This document provides an overview of a cryptography course, including:
- The course name, code, credits, instructor details.
- An introduction to modern symmetric-key block ciphers, which encrypt blocks of plaintext/ciphertext using a key.
- The basic components of block ciphers, including substitution boxes (S-boxes), permutation boxes (P-boxes), and exclusive-or operations.
- An overview of product ciphers, diffusion, confusion and the structure of block ciphers in rounds.
- Descriptions of modern stream ciphers, synchronous stream ciphers like the one-time pad, and nonsynchronous stream ciphers.
FPGA Implementation of an Area Optimized Architecture for 128 bit AES AlgorithmIJERA Editor
This paper aims at FPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm. The
conventional designs use a separate module for 32 bit byte substitution and 128 bit byte substitution. The 32 bit
byte substitution is used in round key generation and the 128 bit byte substitution is used in the rounds. This
report presents a modified architecture of 128 bit byte substitution module using a single 32 bit byte substitution
module to reduce area.The AES encryption and decryption algorithm were designed using Verilog HDL. The
functionality of the modules were checked using ModelSim. The simulations were carried out in ModelSim and
Quartus II. The algorithm was implemented in FPGA and achieved a 2% reduction in the total logic element
utilization
FPGA Implementation of an Area Optimized Architecture for 128 bit AES AlgorithmIJERA Editor
This paper aims at FPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm. The
conventional designs use a separate module for 32 bit byte substitution and 128 bit byte substitution. The 32 bit
byte substitution is used in round key generation and the 128 bit byte substitution is used in the rounds. This
report presents a modified architecture of 128 bit byte substitution module using a single 32 bit byte substitution
module to reduce area.The AES encryption and decryption algorithm were designed using Verilog HDL. The
functionality of the modules were checked using ModelSim. The simulations were carried out in ModelSim and
Quartus II. The algorithm was implemented in FPGA and achieved a 2% reduction in the total logic element
utilization
A NEW DESIGN TECHNIQUE OF REVERSIBLE BCD ADDER BASED ON NMOS WITH PASS TRANSI...VLSICS Design
In this paper, we have proposed a new design technique of BCD Adder using newly constructed reversible gates are based on NMOS with pass transistor gates, where the conventional reversible gates are based on CMOS with transmission gates. We also compare the proposed reversible gates with the conventional CMOS reversible gates which show that the required number of Transistors is significantly reduced.
Cryptographic Technique Used Lower and Upper Triangular Decomposition MethodIJERA Editor
In this paper, the main cryptographic technique we will use affine cipher used for encryption and also
decryption by using one of the linear algebra technique lower and upper triangular technique
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Cryptography, Classical Encryption
Breaking the Cryptosystem
Review the Simple attack to break the cryptosystem
Modular Arithmetic, Groups and Rings
One example each in classical substitutive and transposition ciphering.
Caesar/Affine Cipher –Worksheet and Lab Program
Modern Block Cipher- Modern Symmetric-Key CipherMahbubur Rahman
Introduction to Modern Symmetric-Key Ciphers- This lecture will cover only "Modern Block Cipher".
Slide Credit: Maleka Khatun & Mahbubur Rahman
Dept. of CSE, JnU, BD.
