Encryption

IGZ Software house
IGZ Software houseIOS (internship) um IGZ Software house
Encryption
Security Protocols
 • A security protocol can be defined as a security
procedure for regulating data transmission
between computers.
 • If sensitive data is transmitted over the network in
clear text, then anyone can read the data if they
intercept it intentionally or accidentally.
 • To preserve the data confidentiality, we use
different encryption techniques.
Methods of Encryption
 At a broad level, regardless of the technique used for
encryption, the generation of ciphers from the plaintext itself
can be done in two ways:
 Stream Ciphers
 Block Ciphers
 Stream Cipher
 It involves the encryption of one plaintext bit at a time. The
decryption also happens one bit at a time
 Block Cipher
 It involves the encryption of one block of text at a time. Decryption
also takes one block of encrypted text at a time.
Stream Cipher
 Is one of the simplest way to encrypt data
 When it is employed each bit of the data is encrypted
using one bit of the key
 Faster than block cipher.
 Can encrypt the same message twice and the cipher
text will be different
 To make a stream cipher more difficult to crack, you
can use a crypto key that varies in length
 The process of continually varying the crypto key is
known as One-time pad
Block Cipher
 Unlike Stream Cipher which encrypts every single bit, Block
Cipher encrypts data in chunks of specific size
 It specifies how much data should be encrypted on each pass
and what size key should be applied to each block
 E.g DES specifies that DES encrypted data should be processed in
64-bit blocks using a 56-bit key
 You can use a number of algorithms when processing block
cipher
 The most basic is to simply take the data and break it into
blocks while applying the key to each
 A better solution is to take the earlier resultants from the
algorithm and combine them with later keys
XOR Operation
 An interesting property of XOR is that when used twice, it
produces the original data
 Example:
 Two binary numbers A=101, B=110
 C = A XORB
 C = 101 XOR110 = 011
 Now, if we perform C XOR A, we will get B
 011 XOR101 = 110 = B
 Now, if we perform C XOR B, we will get A
 011 XOR110 = 101 = A
 This reversibility of XOR operations has many implications
in cryptographic algorithms
Data Encryption Standard
(DES)
Data Encryption Standard
 DES is a symmetric key encryption standard
 Published in 1977 by the U.S. National Institute of
Standards and Technology (NIST)
 It is developed by IBM
 NIST states the goal of DES as
 The goal is to completely scramble the data and key so
that every bit of the ciphertext depends on every bit of
data and every bit of key.
 With a good algorithm, there should be no correlation
between the ciphertext and either the original data or key
Data Encryption Standard
 It was widely adopted by the industry for use in
security products
 a de facto standard
 It takes as an input data blocks of 64-bits length and
generates 64-bit cipher blocks
 56-bit key size
 Today, DES is not considered secure in its original
form, but in its modified form (3DES) it is still
considered secure
DES Basic Operation
 The algorithm, which is parameterized by a 56-bit key, has
16 distinct stages
 It involves 16 rounds of plaintext transformations, including breaking
the plain text into two 32 bit chunks that are swapped repeatedly
during rounds
 Each round expands 32bit block to 48bits,which are XORd with 48bit
sub-key
 The sub-key has been generated by a “key schedule”
 An algorithm that creates the 48-bit sub-key based on the original
56bit key
 After XORing with sub-key, 48-bit text is divided into 6-bit chunks
(S-boxes), which then output 4-bit blocks
 Reducing the overall plaintext block back to its original 32 bits
Data Encryption Standard
 most widely used block cipher in world
 adopted in 1977 by NBS (now NIST)
 as FIPS PUB 46
 encrypts 64-bit data using 56-bit key
