SlideShare a Scribd company logo
1 of 37
Encryption Algorithms
Definition
• An algorithm is basically a procedure or a formula for
solving a data snooping problem. An encryption
algorithm is a set of mathematical procedure for
performing encryption on data. Through the use of such
an algorithm, information is made in the cipher text and
requires the use of a key to transforming the data into its
original form.
• This brings us to the concept of cryptography that has
long been used in information security in communication
systems.
Cryptography
• Cryptography is a method of using advanced mathematical
principles in storing and transmitting data in a particular form
so that only those whom it is intended can read and process
it.
• Encryption is a key concept in cryptography – It is a process
whereby a message is encoded in a format that cannot be
read or understood by an eavesdropper. The technique is old
and was first used by Caesar to encrypt his messages using
Caesar cipher.
• A plain text from a user can be encrypted to a cipher text, then
send through a communication channel and no eavesdropper
can interfere with the plain text. When it reaches the receiver
end, the cipher text is decrypted to the original plain text.
Cryptography Terms
• Encryption: It is the process of locking up information
using cryptography. Information that has been locked
this way is encrypted.
• Decryption: The process of unlocking the encrypted
information using cryptographic techniques.
• Key: A secret like a password used to encrypt and
decrypt information. There are a few different types of
keys used in cryptography.
• Steganography: It is actually the science of hiding
information from people who would snoop on you. The
difference between steganography and encryption is
that the would-be snoopers may not be able to tell
there’s any hidden information in the first place.
Encoding
• Encoding is the process of converting data into a format
required for a number of information processing needs,
including:
 Program compiling and execution
 Application data processing, such as file conversion
 The type of code used for converting characters is known as
American Standard Code for Information Interchange (ASCII), the
most commonly used encoding scheme for files that contain text.
ASCII contains printable and nonprintable characters that represent
uppercase and lowercase letters, symbols, punctuation marks and
numbers. A unique number is assigned to some characters
 The standard ASCII scheme has only zero to 127 character
positions; 128 through 255 are undefined. The problem of
undefined characters is solved by Unicode encoding, which
assigns a number to every character used worldwide. Other
types of codes include BinHex, Uuencode (UNIX to UNIX
encoding) and Multipurpose Internet Mail Extensions (MIME).
 Encoding is also used to reduce the size of audio and video
files. Each audio and video file format has a corresponding
coder-decoder (codec) program that is used to code it into the
appropriate format and then decodes for playback.
 Encoding should not be confused with encryption, which hides
content. Both techniques are used extensively in the
networking, software programming, wireless communication
and storage fields
Decoding
• Decoding is the reverse process of encoding which is to
extract the information from the converted format.
• For example, decoding Binary Coded Decimal requires
some simple calculations in base-2 arithmetic. Decoding
ASCII values is a straightforward process since there is
a one to one mapping between characters and numbers.
The term decoding is also used for digital to analog
conversion. In the filed of communication, decoding is
the process of converting received messages in to a
message written using a specific language.
• This process is not straight forward as the previously
mentioned decoding schemes, since the message
could be tampered due to the noise in the channels
used for communication. Decoding methods such as
Ideal observer decoding, maximum likelihood
decoding, minimum distance decoding, etc are used
for decoding messages sent via noisy channels.
Types of Methods
• In encryption algorithm we have two types .They are
 Symmetric Encryption
 Asymmetric Encryption
Symmetric Encryption
• This is the simplest kind of encryption that involves only
one secret key to cipher and decipher information.
Symmetrical encryption is an old and best-known
technique.
• It uses a secret key that can either be a number, a word
or a string of random letters. It is a blended with the plain
text of a message to change the content in a particular
way. The sender and the recipient should know the
secret key that is used to encrypt and decrypt all the
messages
• .Blowfish, AES, RC4, DES, RC5, and RC6 are examples
of symmetric encryption
Asymmetric Encryption
Definition
• A message that is encrypted using a public key can only
be decrypted using a private key, while also, a message
encrypted using a private key can be decrypted using a
public key. Security of the public key is not required
because it is publicly available and can be passed over
the internet. Asymmetric key has a far better power in
ensuring the security of information transmitted during
communication.
• Popular asymmetric key encryption algorithm includes
EIGamal, RSA, DSA, Elliptic curve techniques, PKCS.
1. AES
• AES is an encryption standard chosen by the National
Institute of Standards and Technology(NIST) , USA to protect
classified information. It has been accepted world wide as a
desirable algorithm to encrypt sensitive data.
• It is a block cipher which operates on block size of 128 bits for
both encrypting as well as decrypting
Working:
• AES basically repeats 4 major functions to encrypt data. It
takes 128 bit block of data and a key and gives a cipher text
as output.
 Sub Bytes
 Shift Rows
 Mix Columns
