MODERN BLOCK CIPHER
Udit Mishra
Allenhouse Institute of Technology
Outline
• Introduction
• Definition
• Substitution or transposition
• Full size key ciphers
• Partial size key ciphers
• Components of modern block cipher
– P-boxes
• Straight P-box
• Compression P-box
• Expansion P-box
– S-boxes
• Linear & nonlinear S-boxes
2Modern Block Cipher | Udit Mishra
Introduction
• The traditional symmetric key ciphers are character-oriented
ciphers.
• With the advent of the computer, we need bit-oriented
ciphers.
• Reason: because the information to be encrypted is not just
text; it can be numbers, graphics, audio & video data.
• It is convenient to convert these types of data into a stream
of bits, to encrypt the stream, and then to send the encrypted
stream.
• When text is treated at bit level, each character is replaced
by 8 (or 16) bits, which means that number of symbols
becomes 8 (or 16) times larger.
3Modern Block Cipher | Udit Mishra
Definition
• A symmetric key modern block cipher encrypts an n-bit
block of plaintext or decrypts an n-bit block of ciphertext.
• The encryption or decryption algorithm uses a k-bit key.
• The decryption algorithm must be inverse of the encryption
algorithm & both operations must use the same secret key
so that Bob can retrieve the message sent by Alice.
n-bit plaintext
Encryption
n-bit ciphertext
n-bit plaintext
Decryption
n-bit ciphertext
k-bit key
4Modern Block Cipher | Udit Mishra
Definition (Conti…)
• If message has fewer than n-bits, padding must
be added to make it an n-bit block.
• If the message has more than n-bits, it should
be divided into n-bits blocks and the
appropriate padding must be added to the last
block if necessary.
• The common values for n are 64,128,256, or
512 bits.
5Modern Block Cipher | Udit Mishra
Substitution or Transposition
• If the cipher is designed as a substitution
cipher, a 1-bit or 0-bit in the plaintext can be
replaced by either a 0 or a 1.
plaintext: 0110 1001 1001 0110
ciphertext: 0100 0111 1011 0111
• Hence, plaintext and ciphertext can have
different numbers of 1’s.
6Modern Block Cipher | Udit Mishra
Substitution or Transposition (conti…)
• If the cipher is designed as a transposition
cipher, the bits are only reordered (transposed).
plaintext: 0110 1001 1001 0110
ciphertext: 1101 0101 0100 0011
• Hence, there is the same number of 1’s in the
plaintext and in the ciphertext.
• In either case, the no. of n-bits possible
plaintexts or ciphertexts is 2^n.
7Modern Block Cipher | Udit Mishra
Exercise
• Suppose that we have a block cipher where
n=64. If there are 10 1’s in the ciphertext, how
many trial & error tests does Eve need to do to
recover the plaintext from the intercepted
ciphertext in each of the following case?
– The cipher is designed as a substitution cipher.
– The cipher is designed as a transposition cipher.
8Modern Block Cipher | Udit Mishra
Exercise Conclusion
• To be resistant to exhaustive-search attack, a
modern block cipher needs to be designed as
substitution cipher.
9Modern Block Cipher | Udit Mishra
Full Size Key Ciphers
• Transposition Ciphers:
– Involves rearrangement of bits, without changing
value.
– Consider an n bit cipher, how many such
rearrangements are possible: n!
– How many key bits are necessary: ceil[log2(n!)]
10Modern Block Cipher | Udit Mishra
Full Size Key Ciphers (Conti…)
• Substitution Ciphers:
– It does not transpose bits, but substitutes values
– Can we model this as a permutation?
– Yes. The n bit inputs and outputs can be
represented as 2^n bit sequences, with one 1 and
the rest 0’s.
– This can be thus modeled as a transposition.
– Thus it is a permutation of 2n values, thus needs
ceil[log2(2^n!)] bits.
11Modern Block Cipher | Udit Mishra
Exercise
• Consider a 3-bit block ciphers. How many bits
are needed for the full-size key?
– Transposition cipher:
• ceil(log26)=3 bits.
– Substitution cipher:
• There are 8!=40,320 possible substitutions
• Thus there are ceil(log2(40,320))=16 bits
12Modern Block Cipher | Udit Mishra
Partial Size Key Ciphers
• Actual ciphers cannot use full size keys, as the
size is large.
– Consider DES, with 64 bit block cipher.
