SlideShare a Scribd company logo
BLOCK CIPHER MODES OF OPERATION
BY,
AKASH RANJAN DAS
5TH SEMESTER
B-TECH COMPUTER SCIENCE AND ENGINEERING
SIDDAGANGA INSTITUTE OF TECHNOLOGY, TUMKUR
AGENDA
➒ Block Ciphers
β–ͺ What is Block Cipher?
β–ͺ Block Cipher Modes of Operation
β–ͺ When we use Block Cipher Modes of
Operation?
➒ Electronic Code Book
β–ͺ Introduction
β–ͺ Electronic Code Book Encryption and
Decryption Process
β–ͺ Electronic Code Book Encryption and
Decryption Algorithm
β–ͺ Example
β–ͺ Security Issues
➒ Cipher Block Chaining Mode
β–ͺ Introduction
β–ͺ Encryption and decryption in CBC mode
β–ͺ Cipher block chaining mode algorithm
β–ͺ Security Issues
BLOCK CIPHERS
WHAT IS BLOCK CIPHER?
In cryptography, block cipher
is a deterministic algorithm
operating on fixed-length
groups of bits, called blocks,
with an unvarying
transformation that is
specified by a symmetric key.
01
A block cipher algorithm is a
basic building block for
providing data security.
02
To apply a block cipher in a
variety of applications, five
β€œmodes of operation” are
defined by NIST.
03
BLOCK CIPHER
MODES OF
OPERATION
β€’ NIST: National Institute of Standards and Technology defined the
following block cipher modes of operation.
1. Electronic code book.
2. Cipher Chaining Block
3. Cipher Feedback Mode
4. Output Feedback Mode
5. Counter Mode
WHEN WE
USE BLOCK
CIPHER
MODES OF
OPERATION?
Block Cipher only allow to encrypt
entire blocks.
What if our message is longer/ shorter
than the block size?
Algorithms that exploit a block cipher to
provide a service (e.g. confidentiality)
ELECTRONIC CODE BOOK
ELECTRONIC
CODE BOOK
ECB is the simplest mode of operation.
The plain text is divided into N blocks.
The block size is n bits.
If the plaintext size is not multiple of block size,
the text is padded to make the last block the
same size as the other blocks.
Same key is used to encrypt and decrypt each
block.
ELECTRONIC CODE
BOOK ENCRYPTION
AND DECRYPTION
PROCESS
ELECTRONIC CODE BOOK ENCRYPTION AND
DECRYPTION ALGORITHM
ELECTRONIC CODEBOOK ENCRYPTION EXAMPLE
ELECTRONIC
CODEBOOK
SECURITY
ISSUES
Patterns at the block
level are preserved
For example:
Equal blocks in
the plain text
become equal
block in the
cipher text.
If any person finds out the cipher text
block 1, 5 and 10 are the same, that
person knows the plaintext blocks 1, 5
and 10 are the same.
This is a leak in security
CIPHER BLOCK CHAINING MODE
CIPHER BLOCK
CHAINING
MODE
IBM invented the Cipher Block Chaining (CBC)
mode of operation in 1976.
In CBC mode, each block of plaintext is XORed
with the previous cipher text block being
encrypted.
This way, each cipher text block depends on all
plaintext blocks processed up to that point. To
make each message unique, an initialization
vector must be used in the first block.
WHAT IS AN
INITIALIZATION
VECTOR?
An initialization vector (IV) or starting variable is a block of
bits that is used by several modes to randomize the
encryption and hence to produce distinct cipher texts
even if the same plain text is encrypted multiple times,
without the need for a slower re-keying process.
An initialization vector has different security requirements
than a key, so the IV usually does not need to be secret.
However, in most cases, it is important that an
initialization vector is never reused under the same key.
ENCRYPTION AND
DECRYPTION IN
CBC MODE
CIPHER BLOCK CHAINING MODE ALGORITHM
CIPHER BLOCK
CHAINING MODE
SECURITY ISSUES
The patterns at the block level are not preserved.
In CBC mode, equal plain text block belonging to the same message are
enciphered into different cipher text block.
However, if two message are equal, their encipherment is the same if
they use the same IV.
As a matter of fact, if the first M blocks in two different message are
equal, they are enciphered into equal blocks unless different IVs are used.
For this reason, some people recommended the use of time-stamp as an
IV.
Any person can add some cipher text blocks to the end of the cipher text
stream.
THANK YOU

More Related Content

PPTX
Encryption
PPTX
Block cipher modes of operation
PDF
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
PPTX
Modes of Operation
PPTX
Classical encryption techniques
PPTX
802.11i
PPT
Secure electronic transactions (SET)
Encryption
Block cipher modes of operation
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Modes of Operation
Classical encryption techniques
802.11i
Secure electronic transactions (SET)

What's hot (20)

