Network Security: Classical Encryption & Block Cipher Techniques
1. Model for Network Security:
- Sender and Receiver communicate securely using an encryption algorithm and key.
- Key Services: Confidentiality, Integrity, Authentication, Non-repudiation.
2. Classical Encryption Techniques:
Symmetric Cipher Model:
- Same key used for both encryption and decryption.
Substitution Ciphers:
- Caesar Cipher: Shift letters by fixed value (e.g., +3). C = (P + K) mod 26.
- Monoalphabetic Cipher: Replace letters using a random permutation.
- Playfair Cipher: 5x5 grid digraph substitution (key-based).
- Hill Cipher: Uses matrix multiplication; needs inverse for decryption.
- Polyalphabetic Cipher: Vigenère cipher using a repeating keyword.
- One-Time Pad: Random key as long as plaintext, unbreakable if used once.
- Steganography: Hides existence of message in images or text.
3. Block Ciphers and DES:
Traditional Block Cipher Structure:
- Encrypts data in fixed-size blocks (e.g., 64 bits) using Feistel rounds.
- Principles: Confusion, Diffusion, Substitution, Permutation.
DES (Data Encryption Standard):
- Block size: 64 bits; Key: 56 bits; 16 rounds.
- Involves initial/final permutation, expansion, S-boxes, and XOR.
DES Strength:
- Initially strong, now vulnerable due to short key size.
- Susceptible to brute-force and cryptanalysis.
Block Cipher Design Principles:
- Number of Rounds: More rounds increase security.
- Key Size: Larger keys are more secure.
- S-boxes/P-boxes: Provide confusion and diffusion.
- Avalanche Effect: Small input change leads to large output change.
Summary Table:
| Technique | Type | Key Length | Strength | Example |
|------------------|--------------------|---------------|----------------|-------------|
| Caesar Cipher | Substitution | 1 int | Very Weak | +3 Shift |
| Monoalphabetic | Substitution | Random Map | Weak | A -> Q |
| Playfair Cipher | Digraph Substitution | 5x5 Grid | Medium | "HI" -> "BM" |
| Hill Cipher | Matrix-based | Matrix Key | Strong | Linear Alg. |
| Vigenère Cipher | Polyalphabetic | Keyword | Medium | LEMON |
| One-Time Pad | Perfect Cipher | Long Key | Unbreakable | Use Once |
| DES | Block Cipher | 56-bit | Weak (Today) | 16 Rounds |