Stream Cipher
Block Cipher
Stream Cipher and Block Cipher
The Feistel Cipher
Feistel Cipher Design Features
Data Encryption Standard (DES)
DES is a block cipher
THE AVALANCHE EFFECT
Block Cipher Design Principles
An odd even block cipher based cryptosystem through modulo arithmatic techniq...eSAT Journals
Abstract In this paper, a new Cryptosystem based on block cipher has been proposed where the encryption is done through Odd Even Modulo Arithmetic Technique (OEMAT). The original message is considered as a stream of bits, which is then divided into a number of blocks, each containing n bits, where n is any one of 2, 4, 8, 16, 32, 64, 128, 256. The first and the penultimate blocks are then added where the modulus of addition is 2n. The result replaces the penultimate block (say (N-1th) block), first block remaining unchanged. In the next attempt the second and the ultimate blocks (say Nth block) are added and the result replaces the Nth block. This process continues until all the blocks are executed. The modulo addition has been implemented in a very simple manner where the carry out of the MSB is discarded to get the result. The technique is applied in a cascaded manner by varying the block size from 2 to 256. The whole technique has been implemented by using a modulo subtraction technique for decryption. Keywords: MFBOMAT, FBOMAT, Symmetric block cipher, Cryptosystem
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A vlsi implementation of a resource efficient and secure architecture of a b...eSAT Journals
Abstract
In today‘s modern life, the protection of data is of major concern in any kind of domian. So the understanding of cryptography architecture plays a crucial role. Advance encryption system , differential encryption system design of cryptography have few drawbacks in implementation level of low level designs. In an area concerned and power concerned parameters the above mentioned algorithms have failed in implementing. The humming bird algorithm uses block cipher which is being used in this paper for encryption and decryption using 128 bit secure key. Block cipher concentrates on converting the given original data into cipher text to make the given data more secure over the user. Two different designs of block Cipher algorithms (Throughput enhanced , Area reduced) are developed and their performance is compared in terms of area occupation using Xilinx ISE design tool with verilog language. The block cipher designs are implemented using 64 bit secure key and 128 bit secure key. The area reduced design is of the concern to have this module on the FPGA implementation in the VLSI sector.
Keywords : Cryptography, VLSI, FPGA , Block Cipher.
A vlsi implementation of a resource efficient and secure architecture of a b...eSAT Journals
Abstract
In today‘s modern life, the protection of data is of major concern in any kind of domian. So the understanding of cryptography architecture plays a crucial role. Advance encryption system , differential encryption system design of cryptography have few drawbacks in implementation level of low level designs. In an area concerned and power concerned parameters the above mentioned algorithms have failed in implementing. The humming bird algorithm uses block cipher which is being used in this paper for encryption and decryption using 128 bit secure key. Block cipher concentrates on converting the given original data into cipher text to make the given data more secure over the user. Two different designs of block Cipher algorithms (Throughput enhanced , Area reduced) are developed and their performance is compared in terms of area occupation using Xilinx ISE design tool with verilog language. The block cipher designs are implemented using 64 bit secure key and 128 bit secure key. The area reduced design is of the concern to have this module on the FPGA implementation in the VLSI sector.
Keywords : Cryptography, VLSI, FPGA , Block Cipher.
A NEW DESIGN TECHNIQUE OF REVERSIBLE BCD ADDER BASED ON NMOS WITH PASS TRANSI...VLSICS Design
In this paper, we have proposed a new design technique of BCD Adder using newly constructed reversible gates are based on NMOS with pass transistor gates, where the conventional reversible gates are based on CMOS with transmission gates. We also compare the proposed reversible gates with the conventional CMOS reversible gates which show that the required number of Transistors is significantly reduced.
Cryptographic Technique Used Lower and Upper Triangular Decomposition MethodIJERA Editor
In this paper, the main cryptographic technique we will use affine cipher used for encryption and also
decryption by using one of the linear algebra technique lower and upper triangular technique
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Cryptography, Classical Encryption
Breaking the Cryptosystem
Review the Simple attack to break the cryptosystem
Modular Arithmetic, Groups and Rings
One example each in classical substitutive and transposition ciphering.
Caesar/Affine Cipher –Worksheet and Lab Program
Modern Block Cipher- Modern Symmetric-Key CipherMahbubur Rahman
Introduction to Modern Symmetric-Key Ciphers- This lecture will cover only "Modern Block Cipher".
Slide Credit: Maleka Khatun & Mahbubur Rahman
Dept. of CSE, JnU, BD.
