COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMPLEMETATION

26
PRESENTED BY: 1.BISWAJIT DATTA (09123002030) 2.AVIRUP SAMANTA (09123002071) 3.ANAND MOHAN MASKARA COMPARATIVE STUDY OF SYMMETRIC KEY CRYPTOGRAPHY AND NEW TECHNIQUE IMPLEMENTATION

Transcript of COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMPLEMETATION

Page 1: COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMPLEMETATION

PRESENTED BY: 1.BISWAJIT DATTA (09123002030) 2.AVIRUP SAMANTA (09123002071) 3.ANAND MOHAN MASKARA (09123002057)

COMPARATIVE STUDY OF SYMMETRIC KEY CRYPTOGRAPHY AND NEW TECHNIQUE IMPLEMENTATION

Page 2: COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMPLEMETATION

INTRODUCTION

What is Cryptography?

Goal of Cryptography

Page 3: COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMPLEMETATION

HISTORY

The first use of cryptography in 1900 B.C.

Page 4: COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMPLEMETATION

PURPOSE OF CRYPTOGRAPHY

ConfidentialityAuthentication Integrity Non Repudiation Access Control

Page 5: COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMPLEMETATION

ENCRYPTION

DECRYPTION

PLAIN TEXT

PLAIN

TEXT

SENDER

CIPHERTEX

T RECEIVER

BASIC BLOCK DIAGRAM

Page 6: COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMPLEMETATION

BASIC TERMINOLOGIES

Encryption

Decryption

Cryptosystem

Page 7: COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMPLEMETATION

TECHNIQUES OF CRYPTOGRAPHY

Substitution Technique

Transposition Technique

Page 8: COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMPLEMETATION

ENCRYPTION ALGORITHM

Symmetric

Asymmetric

Page 9: COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMPLEMETATION

SYMMETRIC ALGORITHM

Encryption

Decryption

KeyPlaintext

Cipher text

OriginalPlaintext

Symmetric Cryptosystem

Data Encryption Standard (DES)Advance Encryption Standard (AES)

Page 10: COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMPLEMETATION

ASYMMETRIC ALGORITHM

Rivest Shamir Adleman (RSA) Encryption

Knapsack Algorithmplaintext

encryption

public keycipher text

decryption

private keycipher text plaintext

Page 11: COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMPLEMETATION

SIMPLE ENCRYPTION SCHEME(CAESAR’S CIPHER)

Substitution cipher:Plain text: a b c d e f g h I j k l m n o p q r s t u v w x y z

Cipher text: m n b v c x z a s d f g h j k l p o I u y t r e w q

Example: Plain text: HELLO WORLD Cipher text: KHOOR ZRUOG

Page 12: COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMPLEMETATION

SIMPLE ENCRYPTION SCHEME(RAIL FENCE TECHNIQUE)

H L O W R D

E L O L

The Rail Fence Technique is an example of Transposition Technique.

For example:

HELLO WORLDPlain text:

Cipher text: HLOWRDEL OL

Page 13: COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMPLEMETATION

SIMPLE ENCRYPTION SCHEME(VERNAM CIPHER TECHNIQUE)

Vernam cipher uses a one time pad.

Example:

Plain text: HELLO WORLD

Cipher text: YW}}~F~C}U

Padding:

SHARM QZNKP

Page 14: COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMPLEMETATION

DES (DATA ENCRYPTION STANDARD)

Example:Plain text: HELLO WORLD

Cipher text: m0dh19VD0DXSrvJOhMOaEg==

DES was designed by IBM in the 1970s and adopted by the National Bureau of Standards (NBS)

Page 15: COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMPLEMETATION

AES (ADVANCED ENCRYPTION STANDARD)

Example:Plain text: HELLO WORLD

Cipher text: TpXlULf/l9GQX30osRMxTQ==

128 Bit blocks128 bit keys

Page 16: COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMPLEMETATION

MODIFIED ENCRYPTION TECHNIQUE

Modified encryption technique involves splitting up a text into two parts, and then applying different symmetric key cryptographic technique on them.

PLAIN TEXT : HELLO WORLD

PART 1 PART 2

HELLO WORLD

For example:

Page 17: COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMPLEMETATION

MODIFIED ENCRYPTION TECHNIQUE

APPLYING DIFFERENT TECHNIQUES ON TWO PARTSPART 1 : HELLO

ENCRYPTED WITH CAESAR CIPHER: iffmp

PART 2: WORLD

ENCRYPTED WITH RAIL FENCE: olwrd

ENCRYPTED TEXT: iffmp olwrd

Page 18: COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMPLEMETATION

MODIFIED ENCRYPTION TECHNIQUE

Example: Hello World

Page 19: COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMPLEMETATION

Example: Hello World

MODIFIED ENCRYPTION TECHNIQUE

Page 20: COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMPLEMETATION

MODIFIED ENCRYPTION TECHNIQUE

Example: Hello World

Page 21: COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMPLEMETATION

Example: Hello World

MODIFIED ENCRYPTION TECHNIQUE

Page 22: COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMPLEMETATION

MODIFIED ENCRYPTION TECHNIQUE

Page 23: COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMPLEMETATION

MODIFIED ENCRYPTION TECHNIQUE

Advantage

Disadvantage

Page 24: COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMPLEMETATION

FUTURE SCOPE

In future this technique can be modified by implementing more encryption techniques of cryptography to make the data more secure.

The key can be conjugated as a single key.

Page 25: COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMPLEMETATION

CONCLUSION

Once the method has withstood all attacks for sufficient length of time it may be used with a reasonable amount of confidence.

Page 26: COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMPLEMETATION

THANK YOU