SlideShare ist ein Scribd-Unternehmen logo
1 von 20
A Novel Encryption, Decryption Process Using
Permutation Choice
Y.S.R Engineering College Of Y.V.U::Proddatur
Presenting By :
I. Raja Sekhar Reddy
IV B.Tech CSE
1011102026
E-mail:irsreddy26@gmail.com
• Introduction
• Existing Method
• Proposed Method
• Features
• Conclusion
Contents:
What is Security?
Why we need to provide Security?
How the security will be provided?
Introduction:
Encryption and Decryption:
• Confidentiality
• Integrity
• Authentication
• Non-repudiation
SECURITY SERVICES:
EXISTING METHOD:
The proposed method consists of
Encryption
Single round encryption
Key generation
Round function
Decryption
Single round decryption
Key generation
Round function
PROPOSED METHOD:
ENCRYPTION:
SINGLE ROUND ENCRYPTION:
KEY GENERATION:
ROUND FUNCTION: Selection inputs Round Function
S3 S2 S1 S0
0 0 0 0 F1
0 0 0 1 F2
0 0 1 0 F3
0 0 1 1 F4
0 1 0 0 F5
0 1 0 1 F6
0 1 1 0 F7
0 1 1 1 F8
1 0 0 0 F9
1 0 0 1 F10
1 0 1 0 F11
1 0 1 1 F12
1 1 0 0 F13
1 1 0 1 F14
1 1 1 0 F15
1 1 1 1 F16
DECRYPTION:
SINGLE ROUND DECRYPTION:
KEY GENERATION:
ROUND FUNCTION: Selection lines Round Function
S3 S2 S1 S0
0 0 0 0 F1
0 0 0 1 F2
0 0 1 0 F3
0 0 1 1 F4
0 1 0 0 F5
0 1 0 1 F6
0 1 1 0 F7
0 1 1 1 F8
1 0 0 0 F9
1 0 0 1 F10
1 0 1 0 F11
1 0 1 1 F12
1 1 0 0 F13
1 1 0 1 F14
1 1 1 0 F15
1 1 1 1 F16
FEATURES:
 More secure
 Key size will be 1024-bit
 Plain text block size will be 2048-bit
 Round function will be changed to round to round
The goal of the encryption algorithm designing is to frustrate the hackers and
makes the cryptanalysis difficult. The key value play more important role in
encryption process. Altering each value of the plain text to get the final cipher text
make the cryptanalysis still more complex. The goal of the present paper is to
increase the security which makes complex to break. The round function and
permutation choices are not fixed, it is changed according to the user.
Conclusion:
Any Queries?
THANK YOU

Weitere ähnliche Inhalte

Ähnlich wie new encryption technique

Psdot 19 four factor password authentication
Psdot 19 four factor password authenticationPsdot 19 four factor password authentication
Psdot 19 four factor password authenticationZTech Proje
 
Understanding Zero Trust Security for IBM i
Understanding Zero Trust Security for IBM iUnderstanding Zero Trust Security for IBM i
Understanding Zero Trust Security for IBM iPrecisely
 
Secure Code the Cyber Pandemic Vaccine - Wayne Burke
Secure Code the Cyber Pandemic Vaccine - Wayne BurkeSecure Code the Cyber Pandemic Vaccine - Wayne Burke
Secure Code the Cyber Pandemic Vaccine - Wayne BurkeEC-Council
 
EthCon Korea 28 May 2019
EthCon Korea 28 May 2019EthCon Korea 28 May 2019
EthCon Korea 28 May 2019iExec
 
Eliptic Curve cryptography based on image
Eliptic Curve cryptography based on imageEliptic Curve cryptography based on image
Eliptic Curve cryptography based on image4HG20EC020MouneshGow
 
Iaetsd enhanced cryptography algorithm for providing
Iaetsd enhanced cryptography algorithm for providingIaetsd enhanced cryptography algorithm for providing
Iaetsd enhanced cryptography algorithm for providingIaetsd Iaetsd
 