• Size of full key= ceil(log2 (2^64!))≈270
• Much large compared to 56 bits which are actually used.
• A partial size key cipher is a group under the
composition operation if it is a subgroup of the
corresponding full size key cipher.
13Modern Block Cipher | Udit Mishra
Keyless Ciphers
• Practically useless by itself.
• Are used as components of keyed ciphers.
• Types of keyless ciphers:
– Keyless transposition cipher
– Keyless substitution cipher
– -----------------------------------------------------
14Modern Block Cipher | Udit Mishra
Components of a Modern Block
Cipher
• A modern block cipher is made of a
combination of:
– Transposition units(P-boxes)
– Substitution units (S-boxes)
– Some other units
15Modern Block Cipher | Udit Mishra
P-Box (Permutation Box)
• A P-box parallels the traditional transposition
cipher for characters.
• It transposes bits.
• There are 3 types:
– Straight P-box
– Compression P-box
– Expansion P-box
16Modern Block Cipher | Udit Mishra
P-Box(Conti…)
17Modern Block Cipher | Udit Mishra
P-Box(Conti…)
• Although a P-box can use a key to define one of
the n! mappings, P-boxes are normally keyless,
which means that the mapping is predetermined.
• There are 2 cases:
– If the P-box is implemented in h/w, it is prewired.
– If it is implemented in s/w, a permutation table shows
the rule of mapping.
• In second case, entries in the table are the inputs
& the positions of the entries are the outputs.
18Modern Block Cipher | Udit Mishra
Example of a permutation table for a straight P-box
58 50 42 34 26 18 10 02 60 52 44 36 28 20 12 04
62 54 46 38 30 22 14 06 64 56 48 40 32 24 16 08
57 49 41 33 25 17 09 01 59 51 43 35 27 19 11 03
61 53 45 37 29 21 13 05 63 55 47 39 31 23 15 07
19Modern Block Cipher | Udit Mishra
Compression P-Boxes
• A P-box with n inputs & m outputs (where m<n)
• Some of the inputs are blocked & do not reach the
output.
• A permutation table for a compression P-box has
m entries, but the content of each entry is from 1
to n with some missing values.
• These are used when we need to permute bits &
the same time decrease the no. of bits for the next
stage.
20Modern Block Cipher | Udit Mishra
Example of a 32x24 permutation table
• Table shows an example of a permutation table
for a 32x24 compression P-box.
• Here, note that input 7,8,9,15,16,23,24, & 25
are blocked.
01 02 03 21 22 26 27 28 29 13 14 17
18 19 20 04 05 06 10 11 12 30 31 32
21Modern Block Cipher | Udit Mishra
Expansion P-Boxes
• A P-box with n inputs & m outputs (where m>n).
• Some of the inputs are connected to more than
one inputs.
• A permutation table for an expansion P-box has m
entries, but m-n of the entries are repeated.
• These are used when we need to permute bits &
the same time increase the no. of bits for the next
stage.
22Modern Block Cipher | Udit Mishra
Example of a 12x16 permutation table
• Table shows an example of a permutation table
for a 12x16 expansion P-box.
• Here, note that for each of the input 1,3,9, &
12 is mapped to two outputs.
01 09 10 11 12 01 02 03 03 04 05 06 07 08 09 12
23Modern Block Cipher | Udit Mishra
S-Box (Substitution Box)
• An S-box can have a different numbers of
inputs & outputs.
• The input to an S-box could be an n-bit word,
but the output can be a m-bit word.
• Where m & n are not necessarily the same.
• Modern block ciphers normally use keyless S-
boxes, where the mapping from the inputs to
the outputs are predetermined.
24Modern Block Cipher | Udit Mishra
Linear & Nonlinear S-Boxes
• In an S-box with n inputs & m outputs, let inputs be x1,x2,y3,………,xn &
the outputs be y1,y2,y3,………,yn.
• The relationship b/w the inputs & the outputs can be represented as a set of
equations:
y1 = f1(x1,x2,x3,…….,xn)
y2 = f1(x1,x2,x3,…….,xn)
.
.
ym = f1(x1,x2,x3,…….,xn)
In the linear S-box, this can be represented as:
y1 = a1,1x1 ExOR a1,2x2 ExOR ……… ExOR a1,nxn
y2 = a2,1x1 ExOR a2,2x2 ExOR ……… ExOR a2,nxn
.
.
y1 = am,1x1 ExOR am,2x2 ExOR ……… ExOR am,nxn
In a nonlinear S-box we cannot have the above relations for every output.
25Modern Block Cipher | Udit Mishra
26Modern Block Cipher | Udit Mishra

