SlideShare a Scribd company logo
2
Most read
3
Most read
4
Most read
Prof Shabbir
CONFUSION AND
DIFFUSION
ENCRYPTION TECHNIQUES
 According to the famous information theorist Claude Shannon,
there are two primitive operations with which strong
encryption algorithms can be built:
 confusion and diffusion
 confusion and diffusion are two properties of the operation of
a secure cipher identified in 1945 classified report A
Mathematical Theory of Cryptography.
 These properties, when present, work to thwart the
application of statistics and other methods of cryptanalysis.
 These concepts are also important in the design of robust
hash functions and pseudorandom number generators where
decorrelation of the generated values is of paramount
importance.
CONFUSION AND DIFFUSION
 Confusion is an encryption operation where the relationship
between key and ciphertext is obscured.
 Today, a common element for achieving confusion is
substitution, which is found in both DES and AES.
 Confusion means that each binary digit (bit) of the ciphertext
should depend on several parts of the key, obscuring the
connections between the two.
 The property of confusion hides the relationship between the
ciphertext and the key.
 This property makes it difficult to find the key from the
ciphertext and
 if a single bit in a key is changed, the calculation of the values
of most or all of the bits in the ciphertext will be affected.
 Confusion increases the ambiguity of ciphertext and it is used by
both block and stream ciphers.
CONFUSION
 Diffusion is an encryption operation where the influence of one
plaintext symbol is spread over many ciphertext symbols with the
goal of hiding statistical properties of the plaintext.
 A simple diffusion element is the bit permutation, which is used
frequently within DES.
 AES uses the more advanced Mix-column operation.
 Ciphers which only perform confusion, such as the Shift Cipher
or the World War II encryption machine Enigma, are not secure.
 Neither are ciphers which only perform diffusion.
 However, through the concatenation of such operations, a strong
cipher can be built.
 The idea of concatenating several encryption operation was also
proposed by Shannon.
 Such ciphers are known as product ciphers. Or we can simplify
the concept and say:
DIFFUSION
 Diffusion means that if we change a single bit of the
plaintext, then (statistically) half of the bits in the ciphertext
should change, and similarly, if we change one bit of the
ciphertext, then approximately one half of the plaintext bits
should change.
 Since a bit can have only two states, when they are all re-
evaluated and changed from one seemingly random position
to another, half of the bits will have changed state.
 The idea of diffusion is to hide the relationship between the
ciphertext and the plain text. This will make it hard for an
attacker who tries to find out the plain text and it increases
the redundancy of plain text by spreading it across the rows
and columns;
 it is achieved through transposition of algorithm and it is used
by block ciphers only.
 All of today’s block ciphers are product ciphers as they
consist of rounds which are applied repeatedly to the data
Principle of an N round product cipher, where each round performs a confusion and diffusion
operation
 Modern block ciphers possess excellent diffusion properties.
 On a cipher level this means that changing of one bit of
plaintext results on average in the change of half the output
bits, i.e., the second ciphertext looks statistically independent
of the first one.
 This is an important property to keep in mind when dealing
with block ciphers.
 We demonstrate this behavior with the following simple
example.
 Example 1. Let’s assume a small block cipher with a block
length of 8 bits. Encryption of two plaintexts x1 and x2, which
differ only by one bit, should roughly result in something as
shown in Fig.2
EXAMPLE
Fig. 2 Principle of diffusion of a block cipher
Note that modern block ciphers have block lengths of
64 or 128 bit but they show exactly the same behavior
if one input bit is flipped.
S.No. CONFUSION DIFFUSION
1 Confusion is a cryptographic technique
which is used to create faint cipher texts.
While diffusion is used to create cryptic
plain texts.
2 This technique is possible through
substitution algorithm.
While it is possible through
transportation algorithm.
3 In confusion, if one bit within the secret’s
modified, most or all bits within the cipher
text also will be modified.
While in diffusion, if one image within the
plain text is modified, many or all image
within the cipher text also will be
modified
4 In confusion, vagueness is increased in
resultant.
While in diffusion, redundancy is
increased in resultant.
5 Both stream cipher and block cipher uses
confusion.
Only block cipher uses diffusion.
6 The relation between the cipher text and
the key is masked by confusion.
While The relation between the cipher
text and the plain text is masked by
diffusion.
DIFFERENTIATE

More Related Content

PPT
Block Cipher and its Design Principles
PPTX
Classical encryption techniques
PPT
overview of cryptographic techniques
PPTX
Asymmetric Cryptography.pptx
PPTX
Rsa Crptosystem
PPT
Classical Encryption Techniques
PPTX
Cryptography and Information Security
Block Cipher and its Design Principles
Classical encryption techniques
overview of cryptographic techniques
Asymmetric Cryptography.pptx
Rsa Crptosystem
Classical Encryption Techniques
Cryptography and Information Security

What's hot (20)

