This document discusses modern block ciphers and their design. It introduces modern block ciphers as bit-oriented substitution ciphers that encrypt data in blocks. The key components of block ciphers are substitution boxes (S-boxes) that provide confusion and permutation boxes (P-boxes) that provide diffusion by mixing bit positions. Modern block ciphers use product ciphers that combine these components over multiple rounds to strengthen diffusion and confusion. There are two main classes of product ciphers: Feistel ciphers and non-Feistel ciphers.
Modern Block Cipher- Modern Symmetric-Key CipherMahbubur Rahman
Introduction to Modern Symmetric-Key Ciphers- This lecture will cover only "Modern Block Cipher".
Slide Credit: Maleka Khatun & Mahbubur Rahman
Dept. of CSE, JnU, BD.
Stream Cipher
Block Cipher
Stream Cipher and Block Cipher
The Feistel Cipher
Feistel Cipher Design Features
Data Encryption Standard (DES)
DES is a block cipher
THE AVALANCHE EFFECT
Block Cipher Design Principles
Modern Block Cipher- Modern Symmetric-Key CipherMahbubur Rahman
Introduction to Modern Symmetric-Key Ciphers- This lecture will cover only "Modern Block Cipher".
Slide Credit: Maleka Khatun & Mahbubur Rahman
Dept. of CSE, JnU, BD.
Stream Cipher
Block Cipher
Stream Cipher and Block Cipher
The Feistel Cipher
Feistel Cipher Design Features
Data Encryption Standard (DES)
DES is a block cipher
THE AVALANCHE EFFECT
Block Cipher Design Principles
ENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTIONIJNSA Journal
The rapid and extensive usage of Internet in the present decade has put forth information security as an utmost concern. Most of the commercial transactions taking place over the Internet involves a wide variety of data including text, images, audio and video. With the increasing use of digital techniques for transmitting and storing Multimedia data, the fundamental issue of protecting the confidentiality, integrity and authenticity of the information poses a major challenge for security professionals and hassled to the major developments in Cryptography . In cryptography, an S-Box (Substitution-box) is a basic component of symmetric key algorithms, which performs substitution and is typically used to make the relationship between the key and the cipher text non linear and most of the symmetric key algorithms like DES, Blowfish makes use of S boxes. This paper proposes a new method for design of S boxes based on chaos theory. Chaotic equations are popularly known for its randomness, extreme sensitivity to initial conditions and ergodicity. The modified design has been tested with blowfish algorithm which has no effective crypt analysis reported against its design till date because of its salient design features including the key dependant s boxes and complex key generation process. However every new key requires pre-processing equivalent to encrypting about 4 kilobytes of text, which is very slow compared to other block ciphers and it prevents its usage in memory limited applications and embedded systems. The modified design of S boxes maintains the non linearity [3] [5] and key dependency factors of S boxes with a major reduction in time complexity of generation of S boxes and P arrays. The algorithm has been implemented and the proposed design has been analyzed for size of key space, key sensitivity and Avalanche effect. Experimental results on text and Image Encryption show that the modified design of key generation continues to offer the same
level of security as the original Blowfish cipher with a less computational overhead in key generation.
Information and network security 19 feistel cipherVaibhav Khanna
Feistel cipher is a symmetric structure used in the construction of block ciphers, named after the German-born physicist and cryptographer Horst Feistel who did pioneering research while working for IBM; it is also commonly known as a Feistel network
Now student study cryptography and acknowledge your self for more info <a href="https://easytricks.xyz/">Easy Tricks</a> is very good in tricks and site bug
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
ENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTIONIJNSA Journal
The rapid and extensive usage of Internet in the present decade has put forth information security as an utmost concern. Most of the commercial transactions taking place over the Internet involves a wide variety of data including text, images, audio and video. With the increasing use of digital techniques for transmitting and storing Multimedia data, the fundamental issue of protecting the confidentiality, integrity and authenticity of the information poses a major challenge for security professionals and hassled to the major developments in Cryptography . In cryptography, an S-Box (Substitution-box) is a basic component of symmetric key algorithms, which performs substitution and is typically used to make the relationship between the key and the cipher text non linear and most of the symmetric key algorithms like DES, Blowfish makes use of S boxes. This paper proposes a new method for design of S boxes based on chaos theory. Chaotic equations are popularly known for its randomness, extreme sensitivity to initial conditions and ergodicity. The modified design has been tested with blowfish algorithm which has no effective crypt analysis reported against its design till date because of its salient design features including the key dependant s boxes and complex key generation process. However every new key requires pre-processing equivalent to encrypting about 4 kilobytes of text, which is very slow compared to other block ciphers and it prevents its usage in memory limited applications and embedded systems. The modified design of S boxes maintains the non linearity [3] [5] and key dependency factors of S boxes with a major reduction in time complexity of generation of S boxes and P arrays. The algorithm has been implemented and the proposed design has been analyzed for size of key space, key sensitivity and Avalanche effect. Experimental results on text and Image Encryption show that the modified design of key generation continues to offer the same
level of security as the original Blowfish cipher with a less computational overhead in key generation.
