cryptanalyst, together with
its corresponding ciphertext generated with the secret key
Type of attack Known to cryptanalyst
Chosen Ciphertext • Encryption algorithm
• Ciphertext
• Ciphertext chosen by cryptanalyst, together with its
corresponding decrypted plaintext generated with the secret
key
Chosen Text • Encryption algorithm
• Ciphertext
• Plaintext message chosen by cryptanalyst, together with its
corresponding ciphertext generated with the secret key
• Ciphertext chosen by cryptanalyst, together with its
corresponding decrypted plaintext generated with the secret
key
Average Time Required for Exhaustive Key Search
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 6
Key size (bits) Number of alternative keys Time required at 1 decryption/ms Time required at 106
decryption/ms
32 232 = 4.3 x 109 231 ms = 35.8 minutes 2.15 milliseconds
56 256 = 7.2 x 1016 255 ms = 1142 years 10.01 hours
128 2128 = 3.4 x 1038 2127 ms = 5.4 x 1024 years 5.4 x 1018 years
168 2168 = 3.7 x 1050 2167 ms = 5.9 x 1036 years 5.9 x 1030 years
26 characters
(permutation)
26! = 4 x 1026 2 x 1026 ms = 6.4 x 1012 years 6.4 x 106 years
Caesar Cipher
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 7
plain: meet me after the toga party
cipher: PHHW PH DIWHU WKH WRJD SDUWB
C = E(3, p) = (p + 3) mod 26
Generalised as:
C = E(k, p) = (p + k) mod 26
Decryption: p = D(k, C) = (C - k) mod 26
a b c d e f g h i j k l m
0 1 2 3 4 5 6 7 8 9 10 11 12
n o p q r s t u v w x y z
13 14 15 16 17 18 19 20 21 22 23 24 25
helloworld jgnnqyqtnfb
c
Brute-Force Cryptanalysis of Caesar Cipher
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 8
Playfair Cipher
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 9
1. Repeating plaintext letters that are in the same pair are separated with a filler letter,
such as x, so that balloon would be treated as ba lx lo on.
2. Two plaintext letters that fall in the same row of the matrix are each replaced by the
letter to the right, with the first element of the row circularly following the last. For
example, ar is encrypted as RM.
3. Two plaintext letters that fall in the same column are each replaced by the letter
beneath, with the top element of the column circularly following the last. For
example, mu is encrypted as CM.
4. Otherwise, each plaintext letter in a pair is replaced by the letter that lies in its own
row and the column occupied by the other plaintext letter. Thus, hs becomes BP and
ea becomes IM (or JM, as the encipherer wishes).
Hill Cipher
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 10
    26mod
333231
232221
131211
321321