PPTX
Activity playfair cipher.pptx
PPTX
Cryptography in Blockchain
PPTX
Transposition cipher techniques
PPTX
Block Cipher Design Principles and its uses
PPTX
Double DES & Triple DES
PDF
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
PDF
AES-Advanced Encryption Standard
PDF
Classical encryption techniques
DOCX
What is AES? Advanced Encryption Standards
PPT
Intruders
Β 
PDF
RSA ALGORITHM
PPTX
cryptography
PPTX
Advanced encryption standard (aes)
PPTX
ElGamal Encryption Algoritham.pptx
PDF
Introduction to Cryptography
PPTX
Cryptanalysis
PPTX
Cryptography and Information Security
PPTX
Osi security architecture in network.pptx
PPTX
Distributed file system
PPT
block ciphers
Activity playfair cipher.pptx
Cryptography in Blockchain
Transposition cipher techniques
Block Cipher Design Principles and its uses
Double DES & Triple DES
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
AES-Advanced Encryption Standard
Classical encryption techniques
What is AES? Advanced Encryption Standards
Intruders
Β 
RSA ALGORITHM
cryptography
Advanced encryption standard (aes)
ElGamal Encryption Algoritham.pptx
Introduction to Cryptography
Cryptanalysis
Cryptography and Information Security
Osi security architecture in network.pptx
Distributed file system
block ciphers
Ad

Similar to Block cipher modes of operations (20)

PPTX
block ciphermodes of operation.pptx
PPTX
Lectrue-09,10ModofOperation in information security.pptx
PPTX
Topic21 Elect. Codebook, Cipher Block Chaining.pptx
PDF
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS
PPT
NIS block cipher modes network and information security
PDF
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
PPTX
Block Cipher and Operation Modes
PDF
Ciphers modes
PPTX
Cipher Block Operations Presentation Slide.
PDF
SymmetricCryptography-Part3 - Tagged.pdf
PPTX
Block Cipher Modes Of Operation | Computer Networking and Security | Simplilearn
PPT
modes-of-operation in cryptography. .ppt
PPT
Block Ciphers Modes of Operation
PPTX
Data Encryption Standard (DES)
PDF
DEC algorithm
PDF
Block Ciphers Modes of Operation
PDF
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
PPTX
Information and data security block cipher operation
PDF
CNIT 141: 5. More About Block Ciphers + Modular Arithmetic 2
PPT
CR 06 - Block Cipher Operation.ppt
block ciphermodes of operation.pptx
Lectrue-09,10ModofOperation in information security.pptx
Topic21 Elect. Codebook, Cipher Block Chaining.pptx
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS
NIS block cipher modes network and information security
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
Block Cipher and Operation Modes
Ciphers modes
Cipher Block Operations Presentation Slide.
SymmetricCryptography-Part3 - Tagged.pdf
Block Cipher Modes Of Operation | Computer Networking and Security | Simplilearn
modes-of-operation in cryptography. .ppt
Block Ciphers Modes of Operation
Data Encryption Standard (DES)
DEC algorithm
Block Ciphers Modes of Operation
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
Information and data security block cipher operation
CNIT 141: 5. More About Block Ciphers + Modular Arithmetic 2
CR 06 - Block Cipher Operation.ppt
Ad

Recently uploaded (20)

PPTX
newyork.pptxirantrafgshenepalchinachinane
PPTX
INTERNET------BASICS-------UPDATED PPT PRESENTATION
PPT
250152213-Excitation-SystemWERRT (1).ppt
PDF
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf
PPT
Ethics in Information System - Management Information System
PPTX
Internet___Basics___Styled_ presentation
PPTX
Database Information System - Management Information System
PPTX
artificialintelligenceai1-copy-210604123353.pptx
Β 
PPTX
Module 1 - Cyber Law and Ethics 101.pptx
PPT
Design_with_Watersergyerge45hrbgre4top (1).ppt
PPTX
Digital Literacy And Online Safety on internet
PDF
Sims 4 Historia para lo sims 4 para jugar
PDF
πŸ’° π”πŠπ“πˆ πŠπ„πŒπ„ππ€ππ†π€π πŠπˆππ„π‘πŸ’πƒ π‡π€π‘πˆ 𝐈𝐍𝐈 πŸπŸŽπŸπŸ“ πŸ’°
Β 
PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
PDF
Exploring VPS Hosting Trends for SMBs in 2025
PDF
SASE Traffic Flow - ZTNA Connector-1.pdf
PPTX
Funds Management Learning Material for Beg
PPTX
artificial intelligence overview of it and more
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PPT
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
newyork.pptxirantrafgshenepalchinachinane
INTERNET------BASICS-------UPDATED PPT PRESENTATION
250152213-Excitation-SystemWERRT (1).ppt
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf
Ethics in Information System - Management Information System
Internet___Basics___Styled_ presentation
Database Information System - Management Information System
artificialintelligenceai1-copy-210604123353.pptx
Β 
Module 1 - Cyber Law and Ethics 101.pptx
Design_with_Watersergyerge45hrbgre4top (1).ppt
Digital Literacy And Online Safety on internet
Sims 4 Historia para lo sims 4 para jugar
πŸ’° π”πŠπ“πˆ πŠπ„πŒπ„ππ€ππ†π€π πŠπˆππ„π‘πŸ’πƒ π‡π€π‘πˆ 𝐈𝐍𝐈 πŸπŸŽπŸπŸ“ πŸ’°
Β 
The New Creative Director: How AI Tools for Social Media Content Creation Are...
Exploring VPS Hosting Trends for SMBs in 2025
SASE Traffic Flow - ZTNA Connector-1.pdf
Funds Management Learning Material for Beg
artificial intelligence overview of it and more
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt

