Unit 2 Part 4
Unit 2 Part 4
Permutation(Rearranging) ONKEYM
Diffusion Vs Confusion ( To prevent
cryptanalysis)
● In diffusion, the statistical structure of the plaintext is dissipated into
long-range statistics of the ciphertext.
● This is achieved by having each plaintext digit affect the value of many
ciphertext digits; generally, this is equivalent to having each ciphertext digit be
affected by many plaintext digits.
1 1 1 1 1 0 1 1 0 0 0 0
0 0 0 0 1 1 1 1 1 0 1 1
Avalanche Effect
A timing attack exploits the fact that an encryption or decryption algorithm often
takes slightly different amounts of time on different inputs.
Block Cipher Design Principles
● With any Feistel block cipher, the key is used to generate one subkey for each
round. In general, we would like to select subkeys to maximize the difficulty of
deducing individual subkeys and the difficulty of working
● at minimum, the key schedule should guarantee key/ciphertext Strict
Avalanche Criterion and Bit Independence Criterion.