 Add Key
• The number of rounds performed by the
algorithm strictly depends on the size of key
Key Size(in bits) Rounds
128.....................................10
192.....................................12
256.....................................14
The larger the number of keys the more secure will
be the data.
https://www.youtube.com/watch?v=nC0mjaUZd8w
Attacks in AES
• It is similar to the exhaustive key search attack(brute
force attack = trying all the possible set of keys) but it is
adaptive. It is 4 times better than the exhaustive key
search.
• There are more advanced attack on AES-256 bits like
the Related key Attack , which involves several distinct
keys linked together by a common relation which
reduces the keyspace to 99.5 which is also infeasible
2.DES
• DES use symmetric system means both sender and
receiver side we used same key for encryption and
decryption
• It used 64 bits of block for encryption and decryption.
Sixteen rounds of transportation and substitution are
performed in order to achieve DES
DES Working
• It is a symmetric block encryption algorithm when 64-bit
blocks of plain text go in , 64-bit blocks of cipher text
come out.
• It uses a 64-bit key:56 bits make up the true key, and 8
bits are used for parity
• When it applied to data, it divides the message in to
blocks and operates on them one at a time .Then the
result is64-bit blocks of cipher text
DES Modes
• In Block ciphers have several modes of
operation. Each mode specifies how a block
cipher will operate
Electronic Code Book
Cipher Block Chaining
Cipher Feedback
Output Feedback
Counter Mode
Irrational Numbers
• These are similar to data
• Sequences generated form chaotic system, are
infinite and non-cyclic.
• Using irrational numbers to encrypt will
provide higher security without strict chaos
synchronization
Triple DES
3.RC4, RC5, RC6
• A series of symmetric algorithms developed by RSA
Security
 RC4 : A variable key-size stream cipher with byte-
oriented operations . The algorithm is based on the
random permutation
 RC5 : a parameterized algorithm with a variable block
size, a variable key size, and a variable number of
rounds. Allowable choices for the block size are 32 bits
(for experimentation and evaluation purposes only), 64
bits (for use a drop-in replacement for DES), and 128
bits.
• The number of rounds can range from 0 to 255, while the
key can range from 0 bits to 2040 bits in size. RC5 has
three routines: key expansion, encryption, and
decryption
• RC6 -- a block cipher based on RC5. RC6 is a
parameterized algorithm where the block size, the key
size, and the number of rounds are variable. The upper
limit on the key size is 2040 bits. RC6 adds two features
to RC5: the inclusion of integer multiplication and the use
of four 4-bit working registers instead of RC5��s two 2-
bit registers.
4.Kerberos
• Require that each client (each request for Service) prove
it’s identity.
• Does not require user to enter password every time a
service is requested.
• It uses Needham-Schroedar Algorithm
• Kerberos assumes that network connections (rather than
servers and work stations) are the weak link in network
security
• The Needham-Schroeder Public-key Protocol provides
mutual authentication
5.MD5
• The MD5 hashing algorithm was created in the early
1990’s, and is one of a family of Message-Digest
algorithms. Several of these were developed by Ronald
Rivest
• Ronald Rivest is a cryptographer with significant
contributions to the field. He is a professor at MIT. He’s
also one of the inventors of RSA Algorithm . He’s a giant
in the cryptography world
MD5 Working
• Md5 algorithm first divides the input into blocks of 512
bits each. 64 Bits recording the length of the original
input are inserted at the end of the last block. If the last
block is less than 512 bits, some extra bits are padded to
the end.
• The algorithm consists of a set of buffers and tables to
combine and shift the data through five computational
steps .Four rounds of computation are done to compute
the hash of the input value
• MD5 is quite computationally efficient, compared to other
hashing functions
MD5 Collisions
• In 1996, collisions were found in MD%. Further exploits
were demonstrated through the beginning of the 21st
Century.
• This led to search for other hashing algorithms, but MD5
is still in widespread use today
MD5 in Action
• MD5 is in widespread use in the Transport Layer Security(TLS)
protocol on which HTTPS is based
• In fact , even thought collisions were found with MD5 as early
as 1996, it was still included in TLS as late 2008. That said
MD5 was banned at that time in TLS Certificates but not for
other aspects of TLS
• Researchers have devised attacks taking advantages of these
weaknesses. Such technique are called Security Losses from
Obsolete and Truncated transcript Hashes, or SLOTH. With
significant but easily obtainable computing power ,
impersonation attacks can be conducted on TLS based
websites and applications
6. SHA
• SHA Algorithm was developed by NIST along with NSA
• In 1993, SHA was published as a Federal Information
Processing Standard
• This algorithm uses Asymmetric Encryption
• It has following Versions:
 SHA-1
 SHA-256
 SHA-384
 SHA-526
SHA1 and SHA 512 Iteration
7.RSA
• RSA (Rivest–Shamir–Adleman) is an algorithm used
by modern computers to encrypt and decrypt messages.
It is an asymmetric cryptographic algorithm. Asymmetric
means that there are two different keys. This is also
called public key cryptography, because one of the keys
can be given to anyone. The other key must be kept
private. The algorithm is based on the fact that finding
the factors of a large composite number is difficult: when
the integers are prime numbers, the problem is called
prime factorization. It is also a key pair (public and
private key) generator.
• Encryption:
c=m ^ e mod n
 Decryption:
c ^ d = m mod n

