SlideShare uma empresa Scribd logo
1 de 9
Prof Shabbir
CONFUSION AND
DIFFUSION
ENCRYPTION TECHNIQUES
 According to the famous information theorist Claude Shannon,
there are two primitive operations with which strong
encryption algorithms can be built:
 confusion and diffusion
 confusion and diffusion are two properties of the operation of
a secure cipher identified in 1945 classified report A
Mathematical Theory of Cryptography.
 These properties, when present, work to thwart the
application of statistics and other methods of cryptanalysis.
 These concepts are also important in the design of robust
hash functions and pseudorandom number generators where
decorrelation of the generated values is of paramount
importance.
CONFUSION AND DIFFUSION
 Confusion is an encryption operation where the relationship
between key and ciphertext is obscured.
 Today, a common element for achieving confusion is
substitution, which is found in both DES and AES.
 Confusion means that each binary digit (bit) of the ciphertext
should depend on several parts of the key, obscuring the
connections between the two.
 The property of confusion hides the relationship between the
ciphertext and the key.
 This property makes it difficult to find the key from the
ciphertext and
 if a single bit in a key is changed, the calculation of the values
of most or all of the bits in the ciphertext will be affected.
 Confusion increases the ambiguity of ciphertext and it is used by
both block and stream ciphers.
CONFUSION
 Diffusion is an encryption operation where the influence of one
plaintext symbol is spread over many ciphertext symbols with the
goal of hiding statistical properties of the plaintext.
 A simple diffusion element is the bit permutation, which is used
frequently within DES.
 AES uses the more advanced Mix-column operation.
 Ciphers which only perform confusion, such as the Shift Cipher
or the World War II encryption machine Enigma, are not secure.
 Neither are ciphers which only perform diffusion.
 However, through the concatenation of such operations, a strong
cipher can be built.
 The idea of concatenating several encryption operation was also
proposed by Shannon.
 Such ciphers are known as product ciphers. Or we can simplify
the concept and say:
DIFFUSION
 Diffusion means that if we change a single bit of the
plaintext, then (statistically) half of the bits in the ciphertext
should change, and similarly, if we change one bit of the
ciphertext, then approximately one half of the plaintext bits
should change.
 Since a bit can have only two states, when they are all re-
evaluated and changed from one seemingly random position
to another, half of the bits will have changed state.
 The idea of diffusion is to hide the relationship between the
ciphertext and the plain text. This will make it hard for an
attacker who tries to find out the plain text and it increases
the redundancy of plain text by spreading it across the rows
and columns;
 it is achieved through transposition of algorithm and it is used
by block ciphers only.
 All of today’s block ciphers are product ciphers as they
consist of rounds which are applied repeatedly to the data
Principle of an N round product cipher, where each round performs a confusion and diffusion
operation
 Modern block ciphers possess excellent diffusion properties.
 On a cipher level this means that changing of one bit of
plaintext results on average in the change of half the output
bits, i.e., the second ciphertext looks statistically independent
of the first one.
 This is an important property to keep in mind when dealing
with block ciphers.
 We demonstrate this behavior with the following simple
example.
 Example 1. Let’s assume a small block cipher with a block
length of 8 bits. Encryption of two plaintexts x1 and x2, which
differ only by one bit, should roughly result in something as
shown in Fig.2
EXAMPLE
Fig. 2 Principle of diffusion of a block cipher
Note that modern block ciphers have block lengths of
64 or 128 bit but they show exactly the same behavior
if one input bit is flipped.
S.No. CONFUSION DIFFUSION
1 Confusion is a cryptographic technique
which is used to create faint cipher texts.
While diffusion is used to create cryptic
plain texts.
2 This technique is possible through
substitution algorithm.
While it is possible through
transportation algorithm.
3 In confusion, if one bit within the secret’s
modified, most or all bits within the cipher
text also will be modified.
While in diffusion, if one image within the
plain text is modified, many or all image
within the cipher text also will be
modified
4 In confusion, vagueness is increased in
resultant.
While in diffusion, redundancy is
increased in resultant.
5 Both stream cipher and block cipher uses
confusion.
Only block cipher uses diffusion.
6 The relation between the cipher text and
the key is masked by confusion.
While The relation between the cipher
text and the plain text is masked by
diffusion.
DIFFERENTIATE

