4
Most read
6
Most read
8
Most read
WELCOME TO MY
PRESENTATION
PRESENTATION ON
FEISTEL ENCRYPTION AND DECRYPTIPON
Presented By :-
Md.Kawsar Ahmed
Dept. of ICE,PUST
CONTENT
Feistel Cipher Structure
Diagram of Feistel Network
Design Features of Feistel Network
The Function
FEISTEL CIPHER STRUCTURE
Horst Feistel devised the feistel cipher
based on concept of invertible product cipher
Partitions input block into two halves
process through multiple rounds which
perform a substitution on left data half
based on round function of right half & sub key
then have permutation swapping halves
Implements Shannon’s substitution-permutation network concept
FEISTEL CIPHER STRUCTURE
All rounds have the same structure
A substitution is performed on the left half of the data. This is
done by applying a round function to the right half of the data
followed by the XOR of the output of that function and the left
half of the data.
DIAGRAM OF FEISTEL NETWORK
FIGURE-01: FEISTEL ENCRYPTION PROCESS
DIAGRAM OF FEISTEL ENCRYPTION AND DECRYPTION
FIGURE-02: FEISTEL ENCRYPTION AND DECRYPTION
DESIGN FEATURES OF FEISTEL NETWORK
Block Size: Increasing size improves security but slow cipher.
Key Size: Increasing size improves security, makes exhaustive key
searching harder but may slow cipher.
Number of Rounds: Increasing number improves security but slow cipher.
Sub-key Generation: Greater complexity can make analysis harder but
slow cipher.
Round function: Greater complexity can make analysis harder but slow
cipher.
Decryption: Use the same algorithm with reversed keys.
THE FUNCTION
Let L and R be the left most 4 bits and rightmost 4 bits of the 8 bits input
f(L, R)=(LF(R,SK),R)
Where SK is a sub key and the  is bit-by-bit XOR function.
Ex: if the plaintext is (10111101) and F(1101,SK)=(1110) for some SK then
f(10111101)=(1011) (1110)=(0101)
THANK YOU VERY MUCH

More Related Content

PPTX
Disaster Risk Reduction and Management
PPTX
Substitution techniques
PDF
CS6010 Social Network Analysis Unit I
PPTX
Gamification in Education
PPTX
Cryptology
PDF
An introduction to X.509 certificates
PDF
Network security - OSI Security Architecture
PPTX
Principles of public key cryptography and its Uses
Disaster Risk Reduction and Management
Substitution techniques
CS6010 Social Network Analysis Unit I
Gamification in Education
Cryptology
An introduction to X.509 certificates
Network security - OSI Security Architecture
Principles of public key cryptography and its Uses

What's hot (20)

PDF
symmetric key encryption algorithms
PPT
block ciphers
PDF
RSA ALGORITHM
PPT
Cryptography
PPTX
Confusion and Diffusion.pptx
PPTX
Blow fish final ppt
PPTX
Hash function
PDF
Block Ciphers and the Data Encryption Standard
PPTX
Double DES & Triple DES
PDF
Authentication techniques
PDF
AES-Advanced Encryption Standard
PPTX
Idea(international data encryption algorithm)
PPT
Monoalphabetic Substitution Cipher
PPTX
Data Encryption Standard (DES)
PPTX
Symmetric and asymmetric key
PPTX
El Gamal Cryptosystem
PPT
Network security cryptographic hash function
PPTX
Cryptography and Information Security
PPT
Message Authentication Code & HMAC
symmetric key encryption algorithms
block ciphers
RSA ALGORITHM
Cryptography
Confusion and Diffusion.pptx
Blow fish final ppt
Hash function
Block Ciphers and the Data Encryption Standard
Double DES & Triple DES
Authentication techniques
AES-Advanced Encryption Standard
Idea(international data encryption algorithm)
Monoalphabetic Substitution Cipher
Data Encryption Standard (DES)
Symmetric and asymmetric key
El Gamal Cryptosystem
Network security cryptographic hash function
Cryptography and Information Security
Message Authentication Code & HMAC
Ad

Recently uploaded (20)

