SlideShare a Scribd company logo
Information and Network Security:18
Modern Techniques: Block Ciphers
Prof Neeraj Bhargava
Vaibhav Khanna
Department of Computer Science
School of Engineering and Systems Sciences
Maharshi Dayanand Saraswati University Ajmer
Block Ciphers and the Data Encryption Standard
All the afternoon Mungo had been working on Stern's
code, principally with the aid of the latest messages
which he had copied down at the Nevin Square drop.
Stern was very confident. He must be well aware
London Central knew about that drop. It was obvious
that they didn't care how often Mungo read their
messages, so confident were they in the
impenetrability of the code.
—Talking to Strange Men, Ruth Rendell
Modern Block Ciphers
now look at modern block ciphers
one of the most widely used types of cryptographic algorithms
provide secrecy /authentication services
focus on DES (Data Encryption Standard)
to illustrate block cipher design principles
Modern Block Ciphers
• This ppt set discusses the principles of modern symmetric ciphers.
• For this purpose, we focus on the most widely used symmetric cipher:
the Data Encryption Standard (DES).
• Although numerous symmetric ciphers have been developed since
the introduction of DES, and although it is destined to be replaced by
the Advanced Encryption Standard (AES), DES remains the most
important such algorithm.
• Further, a detailed study of DES provides an understanding of the
principles used in other symmetric ciphers.
Block vs Stream Ciphers
• Block ciphers work a on block / word at a time, which is some number of
bits.
• All of these bits have to be available before the block can be processed.
• block ciphers process messages in blocks, each of which is then
en/decrypted like a substitution on very big characters
• 64-bits or more
• stream ciphers process messages a bit or byte at a time when
en/decrypting
• many current ciphers are block ciphers
• better analysed
• broader range of applications
Block vs Stream Ciphers
• A block cipher is one in which a block of plaintext is treated as a
whole and used to produce a ciphertext block of equal length.
• Typically, a block size of 64 or 128 bits is used.
• As with a stream cipher, the two users share a symmetric encryption
key (Figure 3.1b).
• A stream cipher is one that encrypts a digital data stream one bit or
one byte at a time.
• In the ideal case, a one-time pad version of the Vernam cipher would
be used (Figure 2.7), in which the keystream (k ) is as long as the
plaintext bit stream (p).
Block Cipher Principles
• most symmetric block ciphers are based on a Feistel Cipher Structure
• needed since must be able to decrypt ciphertext to recover messages
efficiently
• block ciphers look like an extremely large substitution
• would need table of 264 entries for a 64-bit block
• instead create from smaller building blocks
• using idea of a product cipher
• Most symmetric block encryption algorithms in current use are based on a
structure referred to as a Feistel block cipher.
• A block cipher operates on a plaintext block of n bits to produce a
ciphertext block of n bits.
• An arbitrary reversible substitution cipher for a large block size is not
practical, however, from an implementation and performance point of
view. In general, for an n-bit general substitution block cipher, the size of
the key is n x 2n.
• For a 64-bit block, which is a desirable length to thwart statistical attacks,
the key size is 64x 264 = 270 = 1021 bits.
• In considering these difficulties, Feistel points out that what is needed is an
approximation to the ideal block cipher system for large n, built up out of
components that are easily realizable.
Ideal Block Cipher
• Feistel refers to an n-bit general substitution as an ideal block cipher,
because it allows for the maximum number of possible encryption
mappings from the plaintext to ciphertext block.
• A 4-bit input produces one of 16 possible input states, which is
mapped by the substitution cipher into a unique one of 16 possible
output states, each of which is represented by 4 ciphertext bits.
• The encryption and decryption mappings can be defined by a
tabulation, as shown in Stallings Figure 3.2. It illustrates a tiny 4-bit
substitution to show that each possible input can be arbitrarily
mapped to any output - which is why its complexity grows so rapidly.
Assignment
• What do you understand by block cipher. Discuss the Block Cipher
Principals.

