Professional Documents
Culture Documents
Block Cipher
Block Cipher
The core part of the Feistel Block cipher structure is the Round Function.
The complexity of cryptanalysis can be derived from the Round function.
The avalanche effect is also included in the round function, as the change
of a single bit in plain text would produce a mischievous output due to the
presence of avalanche effect.
Key schedule algorithm :
In Feistel Block cipher structure, each round would generate a sub-key for
increasing the complexity of cryptanalysis.
The Avalanche effect makes it more complex in deriving sub-key.
Decryption must be done very carefully to get the actual output as the
avalanche effect is present in it.
Fiestel Structure
Step 1:
The plain text is divided into the blocks of a fixed size and only one block
is processed at a time. So, the input to encryption algorithm is a plain text
block and a key K.
Step 2:
The plain text block is divided into two equal halves which we will denote
as a LE0 as the left half of the plain text block and RE0 as the right half of
the plain text block.
Now, both these halves of the plain text block (LE0 & RE0) undergoes
multiple rounds to produce ciphertext block.
In each round, the encryption function is applied on the right half REi of
the plaintext block along with the key Ki.
The result of this encryption function is then XORed with the left half Lei.
The result of XOR function becomes the new right half for next
round REi+1.
The old right half REi becomes the new left half LEi+1 for the next round.
Each round executes the same function. In each round initially,
a substitution function is implemented .
A permutation function is implemented by swapping the two halves and
the result of this permutation is provided to the next round.
The design features of Feistel cipher that are considered while implementing
any block cipher are as follow:
Block Size:
The block cipher is considered more secure if the block size is larger.
But the larger block size can reduce the execution speed of encryption and
decryption
Generally, the block size of a block cipher is of 64-bit. But, the modern-
day block cipher such as AES has 128-bit block size.
Key Size:
The security of block cipher increases with the increasing key size.
But the large key size may decrease the speed of encryption and
decryption.
Earlier the key of 64-bit was considered to adequate. But the modern
cipher uses a key of size 128-bit.
Number of rounds:
The number of rounds also increases the security of the block cipher. .
More are the number of rounds more complex is the cipher
Subkey generation function
More the subkey generation function is complex, difficult it is for a
cryptanalyst to crack it .
Round Function
Complex round function enhances the security of the block cipher.
Feistel Decryption Algorithm
Advantages of CBC –
CBC works well for input greater than b bits.
CBC is a good authentication mechanism.
Better resistive nature towards cryptanalysis than ECB.
Disadvantages of CBC –
Parallel encryption is not possible since every encryption requires a
previous cipher.
Cipher Feedback Mode (CFB) –
In this mode the cipher is given as feedback to the next block of encryption
with some new specifications.
First, an initial vector IV is used for first encryption and output bits are
divided as a set of s and b-s bits.
The left-hand side s bits are selected along with plaintext bits to which an
XOR operation is applied.
The result is given as input to a shift register having b-s bits to lhs,s bits to
rhs and the process continues.
Advantages of CFB –
Since, there is some data loss due to the use of shift register, thus it is
difficult for applying cryptanalysis.
Output Feedback Mode –
The output feedback mode follows nearly the same process as the Cipher
Feedback mode except that it sends the encrypted output as feedback
instead of the actual cipher which is XOR output.
In this output feedback mode, all bits of the block are sent instead of
sending selected s bits.
The Output Feedback mode of block cipher holds great resistance towards
bit transmission errors.
It also decreases the dependency or relationship of the cipher on the
plaintext.
Advantages of OFB –