Information and network security 19 feistel cipherVaibhav Khanna
Feistel cipher is a symmetric structure used in the construction of block ciphers, named after the German-born physicist and cryptographer Horst Feistel who did pioneering research while working for IBM; it is also commonly known as a Feistel network
Now student study cryptography and acknowledge your self for more info <a href="https://easytricks.xyz/">Easy Tricks</a> is very good in tricks and site bug
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
2. Objectives
❏ To distinguish between traditional and modern
symmetric-key ciphers.
❏ To introduce modern block ciphers and discuss
their characteristics.
❏ To explain why modern block ciphers need to be
designed as substitution ciphers.
❏ To introduce components of block ciphers such as
P-boxes and S-boxes.
3. Objectives (Continued)
❏ To discuss product ciphers and distinguish
between two classes of product ciphers: Feistel
(Luby-rackoff) and non-Feistel ciphers.
4. 5.1 MODERN BLOCK CIPHERS
• Traditional symmetric-key ciphers- character-oriented
ciphers
• Modern symmetric-key ciphers- bit-oriented ciphers
because the information to be encrypted is not just text; it
can also consists of numbers, graphics, audio, and video
data.
• It is convenient to convert these type of data into stream of
bits, to encrypt the stream, and then send the encrypted
stream.
• In addition, when text is treated at bit level, each character
is replaced by 8 (or 16)bits, which means that the number of
symbols becomes 8 (or 16 ) times larger. Mixing a large
number of symbols increases security.
5. Figure 5.1 A modern block cipher
5.1 Continued
• A symmetric-key modern block cipher encrypts an
n-bit block of plaintext or decrypts an n-bit block of
ciphertext. The encryption or decryption algorithm uses a k-
bit key.
• The decryption algorithm must be the inverse of encryption
algorithm, and both operation must use the same secret key.
6. • If the message has fewer than n bits, padding must be
added to make it an n-bit block;
• If the message has more than n bits, it should be divided
into n-bit block and the appropriate padding must be
added to the last block if necessary.
• The common values for n are 64, 128, 256, or 512 bits.
5.1 Continued
7. Modern block ciphers normally are keyed substitution
ciphers in which the key allows only partial mappings
from the possible inputs to the possible outputs.
5.1.3 Components of a Modern Block Cipher
A P-box (permutation box) parallels the traditional
transposition cipher for characters. It transposes bits.
P-Boxes
S-Box
An S-box (substitution box): An S-box is an m × n
substitution unit, where m and n are not necessarily the
same.
8. Claude Shannon and Substitution-
Permutation Ciphers
■ Claude Shannon introduced idea of substitution-
permutation (S-P) networks in 1949 paper- using idea of
a product cipher
■ form basis of modern block ciphers
■ S-P nets are based on the two primitive cryptographic
operations seen before:
■ substitution (S-box) - confusion
■ permutation (P-box) - diffusion
■ provide confusion & diffusion of message & key
■ Bit shuffling creates the diffusion effect, while
substitution is used for confusion
9. Confusion
The idea of confusion is to hide the relationship between
the ciphertext and the key (means the key does not relate
in a simple way to the ciphertext, each character of
ciphertext should depend on several part of the key)
5.1.3 Continued
Confusion hides the relationship between the
ciphertext and the key.
Note
10. Diffusion
The idea of diffusion is to hide the relationship between
the ciphertext and the plaintext.
5.1.3 Continued
Diffusion hides the relationship between the
ciphertext and the plaintext.
Note
11. Example:
• Caesar ciphers have poor confusion.
• Polyalphabetic substitutions provide good confusion
especially if the key length exceeds message length.
• Vernam cipher or one-time pad relies entirely on
confusion, not on diffusion.
• Transposition ciphers provide good diffusion.
5.1.3 Continued
13. Example 5.5
5.1.3 Continued
Figure 5.5 The possible mappings of a 3 × 3 P-box
Figure 5.5 shows all 6 possible mappings of a 3 × 3 P-box.
14. 5.1.3 Continued
Table 5.1 Example of a permutation table for a straight P-box
Straight P-Boxes
Table 5.1 has 64 entries, corresponding to the 64 inputs. The
position (index) of the entry corresponds to the output.
Because the first entry contains the number 58, we know that
the first output comes from the 58th input. Because the last
entry is 7, we know that the 64th output comes from the 7th
input, and so on.
15. Example 5.6
5.1.2 Continued
Design an 8 × 8 permutation table for a straight P-box that
moves the two middle bits (bits 4 and 5) in the input word to
the two ends (bits 1 and 8) in the output words. Relative
positions of other bits should not be changed.
Solution
We need a straight P-box with the table [4 1 2 3 6 7 8 5].
16. Compression P-Boxes
5.1.3 Continued
A compression P-box is a P-box with n inputs and m
outputs where m < n.