 has widespread use
 has seen considerable controversy over
its security
DES History
 IBM developed Lucifer cipher
 by team led by Feistel
 used 64-bit data blocks with 128-bit key
 then redeveloped as a commercial cipher with
input from NSA and others
 in 1973 NBS issued request for proposals for
a national cipher standard
 IBM submitted their revised Lucifer which
was eventually accepted as the DES
DES Design Controversy
 although DES standard is public
 had considerable controversy over design
 in choice of 56-bit key
 and because design criteria were classified
 subsequent events and public analysis show in
fact design was appropriate
 DES has become widely used, especially in
financial applications
Data Encryption Standard
Strength of DES –Key Size
 56-bit keys have 256
= 7.2 x 1016
values
 brute force search looks hard
 recent advances have shown is possible
 in 1997 on Internet in a few months
 in 1998 on dedicated h/w (EFF) in a few days
 in 1999 above combined in 22hrs!
 still must be able to recognize plaintext
DES Encryption Strength
 The strength of any encryption algorithm lies in the
fact that it would take a long time to guess the used
key
 DES is 56 bits, that is the key to decrypt DES will be 56
bits in length
 56 bit is made up of 8 bytes with 7 data bits (8*7=56)
 Thus we can have 128 (27
) values to choose from each
character
 Possible number of combinations through some simple
math:
 (128)8
= 72 thousand plus billion combinations
DES Weaknesses
 DES is considered non secure for very
sensitive encryption.
 It is crack able in a short period of time.
 The short key length makes it easy to break
 To overcome the weaknesses of DES, Triple
DES is developed from original DES.
Triple DES
Triple-DES
 In Triple-DES, the DES algorithm is applied three
times using two or three different 56-bit keys
 This approach produces Ciphertext that is scrambled
to the equivalent of a 112-bit or 168-bit key
 (2)168
= 3.7 * (10)50
 370 trillion, trillion, trillion, trillion combinations
 Looking at the name, it may seem that 3DES makes
your encryption three times more difficult to break
 3DES actually makes your encryption five billion,
trillion, trillion times harder to break that is 5 *(10)33
Advanced Encryption Standard (AES)
 In 1990s, the U.S. Government wanted to standardize a
cryptographic algorithm, which was to be used universally.
 Many proposals were submitted, and after a lot of debate, an
algorithm called Rijndaelwas accepted
 The need for coming up with a new algorithm is actually
because of the perceived weakness in DES.
 The 56-bit keys of DES were no longer considered safe
against attacks based on exhaustive key searches, and the 64
bit blocks were also considered as weak
 AES was based on 128 bits blocks, with 128-bit key
IDEA
 International Data Encryption
Standard
 Takes input of 64-bits plain text blocks
 Produces output of 64-bits cipher text
 Key Length: 128 bits
AES
 Worldwide a new cryptographic protocol standard
was needed because:
 Key used in DES was too small (56-bit)
 Triple DES (3-DES) was too slow
 IDEA was patent protected and slow
 Advanced Encryption Standard
 NIST chose an algorithm that supports a variety of Data
Blockand Key Sizes
 Two parameters (block size and key) can be chosen
independently from 128, 160, 192, 224 and 256 bit sizes
AES
 According to AES Designers, the main
features of AES are
 Symmetric and parallel structure
 Adapted to modern processors
 Suited to smart cards
 After seeing the review of IETF protocols( SSL,
S/MIME, SSH) will have now modifications to
accommodate these algorithms
AES –The Advanced Encryption
Standard
 Rules for AES proposals
1. The algorithm must be a symmetric block cipher.
2. The full design must be public.
3. Key lengths of 128, 192, and 256 bits supported.
4. Both software and hardware implementations
required
5. The algorithm must be public or licensed on
nondiscriminatory terms.
1 von 24

