SlideShare a Scribd company logo
1 of 27
Chapter 6
Block Cipher Operation
Lucture slides
By
Muntaha
Cryptography and Network
Security
Multiple encryption
is a technique in which an encryption algorithm is used multiple times.
In the first instance, plaintext is converted to ciphertext using the encryption
algorithm.
This ciphertext is then used as input and
the algorithm is applied again.
This process may be repeated through any
number of stages.
Multiple Encryption & DES
• clear a replacement for DES was needed
–attacks can break it
–demonstrated exhaustive key search attacks
• AES is a new cipher alternative
• prior to this alternative was to use multiple
encryption with DES implementations
• Triple-DES is the chosen form
Double-DES
•could use 2 DES encrypts on each block
Encryption
X=E(K1,P)
C=E(K2,X)
C=E(K2,E(K1,P))
------------------------
Decreption
X=D(K2,C)
P=D(K1,X)
P=D(K1,D(K2,C))
Why not Double-DES?
 could use 2 DES encrypts on each block
 C = EK2(EK1(P))
 “meet-in-the-middle” attack
 works whenever use a cipher twice
 since X = EK1(P) = DK2(C)
 attack by encrypting P with all keys and store
 then decrypt C with keys and match X value
 can show takes O(256) steps
 Requires…know plaintext,
Triple-DES with Two-Keys
hence must use 3 encryptions
would seem to need 3 distinct keys
but can use 2 keys with E-D-E sequence
standardized in ANSI
no current known practical attacks
several proposed impractical attacks might become
basis of future attacks
Encryption
A=E(K1,P)
B=D(K2,A)
C=E(K1,B)
C=E(K1, D(K2,A))
C=E(K1,D(K2, E(K1,P)))
Decryption
B=D(K1,C)
A=E(K2,B)
P=D(K1,A)
P=D(K1, E(K2,B))
P=D(K1, E(K2,
D(K1,C)))
Triple-DES with Three-Keys
although are no practical attacks on two-key Triple-
DES have some indications
can use Triple-DES with Three-Keys to avoid even
these
C = EK3(DK2(EK1(P)))
has been adopted by some Internet applications,
e.g., PGP, S/MIME
Modes of Operation
A mode of operation is a technique for enhancing the effect of
a cryptographic algorithm or adapting the algorithm for an application
, such as applying a block cipher to a sequence of data blocks or a data
stream.
block ciphers encrypt fixed size blocks
DES encrypts 64-bit blocks
NIST defines 5 modes
have block and stream modes
to cover a wide variety of applications
can be used with any block cipher
1. Electronic Codebook Mode (ECB)
2. Cipher Block Chaining Mode (CBC)
3. Cipher Feedback Mode (CFB)
4. Output Feedback Mode (OFB)
5. CTR
Modes of Operation
Electronic Codebook Book (ECB)
 message is broken into independent blocks that are
encrypted
 each block is a value which is substituted
 Each block of 64 plaintext bits is encoded
independently using the same key.
 uses: secure transmission of single values
Electronic
Codebook
Book (ECB)
Advantages and Limitations of ECB
• weakness is due to the encrypted message blocks being
independent
• main use is sending a few blocks of data
• For lengthy messages, the ECB mode may not be secure
• the same -bit block of plaintext appears more than once in the
message, it always produces the same ciphertext.
Cipher Block Chaining (CBC)
• message is broken into blocks
• Block linked together in encryption operation
• The same key is used for each block
• each previous cipher blocks is chained with current plaintext block.
• To produce the first block of ciphertext, an initialization vector (IV) is
XOR with the first block of plaintext.
• uses: bulk data encryption, authentication
Cipher
Block
Chaining
(CBC)
Advantages and Limitations of CBC
a ciphertext block depends on all blocks before it
 any change to a block affects all following ciphertext blocks...
avalanche effect
 because of the chaining mechanism of CBC, it is an appropriate mode
for encrypting messages of length greater than N bits.
need Initialization Vector (IV)
 which must be known to sender & receiver
 hence IV must either be a fixed value
 or derived in way hard to manipulate
Cipher FeedBack (CFB)
 message is treated as a stream of bits
 Use Initial Vector to start process
 Encrypt previous ciphertext , then combined with the plaintext block using X-
OR to produce the current ciphertext
 added to the output of the block cipher
 result is feed back for next stage
 standard allows any number of bits (1,8, 64 or 128 etc) to be feed back
 most efficient to use all bits in block (64 or 128)
 uses: stream data encryption, authentication
Encryption C1 = P1 XOR MSBs[E(K, IV)]
decryption p1=c1 XOR MSBs[E(K, IV)]
Cipher
FeedBack
(CFB)
Advantages and Limitations of CFB
 note that the block cipher is used in encryption mode at
both ends (XOR)
 Use Initial Vector to start process
 Encrypt previous ciphertext , then combined with the
plaintext block using X-OR to produce the current ciphertext.
 A ciphertext segment depends on the current and all
preceding plaintext segments.
Output FeedBack (OFB)
 Very similar to CFB
 message is treated as a stream of bits
 output of cipher is added to message
 feedback is independent of message
 uses: stream encryption on noisy channels
Encryption Cj = Pj XOR E(K, [Cj-1 XOR Pj-1])
Decreption Pj = Cj XOR E(K, [Cj-1 XOR Pj-1])
Output
FeedBack
(OFB)
Advantages and Limitations of OFB
 needs an IV which is unique for each use
 Feedback is independent of message
 Each bit in the ciphertext is independent of the
previous bit or bits. This avoids error
propagation
 only use with full block feedback
◦ subsequent research has shown that only full block
feedback (ie CFB-64 or CFB-128) should ever be used
Counter (CTR)
a “new” mode
similar to OFB but encrypts counter value rather
than any feedback value
must have a different key & counter value for every
plaintext block (never reused)
uses: high-speed network encryptions
Counter
(CTR)
Advantages and Limitations of CTR
efficiency
o can do parallel encryptions in h/w or s/w
o good for bursty high speed links
random access to encrypted data blocks
provable security (good as other modes)
but must ensure never reuse key/counter
values.
summary
Multiple Encryption
Multiple Encryption & Triple-DES
Modes of Operation
 ECB, CBC, CFB, OFB, CTR, XTS-AES
•Thanks for
listening

