SlideShare a Scribd company logo
Cipher Block Operations:
Fundamentals and Applications in Information Systems Security"
Introduction
Block cipher operation involves encrypting data in fixed-size blocks to produce
ciphertext using a cryptographic key and algorithm. Block ciphers take a fixed
size of input and produce an output of the same size. There are different modes
of operation for block ciphers
Background
Introduction of Block Ciphers:
The concept of block ciphers was introduced to overcome the limitations of early
ciphers. In a block cipher, plaintext is divided into blocks of a fixed size, and each
block is encrypted separately. The first widely used block cipher was the Data
Encryption Standard (DES), developed by IBM in the 1970s.
Background
Advancements in Block Ciphers:
Over time, block ciphers have evolved to become more secure and efficient. DES
was replaced by the Advanced Encryption Standard (AES) in 2001, which uses a
larger block size and key length. Other notable block ciphers include Blowfish,
Twofish, and Serpent.
Types of block cipher mode of operations
Electronic Code Book (ECB),
Cipher Block Chaining (CBC),
Cipher Feedback Mode (CFB),
Output Feedback Mode (OFB),
Counter Mode (CTR).
Electronic Code Book (ECB)
ECB is the simplest mode of operation, where each block of plaintext is encrypted independently.
Encrypts each block independently, leading to repeated ciphertext for repeated plaintext blocks, which is
a security vulnerability.
It has the disadvantage of not hiding patterns in the plaintext, as identical plaintext blocks will result in
identical ciphertext blocks.
Each block of plaintext is encrypted independently using the same key.
Identical plaintext blocks result in identical ciphertext blocks, which can leak information and
patterns.
Encryption and decryption architecture
Encryption of an image in Electronic book code
Cipher Block Chaining (CBC),
In CBC mode, each plaintext block is XORed with the previous ciphertext block before being
encrypted.
This helps to obscure patterns in the plaintext and makes the ciphertext more secure.
Uses an Initialization Vector (IV) and chains the ciphertext of each block to the next, preventing
repeating patterns.
Both encryption and decryption require the IV.
Provides better security than ECB and hides patterns in the plaintext.
Cipher Block Operations Presentation Slide.
Encrypting an image using cipher block chaining
Cipher Feedback Mode (CFB),
CFB mode uses the output of the encryption function to modify the plaintext, creating a
self-synchronizing stream cipher.
It is useful for encrypting data that does not come in fixed-size blocks, such as a serial
data stream.
Convert a block cipher into a stream cipher, encrypting/decrypting bit-streams directly
rather than fixed-size blocks.
Also provide the advantages of parallel processing and pre-computation.
Cipher Feedback Mode (CFB) CONT.
Output Feedback Mode (OFB),
OFB mode generates a keystream independent of the plaintext or
ciphertext, which is then XORed with the plaintext to produce the
ciphertext.
This makes OFB mode resistant to errors in the ciphertext, as a single bit
error will only affect the corresponding bit in the plaintext.
Convert a block cipher into a stream cipher, encrypting/decrypting
bit-streams directly rather than fixed-size blocks.
Also provide the advantages of parallel processing and pre-
computation.
Output Feedback Mode (OFB) CONT.
Counter Mode (CTR).
CTR mode uses a counter value that is incremented for each block, which is then encrypted and XORed
with the plaintext to produce the ciphertext.
CTR mode is parallelizable, meaning that each block can be encrypted independently, which can improve
performance.
Uses an incrementing counter instead of chaining, allowing parallel
encryption/decryption independent of block order.
Provides advantages of parallel processing and pre-computation over chained
modes like CBC.
Counter Mode (CTR) CONT.
Cipher Block Operations Presentation Slide.
Cipher Block Operations Presentation Slide.
Cipher Block Operations Presentation Slide.

More Related Content

PPTX
Block Cipher Modes Of Operation | Computer Networking and Security | Simplilearn
PDF
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
PPT
NIS block cipher modes network and information security
PPTX
Cryptography and Network Security-MOD_3.pptx
PPTX
block ciphermodes of operation.pptx
PPTX
Block cipher modes of operation
PPTX
Modes of Operation
PPTX
Encryption
Block Cipher Modes Of Operation | Computer Networking and Security | Simplilearn
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
NIS block cipher modes network and information security
Cryptography and Network Security-MOD_3.pptx
block ciphermodes of operation.pptx
Block cipher modes of operation
Modes of Operation
Encryption

Similar to Cipher Block Operations Presentation Slide. (20)

PDF
Comparative analysis on different DES model
PDF
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
PPT
modes-of-operation in cryptography. .ppt
PDF
Block cipher modes of operations
PPTX
Information and data security block cipher operation
PPTX
Data Encryption Standard (DES)
PDF
DEC algorithm
PPTX
12_2019_12_03!04_59_50_PM symmetric.pptx
PPTX
Block cipher and stream cipher-1.2.2pptx copy.pptx
PPTX
Lectrue-09,10ModofOperation in information security.pptx
PPTX
block cipher and its principle and charateristics.pptx
PDF
Cryptography for Penetration Testers (PDF version)
PDF
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS
PDF
Block Ciphers Modes of Operation
PPTX
presentation based on data encryption standards
PDF
Block Ciphers and the Data Encryption Standard
PDF
Cryptography and Network Security Principles and Practice 6th Edition William...
PDF
Cryptography and Network Security Principles and Practice 6th Edition William...
PPT
Jaimin chp-8 - network security-new -use this - 2011 batch
PPT
Block Ciphers Modes of Operation
Comparative analysis on different DES model
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
modes-of-operation in cryptography. .ppt
Block cipher modes of operations
Information and data security block cipher operation
Data Encryption Standard (DES)
DEC algorithm
12_2019_12_03!04_59_50_PM symmetric.pptx
Block cipher and stream cipher-1.2.2pptx copy.pptx
Lectrue-09,10ModofOperation in information security.pptx
block cipher and its principle and charateristics.pptx
Cryptography for Penetration Testers (PDF version)
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS
Block Ciphers Modes of Operation
presentation based on data encryption standards
Block Ciphers and the Data Encryption Standard
Cryptography and Network Security Principles and Practice 6th Edition William...
Cryptography and Network Security Principles and Practice 6th Edition William...
Jaimin chp-8 - network security-new -use this - 2011 batch
Block Ciphers Modes of Operation
Ad

