# Block Cipher - Cryptography

## What is Block Cipher?

The simple scheme of a block cipher is represented as follows –

A block cipher receipts a block of plaintext bits and produces a block of ciphertext bits, usually of same size. The size of block is fixed in the given scheme. The choice of block size does not openly affect to the strength of encryption scheme. The strength of cipher depends up on the key length.

## Block Size

However any size of block is satisfactory, resulting aspects are borne in mind while selecting a size of a block.

• Avoid very small block size − Say a block size is m bits. Then the likely plaintext bits combinations are then 2m. If the attacker learns the plain text blocks consistent to some before sent ciphertext blocks, then the attacker can launch a type of ‘dictionary attack’ by building up a dictionary of plaintext/ciphertext pairs sent using that encryption key. A larger block size makes attack harder as the dictionary needs to be larger.
• Do not have very large block size − With very large block size, the cipher becomes inefficient to operate. Such plaintexts will need to be padded before being encrypted.
• Multiples of 8 bit − A preferred block size is a multiple of 8 as it is easy for implementation as most computer processor handle data in multiple of 8 bits.

## Padding in Block Cipher

Block ciphers method blocks of fixed sizes (say 64 bits). The length of plaintexts is typically not a many of the block size. For instance, a 150-bit plaintext delivers two blocks of 64 bits each with third block of balance 22 bits. The latter block of bits wants to be padded up with dismissed information so that the length of the final block equal to block size of the scheme. In our instance, the remaining 22 bits need to have additional 42 redundant bits added to offer a complete block. The procedure of adding bits to the last block is referred to as padding.

Too much padding makes the system inefficient. Also, padding may render the system insecure at times, if the padding is done with same bits always.

## Block Cipher Schemes

There is a massive number of block ciphers systems that are in use. Several of them are openly known. Most general and noticeable block ciphers are listed below.

• Digital Encryption Standard (DES) − The popular block cipher of the 1990s. It is now measured as a ‘broken’ block cipher, due mainly to its small key size.
• Triple DES − It is a variant scheme based on repeated DES applications. It is still a esteemed block ciphers but incompetent compared to the new faster block ciphers available.
• Advanced Encryption Standard (AES) − It is a relatively new block cipher based on the encryption algorithm Rijndael that won the AES design competition.
• IDEA − It is a sufficiently strong block cipher with a block size of 64 and a key size of 128 bits. A number of applications use IDEA encryption, including early versions of Pretty Good Privacy (PGP) protocol. The use of IDEA scheme has a restricted adoption due to patent issues.
• Twofish − This scheme of block cipher uses block size of 128 bits and a key of variable length. It was one of the AES finalists. It is based on the earlier block cipher Blowfish with a block size of 64 bits.
• Serpent − A block cipher with a block size of 128 bits and key lengths of 128, 192, or 256 bits, which was also an AES competition finalist. It is a slower but has more secure design than other block cipher.

In the next sections, we will first debate the model of block cipher followed by DES and AES, two of the most powerful modern block ciphers.