More Related Content

What's hot

Ch03 block-cipher-and-data-encryption-standard
Ch03 block-cipher-and-data-encryption-standardCh03 block-cipher-and-data-encryption-standard
Ch03 block-cipher-and-data-encryption-standard
tarekiceiuk
 

What's hot (20)

Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
 
Block cipher modes of operation
Block cipher modes of operation Block cipher modes of operation
Block cipher modes of operation
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Block Cipher and Operation Modes
Block Cipher  and Operation Modes Block Cipher  and Operation Modes
Block Cipher and Operation Modes
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
Encryption algorithms
Encryption algorithmsEncryption algorithms
Encryption algorithms
 
IPSec (Internet Protocol Security) - PART 1
IPSec (Internet Protocol Security) - PART 1IPSec (Internet Protocol Security) - PART 1
IPSec (Internet Protocol Security) - PART 1
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
Substitution cipher and Its Cryptanalysis
Substitution cipher and Its CryptanalysisSubstitution cipher and Its Cryptanalysis
Substitution cipher and Its Cryptanalysis
 
Topic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesTopic1 substitution transposition-techniques
Topic1 substitution transposition-techniques
 
Block Ciphers Modes of Operation
Block Ciphers Modes of OperationBlock Ciphers Modes of Operation
Block Ciphers Modes of Operation
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
Intro to modern cryptography
Intro to modern cryptographyIntro to modern cryptography
Intro to modern cryptography
 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithms
 
MAC-Message Authentication Codes
MAC-Message Authentication CodesMAC-Message Authentication Codes
MAC-Message Authentication Codes
 
Ch03 block-cipher-and-data-encryption-standard
Ch03 block-cipher-and-data-encryption-standardCh03 block-cipher-and-data-encryption-standard
Ch03 block-cipher-and-data-encryption-standard
 
Introduction of cryptography and network security
Introduction of cryptography and network securityIntroduction of cryptography and network security
Introduction of cryptography and network security
 
Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography ppt
 
CONVENTIONAL ENCRYPTION
CONVENTIONAL ENCRYPTIONCONVENTIONAL ENCRYPTION
CONVENTIONAL ENCRYPTION
 
block ciphers
block ciphersblock ciphers
block ciphers
 

Viewers also liked

Cryptography and Message Authentication NS3
Cryptography and Message Authentication NS3Cryptography and Message Authentication NS3
Cryptography and Message Authentication NS3
koolkampus
 
Alice & bob public key cryptography 101
Alice & bob  public key cryptography 101Alice & bob  public key cryptography 101
Alice & bob public key cryptography 101
Joshua Thijssen
 
