Professional Documents
Culture Documents
Module-3
Topics to be discussed
Block Ciphers
Stream Ciphers
Identity: (1, 2, 3)
Inverse can be found from the table
Commutativity property is not satisfied
This implies that using two permutations one after another cannot
strengthen the security of a cipher
Because we can always find another permutation that can do the
same job because of the closure property
P-Boxes
A P-box (permutation box) parallels the traditional transposition
cipher for characters.
It transposes bits.
P-boxes are generally keyless.
In non-linear S-Box don’t have the above relation for every output.
The S-Box will have ‘and’ terms like, x1x4, x3x7
Inevitability
In S-Box the relationship between inputs and outputs are defined by
a table or a mathematical expression.
An S-box may or may not be invertible
In an invertible S-box, the number of input bits should be the same
as the number of output bits
Diffusion
The idea of diffusion is to hide the relationship between the
ciphertext and the plaintext.
Confusion
The idea of confusion is to hide the relationship between the
ciphertext and the key.
Feistel ciphers
Ciphers that have both invertible and non-invertible components
Non-Feistel ciphers
Ciphers that have only invertible components
Encryption: C1 = P1 𝑓(𝐾)
Decryption:P2 = 𝐶2 𝑓 𝐾 = 𝐶1 𝑓 𝐾 = P1 𝑓(𝐾) 𝑓(𝐾)
= 𝑃1 000, … 0 = 𝑃1