Recently uploaded (20)

PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPT
Teaching material agriculture food technology
PDF
Electronic commerce courselecture one. Pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Big Data Technologies - Introduction.pptx
PDF
KodekX | Application Modernization Development
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Teaching material agriculture food technology
Electronic commerce courselecture one. Pdf
Machine learning based COVID-19 study performance prediction
The Rise and Fall of 3GPP – Time for a Sabbatical?
Per capita expenditure prediction using model stacking based on satellite ima...
20250228 LYD VKU AI Blended-Learning.pptx
The AUB Centre for AI in Media Proposal.docx
Encapsulation_ Review paper, used for researhc scholars
sap open course for s4hana steps from ECC to s4
Network Security Unit 5.pdf for BCA BBA.
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Chapter 3 Spatial Domain Image Processing.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Dropbox Q2 2025 Financial Results & Investor Presentation
Big Data Technologies - Introduction.pptx
KodekX | Application Modernization Development
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Mobile App Security Testing_ A Comprehensive Guide.pdf
Ad

Cipher Block Operations Presentation Slide.

  • 1. Cipher Block Operations: Fundamentals and Applications in Information Systems Security"
  • 2. Introduction Block cipher operation involves encrypting data in fixed-size blocks to produce ciphertext using a cryptographic key and algorithm. Block ciphers take a fixed size of input and produce an output of the same size. There are different modes of operation for block ciphers
  • 3. Background Introduction of Block Ciphers: The concept of block ciphers was introduced to overcome the limitations of early ciphers. In a block cipher, plaintext is divided into blocks of a fixed size, and each block is encrypted separately. The first widely used block cipher was the Data Encryption Standard (DES), developed by IBM in the 1970s.
  • 4. Background Advancements in Block Ciphers: Over time, block ciphers have evolved to become more secure and efficient. DES was replaced by the Advanced Encryption Standard (AES) in 2001, which uses a larger block size and key length. Other notable block ciphers include Blowfish, Twofish, and Serpent.
  • 5. Types of block cipher mode of operations Electronic Code Book (ECB), Cipher Block Chaining (CBC), Cipher Feedback Mode (CFB), Output Feedback Mode (OFB), Counter Mode (CTR).
  • 6. Electronic Code Book (ECB) ECB is the simplest mode of operation, where each block of plaintext is encrypted independently. Encrypts each block independently, leading to repeated ciphertext for repeated plaintext blocks, which is a security vulnerability. It has the disadvantage of not hiding patterns in the plaintext, as identical plaintext blocks will result in identical ciphertext blocks. Each block of plaintext is encrypted independently using the same key. Identical plaintext blocks result in identical ciphertext blocks, which can leak information and patterns.
  • 8. Encryption of an image in Electronic book code
  • 9. Cipher Block Chaining (CBC), In CBC mode, each plaintext block is XORed with the previous ciphertext block before being encrypted. This helps to obscure patterns in the plaintext and makes the ciphertext more secure. Uses an Initialization Vector (IV) and chains the ciphertext of each block to the next, preventing repeating patterns. Both encryption and decryption require the IV. Provides better security than ECB and hides patterns in the plaintext.
  • 11. Encrypting an image using cipher block chaining
  • 12. Cipher Feedback Mode (CFB), CFB mode uses the output of the encryption function to modify the plaintext, creating a self-synchronizing stream cipher. It is useful for encrypting data that does not come in fixed-size blocks, such as a serial data stream. Convert a block cipher into a stream cipher, encrypting/decrypting bit-streams directly rather than fixed-size blocks. Also provide the advantages of parallel processing and pre-computation.
  • 13. Cipher Feedback Mode (CFB) CONT.
  • 14. Output Feedback Mode (OFB), OFB mode generates a keystream independent of the plaintext or ciphertext, which is then XORed with the plaintext to produce the ciphertext. This makes OFB mode resistant to errors in the ciphertext, as a single bit error will only affect the corresponding bit in the plaintext. Convert a block cipher into a stream cipher, encrypting/decrypting bit-streams directly rather than fixed-size blocks. Also provide the advantages of parallel processing and pre- computation.
  • 15. Output Feedback Mode (OFB) CONT.
  • 16. Counter Mode (CTR). CTR mode uses a counter value that is incremented for each block, which is then encrypted and XORed with the plaintext to produce the ciphertext. CTR mode is parallelizable, meaning that each block can be encrypted independently, which can improve performance. Uses an incrementing counter instead of chaining, allowing parallel encryption/decryption independent of block order. Provides advantages of parallel processing and pre-computation over chained modes like CBC.