Network Security
Seventh Edition, Global Edition
by William Stallings
A block of plaintext is
treated as a whole Typically a block size
and used to produce of 64 or 128 bits is
a ciphertext block of used
equal length
The majority of
As with a stream network-based
cipher, the two users symmetric
share a symmetric cryptographic
encryption key applications make
use of block ciphers
Confusion
•Seeks to make the relationship between the statistics of the ciphertext and the value
of the encryption key as complex as possible
•Even if the attacker can get some handle on the statistics of the ciphertext, the way in
which the key was used to produce that ciphertext is so complex as to make it
difficult to deduce the key
DES
Example
Note: DES subkeys are shown as eight 6-bit values in hex format
© 2017 Pearson Education, Ltd., All rights reserved.
Table 4.3 Avalanche Effect in DES: Change in Plaintext
© 2017 Pearson Education, Ltd., All rights reserved.
Table 4.4 Avalanche Effect in DES: Change in Key
© 2017 Pearson Education, Ltd., All rights reserved.
Table 4.5
Average Time Required for Exhaustive Key Search
In general, the
criterion should be
If DES had 15 or
that the number of
The greater the fewer rounds,
rounds is chosen so
number of rounds, differential
that known
the more difficult it cryptanalysis would
cryptanalytic efforts
is to perform require less effort
require greater
cryptanalysis than a brute-force
effort than a simple
key search
brute-force key
search attack