kkk
kkk
kkk
pppccc
C = KP mod 26
P = K-1C mod 26
An example
Plain text=‘pay more money’
𝐾 =
17 17 5
21 18 21
2 2 19
𝑃 =
15
0
24
𝐾𝑃 =
375
819
486
mod 26
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 11
𝐾𝑃 =
11
13
18
=
𝐿
𝑁
𝑆
𝐾−1
=
4 9 15
15 17 6
24 0 17
Vigenère Cipher
• Poly-alphabetic
• A set of related monoalphabetic substitution rules is used.
• A key determines which particular rule is chosen for a given transformation.
Key : deceptivedeceptivedeceptive
Plaintext : wearediscoveredsaveyourself
Ciphertext : ZICVTWQNGRZGVTWAVZHCQYGLMGJ
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 12
The Modern Vigenère Tableau
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 13
Image Source:
https://pages.mtu.edu/~shen
e/NSF-4/Tutorial/VIG/Vig-
Base.html
ASCII Table
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 14
ASCII-based solution
Plain-text: Hello!
Key: 0xA1 2F
Plain-text XOR Key
Hello! – 0x48 65 6C 6C 6F 21
XOR 0xA1 2F A1 2F A1 2F
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 15
0X48 XOR 0xA1
0100 1000 XOR 1010 0001
= 1110 1001
= 0xE9
On following the similar procedure we obtain the cipher text as
0xE9 4A CD 43 CE 0E
Secure Encryption
Regardless of any prior information, the attacker has about the plaintext, the ciphertext should leak no additional
information about the plaintext.
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 16
One-Time Pad
Ciphertext : ANKYODKYUREPFJBYOJDSPLREYIUNOFDOIUERFPLUYTS
Key : pxlmvmsydofuyrvzwc tnlebnecvgdupahfzzlmnyih
Plaintext : mr mustard with the candlestick in the hall
Ciphertext : ANKYODKYUREPFJBYOJDSPLREYIUNOFDOIUERFPLUYTS
Key : mfugpmiydgaxgoufhklllmhsqdqogtewbqfgyovuhwt
Plaintext : miss scarlet with the knife in the library
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 17
One-Time Pad (Contd…)
In theory, we need look no further for a cipher. The one-time pad offers complete security but, in practice, has two
fundamental difficulties:
1. There is the practical problem of making large quantities of random keys. Supplying truly random characters in this
volume is a significant task.
2. The problem of key distribution and protection. For every message to be sent, a key of equal length is needed by
both sender and receiver.
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 18
Transposition Techniques
Rail-fence Cipher
Plain-text : meet me after the toga party
Key : 2
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 19
m e m a t r h t g p r y
e t e f e t e o a a t
Steganography
• Character marking
• Invisible ink
• Pin punctures
• Typewriter correction ribbon
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 20
Image Source: https://www.pinterest.co.uk/pin/600667669026142225/
Image Source: https://www.pinterest.com/pin/305259680973137511/
Traditional Block Ciphers
Stream Cipher
• Encrypts a digital data stream one bit or one byte at a time
• Example: Vigenère cipher, Vernam Cipher
Block Cipher
• A block of plaintext is treated as a whole and used to produce a ciphertext block of equal length
• Example: Data Encryption Standard
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 21
Feistel Cipher
• Proposed by Feistel
• Execution of two or more ciphers in a sequence in such a way that the result or product is cryptographically stronger
• Use of cipher that alternates substitutions and permutations
• Practical application of a proposal by Claude Shannon to develop a product cipher that alternated diffusion and
confusion functions
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 22
Each plaintext element
or group of elements
is uniquely replaced
by a corresponding
ciphertext element or
group of elements.
A sequence of
plaintext elements is
replaced by a
permutation of that
sequence. That is,
no elements are
added or deleted or
replaced in the
sequence, rather the
order in which the
elements appear in
the sequence is
changed.
The statistical structure
of the plaintext is
dissipated into long-
range statistics of the
ciphertext.
Make the relationship
between the statistics
of the ciphertext and
the value of the
encryption key as
complex as possible
Feistel Encryption and Decryption
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 23
Influencing parameters
Block size
• Larger block sizes mean greater security (Reasonable size: 64/128-bit block)
Key size
• Larger key size means greater security (Reasonable size: 64/128 bits)
Number of rounds
• Multiple rounds offer increased security
Subkey generation algorithm
• Greater complexity in this algorithm leads to greater difficulty of cryptanalysis
Round function F
• Greater complexity generally leads to greater resistance to cryptanalysis
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 24
Considerations in design
Fast software encryption/decryption
• Encryption is embedded in applications or utility functions in such a way as to preclude a hardware implementation.
Ease of analysis
• If the algorithm can be concisely and clearly explained, it is easier to analyze that algorithm for cryptanalytic
vulnerabilities and therefore develop a higher level of assurance as to its strength
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 25
References
Schneier, B. (2007). Applied cryptography: protocols, algorithms, and source code in C. John Wiley & Sons.
Stallings, W. (2014). Cryptography and network security, 6/E. Pearson Education India.
Katz, J., & Lindell, Y. (2014). Introduction to modern cryptography. CRC press.
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 26

More Related Content

What's hot

Classical Encryption Techniques.pdf
Classical Encryption Techniques.pdfClassical Encryption Techniques.pdf
Classical Encryption Techniques.pdf
DevangShukla10
 