IP Core Design of Hight Lightweight Cipher and its Implementation
IP Core Design of Hight Lightweight Cipher and its Implementation IP Core Design of Hight Lightweight Cipher and its Implementation
IP Core Design of Hight Lightweight Cipher and its Implementation csandit
 
IP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATION
IP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATIONIP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATION
IP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATIONcscpconf
 
IRJET- Design and Implementation of 256-Bits Cryptography Algorithm used in t...
IRJET- Design and Implementation of 256-Bits Cryptography Algorithm used in t...IRJET- Design and Implementation of 256-Bits Cryptography Algorithm used in t...
IRJET- Design and Implementation of 256-Bits Cryptography Algorithm used in t...IRJET Journal
 
Symmetric key encryption
Symmetric key encryptionSymmetric key encryption
Symmetric key encryptionmdhar123
 
CRYPTOGRAPHY AND NETWORK SECURITYPRINCIPLES AND PRACTI
CRYPTOGRAPHY AND NETWORK SECURITYPRINCIPLES AND PRACTICRYPTOGRAPHY AND NETWORK SECURITYPRINCIPLES AND PRACTI
CRYPTOGRAPHY AND NETWORK SECURITYPRINCIPLES AND PRACTIsharondabriggs
 
CRYPTOGRAPHY AND NETWORK SECURITYPRINCIPLES AND PRACTI.docx
CRYPTOGRAPHY AND NETWORK SECURITYPRINCIPLES AND PRACTI.docxCRYPTOGRAPHY AND NETWORK SECURITYPRINCIPLES AND PRACTI.docx
CRYPTOGRAPHY AND NETWORK SECURITYPRINCIPLES AND PRACTI.docxmydrynan
 
Webinar: Faster, Smarter, Simpler – The New Requirements in Storage Networking
Webinar: Faster, Smarter, Simpler – The New Requirements in Storage NetworkingWebinar: Faster, Smarter, Simpler – The New Requirements in Storage Networking
Webinar: Faster, Smarter, Simpler – The New Requirements in Storage NetworkingStorage Switzerland
 
272018 Review Test Submission Lab 8 Quiz – 2018_...http.docx
272018 Review Test Submission Lab 8 Quiz – 2018_...http.docx272018 Review Test Submission Lab 8 Quiz – 2018_...http.docx
272018 Review Test Submission Lab 8 Quiz – 2018_...http.docxtamicawaysmith
 
MULTI-STAGE ENCRYPTION USING SEEDED SDES
 MULTI-STAGE ENCRYPTION USING SEEDED SDES MULTI-STAGE ENCRYPTION USING SEEDED SDES
MULTI-STAGE ENCRYPTION USING SEEDED SDESEswar Publications
 
Secured qr code [Pankaj Jeswani and Team]
Secured qr code [Pankaj Jeswani and Team]Secured qr code [Pankaj Jeswani and Team]
Secured qr code [Pankaj Jeswani and Team]Pank Jes
 
IRJET- Data Encryption and Decryption using RF Module
IRJET- Data Encryption and Decryption using RF ModuleIRJET- Data Encryption and Decryption using RF Module
IRJET- Data Encryption and Decryption using RF ModuleIRJET Journal
 
Mediated certificateless cryptosystem for the security of data in public cloud
Mediated certificateless cryptosystem for the security of data in public cloudMediated certificateless cryptosystem for the security of data in public cloud
Mediated certificateless cryptosystem for the security of data in public cloudeSAT Journals
 
I mage encryption using rc5
I mage encryption using rc5I mage encryption using rc5
I mage encryption using rc5Suramrit Singh
 

Ähnlich wie new encryption technique (20)

Psdot 19 four factor password authentication
Psdot 19 four factor password authenticationPsdot 19 four factor password authentication
Psdot 19 four factor password authentication
 
Understanding Zero Trust Security for IBM i
Understanding Zero Trust Security for IBM iUnderstanding Zero Trust Security for IBM i
Understanding Zero Trust Security for IBM i
 
Super-Encryption Cryptography with IDEA and WAKE Algorithm
Super-Encryption Cryptography with IDEA and WAKE AlgorithmSuper-Encryption Cryptography with IDEA and WAKE Algorithm
Super-Encryption Cryptography with IDEA and WAKE Algorithm
 