More Related Content

PPT
Chapter8 27 nov_2010
PPTX
CS8792 - Cryptography and Network Security
PPTX
Introduction to encryption
PDF
A Tutorial on Linear and Differential Cryptanalysis by Howard M. Heys
PPT
block ciphers
PPTX
Overview on Cryptography and Network Security
PPTX
Information and data security block cipher and the data encryption standard (...
PPTX
Chapter8 27 nov_2010
CS8792 - Cryptography and Network Security
Introduction to encryption
A Tutorial on Linear and Differential Cryptanalysis by Howard M. Heys
block ciphers
Overview on Cryptography and Network Security
Information and data security block cipher and the data encryption standard (...

What's hot (20)

PPT
Chapter 3: Block Ciphers and the Data Encryption Standard
PPTX
RC 4
PPTX
Cryptographic Algorithms: DES and RSA
PPTX
Data Encryption Standard (DES)
PPT
Cryptography and Network Security
PDF
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
PPTX
Cryptography
PPT
DES (Data Encryption Standard) pressentation
PPT
Design and Simulation Triple-DES
PPTX
Network security Encryption
PPT
Cryptography and Network Security William Stallings Lawrie Brown
PPT
PDF
Triple Data Encryption Standard (t-DES)
PPTX
ASIC Implementation of Triple Data Encryption Algorithm (3DES)
PPTX
Seminar on Encryption and Authenticity
PPTX
A study of cryptography for satellite applications
PPT
Ch03 block-cipher-and-data-encryption-standard
PPTX
PPTX
Different types of Symmetric key Cryptography
Chapter 3: Block Ciphers and the Data Encryption Standard
RC 4
Cryptographic Algorithms: DES and RSA
Data Encryption Standard (DES)
Cryptography and Network Security
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Cryptography
DES (Data Encryption Standard) pressentation
Design and Simulation Triple-DES
Network security Encryption
Cryptography and Network Security William Stallings Lawrie Brown
Triple Data Encryption Standard (t-DES)
ASIC Implementation of Triple Data Encryption Algorithm (3DES)
Seminar on Encryption and Authenticity
A study of cryptography for satellite applications
Ch03 block-cipher-and-data-encryption-standard
Different types of Symmetric key Cryptography
Ad

Similar to Information and network security 18 modern techniques block ciphers (20)

PPT
Block Cipher Stream Cipher DESUnit 3.ppt
PPTX
Ch02 NetSec5e Network Security Essential Chapter 2.pptx
PPTX
Encryption algorithms
PDF
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
PPT
PPTX
block cipher and its principle and charateristics.pptx
PPT
Block Ciphers Modes of Operation
PPT
ch03.pptvxcvxcvxcvxcvxcvxcvcxvdsgedgeeee
PPTX
PPTX
Fundamentals of Information Encryption
PPTX
Unit -1 cryptography contiues with algorithm.pptx
PPT
DES-lecture (1).ppt
PPT
Encryption
PDF
Unit 1_Transposition Techniques_Ciphers.pdf
PPTX
Unit 2
PPTX
Ppt fnr arbitrary length small domain block cipher proposal
PPTX
CISSP Certification Security Engineering-Part2
PPTX
Block Cipher Modes Of Operation | Computer Networking and Security | Simplilearn
PPTX
Cryptography and Network security # Lecture 4
PPTX
Cryptography Introduction
Block Cipher Stream Cipher DESUnit 3.ppt
Ch02 NetSec5e Network Security Essential Chapter 2.pptx
Encryption algorithms
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
block cipher and its principle and charateristics.pptx
Block Ciphers Modes of Operation
ch03.pptvxcvxcvxcvxcvxcvxcvcxvdsgedgeeee
Fundamentals of Information Encryption
Unit -1 cryptography contiues with algorithm.pptx
DES-lecture (1).ppt
Encryption
Unit 1_Transposition Techniques_Ciphers.pdf
Unit 2
Ppt fnr arbitrary length small domain block cipher proposal
CISSP Certification Security Engineering-Part2
Block Cipher Modes Of Operation | Computer Networking and Security | Simplilearn
Cryptography and Network security # Lecture 4
Cryptography Introduction
Ad