Block cipher modes of operations

  • 1. BLOCK CIPHER MODES OF OPERATION BY, AKASH RANJAN DAS 5TH SEMESTER B-TECH COMPUTER SCIENCE AND ENGINEERING SIDDAGANGA INSTITUTE OF TECHNOLOGY, TUMKUR
  • 2. AGENDA ➒ Block Ciphers β–ͺ What is Block Cipher? β–ͺ Block Cipher Modes of Operation β–ͺ When we use Block Cipher Modes of Operation? ➒ Electronic Code Book β–ͺ Introduction β–ͺ Electronic Code Book Encryption and Decryption Process β–ͺ Electronic Code Book Encryption and Decryption Algorithm β–ͺ Example β–ͺ Security Issues ➒ Cipher Block Chaining Mode β–ͺ Introduction β–ͺ Encryption and decryption in CBC mode β–ͺ Cipher block chaining mode algorithm β–ͺ Security Issues
  • 4. WHAT IS BLOCK CIPHER? In cryptography, block cipher is a deterministic algorithm operating on fixed-length groups of bits, called blocks, with an unvarying transformation that is specified by a symmetric key. 01 A block cipher algorithm is a basic building block for providing data security. 02 To apply a block cipher in a variety of applications, five β€œmodes of operation” are defined by NIST. 03
  • 5. BLOCK CIPHER MODES OF OPERATION β€’ NIST: National Institute of Standards and Technology defined the following block cipher modes of operation. 1. Electronic code book. 2. Cipher Chaining Block 3. Cipher Feedback Mode 4. Output Feedback Mode 5. Counter Mode
  • 6. WHEN WE USE BLOCK CIPHER MODES OF OPERATION? Block Cipher only allow to encrypt entire blocks. What if our message is longer/ shorter than the block size? Algorithms that exploit a block cipher to provide a service (e.g. confidentiality)
  • 8. ELECTRONIC CODE BOOK ECB is the simplest mode of operation. The plain text is divided into N blocks. The block size is n bits. If the plaintext size is not multiple of block size, the text is padded to make the last block the same size as the other blocks. Same key is used to encrypt and decrypt each block.
  • 10. ELECTRONIC CODE BOOK ENCRYPTION AND DECRYPTION ALGORITHM
  • 12. ELECTRONIC CODEBOOK SECURITY ISSUES Patterns at the block level are preserved For example: Equal blocks in the plain text become equal block in the cipher text. If any person finds out the cipher text block 1, 5 and 10 are the same, that person knows the plaintext blocks 1, 5 and 10 are the same. This is a leak in security
  • 14. CIPHER BLOCK CHAINING MODE IBM invented the Cipher Block Chaining (CBC) mode of operation in 1976. In CBC mode, each block of plaintext is XORed with the previous cipher text block being encrypted. This way, each cipher text block depends on all plaintext blocks processed up to that point. To make each message unique, an initialization vector must be used in the first block.
  • 15. WHAT IS AN INITIALIZATION VECTOR? An initialization vector (IV) or starting variable is a block of bits that is used by several modes to randomize the encryption and hence to produce distinct cipher texts even if the same plain text is encrypted multiple times, without the need for a slower re-keying process. An initialization vector has different security requirements than a key, so the IV usually does not need to be secret. However, in most cases, it is important that an initialization vector is never reused under the same key.
  • 17. CIPHER BLOCK CHAINING MODE ALGORITHM
  • 18. CIPHER BLOCK CHAINING MODE SECURITY ISSUES The patterns at the block level are not preserved. In CBC mode, equal plain text block belonging to the same message are enciphered into different cipher text block. However, if two message are equal, their encipherment is the same if they use the same IV. As a matter of fact, if the first M blocks in two different message are equal, they are enciphered into equal blocks unless different IVs are used. For this reason, some people recommended the use of time-stamp as an IV. Any person can add some cipher text blocks to the end of the cipher text stream.