More Related Content

PPT
Cryptography and Network Security William Stallings Lawrie Brown
PPTX
Modern Block Cipher- Modern Symmetric-Key Cipher
PPTX
Classical encryption techniques
PPTX
Cryptography - Block cipher & stream cipher
PPT
Classical cryptography
PPTX
Asymmetric Cryptography.pptx
PDF
SYMMETRIC CRYPTOGRAPHY
PPTX
RSA ALGORITHM
Cryptography and Network Security William Stallings Lawrie Brown
Modern Block Cipher- Modern Symmetric-Key Cipher
Classical encryption techniques
Cryptography - Block cipher & stream cipher
Classical cryptography
Asymmetric Cryptography.pptx
SYMMETRIC CRYPTOGRAPHY
RSA ALGORITHM

What's hot (20)

PPT
Block Cipher and its Design Principles
PDF
Chapter 1 Introduction of Cryptography and Network security
PPTX
Double DES & Triple DES
PPTX
Block Cipher and Operation Modes
PPTX
Substitution techniques
PPTX
Principal source of optimization in compiler design
PDF
Block Cipher Modes of Operation And Cmac For Authentication
PPTX
Code generation
PPT
S-DES.ppt
PDF
Symbol table in compiler Design
PPTX
Loop optimization
PPTX
Idea(international data encryption algorithm)
PPTX
Cryptographic algorithms
PPTX
Elliptic Curve Cryptography
PPTX
Data Encryption Standard (DES)
PDF
2. Stream Ciphers
PPTX
Distributed shred memory architecture
PPTX
Transposition Cipher
PPTX
RSA Algorithm
PDF
symmetric key encryption algorithms
Block Cipher and its Design Principles
Chapter 1 Introduction of Cryptography and Network security
Double DES & Triple DES
Block Cipher and Operation Modes
Substitution techniques
Principal source of optimization in compiler design
Block Cipher Modes of Operation And Cmac For Authentication
Code generation
S-DES.ppt
Symbol table in compiler Design
Loop optimization
Idea(international data encryption algorithm)
Cryptographic algorithms
Elliptic Curve Cryptography
Data Encryption Standard (DES)
2. Stream Ciphers
Distributed shred memory architecture
Transposition Cipher
RSA Algorithm
symmetric key encryption algorithms
Ad

Similar to Modern block cipher (20)

PDF
Modern Symmetric-key Ciphers for computer science student
PPT
ch-05.ppt
PDF
Forouzan cryptography and Network Security Ch-5
PPTX
Modern Cryptography.pptx
PPTX
Introduction to modern_symmetric-key_ciphers
PPTX
Rass presentation
PPT
ch-05.ppt
PPTX
DES Algorithm (DataEncryptionStandard) PPT
PDF
3-Block Ciphers and DES.pdf
PPTX
gyyyyyyyyyyyyyyyyyyyyyyBlockCiphers (1).pptx
PPT
Introduction to Block cipher Technology -unit 1
PDF
3 Basics of Cryptography Basics of Cryptography
PPTX
Chapter-Three Part One.pptxghgjhhjghjhjhhj
PPT
ICSE6104 Lecture bbbbbbbbbbbbbbbbbbbb 2.ppt
PDF
Chapter 8 cryptography lanjutan
PPT
overview of cryptographic techniques
PPTX
Cryptography and Network security # Lecture 4
PPT
DATA ENCRYPTION STANDARD (DES) / lucifer
PPT
ch03_block_ciphers_nemo (2) (1).ppt
Modern Symmetric-key Ciphers for computer science student
ch-05.ppt
Forouzan cryptography and Network Security Ch-5
Modern Cryptography.pptx
Introduction to modern_symmetric-key_ciphers
Rass presentation
ch-05.ppt
DES Algorithm (DataEncryptionStandard) PPT
3-Block Ciphers and DES.pdf
gyyyyyyyyyyyyyyyyyyyyyyBlockCiphers (1).pptx
Introduction to Block cipher Technology -unit 1
3 Basics of Cryptography Basics of Cryptography
Chapter-Three Part One.pptxghgjhhjghjhjhhj
ICSE6104 Lecture bbbbbbbbbbbbbbbbbbbb 2.ppt
Chapter 8 cryptography lanjutan
overview of cryptographic techniques
Cryptography and Network security # Lecture 4
DATA ENCRYPTION STANDARD (DES) / lucifer
ch03_block_ciphers_nemo (2) (1).ppt
Ad

