In cryptography, the avalanche effect is a term associated with a specific behavior of mathematical functions used for encryption. Avalanche effect is considered as one of the desirable property of any encryption algorithm. A slight change in either the key or the plain-text should result in a significant change in the cipher-text. This property is termed as avalanche effect.
In simple words, it quantifies the effect on the cipher-text with respect to the small change made in plaint text or the key.
Even though the concept of avalanche effect was identified by “Shannon’s property of confusion”, the term was first mentioned by Horst Feistel. To implement a strong cipher or cryptographic hash function, this should be considered as one of the primary design objective.
In case of algorithm that uses hash value, even a small alteration in an input string should drastically change the hash value. In other words, flipping single bit in input string should at least flip half of the bits in the hash value.
A good encryption algorithm should always satisfy the following relation:
Avalanche effect > 50%
The effect ensures that an attacker cannot easily predict a plain-text through a statistical analysis. An encryption algorithm that doesn’t satisfies this property can favor an easy statistical analysis. That is, if the alteration in a single bit of the input results in change of only single bit of the desired output, then it’s easy to crack the encrypted text.
Example-1: Avalanche effect in cryptography refers
(A) Large changes in cipher text when the keyword is changed minimally
(B) Large changes in cipher text when the plain text is changed
(C) Large impact of keyword change to length of the cipher text
(D) None of the above
Example-2: Avalanche effect in cryptography
(A) Is desirable property of cryptographic algorithm
(B) Is undesirable property of cryptographic algorithm
(C) Has no effect on encryption algorithm
(D) None of the above
Don’t stop now and take your learning to the next level. Learn all the important concepts of Data Structures and Algorithms with the help of the most trusted course: DSA Self Paced. Become industry ready at a student-friendly price.
- Custom Building Cryptography Algorithms (Hybrid Cryptography)
- Classical Cryptography and Quantum Cryptography
- DNA Cryptography
- Development of Cryptography
- Quantum Cryptography
- Cryptography and its Types
- The CIA triad in Cryptography
- Cryptography Introduction
- RSA Algorithm in Cryptography
- Difference between Cryptography and Cryptology
- Caesar Cipher in Cryptography
- Difference between Steganography and Cryptography
- Easy Key Management in Cryptography
- Birthday attack in Cryptography
- Bifid Cipher in Cryptography
- Vernam Cipher in Cryptography
- Image Steganography in Cryptography
- Knapsack Encryption Algorithm in Cryptography
- Cryptography and Network Security Principles
- One Time Password (OTP) algorithm in Cryptography
If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to email@example.com. See your article appearing on the GeeksforGeeks main page and help other Geeks.
Please Improve this article if you find anything incorrect by clicking on the "Improve Article" button below.