- Stream Cipher and Block Cipher - Confusion & Diffusion

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Classical Encryption Techniques Week 6-wend. One-Time Pad if a truly random key as long as the message is used, the cipher will be secure called a One-Time.
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
Block Ciphers and the Data Encryption Standard
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
Introduction to Symmetric Block Cipher Jing Deng Based on Prof. Rick Han’s Lecture Slides Dr. Andreas Steffen’s Security Tutorial.
Chapter 2 Basic Encryption and Decryption (part B)
Lecture 23 Symmetric Encryption
Review What is security: history and definition Security policy, mechanisms and services Security models.
Encryption Methods By: Michael A. Scott
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
IT 221: Classical and Modern Encryption Techniques Lecture 2: Classical and Modern Encryption Techniques For Educational Purposes Only Revised: September.
Chapter 12 Cryptography (slides edited by Erin Chambers)
Cryptography Week-6.
CSCI 5857: Encoding and Encryption
Chapter 20 Symmetric Encryption and Message Confidentiality.
Cryptography and Network Security (CS435) Part Two (Classic Encryption Techniques)
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
Classical Encryption techniques
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
Stream Ciphers and Block Ciphers A stream cipher is one that encrypts a digital data stream one bit or one byte at a time. Examples of classical stream.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Introduction to Modern Symmetric-key Ciphers
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Lecture 23 Symmetric Encryption
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
Module :MA3036NI Symmetric Encryption -3 Lecture Week 4.
Block Ciphers and the Data Encryption Standard. Modern Block Ciphers  One of the most widely used types of cryptographic algorithms  Used in symmetric.
CSE 5/7353 – January 25 th 2006 Cryptography. Conventional Encryption Shared Key Substitution Transposition.
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
Information and Network Security Lecture 2 Dr. Hadi AL Saadi.
Information Security CPIT 425 Instructor: Bashair Alrashed LAB1.
Lecture 4 Data Encryption Standard (DES) Dr. Nermin Hamza
Chapter Five Prepared by: Raval, Fichadia
Prepared by: Sameer Ali Aljaroodi, Tutor: Mr. Ahmad Kananh
Introduction Of System Security
Topics discussed in this section: 30-2 SYMMETRIC-KEY CRYPTOGRAPHY Symmetric-key cryptography started thousands of years ago when people needed.
Chapter-2 Classical Encryption Techniques.
Encryption
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Cryptography.
SYMMETRIC KEY ALGORITHMS
NET 311 Information Security
Cryptography and Network Security Chapter 3
PART VII Security.
ICS 454: Principles of Cryptography
Introduction to Modern Symmetric-key Ciphers
Block Ciphers and the Data Encryption Standard (DES)
Algorithm Types & Algorithm Modes
Simple Encryption- Lesson 5
ADVANCED ENCRYPTION STANDARDADVANCED ENCRYPTION STANDARD
DES (Data Encryption Standards)
SYMMETRIC KEY ALGORITHMS
SYMMETRIC ENCRYPTION.
Information Security IT423
Chapter 29 Cryptography and Network Security
Unit 2: Cryptography & Cryptographic Algorithm
DES (Data Encryption Standard)
Types of Cryptanalysis attacks
Cryptanalysis Network Security.
Symmetric Encryption or conventional / private-key / single-key
Florida State University
ICS 555: Block Ciphers & DES Sultan Almuhammadi.
Presentation transcript:

- Stream Cipher and Block Cipher - Confusion & Diffusion

Stream cipher & Block cipher Symmetric cipher divided into two categories: Stream cipher Block cipher Stream cipher: convert plaintext data into cipher text one byte or one bit at a time. Example: Caesar cipher, monoalphabetic and vegenere cipher. P: BITS Key: K Cipher: D Symmetric encryption, also referred to as conventional encryption or single-key encryption, was the only type of encryption in use prior to the development of public-key encryption in the 1970s. It remains by far the most widely used of the two types of encryption. All traditional schemes are symmetric / single key / private-key encryption algorithms, with a single key, used for both encryption and decryption. Since both sender and receiver are equivalent, either can encrypt or decrypt messages using that common key. C= Ek(U) 2 2

Stream cipher example In text format in binary format Pay100 010111001… XOR 100101011 (key) 11001001 cipher text Note: each byte of the plain text is encrypted one after the other. Symmetric encryption, also referred to as conventional encryption or single-key encryption, was the only type of encryption in use prior to the development of public-key encryption in the 1970s. It remains by far the most widely used of the two types of encryption. All traditional schemes are symmetric / single key / private-key encryption algorithms, with a single key, used for both encryption and decryption. Since both sender and receiver are equivalent, either can encrypt or decrypt messages using that common key. 3 3

Block Cipher Rather than encrypting one byte at a time, a block of bytes is encrypted at once. The message is broken into blocks. Symmetric encryption, also referred to as conventional encryption or single-key encryption, was the only type of encryption in use prior to the development of public-key encryption in the 1970s. It remains by far the most widely used of the two types of encryption. All traditional schemes are symmetric / single key / private-key encryption algorithms, with a single key, used for both encryption and decryption. Since both sender and receiver are equivalent, either can encrypt or decrypt messages using that common key. 4 4

Block Cipher Divide input bit stream into n-bit sections, encrypt only that section, no dependency/history between sections

Block cipher FOUR AND FOUR encrypt encrypt encrypt Vfas yTzx Vfas Generally block size is 64 bits Symmetric encryption, also referred to as conventional encryption or single-key encryption, was the only type of encryption in use prior to the development of public-key encryption in the 1970s. It remains by far the most widely used of the two types of encryption. All traditional schemes are symmetric / single key / private-key encryption algorithms, with a single key, used for both encryption and decryption. Since both sender and receiver are equivalent, either can encrypt or decrypt messages using that common key. 6 6

Confusion & Diffusion Claude Shannon introduced the concept of confusion and diffusion, which are significant from the perspective of the cryptographic technique. Briefly review some terminology used throughout the course. 7 7

Confusion Confusion is a technique of ensuring that a cipher text gives no clue about the original text. Attacker should not be able to reveal the plain text by changing the one character of cipher text. Confusion is achieved by means of the substitution techniques. The idea of confusion is to hide the relationship between the cipher text and the key If single bit of key is changed , most or all bits in the cipher text will also be changed.

Confusion Example One time pad provide good confusion because one plain text letter can be transformed to any cipher text letter at different places in the output. Caesar cipher is not a good example of Confusion.

Diffusion Diffusion increase the redundancy of the plain text by spreading it across rows and columns. diffusion is achieved by means of the transposition techniques. Diffusion hide the relationship between the cipher text and plain text. In diffusion each character of cipher text is dependent on some or all characters in the plain text. NOTE: Stream cipher relies only on confusion Block cipher uses both confusion and diffusion. Example: Hill cipher is a good example of diffusion. Briefly review some terminology used throughout the course. 10 10