0% found this document useful (0 votes)
63 views9 pages

BlockCypher Is A Cloud

The document discusses block and stream ciphers, highlighting their differences in encryption methods and applications. It also covers symmetric and asymmetric encryption, detailing their mechanisms, advantages, and implications on key management. Additionally, it explores various encryption algorithms, including 3DES, RSA, and chaotic-based encryption, emphasizing their security features and operational efficiencies.

Uploaded by

Abdizo Dizo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
63 views9 pages

BlockCypher Is A Cloud

The document discusses block and stream ciphers, highlighting their differences in encryption methods and applications. It also covers symmetric and asymmetric encryption, detailing their mechanisms, advantages, and implications on key management. Additionally, it explores various encryption algorithms, including 3DES, RSA, and chaotic-based encryption, emphasizing their security features and operational efficiencies.

Uploaded by

Abdizo Dizo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9

Students Name

Institution Affiliation

Course

Date
Block and Stream Ciphers

Block Cypher is a cloud-optimized framework that efficiently and at scale powers

blockchain applications. Block Cypher's web services are blockchain agnostic, which makes

developing applications that run on multiple blockchains much easier (Rueppel, 2012). On Block

Cypher’s infrastructure, you can easily create, run, and future-proof blockchain applications.

Whereas, A stream cipher is a type of symmetric key cipher that combines plaintext digits with a

stream of pseudorandom cipher digits (keystream). Each plaintext number is encrypted with the

corresponding keystream numeral in a stream cipher to create the ciphertext stream digit.

How Block and Stream Ciphers works

A block cypher encrypts data into blocks with a symmetrical key and a deterministic

algorithm. Most encryption methods, such as stream ciphers, encrypt bits one by one (stream

ciphers). A 128-bit block chip encrypts 128 bits of plaintext and converts them into 128 bits of

ciphertext. A stream cipher secures plaintext messages by encrypting them with a pseudorandom

cipher digit stream and an encryption algorithm (keystream). In stream mode, block ciphers can

function as a stream cipher by encrypting each bit of the message one by one with the

corresponding keystream digit (Rueppel, 2012).

Differences

A block cipher is different from a stream cipher because one block at a time converts

plain text into cipher text. On the other hand, the flow cipher converts plain text one byte at a

time into cipher. The ECB and CBC algorithm modes are also used for block cipher (Cipher

Block Chaining), while the CFB , OFB and the CFB algorithms in stream cipher (Cipher Code

Book) and the OFB (Output Feedback) are also used (Output Feedback) (Rueppel, 2012).
Symmetric and Asymmetric Encryption

Symmetrical encryption is a kind of encryption that only has a key to encode and decrypt

electronic data (a secret key). The key is to be shared among people who communicate with each

other via symmetrical encryption for use in the decryption process. Asymmetrical encryption is a

sort of encryption that does not include the coding and decoding key (also known by the private

key). Only the private key can decrypt a public key message (Yassein et al., 2017).

Differences

The main distinction between symmetrical and asymmetric encryption is that

symmetrical encryption uses the same encryption key, While a public encryption key is used for

asymmetric encryption and a private decryption key.

Asymmetrical encryption benefits

This type of encryption is more recent than symmetric encryption, also known as public

key encryption. As a result, there are a number of benefits to using this type of encryption,

including: Because it employs two keys, asymmetric encryption is thought to be more reliable

than symmetric encryption (Yassein et al., 2017). Although the public key used for encryption is

frequently accessible to all, the private key is not, and this encryption method is used in everyday

internet communication.

Why use symmetric encryption over asymmetric

Since the keys used in symmetric cryptography are much shorter than those used in

asymmetric cryptography, it is easier to run (in terms of both encryption and decryption).
Furthermore, the fact that only one key is used (as opposed to two in asymmetric cryptography)

speeds up the entire operation.

Implications on Keys

Finally, for symmetric encryption and decryption, the same secret key is used..

Asymmetric encryption, on the other hand, is a type of security that employs two keys for

encryption and decryption (Yassein et al., 2017). The primary advantage of asymmetric

cryptography is increased data protection. Since users are never expected to disclose or exchange

their private keys, it is the most reliable encryption method. This reduces the chances of a

cybercriminal finding a user's private key during transmission.

Factorization based encryption

Need of different algorithms

Encryption is the process by which plaintext can be converted into ciphertext and

decoded in the original letter. In data encryption and decryption, an encryption algorithm and a

key are used. Different algorithms are needed to improve protection and prevent attackers from

gaining easy access to sensitive data.

How The Algorithms work

3DES
Triple DES uses three different keys of 56 bits each. Experts agree that a key 112-bit

strength is greater than the total key 168-bit length. Triple DES is a safe hardware crypt for

financial services and other industries even though it has progressively been removed

(Venkatraman & Overmars, 2019). The power of 3DES is more powerful than 112-bits.

Moreover, because of its limited blocking (64-bit), the 3DES cipher has a fundamental weakness

which limits its encryption of plaintext.

RSA

The asymmetrical algorithm differs from that of Triple DES when RSA uses a pair of

keys. The key must be publicly encrypted and the key decrypted with a private key. RSA

encryption creates a huge jump that takes a long time and a lot of computer power to decrypt.