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

SHA- Secure hashing algorithm
SHA- Secure hashing algorithmSHA- Secure hashing algorithm
SHA- Secure hashing algorithm
 
IP Security
IP SecurityIP Security
IP Security
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
 
block ciphers
block ciphersblock ciphers
block ciphers
 
Feistel cipher
Feistel cipherFeistel cipher
Feistel cipher
 
5. message authentication and hash function
5. message authentication and hash function5. message authentication and hash function
5. message authentication and hash function
 
Block Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption StandardBlock Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption Standard
 
Hash Function
Hash FunctionHash Function
Hash Function
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption Standard
 
Hash function
Hash function Hash function
Hash function
 
Substitution techniques
Substitution techniquesSubstitution techniques
Substitution techniques
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
 
Hash Function.pdf
Hash Function.pdfHash Function.pdf
Hash Function.pdf
 
Elliptic curve cryptography
Elliptic curve cryptographyElliptic curve cryptography
Elliptic curve cryptography
 
Hash Function
Hash Function Hash Function
Hash Function
 
Ch14
Ch14Ch14
Ch14
 
Diffie hellman key exchange algorithm
Diffie hellman key exchange algorithmDiffie hellman key exchange algorithm
Diffie hellman key exchange algorithm
 
Web Security
Web SecurityWeb Security
Web Security
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
Message digest 5
Message digest 5Message digest 5
Message digest 5
 

Semelhante a Confusion and Diffusion.pptx

Introduction to Cryptography Week4 Part1-ISrevisionSu.docx
Introduction to Cryptography  Week4 Part1-ISrevisionSu.docxIntroduction to Cryptography  Week4 Part1-ISrevisionSu.docx
Introduction to Cryptography Week4 Part1-ISrevisionSu.docx
mariuse18nolet
 
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block CiphersA Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
IJNSA Journal
 
Cryptographic Tunneling and the OSI ModelWrite a paper consisting .docx
Cryptographic Tunneling and the OSI ModelWrite a paper consisting .docxCryptographic Tunneling and the OSI ModelWrite a paper consisting .docx
Cryptographic Tunneling and the OSI ModelWrite a paper consisting .docx
mydrynan
 
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERSA NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS
IJNSA Journal
 

Semelhante a Confusion and Diffusion.pptx (20)

Bakiya
BakiyaBakiya
Bakiya
 
Introduction to Cryptography Week4 Part1-ISrevisionSu.docx
Introduction to Cryptography  Week4 Part1-ISrevisionSu.docxIntroduction to Cryptography  Week4 Part1-ISrevisionSu.docx
Introduction to Cryptography Week4 Part1-ISrevisionSu.docx
 
Block Ciphers and DES.pptx
Block Ciphers and DES.pptxBlock Ciphers and DES.pptx
Block Ciphers and DES.pptx
 
Enhancing security of caesar cipher using different
Enhancing security of caesar cipher using differentEnhancing security of caesar cipher using different
Enhancing security of caesar cipher using different
 
Enhancing security of caesar cipher using different
Enhancing security of caesar cipher using differentEnhancing security of caesar cipher using different
Enhancing security of caesar cipher using different
 
RIT701_CGNS_L5.pptx
RIT701_CGNS_L5.pptxRIT701_CGNS_L5.pptx
RIT701_CGNS_L5.pptx
 
CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2
 
DES
DESDES
DES
 
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block CiphersA Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
 
Cryptographic Tunneling and the OSI ModelWrite a paper consisting .docx
Cryptographic Tunneling and the OSI ModelWrite a paper consisting .docxCryptographic Tunneling and the OSI ModelWrite a paper consisting .docx
Cryptographic Tunneling and the OSI ModelWrite a paper consisting .docx
 
