Feistal Cipher Structure
Feistal Cipher Structure
CUSIT,peshawar
Overview
Cipher Block Ciphers Block vs. Stream Ciphers Block Cipher Principles Substitution-Permutation Ciphers Diffusion and Confusion Feistel Cipher Structure Feistel Cipher Design Principles
CUSIT,peshawar
Cipher
In cryptography , a cipher (or cypher) is an algorithm for performing encryption or decryption. a series of well-defined steps that can be followed as a procedure. Cryptography (or cryptology; from Greek is the practice and study of hiding information.
CUSIT,peshawar
CUSIT,peshawar
Block Ciphers
One of the most widely used types of cryptography algorithms. Provide strong secrecy and/or authentication services In particular will introduce DES (Data Encryption Standard)
CUSIT,peshawar
CUSIT,peshawar
CUSIT,peshawar
Substitution-Permutation Ciphers
in 1949 Shannon introduced idea of substitutionpermutation (S-P) networks modern substitution-transposition product cipher these form the basis of modern block ciphers S-P networks are based on the two primitive cryptographic operations we have seen before: substitution (S-box) permutation (P-box) (transposition) provide confusion and diffusion of message
CUSIT,peshawar
CUSIT,peshawar
CUSIT,peshawar
CUSIT,peshawar
CUSIT,peshawar
Feistel Cipher
n sequential rounds A substitution on the left half Li 1. Apply a round function F to the right half Ri and 2. Take XOR of the output of (1) and Li The round function is parameterized by the subkey Ki Ki are derived from the overall key K
CUSIT,peshawar
key size
increasing size improves security, makes exhaustive key searching harder, but may slow cipher
number of rounds
increasing number improves security, but slows cipher
subkey generation
greater complexity can make analysis harder, but slows cipher
round function
greater complexity can make analysis harder, but slows cipher
CUSIT,peshawar