Unblock your way to Block Ciphers

Unblock your way to Block Ciphers

Block ciphers as the name suggests operate on blocks of plaintext to produce blocks of ciphertext. These are typically useful to breakup large bytes of plaintext into smaller chunks for encryption and the chunks are then chained together with a particular mode of operation. Examples of such ciphers include DES (Data Encryption Standard), AES (Advanced Encryption Standard), IDEA etc. 

No alt text provided for this image


The block size is typically fixed and usually in multiples of 8. For example with 64 bits block size an 84 bit plaintext will be broken down into two blocks, one containing 64 bits of plaintext and the other containing 20 bits. Very small blocks sizes should be avoided. A block size of m bits can support 2^m plaintext bit combinations. If m is very small and the attacker has a-priori knowledge of plaintext bits then the adversary can launch a dictionary attack on the cipher. This is best illustrated with the following example where m = 2. 

No alt text provided for this image

With 2 bits we only have 4 possible combinations of plaintext and correspondingly ciphertext. Entropy wise this is clearly insufficient and susceptible to cryptanalysis.

As such a block cipher is said to be secure if the attacker cannot point out the difference between the block cipher and a random permutation. This property is also known as ciphertext indistinguishability. By definition:

A cryptosystem is considered secure in terms of indistinguishability if no adversary, given an encryption of a message randomly chosen from a two-element message space determined by the adversary, can identify the message choice with probability significantly better than that of random guessing ( 1?2).

In addition to ciphertext indistinguishability, block ciphers are evaluated based on criteria such as key size, block size, complexity of implementation and performance. These criteria can lead to choosing the appropriate block cipher for the use case at hand. 

Another important aspect to consider when using a block cipher is choosing the correct mode of operation. We shall discuss more about the same in the next post. Till then have a secure week ahead :-)


要查看或添加评论,请登录

Sujata G.的更多文章

  • Raksha Bandhan - The Bond of Protection & Safety

    Raksha Bandhan - The Bond of Protection & Safety

    Raksha bandhan - popularly known as Rakhi is celebrated every year amongst most Indian families. While there isn't a…

    3 条评论
  • Safer Internet Day meets Rose Day !

    Safer Internet Day meets Rose Day !

    Roses are red, violets are blue, Its the month of February - so beware of the love traps laid by cybercriminals after…

  • Is there an ELF @ Home :-)

    Is there an ELF @ Home :-)

    Christmas is coming - its that time of the year again ! I am sure Santa & his gang are at their busiest with the many…

    8 条评论
  • Musings about Catch-22

    Musings about Catch-22

    "Catch22" - an interesting phrase really and applicable in so many different situations. It is often used when one is…

    5 条评论
  • Employee engagement and its subtle correlation with data security

    Employee engagement and its subtle correlation with data security

    Recent news about recession especially among the big tech giants may have most employers thinking about employee…

  • Real or Fake : Now that is the question ..

    Real or Fake : Now that is the question ..

    Have you ever watched a video and wondered if the actors in the video are really who they are or is this just a crafted…

  • Privacy - does it still exist ?

    Privacy - does it still exist ?

    When is it okay to breach privacy and when is it not - an interesting question which has been on my mind lately. In the…

    4 条评论
  • Understanding Differential Privacy

    Understanding Differential Privacy

    Data powers everything we do and is probably the most valuable asset in the world today. Many organisations today are…

    5 条评论
  • Cryptocurrency in a nutshell

    Cryptocurrency in a nutshell

    Cryptocurrency has been quite a bit in news articles lately especially with regards to how how it must be regulated. So…

    2 条评论
  • Varied shades of security

    Varied shades of security

    Which colour do you associate with the most ? No this is not going to be an article about painting but about the varied…

社区洞察

其他会员也浏览了