Introduction to Cryptography and the Public Key Infrastructure
Introduction to Cryptography and the Public Key InfrastructureIntroduction to Cryptography and the Public Key Infrastructure
Introduction to Cryptography and the Public Key Infrastructure
 
Unit 2
Unit 2Unit 2
Unit 2
 
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERSA NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS
 
Quantum cryptography for secured communication networks
Quantum cryptography for secured communication networksQuantum cryptography for secured communication networks
Quantum cryptography for secured communication networks
 
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
 
Cryp Essay
Cryp EssayCryp Essay
Cryp Essay
 
Information and network security 19 feistel cipher
Information and network security 19 feistel cipherInformation and network security 19 feistel cipher
Information and network security 19 feistel cipher
 
Secure Encryption Technique (SET): A Private Key Cryptosystem
Secure Encryption Technique (SET): A Private Key CryptosystemSecure Encryption Technique (SET): A Private Key Cryptosystem
Secure Encryption Technique (SET): A Private Key Cryptosystem
 
Unit 2
Unit  2Unit  2
Unit 2
 
Jaimin chp-8 - network security-new -use this - 2011 batch
Jaimin   chp-8 - network security-new -use this -  2011 batchJaimin   chp-8 - network security-new -use this -  2011 batch
Jaimin chp-8 - network security-new -use this - 2011 batch
 

Mais de bcanawakadalcollege

Mais de bcanawakadalcollege (20)

Intro to Javascript.pptx
Intro to Javascript.pptxIntro to Javascript.pptx
Intro to Javascript.pptx
 
computer and software are changing.pptx
computer and software are changing.pptxcomputer and software are changing.pptx
computer and software are changing.pptx
 
tIME LINE.pptx
tIME LINE.pptxtIME LINE.pptx
tIME LINE.pptx
 
Basic HTML Tags.PPT
Basic HTML Tags.PPTBasic HTML Tags.PPT
Basic HTML Tags.PPT
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
cypher tex.ppt
cypher tex.pptcypher tex.ppt
cypher tex.ppt
 
17javascript.ppt
17javascript.ppt17javascript.ppt
17javascript.ppt
 
Logic gates and boolean algebra.ppt
Logic gates and boolean algebra.pptLogic gates and boolean algebra.ppt
Logic gates and boolean algebra.ppt
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 
cybercrime_presentation - Copy.ppt
cybercrime_presentation - Copy.pptcybercrime_presentation - Copy.ppt
cybercrime_presentation - Copy.ppt
 
Hidden Surface Removal methods.pptx
Hidden Surface Removal methods.pptxHidden Surface Removal methods.pptx
Hidden Surface Removal methods.pptx
 
Hidden Surface Removal.pptx
Hidden Surface Removal.pptxHidden Surface Removal.pptx
Hidden Surface Removal.pptx
 
Lecture6.orig.ppt
Lecture6.orig.pptLecture6.orig.ppt
Lecture6.orig.ppt
 
Bezier Curve in Computer Graphics.docx
Bezier Curve in Computer Graphics.docxBezier Curve in Computer Graphics.docx
Bezier Curve in Computer Graphics.docx
 
reliable_unreliable.pptx
reliable_unreliable.pptxreliable_unreliable.pptx
reliable_unreliable.pptx
 
2D-transformation-1.pdf
2D-transformation-1.pdf2D-transformation-1.pdf
2D-transformation-1.pdf
 
computer graphics unit 1-I.pptx
computer graphics unit 1-I.pptxcomputer graphics unit 1-I.pptx
computer graphics unit 1-I.pptx
 
CG_1.pdf
CG_1.pdfCG_1.pdf
CG_1.pdf
 
File System.pptx
File System.pptxFile System.pptx
File System.pptx
 
2- THE CHANGING NATURE OF SOFTWARE.pdf
2- THE CHANGING NATURE OF SOFTWARE.pdf2- THE CHANGING NATURE OF SOFTWARE.pdf
2- THE CHANGING NATURE OF SOFTWARE.pdf
 

Último

scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
HenryBriggs2
 
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
Health
 

Último (20)

scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Bridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptxBridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptx
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
Rums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfRums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdf
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 