Recomendados

Intro to modern cryptography von
Intro to modern cryptographyIntro to modern cryptography
Intro to modern cryptographyzahid-mian
2.5K views23 Folien
Cryptography von
CryptographyCryptography
Cryptographyprasham95
2.1K views22 Folien
Network security cryptographic hash function von
Network security  cryptographic hash functionNetwork security  cryptographic hash function
Network security cryptographic hash functionMijanur Rahman Milon
3.3K views22 Folien
Cryptography von
CryptographyCryptography
CryptographyRutuja Solkar
2.4K views10 Folien
Cryptography Intro von
Cryptography IntroCryptography Intro
Cryptography IntroChristopher Martin
7.1K views17 Folien
Cryptography von
CryptographyCryptography
Cryptographyamiable_indian
4.7K views31 Folien

Más contenido relacionado

Was ist angesagt?

CRYPTOGRAPHY AND NETWORK SECURITY von
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYKathirvel Ayyaswamy
5.9K views135 Folien
Cryptography von
CryptographyCryptography
CryptographySagar Janagonda
6.4K views18 Folien
Hash function von
Hash function Hash function
Hash function Salman Memon
6.5K views4 Folien
Message Authentication Code & HMAC von
Message Authentication Code & HMACMessage Authentication Code & HMAC
Message Authentication Code & HMACKrishna Gehlot
16.5K views20 Folien
Key Management and Distribution von
Key Management and DistributionKey Management and Distribution
Key Management and DistributionSyed Bahadur Shah
2.1K views32 Folien
Encryption algorithms von
Encryption algorithmsEncryption algorithms
Encryption algorithmstrilokchandra prakash
2.6K views37 Folien

Was ist angesagt?(20)

Message Authentication Code & HMAC von Krishna Gehlot
Message Authentication Code & HMACMessage Authentication Code & HMAC
Message Authentication Code & HMAC
Krishna Gehlot16.5K views
Block Ciphers and the Data Encryption Standard von Dr.Florence Dayana
Block Ciphers and the Data Encryption StandardBlock Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption Standard
Dr.Florence Dayana3.3K views
Introduction to Cryptography von Seema Goel
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
Seema Goel1.8K views
Cryptography von gueste4c97e
CryptographyCryptography
Cryptography
gueste4c97e12.9K views
Cryptography Fundamentals von Duy Do Phan
Cryptography FundamentalsCryptography Fundamentals
Cryptography Fundamentals
Duy Do Phan2.4K views
Message Authentication von chauhankapil
Message AuthenticationMessage Authentication
Message Authentication
chauhankapil1.7K views
Cryptographic Hashing Functions von Yusuf Uzun
Cryptographic Hashing FunctionsCryptographic Hashing Functions
Cryptographic Hashing Functions
Yusuf Uzun2.7K views

Destacado

The des algorithm illustrated von
The des algorithm illustratedThe des algorithm illustrated
The des algorithm illustratedNIKKHILK111
4.4K views24 Folien
Data Encryption Standard von
Data Encryption StandardData Encryption Standard
Data Encryption StandardAmirul Wiramuda
3K views14 Folien
Data encryption standard von
Data encryption standardData encryption standard
Data encryption standardPrasad Prabhu
5.1K views1 Folie
Web Mining & Text Mining von
Web Mining & Text MiningWeb Mining & Text Mining
Web Mining & Text MiningHemant Sharma
14.1K views17 Folien
Design and Simulation Triple-DES von
Design and Simulation Triple-DESDesign and Simulation Triple-DES
Design and Simulation Triple-DESchatsiri
3K views34 Folien
Triple Data Encryption Standard (t-DES) von
Triple Data Encryption Standard (t-DES) Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Hardik Manocha
4.7K views13 Folien

Destacado(17)

The des algorithm illustrated von NIKKHILK111
The des algorithm illustratedThe des algorithm illustrated
The des algorithm illustrated
NIKKHILK1114.4K views
Data encryption standard von Prasad Prabhu
Data encryption standardData encryption standard
Data encryption standard
Prasad Prabhu5.1K views
Web Mining & Text Mining von Hemant Sharma
Web Mining & Text MiningWeb Mining & Text Mining
Web Mining & Text Mining
Hemant Sharma14.1K views
Design and Simulation Triple-DES von chatsiri
Design and Simulation Triple-DESDesign and Simulation Triple-DES
Design and Simulation Triple-DES
chatsiri3K views
Triple Data Encryption Standard (t-DES) von Hardik Manocha
Triple Data Encryption Standard (t-DES) Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES)
Hardik Manocha4.7K views
Double DES & Triple DES von Hemant Sharma
Double DES & Triple DESDouble DES & Triple DES
Double DES & Triple DES
Hemant Sharma35.2K views
Data Encryption Standard (DES) von Haris Ahmed
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
Haris Ahmed34.1K views
Chapter 3: Block Ciphers and the Data Encryption Standard von Shafaan Khaliq Bhatti
Chapter 3: Block Ciphers and the Data Encryption StandardChapter 3: Block Ciphers and the Data Encryption Standard
Chapter 3: Block Ciphers and the Data Encryption Standard
Shafaan Khaliq Bhatti12.8K views
block ciphers von Asad Ali
block ciphersblock ciphers
block ciphers
Asad Ali23.9K views
Network security unit 1,2,3 von WE-IT TUTORIALS
Network security unit 1,2,3 Network security unit 1,2,3
Network security unit 1,2,3
WE-IT TUTORIALS27.5K views