Alice & bob public key cryptography 101
Alice & bob  public key cryptography 101Alice & bob  public key cryptography 101
Alice & bob public key cryptography 101
Joshua Thijssen
 
Different types of Symmetric key Cryptography
Different types of Symmetric key CryptographyDifferent types of Symmetric key Cryptography
Different types of Symmetric key Cryptography
subhradeep mitra
 
Cipher techniques
Cipher techniquesCipher techniques
Cipher techniques
Mohd Arif
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signatures
Rohit Bhat
 

Viewers also liked (20)

Symmetric and asymmetric key
Symmetric and asymmetric keySymmetric and asymmetric key
Symmetric and asymmetric key
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
 
Substitution Cipher
Substitution CipherSubstitution Cipher
Substitution Cipher
 
Substitution cipher
Substitution cipher Substitution cipher
Substitution cipher
 
Cryptography
CryptographyCryptography
Cryptography
 
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)
 
Public key cryptography and RSA
Public key cryptography and RSAPublic key cryptography and RSA
Public key cryptography and RSA
 
Cryptography and Message Authentication NS3
Cryptography and Message Authentication NS3Cryptography and Message Authentication NS3
Cryptography and Message Authentication NS3
 
Alice & bob public key cryptography 101
Alice & bob  public key cryptography 101Alice & bob  public key cryptography 101
Alice & bob public key cryptography 101
 
Ecc2
Ecc2Ecc2
Ecc2
 
CNIT 141: 9. Elliptic Curve Cryptosystems
CNIT 141: 9. Elliptic Curve CryptosystemsCNIT 141: 9. Elliptic Curve Cryptosystems
CNIT 141: 9. Elliptic Curve Cryptosystems
 
Block Cipher Modes of Operation And Cmac For Authentication
Block Cipher Modes of Operation And Cmac For AuthenticationBlock Cipher Modes of Operation And Cmac For Authentication
Block Cipher Modes of Operation And Cmac For Authentication
 
Information and data security block cipher and the data encryption standard (...
Information and data security block cipher and the data encryption standard (...Information and data security block cipher and the data encryption standard (...
Information and data security block cipher and the data encryption standard (...
 
Alice & bob public key cryptography 101
Alice & bob  public key cryptography 101Alice & bob  public key cryptography 101
Alice & bob public key cryptography 101
 
Different types of Symmetric key Cryptography
Different types of Symmetric key CryptographyDifferent types of Symmetric key Cryptography
Different types of Symmetric key Cryptography
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
Cipher techniques
Cipher techniquesCipher techniques
Cipher techniques
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signatures
 

Similar to Information and data security block cipher operation

THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHMTHE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
cscpconf
 
block ciphermodes of operation.pptx
block ciphermodes of operation.pptxblock ciphermodes of operation.pptx
block ciphermodes of operation.pptx
DEEPAK948083
 
Chap06 block cipher operation
Chap06 block cipher operationChap06 block cipher operation
Chap06 block cipher operation
Nam Yong Kim
 
Topic21 Elect. Codebook, Cipher Block Chaining.pptx
Topic21 Elect. Codebook, Cipher Block Chaining.pptxTopic21 Elect. Codebook, Cipher Block Chaining.pptx
Topic21 Elect. Codebook, Cipher Block Chaining.pptx
ShimoFcis
 
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block CiphersA Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
IJNSA Journal
 

Similar to Information and data security block cipher operation (20)

CR 06 - Block Cipher Operation.ppt
CR 06 - Block Cipher Operation.pptCR 06 - Block Cipher Operation.ppt
CR 06 - Block Cipher Operation.ppt
 
4.ppt
4.ppt4.ppt
4.ppt
 
unit 2.ppt
unit 2.pptunit 2.ppt
unit 2.ppt
 
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHMTHE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
 
Modes of Operation
Modes of Operation Modes of Operation
Modes of Operation
 
Computer security module 2
Computer security module 2Computer security module 2
Computer security module 2
 
ch06.ppt
ch06.pptch06.ppt
ch06.ppt
 
Jaimin chp-8 - network security-new -use this - 2011 batch
Jaimin   chp-8 - network security-new -use this -  2011 batchJaimin   chp-8 - network security-new -use this -  2011 batch
Jaimin chp-8 - network security-new -use this - 2011 batch
 
block ciphermodes of operation.pptx
block ciphermodes of operation.pptxblock ciphermodes of operation.pptx
block ciphermodes of operation.pptx
 
