COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMPLEMETATION
-
Upload
neelabja-manna -
Category
Documents
-
view
80 -
download
1
Transcript of COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMPLEMETATION
PRESENTED BY: 1.BISWAJIT DATTA (09123002030) 2.AVIRUP SAMANTA (09123002071) 3.ANAND MOHAN MASKARA (09123002057)
COMPARATIVE STUDY OF SYMMETRIC KEY CRYPTOGRAPHY AND NEW TECHNIQUE IMPLEMENTATION
INTRODUCTION
What is Cryptography?
Goal of Cryptography
HISTORY
The first use of cryptography in 1900 B.C.
PURPOSE OF CRYPTOGRAPHY
ConfidentialityAuthentication Integrity Non Repudiation Access Control
ENCRYPTION
DECRYPTION
PLAIN TEXT
PLAIN
TEXT
SENDER
CIPHERTEX
T RECEIVER
BASIC BLOCK DIAGRAM
BASIC TERMINOLOGIES
Encryption
Decryption
Cryptosystem
TECHNIQUES OF CRYPTOGRAPHY
Substitution Technique
Transposition Technique
ENCRYPTION ALGORITHM
Symmetric
Asymmetric
SYMMETRIC ALGORITHM
Encryption
Decryption
KeyPlaintext
Cipher text
OriginalPlaintext
Symmetric Cryptosystem
Data Encryption Standard (DES)Advance Encryption Standard (AES)
ASYMMETRIC ALGORITHM
Rivest Shamir Adleman (RSA) Encryption
Knapsack Algorithmplaintext
encryption
public keycipher text
decryption
private keycipher text plaintext
SIMPLE ENCRYPTION SCHEME(CAESAR’S CIPHER)
Substitution cipher:Plain text: a b c d e f g h I j k l m n o p q r s t u v w x y z
Cipher text: m n b v c x z a s d f g h j k l p o I u y t r e w q
Example: Plain text: HELLO WORLD Cipher text: KHOOR ZRUOG
SIMPLE ENCRYPTION SCHEME(RAIL FENCE TECHNIQUE)
H L O W R D
E L O L
The Rail Fence Technique is an example of Transposition Technique.
For example:
HELLO WORLDPlain text:
Cipher text: HLOWRDEL OL
SIMPLE ENCRYPTION SCHEME(VERNAM CIPHER TECHNIQUE)
Vernam cipher uses a one time pad.
Example:
Plain text: HELLO WORLD
Cipher text: YW}}~F~C}U
Padding:
SHARM QZNKP
DES (DATA ENCRYPTION STANDARD)
Example:Plain text: HELLO WORLD
Cipher text: m0dh19VD0DXSrvJOhMOaEg==
DES was designed by IBM in the 1970s and adopted by the National Bureau of Standards (NBS)
AES (ADVANCED ENCRYPTION STANDARD)
Example:Plain text: HELLO WORLD
Cipher text: TpXlULf/l9GQX30osRMxTQ==
128 Bit blocks128 bit keys
MODIFIED ENCRYPTION TECHNIQUE
Modified encryption technique involves splitting up a text into two parts, and then applying different symmetric key cryptographic technique on them.
PLAIN TEXT : HELLO WORLD
PART 1 PART 2
HELLO WORLD
For example:
MODIFIED ENCRYPTION TECHNIQUE
APPLYING DIFFERENT TECHNIQUES ON TWO PARTSPART 1 : HELLO
ENCRYPTED WITH CAESAR CIPHER: iffmp
PART 2: WORLD
ENCRYPTED WITH RAIL FENCE: olwrd
ENCRYPTED TEXT: iffmp olwrd
MODIFIED ENCRYPTION TECHNIQUE
Example: Hello World
Example: Hello World
MODIFIED ENCRYPTION TECHNIQUE
MODIFIED ENCRYPTION TECHNIQUE
Example: Hello World
Example: Hello World
MODIFIED ENCRYPTION TECHNIQUE
MODIFIED ENCRYPTION TECHNIQUE
MODIFIED ENCRYPTION TECHNIQUE
Advantage
Disadvantage
FUTURE SCOPE
In future this technique can be modified by implementing more encryption techniques of cryptography to make the data more secure.
The key can be conjugated as a single key.
CONCLUSION
Once the method has withstood all attacks for sufficient length of time it may be used with a reasonable amount of confidence.
THANK YOU