Presentation is loading. Please wait.

Presentation is loading. Please wait.

- Stream Cipher and Block Cipher - Confusion & Diffusion

Similar presentations


Presentation on theme: "- Stream Cipher and Block Cipher - Confusion & Diffusion"— Presentation transcript:

1 - Stream Cipher and Block Cipher - Confusion & Diffusion

2 Stream cipher & Block cipher
Symmetric cipher divided into two categories: Stream cipher Block cipher Stream cipher: convert plaintext data into cipher text one byte or one bit at a time. Example: Caesar cipher, monoalphabetic and vegenere cipher. P: BITS Key: K Cipher: D Symmetric encryption, also referred to as conventional encryption or single-key encryption, was the only type of encryption in use prior to the development of public-key encryption in the 1970s. It remains by far the most widely used of the two types of encryption. All traditional schemes are symmetric / single key / private-key encryption algorithms, with a single key, used for both encryption and decryption. Since both sender and receiver are equivalent, either can encrypt or decrypt messages using that common key. C= Ek(U) 2 2

3 Stream cipher example In text format in binary format
Pay … XOR (key) cipher text Note: each byte of the plain text is encrypted one after the other. Symmetric encryption, also referred to as conventional encryption or single-key encryption, was the only type of encryption in use prior to the development of public-key encryption in the 1970s. It remains by far the most widely used of the two types of encryption. All traditional schemes are symmetric / single key / private-key encryption algorithms, with a single key, used for both encryption and decryption. Since both sender and receiver are equivalent, either can encrypt or decrypt messages using that common key. 3 3

4 Block Cipher Rather than encrypting one byte at a time, a block of bytes is encrypted at once. The message is broken into blocks. Symmetric encryption, also referred to as conventional encryption or single-key encryption, was the only type of encryption in use prior to the development of public-key encryption in the 1970s. It remains by far the most widely used of the two types of encryption. All traditional schemes are symmetric / single key / private-key encryption algorithms, with a single key, used for both encryption and decryption. Since both sender and receiver are equivalent, either can encrypt or decrypt messages using that common key. 4 4

5 Block Cipher Divide input bit stream into n-bit sections, encrypt only that section, no dependency/history between sections

6 Block cipher FOUR AND FOUR encrypt encrypt encrypt Vfas yTzx Vfas
Generally block size is 64 bits Symmetric encryption, also referred to as conventional encryption or single-key encryption, was the only type of encryption in use prior to the development of public-key encryption in the 1970s. It remains by far the most widely used of the two types of encryption. All traditional schemes are symmetric / single key / private-key encryption algorithms, with a single key, used for both encryption and decryption. Since both sender and receiver are equivalent, either can encrypt or decrypt messages using that common key. 6 6

7 Confusion & Diffusion Claude Shannon introduced the concept of confusion and diffusion, which are significant from the perspective of the cryptographic technique. Briefly review some terminology used throughout the course. 7 7

8 Confusion Confusion is a technique of ensuring that a cipher text gives no clue about the original text. Attacker should not be able to reveal the plain text by changing the one character of cipher text. Confusion is achieved by means of the substitution techniques. The idea of confusion is to hide the relationship between the cipher text and the key If single bit of key is changed , most or all bits in the cipher text will also be changed.

9 Confusion Example One time pad provide good confusion because one plain text letter can be transformed to any cipher text letter at different places in the output. Caesar cipher is not a good example of Confusion.

10 Diffusion Diffusion increase the redundancy of the plain text by spreading it across rows and columns. diffusion is achieved by means of the transposition techniques. Diffusion hide the relationship between the cipher text and plain text. In diffusion each character of cipher text is dependent on some or all characters in the plain text. NOTE: Stream cipher relies only on confusion Block cipher uses both confusion and diffusion. Example: Hill cipher is a good example of diffusion. Briefly review some terminology used throughout the course. 10 10


Download ppt "- Stream Cipher and Block Cipher - Confusion & Diffusion"

Similar presentations


Ads by Google