Stream versus block ciphers Stream versus block ciphers .pptx

sruthireddy127292 15 views 5 slides Dec 24, 2023
Slide 1
Slide 1 of 5
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5

About This Presentation

Stream versus block ciphers


Slide Content

Stream versus block ciphers Jeevan Sai Krishna Gadiparthi University of Fairfax 05/24/2022

A block cipher is a flexible calculation which executes a key-subordinate stage of values which are successions of a proper number of pieces (called "blocks"). It tends to be utilized for different jobs in numerous sorts of cryptographic conventions. Block Ciphers sepulchers the plain text information a block at a time with a similar change (in light of the key). A stream cipher is a particular calculation with the end goal of mass encryption of long surges of information. That's what the thought is, by relinquishing the flexibility of the block cipher, it would be feasible to make a more effective calculation (for example something which encodes information quicker). Introduction

Stream ciphers encrypt the slightest bit or byte at a time while block figures work on pieces/blocks of information at a time. Stream ciphers are quicker than block. Block ciphers normally require more memory. Stream ciphers are more hard to accurately carry out. Assuming that you mess up one piece of the information in a block ciphers, all things considered, you lose the entire block, not at all like stream ciphers where each digit, byte or singe is encoded all alone. Stream ciphers are typically utilized where how much information is obscure or perhaps ceaseless (consider networks), while block ciphers are great to known measures of information like (for example, documents). Advantages and disadvantages of stream versus block ciphers

In some modes, the plaintext does not pass through the encryption function, but is XORed with the output of the encryption function. For decryption in these cases, the encryption function must also be used . Block cipher modes of operation only use encryption while others use both encryption and decryption

References Bako, A., & Ali, I. A. (2018). Cyber and physical security vulnerability assessment for IoTbased smart homes. Sensors, 18(3), 817. doi:https :// doi.org /10.3390/s18030817 Caponi , A., & Leuti , M. (2019). A web platform for integrated vulnerability assessment and cyber risk management. Information, 10(7), 242. doi:https :// doi.org /10.3390/info10070242 Tobias, E, Ebiq . ECB vs. CBC – Pros and Cons of These Block Cipher Modes. Sep 8, 2021 Retrieved from https:// www.ubiqsecurity.com / ecb -vs- cbc -block-cipher-mode-differences/
Tags