Secure Code the Cyber Pandemic Vaccine - Wayne Burke
Secure Code the Cyber Pandemic Vaccine - Wayne BurkeSecure Code the Cyber Pandemic Vaccine - Wayne Burke
Secure Code the Cyber Pandemic Vaccine - Wayne Burke
 
EthCon Korea 28 May 2019
EthCon Korea 28 May 2019EthCon Korea 28 May 2019
EthCon Korea 28 May 2019
 
Eliptic Curve cryptography based on image
Eliptic Curve cryptography based on imageEliptic Curve cryptography based on image
Eliptic Curve cryptography based on image
 
Iaetsd enhanced cryptography algorithm for providing
Iaetsd enhanced cryptography algorithm for providingIaetsd enhanced cryptography algorithm for providing
Iaetsd enhanced cryptography algorithm for providing
 
IP Core Design of Hight Lightweight Cipher and its Implementation
IP Core Design of Hight Lightweight Cipher and its Implementation IP Core Design of Hight Lightweight Cipher and its Implementation
IP Core Design of Hight Lightweight Cipher and its Implementation
 
IP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATION
IP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATIONIP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATION
IP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATION
 
IRJET- Design and Implementation of 256-Bits Cryptography Algorithm used in t...
IRJET- Design and Implementation of 256-Bits Cryptography Algorithm used in t...IRJET- Design and Implementation of 256-Bits Cryptography Algorithm used in t...
IRJET- Design and Implementation of 256-Bits Cryptography Algorithm used in t...
 
Symmetric key encryption
Symmetric key encryptionSymmetric key encryption
Symmetric key encryption
 
CRYPTOGRAPHY AND NETWORK SECURITYPRINCIPLES AND PRACTI
CRYPTOGRAPHY AND NETWORK SECURITYPRINCIPLES AND PRACTICRYPTOGRAPHY AND NETWORK SECURITYPRINCIPLES AND PRACTI
CRYPTOGRAPHY AND NETWORK SECURITYPRINCIPLES AND PRACTI
 
CRYPTOGRAPHY AND NETWORK SECURITYPRINCIPLES AND PRACTI.docx
CRYPTOGRAPHY AND NETWORK SECURITYPRINCIPLES AND PRACTI.docxCRYPTOGRAPHY AND NETWORK SECURITYPRINCIPLES AND PRACTI.docx
CRYPTOGRAPHY AND NETWORK SECURITYPRINCIPLES AND PRACTI.docx
 
Webinar: Faster, Smarter, Simpler – The New Requirements in Storage Networking
Webinar: Faster, Smarter, Simpler – The New Requirements in Storage NetworkingWebinar: Faster, Smarter, Simpler – The New Requirements in Storage Networking
Webinar: Faster, Smarter, Simpler – The New Requirements in Storage Networking
 
272018 Review Test Submission Lab 8 Quiz – 2018_...http.docx
272018 Review Test Submission Lab 8 Quiz – 2018_...http.docx272018 Review Test Submission Lab 8 Quiz – 2018_...http.docx
272018 Review Test Submission Lab 8 Quiz – 2018_...http.docx
 
MULTI-STAGE ENCRYPTION USING SEEDED SDES
 MULTI-STAGE ENCRYPTION USING SEEDED SDES MULTI-STAGE ENCRYPTION USING SEEDED SDES
MULTI-STAGE ENCRYPTION USING SEEDED SDES
 
Secured qr code [Pankaj Jeswani and Team]
Secured qr code [Pankaj Jeswani and Team]Secured qr code [Pankaj Jeswani and Team]
Secured qr code [Pankaj Jeswani and Team]
 
IRJET- Data Encryption and Decryption using RF Module
IRJET- Data Encryption and Decryption using RF ModuleIRJET- Data Encryption and Decryption using RF Module
IRJET- Data Encryption and Decryption using RF Module
 
Mediated certificateless cryptosystem for the security of data in public cloud
Mediated certificateless cryptosystem for the security of data in public cloudMediated certificateless cryptosystem for the security of data in public cloud
Mediated certificateless cryptosystem for the security of data in public cloud
 