Similar a Encryption

Information and data security block cipher and the data encryption standard (... von
Information and data security block cipher and the data encryption standard (...Information and data security block cipher and the data encryption standard (...
Information and data security block cipher and the data encryption standard (...Mazin Alwaaly
2.1K views35 Folien
82 86 von
82 8682 86
82 86Editor IJARCET
1K views5 Folien
82 86 von
82 8682 86
82 86Editor IJARCET
425 views5 Folien
Seminar on Encryption and Authenticity von
Seminar on Encryption and AuthenticitySeminar on Encryption and Authenticity
Seminar on Encryption and AuthenticityHardik Manocha
1.1K views31 Folien
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A... von
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...editor1knowledgecuddle
272 views8 Folien
IMAGE SECURITY BY 3 DES.pdf von
IMAGE SECURITY BY 3 DES.pdfIMAGE SECURITY BY 3 DES.pdf
IMAGE SECURITY BY 3 DES.pdfDhamuKing1
22 views14 Folien

Similar a Encryption(20)

Information and data security block cipher and the data encryption standard (... von Mazin Alwaaly
Information and data security block cipher and the data encryption standard (...Information and data security block cipher and the data encryption standard (...
Information and data security block cipher and the data encryption standard (...
Mazin Alwaaly2.1K views
Seminar on Encryption and Authenticity von Hardik Manocha
Seminar on Encryption and AuthenticitySeminar on Encryption and Authenticity
Seminar on Encryption and Authenticity
Hardik Manocha1.1K views
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A... von editor1knowledgecuddle
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
IMAGE SECURITY BY 3 DES.pdf von DhamuKing1
IMAGE SECURITY BY 3 DES.pdfIMAGE SECURITY BY 3 DES.pdf
IMAGE SECURITY BY 3 DES.pdf
DhamuKing122 views
Evolution of Cryptographic Algorithms and Performance Parameters von MangaiK4
Evolution of Cryptographic Algorithms and Performance ParametersEvolution of Cryptographic Algorithms and Performance Parameters
Evolution of Cryptographic Algorithms and Performance Parameters
MangaiK413 views
Evolution of Cryptographic Algorithms and Performance Parameters von MangaiK4
Evolution of Cryptographic Algorithms and Performance ParametersEvolution of Cryptographic Algorithms and Performance Parameters
Evolution of Cryptographic Algorithms and Performance Parameters
MangaiK47 views
Ch12 Cryptography it-slideshares.blogspot.com von phanleson
Ch12 Cryptography it-slideshares.blogspot.comCh12 Cryptography it-slideshares.blogspot.com
Ch12 Cryptography it-slideshares.blogspot.com
phanleson2K views
A Survey On Cryptography Algorithms von Bryce Nelson
A Survey On Cryptography AlgorithmsA Survey On Cryptography Algorithms
A Survey On Cryptography Algorithms
Bryce Nelson2 views
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx von ssuserd5e356
UNIT 4  CRYPTOGRAPHIC SYSTEMS.pptxUNIT 4  CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
ssuserd5e35611 views
Conventional Encryption NS2 von koolkampus
Conventional Encryption NS2Conventional Encryption NS2
Conventional Encryption NS2
koolkampus4.8K views