Stream Cipher
Block Cipher
Stream Cipher and Block Cipher
The Feistel Cipher
Feistel Cipher Design Features
Data Encryption Standard (DES)
DES is a block cipher
THE AVALANCHE EFFECT
Block Cipher Design Principles
An odd even block cipher based cryptosystem through modulo arithmatic techniq...eSAT Journals
Abstract In this paper, a new Cryptosystem based on block cipher has been proposed where the encryption is done through Odd Even Modulo Arithmetic Technique (OEMAT). The original message is considered as a stream of bits, which is then divided into a number of blocks, each containing n bits, where n is any one of 2, 4, 8, 16, 32, 64, 128, 256. The first and the penultimate blocks are then added where the modulus of addition is 2n. The result replaces the penultimate block (say (N-1th) block), first block remaining unchanged. In the next attempt the second and the ultimate blocks (say Nth block) are added and the result replaces the Nth block. This process continues until all the blocks are executed. The modulo addition has been implemented in a very simple manner where the carry out of the MSB is discarded to get the result. The technique is applied in a cascaded manner by varying the block size from 2 to 256. The whole technique has been implemented by using a modulo subtraction technique for decryption. Keywords: MFBOMAT, FBOMAT, Symmetric block cipher, Cryptosystem
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A vlsi implementation of a resource efficient and secure architecture of a b...eSAT Journals
Abstract
In today‘s modern life, the protection of data is of major concern in any kind of domian. So the understanding of cryptography architecture plays a crucial role. Advance encryption system , differential encryption system design of cryptography have few drawbacks in implementation level of low level designs. In an area concerned and power concerned parameters the above mentioned algorithms have failed in implementing. The humming bird algorithm uses block cipher which is being used in this paper for encryption and decryption using 128 bit secure key. Block cipher concentrates on converting the given original data into cipher text to make the given data more secure over the user. Two different designs of block Cipher algorithms (Throughput enhanced , Area reduced) are developed and their performance is compared in terms of area occupation using Xilinx ISE design tool with verilog language. The block cipher designs are implemented using 64 bit secure key and 128 bit secure key. The area reduced design is of the concern to have this module on the FPGA implementation in the VLSI sector.
Keywords : Cryptography, VLSI, FPGA , Block Cipher.
A vlsi implementation of a resource efficient and secure architecture of a b...eSAT Journals
Abstract
In today‘s modern life, the protection of data is of major concern in any kind of domian. So the understanding of cryptography architecture plays a crucial role. Advance encryption system , differential encryption system design of cryptography have few drawbacks in implementation level of low level designs. In an area concerned and power concerned parameters the above mentioned algorithms have failed in implementing. The humming bird algorithm uses block cipher which is being used in this paper for encryption and decryption using 128 bit secure key. Block cipher concentrates on converting the given original data into cipher text to make the given data more secure over the user. Two different designs of block Cipher algorithms (Throughput enhanced , Area reduced) are developed and their performance is compared in terms of area occupation using Xilinx ISE design tool with verilog language. The block cipher designs are implemented using 64 bit secure key and 128 bit secure key. The area reduced design is of the concern to have this module on the FPGA implementation in the VLSI sector.
Keywords : Cryptography, VLSI, FPGA , Block Cipher.
TCN
5080
-‐‑
Project
1
Description:
Create
a
program
to
encrypt
and
decrypt
binary
files
using
S-‐DES
(Simplified
DES)
in
the
Cipher
Block
Chaining
mode.
The
program
takes
the
input
of
an
initial
key
and
an
initial
vector,
reads
the
plaintext
or
ciphertext
from
a
file,
conducts
the
encryption
or
decryption,
and
writes
the
resulting
ciphertext
or
plaintext
into
a
second
file.
This
is
a
group
project
with
no
more
than
two
students
in
a
group.
You
can
use
any
of
your
preferred
programming
languages
and
operating
systems.
The
code
must
be
well-‐
documented
for
easy
understanding.
Input
Format:
The
program
should
take
a
command
in
the
following
format.
(java)
mycipher
-‐m
mode
-‐k
initial_key
-‐i
initial_vector
-‐p
plaintext_file
-‐c
ciphertext_file
mode:
can
be
only
encrypt
or
decrypt
initial_key:
10-‐bit
initial
key
initial_vector:
8-‐bit
initial
vector
plaintext_file:
a
binary
(not
text)
file
to
store
the
plaintext
ciphertext_file:
a
binary
(not
text)
file
to
store
the
ciphertext
Output
Format:
The
program
should
print
output
in
the
following
format.
k1=subkey
1
k2=subkey
2
plaintext=all
bytes
of
the
plaintext
separated
by
blanks,
starting
from
the
first
byte
ciphertext=
all
bytes
of
the
ciphertext
separated
by
blanks,
starting
from
the
first
byte
Sample
Screen
Shot:
Sample
Test
Cases:
java
mycipher
-‐m
encrypt
-‐k
0111111101
-‐i
10101010
-‐p
f1
-‐c
f3
k1=01011111
k2=11111100
plaintext=00000001
00100011
ciphertext=11110100
00001011
java
mycipher
-‐m
decrypt
-‐k
0101010101
-‐i
00000000
-‐p
f4
-‐c
f2
k1=00011011
k2=10101100
ciphertext=00000001
plaintext=01101000
where
f1
is
a
binary
file
with
two
bytes
012316,
and
f2
is
a
binary
file
with
one
byte
0116.