Encryption
EncryptionEncryption
Encryption
 
Block Ciphers Modes of Operation
Block Ciphers Modes of OperationBlock Ciphers Modes of Operation
Block Ciphers Modes of Operation
 
Chap06 block cipher operation
Chap06 block cipher operationChap06 block cipher operation
Chap06 block cipher operation
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
 
DEC algorithm
DEC algorithmDEC algorithm
DEC algorithm
 
Comparative analysis on different DES model
Comparative analysis on different DES modelComparative analysis on different DES model
Comparative analysis on different DES model
 
CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2
 
Information System Security.pptx
Information System  Security.pptxInformation System  Security.pptx
Information System Security.pptx
 
Topic21 Elect. Codebook, Cipher Block Chaining.pptx
Topic21 Elect. Codebook, Cipher Block Chaining.pptxTopic21 Elect. Codebook, Cipher Block Chaining.pptx
Topic21 Elect. Codebook, Cipher Block Chaining.pptx
 
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block CiphersA Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
 
CNIT 141: 4. Block Ciphers
CNIT 141: 4. Block CiphersCNIT 141: 4. Block Ciphers
CNIT 141: 4. Block Ciphers
 

More from Mazin Alwaaly

More from Mazin Alwaaly (20)

Pattern recognition voice biometrics
Pattern recognition voice biometricsPattern recognition voice biometrics
Pattern recognition voice biometrics
 
Pattern recognition palm print authentication system
Pattern recognition palm print authentication systemPattern recognition palm print authentication system
Pattern recognition palm print authentication system
 
Pattern recognition on line signature
Pattern recognition on line signaturePattern recognition on line signature
Pattern recognition on line signature
 
Pattern recognition multi biometrics using face and ear
Pattern recognition multi biometrics using face and earPattern recognition multi biometrics using face and ear
Pattern recognition multi biometrics using face and ear
 
Pattern recognition IRIS recognition
Pattern recognition IRIS recognitionPattern recognition IRIS recognition
Pattern recognition IRIS recognition
 
Pattern recognition hand vascular pattern recognition
Pattern recognition hand vascular pattern recognitionPattern recognition hand vascular pattern recognition
Pattern recognition hand vascular pattern recognition
 
Pattern recognition Hand Geometry
Pattern recognition Hand GeometryPattern recognition Hand Geometry
Pattern recognition Hand Geometry
 
Pattern recognition forensic dental identification
Pattern recognition forensic dental identificationPattern recognition forensic dental identification
Pattern recognition forensic dental identification
 
Pattern recognition fingerprints
Pattern recognition fingerprintsPattern recognition fingerprints
Pattern recognition fingerprints
 
Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognition
 
Pattern recognition ear as a biometric
Pattern recognition ear as a biometricPattern recognition ear as a biometric
Pattern recognition ear as a biometric
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognition
 
Multimedia multimedia over wireless and mobile networks
Multimedia multimedia over wireless and mobile networksMultimedia multimedia over wireless and mobile networks
Multimedia multimedia over wireless and mobile networks
 
Multimedia network services and protocols for multimedia communications
Multimedia network services and protocols for multimedia communicationsMultimedia network services and protocols for multimedia communications
Multimedia network services and protocols for multimedia communications
 
Multimedia content based retrieval in digital libraries
Multimedia content based retrieval in digital librariesMultimedia content based retrieval in digital libraries
Multimedia content based retrieval in digital libraries
 
Multimedia lossy compression algorithms
Multimedia lossy compression algorithmsMultimedia lossy compression algorithms
Multimedia lossy compression algorithms
 
Multimedia lossless compression algorithms
Multimedia lossless compression algorithmsMultimedia lossless compression algorithms
Multimedia lossless compression algorithms
 
Multimedia basic video compression techniques
Multimedia basic video compression techniquesMultimedia basic video compression techniques
Multimedia basic video compression techniques
 
Multimedia image compression standards
Multimedia image compression standardsMultimedia image compression standards
Multimedia image compression standards
 
Multimedia fundamental concepts in video
Multimedia fundamental concepts in videoMultimedia fundamental concepts in video
Multimedia fundamental concepts in video
 

Recently uploaded

Bacterial Identification and Classifications
Bacterial Identification and ClassificationsBacterial Identification and Classifications
Bacterial Identification and Classifications
Areesha Ahmad
 
SCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptx
SCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptxSCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptx
SCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptx
RizalinePalanog2
 