Recently uploaded (20)

PDF
Ensemble model-based arrhythmia classification with local interpretable model...
PDF
Electrocardiogram sequences data analytics and classification using unsupervi...
PDF
EIS-Webinar-Regulated-Industries-2025-08.pdf
PDF
Data Virtualization in Action: Scaling APIs and Apps with FME
PDF
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
PDF
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
PDF
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
PDF
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
PDF
NewMind AI Weekly Chronicles – August ’25 Week IV
PDF
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
PDF
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
PPTX
Build automations faster and more reliably with UiPath ScreenPlay
PDF
Connector Corner: Transform Unstructured Documents with Agentic Automation
PDF
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
PDF
A symptom-driven medical diagnosis support model based on machine learning te...
PDF
giants, standing on the shoulders of - by Daniel Stenberg
PDF
A hybrid framework for wild animal classification using fine-tuned DenseNet12...
PDF
Lung cancer patients survival prediction using outlier detection and optimize...
PDF
“The Future of Visual AI: Efficient Multimodal Intelligence,” a Keynote Prese...
PPTX
SGT Report The Beast Plan and Cyberphysical Systems of Control
Ensemble model-based arrhythmia classification with local interpretable model...
Electrocardiogram sequences data analytics and classification using unsupervi...
EIS-Webinar-Regulated-Industries-2025-08.pdf
Data Virtualization in Action: Scaling APIs and Apps with FME
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
NewMind AI Weekly Chronicles – August ’25 Week IV
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
Build automations faster and more reliably with UiPath ScreenPlay
Connector Corner: Transform Unstructured Documents with Agentic Automation
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
A symptom-driven medical diagnosis support model based on machine learning te...
giants, standing on the shoulders of - by Daniel Stenberg
A hybrid framework for wild animal classification using fine-tuned DenseNet12...
Lung cancer patients survival prediction using outlier detection and optimize...
“The Future of Visual AI: Efficient Multimodal Intelligence,” a Keynote Prese...
SGT Report The Beast Plan and Cyberphysical Systems of Control