PDF
2. public key cryptography and RSA
PDF
Transposition cipher
PPT
Symmetric and Asymmetric Encryption.ppt
PPT
Email Security : PGP & SMIME
PPTX
Public Key Cryptography
PDF
Introduction to Cryptography
PPTX
Quantum Cryptography presentation
PPT
Data encryption standard
PDF
Run time storage
PPTX
Cryptography - Block cipher & stream cipher
PPTX
Secure Hash Algorithm
PPTX
PPTX
Secret key cryptography
PPTX
MD5 ALGORITHM.pptx
PPT
Message Authentication Code & HMAC
PDF
symmetric key encryption algorithms
PPTX
Substitution techniques
PDF
18CS2005 Cryptography and Network Security
PDF
Mini Project on Data Encryption & Decryption in JAVA
PPTX
Homomorphic Encryption
2. public key cryptography and RSA
Transposition cipher
Symmetric and Asymmetric Encryption.ppt
Email Security : PGP & SMIME
Public Key Cryptography
Introduction to Cryptography
Quantum Cryptography presentation
Data encryption standard
Run time storage
Cryptography - Block cipher & stream cipher
Secure Hash Algorithm
Secret key cryptography
MD5 ALGORITHM.pptx
Message Authentication Code & HMAC
symmetric key encryption algorithms
Substitution techniques
18CS2005 Cryptography and Network Security
Mini Project on Data Encryption & Decryption in JAVA
Homomorphic Encryption
Ad

Similar to Confusion and Diffusion.pptx (20)

PPTX
Confusion and Diffusion.pptx
PDF
3 Basics of Cryptography Basics of Cryptography
PPTX
Block Cipher Design Principles and its uses
PPTX
CISSP - Chapter 3 - Cryptography
PPTX
Unit 2
PPTX
Block Ciphers and DES.pptx
PPT
Cryptography.ppt
PPTX
RIT701_CGNS_L5.pptx
PDF
CRYPTOGRAPHY AND NETWORK SECURITY
PPTX
Networking Advance Concepts with handson experience
PPT
ICSE6104 Lecture bbbbbbbbbbbbbbbbbbbb 2.ppt
PPT
Iss lecture 2
PPTX
cryptography
PDF
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
PPT
unit 1 kshvxkgsuxhcsliucxhucducudccccckjh,kj,
PPTX
Cyber security
PDF
Block Ciphers and the Data Encryption Standard
PDF
chap3.pdf
PPTX
Block Cipher.cryptography_miu_year5.pptx
PPT
Unit II.ppt.............................
Confusion and Diffusion.pptx
3 Basics of Cryptography Basics of Cryptography
Block Cipher Design Principles and its uses
CISSP - Chapter 3 - Cryptography
Unit 2
Block Ciphers and DES.pptx
Cryptography.ppt
RIT701_CGNS_L5.pptx
CRYPTOGRAPHY AND NETWORK SECURITY
Networking Advance Concepts with handson experience
ICSE6104 Lecture bbbbbbbbbbbbbbbbbbbb 2.ppt
Iss lecture 2
cryptography
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
unit 1 kshvxkgsuxhcsliucxhucducudccccckjh,kj,
Cyber security
Block Ciphers and the Data Encryption Standard
chap3.pdf
Block Cipher.cryptography_miu_year5.pptx
Unit II.ppt.............................
Ad

More from bcanawakadalcollege (20)

PPT
Dsta communications and computer networks
PPTX
PRACTICAL -UNIX, main unix commands in practice
PPTX
Intro to Javascript.pptx
PPTX
computer and software are changing.pptx
PPTX
tIME LINE.pptx
PPT
Basic HTML Tags.PPT
PPT
Cryptography.ppt
PPT
cypher tex.ppt
PPT
17javascript.ppt
PPT
Logic gates and boolean algebra.ppt
PPTX
Cyber_Crime_Security.pptx
PPT
cybercrime_presentation - Copy.ppt
PPTX
Hidden Surface Removal methods.pptx
PPTX
Hidden Surface Removal.pptx
PPT
Lecture6.orig.ppt
DOCX
Bezier Curve in Computer Graphics.docx
PPTX
reliable_unreliable.pptx
PDF
2D-transformation-1.pdf
PPTX
computer graphics unit 1-I.pptx
PDF
Dsta communications and computer networks
PRACTICAL -UNIX, main unix commands in practice
Intro to Javascript.pptx
computer and software are changing.pptx
tIME LINE.pptx
Basic HTML Tags.PPT
Cryptography.ppt
cypher tex.ppt
17javascript.ppt
Logic gates and boolean algebra.ppt
Cyber_Crime_Security.pptx
cybercrime_presentation - Copy.ppt
Hidden Surface Removal methods.pptx
Hidden Surface Removal.pptx
Lecture6.orig.ppt
Bezier Curve in Computer Graphics.docx
reliable_unreliable.pptx
2D-transformation-1.pdf
computer graphics unit 1-I.pptx

Recently uploaded (20)