Más de IGZ Software house

Window server 2008 von
Window server 2008Window server 2008
Window server 2008IGZ Software house
4K views10 Folien
Types of server von
Types of serverTypes of server
Types of serverIGZ Software house
6K views5 Folien
Types of network von
Types of networkTypes of network
Types of networkIGZ Software house
2.2K views5 Folien
Ip address and subnetting von
Ip address and subnettingIp address and subnetting
Ip address and subnettingIGZ Software house
36.9K views49 Folien
Group policy management window server 2008r2 von
Group policy management window server 2008r2Group policy management window server 2008r2
Group policy management window server 2008r2IGZ Software house
3.9K views8 Folien
FSMO von
FSMO FSMO
FSMO IGZ Software house
1.5K views10 Folien

Más de IGZ Software house(20)

Group policy management window server 2008r2 von IGZ Software house
Group policy management window server 2008r2Group policy management window server 2008r2
Group policy management window server 2008r2
IGZ Software house3.9K views

Último

Career Building in AI - Technologies, Trends and Opportunities von
Career Building in AI - Technologies, Trends and OpportunitiesCareer Building in AI - Technologies, Trends and Opportunities
Career Building in AI - Technologies, Trends and OpportunitiesWebStackAcademy
47 views44 Folien
INT-244 Topic 6b Confucianism von
INT-244 Topic 6b ConfucianismINT-244 Topic 6b Confucianism
INT-244 Topic 6b ConfucianismS Meyer
49 views77 Folien
Introduction to AERO Supply Chain - #BEAERO Trainning program von
Introduction to AERO Supply Chain  - #BEAERO Trainning programIntroduction to AERO Supply Chain  - #BEAERO Trainning program
Introduction to AERO Supply Chain - #BEAERO Trainning programGuennoun Wajih
123 views78 Folien
Pharmaceutical Analysis PPT (BP 102T) von
Pharmaceutical Analysis PPT (BP 102T) Pharmaceutical Analysis PPT (BP 102T)
Pharmaceutical Analysis PPT (BP 102T) yakshpharmacy009
116 views29 Folien
ppt_dunarea.pptx von
ppt_dunarea.pptxppt_dunarea.pptx
ppt_dunarea.pptxvvvgeorgevvv
53 views5 Folien
11.30.23A Poverty and Inequality in America.pptx von
11.30.23A Poverty and Inequality in America.pptx11.30.23A Poverty and Inequality in America.pptx
11.30.23A Poverty and Inequality in America.pptxmary850239
181 views18 Folien

Último(20)

Career Building in AI - Technologies, Trends and Opportunities von WebStackAcademy
Career Building in AI - Technologies, Trends and OpportunitiesCareer Building in AI - Technologies, Trends and Opportunities
Career Building in AI - Technologies, Trends and Opportunities
WebStackAcademy47 views
INT-244 Topic 6b Confucianism von S Meyer
INT-244 Topic 6b ConfucianismINT-244 Topic 6b Confucianism
INT-244 Topic 6b Confucianism
S Meyer49 views
Introduction to AERO Supply Chain - #BEAERO Trainning program von Guennoun Wajih
Introduction to AERO Supply Chain  - #BEAERO Trainning programIntroduction to AERO Supply Chain  - #BEAERO Trainning program
Introduction to AERO Supply Chain - #BEAERO Trainning program
Guennoun Wajih123 views
Pharmaceutical Analysis PPT (BP 102T) von yakshpharmacy009
Pharmaceutical Analysis PPT (BP 102T) Pharmaceutical Analysis PPT (BP 102T)
Pharmaceutical Analysis PPT (BP 102T)
yakshpharmacy009116 views
11.30.23A Poverty and Inequality in America.pptx von mary850239
11.30.23A Poverty and Inequality in America.pptx11.30.23A Poverty and Inequality in America.pptx
11.30.23A Poverty and Inequality in America.pptx
mary850239181 views
Retail Store Scavenger Hunt.pptx von jmurphy154
Retail Store Scavenger Hunt.pptxRetail Store Scavenger Hunt.pptx
Retail Store Scavenger Hunt.pptx
jmurphy15453 views
Nelson_RecordStore.pdf von BrynNelson5
Nelson_RecordStore.pdfNelson_RecordStore.pdf
Nelson_RecordStore.pdf
BrynNelson550 views
UNIT NO 13 ORGANISMS AND POPULATION.pptx von Madhuri Bhande
UNIT NO 13 ORGANISMS AND POPULATION.pptxUNIT NO 13 ORGANISMS AND POPULATION.pptx
UNIT NO 13 ORGANISMS AND POPULATION.pptx
Madhuri Bhande43 views
JRN 362 - Lecture Twenty-Three (Epilogue) von Rich Hanley
JRN 362 - Lecture Twenty-Three (Epilogue)JRN 362 - Lecture Twenty-Three (Epilogue)
JRN 362 - Lecture Twenty-Three (Epilogue)
Rich Hanley43 views
12.5.23 Poverty and Precarity.pptx von mary850239
12.5.23 Poverty and Precarity.pptx12.5.23 Poverty and Precarity.pptx
12.5.23 Poverty and Precarity.pptx
mary850239514 views
NodeJS and ExpressJS.pdf von ArthyR3
NodeJS and ExpressJS.pdfNodeJS and ExpressJS.pdf
NodeJS and ExpressJS.pdf
ArthyR350 views

