Stream versus block ciphers Stream versus block ciphers .pptx
sruthireddy127292
15 views
5 slides
Dec 24, 2023
Slide 1 of 5
1
2
3
4
5
About This Presentation
Stream versus block ciphers
Size: 42.39 KB
Language: en
Added: Dec 24, 2023
Slides: 5 pages
Slide Content
Stream versus block ciphers Jeevan Sai Krishna Gadiparthi University of Fairfax 05/24/2022
A block cipher is a flexible calculation which executes a key-subordinate stage of values which are successions of a proper number of pieces (called "blocks"). It tends to be utilized for different jobs in numerous sorts of cryptographic conventions. Block Ciphers sepulchers the plain text information a block at a time with a similar change (in light of the key). A stream cipher is a particular calculation with the end goal of mass encryption of long surges of information. That's what the thought is, by relinquishing the flexibility of the block cipher, it would be feasible to make a more effective calculation (for example something which encodes information quicker). Introduction
Stream ciphers encrypt the slightest bit or byte at a time while block figures work on pieces/blocks of information at a time. Stream ciphers are quicker than block. Block ciphers normally require more memory. Stream ciphers are more hard to accurately carry out. Assuming that you mess up one piece of the information in a block ciphers, all things considered, you lose the entire block, not at all like stream ciphers where each digit, byte or singe is encoded all alone. Stream ciphers are typically utilized where how much information is obscure or perhaps ceaseless (consider networks), while block ciphers are great to known measures of information like (for example, documents). Advantages and disadvantages of stream versus block ciphers
In some modes, the plaintext does not pass through the encryption function, but is XORed with the output of the encryption function. For decryption in these cases, the encryption function must also be used . Block cipher modes of operation only use encryption while others use both encryption and decryption
References Bako, A., & Ali, I. A. (2018). Cyber and physical security vulnerability assessment for IoTbased smart homes. Sensors, 18(3), 817. doi:https :// doi.org /10.3390/s18030817 Caponi , A., & Leuti , M. (2019). A web platform for integrated vulnerability assessment and cyber risk management. Information, 10(7), 242. doi:https :// doi.org /10.3390/info10070242 Tobias, E, Ebiq . ECB vs. CBC – Pros and Cons of These Block Cipher Modes. Sep 8, 2021 Retrieved from https:// www.ubiqsecurity.com / ecb -vs- cbc -block-cipher-mode-differences/