PPTX
Foundation to blockchain - A guide to Blockchain Tech
PDF
Well-logging-methods_new................
PPTX
Construction Project Organization Group 2.pptx
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
bas. eng. economics group 4 presentation 1.pptx
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPTX
Lesson 3_Tessellation.pptx finite Mathematics
PDF
PPT on Performance Review to get promotions
PDF
Digital Logic Computer Design lecture notes
PDF
Arduino robotics embedded978-1-4302-3184-4.pdf
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PDF
Structs to JSON How Go Powers REST APIs.pdf
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
web development for engineering and engineering
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Foundation to blockchain - A guide to Blockchain Tech
Well-logging-methods_new................
Construction Project Organization Group 2.pptx
Model Code of Practice - Construction Work - 21102022 .pdf
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
bas. eng. economics group 4 presentation 1.pptx
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Lesson 3_Tessellation.pptx finite Mathematics
PPT on Performance Review to get promotions
Digital Logic Computer Design lecture notes
Arduino robotics embedded978-1-4302-3184-4.pdf
Embodied AI: Ushering in the Next Era of Intelligent Systems
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Structs to JSON How Go Powers REST APIs.pdf
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
web development for engineering and engineering
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026

Confusion and Diffusion.pptx

  • 2.  According to the famous information theorist Claude Shannon, there are two primitive operations with which strong encryption algorithms can be built:  confusion and diffusion  confusion and diffusion are two properties of the operation of a secure cipher identified in 1945 classified report A Mathematical Theory of Cryptography.  These properties, when present, work to thwart the application of statistics and other methods of cryptanalysis.  These concepts are also important in the design of robust hash functions and pseudorandom number generators where decorrelation of the generated values is of paramount importance. CONFUSION AND DIFFUSION
  • 3.  Confusion is an encryption operation where the relationship between key and ciphertext is obscured.  Today, a common element for achieving confusion is substitution, which is found in both DES and AES.  Confusion means that each binary digit (bit) of the ciphertext should depend on several parts of the key, obscuring the connections between the two.  The property of confusion hides the relationship between the ciphertext and the key.  This property makes it difficult to find the key from the ciphertext and  if a single bit in a key is changed, the calculation of the values of most or all of the bits in the ciphertext will be affected.  Confusion increases the ambiguity of ciphertext and it is used by both block and stream ciphers. CONFUSION
  • 4.  Diffusion is an encryption operation where the influence of one plaintext symbol is spread over many ciphertext symbols with the goal of hiding statistical properties of the plaintext.  A simple diffusion element is the bit permutation, which is used frequently within DES.  AES uses the more advanced Mix-column operation.  Ciphers which only perform confusion, such as the Shift Cipher or the World War II encryption machine Enigma, are not secure.  Neither are ciphers which only perform diffusion.  However, through the concatenation of such operations, a strong cipher can be built.  The idea of concatenating several encryption operation was also proposed by Shannon.  Such ciphers are known as product ciphers. Or we can simplify the concept and say: DIFFUSION
  • 5.  Diffusion means that if we change a single bit of the plaintext, then (statistically) half of the bits in the ciphertext should change, and similarly, if we change one bit of the ciphertext, then approximately one half of the plaintext bits should change.  Since a bit can have only two states, when they are all re- evaluated and changed from one seemingly random position to another, half of the bits will have changed state.  The idea of diffusion is to hide the relationship between the ciphertext and the plain text. This will make it hard for an attacker who tries to find out the plain text and it increases the redundancy of plain text by spreading it across the rows and columns;  it is achieved through transposition of algorithm and it is used by block ciphers only.
  • 6.  All of today’s block ciphers are product ciphers as they consist of rounds which are applied repeatedly to the data Principle of an N round product cipher, where each round performs a confusion and diffusion operation
  • 7.  Modern block ciphers possess excellent diffusion properties.  On a cipher level this means that changing of one bit of plaintext results on average in the change of half the output bits, i.e., the second ciphertext looks statistically independent of the first one.  This is an important property to keep in mind when dealing with block ciphers.  We demonstrate this behavior with the following simple example.
  • 8.  Example 1. Let’s assume a small block cipher with a block length of 8 bits. Encryption of two plaintexts x1 and x2, which differ only by one bit, should roughly result in something as shown in Fig.2 EXAMPLE Fig. 2 Principle of diffusion of a block cipher Note that modern block ciphers have block lengths of 64 or 128 bit but they show exactly the same behavior if one input bit is flipped.
  • 9. S.No. CONFUSION DIFFUSION 1 Confusion is a cryptographic technique which is used to create faint cipher texts. While diffusion is used to create cryptic plain texts. 2 This technique is possible through substitution algorithm. While it is possible through transportation algorithm. 3 In confusion, if one bit within the secret’s modified, most or all bits within the cipher text also will be modified. While in diffusion, if one image within the plain text is modified, many or all image within the cipher text also will be modified 4 In confusion, vagueness is increased in resultant. While in diffusion, redundancy is increased in resultant. 5 Both stream cipher and block cipher uses confusion. Only block cipher uses diffusion. 6 The relation between the cipher text and the key is masked by confusion. While The relation between the cipher text and the plain text is masked by diffusion. DIFFERENTIATE