Modern block cipher

  • 1. MODERN BLOCK CIPHER Udit Mishra Allenhouse Institute of Technology
  • 2. Outline • Introduction • Definition • Substitution or transposition • Full size key ciphers • Partial size key ciphers • Components of modern block cipher – P-boxes • Straight P-box • Compression P-box • Expansion P-box – S-boxes • Linear & nonlinear S-boxes 2Modern Block Cipher | Udit Mishra
  • 3. Introduction • The traditional symmetric key ciphers are character-oriented ciphers. • With the advent of the computer, we need bit-oriented ciphers. • Reason: because the information to be encrypted is not just text; it can be numbers, graphics, audio & video data. • It is convenient to convert these types of data into a stream of bits, to encrypt the stream, and then to send the encrypted stream. • When text is treated at bit level, each character is replaced by 8 (or 16) bits, which means that number of symbols becomes 8 (or 16) times larger. 3Modern Block Cipher | Udit Mishra
  • 4. Definition • A symmetric key modern block cipher encrypts an n-bit block of plaintext or decrypts an n-bit block of ciphertext. • The encryption or decryption algorithm uses a k-bit key. • The decryption algorithm must be inverse of the encryption algorithm & both operations must use the same secret key so that Bob can retrieve the message sent by Alice. n-bit plaintext Encryption n-bit ciphertext n-bit plaintext Decryption n-bit ciphertext k-bit key 4Modern Block Cipher | Udit Mishra
  • 5. Definition (Conti…) • If message has fewer than n-bits, padding must be added to make it an n-bit block. • If the message has more than n-bits, it should be divided into n-bits blocks and the appropriate padding must be added to the last block if necessary. • The common values for n are 64,128,256, or 512 bits. 5Modern Block Cipher | Udit Mishra
  • 6. Substitution or Transposition • If the cipher is designed as a substitution cipher, a 1-bit or 0-bit in the plaintext can be replaced by either a 0 or a 1. plaintext: 0110 1001 1001 0110 ciphertext: 0100 0111 1011 0111 • Hence, plaintext and ciphertext can have different numbers of 1’s. 6Modern Block Cipher | Udit Mishra
  • 7. Substitution or Transposition (conti…) • If the cipher is designed as a transposition cipher, the bits are only reordered (transposed). plaintext: 0110 1001 1001 0110 ciphertext: 1101 0101 0100 0011 • Hence, there is the same number of 1’s in the plaintext and in the ciphertext. • In either case, the no. of n-bits possible plaintexts or ciphertexts is 2^n. 7Modern Block Cipher | Udit Mishra
  • 8. Exercise • Suppose that we have a block cipher where n=64. If there are 10 1’s in the ciphertext, how many trial & error tests does Eve need to do to recover the plaintext from the intercepted ciphertext in each of the following case? – The cipher is designed as a substitution cipher. – The cipher is designed as a transposition cipher. 8Modern Block Cipher | Udit Mishra
  • 9. Exercise Conclusion • To be resistant to exhaustive-search attack, a modern block cipher needs to be designed as substitution cipher. 9Modern Block Cipher | Udit Mishra
  • 10. Full Size Key Ciphers • Transposition Ciphers: – Involves rearrangement of bits, without changing value. – Consider an n bit cipher, how many such rearrangements are possible: n! – How many key bits are necessary: ceil[log2(n!)] 10Modern Block Cipher | Udit Mishra
  • 11. Full Size Key Ciphers (Conti…) • Substitution Ciphers: – It does not transpose bits, but substitutes values – Can we model this as a permutation? – Yes. The n bit inputs and outputs can be represented as 2^n bit sequences, with one 1 and the rest 0’s. – This can be thus modeled as a transposition. – Thus it is a permutation of 2n values, thus needs ceil[log2(2^n!)] bits. 11Modern Block Cipher | Udit Mishra
  • 12. Exercise • Consider a 3-bit block ciphers. How many bits are needed for the full-size key? – Transposition cipher: • ceil(log26)=3 bits. – Substitution cipher: • There are 8!=40,320 possible substitutions • Thus there are ceil(log2(40,320))=16 bits 12Modern Block Cipher | Udit Mishra
  • 13. Partial Size Key Ciphers • Actual ciphers cannot use full size keys, as the size is large. – Consider DES, with 64 bit block cipher. • Size of full key= ceil(log2 (2^64!))≈270 • Much large compared to 56 bits which are actually used. • A partial size key cipher is a group under the composition operation if it is a subgroup of the corresponding full size key cipher. 13Modern Block Cipher | Udit Mishra