IMPORTANT:
Make
sure
that
your
program
exactly
follows
the
above
specifications,
including
the
execute/java
class
file
name,
the
command
line
input
format,
and
the
output
format.
The
TA
will
test
your
program
by
typing
testing
commands
as
specified
above.
If
your
program
cannot
give
th ...
OPTIMIZED MULTIPLIER USING REVERSIBLE MULTICONTROL INPUT TOFFOLI GATESVLSICS Design
Reversible logic is an important area to carry the computation into the world of quantum computing. In this paper a 4-bit multiplier using a new reversible logic gate called BVPPG gate is presented. BVPPG gate is a 5 x 5 reversible gate which is designed to generate partial products required to perform multiplication and also duplication of operand bits is obtained. This reduces the total cost of the circuit. Toffoli gate is the universal and also most flexible reversible logic gate. So we have used the Toffoli gates to construct the designed multiplier.
Bit-Plane Complexity Segmentation is one of the steganographic technique is often performed to conceal data. But in BPCS method, a pattern that is used is not a classified anymore. Conjugation at the informative bit-plane is to change the bit-plane to chiper-form bit-plane that can keep the secret message. Modifying bit-plane pattern for each bit-plane is a technique for increasing the security of the vessel image. Vernam can be used to modify the bit-plane with the predetermined blocks conjugation. Data security would be increased by applying this method.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Normal Labour/ Stages of Labour/ Mechanism of LabourWasim Ak
Normal labor is also termed spontaneous labor, defined as the natural physiological process through which the fetus, placenta, and membranes are expelled from the uterus through the birth canal at term (37 to 42 weeks
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Digital Tools and AI for Teaching Learning and Research
Introduction to modern_symmetric-key_ciphers
1. Course name :Crytography
Course Code :18UCAE64
PART III :Elective
Credits :04
Programme :Computer Applications
Course Instructor :R.Vasuki,M.C.A.,M.Phil,NET,
Assistant Professor,
Dept of Computer Science
1.1
4. 5-1 MODERN BLOCK CIPHERS
A symmetric-key modern block cipher encrypts an
n-bit block of plaintext or decrypts an n-bit block of
ciphertext. The encryption or decryption algorithm
uses a k-bit key.
5.1.1 Substitution or Transposition
5.1.2 Block Ciphers as Permutation Groups
5.1.3 Components of a Modern Block Cipher
5.1.4 Product Ciphers
5.1.5 Two Classes of Product Ciphers
5.1.6 Attacks on Block Ciphers
Topics discussed in this section:
6. Modern block ciphers normally are keyed substitution
ciphers in which the key allows only partial mappings
from the possible inputs to the possible outputs.
5.1.3 Components of a Modern Block Cipher
A P-box (permutation box) parallels the traditional
transposition cipher for characters. It transposes bits.
P-Boxes
10. Example 5.6
5.1.2 Continued
Design an 8 × 8 permutation table for a straight P-box that
moves the two middle bits (bits 4 and 5) in the input word to
the two ends (bits 1 and 8) in the output words. Relative
positions of other bits should not be changed.
Solution
We need a straight P-box with the table [4 1 2 3 6 7 8 5].
The relative positions of input bits 1, 2, 3, 6, 7, and 8 have not
been changed, but the first output takes the fourth input and
the eighth output takes the fifth input.
11. Compression P-Boxes
5.1.3 Continued
A compression P-box is a P-box with n inputs and m
outputs where m < n.
Table 5.2 Example of a 32 × 24 permutation table
13. Expansion P-Boxes
5.1.3 Continued
An expansion P-box is a P-box with n inputs and m
outputs where m > n.
Table 5.3 Example of a 12 × 16 permutation table
15. Example 5.7
5.1.3 Continued
Figure 5.6 shows how to invert a permutation table
represented as a one-dimensional table.
