You don't have access to this class

Keep learning! Join and start boosting your career

Aprovecha el precio especial y haz tu profesión a prueba de IA

Antes: $249

Currency
$209
Suscríbete

Termina en:

2 Días
6 Hrs
54 Min
20 Seg

Ciphers

9/25
Resources

What is symmetric encryption in cryptography?

When we talk about encryption in cryptography, we refer to procedures that encrypt information to keep it secret. A key concept within this field is symmetric encryption, where an algorithm converts plaintext into encrypted information and then uses the same process to decrypt the text and return to the original format. This back-and-forth mechanics defines the symmetric cipher and is thought of as a "little box" that transforms content from one side to the other.

How do block ciphers work?

A modern method of encryption is the block cipher. Here, the data goes through multiple rounds of encryption, i.e. the algorithm is applied repeatedly possibly using different keys. The idea is that each round of encryption wraps around the previous one, creating an additional layer of security. Block ciphers have modes of operation that determine how the data is processed. Examples include:

  • Electronic Code Book (ECB): divides information into blocks and encrypts them individually.
  • Other modes of operation increase security and have specific applications.

How does stream ciphering work?

In scenarios where the information is not completely known in advance, such as in audio or video streaming, streaming encryption is essential. This method uses a random number generator to encrypt data continuously. YouTube and Spotify are examples where each data stream is accompanied by random bits to keep the information secure.

Importance of the key and the unique number (nonce)

In stream ciphering, in addition to a key, a unique number, known as a nonce, is used to ensure that keys are not repeated and predictability in encryption is avoided. The key-non-repeat combination ensures protection and security against attacks.

Streaming architectures

In stream ciphering there are different architectures that define its operation:

  1. State-based stream: uses internal memory updated with each encryption operation and functions as a second seed for the process.
  2. Counter-based flow: Relies on an external counter that allows generating new keys for each flow, maintaining security as long as the counter is secure and not manipulable by attackers.

Each architecture offers advantages and is designed to improve encryption security, adapting to specific applications as needed.

Find inspiration for further learning

Knowing the difference between these two types of encryption and the accompanying modes of operation and architectures opens the door to delve deeper into the vast world of cryptography. Don't hesitate to investigate further and apply this knowledge in your projects to ensure greater data security. If you know examples of stream ciphers or modes of operation for block ciphers, please share them and continue exploring this fascinating topic!

Contributions 8

Questions 0

Sort by:

Want to see more contributions, questions and answers from the community?

En los recursos del curso encontrarán una herramienta para armar sus propios ciphers. Si quieren utilizar un block cipher, les recomiendo AES para probar los modos de operación. Si quieren probar un stream cipher, RC4 permite remover los primeros N bytes del stream, así pueden ver el cambio en el output con la opción de "RC4-drop bytes" 🙌
## `Modos de Operación Criptográfica: ECB, CBC y CTR` Los modos de operación son mecanismos que definen cómo se utiliza un algoritmo de cifrado de bloque para procesar flujos de datos que son más grandes que el tamaño del bloque del algoritmo. Son cruciales para garantizar la seguridad y confidencialidad de la información cifrada. **1. Electronic Codebook Mode (ECB):** En el modo ECB, cada bloque de texto plano se cifra independientemente con la misma clave. **2. Cipher Block Chaining Mode (CBC):** En el modo CBC, cada bloque de texto plano se suma con el bloque cifrado anterior (o un valor de inicialización) antes de ser cifrado. Esto crea una cadena de dependencias entre los bloques, donde el cifrado de cada bloque depende del contenido del bloque anterior. **3. Counter Mode (CTR):** En el modo CTR, se utiliza un contador que se incrementa para cada bloque. El contador se cifra con la clave y el resultado se suma con el texto plano para obtener el texto cifrado.
Cifrando imagenes con ECB ![](https://static.platzi.com/media/user_upload/image-25a4fdff-cd63-48ef-8beb-d6edf480717a.jpg)
Excelente curso
**Ciphers** [**https://www.youtube.com/watch?v=na5rapg1XsI\&list=PLBlnK6fEyqRhBsP45jUdcqBivf25hyVkU\&index=14**](https://www.youtube.com/watch?v=na5rapg1XsI\&list=PLBlnK6fEyqRhBsP45jUdcqBivf25hyVkU\&index=14)
* Block Ciphers * Modo de operación en bloques * Funciona por rondas con el mismo algoritmo de encripción, pero, con diferente llave * Distintos modos de operación (ECB, CCB, CTR) * Stream Ciphers * Usado por servicios streaming * Usa tecnicas de encripción por flujo * Se encripta en base a una llave de encripción, y teniendo esta llave, a medida que se va recibiendo la información, se va desencriptando

Gracias

Me gustó esto que vi en la documentación de Botan acerca de cifrados de bloque: `A block cipher by itself, is only able to securely encrypt a single data block. To be able to securely encrypt data of arbitrary length, a mode of operation applies the block cipher’s single block operation repeatedly to encrypt an entire message.` <https://botan.randombit.net/handbook/api_ref/cipher_modes.html>