Wednesday, September 29, 2021

What is Block Cipher? | What is Stream Cipher? | Block vs Stream Cipher | Stream vs Block Cipher | Application of Block Cipher and Stream cipher


Introduction

Basically, cryptographic algorithm is used for transformation of plaintext into cipher text. There are basically two methods on which cryptographic algorithm is work.



Stream Cipher

In stream cipher keys and algorithms are applied to each binary digit in a data stream, one bit at a time, rather than encrypting block of data. One time pad cipher is the best example of stream cipher. Cipher feedback mode is converting block cipher into stream cipher.

 

Figure: Process of Stream Cipher

A stream cipher operates on plaintext accepting only one bit at a time. Stream cipher in which each bit of plain text message XOR with each bit of key to obtain cipher text message.

 


Figure: Example of Stream Cipher

There is a key stream generator which outputs a stream of bits: k1, k2, k3,...ki and XORed with a stream of plaintext bits p1, p2,...,pi to produce the stream of cipher text bits.

Ci = Pi ⊕ Ki

During decryption, the cipher text bits are XORed with a same key stream to recover the plain text bits.

Pi = Ci ⊕ Ki

If the key stream output is random that, it will take harder for a cryptanalyst to break it.

Advantage

High Speed transformation

Low error propagation

Disadvantage

Low diffusion

Less secure


Block Cipher

In Block cipher, plain text message divide into fixed size blocks and encrypt each block with some fixed size of key. Divide each plain text message into block of 64, 128, 256 bits and apply key size 40, 56, 64, 80, 128, 168, 192 and 256 bits which generates cipher text block same as size of plain text block. Data Encryption Standard (DES) is the best example of block cipher in which each block of 64-bit gets encrypted using 56-key bit and cipher text of 64-bit get generated.


Figure: Block diagram of block Cipher


A receiver side decrypt message with same key to generate plain text. Block cipher also uses the concept of key generator. Block cipher are used chaining mode, this is because for repeating text pattern, the same cipher block will be generated which can give clue to cryptanalyst regarding what is the original plain text. As a chaining mode, previous block is mixed with current block to avoid repeats in patterns. It is more secure.

Advantage

High Diffusion

More secure

Disadvantage

Encryption process is slow

Error propagation


Difference between Block Cipher and Stream cipher



To learn more about Block Cipher & Stream Cipher, Click here

    Watch more videos click here.

3 comments:

  1. KC Golf Cart Company is dedicated to providing exceptional golf cart experiences for a wide range of customers, from event promoters and golf club professionals to individuals seeking custom, high-performance carts. We specialize in Golf Cart Dealer, utility, and all-terrain carts for events and tournaments, and offer a variety of stylish, custom-fit carts for those looking to stand out.

    ReplyDelete
  2. Kitchin Law Firm, led by seasoned trial Kansas City DUI attorneys John Kitchin, offers extensive legal expertise to Kansas City and the surrounding areas. A Kansas City native, John’s career began with distinguished service as a military lawyer in the United States Marine Corps, followed by roles as Assistant District Defender in Johnson County, Kansas, and manager of a major Missouri traffic law firm.

    ReplyDelete
  3. I’ve tried a few different types of cat litter boxes over the years, and honestly, it makes a huge difference depending on your cat’s habits and your cleaning routine. Covered boxes help control odor, but some cats don’t like the enclosed space. I personally switched to an open-top Cat litter box with high sides to prevent scattering, and it’s been much easier to clean. Also, using clumping litter and scooping daily keeps things fresh. If you’re dealing with odor issues, try adding a carbon filter or switching to a natural litter like pine or walnut.

    ReplyDelete