Week14-Block Ciphers
Week14-Block Ciphers
Secret Key
Cryptography
Secret Key Cryptography
• Both encryption and decryption keys are the same and are kept secret
• The secret key must be known at both ends to perform encryption or
decryption (Fig)
• Secret Key algorithms are fast and they are used for
encrypting\decrypting high volume data
• Secret key cryptography is classified into two types
• Block Ciphers
• Stream Ciphers
Transposition Cipher
• Easy to understand, but if properly used,
produces ciphertext that is difficult to
decipher
• Rearranges values within a block to create
ciphertext
• Can be done at the bit level or at the byte
(character) level
• To make the encryption even stronger, the
keys and block sizes can be made much
larger
Principles of Information 3
Security, Fourth Edition
Exclusive OR (XOR)
• Function of Boolean algebra; two bits
are compared
– If two bits are identical, result is binary
0
– If two bits not identical, result is binary
1
• A very simple symmetric cipher that
is used in many applications where
security is not a defined requirement
Principles of Information 4
Security, Fourth Edition
Table 8-3 XOR Truth
Table
Principles of Information 5
Security, Fourth Edition
Vernam Cipher
• Developed at AT&T
• Uses set of characters once per encryption process
• To perform:
– The pad values are added to numeric values that
represent the plaintext that needs to be encrypted
– Each character of the plaintext is turned into a number
and a pad value for that position is added
– The resulting sum for that character is then converted
back to a ciphertext letter for transmission
– If the sum of the two values exceeds 26, then 26 is
subtracted from the total
Principles of Information 6
Security, Fourth Edition
Book or Running Key Cipher
• Uses text in book as key to decrypt a
message
• Ciphertext contains codes representing
page, line, and word numbers
• Algorithm is the mechanical process of:
– Looking up the references from the
ciphertext
– Converting each reference to a word by
using the ciphertext’s value and the key
• Typical sources are dictionaries and
Principles of Information 7
thesauruses
Security, Fourth Edition
Stream Ciphers
Plaintext bits
Key K
• Feistel cipher
– In 1970’s, Horst Feistel (IBM T.J. Watson
Research Labs) invented a suitable (practical)
structure which adapted Shannon’s S-P ⊕
network
– Encryption and decryption use the same
structure
Feistel Cipher Structure
Plaintext (2w bits)
L0 R0
Round 1
w bits w bits
Ideas for each round:
1. partition input block into two halves
Round 2
2. process through multiple rounds
which
perform a substitution on left data half
based on a round function of right
half &
subkey
3. then have permutation swapping
halves Round n
Ln Rn
w bits w bits