Table 5.2 Example of a 32 × 24 permutation table
17. Expansion P-Boxes
5.1.3 Continued
An expansion P-box is a P-box with n inputs and m
outputs where m > n.
Table 5.3 Example of a 12 × 16 permutation table
19. Example 5.7
5.1.3 Continued
Figure 5.6 shows how to invert a permutation table
represented as a one-dimensional table.
Figure 5.6 Inverting a permutation table
20. Figure 5.7 Compression and expansion P-boxes are non-invertible
5.1.3 Continued
• In compression P-box, an input can be dropped during encryption; the decryption algorithm does not
have a clue how to replace the dropped bit ( a choice between a 0-bit or a 1-bit).
• In expansion P-box, an input may be mapped to more than one output during encryption; the
decryption scheme algorithm does not have a clue which of the several inputs are mapped to an
output.
21. 5.1.3 Continued
• Figure 5.7, shows that a compression P-box in not the
inverse of an expansion P-box or vice versa.
• This means that if we use a compression P-box in the
encryption cipher, we can not use an expansion P-box in
the decryption cipher; or vice versa.
22. 5.1.3 Continued
S-Box
An S-box (substitution box)
An S-box is an m × n substitution unit, where m and
n are not necessarily the same.
Note
• S-box can have different number of inputs (n-bit word) and
outputs (m-bit word).
• S-box can be keyed or keyless, modern block ciphers
normally use keyless S-boxes, where mapping from the
inputs to the outputs is predefined.
23. Example 5.10
5.1.3 Continued
The following table defines the input/output relationship for
an S-box of size 3 × 2. The leftmost bit of the input defines the
row; the two rightmost bits of the input define the column.
The two output bits are values on the cross section of the
selected row and column.
Based on the table, an input of 010 gives the output 01. An
input of 101 gives the output of 00.
24. Example 5.11
5.1.3 Continued
Figure 5.8 shows an example of an invertible S-box. For
example, if the input to the left box is 001, the output is 101.
The input 101 in the right table creates the output 001, which
shows that the two tables are inverses of each other.
Figure 5.8 S-box tables for Example 5.11
26. 5.1.3 Continued
Circular Shift
Another component found in some modern block ciphers is the circular shift
operation. (n=8 and k=3>
The circular shift operation mixes the bits in a word and helps hide the patterns
in the original word.
Figure 5.10 Circular shifting an 8-bit word to the left or right
27. 5.1.3 Continued
Swap
The swap operation is a special case of the circular shift
operation where k = n/2. <valid when n is an even
number>, here left-shifting n/2 bits is same as right-
shifting n/2, this component is self-invertible.
Figure 5.11 Swap operation on an 8-bit word
28. 5.1.3 Continued
Split and Combine
Two other operations found in some block ciphers are
split and combine.
Figure 5.12 Split and combine operations on an 8-bit word
29. Shannon introduced the concept of a product cipher. A
product cipher is a complex cipher combining
substitution, permutation, and other components
discussed in previous sections.
5.1.4 Product Ciphers
30. Rounds
Diffusion and confusion can be achieved using iterated
product ciphers where each iteration is a combination of
S-boxes, P-boxes, and other components.
5.1.4 Continued
31. Figure 5.13 A product cipher made of two rounds
5.1.4 Continued
Three transformations happen at each
round:
1.The 8-bit text is mixed with the key to
whiten the text (hide the bits using the
key). This is normally done by exclusive-
oring the 8-bit word with the 8-bit key.
2.The output of the whitener are
organized into four 2-bit groups and are
fed into four S-boxes. The values of bits
are changed based on the structure of the
S-boxes in this transformation.
3.The output of S-boxes are passed
through a P-box to permute the bits so
that in the next round each box receives
different inputs.
32. Figure 5.14 Diffusion and confusion in a block cipher
5.1.4 Continued
Diffusion: changing a single bit in the
plaintext affects many bits in the
ciphertxt.
Confusion: the four bits of ciphertext, bits
1, 3, 6, and 7, are affected by three bits in
the key (bit 8 in K1 and bits 2 and 4 in
K2).
It shows that each bit in each round key
effects several bits in the ciphertext. The
relationship between ciphertext bits and
key bits is unclear.
33. Modern block ciphers are all product ciphers.
- Feistel ciphers
5.1.5 Two Classes of Product Ciphers
34. Figure 5.15 The first thought in Feistel cipher design
5.1.5 Continued
35. Example 5.12
5.1.3 Continued
This is a trivial example. The plaintext and ciphertext are
each 4 bits long and the key is 3 bits long. Assume that the
function takes the first and third bits of the key, interprets
these two bits as a decimal number, squares the number, and
interprets the result as a 4-bit binary pattern. Show the
results of encryption and decryption if the original plaintext
is 0111 and the key is 101.
The function extracts the first and third bits to get 11 in
binary or 3 in decimal. The result of squaring is 9, which is
1001 in binary.
Solution