0% found this document useful (0 votes)
5 views83 pages

Module 3

The document discusses various encryption techniques, focusing on block ciphers and the Data Encryption Standard (DES). It outlines the processes involved in encryption and decryption, including key transformations, permutations, and substitutions. The text also highlights the importance of initialization vectors and the structure of ciphertext in relation to plaintext.

Uploaded by

RITABRATA DEY
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views83 pages

Module 3

The document discusses various encryption techniques, focusing on block ciphers and the Data Encryption Standard (DES). It outlines the processes involved in encryption and decryption, including key transformations, permutations, and substitutions. The text also highlights the importance of initialization vectors and the structure of ciphertext in relation to plaintext.

Uploaded by

RITABRATA DEY
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 83

operation

cit

des
of
CBC B ......
varied
edR output
in
-
cipher Feedback
cipher Feed Back mode
code
Book
Block Thing -
mode

~ used forblockceram cipher

Straighforwarda
code Book) ->
-

happens
EB
method
electronic
simplest
paredy
>
-
so faster

cryptistat

&
>
-

Plain text

P
block
block b
of if PT
same

↓ ↓ are

cipher
text

Erypt typ
the
, typt
1
key
->
is same

↓ cipher
tex t
>
-
vulnerability
cipher block 3 by

Cipher
Block 1
text
block 2 -
(exploited)

-
-

·iii
C

&
text
a

i
Ciphert

s Plain text
block 2
plait ext

-
-
ebserves of
current step
and cipher
text
input to next stas t
of previous
its value
step

is random
block

vector
denotes
initialization
> IV : ·
text

crandan)
-
-

Encryption proces
-

text
plain
plain block 3
T block 2

E plain tes

i
=
text block 3

cipher
·
=
block 1
>
-
=

step f

reurse/
ecryption (simply cipa
ciphertext
ciphertext 2
block block 3

·
block

↓ ↓
text text
plain plain
block I blok 2

(bech wal arrow reverse)


-for
be
CT will
PT
the opp
chaining a
same
because of the

different

o
mechanism.

#BlipherFedbamodaStre
on block
work
cipher cipn
sending
Teminal size which
smaller-blocks
> CFB where we can
encrypt t
encypt
is
-

size 8
could be of
cipher
.

directly
2
as
stream
>
-

working
in
mind PT - encryption -
algo

enuptim
> keep
-

shift register >


-

I
it ↓ ↓
text
swift
ext
·
left

>
haining
-
happens
text being encrypted
of plain
fit
bits
of
-'j'
>
-
no
cyption
-

·
Freg

· ·
S

I crypt
L

·
not parallel affect next
next- >
bit
>
ext
-

>
- cipher changed

-lette n

e
Fij
bits
>
ecrypt
-
T
PT
-
-

e
Pl


Shiftreg

ke &
cryption
-

Ent
most
bits
%;

Da
·
bits
bit

&
mode
output feedback

D
itn
itn *
* itn
*
·
p
p
its
·
p its
· its

>
PT-CT diff on
next CT bits
affect
-

no
>
-

>
-
CT-change

Lisa
stremx

parallel
- slow >
-

--

ER (counter Moe)
BO CFB
-
OF
we encrypted . Vector
initialization

· Encryptio

enter

counter z


+

up y↓
Entertaint

*·t
De
·

&

DPT -T diff
movie steamin
paralled
>
changes
-

2)
>
- no subsequent
CT
3) CT change in
[
it
used with
is
MAC
1) -
as OFB& CFB 100- encuped

Receptio
sames county

=
-

XOR
ver
property

tr
Entertaint
A
i krypt
lay

·*
--
-

memorise
/OFB) decryptin
CTR X
-

xproperty
reversing

Decryption
ENCRYPTION
LES
bits/binary
initial
I
i)
64 -
S
Plain text

permutation (i))
T
2
is

Initial
- Y

removingevey
#
-
6
See
32bits bits

#
·

↑ And
*
i
is di
is -
differen

n
final
Permutation
-

69 bitS
&

-arrangement
permutation changing
:
*
plain text 64
bit
#swapping
a

T ourin
7
J
12345678
A 1819 2021
2526272829303132
5334353637383940
4142435445464748
4950575253545556
5758596861626364
22 23 14

- 3231577
w

plaintextoudtadstation
KEY TRANSFORMATION O
- bit
8th
every Eit
64 bit) key remove
>
-

transformation half
·
now apply key is
divided in I
bit
as
The key of
bit
key

I
T

part

Ebitspart /

bit
S

his
-wind
a
(its
either
F
left

depends upon
~ round no .