More from Vaibhav Khanna (20)

PPTX
Information and network security 47 authentication applications
PPTX
Information and network security 46 digital signature algorithm
PPTX
Information and network security 45 digital signature standard
PPTX
Information and network security 44 direct digital signatures
PPTX
Information and network security 43 digital signatures
PPTX
Information and network security 42 security of message authentication code
PPTX
Information and network security 41 message authentication code
PPTX
Information and network security 40 sha3 secure hash algorithm
PPTX
Information and network security 39 secure hash algorithm
PPTX
Information and network security 38 birthday attacks and security of hash fun...
PPTX
Information and network security 37 hash functions and message authentication
PPTX
Information and network security 35 the chinese remainder theorem
PPTX
Information and network security 34 primality
PPTX
Information and network security 33 rsa algorithm
PPTX
Information and network security 32 principles of public key cryptosystems
PPTX
Information and network security 31 public key cryptography
PPTX
Information and network security 30 random numbers
PPTX
Information and network security 29 international data encryption algorithm
PPTX
Information and network security 28 blowfish
PPTX
Information and network security 27 triple des
Information and network security 47 authentication applications
Information and network security 46 digital signature algorithm
Information and network security 45 digital signature standard
Information and network security 44 direct digital signatures
Information and network security 43 digital signatures
Information and network security 42 security of message authentication code
Information and network security 41 message authentication code
Information and network security 40 sha3 secure hash algorithm
Information and network security 39 secure hash algorithm
Information and network security 38 birthday attacks and security of hash fun...
Information and network security 37 hash functions and message authentication
Information and network security 35 the chinese remainder theorem
Information and network security 34 primality
Information and network security 33 rsa algorithm
Information and network security 32 principles of public key cryptosystems
Information and network security 31 public key cryptography
Information and network security 30 random numbers
Information and network security 29 international data encryption algorithm
Information and network security 28 blowfish
Information and network security 27 triple des

Recently uploaded (20)

PDF
medical staffing services at VALiNTRY
PDF
2025 Textile ERP Trends: SAP, Odoo & Oracle
PDF
Digital Strategies for Manufacturing Companies
PPTX
history of c programming in notes for students .pptx
PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
PDF
Understanding Forklifts - TECH EHS Solution
PDF
Upgrade and Innovation Strategies for SAP ERP Customers
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PPTX
Introduction to Artificial Intelligence
PPTX
Transform Your Business with a Software ERP System
PDF
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
PDF
Which alternative to Crystal Reports is best for small or large businesses.pdf
PDF
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
PDF
System and Network Administration Chapter 2
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
PDF
Nekopoi APK 2025 free lastest update
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PDF
AI in Product Development-omnex systems
PDF
How Creative Agencies Leverage Project Management Software.pdf
PPTX
Essential Infomation Tech presentation.pptx
medical staffing services at VALiNTRY
2025 Textile ERP Trends: SAP, Odoo & Oracle
Digital Strategies for Manufacturing Companies
history of c programming in notes for students .pptx
VVF-Customer-Presentation2025-Ver1.9.pptx
Understanding Forklifts - TECH EHS Solution
Upgrade and Innovation Strategies for SAP ERP Customers
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
Introduction to Artificial Intelligence
Transform Your Business with a Software ERP System
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
Which alternative to Crystal Reports is best for small or large businesses.pdf
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
System and Network Administration Chapter 2
Internet Downloader Manager (IDM) Crack 6.42 Build 41
Nekopoi APK 2025 free lastest update
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
AI in Product Development-omnex systems
How Creative Agencies Leverage Project Management Software.pdf
Essential Infomation Tech presentation.pptx

