Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

Block Cipher Vs Stream Cipher

BASIS FOR
BLOCK CIPHER STREAM CIPHER
COMPARISON

Basic Converts the plain text by Converts the text by taking one byte of the

taking its block at a time. plain text at a time.

Complexity Simple design Complex comparatively

No of bits used 64 Bits or more 8 Bits

Confusion and Uses both confusion and Relies on confusion only

Diffusion diffusion

Algorithm modes ECB (Electronic Code Book) CFB (Cipher Feedback)

used CBC (Cipher Block Chaining) OFB (Output Feedback)

Reversibility Reversing encrypted text is It uses XOR for the encryption which can be

hard. easily reversed to the plain text.

Implementation Feistel Cipher Vernam Cipher


Difference Between DES (Data Encryption Standard) and AES (Advanced
Encryption Standard)

BASIS FOR AES (ADVANCED ENCRYPTION


DES (DATA ENCRYPTION STANDARD)
COMPARISON STANDARD)

Basic In DES the data block is divided into In AES the entire data block is

two halves. processed as a single matrix.

Principle DES work on Feistel Cipher structure. AES works on Substitution and

Permutation Principle.

Plaintext Plaintext is of 64 bits Plaintext can be of 128,192, or 256

bits

Key size DES in comparison to AES has smaller AES has larger key size as compared

key size. to DES.

Rounds 16 rounds 10 rounds for 128-bit algo

12 rounds for 192-bit algo

14 rounds for 256-bit algo

Rounds Names Expansion Permutation,x Or, S-box, Sub bytes, shift rows, Mix columns,

P-box, xOr and Swap. Attorneys.

Security DES has a smaller key which is less AES has large secret key

secure. comparatively hence, more secure.


BASIS FOR AES (ADVANCED ENCRYPTION
DES (DATA ENCRYPTION STANDARD)
COMPARISON STANDARD)

Speed DES is comparatively slower. AES is faster

Difference Between Encryption and Decryption

BASIS FOR
ENCRYPTION DECRYPTION
COMPARISON

Basic Conversion of a human Conversion of an

understandable message into unintelligible message into a

an unintelligible and obscure comprehensible form which

form that can not be could be easily understood

interpreted. by a human.

Process takes Sender's end Receiver's end

place at

Function Conversion of plaintext into Conversion of ciphertext into

ciphertext. plaintext.
Difference Between Confusion and Diffusion

BASIS FOR
CONFUSION DIFFUSION
COMPARISON

Basic Utilized to generate vague Utilized to generate

cipher texts. obscure, plain texts.

Seeks to Make a relation between The statistical relationship

statistics of the ciphertext and between the plaintext and

the value of the encryption ciphertext is made as

key as complicated as complicated as possible.

possible.

Achieved through Substitution algorithm Transposition algorithm

Used by Stream cipher and block Block cipher only.

cipher

Result in Increased vagueness Increased redundancy


Difference Between Symmetric and Asymmetric
Encryption

BASIS FOR SYMMETRIC ASYMMETRIC

COMPARISON ENCRYPTION ENCRYPTION

Basic Symmetric encryption uses Asymmetric encryption uses

a single key for both a different key for encryption

encryption and Decryption. and decryption.

Performance Symmetric encryption is Asymmetric Encryption is

fast in execution. slow in execution due to the

high computational burden.

Algorithms DES, 3DES, AES, and RC4. Diffie-Hellman, RSA.

Purpose The symmetric encryption is The asymmetric encryption is

used for bulk data often used for securely

transmission. exchanging secret keys.


Difference Between Substitution Technique and
Transposition Technique

BASIS FOR SUBSTITUTION TRANSPOSITION

COMPARISON TECHNIQUE TECHNIQUE

Basic Replaces the plaintext Rearranges the position of

characters with other the characters of the

characters, numbers and plaintext.

symbols.

Forms Monoalphabetic and Keyless and keyed

polyalphabetic substitution transpositional cipher.

cipher.

Alterations The identity of the character The position of the

is changed while its position character is changed in

remains unchanged. spite of its identity.

Demerit The letter with the low Keys near to the correct

frequency can discern the key can disclose the

plaintext. plaintext.

Example Caesar Cipher Reil Fence Cipher

You might also like