PDF
20250617 - IR - Global Guide for HR - 51 pages.pdf
PPTX
"Array and Linked List in Data Structures with Types, Operations, Implementat...
PDF
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
PPTX
Software Engineering and software moduleing
PDF
Implantable Drug Delivery System_NDDS_BPHARMACY__SEM VII_PCI .pdf
PPTX
Building constraction Conveyance of water.pptx
PDF
UEFA_Carbon_Footprint_Calculator_Methology_2.0.pdf
PDF
Influence of Green Infrastructure on Residents’ Endorsement of the New Ecolog...
PPTX
Petroleum Refining & Petrochemicals.pptx
PDF
Soil Improvement Techniques Note - Rabbi
PDF
distributed database system" (DDBS) is often used to refer to both the distri...
PPTX
CyberSecurity Mobile and Wireless Devices
PDF
Prof. Dr. KAYIHURA A. SILAS MUNYANEZA, PhD..pdf
PPTX
Chapter 2 -Technology and Enginerring Materials + Composites.pptx
PPTX
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
PDF
Computer System Architecture 3rd Edition-M Morris Mano.pdf
PDF
Applications of Equal_Area_Criterion.pdf
PDF
UEFA_Embodied_Carbon_Emissions_Football_Infrastructure.pdf
PDF
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
PPTX
Management Information system : MIS-e-Business Systems.pptx
20250617 - IR - Global Guide for HR - 51 pages.pdf
"Array and Linked List in Data Structures with Types, Operations, Implementat...
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
Software Engineering and software moduleing
Implantable Drug Delivery System_NDDS_BPHARMACY__SEM VII_PCI .pdf
Building constraction Conveyance of water.pptx
UEFA_Carbon_Footprint_Calculator_Methology_2.0.pdf
Influence of Green Infrastructure on Residents’ Endorsement of the New Ecolog...
Petroleum Refining & Petrochemicals.pptx
Soil Improvement Techniques Note - Rabbi
distributed database system" (DDBS) is often used to refer to both the distri...
CyberSecurity Mobile and Wireless Devices
Prof. Dr. KAYIHURA A. SILAS MUNYANEZA, PhD..pdf
Chapter 2 -Technology and Enginerring Materials + Composites.pptx
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
Computer System Architecture 3rd Edition-M Morris Mano.pdf
Applications of Equal_Area_Criterion.pdf
UEFA_Embodied_Carbon_Emissions_Football_Infrastructure.pdf
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
Management Information system : MIS-e-Business Systems.pptx
Ad

Feistel cipher

  • 2. PRESENTATION ON FEISTEL ENCRYPTION AND DECRYPTIPON Presented By :- Md.Kawsar Ahmed Dept. of ICE,PUST
  • 3. CONTENT Feistel Cipher Structure Diagram of Feistel Network Design Features of Feistel Network The Function
  • 4. FEISTEL CIPHER STRUCTURE Horst Feistel devised the feistel cipher based on concept of invertible product cipher Partitions input block into two halves process through multiple rounds which perform a substitution on left data half based on round function of right half & sub key then have permutation swapping halves Implements Shannon’s substitution-permutation network concept
  • 5. FEISTEL CIPHER STRUCTURE All rounds have the same structure A substitution is performed on the left half of the data. This is done by applying a round function to the right half of the data followed by the XOR of the output of that function and the left half of the data.
  • 6. DIAGRAM OF FEISTEL NETWORK FIGURE-01: FEISTEL ENCRYPTION PROCESS
  • 7. DIAGRAM OF FEISTEL ENCRYPTION AND DECRYPTION FIGURE-02: FEISTEL ENCRYPTION AND DECRYPTION
  • 8. DESIGN FEATURES OF FEISTEL NETWORK Block Size: Increasing size improves security but slow cipher. Key Size: Increasing size improves security, makes exhaustive key searching harder but may slow cipher. Number of Rounds: Increasing number improves security but slow cipher. Sub-key Generation: Greater complexity can make analysis harder but slow cipher. Round function: Greater complexity can make analysis harder but slow cipher. Decryption: Use the same algorithm with reversed keys.
  • 9. THE FUNCTION Let L and R be the left most 4 bits and rightmost 4 bits of the 8 bits input f(L, R)=(LF(R,SK),R) Where SK is a sub key and the  is bit-by-bit XOR function. Ex: if the plaintext is (10111101) and F(1101,SK)=(1110) for some SK then f(10111101)=(1011) (1110)=(0101)