Modern Symmetric Ciphers
(Stream Cipher and Block Cipher)
1) Stream cipher: is a symmetric key cipher where plaintext digits
are combined with a pseudorandom cipher digit stream (keystream).
This is achieved by adding a bit from a key stream to a plaintext bit.
Basic Idea of stream cipher comes from One-Time-Pad cipher. The
main advantage of one time pad is unbreakable system cipher but
the main drawback (disadvantage) of One-Time-Pad cipher are Key
distribution & Management difficult. Stream ciphers overcome the
drawback of one time pad by generated keystream in
pseudorandom fashion from relatively short secret key.
Pseudorandomness is sequences appears random to a
computationally bounded adversary.
• Types of stream cipher
A) Synchronous Stream Ciphers: Key-stream is independent of
plaintext and ciphertext and both sender &receiver must be
synchronized.
B) Self-Synchronizing Stream Ciphers: Key-stream is a function of fixed
number of ciphertext bits.
2) Block cipher: Plaintext is divided into blocks of fixed length and every
block is encrypted one at a time. Columnar transposition is an example
of this type.
Block cipher operation modes
1) Electronic Code Book(ECB).
2) Cipher-Block Chaining (CBC).
3) Cipher FeedBack (CFB).
4) Output Feedback Mode (OFM).
1) Electronic Code Book(ECB) : The message is divided into blocks, and
each block is encrypted separately.
The main advantage of ECB is that it’s simple and the main
disadvantage is that the identical plaintext blocks are encrypted into
identical ciphertext blocks. ECB used in the secure transmission of short
pieces of information.
2) Cipher-Block Chaining (CBC) : each block of plaintext is XORed with
the previous ciphertext block before being encrypted.
The main advantage of CBC is that the repeated same plaintext block
result different ciphertext block.
3) Cipher FeedBack (CFB) : plaintext is treated as a stream of bits. it
Uses for stream data encryption, authentication.
4) Output Feedback Mode (OFM) :The block cipher is used as a stream
cipher. Very similar to CFB But output of the encryption function is
feedback, instead of ciphertext.
Shannon Characteristics For Good Cipher
1) The amount of secrecy needed should determine the amount of labor
appropriate for the encryption and decryption.
2) The set of keys and the enciphering algorithm should be free from
complexity.
3) The implementation of the process should be as simple as possible.
4) Errors in ciphering should not propagate and cause corruption of further
information in the message.
5) The size of the enciphered text should be no larger than the text of the
original message.
Any question

More Related Content

PPTX
Cryptography and Network Security-MOD_3.pptx
PPTX
Information and data security block cipher operation
PPT
CR 06 - Block Cipher Operation.ppt
PDF
Block Ciphers Modes of Operation
PDF
Unit 1_Transposition Techniques_Ciphers.pdf
PPT
Cryptography and Network Security-MOD_3.pptx
Information and data security block cipher operation
CR 06 - Block Cipher Operation.ppt
Block Ciphers Modes of Operation
Unit 1_Transposition Techniques_Ciphers.pdf

Similar to 12_2019_12_03!04_59_50_PM symmetric.pptx (20)

PDF
Block Cipher Modes of Operation And Cmac For Authentication
PDF
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
PPTX
Block Cipher and Operation Modes
PDF
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
PPTX
Encryption
PPT
13528 l8
PPTX
block ciphermodes of operation.pptx
PPT
modes-of-operation in cryptography. .ppt
PDF
Comparative analysis on different DES model
PPTX
Block cipher modes of operation
PDF
Data Science Unit 02 SPPU Sem 6 PPT-2.pdf
PPT
Iss lecture 2
PPT
NIS block cipher modes network and information security
PDF
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS
PDF
Different date block size using to evaluate the performance between different...
PPTX
Block Cipher Modes Of Operation | Computer Networking and Security | Simplilearn
PPTX
1. Cryptography Symmetric Cryptography.pptx
PDF
Ciphers modes
PPT
Ciphers
PDF
SymmetricCryptography-Part3 - Tagged.pdf
Block Cipher Modes of Operation And Cmac For Authentication
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
Block Cipher and Operation Modes
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
Encryption
13528 l8
block ciphermodes of operation.pptx
modes-of-operation in cryptography. .ppt
Comparative analysis on different DES model
Block cipher modes of operation
Data Science Unit 02 SPPU Sem 6 PPT-2.pdf
Iss lecture 2
NIS block cipher modes network and information security
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS
Different date block size using to evaluate the performance between different...
Block Cipher Modes Of Operation | Computer Networking and Security | Simplilearn
1. Cryptography Symmetric Cryptography.pptx
Ciphers modes
Ciphers
SymmetricCryptography-Part3 - Tagged.pdf
Ad