Figure 5.6 Inverting a permutation table
17. 5.1.3 Continued
S-Box
An S-box (substitution box) can be thought of as a
miniature substitution cipher.
An S-box is an m × n substitution unit, where m and
n are not necessarily the same.
Note
18. Example 5.8
5.1.3 Continued
In an S-box with three inputs and two outputs, we have
The S-box is linear because a1,1 = a1,2 = a1,3 = a2,1 = 1 and
a2,2 = a2,3 = 0. The relationship can be represented by
matrices, as shown below:
19. Example 5.9
5.1.3 Continued
In an S-box with three inputs and two outputs, we have
where multiplication and addition is in GF(2). The S-box is
nonlinear because there is no linear relationship between the
inputs and the outputs.
20. Example 5.10
5.1.3 Continued
The following table defines the input/output relationship for
an S-box of size 3 × 2. The leftmost bit of the input defines the
row; the two rightmost bits of the input define the column.
The two output bits are values on the cross section of the
selected row and column.
Based on the table, an input of 010 yields the output 01. An
input of 101 yields the output of 00.
21. Example 5.11
5.1.3 Continued
Figure 5.8 shows an example of an invertible S-box. For
example, if the input to the left box is 001, the output is 101.
The input 101 in the right table creates the output 001, which
shows that the two tables are inverses of each other.
Figure 5.8 S-box tables for Example 5.11
23. 5.1.3 Continued
Exclusive-Or (Continued)
An important component in most block ciphers is the
exclusive-or operation. As we discussed in Chapter 4,
addition and subtraction operations in the GF(2n) field
are performed by a single operation called the exclusive-
or (XOR).
The five properties of the exclusive-or operation in the
GF(2n) field makes this operation a very interesting
component for use in a block cipher: closure,
associativity, commutativity, existence of identity, and
existence of inverse.
25. 5.1.3 Continued
Circular Shift
Another component found in some modern block ciphers
is the circular shift operation.
Figure 5.10 Circular shifting an 8-bit word to the left or right
26. 5.1.3 Continued
Swap
The swap operation is a special case of the circular shift
operation where k = n/2.
Figure 5.11 Swap operation on an 8-bit word
27. 5.1.3 Continued
Split and Combine
Two other operations found in some block ciphers are
split and combine.
Figure 5.12 Split and combine operations on an 8-bit word
28. Figure 5.12 Split and combine operations on an 8-bit word
5.1.3 Continued
29. Shannon introduced the concept of a product cipher. A
product cipher is a complex cipher combining
substitution, permutation, and other components
discussed in previous sections.
5.1.4 Product Ciphers
30. Diffusion
The idea of diffusion is to hide the relationship between
the ciphertext and the plaintext.
5.1.4 Continued
Diffusion hides the relationship between the
ciphertext and the plaintext.
Note
31. Confusion
The idea of confusion is to hide the relationship between
the ciphertext and the key.
5.1.4 Continued
Confusion hides the relationship between the
ciphertext and the key.
Note
32. Rounds
Diffusion and confusion can be achieved using iterated
product ciphers where each iteration is a combination of
S-boxes, P-boxes, and other components.
5.1.4 Continued
33. Figure 5.13 A product cipher made of two rounds
5.1.4 Continued
35. Modern block ciphers are all product ciphers, but they
are divided into two classes.
1. Feistel ciphers
2. Non-Feistel ciphers
5.1.5 Two Classes of Product Ciphers
36. Feistel Ciphers
Feistel designed a very intelligent and interesting cipher
that has been used for decades. A Feistel cipher can have
three types of components: self-invertible, invertible, and
noninvertible.
5.1.5 Continued
37. Figure 5.15 The first thought in Feistel cipher design
5.1.5 Continued
Diffusion hides the relationship between the
ciphertext and the plaintext.
Note
39. Figure 5.17 Final design of a Feistel cipher with two rounds
5.1.5 Continued
40. Non-Feistel Ciphers
A non-Feistel cipher uses only invertible components. A
component in the encryption cipher has the
corresponding component in the decryption cipher.
5.1.5 Continued
41. Attacks on traditional ciphers can also be used on modern
block ciphers, but today’s block ciphers resist most of the
attacks discussed in Chapter 3.