Encryption

  • 2. Security Protocols  • A security protocol can be defined as a security procedure for regulating data transmission between computers.  • If sensitive data is transmitted over the network in clear text, then anyone can read the data if they intercept it intentionally or accidentally.  • To preserve the data confidentiality, we use different encryption techniques.
  • 3. Methods of Encryption  At a broad level, regardless of the technique used for encryption, the generation of ciphers from the plaintext itself can be done in two ways:  Stream Ciphers  Block Ciphers  Stream Cipher  It involves the encryption of one plaintext bit at a time. The decryption also happens one bit at a time  Block Cipher  It involves the encryption of one block of text at a time. Decryption also takes one block of encrypted text at a time.
  • 4. Stream Cipher  Is one of the simplest way to encrypt data  When it is employed each bit of the data is encrypted using one bit of the key  Faster than block cipher.  Can encrypt the same message twice and the cipher text will be different  To make a stream cipher more difficult to crack, you can use a crypto key that varies in length  The process of continually varying the crypto key is known as One-time pad
  • 5. Block Cipher  Unlike Stream Cipher which encrypts every single bit, Block Cipher encrypts data in chunks of specific size  It specifies how much data should be encrypted on each pass and what size key should be applied to each block  E.g DES specifies that DES encrypted data should be processed in 64-bit blocks using a 56-bit key  You can use a number of algorithms when processing block cipher  The most basic is to simply take the data and break it into blocks while applying the key to each  A better solution is to take the earlier resultants from the algorithm and combine them with later keys
  • 6. XOR Operation  An interesting property of XOR is that when used twice, it produces the original data  Example:  Two binary numbers A=101, B=110  C = A XORB  C = 101 XOR110 = 011  Now, if we perform C XOR A, we will get B  011 XOR101 = 110 = B  Now, if we perform C XOR B, we will get A  011 XOR110 = 101 = A  This reversibility of XOR operations has many implications in cryptographic algorithms
  • 8. Data Encryption Standard  DES is a symmetric key encryption standard  Published in 1977 by the U.S. National Institute of Standards and Technology (NIST)  It is developed by IBM  NIST states the goal of DES as  The goal is to completely scramble the data and key so that every bit of the ciphertext depends on every bit of data and every bit of key.  With a good algorithm, there should be no correlation between the ciphertext and either the original data or key
  • 9. Data Encryption Standard  It was widely adopted by the industry for use in security products  a de facto standard  It takes as an input data blocks of 64-bits length and generates 64-bit cipher blocks  56-bit key size  Today, DES is not considered secure in its original form, but in its modified form (3DES) it is still considered secure
  • 10. DES Basic Operation  The algorithm, which is parameterized by a 56-bit key, has 16 distinct stages  It involves 16 rounds of plaintext transformations, including breaking the plain text into two 32 bit chunks that are swapped repeatedly during rounds  Each round expands 32bit block to 48bits,which are XORd with 48bit sub-key  The sub-key has been generated by a “key schedule”  An algorithm that creates the 48-bit sub-key based on the original 56bit key  After XORing with sub-key, 48-bit text is divided into 6-bit chunks (S-boxes), which then output 4-bit blocks  Reducing the overall plaintext block back to its original 32 bits
  • 11. Data Encryption Standard  most widely used block cipher in world  adopted in 1977 by NBS (now NIST)  as FIPS PUB 46  encrypts 64-bit data using 56-bit key  has widespread use  has seen considerable controversy over its security