More from abduganiyevbekzod011 (10)

PDF
Xalqaro_anjumanlar_baza_2025 nskvn nsn snrdg.pdf
PPTX
CRYPTOGRAPHY crytopgraphy wh is sd wkd ,w d .pptx
PPTX
typesofattacks-180418113629 255536155.pptx
PPT
lecture2-1 part one about cryptography.ppt
PPT
Tree-structured indexes lectures for student.ppt
PPT
9910559 jjjgjgjfs lke lwmerfml lew we.ppt
PPT
ch1_intro_HH_upd lectures othe be hand.ppt
PPT
attachment_2356_1635343030 service unit.ppt
PPT
Cryptography subject gor lectures 111.ppt
PPTX
Ta'lim klasteri kontekstida talabalarning ijtimoiy
Xalqaro_anjumanlar_baza_2025 nskvn nsn snrdg.pdf
CRYPTOGRAPHY crytopgraphy wh is sd wkd ,w d .pptx
typesofattacks-180418113629 255536155.pptx
lecture2-1 part one about cryptography.ppt
Tree-structured indexes lectures for student.ppt
9910559 jjjgjgjfs lke lwmerfml lew we.ppt
ch1_intro_HH_upd lectures othe be hand.ppt
attachment_2356_1635343030 service unit.ppt
Cryptography subject gor lectures 111.ppt
Ta'lim klasteri kontekstida talabalarning ijtimoiy
Ad

Recently uploaded (20)

PPTX
2025 High Blood Pressure Guideline Slide Set.pptx
PDF
FYJC - Chemistry textbook - standard 11.
PDF
Horaris_Grups_25-26_Definitiu_15_07_25.pdf
PPTX
4. Diagnosis and treatment planning in RPD.pptx
PPTX
operating_systems_presentations_delhi_nc
DOCX
EDUCATIONAL ASSESSMENT ASSIGNMENT SEMESTER MAY 2025.docx
PDF
Compact First Student's Book Cambridge Official
PDF
Review of Related Literature & Studies.pdf
PPT
Acidosis in Dairy Herds: Causes, Signs, Management, Prevention and Treatment
PDF
CHALLENGES FACED BY TEACHERS WHEN TEACHING LEARNERS WITH DEVELOPMENTAL DISABI...
PPTX
principlesofmanagementsem1slides-131211060335-phpapp01 (1).ppt
PDF
Fun with Grammar (Communicative Activities for the Azar Grammar Series)
PPTX
Theoretical for class.pptxgshdhddhdhdhgd
PPTX
PLASMA AND ITS CONSTITUENTS 123.pptx
PDF
fundamentals-of-heat-and-mass-transfer-6th-edition_incropera.pdf
PPTX
Q2 Week 1.pptx Lesson on Kahalagahan ng Pamilya sa Edukasyon
PDF
faiz-khans about Radiotherapy Physics-02.pdf
PPTX
UNIT_2-__LIPIDS[1].pptx.................
PDF
Lecture on Viruses: Structure, Classification, Replication, Effects on Cells,...
PDF
BSc-Zoology-02Sem-DrVijay-Comparative anatomy of vertebrates.pdf
2025 High Blood Pressure Guideline Slide Set.pptx
FYJC - Chemistry textbook - standard 11.
Horaris_Grups_25-26_Definitiu_15_07_25.pdf
4. Diagnosis and treatment planning in RPD.pptx
operating_systems_presentations_delhi_nc
EDUCATIONAL ASSESSMENT ASSIGNMENT SEMESTER MAY 2025.docx
Compact First Student's Book Cambridge Official
Review of Related Literature & Studies.pdf
Acidosis in Dairy Herds: Causes, Signs, Management, Prevention and Treatment
CHALLENGES FACED BY TEACHERS WHEN TEACHING LEARNERS WITH DEVELOPMENTAL DISABI...
principlesofmanagementsem1slides-131211060335-phpapp01 (1).ppt
Fun with Grammar (Communicative Activities for the Azar Grammar Series)
Theoretical for class.pptxgshdhddhdhdhgd
PLASMA AND ITS CONSTITUENTS 123.pptx
fundamentals-of-heat-and-mass-transfer-6th-edition_incropera.pdf
Q2 Week 1.pptx Lesson on Kahalagahan ng Pamilya sa Edukasyon
faiz-khans about Radiotherapy Physics-02.pdf
UNIT_2-__LIPIDS[1].pptx.................
Lecture on Viruses: Structure, Classification, Replication, Effects on Cells,...
BSc-Zoology-02Sem-DrVijay-Comparative anatomy of vertebrates.pdf