Cryptography
CryptographyCryptography
Cryptography
Sandip kumar
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
Pa Van Tanku
 
Cryptography
CryptographyCryptography
Cryptography
gueste4c97e
 
Intro to modern cryptography
Intro to modern cryptographyIntro to modern cryptography
Intro to modern cryptography
zahid-mian
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
Popescu Petre
 
Chapter 1.ppt
Chapter 1.pptChapter 1.ppt
Chapter 1.ppt
ssuserec53e73
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
Rashmi Burugupalli
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
Adam Reagan
 
Cryptanalysis
CryptanalysisCryptanalysis
Cryptanalysis
Sou Jana
 
Cryptography
CryptographyCryptography
Cryptography
research30
 
Elliptic curve cryptography
Elliptic curve cryptographyElliptic curve cryptography
Elliptic curve cryptography
Cysinfo Cyber Security Community
 
Cryptography and network security Nit701
Cryptography and network security Nit701Cryptography and network security Nit701
Cryptography and network security Nit701
Amit Pathak
 
Cryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie BrownCryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie Brown
Information Security Awareness Group
 
Cryptography
CryptographyCryptography
Cryptography Fundamentals
Cryptography FundamentalsCryptography Fundamentals
Cryptography Fundamentals
Duy Do Phan
 
Cryptography
CryptographyCryptography
Cryptography
amiable_indian
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
sarhadisoftengg
 
Cryptography - 101
Cryptography - 101Cryptography - 101
Ch11 Basic Cryptography
Ch11 Basic CryptographyCh11 Basic Cryptography
Ch11 Basic Cryptography
Information Technology
 

What's hot (20)

Classical Encryption Techniques.pdf
Classical Encryption Techniques.pdfClassical Encryption Techniques.pdf
Classical Encryption Techniques.pdf
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
Cryptography
CryptographyCryptography
Cryptography
 
Intro to modern cryptography
Intro to modern cryptographyIntro to modern cryptography
Intro to modern cryptography
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Chapter 1.ppt
Chapter 1.pptChapter 1.ppt
Chapter 1.ppt
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
Cryptanalysis
CryptanalysisCryptanalysis
Cryptanalysis
 
Cryptography
CryptographyCryptography
Cryptography
 
Elliptic curve cryptography
Elliptic curve cryptographyElliptic curve cryptography
Elliptic curve cryptography
 
Cryptography and network security Nit701
Cryptography and network security Nit701Cryptography and network security Nit701
Cryptography and network security Nit701
 
Cryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie BrownCryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie Brown
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography Fundamentals
Cryptography FundamentalsCryptography Fundamentals
Cryptography Fundamentals
 
Cryptography
CryptographyCryptography
Cryptography
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
 
Cryptography - 101
Cryptography - 101Cryptography - 101
Cryptography - 101
 
Ch11 Basic Cryptography
Ch11 Basic CryptographyCh11 Basic Cryptography
Ch11 Basic Cryptography
 

Similar to Classical cryptographic techniques, Feistel cipher structure

Crypto 101: Encryption, Codebreaking, SSL and Bitcoin
Crypto 101: Encryption, Codebreaking, SSL and BitcoinCrypto 101: Encryption, Codebreaking, SSL and Bitcoin
Crypto 101: Encryption, Codebreaking, SSL and Bitcoin
Priyanka Aash
 
Symmetric
SymmetricSymmetric
Proposed Lightweight Block Cipher Algorithm for Securing Internet of Things
Proposed Lightweight Block Cipher Algorithm for Securing Internet of ThingsProposed Lightweight Block Cipher Algorithm for Securing Internet of Things
Proposed Lightweight Block Cipher Algorithm for Securing Internet of Things
Seddiq Q. Abd Al-Rahman
 
Symmetric encryption and message confidentiality
Symmetric encryption and message confidentialitySymmetric encryption and message confidentiality
Symmetric encryption and message confidentiality
CAS
 
Multiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisMultiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity Analysis
IJCERT
 
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
IOSR Journals
 
CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2
Hamed Moghaddam
 
Chapter 9 cryptography- symetric encryption
Chapter 9   cryptography- symetric encryptionChapter 9   cryptography- symetric encryption
Chapter 9 cryptography- symetric encryption
Syaiful Ahdan
 
Detailed cryptographic analysis of contact tracing protocols
Detailed cryptographic analysis of contact tracing protocolsDetailed cryptographic analysis of contact tracing protocols
Detailed cryptographic analysis of contact tracing protocols
Christian Spolaore
 
Mixed Scanning and DFT Techniques for Arithmetic Core
Mixed Scanning and DFT Techniques for Arithmetic CoreMixed Scanning and DFT Techniques for Arithmetic Core
Mixed Scanning and DFT Techniques for Arithmetic Core
IJERA Editor
 
Information System Security.pptx
Information System  Security.pptxInformation System  Security.pptx
Information System Security.pptx
GIT
 
Data Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve CryptographyData Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve Cryptography
IJCERT
 
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
IOSR Journals
 
Client server computing in mobile environments part 2
Client server computing in mobile environments part 2Client server computing in mobile environments part 2
Client server computing in mobile environments part 2
Praveen Joshi
 
CH02-CompSec4e.pptx
CH02-CompSec4e.pptxCH02-CompSec4e.pptx
CH02-CompSec4e.pptx
ams1ams11
 
IRJET- Enhanced Security using DNA Cryptography
IRJET- Enhanced Security using DNA CryptographyIRJET- Enhanced Security using DNA Cryptography
IRJET- Enhanced Security using DNA Cryptography
IRJET Journal
 
Network Security
Network SecurityNetwork Security
Network Security
Federal Urdu University
 
Cyptography and network security
Cyptography and network securityCyptography and network security
Cyptography and network security
Priyanka Karancy
 
Block Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption StandardBlock Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption Standard
Dr.Florence Dayana
 
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationPairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
IJTET Journal
 

Similar to Classical cryptographic techniques, Feistel cipher structure (20)

Crypto 101: Encryption, Codebreaking, SSL and Bitcoin
Crypto 101: Encryption, Codebreaking, SSL and BitcoinCrypto 101: Encryption, Codebreaking, SSL and Bitcoin
Crypto 101: Encryption, Codebreaking, SSL and Bitcoin
 
Symmetric
SymmetricSymmetric
Symmetric
 
Proposed Lightweight Block Cipher Algorithm for Securing Internet of Things
Proposed Lightweight Block Cipher Algorithm for Securing Internet of ThingsProposed Lightweight Block Cipher Algorithm for Securing Internet of Things
Proposed Lightweight Block Cipher Algorithm for Securing Internet of Things
 
Symmetric encryption and message confidentiality
Symmetric encryption and message confidentialitySymmetric encryption and message confidentiality
Symmetric encryption and message confidentiality
 
Multiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisMultiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity Analysis
 
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
 
CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2
 
Chapter 9 cryptography- symetric encryption
Chapter 9   cryptography- symetric encryptionChapter 9   cryptography- symetric encryption
Chapter 9 cryptography- symetric encryption
 
Detailed cryptographic analysis of contact tracing protocols
Detailed cryptographic analysis of contact tracing protocolsDetailed cryptographic analysis of contact tracing protocols
Detailed cryptographic analysis of contact tracing protocols
 
Mixed Scanning and DFT Techniques for Arithmetic Core
Mixed Scanning and DFT Techniques for Arithmetic CoreMixed Scanning and DFT Techniques for Arithmetic Core
Mixed Scanning and DFT Techniques for Arithmetic Core
 
Information System Security.pptx
Information System  Security.pptxInformation System  Security.pptx
Information System Security.pptx
 
Data Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve CryptographyData Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve Cryptography
 
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
 
Client server computing in mobile environments part 2
Client server computing in mobile environments part 2Client server computing in mobile environments part 2
Client server computing in mobile environments part 2
 