The algorithm that encrypts the message must be shared with everybody, one of the apparent

weaknesses of RSA. RSA is proportional to key size and doubling key length will increase

strength tenfold, but at the expense of efficiency (Venkatraman & Overmars, 2019).

TwoFish

Twofish is a symmetrical block cipher for encrypting data by a single key and decrypting

it. Feistel is a network of Feistel and Twofish is a network of Feistel. That means that half the

text block is crossed by a F function in each round before the other half is XORed. The TwoFish

algorithm's weakness is that it has a strong software crypt rate but is not successful, whereas its

strength A symmetrical key block chipher with variable-length keys is a symmetrical key chip

forc.

Chaotic based encryption


The basic theory of chaos encryption is based on the ability of certain complex structures

to generate random sequences of numbers. Encryption is done with this series. The sequence of

random numbers used for decryption is highly dependent on the initial condition used to generate

this sequence (Sajasi & Moghadam, 2015).

Chaotic map/function

A chaotic map has an unpredictable conduct. You can use a discrete or continuous time

parameter to parameterize maps. In the study of dynamic systems, chaotic maps are often found.

Chaotic maps are often fractal.

How chaotic map/function is applied in cryptography

Chaos maps must be implemented in such a way that the entropy provided by the map

will create the required Confusion and diffusion in order to effectively use chaos theory in

cryptography. Chaotic systems and cryptographic primitives share similar properties, allowing

chaotic systems to be used in cryptography (Sajasi & Moghadam, 2015). It would be virtually

impossible for an adversary to find suitable and usable outputs without knowing the initial values

if chaotic parameters and cryptographic keys could be symmetrically or asymmetrically mapped

to produce suitable and usable outputs.

Why we care

Because of its applications in areas such as image encryption, hash functions, and random

number generation, chaotic-based encryption is very common in cryptography. Hundreds of new

image encryption algorithms have been proposed since the advent of chaos-based cryptography,
all with the aim of enhancing the protection of digital images. The first chaos-based random

number generators have attempted to generate random numbers directly from the logistic map.

Difference between a DH,RSA,DHE,DH Elliptical Curve Key

The difference between DH and RSA is that each party generates a public and private key

in the Diffie-Hellman method, but only the public key is exchanged while RSA allows digital

signatures, which sets it apart from the Diffie-Hellman method (Venkatraman & Overmars,

2019). Diffie Hellman is a key exchange system in which each server and client share a

password, gx and gy, with each other, where g is a group generator. Secret S = (gy)x and (gx)y

are calculated by them. Whereas, The value that the server sends to the client, gx, is now fixed in

RSA DH and stored in the certificate. As a result, no "ServerKeyExchange" message is sent.

Now, in the "ClientKeyExchange" message, the client sends its gy value, which is encrypted

using the RSA public key cryptography algorithm, whose certificate server has already sent in

the "Certificate" message.

Key length

The number of bit used in a key is defined in cryptography as the number of bits in the

cryptography key (such as a cipher). Because the safety of all algorithms is compromised by

attacks by brute forces the key length is the (i.e. a logarithmic calculation of the fastest known

attack against an algorithm). The lowest limit in the security of the Algorithm should preferably

be equal to the key length (i.e., the key length fully determines the safety of the Algorithm and

the composition of the Algorithm does not affect the inherent key length). security). Keys control

how a cipher works, and only the right key can convert encrypted text (ciphertext) to plaintext

(Venkatraman & Overmars, 2019).


Why use RSA over DH

In terms of speed, RSA encryption (with the public key) is significantly less expensive

(and therefore faster) than any DH operation (even with elliptic curves). With equal resistance,

RSA decryption (with the private key) takes around the same amount of time as DH key

exchange.

For security, RSA relies (more or less) on integer factorization difficulty, whereas DH

relies (more or less) on discrete logarithm difficulty. They are two separate issues. Since the

most well-known breaking algorithms for both are variations of the General Number Field Sieve,

their asymptotic complexity is the same.

As for the use, With equal resistance, RSA decryption (with the private key) takes around

the same amount of time as DH key exchange. If you use a permanent key pair, DH is a little less

costly, but if you add the expense of creating an ephemeral key pair, it's a little more expensive.

Reference

Rueppel, R. A. (2012). Analysis and design of stream ciphers. Springer Science & Business

Media.
Sajasi, S., & Moghadam, A. M. E. (2015). An adaptive image steganographic scheme based on

Noise Visibility Function and an optimal chaotic based encryption method. Applied Soft

Computing, 30, 375-389.

Yassein, M. B., Aljawarneh, S., Qawasmeh, E., Mardini, W., & Khamayseh, Y. (2017, August).

Comprehensive study of symmetric key and asymmetric key encryption algorithms.

In 2017 international conference on engineering and technology (ICET) (pp. 1-7). IEEE.

Venkatraman, S., & Overmars, A. (2019). New method of prime factorisation-based attacks on

RSA Authentication in IoT. Cryptography, 3(3), 20.

You might also like