5.1.6 Attacks on Block Ciphers
42. Differential Cryptanalysis
Eli Biham and Adi Shamir introduced the idea of
differential cryptanalysis. This is a chosen-plaintext
attack.
5.1.5 Continued
43. Example 5.14
5.1.6 Continued
We add one S-box to Example 5.13, as shown in Figure 5.19.
Figure 5.19 Diagram for Example 5.14
44. Example 5.14 Continued
5.1.6 Continued
Eve now can create a probabilistic relationship as shone in
Table 5.4.
Table 5.4 Differential input/output
45. Example 5.15
5.1.6 Continued
The heuristic result of Example 5.14 can create probabilistic
information for Eve as shown in Table 5.5.
Table 5.5 Differential distribution table
46. 5.1.6 Continued
A more detailed differential cryptanalysis is given
in Appendix N.
Note
Differential cryptanalysis is based on a nonuniform
differential distribution table of the S-boxes in a
block cipher.
Note
48. Figure 5.20 A simple cipher with a linear S-box
5.1.6 Continued
49. 5.1.6 Continued
Solving for three unknowns, we get.
This means that three known-plaintext attacks can find
the values of k0, k1, and k2 .
50. 5-2 MODERN STREAM CIPHERS
In a modern stream cipher, encryption and decryption
are done r bits at a time. We have a plaintext bit stream
P = pn…p2 p1, a ciphertext bit stream
C = cn…c2 c1, and a key bit stream K = kn…k2 k1, in
which pi , ci , and ki are r-bit words.
5.2.1 Synchronous Stream Ciphers
5.2.2 Nonsynchronous Stream Ciphers
Topics discussed in this section:
51. 5.2 Continued
In a modern stream cipher, each r-bit word in the
plaintext stream is enciphered using an r-bit word
in the key stream to create the corresponding r-bit
word in the ciphertext stream.
Note
Figure 5.20 Stream cipher
52. 5.2.1 Synchronous Stream Ciphers
In a synchronous stream cipher the key is
independent of the plaintext or ciphertext.
Note
Figure 5.22 One-time pad
53. Example 5.17
5.2.1 Continued
What is the pattern in the ciphertext of a one-time pad cipher
in each of the following cases?
a. The plaintext is made of n 0’s.
b. The plaintext is made of n 1’s.
c. The plaintext is made of alternating 0’s and 1’s.
d. The plaintext is a random string of bits.
Solution
a. Because 0 ki = ki , the ciphertext stream is the same as
the key stream. If the key stream is random, the
ciphertext is also random. The patterns in the plaintext
are not preserved in the ciphertext.
54. Example 5.7
5.2.1 Continued
b. Because 1 ki = ki where ki is the complement of ki , the
ciphertext stream is the complement of the key stream. If
the key stream is random, the ciphertext is also random.
Again the patterns in the plaintext are not preserved in
the ciphertext.
c. In this case, each bit in the ciphertext stream is either the
same as the corresponding bit in the key stream or the
complement of it. Therefore, the result is also a random
string if the key stream is random.
d. In this case, the ciphertext is definitely random because
the exclusive-or of two random bits results in a random
bit.
(Continued)
57. Example 5.19
5.2.1 Continued
Create a linear feedback shift register with 4 cells in which
b4 = b1 b0. Show the value of output for 20 transitions
(shifts) if the seed is (0001)2.
Solution
Figure 5.25 LFSR for Example 5.19
58. Table 4.6 Cell values and key sequence for Example 5.19
5.2.1 Continued
Example 5.19 (Continued)
60. 5.2.1 Continued
Note that the key stream is 100010011010111 10001…. This
looks like a random sequence at first glance, but if we go
through more transitions, we see that the sequence is
periodic. It is a repetition of 15 bits as shown below:
The key stream generated from a LFSR is a pseudorandom
sequence in which the the sequence is repeated after N bits.
The maximum period of an LFSR is to 2m − 1.
Note
Example 5.19 (Continued)
61. In a nonsynchronous stream cipher, each key in the key
stream depends on previous plaintext or ciphertext.
5.2.2 Nonsynchronous Stream Ciphers
In a nonsynchronous stream cipher, the key
depends on either the plaintext or ciphertext.
Note