Introduction To Modern Symmetric - Key Ciphers

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 10

INTRODUCTION TO MODERN

SYMMETRIC KEY CIPHERS

Prof. Chittaranjan Pradhan


Asst. Professor, School of Computer Engineering,
KIIT University, BBSR

Stream Cipher:
Encryption and Decryption are done one symbol (such as a bit
or a byte) at a time.

Block Cipher:
A group of PT symbols of size m (m>1) are encrypted together
creating a group of CT of the same size
A single key is used to encrypt the whole block even if the key is
made of multiple values

Stream cipher is very time consuming

8/9/2011

Prof. Chittaranjan Pradhan, SCE,


KIIT University

Modern Block Ciphers


A
symmetric-key
modern
block
cipher
encrypts
an
n-bit block of plaintext or decrypts an n-bit block of cipher text. The
encryption or decryption algorithm uses a k-bit key

A modern block cipher can be designed to act as a substitution


cipher or a transposition cipher
8/9/2011

Prof. Chittaranjan Pradhan, SCE,


KIIT University

Component of a modern block


cipher
Modern block ciphers normally are keyed substitution ciphers in
which the key allows only partial mappings from the possible inputs
to the possible outputs
P-Box:
A P-box (permutation box) parallels the traditional transposition cipher
for characters.
It transposes bits

S-Box:
An S-box (substitution box) can be thought of as a miniature
substitution cipher
Modern block ciphers normally use keyless S-Boxes
8/9/2011

Prof. Chittaranjan Pradhan, SCE,


KIIT University

XOR:
XOR is reversible:- when used twice, it produces the original value

Circular Shift:
Shifting can be to the left or to the right
Circular left shift operation shifts each bit in an n-bit word k positions to
the left
Circular right shift operation shifts each bit in an n-bit word k positions
to the right

8/9/2011

Prof. Chittaranjan Pradhan, SCE,


KIIT University

Swap:
Special case of circular shift operation where k=n/2
Swap operation is valid only if n is an even number

Split & Combine:


Split operation splits an n-bit word in the middle, creating two equallength words
Combine operation concatenates two equal-length words to create an
n-bit word

8/9/2011

Prof. Chittaranjan Pradhan, SCE,


KIIT University

Product Cipher
Shannon introduced the concept of a product cipher. A product
cipher is a complex cipher combining substitution, permutation, and
other components discussed in previous sections
Diffusion:
The idea of diffusion is to hide the relationship between the ciphertext
and the plaintext
If a single symbol in the PT is changed, several or all symbols in the CT
will also be changed

Confusion:
The idea of confusion is to hide the relationship between the ciphertext
and the key
If a single bit in the key is changed, most or all bits in CT will also be
changed
8/9/2011

Prof. Chittaranjan Pradhan, SCE,


KIIT University

Classes of Product Ciphers


Non-Feistel ciphers:
Uses S-Box, P-Box, XOR operation

8/9/2011

Prof. Chittaranjan Pradhan, SCE,


KIIT University

Feistel cipher:
Uses Split & Combine, Swap,
XOR, Circular Shift operation

8/9/2011

Prof. Chittaranjan Pradhan, SCE,


KIIT University

8/9/2011

Prof. Chittaranjan Pradhan, SCE,


KIIT University

You might also like