Confusion and Diffusion.pptx

  • 2.  According to the famous information theorist Claude Shannon, there are two primitive operations with which strong encryption algorithms can be built:  confusion and diffusion  confusion and diffusion are two properties of the operation of a secure cipher identified in 1945 classified report A Mathematical Theory of Cryptography.  These properties, when present, work to thwart the application of statistics and other methods of cryptanalysis.  These concepts are also important in the design of robust hash functions and pseudorandom number generators where decorrelation of the generated values is of paramount importance. CONFUSION AND DIFFUSION
  • 3.  Confusion is an encryption operation where the relationship between key and ciphertext is obscured.  Today, a common element for achieving confusion is substitution, which is found in both DES and AES.  Confusion means that each binary digit (bit) of the ciphertext should depend on several parts of the key, obscuring the connections between the two.  The property of confusion hides the relationship between the ciphertext and the key.  This property makes it difficult to find the key from the ciphertext and  if a single bit in a key is changed, the calculation of the values of most or all of the bits in the ciphertext will be affected.  Confusion increases the ambiguity of ciphertext and it is used by both block and stream ciphers. CONFUSION
  • 4.  Diffusion is an encryption operation where the influence of one plaintext symbol is spread over many ciphertext symbols with the goal of hiding statistical properties of the plaintext.  A simple diffusion element is the bit permutation, which is used frequently within DES.  AES uses the more advanced Mix-column operation.  Ciphers which only perform confusion, such as the Shift Cipher or the World War II encryption machine Enigma, are not secure.  Neither are ciphers which only perform diffusion.  However, through the concatenation of such operations, a strong cipher can be built.  The idea of concatenating several encryption operation was also proposed by Shannon.  Such ciphers are known as product ciphers. Or we can simplify the concept and say: DIFFUSION
  • 5.  Diffusion means that if we change a single bit of the plaintext, then (statistically) half of the bits in the ciphertext should change, and similarly, if we change one bit of the ciphertext, then approximately one half of the plaintext bits should change.  Since a bit can have only two states, when they are all re- evaluated and changed from one seemingly random position to another, half of the bits will have changed state.  The idea of diffusion is to hide the relationship between the ciphertext and the plain text. This will make it hard for an attacker who tries to find out the plain text and it increases the redundancy of plain text by spreading it across the rows and columns;  it is achieved through transposition of algorithm and it is used by block ciphers only.
  • 6.  All of today’s block ciphers are product ciphers as they consist of rounds which are applied repeatedly to the data Principle of an N round product cipher, where each round performs a confusion and diffusion operation
  • 7.  Modern block ciphers possess excellent diffusion properties.  On a cipher level this means that changing of one bit of plaintext results on average in the change of half the output bits, i.e., the second ciphertext looks statistically independent of the first one.  This is an important property to keep in mind when dealing with block ciphers.  We demonstrate this behavior with the following simple example.
  • 8.  Example 1. Let’s assume a small block cipher with a block length of 8 bits. Encryption of two plaintexts x1 and x2, which differ only by one bit, should roughly result in something as shown in Fig.2 EXAMPLE Fig. 2 Principle of diffusion of a block cipher Note that modern block ciphers have block lengths of 64 or 128 bit but they show exactly the same behavior if one input bit is flipped.
  • 9. S.No. CONFUSION DIFFUSION 1 Confusion is a cryptographic technique which is used to create faint cipher texts. While diffusion is used to create cryptic plain texts. 2 This technique is possible through substitution algorithm. While it is possible through transportation algorithm. 3 In confusion, if one bit within the secret’s modified, most or all bits within the cipher text also will be modified. While in diffusion, if one image within the plain text is modified, many or all image within the cipher text also will be modified 4 In confusion, vagueness is increased in resultant. While in diffusion, redundancy is increased in resultant. 5 Both stream cipher and block cipher uses confusion. Only block cipher uses diffusion. 6 The relation between the cipher text and the key is masked by confusion. While The relation between the cipher text and the plain text is masked by diffusion. DIFFERENTIATE