  • 12. DES History  IBM developed Lucifer cipher  by team led by Feistel  used 64-bit data blocks with 128-bit key  then redeveloped as a commercial cipher with input from NSA and others  in 1973 NBS issued request for proposals for a national cipher standard  IBM submitted their revised Lucifer which was eventually accepted as the DES
  • 13. DES Design Controversy  although DES standard is public  had considerable controversy over design  in choice of 56-bit key  and because design criteria were classified  subsequent events and public analysis show in fact design was appropriate  DES has become widely used, especially in financial applications
  • 15. Strength of DES –Key Size  56-bit keys have 256 = 7.2 x 1016 values  brute force search looks hard  recent advances have shown is possible  in 1997 on Internet in a few months  in 1998 on dedicated h/w (EFF) in a few days  in 1999 above combined in 22hrs!  still must be able to recognize plaintext
  • 16. DES Encryption Strength  The strength of any encryption algorithm lies in the fact that it would take a long time to guess the used key  DES is 56 bits, that is the key to decrypt DES will be 56 bits in length  56 bit is made up of 8 bytes with 7 data bits (8*7=56)  Thus we can have 128 (27 ) values to choose from each character  Possible number of combinations through some simple math:  (128)8 = 72 thousand plus billion combinations
  • 17. DES Weaknesses  DES is considered non secure for very sensitive encryption.  It is crack able in a short period of time.  The short key length makes it easy to break  To overcome the weaknesses of DES, Triple DES is developed from original DES.
  • 19. Triple-DES  In Triple-DES, the DES algorithm is applied three times using two or three different 56-bit keys  This approach produces Ciphertext that is scrambled to the equivalent of a 112-bit or 168-bit key  (2)168 = 3.7 * (10)50  370 trillion, trillion, trillion, trillion combinations  Looking at the name, it may seem that 3DES makes your encryption three times more difficult to break  3DES actually makes your encryption five billion, trillion, trillion times harder to break that is 5 *(10)33
  • 20. Advanced Encryption Standard (AES)  In 1990s, the U.S. Government wanted to standardize a cryptographic algorithm, which was to be used universally.  Many proposals were submitted, and after a lot of debate, an algorithm called Rijndaelwas accepted  The need for coming up with a new algorithm is actually because of the perceived weakness in DES.  The 56-bit keys of DES were no longer considered safe against attacks based on exhaustive key searches, and the 64 bit blocks were also considered as weak  AES was based on 128 bits blocks, with 128-bit key
  • 21. IDEA  International Data Encryption Standard  Takes input of 64-bits plain text blocks  Produces output of 64-bits cipher text  Key Length: 128 bits
  • 22. AES  Worldwide a new cryptographic protocol standard was needed because:  Key used in DES was too small (56-bit)  Triple DES (3-DES) was too slow  IDEA was patent protected and slow  Advanced Encryption Standard  NIST chose an algorithm that supports a variety of Data Blockand Key Sizes  Two parameters (block size and key) can be chosen independently from 128, 160, 192, 224 and 256 bit sizes
  • 23. AES  According to AES Designers, the main features of AES are  Symmetric and parallel structure  Adapted to modern processors  Suited to smart cards  After seeing the review of IETF protocols( SSL, S/MIME, SSH) will have now modifications to accommodate these algorithms
  • 24. AES –The Advanced Encryption Standard  Rules for AES proposals 1. The algorithm must be a symmetric block cipher. 2. The full design must be public. 3. Key lengths of 128, 192, and 256 bits supported. 4. Both software and hardware implementations required 5. The algorithm must be public or licensed on nondiscriminatory terms.