logo

Analysis of Ciphers Techniques

   

Added on  2022-11-17

14 Pages2343 Words240 Views
Running head: ANALYSIS OF CIPHERS TECHNIQUES
ANALYSIS OF CIPHERS TECHNIQUES
Name of the Student
Name of the University
Author Note

ANALYSIS OF CIPHERS TECHNIQUES1
Executive summary
This report has analysed various chipper encryption method. Three important cipher
encryption methods is analysed in this report, which includes ECB, CBC and OFB. Here in
this report an analysis has been done on the performance of this three different mode of
encryption an image has been considered and on this image, this three different encryption
mode has applied the result obtained in this process is analyzed to identify how is method
actually work. Electronic codebook chipper cryptography is a powerful tool to encrypt plain
text. This is the simplest form of encrypting a plain text with chipper cryptography. CBC and
OFB offers better encryption than ECB, which has some security issues as well as it, offers
basic level of encryption.

ANALYSIS OF CIPHERS TECHNIQUES2
Table of Contents
Introduction:...............................................................................................................................3
Discussion:.................................................................................................................................3
ECB (Electronic CodeBook)..................................................................................................3
CBC (Cipher Block Chaining)...............................................................................................4
OFB (Output Feedback).........................................................................................................7
Comparison of encryption result between ECB, CFC and OFB:...........................................9
Reason not to consider ECB for encryption and chose CBC or OFB:.................................10
Conclusion:..............................................................................................................................11
References:...............................................................................................................................12

ANALYSIS OF CIPHERS TECHNIQUES3
Introduction:
In cryptography, cipher is best described as an algorithm that performs encryption and
decryption. It provides a detailed systematic procedure, which is required for encrypting and
decrypting information (Das & De, 2018). In this method of cryptography, original message
has information that is known as plain text. Now based on different cipher cryptography
mode, various techniques are applied for converting a plain text into encrypted text known as
cipher text. In order to encrypt the plain text, a secret key is considered which is known as
cipher key and encrypted message is known as cipher text.
Discussion:
ECB (Electronic CodeBook)
In this mode, a plain text is divided into blocks and these blocks are considered one at a time.
Only one key is considered for encrypting all of the blocks derived from the plaintext.
Therefore, for a specific cipher key, there is a cheaper text that is unique in nature and this is
applicable for each of the block of the plain text that is in a bit in size (Zhdanov, & Sokolov,
2016). So this system like a codebook where for every possible n-bit plain text there will be
an associated keypad text to which plaintext in identified due to similarity in encryption
approach. Hence, this encryption mode is known as electronic codebook. However some time
plaintext might be longer than b-bit and in this scenario, strategy is straight forward, just the
message have to be divided in b-bit Block and if required the last block is padded (Anand et
al., 2016). it's not only about encryption, but decryption also follow the simplicity just like
encryption process here also the same key is considered for decryption of the plaintext.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cryptography and Steganography Techniques
|10
|1022
|100

Questions & Answers on Symmetric Block Cipher and Encryption Process
|12
|2956
|64

Encryption Algorithm Assignment
|6
|1103
|186

Principle and Method in Cryptographic Security | Discussion
|4
|638
|19

Security in Information Technology | Assignments
|13
|3545
|119

Encryption Techniques Assignment 2022
|9
|2287
|7