Chemical Tests; flame test, positive and negative ions test Edexcel Internati...
Chemical Tests; flame test, positive and negative ions test Edexcel Internati...Chemical Tests; flame test, positive and negative ions test Edexcel Internati...
Chemical Tests; flame test, positive and negative ions test Edexcel Internati...
ssuser79fe74
 
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdfPests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
PirithiRaju
 
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 bAsymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Sérgio Sacani
 
Presentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptxPresentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptx
gindu3009
 
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdfPests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
PirithiRaju
 

Recently uploaded (20)

FAIRSpectra - Enabling the FAIRification of Spectroscopy and Spectrometry
FAIRSpectra - Enabling the FAIRification of Spectroscopy and SpectrometryFAIRSpectra - Enabling the FAIRification of Spectroscopy and Spectrometry
FAIRSpectra - Enabling the FAIRification of Spectroscopy and Spectrometry
 
Botany 4th semester file By Sumit Kumar yadav.pdf
Botany 4th semester file By Sumit Kumar yadav.pdfBotany 4th semester file By Sumit Kumar yadav.pdf
Botany 4th semester file By Sumit Kumar yadav.pdf
 
Bacterial Identification and Classifications
Bacterial Identification and ClassificationsBacterial Identification and Classifications
Bacterial Identification and Classifications
 
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 60009654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
 
Factory Acceptance Test( FAT).pptx .
Factory Acceptance Test( FAT).pptx       .Factory Acceptance Test( FAT).pptx       .
Factory Acceptance Test( FAT).pptx .
 
Connaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verified
Connaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verifiedConnaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verified
Connaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verified
 
SCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptx
SCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptxSCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptx
SCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptx
 
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRL
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRLKochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRL
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRL
 
GBSN - Microbiology (Unit 1)
GBSN - Microbiology (Unit 1)GBSN - Microbiology (Unit 1)
GBSN - Microbiology (Unit 1)
 
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
 
Chemical Tests; flame test, positive and negative ions test Edexcel Internati...
Chemical Tests; flame test, positive and negative ions test Edexcel Internati...Chemical Tests; flame test, positive and negative ions test Edexcel Internati...
Chemical Tests; flame test, positive and negative ions test Edexcel Internati...
 
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdfPests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
 
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 bAsymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
 
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...
 
Presentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptxPresentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptx
 
Proteomics: types, protein profiling steps etc.
Proteomics: types, protein profiling steps etc.Proteomics: types, protein profiling steps etc.
Proteomics: types, protein profiling steps etc.
 
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdfPests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
 
Pulmonary drug delivery system M.pharm -2nd sem P'ceutics
Pulmonary drug delivery system M.pharm -2nd sem P'ceuticsPulmonary drug delivery system M.pharm -2nd sem P'ceutics
Pulmonary drug delivery system M.pharm -2nd sem P'ceutics
 
High Profile 🔝 8250077686 📞 Call Girls Service in GTB Nagar🍑
High Profile 🔝 8250077686 📞 Call Girls Service in GTB Nagar🍑High Profile 🔝 8250077686 📞 Call Girls Service in GTB Nagar🍑
High Profile 🔝 8250077686 📞 Call Girls Service in GTB Nagar🍑
 
GBSN - Microbiology (Unit 3)
GBSN - Microbiology (Unit 3)GBSN - Microbiology (Unit 3)
GBSN - Microbiology (Unit 3)
 

