Continued from Transposition Cipher

Stream And Block Cipher

The cipher methods are divided mainly into two parts  block cipher and stream cipher.


Stream Ciphers

  • A stream cipher encrypts data one bit or byte at a time, using a key stream that is typically generated based on the secret key.
  • If the key stream repeats itself, the cipher is considered periodic. An example of this is the Vigenère Cipher.
    • Vigenère Cipher: The key is repeated if it is shorter than the message. It encrypts each character of the message using the corresponding character of the key. This makes it a periodic cipher.
  • In contrast, the one-time pad is a stream cipher, but it is not periodic because its key stream never repeats. This makes the one-time pad theoretically unbreakable if the key is truly random, used only once, and is as long as the message.
  • We have already studied this in Vigenère’s and Playfair Cipher.

Block Cipher

A block cipher is an encryption algorithm that takes a fixed-size input (e.g., b bits) and produces a ciphertext of b bits. If the input is larger than b bits, it can be divided further.

  1. Concept of Block Cipher:
    • Some ciphers divide a message into fixed-size parts (blocks) and encrypt each block using the same key.
  2. Definition:
    • Let represent an encryption algorithm, and be the encryption of message using key .
  3. Mathematical Representation:
    • If a message consists of parts , where each is of a fixed length, then a block cipher encrypts each block independently as follows:
  4. Example of Block Cipher:
    • DES (Data Encryption Standard) is a block cipher that divides the message into 64-bit blocks and encrypts each block using a 56-bit key.

center

  • Block ciphers encrypt and decrypt multiple bits at once, rather than processing one bit at a time, making them more efficient for encrypting larger datasets.
  • Performance: Software implementations of block ciphers tend to run faster compared to stream ciphers, which encrypt data bit-by-bit.
  • Error Handling: Errors in transmitting one block typically do not affect other blocks. Since each block is encrypted independently using the same key, identical plaintext blocks will produce identical ciphertext blocks.
  • Analysis: This property allows an analyst to search for specific data by analyzing the encryption of a known plaintext block.

Disadvantages of Block Cipher

  1. Example of Block Cipher with Banking Data:

    • Data Example:

      • MEMBER: HOLLY INCOME $100,000
      • MEMBER: HEIDI INCOME $100,000
    • The encrypted result (ciphertext) of these records under a block cipher is:

      ABCQZRME GHQMRSIB CTXUVYSS RMGRPFQN
      ABCQZRME ORMPABRZ CTXUVYSS RMGRPFQN
      
    • Risk: If an attacker knows that “CTXUVYSS” is the encryption of the “INCOME” keyword, they can deduce that Holly and Heidi have the same income, which poses a security risk.

    • Solution: To prevent this type of attack, additional information such as a sequence number or some information from the previous ciphertext block can be inserted into the plaintext before encryption. This disrupts patterns in the ciphertext. However, the downside is that this reduces the effective block size.

  2. Block Cipher vs. Stream Cipher:

FeatureBlock CipherStream Cipher
Data ProcessingEncrypts fixed-size blocks (e.g., 64 or 128 bits)Encrypts data one bit or byte at a time
Encryption ModeOperates on a block-by-block basisOperates continuously or on small chunks of data
ComplexityMore complex due to block handling, padding, and modes of operationSimpler to implement due to continuous processing
Padding RequirementRequires padding if the plaintext size is not a multiple of the block sizeNo padding required as data is processed bit-by-bit or byte-by-byte
Error PropagationErrors in one block may affect subsequent blocks (e.g., CBC mode)Errors are localized to a single bit/byte and do not propagate
Initialization Vector (IV)Often requires an IV for modes like CBC or GCMOften requires an IV or key stream initialization
SecurityStronger against certain attacks due to structured encryptionMore vulnerable to attacks like key reuse in RC4
ExamplesAES, DES, Triple DES, BlowfishRSA, RC4, Salsa20, ChaCha20
Memory RequirementsBlock ciphers consume more memory due to fixed-size blocksStream ciphers use less memory as they process data bit-by-bit
Use CasesFile encryption, database encryption, and storage encryptionReal-time communications, video streaming, and VoIP encryption
PerformanceBetter for larger chunks of dataFaster for real-time or streaming data encryption

Cryptanalysis

  1. Brute Force Attack:

    • Tries all possible keys to decrypt the ciphertext.
    • Effective only for block ciphers with small key spaces.
  2. Differential Cryptanalysis:

    • Analyzes plaintext pairs’ differences and their effect on ciphertext.
    • Example: Applied to DES, revealing design insights.
  3. Linear Cryptanalysis:

    • Uses linear approximations to find correlations between plaintext, ciphertext, and the key.
    • Effective against DES and older block ciphers.
  4. Side-Channel Attacks:

    • Exploits physical information leaks (e.g., timing, power consumption, electromagnetic emissions).
    • Example: Timing attacks on AES implementations can recover secret keys.
  5. Padding Oracle Attack:

    • Exploits improper error handling in cipher modes like CBC when padding is used.
    • Example: Attacker manipulates ciphertext to decrypt data without knowing the key.
  6. Meet-in-the-Middle Attack:

    • Targets ciphers with multiple encryption layers (e.g., 3DES).
    • Reduces effective key size by simultaneously working on both encryption and decryption.

Electronic Code Book (ECB)

Electronic code block takes a message input as and then encrypt using a key and the ciphered text comes out as the output

Advantages

  • Parallel encryption of blocks of bits is possible, thus it is a faster way of encryption.

Disadvantages

  • Prone to cryptanalysis since there is a direct relationship between plaintext and ciphertext.
  • Identical plaintext blocks produce identical ciphertext blocks, which can reveal patterns.

Chaining of ECB’s

In an ECB we can add an additional step where we use an initializing vector to perform XOR on the message and then use the () to encrypt it and get the ciphered text. This way there’s a dependency created b/w the previous blocks.

IV
 |
 XOR
  | \
  P1 --> Encrypt --> C1
          |
          |
         XOR
          | \
         P2 --> Encrypt --> C2
                |
                |
               XOR
                | \
               P3 --> Encrypt --> C3
                     ...

Advantages

  • More secure than ECB as it hides patterns.
  • Better resistive nature towards cryptanalysis than ECB.
Information