  • 14. Keyless Ciphers • Practically useless by itself. • Are used as components of keyed ciphers. • Types of keyless ciphers: – Keyless transposition cipher – Keyless substitution cipher – ----------------------------------------------------- 14Modern Block Cipher | Udit Mishra
  • 15. Components of a Modern Block Cipher • A modern block cipher is made of a combination of: – Transposition units(P-boxes) – Substitution units (S-boxes) – Some other units 15Modern Block Cipher | Udit Mishra
  • 16. P-Box (Permutation Box) • A P-box parallels the traditional transposition cipher for characters. • It transposes bits. • There are 3 types: – Straight P-box – Compression P-box – Expansion P-box 16Modern Block Cipher | Udit Mishra
  • 18. P-Box(Conti…) • Although a P-box can use a key to define one of the n! mappings, P-boxes are normally keyless, which means that the mapping is predetermined. • There are 2 cases: – If the P-box is implemented in h/w, it is prewired. – If it is implemented in s/w, a permutation table shows the rule of mapping. • In second case, entries in the table are the inputs & the positions of the entries are the outputs. 18Modern Block Cipher | Udit Mishra
  • 19. Example of a permutation table for a straight P-box 58 50 42 34 26 18 10 02 60 52 44 36 28 20 12 04 62 54 46 38 30 22 14 06 64 56 48 40 32 24 16 08 57 49 41 33 25 17 09 01 59 51 43 35 27 19 11 03 61 53 45 37 29 21 13 05 63 55 47 39 31 23 15 07 19Modern Block Cipher | Udit Mishra
  • 20. Compression P-Boxes • A P-box with n inputs & m outputs (where m<n) • Some of the inputs are blocked & do not reach the output. • A permutation table for a compression P-box has m entries, but the content of each entry is from 1 to n with some missing values. • These are used when we need to permute bits & the same time decrease the no. of bits for the next stage. 20Modern Block Cipher | Udit Mishra
  • 21. Example of a 32x24 permutation table • Table shows an example of a permutation table for a 32x24 compression P-box. • Here, note that input 7,8,9,15,16,23,24, & 25 are blocked. 01 02 03 21 22 26 27 28 29 13 14 17 18 19 20 04 05 06 10 11 12 30 31 32 21Modern Block Cipher | Udit Mishra
  • 22. Expansion P-Boxes • A P-box with n inputs & m outputs (where m>n). • Some of the inputs are connected to more than one inputs. • A permutation table for an expansion P-box has m entries, but m-n of the entries are repeated. • These are used when we need to permute bits & the same time increase the no. of bits for the next stage. 22Modern Block Cipher | Udit Mishra
  • 23. Example of a 12x16 permutation table • Table shows an example of a permutation table for a 12x16 expansion P-box. • Here, note that for each of the input 1,3,9, & 12 is mapped to two outputs. 01 09 10 11 12 01 02 03 03 04 05 06 07 08 09 12 23Modern Block Cipher | Udit Mishra
  • 24. S-Box (Substitution Box) • An S-box can have a different numbers of inputs & outputs. • The input to an S-box could be an n-bit word, but the output can be a m-bit word. • Where m & n are not necessarily the same. • Modern block ciphers normally use keyless S- boxes, where the mapping from the inputs to the outputs are predetermined. 24Modern Block Cipher | Udit Mishra
  • 25. Linear & Nonlinear S-Boxes • In an S-box with n inputs & m outputs, let inputs be x1,x2,y3,………,xn & the outputs be y1,y2,y3,………,yn. • The relationship b/w the inputs & the outputs can be represented as a set of equations: y1 = f1(x1,x2,x3,…….,xn) y2 = f1(x1,x2,x3,…….,xn) . . ym = f1(x1,x2,x3,…….,xn) In the linear S-box, this can be represented as: y1 = a1,1x1 ExOR a1,2x2 ExOR ……… ExOR a1,nxn y2 = a2,1x1 ExOR a2,2x2 ExOR ……… ExOR a2,nxn . . y1 = am,1x1 ExOR am,2x2 ExOR ……… ExOR am,nxn In a nonlinear S-box we cannot have the above relations for every output. 25Modern Block Cipher | Udit Mishra
  • 26. 26Modern Block Cipher | Udit Mishra

Editor's Notes

  • #4: > Mixing a larger no. of symbols increases security.
  • #6: Give example here… text is: “hello world”, block size: 3, no. of blocks: 4, no. of padding bits at last block: 1.
  • #7: Give example after point 2.
  • #9: In first case, Eve has no idea how many 1’s are in the plaintext. He has to try all 2^64 64-bit blocks to find. In second case, Eve knows there are exactly 10 1’s in the plaintext.
  • #12: For a 3-bit block substitution cipher: It can be b/w 0 to 7this can be decoded as an 8-bit string with a single: 000  00000001; 101  00100000
  • #14: Block ciphers are substitution ciphers (and not transpositions). Why? A positive integer n has 2^(n-1) compositions. Closure, associativity, commutative, identity, inverse. It shall be discussed by someone else later which tells us wether a multi stage version of the same cipher can be made to achieve more security.
  • #24: invertability