Information and data security block cipher operation

  • 1. Chapter 6 Block Cipher Operation Lucture slides By Muntaha Cryptography and Network Security
  • 2. Multiple encryption is a technique in which an encryption algorithm is used multiple times. In the first instance, plaintext is converted to ciphertext using the encryption algorithm. This ciphertext is then used as input and the algorithm is applied again. This process may be repeated through any number of stages.
  • 3. Multiple Encryption & DES • clear a replacement for DES was needed –attacks can break it –demonstrated exhaustive key search attacks • AES is a new cipher alternative • prior to this alternative was to use multiple encryption with DES implementations • Triple-DES is the chosen form
  • 4. Double-DES •could use 2 DES encrypts on each block Encryption X=E(K1,P) C=E(K2,X) C=E(K2,E(K1,P)) ------------------------ Decreption X=D(K2,C) P=D(K1,X) P=D(K1,D(K2,C))
  • 5. Why not Double-DES?  could use 2 DES encrypts on each block  C = EK2(EK1(P))  “meet-in-the-middle” attack  works whenever use a cipher twice  since X = EK1(P) = DK2(C)  attack by encrypting P with all keys and store  then decrypt C with keys and match X value  can show takes O(256) steps  Requires…know plaintext,
  • 6. Triple-DES with Two-Keys hence must use 3 encryptions would seem to need 3 distinct keys but can use 2 keys with E-D-E sequence standardized in ANSI no current known practical attacks several proposed impractical attacks might become basis of future attacks
  • 8. Triple-DES with Three-Keys although are no practical attacks on two-key Triple- DES have some indications can use Triple-DES with Three-Keys to avoid even these C = EK3(DK2(EK1(P))) has been adopted by some Internet applications, e.g., PGP, S/MIME
  • 9. Modes of Operation A mode of operation is a technique for enhancing the effect of a cryptographic algorithm or adapting the algorithm for an application , such as applying a block cipher to a sequence of data blocks or a data stream. block ciphers encrypt fixed size blocks DES encrypts 64-bit blocks NIST defines 5 modes have block and stream modes to cover a wide variety of applications can be used with any block cipher
  • 10. 1. Electronic Codebook Mode (ECB) 2. Cipher Block Chaining Mode (CBC) 3. Cipher Feedback Mode (CFB) 4. Output Feedback Mode (OFB) 5. CTR Modes of Operation
  • 11. Electronic Codebook Book (ECB)  message is broken into independent blocks that are encrypted  each block is a value which is substituted  Each block of 64 plaintext bits is encoded independently using the same key.  uses: secure transmission of single values
  • 13. Advantages and Limitations of ECB • weakness is due to the encrypted message blocks being independent • main use is sending a few blocks of data • For lengthy messages, the ECB mode may not be secure • the same -bit block of plaintext appears more than once in the message, it always produces the same ciphertext.
  • 14. Cipher Block Chaining (CBC) • message is broken into blocks • Block linked together in encryption operation • The same key is used for each block • each previous cipher blocks is chained with current plaintext block. • To produce the first block of ciphertext, an initialization vector (IV) is XOR with the first block of plaintext. • uses: bulk data encryption, authentication
  • 16. Advantages and Limitations of CBC a ciphertext block depends on all blocks before it  any change to a block affects all following ciphertext blocks... avalanche effect  because of the chaining mechanism of CBC, it is an appropriate mode for encrypting messages of length greater than N bits. need Initialization Vector (IV)  which must be known to sender & receiver  hence IV must either be a fixed value  or derived in way hard to manipulate
  • 17. Cipher FeedBack (CFB)  message is treated as a stream of bits  Use Initial Vector to start process  Encrypt previous ciphertext , then combined with the plaintext block using X- OR to produce the current ciphertext  added to the output of the block cipher  result is feed back for next stage  standard allows any number of bits (1,8, 64 or 128 etc) to be feed back  most efficient to use all bits in block (64 or 128)  uses: stream data encryption, authentication Encryption C1 = P1 XOR MSBs[E(K, IV)] decryption p1=c1 XOR MSBs[E(K, IV)]
  • 19. Advantages and Limitations of CFB  note that the block cipher is used in encryption mode at both ends (XOR)  Use Initial Vector to start process  Encrypt previous ciphertext , then combined with the plaintext block using X-OR to produce the current ciphertext.  A ciphertext segment depends on the current and all preceding plaintext segments.
  • 20. Output FeedBack (OFB)  Very similar to CFB  message is treated as a stream of bits  output of cipher is added to message  feedback is independent of message  uses: stream encryption on noisy channels Encryption Cj = Pj XOR E(K, [Cj-1 XOR Pj-1]) Decreption Pj = Cj XOR E(K, [Cj-1 XOR Pj-1])
  • 22. Advantages and Limitations of OFB  needs an IV which is unique for each use  Feedback is independent of message  Each bit in the ciphertext is independent of the previous bit or bits. This avoids error propagation  only use with full block feedback ◦ subsequent research has shown that only full block feedback (ie CFB-64 or CFB-128) should ever be used
  • 23. Counter (CTR) a “new” mode similar to OFB but encrypts counter value rather than any feedback value must have a different key & counter value for every plaintext block (never reused) uses: high-speed network encryptions
  • 25. Advantages and Limitations of CTR efficiency o can do parallel encryptions in h/w or s/w o good for bursty high speed links random access to encrypted data blocks provable security (good as other modes) but must ensure never reuse key/counter values.
  • 26. summary Multiple Encryption Multiple Encryption & Triple-DES Modes of Operation  ECB, CBC, CFB, OFB, CTR, XTS-AES