CSPC-307 Blow Fish and RC5 Stream Ciphers For B Tech CS August 2022
CSPC-307 Blow Fish and RC5 Stream Ciphers For B Tech CS August 2022
CSPC-307 Blow Fish and RC5 Stream Ciphers For B Tech CS August 2022
Blow Fish
&
RC4 , RC5 stream ciphers
RC2, RC4,
RC5, RC6
Block Cipher Characteristics
features seen in modern block ciphers
are:
» variable key length / block size / no
rounds
» mixed operators, data/key
dependent rotation
» key dependent S-boxes
» more complex key scheduling
» operation of full data in each round
» varying non-linear functions
Stream Ciphers
process the message bit by bit (as a stream)
typically have a (pseudo) random stream key
combined (XOR) with plaintext bit by bit
randomness of stream key completely
destroys any statistically properties in the
message
» Ci = Mi XOR StreamKeyi
what could be simpler!!!!
but must never reuse stream key
» otherwise can remove effect and recover
messages
Stream Cipher Properties
some design considerations are:
» long period with no repetitions
» statistically random
» depends on large enough key
» large linear complexity
» correlation immunity
» confusion
» diffusion
» use of highly non-linear boolean
functions
RC2
a proprietary cipher owned by RSA DSI (Aerospace Data
Security
Ron Rivest design, simple but effective
Details not published
Protected as a trade secret
variable key size from 0 byte to max string length, byte-
oriented stream cipher
widely used (web SSL/TLS (Secure Socket Layer and
Transport Layer Security ) (SSL/TLS uses
both asymmetric and symmetric encryption to protect
the confidentiality and integrity of data-in-transit. ),
wireless WEP)
key forms random permutation of all 8-bit values
uses that permutation to scramble input info processed a
byte at a time
RC2
Encryption speed independent of key size
No S-boxes
Two operations Mix and Match and one is
chosen in each round.
Provides protection against differential and
Linear cryptanalysis.
RC5
a proprietary cipher owned by RSADSI
( RSA data security incorporation)
designed by Ronald Rivest (of RSA fame)
used in various RSADSI products
can vary key size / data size / no rounds
very clean and simple design
easy implementation on various CPUs
yet still regarded as secure
Adaptable to processors of different word lengths
No of bytes of keys & PT block size are all variable, but values
remain same for a particular execution of cryptographic algorithm
Encrypt 2 word blocks at a time
No of rounds are 0 to 255
Word size in bits: 16,32,64
Key size is 255 X 8 = 2040 bits allowing 8 bit bytes in the key
RC5 Cipher Parameters
RC5 is a family of ciphers RC5-w/r/b
» w = word size in bits (16/32/64) and data = 2w
» r = number of rounds (0..255)
» b = number of bytes in key (0..255)