More Related Content

What's hot

Different types of Symmetric key Cryptography
Different types of Symmetric key CryptographyDifferent types of Symmetric key Cryptography
Different types of Symmetric key Cryptography
subhradeep mitra
 

What's hot (20)

Cryptography
CryptographyCryptography
Cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
block ciphers
block ciphersblock ciphers
block ciphers
 
MAC-Message Authentication Codes
MAC-Message Authentication CodesMAC-Message Authentication Codes
MAC-Message Authentication Codes
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
User authentication
User authenticationUser authentication
User authentication
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Elliptic curve cryptography
Elliptic curve cryptographyElliptic curve cryptography
Elliptic curve cryptography
 
Different types of Symmetric key Cryptography
Different types of Symmetric key CryptographyDifferent types of Symmetric key Cryptography
Different types of Symmetric key Cryptography
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
 
Cryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipherCryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipher
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementation
 
cryptography
cryptographycryptography
cryptography
 
cryptography ppt free download
cryptography ppt free downloadcryptography ppt free download
cryptography ppt free download
 
Cryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie BrownCryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie Brown
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
 
Cryptography
CryptographyCryptography
Cryptography
 

Similar to Encryption algorithms

Similar to Encryption algorithms (20)

Encryption pres
Encryption presEncryption pres
Encryption pres
 
groupWork.pptx
groupWork.pptxgroupWork.pptx
groupWork.pptx
 
Basic Cryptography.pdf
Basic Cryptography.pdfBasic Cryptography.pdf
Basic Cryptography.pdf
 
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4  CRYPTOGRAPHIC SYSTEMS.pptxUNIT 4  CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
 
CISSP - Chapter 3 - Cryptography
CISSP - Chapter 3 - CryptographyCISSP - Chapter 3 - Cryptography
CISSP - Chapter 3 - Cryptography
 
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
 
Pgp1
Pgp1Pgp1
Pgp1
 
Fundamentals of Information Encryption
Fundamentals of Information EncryptionFundamentals of Information Encryption
Fundamentals of Information Encryption
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
Cryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding informationCryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding information
 
Seminar on Encryption and Authenticity
Seminar on Encryption and AuthenticitySeminar on Encryption and Authenticity
Seminar on Encryption and Authenticity
 
Lesson 1
Lesson 1Lesson 1
Lesson 1
 
82 86
82 8682 86
82 86
 
82 86
82 8682 86
82 86
 
Slidecast - Workshop
Slidecast - WorkshopSlidecast - Workshop
Slidecast - Workshop
 
IS413 Topic 5.pptx
IS413 Topic 5.pptxIS413 Topic 5.pptx
IS413 Topic 5.pptx
 
Cryptography : The Art of Secured Messaging
Cryptography : The Art of Secured MessagingCryptography : The Art of Secured Messaging
Cryptography : The Art of Secured Messaging
 
Network security
Network securityNetwork security
Network security
 
DES- Data Encryption Standard
DES- Data Encryption StandardDES- Data Encryption Standard
DES- Data Encryption Standard
 

Recently uploaded

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Recently uploaded (20)

Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 

Encryption algorithms

  • 2. Definition • An algorithm is basically a procedure or a formula for solving a data snooping problem. An encryption algorithm is a set of mathematical procedure for performing encryption on data. Through the use of such an algorithm, information is made in the cipher text and requires the use of a key to transforming the data into its original form. • This brings us to the concept of cryptography that has long been used in information security in communication systems.
  • 3. Cryptography • Cryptography is a method of using advanced mathematical principles in storing and transmitting data in a particular form so that only those whom it is intended can read and process it. • Encryption is a key concept in cryptography – It is a process whereby a message is encoded in a format that cannot be read or understood by an eavesdropper. The technique is old and was first used by Caesar to encrypt his messages using Caesar cipher. • A plain text from a user can be encrypted to a cipher text, then send through a communication channel and no eavesdropper can interfere with the plain text. When it reaches the receiver end, the cipher text is decrypted to the original plain text.
  • 4. Cryptography Terms • Encryption: It is the process of locking up information using cryptography. Information that has been locked this way is encrypted. • Decryption: The process of unlocking the encrypted information using cryptographic techniques. • Key: A secret like a password used to encrypt and decrypt information. There are a few different types of keys used in cryptography. • Steganography: It is actually the science of hiding information from people who would snoop on you. The difference between steganography and encryption is that the would-be snoopers may not be able to tell there’s any hidden information in the first place.
  • 5. Encoding • Encoding is the process of converting data into a format required for a number of information processing needs, including:  Program compiling and execution  Application data processing, such as file conversion  The type of code used for converting characters is known as American Standard Code for Information Interchange (ASCII), the most commonly used encoding scheme for files that contain text. ASCII contains printable and nonprintable characters that represent uppercase and lowercase letters, symbols, punctuation marks and numbers. A unique number is assigned to some characters
  • 6.  The standard ASCII scheme has only zero to 127 character positions; 128 through 255 are undefined. The problem of undefined characters is solved by Unicode encoding, which assigns a number to every character used worldwide. Other types of codes include BinHex, Uuencode (UNIX to UNIX encoding) and Multipurpose Internet Mail Extensions (MIME).  Encoding is also used to reduce the size of audio and video files. Each audio and video file format has a corresponding coder-decoder (codec) program that is used to code it into the appropriate format and then decodes for playback.  Encoding should not be confused with encryption, which hides content. Both techniques are used extensively in the networking, software programming, wireless communication and storage fields
  • 7. Decoding • Decoding is the reverse process of encoding which is to extract the information from the converted format. • For example, decoding Binary Coded Decimal requires some simple calculations in base-2 arithmetic. Decoding ASCII values is a straightforward process since there is a one to one mapping between characters and numbers. The term decoding is also used for digital to analog conversion. In the filed of communication, decoding is the process of converting received messages in to a message written using a specific language.
  • 8. • This process is not straight forward as the previously mentioned decoding schemes, since the message could be tampered due to the noise in the channels used for communication. Decoding methods such as Ideal observer decoding, maximum likelihood decoding, minimum distance decoding, etc are used for decoding messages sent via noisy channels.
  • 9. Types of Methods • In encryption algorithm we have two types .They are  Symmetric Encryption  Asymmetric Encryption
  • 10. Symmetric Encryption • This is the simplest kind of encryption that involves only one secret key to cipher and decipher information. Symmetrical encryption is an old and best-known technique. • It uses a secret key that can either be a number, a word or a string of random letters. It is a blended with the plain text of a message to change the content in a particular way. The sender and the recipient should know the secret key that is used to encrypt and decrypt all the messages • .Blowfish, AES, RC4, DES, RC5, and RC6 are examples of symmetric encryption
  • 11.
  • 13. Definition • A message that is encrypted using a public key can only be decrypted using a private key, while also, a message encrypted using a private key can be decrypted using a public key. Security of the public key is not required because it is publicly available and can be passed over the internet. Asymmetric key has a far better power in ensuring the security of information transmitted during communication. • Popular asymmetric key encryption algorithm includes EIGamal, RSA, DSA, Elliptic curve techniques, PKCS.
  • 14. 1. AES • AES is an encryption standard chosen by the National Institute of Standards and Technology(NIST) , USA to protect classified information. It has been accepted world wide as a desirable algorithm to encrypt sensitive data. • It is a block cipher which operates on block size of 128 bits for both encrypting as well as decrypting Working: • AES basically repeats 4 major functions to encrypt data. It takes 128 bit block of data and a key and gives a cipher text as output.  Sub Bytes  Shift Rows  Mix Columns  Add Key