12_2019_12_03!04_59_50_PM symmetric.pptx

  • 1. Modern Symmetric Ciphers (Stream Cipher and Block Cipher) 1) Stream cipher: is a symmetric key cipher where plaintext digits are combined with a pseudorandom cipher digit stream (keystream). This is achieved by adding a bit from a key stream to a plaintext bit. Basic Idea of stream cipher comes from One-Time-Pad cipher. The main advantage of one time pad is unbreakable system cipher but the main drawback (disadvantage) of One-Time-Pad cipher are Key distribution & Management difficult. Stream ciphers overcome the drawback of one time pad by generated keystream in pseudorandom fashion from relatively short secret key. Pseudorandomness is sequences appears random to a computationally bounded adversary.
  • 2. • Types of stream cipher A) Synchronous Stream Ciphers: Key-stream is independent of plaintext and ciphertext and both sender &receiver must be synchronized. B) Self-Synchronizing Stream Ciphers: Key-stream is a function of fixed number of ciphertext bits.
  • 3. 2) Block cipher: Plaintext is divided into blocks of fixed length and every block is encrypted one at a time. Columnar transposition is an example of this type. Block cipher operation modes 1) Electronic Code Book(ECB). 2) Cipher-Block Chaining (CBC). 3) Cipher FeedBack (CFB). 4) Output Feedback Mode (OFM).
  • 4. 1) Electronic Code Book(ECB) : The message is divided into blocks, and each block is encrypted separately. The main advantage of ECB is that it’s simple and the main disadvantage is that the identical plaintext blocks are encrypted into identical ciphertext blocks. ECB used in the secure transmission of short pieces of information.
  • 5. 2) Cipher-Block Chaining (CBC) : each block of plaintext is XORed with the previous ciphertext block before being encrypted. The main advantage of CBC is that the repeated same plaintext block result different ciphertext block.
  • 6. 3) Cipher FeedBack (CFB) : plaintext is treated as a stream of bits. it Uses for stream data encryption, authentication. 4) Output Feedback Mode (OFM) :The block cipher is used as a stream cipher. Very similar to CFB But output of the encryption function is feedback, instead of ciphertext.
  • 7. Shannon Characteristics For Good Cipher 1) The amount of secrecy needed should determine the amount of labor appropriate for the encryption and decryption. 2) The set of keys and the enciphering algorithm should be free from complexity. 3) The implementation of the process should be as simple as possible. 4) Errors in ciphering should not propagate and cause corruption of further information in the message. 5) The size of the enciphered text should be no larger than the text of the original message.