new encryption technique
-
Upload
pradeep-kumar-reddy-reddy -
Category
Engineering
-
view
110 -
download
3
Transcript of new encryption technique
![Page 1: new encryption technique](https://reader030.fdocuments.in/reader030/viewer/2022032420/55a61d2d1a28ab674c8b4609/html5/thumbnails/1.jpg)
A Novel Encryption, Decryption Process Using
Permutation Choice
Y.S.R Engineering College Of Y.V.U::Proddatur
Presenting By :
I. Raja Sekhar Reddy
IV B.Tech CSE
1011102026
E-mail:[email protected]
![Page 2: new encryption technique](https://reader030.fdocuments.in/reader030/viewer/2022032420/55a61d2d1a28ab674c8b4609/html5/thumbnails/2.jpg)
• Introduction
• Existing Method
• Proposed Method
• Features
• Conclusion
Contents:
![Page 3: new encryption technique](https://reader030.fdocuments.in/reader030/viewer/2022032420/55a61d2d1a28ab674c8b4609/html5/thumbnails/3.jpg)
What is Security?
Why we need to provide Security?
How the security will be provided?
Introduction:
![Page 4: new encryption technique](https://reader030.fdocuments.in/reader030/viewer/2022032420/55a61d2d1a28ab674c8b4609/html5/thumbnails/4.jpg)
Encryption and Decryption:
![Page 5: new encryption technique](https://reader030.fdocuments.in/reader030/viewer/2022032420/55a61d2d1a28ab674c8b4609/html5/thumbnails/5.jpg)
• Confidentiality
• Integrity
• Authentication
• Non-repudiation
SECURITY SERVICES:
![Page 6: new encryption technique](https://reader030.fdocuments.in/reader030/viewer/2022032420/55a61d2d1a28ab674c8b4609/html5/thumbnails/6.jpg)
EXISTING METHOD:
![Page 7: new encryption technique](https://reader030.fdocuments.in/reader030/viewer/2022032420/55a61d2d1a28ab674c8b4609/html5/thumbnails/7.jpg)
![Page 8: new encryption technique](https://reader030.fdocuments.in/reader030/viewer/2022032420/55a61d2d1a28ab674c8b4609/html5/thumbnails/8.jpg)
The proposed method consists of
Encryption
Single round encryption
Key generation
Round function
Decryption
Single round decryption
Key generation
Round function
PROPOSED METHOD:
![Page 9: new encryption technique](https://reader030.fdocuments.in/reader030/viewer/2022032420/55a61d2d1a28ab674c8b4609/html5/thumbnails/9.jpg)
ENCRYPTION:
![Page 10: new encryption technique](https://reader030.fdocuments.in/reader030/viewer/2022032420/55a61d2d1a28ab674c8b4609/html5/thumbnails/10.jpg)
SINGLE ROUND ENCRYPTION:
![Page 11: new encryption technique](https://reader030.fdocuments.in/reader030/viewer/2022032420/55a61d2d1a28ab674c8b4609/html5/thumbnails/11.jpg)
KEY GENERATION:
![Page 12: new encryption technique](https://reader030.fdocuments.in/reader030/viewer/2022032420/55a61d2d1a28ab674c8b4609/html5/thumbnails/12.jpg)
ROUND FUNCTION:Selection inputs Round Function
S3 S2 S1 S0
0 0 0 0 F1
0 0 0 1 F2
0 0 1 0 F3
0 0 1 1 F4
0 1 0 0 F5
0 1 0 1 F6
0 1 1 0 F7
0 1 1 1 F8
1 0 0 0 F9
1 0 0 1 F10
1 0 1 0 F11
1 0 1 1 F12
1 1 0 0 F13
1 1 0 1 F14
1 1 1 0 F15
1 1 1 1 F16
![Page 13: new encryption technique](https://reader030.fdocuments.in/reader030/viewer/2022032420/55a61d2d1a28ab674c8b4609/html5/thumbnails/13.jpg)
DECRYPTION:
![Page 14: new encryption technique](https://reader030.fdocuments.in/reader030/viewer/2022032420/55a61d2d1a28ab674c8b4609/html5/thumbnails/14.jpg)
SINGLE ROUND DECRYPTION:
![Page 15: new encryption technique](https://reader030.fdocuments.in/reader030/viewer/2022032420/55a61d2d1a28ab674c8b4609/html5/thumbnails/15.jpg)
KEY GENERATION:
![Page 16: new encryption technique](https://reader030.fdocuments.in/reader030/viewer/2022032420/55a61d2d1a28ab674c8b4609/html5/thumbnails/16.jpg)
ROUND FUNCTION:Selection lines Round Function
S3 S2 S1 S0
0 0 0 0 F1
0 0 0 1 F2
0 0 1 0 F3
0 0 1 1 F4
0 1 0 0 F5
0 1 0 1 F6
0 1 1 0 F7
0 1 1 1 F8
1 0 0 0 F9
1 0 0 1 F10
1 0 1 0 F11
1 0 1 1 F12
1 1 0 0 F13
1 1 0 1 F14
1 1 1 0 F15
1 1 1 1 F16
![Page 17: new encryption technique](https://reader030.fdocuments.in/reader030/viewer/2022032420/55a61d2d1a28ab674c8b4609/html5/thumbnails/17.jpg)
FEATURES:
More secure
Key size will be 1024-bit
Plain text block size will be 2048-bit
Round function will be changed to round to round
![Page 18: new encryption technique](https://reader030.fdocuments.in/reader030/viewer/2022032420/55a61d2d1a28ab674c8b4609/html5/thumbnails/18.jpg)
The goal of the encryption algorithm designing is to frustrate the hackers andmakes the cryptanalysis difficult. The key value play more important role inencryption process. Altering each value of the plain text to get the final cipher textmake the cryptanalysis still more complex. The goal of the present paper is toincrease the security which makes complex to break. The round function andpermutation choices are not fixed, it is changed according to the user.
Conclusion:
![Page 19: new encryption technique](https://reader030.fdocuments.in/reader030/viewer/2022032420/55a61d2d1a28ab674c8b4609/html5/thumbnails/19.jpg)
Any Queries?
![Page 20: new encryption technique](https://reader030.fdocuments.in/reader030/viewer/2022032420/55a61d2d1a28ab674c8b4609/html5/thumbnails/20.jpg)
THANK YOU