  • 15. • The number of rounds performed by the algorithm strictly depends on the size of key Key Size(in bits) Rounds 128.....................................10 192.....................................12 256.....................................14 The larger the number of keys the more secure will be the data. https://www.youtube.com/watch?v=nC0mjaUZd8w
  • 16.
  • 17.
  • 18. Attacks in AES • It is similar to the exhaustive key search attack(brute force attack = trying all the possible set of keys) but it is adaptive. It is 4 times better than the exhaustive key search. • There are more advanced attack on AES-256 bits like the Related key Attack , which involves several distinct keys linked together by a common relation which reduces the keyspace to 99.5 which is also infeasible
  • 19. 2.DES • DES use symmetric system means both sender and receiver side we used same key for encryption and decryption • It used 64 bits of block for encryption and decryption. Sixteen rounds of transportation and substitution are performed in order to achieve DES
  • 20. DES Working • It is a symmetric block encryption algorithm when 64-bit blocks of plain text go in , 64-bit blocks of cipher text come out. • It uses a 64-bit key:56 bits make up the true key, and 8 bits are used for parity • When it applied to data, it divides the message in to blocks and operates on them one at a time .Then the result is64-bit blocks of cipher text
  • 21. DES Modes • In Block ciphers have several modes of operation. Each mode specifies how a block cipher will operate Electronic Code Book Cipher Block Chaining Cipher Feedback Output Feedback Counter Mode
  • 22. Irrational Numbers • These are similar to data • Sequences generated form chaotic system, are infinite and non-cyclic. • Using irrational numbers to encrypt will provide higher security without strict chaos synchronization
  • 23.
  • 25. 3.RC4, RC5, RC6 • A series of symmetric algorithms developed by RSA Security  RC4 : A variable key-size stream cipher with byte- oriented operations . The algorithm is based on the random permutation  RC5 : a parameterized algorithm with a variable block size, a variable key size, and a variable number of rounds. Allowable choices for the block size are 32 bits (for experimentation and evaluation purposes only), 64 bits (for use a drop-in replacement for DES), and 128 bits.
  • 26. • The number of rounds can range from 0 to 255, while the key can range from 0 bits to 2040 bits in size. RC5 has three routines: key expansion, encryption, and decryption • RC6 -- a block cipher based on RC5. RC6 is a parameterized algorithm where the block size, the key size, and the number of rounds are variable. The upper limit on the key size is 2040 bits. RC6 adds two features to RC5: the inclusion of integer multiplication and the use of four 4-bit working registers instead of RC5��s two 2- bit registers.
  • 27. 4.Kerberos • Require that each client (each request for Service) prove it’s identity. • Does not require user to enter password every time a service is requested. • It uses Needham-Schroedar Algorithm • Kerberos assumes that network connections (rather than servers and work stations) are the weak link in network security • The Needham-Schroeder Public-key Protocol provides mutual authentication
  • 28.
  • 29. 5.MD5 • The MD5 hashing algorithm was created in the early 1990’s, and is one of a family of Message-Digest algorithms. Several of these were developed by Ronald Rivest • Ronald Rivest is a cryptographer with significant contributions to the field. He is a professor at MIT. He’s also one of the inventors of RSA Algorithm . He’s a giant in the cryptography world
  • 30. MD5 Working • Md5 algorithm first divides the input into blocks of 512 bits each. 64 Bits recording the length of the original input are inserted at the end of the last block. If the last block is less than 512 bits, some extra bits are padded to the end. • The algorithm consists of a set of buffers and tables to combine and shift the data through five computational steps .Four rounds of computation are done to compute the hash of the input value • MD5 is quite computationally efficient, compared to other hashing functions
  • 31. MD5 Collisions • In 1996, collisions were found in MD%. Further exploits were demonstrated through the beginning of the 21st Century. • This led to search for other hashing algorithms, but MD5 is still in widespread use today
  • 32. MD5 in Action • MD5 is in widespread use in the Transport Layer Security(TLS) protocol on which HTTPS is based • In fact , even thought collisions were found with MD5 as early as 1996, it was still included in TLS as late 2008. That said MD5 was banned at that time in TLS Certificates but not for other aspects of TLS • Researchers have devised attacks taking advantages of these weaknesses. Such technique are called Security Losses from Obsolete and Truncated transcript Hashes, or SLOTH. With significant but easily obtainable computing power , impersonation attacks can be conducted on TLS based websites and applications
  • 33. 6. SHA • SHA Algorithm was developed by NIST along with NSA • In 1993, SHA was published as a Federal Information Processing Standard • This algorithm uses Asymmetric Encryption • It has following Versions:  SHA-1  SHA-256  SHA-384  SHA-526
  • 34.
  • 35. SHA1 and SHA 512 Iteration
  • 36. 7.RSA • RSA (Rivest–Shamir–Adleman) is an algorithm used by modern computers to encrypt and decrypt messages. It is an asymmetric cryptographic algorithm. Asymmetric means that there are two different keys. This is also called public key cryptography, because one of the keys can be given to anyone. The other key must be kept private. The algorithm is based on the fact that finding the factors of a large composite number is difficult: when the integers are prime numbers, the problem is called prime factorization. It is also a key pair (public and private key) generator.
  • 37. • Encryption: c=m ^ e mod n  Decryption: c ^ d = m mod n