CH02-CompSec4e.pptx
CH02-CompSec4e.pptxCH02-CompSec4e.pptx
CH02-CompSec4e.pptx
 
IRJET- Enhanced Security using DNA Cryptography
IRJET- Enhanced Security using DNA CryptographyIRJET- Enhanced Security using DNA Cryptography
IRJET- Enhanced Security using DNA Cryptography
 
Network Security
Network SecurityNetwork Security
Network Security
 
Cyptography and network security
Cyptography and network securityCyptography and network security
Cyptography and network security
 
Block Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption StandardBlock Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption Standard
 
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationPairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
 

More from Adri Jovin

Adri Jovin J J - CV
Adri Jovin J J - CVAdri Jovin J J - CV
Adri Jovin J J - CV
Adri Jovin
 
Introduction to Relational Database Management Systems
Introduction to Relational Database Management SystemsIntroduction to Relational Database Management Systems
Introduction to Relational Database Management Systems
Adri Jovin
 
Introduction to ER Diagrams
Introduction to ER DiagramsIntroduction to ER Diagrams
Introduction to ER Diagrams
Adri Jovin
 
Introduction to Database Management Systems
Introduction to Database Management SystemsIntroduction to Database Management Systems
Introduction to Database Management Systems
Adri Jovin
 
Neural Networks
Neural NetworksNeural Networks
Neural Networks
Adri Jovin
 
Introduction to Genetic Algorithm
Introduction to Genetic AlgorithmIntroduction to Genetic Algorithm
Introduction to Genetic Algorithm
Adri Jovin
 
Introduction to Fuzzy logic
Introduction to Fuzzy logicIntroduction to Fuzzy logic
Introduction to Fuzzy logic
Adri Jovin
 
Introduction to Artificial Neural Networks
Introduction to Artificial Neural NetworksIntroduction to Artificial Neural Networks
Introduction to Artificial Neural Networks
Adri Jovin
 
Introductory Session on Soft Computing
Introductory Session on Soft ComputingIntroductory Session on Soft Computing
Introductory Session on Soft Computing
Adri Jovin
 
Creative Commons
Creative CommonsCreative Commons
Creative Commons
Adri Jovin
 
Image based security
Image based securityImage based security
Image based security
Adri Jovin
 
Blockchain Technologies
Blockchain TechnologiesBlockchain Technologies
Blockchain Technologies
Adri Jovin
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
Adri Jovin
 
Heartbleed Bug: A case study
Heartbleed Bug: A case studyHeartbleed Bug: A case study
Heartbleed Bug: A case study
Adri Jovin
 
Zoom: Privacy and Security - A case study
Zoom: Privacy and Security - A case studyZoom: Privacy and Security - A case study
Zoom: Privacy and Security - A case study
Adri Jovin
 
Security Models
Security ModelsSecurity Models
Security Models
Adri Jovin
 
Introduction to blockchains
Introduction to blockchainsIntroduction to blockchains
Introduction to blockchains
Adri Jovin
 
Security tools
Security toolsSecurity tools
Security tools
Adri Jovin
 
Python - Functions - Azure Jupyter Notebooks
Python - Functions - Azure Jupyter NotebooksPython - Functions - Azure Jupyter Notebooks
Python - Functions - Azure Jupyter Notebooks
Adri Jovin
 
Theoretical Foundations of Computer Science - Graphs
Theoretical Foundations of Computer Science - GraphsTheoretical Foundations of Computer Science - Graphs
Theoretical Foundations of Computer Science - Graphs
Adri Jovin
 

More from Adri Jovin (20)

Adri Jovin J J - CV
Adri Jovin J J - CVAdri Jovin J J - CV
Adri Jovin J J - CV
 
Introduction to Relational Database Management Systems
Introduction to Relational Database Management SystemsIntroduction to Relational Database Management Systems
Introduction to Relational Database Management Systems
 