Information and network security 18 modern techniques block ciphers

  • 1. Information and Network Security:18 Modern Techniques: Block Ciphers Prof Neeraj Bhargava Vaibhav Khanna Department of Computer Science School of Engineering and Systems Sciences Maharshi Dayanand Saraswati University Ajmer
  • 2. Block Ciphers and the Data Encryption Standard All the afternoon Mungo had been working on Stern's code, principally with the aid of the latest messages which he had copied down at the Nevin Square drop. Stern was very confident. He must be well aware London Central knew about that drop. It was obvious that they didn't care how often Mungo read their messages, so confident were they in the impenetrability of the code. —Talking to Strange Men, Ruth Rendell
  • 3. Modern Block Ciphers now look at modern block ciphers one of the most widely used types of cryptographic algorithms provide secrecy /authentication services focus on DES (Data Encryption Standard) to illustrate block cipher design principles
  • 4. Modern Block Ciphers • This ppt set discusses the principles of modern symmetric ciphers. • For this purpose, we focus on the most widely used symmetric cipher: the Data Encryption Standard (DES). • Although numerous symmetric ciphers have been developed since the introduction of DES, and although it is destined to be replaced by the Advanced Encryption Standard (AES), DES remains the most important such algorithm. • Further, a detailed study of DES provides an understanding of the principles used in other symmetric ciphers.
  • 5. Block vs Stream Ciphers • Block ciphers work a on block / word at a time, which is some number of bits. • All of these bits have to be available before the block can be processed. • block ciphers process messages in blocks, each of which is then en/decrypted like a substitution on very big characters • 64-bits or more • stream ciphers process messages a bit or byte at a time when en/decrypting • many current ciphers are block ciphers • better analysed • broader range of applications
  • 6. Block vs Stream Ciphers
  • 7. • A block cipher is one in which a block of plaintext is treated as a whole and used to produce a ciphertext block of equal length. • Typically, a block size of 64 or 128 bits is used. • As with a stream cipher, the two users share a symmetric encryption key (Figure 3.1b). • A stream cipher is one that encrypts a digital data stream one bit or one byte at a time. • In the ideal case, a one-time pad version of the Vernam cipher would be used (Figure 2.7), in which the keystream (k ) is as long as the plaintext bit stream (p).
  • 8. Block Cipher Principles • most symmetric block ciphers are based on a Feistel Cipher Structure • needed since must be able to decrypt ciphertext to recover messages efficiently • block ciphers look like an extremely large substitution • would need table of 264 entries for a 64-bit block • instead create from smaller building blocks • using idea of a product cipher
  • 9. • Most symmetric block encryption algorithms in current use are based on a structure referred to as a Feistel block cipher. • A block cipher operates on a plaintext block of n bits to produce a ciphertext block of n bits. • An arbitrary reversible substitution cipher for a large block size is not practical, however, from an implementation and performance point of view. In general, for an n-bit general substitution block cipher, the size of the key is n x 2n. • For a 64-bit block, which is a desirable length to thwart statistical attacks, the key size is 64x 264 = 270 = 1021 bits. • In considering these difficulties, Feistel points out that what is needed is an approximation to the ideal block cipher system for large n, built up out of components that are easily realizable.
  • 11. • Feistel refers to an n-bit general substitution as an ideal block cipher, because it allows for the maximum number of possible encryption mappings from the plaintext to ciphertext block. • A 4-bit input produces one of 16 possible input states, which is mapped by the substitution cipher into a unique one of 16 possible output states, each of which is represented by 4 ciphertext bits. • The encryption and decryption mappings can be defined by a tabulation, as shown in Stallings Figure 3.2. It illustrates a tiny 4-bit substitution to show that each possible input can be arbitrarily mapped to any output - which is why its complexity grows so rapidly.
  • 12. Assignment • What do you understand by block cipher. Discuss the Block Cipher Principals.