Rounds 123456789 1011 12 13 14 156


left

22222251222222 - -

- ↓
selected

guitarround
left

>
- after shifting -

·
every
this generates for
>
- different key
EXPANSION PERMUTATION
-
bit)
> key
>
-

[48 bits) - 2p + (32

becaerbit)
plaintex
> permutated

) Rpt3 ipe operationsa


·

a
aegis
#
togrounds compressed

RPT
& t
· bits plain text

·
I
#
bible #I

to make
expan
is
4 bit bit
need
7 we plain text
block 8 ist 8 block

bo
sbitty ..... ↓
biti T
S 6bitz
(abit)bit

Join
add 2
· C to every
block

18 bit
·
-
131y

littl
I

sir

X3
48 =

i
OSUBSTITION
X

i Entransformed
48keybit

outd
t
I subst
sent to sbox
bit RPT
E
*
i Easter
y
permut
outd
exp

at bit
subst
sent to Sbox
RPT

:
/10/100

L
p
16
bit

illl
x I

IIII
111
Toll shop was
bit
output
8x4 bit

bit
output

- =
32b

positio
PboX

-at
col no

* i of pane
SboX

no
tells row
L -
1 bit-ustal
Sbox 2
ybit- > 16
-
incows) states

oa
(16 col)

00 God oo poo
010 15 + 414213110612116538
>
- 1041148 1
362115731050
11 15 128249175113 /y 100 6

g :
To
Stit
Sbox Subs
ex
transposition

TRANSPOSITION
POXoriginal ofpo

bitiy
soox

fixed
2 ↓ order

& poy
↓ ↓d

3 %
I
XORSWAPP bit
key

D
32 bit
↓56 bit
↓ -
E
Transp

r
7
-


optRPT
become
ww
32 bit
32 bit
H
A
Round
next

-
PERMUTATION
FINAL
T 32 bits

bita
-
So-
+
+

=

subits
+

Si
1

·
M

~
4083816556296432
12345678 -371555236331
9 10 11 12 13 14 15 16 36 4614 E223230

·
A 1819 2021 22 23 14
>
-

2526272829303132
5334353637383940
4142435445464748
4950575253545556
3314191915 2
5758596861626364

-
op aft
16 rounds
· set
Decryp
DES
(b it symmetric
encyption

initial
permutation

#und1 y it

#b
: isbit
Bound

#final
permutatin

↓ block
text

#bit
plain
Data encryption Argorithm
(International
A
into blocks
PT is divided
technique >
-

>
-

-
block cipher
size-128
bits (initiSize
BlockS)
n sige (4)

> key (4
-consist y frounds
-

transformation
output is generated
-followed by
down
into my
size
each

-key
is broken
get
use subsy a

usesa
round
every ransformation -

=
que
I

L
>
- at
bit
64

T
>
- .
I block
plain text Y ④
bit)
Put (16 &
tar Pedes
cybitp
, ↓
Fin]s subsy

encryp
X
-
↓ ↓ ↓
Round I
K7 subby
76
-

=
%

round
2 Ine
↓ subly

s ↓
A

J6

:
-k4376subn
-
i
Round 8 - Ky8

& Rif
-
R3Y- "Rix:
R2J
:
-
k49 ...
-
~

=
Output Transformatil
:

k52

↓ ↓ ↓ ↓
C
C23 -Y
(16 bits)
216bits) (16bit) (16bit)

-her
164 bits) text
·
↓ genera
~

128
bits
outputesformation !
- -

birital it
*
-
T& C

(moduloa

EwDs
steps

J
*
is

Tasktoper

-
*
Mul
* k2
Add P2 &
& 43
Add *
Pz
3
Ky XOR
Joce
&
By
*
Mal ---lodd
3
Step
5
·

Step 1 ..... /l even

Step 2 ① Step 4 use


kj

Firlet me
......

&
Mu 47
Huse 1
*
We aadd
...
K
9
mu
*
7 & steps ....... 11 *
Add Step
Step- R
10 >
&
1
XOR Step
11 R2
XOR Step
3 & Step
supe
12
&
2
13 XOR Step

14 XOR Stepha

9 -
odd- Step
-
get the
is subay being
16 bits)
d (each X
- 16

Ju
:
K ,
1
Round
-
xit -

-
-

20
(32bits)

it's .....
e
92

bits areundo
-

and
used

#42
112)
3
round -128)
far

197 16 bit)
d
-

bits
bits
n
bits

* (Circularly
- k6
-kn
-
k5 bits
Ka 25

left
shift by -

ly)
>

bit-26th bitbitJosiginal
-

bits E
(120 Ist
bit
-25th

-128
last
beginning bit 12
now
take ke to k far KS

a
-

I
-

- 128
65 -

14 circulars
411 25bite
bit leftswit K
"I unused

13) op -128)
key-128 starting take
Gai
& from
I
-
tr
tautansformataa KT transter

3 Add
Mul
*

*
Rat ke
Ryo
Statewaminat
Y

arenuredid)
-no
for o
transformation
subkey
the
are

to
Stay its

You might also like