Introduction to ER Diagrams
Introduction to ER DiagramsIntroduction to ER Diagrams
Introduction to ER Diagrams
 
Introduction to Database Management Systems
Introduction to Database Management SystemsIntroduction to Database Management Systems
Introduction to Database Management Systems
 
Neural Networks
Neural NetworksNeural Networks
Neural Networks
 
Introduction to Genetic Algorithm
Introduction to Genetic AlgorithmIntroduction to Genetic Algorithm
Introduction to Genetic Algorithm
 
Introduction to Fuzzy logic
Introduction to Fuzzy logicIntroduction to Fuzzy logic
Introduction to Fuzzy logic
 
Introduction to Artificial Neural Networks
Introduction to Artificial Neural NetworksIntroduction to Artificial Neural Networks
Introduction to Artificial Neural Networks
 
Introductory Session on Soft Computing
Introductory Session on Soft ComputingIntroductory Session on Soft Computing
Introductory Session on Soft Computing
 
Creative Commons
Creative CommonsCreative Commons
Creative Commons
 
Image based security
Image based securityImage based security
Image based security
 
Blockchain Technologies
Blockchain TechnologiesBlockchain Technologies
Blockchain Technologies
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
Heartbleed Bug: A case study
Heartbleed Bug: A case studyHeartbleed Bug: A case study
Heartbleed Bug: A case study
 
Zoom: Privacy and Security - A case study
Zoom: Privacy and Security - A case studyZoom: Privacy and Security - A case study
Zoom: Privacy and Security - A case study
 
Security Models
Security ModelsSecurity Models
Security Models
 
Introduction to blockchains
Introduction to blockchainsIntroduction to blockchains
Introduction to blockchains
 
Security tools
Security toolsSecurity tools
Security tools
 
Python - Functions - Azure Jupyter Notebooks
Python - Functions - Azure Jupyter NotebooksPython - Functions - Azure Jupyter Notebooks
Python - Functions - Azure Jupyter Notebooks
 
Theoretical Foundations of Computer Science - Graphs
Theoretical Foundations of Computer Science - GraphsTheoretical Foundations of Computer Science - Graphs
Theoretical Foundations of Computer Science - Graphs
 

Recently uploaded

Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
Claudio Di Ciccio
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
Techgropse Pvt.Ltd.
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 

Recently uploaded (20)

Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 

Classical cryptographic techniques, Feistel cipher structure

  • 1. Classical Cryptographic Techniques, Feistel Cipher Structure Adri Jovin J J, M.Tech., Ph.D. UITC203 CRYPTOGRAPHY AND NETWORK SECURITY
  • 2. Symmetric Cipher Model Plaintext the original intelligible message or data that is fed into the algorithm as input. Encryption algorithm performs various substitutions and transformations on the plaintext Secret key a value independent of the plaintext and of the algorithm which helps the algorithm to produce a different output depending on the one being used at the time Ciphertext the scrambled message produced as output Decryption algorithm essentially the encryption algorithm run in reverse UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 2
  • 3. A question…. UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 3 Why most cryptographic algorithms are open to the public? The reason is: Kerckhoff’s Principle Encryption Scheme is not secret - The only secret is the key - The key must be chosen at random and kept secret Advantages: • Easier to keep a secret key than a secret algorithm • Easier to change the key than the algorithm • Standardization • Ease of deployment • Public validation
  • 4. Cryptography UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 4 Cryptographic systems are characterized along three independent dimensions: 1. The type of operations used for transforming plaintext to ciphertext 2. The number of keys used 3. The way in which the plaintext is processed
  • 5. Cryptanalysis UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 5 Cryptanalysis Rely on the nature of the algorithm plus perhaps some knowledge of the general characteristics of the plaintext or even some sample plaintext-ciphertext pairs Brute-force attack Attacker tries every possible key on a piece of ciphertext until an intelligible translation into plaintext is obtained Type of attack Known to cryptanalyst Ciphertext Only • Encryption algorithm • Ciphertext Known Plaintext • Encryption algorithm • Ciphertext • One or more plaintext–ciphertext pairs formed with the secret key Chosen Plaintext • Encryption algorithm • Ciphertext • Plaintext message chosen by cryptanalyst, together with its corresponding ciphertext generated with the secret key Type of attack Known to cryptanalyst Chosen Ciphertext • Encryption algorithm • Ciphertext • Ciphertext chosen by cryptanalyst, together with its corresponding decrypted plaintext generated with the secret key Chosen Text • Encryption algorithm • Ciphertext • Plaintext message chosen by cryptanalyst, together with its corresponding ciphertext generated with the secret key • Ciphertext chosen by cryptanalyst, together with its corresponding decrypted plaintext generated with the secret key
  • 6. Average Time Required for Exhaustive Key Search UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 6 Key size (bits) Number of alternative keys Time required at 1 decryption/ms Time required at 106 decryption/ms 32 232 = 4.3 x 109 231 ms = 35.8 minutes 2.15 milliseconds 56 256 = 7.2 x 1016 255 ms = 1142 years 10.01 hours 128 2128 = 3.4 x 1038 2127 ms = 5.4 x 1024 years 5.4 x 1018 years 168 2168 = 3.7 x 1050 2167 ms = 5.9 x 1036 years 5.9 x 1030 years 26 characters (permutation) 26! = 4 x 1026 2 x 1026 ms = 6.4 x 1012 years 6.4 x 106 years
  • 7. Caesar Cipher UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 7 plain: meet me after the toga party cipher: PHHW PH DIWHU WKH WRJD SDUWB C = E(3, p) = (p + 3) mod 26 Generalised as: C = E(k, p) = (p + k) mod 26 Decryption: p = D(k, C) = (C - k) mod 26 a b c d e f g h i j k l m 0 1 2 3 4 5 6 7 8 9 10 11 12 n o p q r s t u v w x y z 13 14 15 16 17 18 19 20 21 22 23 24 25 helloworld jgnnqyqtnfb c
  • 8. Brute-Force Cryptanalysis of Caesar Cipher UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 8
  • 9. Playfair Cipher UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 9 1. Repeating plaintext letters that are in the same pair are separated with a filler letter, such as x, so that balloon would be treated as ba lx lo on. 2. Two plaintext letters that fall in the same row of the matrix are each replaced by the letter to the right, with the first element of the row circularly following the last. For example, ar is encrypted as RM. 3. Two plaintext letters that fall in the same column are each replaced by the letter beneath, with the top element of the column circularly following the last. For example, mu is encrypted as CM. 4. Otherwise, each plaintext letter in a pair is replaced by the letter that lies in its own row and the column occupied by the other plaintext letter. Thus, hs becomes BP and ea becomes IM (or JM, as the encipherer wishes).
  • 10. Hill Cipher UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 10     26mod 333231 232221 131211 321321            kkk kkk kkk pppccc C = KP mod 26 P = K-1C mod 26
  • 11. An example Plain text=‘pay more money’ 𝐾 = 17 17 5 21 18 21 2 2 19 𝑃 = 15 0 24 𝐾𝑃 = 375 819 486 mod 26 UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 11 𝐾𝑃 = 11 13 18 = 𝐿 𝑁 𝑆 𝐾−1 = 4 9 15 15 17 6 24 0 17
  • 12. Vigenère Cipher • Poly-alphabetic • A set of related monoalphabetic substitution rules is used. • A key determines which particular rule is chosen for a given transformation. Key : deceptivedeceptivedeceptive Plaintext : wearediscoveredsaveyourself Ciphertext : ZICVTWQNGRZGVTWAVZHCQYGLMGJ UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 12
  • 13. The Modern Vigenère Tableau UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 13 Image Source: https://pages.mtu.edu/~shen e/NSF-4/Tutorial/VIG/Vig- Base.html
  • 14. ASCII Table UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 14
  • 15. ASCII-based solution Plain-text: Hello! Key: 0xA1 2F Plain-text XOR Key Hello! – 0x48 65 6C 6C 6F 21 XOR 0xA1 2F A1 2F A1 2F UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 15 0X48 XOR 0xA1 0100 1000 XOR 1010 0001 = 1110 1001 = 0xE9 On following the similar procedure we obtain the cipher text as 0xE9 4A CD 43 CE 0E
  • 16. Secure Encryption Regardless of any prior information, the attacker has about the plaintext, the ciphertext should leak no additional information about the plaintext. UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 16
  • 17. One-Time Pad Ciphertext : ANKYODKYUREPFJBYOJDSPLREYIUNOFDOIUERFPLUYTS Key : pxlmvmsydofuyrvzwc tnlebnecvgdupahfzzlmnyih Plaintext : mr mustard with the candlestick in the hall Ciphertext : ANKYODKYUREPFJBYOJDSPLREYIUNOFDOIUERFPLUYTS Key : mfugpmiydgaxgoufhklllmhsqdqogtewbqfgyovuhwt Plaintext : miss scarlet with the knife in the library UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 17
  • 18. One-Time Pad (Contd…) In theory, we need look no further for a cipher. The one-time pad offers complete security but, in practice, has two fundamental difficulties: 1. There is the practical problem of making large quantities of random keys. Supplying truly random characters in this volume is a significant task. 2. The problem of key distribution and protection. For every message to be sent, a key of equal length is needed by both sender and receiver. UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 18
  • 19. Transposition Techniques Rail-fence Cipher Plain-text : meet me after the toga party Key : 2 UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 19 m e m a t r h t g p r y e t e f e t e o a a t
  • 20. Steganography • Character marking • Invisible ink • Pin punctures • Typewriter correction ribbon UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 20 Image Source: https://www.pinterest.co.uk/pin/600667669026142225/ Image Source: https://www.pinterest.com/pin/305259680973137511/
  • 21. Traditional Block Ciphers Stream Cipher • Encrypts a digital data stream one bit or one byte at a time • Example: Vigenère cipher, Vernam Cipher Block Cipher • A block of plaintext is treated as a whole and used to produce a ciphertext block of equal length • Example: Data Encryption Standard UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 21
  • 22. Feistel Cipher • Proposed by Feistel • Execution of two or more ciphers in a sequence in such a way that the result or product is cryptographically stronger • Use of cipher that alternates substitutions and permutations • Practical application of a proposal by Claude Shannon to develop a product cipher that alternated diffusion and confusion functions UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 22 Each plaintext element or group of elements is uniquely replaced by a corresponding ciphertext element or group of elements. A sequence of plaintext elements is replaced by a permutation of that sequence. That is, no elements are added or deleted or replaced in the sequence, rather the order in which the elements appear in the sequence is changed. The statistical structure of the plaintext is dissipated into long- range statistics of the ciphertext. Make the relationship between the statistics of the ciphertext and the value of the encryption key as complex as possible
  • 23. Feistel Encryption and Decryption UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 23
  • 24. Influencing parameters Block size • Larger block sizes mean greater security (Reasonable size: 64/128-bit block) Key size • Larger key size means greater security (Reasonable size: 64/128 bits) Number of rounds • Multiple rounds offer increased security Subkey generation algorithm • Greater complexity in this algorithm leads to greater difficulty of cryptanalysis Round function F • Greater complexity generally leads to greater resistance to cryptanalysis UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 24
  • 25. Considerations in design Fast software encryption/decryption • Encryption is embedded in applications or utility functions in such a way as to preclude a hardware implementation. Ease of analysis • If the algorithm can be concisely and clearly explained, it is easier to analyze that algorithm for cryptanalytic vulnerabilities and therefore develop a higher level of assurance as to its strength UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 25
  • 26. References Schneier, B. (2007). Applied cryptography: protocols, algorithms, and source code in C. John Wiley & Sons. Stallings, W. (2014). Cryptography and network security, 6/E. Pearson Education India. Katz, J., & Lindell, Y. (2014). Introduction to modern cryptography. CRC press. UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 26