I mage encryption using rc5
I mage encryption using rc5I mage encryption using rc5
I mage encryption using rc5
 

Kürzlich hochgeladen

IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substationstephanwindworld
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the weldingMuhammadUzairLiaqat
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdfCaalaaAbdulkerim
 
home automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadhome automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadaditya806802
 
The SRE Report 2024 - Great Findings for the teams
The SRE Report 2024 - Great Findings for the teamsThe SRE Report 2024 - Great Findings for the teams
The SRE Report 2024 - Great Findings for the teamsDILIPKUMARMONDAL6
 
Industrial Safety Unit-I SAFETY TERMINOLOGIES
Industrial Safety Unit-I SAFETY TERMINOLOGIESIndustrial Safety Unit-I SAFETY TERMINOLOGIES
Industrial Safety Unit-I SAFETY TERMINOLOGIESNarmatha D
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxRomil Mishra
 
National Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfNational Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfRajuKanojiya4
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...Amil Baba Dawood bangali
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxsiddharthjain2303
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgsaravananr517913
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionMebane Rash
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 

Kürzlich hochgeladen (20)

IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substation
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the welding
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdf
 
home automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadhome automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasad
 
The SRE Report 2024 - Great Findings for the teams
The SRE Report 2024 - Great Findings for the teamsThe SRE Report 2024 - Great Findings for the teams
The SRE Report 2024 - Great Findings for the teams
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Industrial Safety Unit-I SAFETY TERMINOLOGIES
Industrial Safety Unit-I SAFETY TERMINOLOGIESIndustrial Safety Unit-I SAFETY TERMINOLOGIES
Industrial Safety Unit-I SAFETY TERMINOLOGIES
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptx
 
National Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfNational Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdf
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptx
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of Action
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 

new encryption technique

  • 1. A Novel Encryption, Decryption Process Using Permutation Choice Y.S.R Engineering College Of Y.V.U::Proddatur Presenting By : I. Raja Sekhar Reddy IV B.Tech CSE 1011102026 E-mail:irsreddy26@gmail.com
  • 2. • Introduction • Existing Method • Proposed Method • Features • Conclusion Contents:
  • 3. What is Security? Why we need to provide Security? How the security will be provided? Introduction:
  • 5. • Confidentiality • Integrity • Authentication • Non-repudiation SECURITY SERVICES:
  • 7.
  • 8. The proposed method consists of Encryption Single round encryption Key generation Round function Decryption Single round decryption Key generation Round function PROPOSED METHOD:
  • 12. ROUND FUNCTION: Selection inputs Round Function S3 S2 S1 S0 0 0 0 0 F1 0 0 0 1 F2 0 0 1 0 F3 0 0 1 1 F4 0 1 0 0 F5 0 1 0 1 F6 0 1 1 0 F7 0 1 1 1 F8 1 0 0 0 F9 1 0 0 1 F10 1 0 1 0 F11 1 0 1 1 F12 1 1 0 0 F13 1 1 0 1 F14 1 1 1 0 F15 1 1 1 1 F16
  • 16. ROUND FUNCTION: Selection lines Round Function S3 S2 S1 S0 0 0 0 0 F1 0 0 0 1 F2 0 0 1 0 F3 0 0 1 1 F4 0 1 0 0 F5 0 1 0 1 F6 0 1 1 0 F7 0 1 1 1 F8 1 0 0 0 F9 1 0 0 1 F10 1 0 1 0 F11 1 0 1 1 F12 1 1 0 0 F13 1 1 0 1 F14 1 1 1 0 F15 1 1 1 1 F16
  • 17. FEATURES:  More secure  Key size will be 1024-bit  Plain text block size will be 2048-bit  Round function will be changed to round to round
  • 18. The goal of the encryption algorithm designing is to frustrate the hackers and makes the cryptanalysis difficult. The key value play more important role in encryption process. Altering each value of the plain text to get the final cipher text make the cryptanalysis still more complex. The goal of the present paper is to increase the security which makes complex to break. The round function and permutation choices are not fixed, it is changed according to the user. Conclusion: