SlideShare a Scribd company logo

BLOCK CIPHER
AND
DATA ENCRYPTION
STANDARD

BLOCK CIPHER
A block cipher is a method of encrypting text(to produce
cipher text) in which cryptographic keys and algorithms
are applied to a block of data.
At once as a group rather than to a one bit.
 Typically, a block size of 64 or 128 bits is used.

CIPHER TEXT
ENCRYPTION ALGORITHM
PLAIN TEXT
BLOCK CIPHER
b bits
b bits
Key
(k)

 A stream cipher is one that encrypts a digital data
stream one bit or one byte at a time.
 Since encryption if each digit is depend on current
state.
 Stream cipher is generally faster than block cipher.
STREAM CIPHER

Example of Stream
Cipher
Key
Stream
Plain text
Cipher text
Stream
Cipher text
Plain text
Key
(Example of stream encryption) (Example of stream decryption)

 Feistel cipher is proposed by the Claude Shannon and also
known as Feistel network.
 Feistel cipher is a symmetric structure used in the construction
of block cipher.
 Feistel cipher is iterative in nature and its internal functions
called round.
 Feistel networks are develop the concept of product cipher.
 The product cipher that combine the multiple rounds
of repeated operation, such as
Feistel Cipher

 Bit shifting(often called permutation box or P-box)
 Simple non-linear functions(often called substitution
boxes or S-box)
 Linear mixing(in the sense of modular algebra)
using Xor.
Feistel Cipher

 To produce function with large amount , Shannon
describe the Confusion and Diffusion.
 Confusion means that each character of the cipher
text should be depend on several part of the key.
 Confusion refers to making the relationship between
the cipher text and symmetric key.
Feistel Cipher

 Diffusion means if we change a character of the plain text,
the several character of the cipher text should be changed.
 Similarly ,if we change the character of the cipher text, the
several character of plain text should be changed.
 The simplest way to achieve the both diffusion and
confusion is to use a substitution-permutation network.
Feistel Cipher

 Substitution each plaintext element or group of
elements is uniquely replaced by a corresponding
cipher text element or group of elements.
 Permutation, a sequence of plaintext elements is
replaced by a permutation of that sequence.
 That is, no elements are added or deleted or replaced
in the sequence, rather the order in which the
elements appear in the sequence is changed.
Feistel Cipher

 In feistal cipher structure partitions input block into
two halves.
 The plaintext block is divided into two halves.
 The two halves of the data pass through rounds of
processing and then combine to produce the cipher
text block.
 Each round has as inputs and derived from the
previous round, as well as a sub key.
Feistel Cipher Structure

 All rounds have the same structure.
 A substitution is performed on the left half of the
data.
 This is done by applying a round function to the right
the data and the output of that function and the left
half of the data.
Cont..

Feistel Cipher Structure

 Block size: Larger block sizes mean greater security
(all other things being equal) but reduced
encryption/decryption speed for a given algorithm.
 Key size: Larger key size means greater security but
may decrease encryption/decryption speed.
 The greater security is achieved by greater resistance
to brute-force attacks and greater confusion.
Feistel Cipher Design
Principles

 Number of rounds: The essence of the Feistel cipher
is that a single round offers inadequate security but
that multiple rounds offer increasing security.
 A typical size is 16 rounds.
 Sub key generation algorithm: Greater complexity
in this algorithm should lead to greater difficulty of
cryptanalysis.
 Round function F: Again, greater complexity
generally means greater resistance to cryptanalysis.
Cont..

 The Data Encryption Standard (DES) has been the
most widely used data encryption algorithm.
 There are two main types of cryptography in use
symmetric or secret key cryptography and
asymmetric or public key cryptography.
 Secret key cryptography, it involves the use of only
one key or same key which is used for both
encryption and decryption.
DATA ENCRYPTION
STANDARD

DATA ENCRYPTION
STANDARD
E{P,K} D{C,K}
Plaintext(p)
Secret Key (K)
Cipher text (C)
Secret Key (K)
Plaintext (P)
Secrete key encryption

General Depiction of DES Encryption Algorithm
Cont..

 Block length is 64-bit.
 Key length is 56-bit.
 No of rounds is 16
 Each round is applied on one block cipher.
Cont..
 Substitution box(s-box) has extensively used in almost all
cryptographic algorithm, such as data encryption
standard(DES) and advance encryption standard(AES)
 S-box is basic component of symmetric key algorithm.
 The s-box provide the confusion.
 S-box is used to make the relation between the plain text
and the cipher text.
 the S-box takes m input and transform into n output bits.
 The s-box is an m*n substitution box that means we can
represent in matrix.
Substitution boxes

 PERMUTATION BOX(p-box) is a method of bit-
shuffling used to permute or transpose the bit across
s-box.
 A p-box is a permutation of all the bits.it take the
output of all the s-boxes of one round, permutes the
bits and feeds them into the s-box of the next round.
 At each round ,the round key is combined using
some group operations, typically xor.
PERMUTATION BOX

 DES (and most of the other major symmetric ciphers) is
based on a cipher known as the Feistel block cipher.
 It consists of a number of rounds where each round
contains bit-shuffling, non-linear substitutions (S-boxes)
and exclusive OR operations.
 As with most encryption schemes, DES expects two
inputs - the plaintext to be encrypted and the secret key.
Workings of DES
 The manner in which the plaintext is accepted, and the
key arrangement used for encryption and decryption,
both determine the type of cipher it is.
 DES is therefore a symmetric, 64 bit block cipher as it
uses the same key for both encryption and decryption and
only operates on 64 bit blocks of data at a time.
 The key size used is 56 bits, however a 64 bit (or eight-
byte)key is actually input.
 All blocks are numbered from left to right which makes
the eight bit
Cont..

 All blocks are numbered from left to right which
makes the eight bit
 Once a plain-text message is received to b encrypted,
it is arranged into 64 bit blocks required for input.
 If the number of bits in the message is not evenly
divisible by 64,then the last block will be padded.
Cont..

Ad

More Related Content

What's hot (20)

Information and data security block cipher and the data encryption standard (...
Information and data security block cipher and the data encryption standard (...Information and data security block cipher and the data encryption standard (...
Information and data security block cipher and the data encryption standard (...
Mazin Alwaaly
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
Haris Ahmed
 
Trible data encryption standard (3DES)
Trible data encryption standard (3DES)Trible data encryption standard (3DES)
Trible data encryption standard (3DES)
Ahmed Mohamed Mahmoud
 
Data encryption standard
Data encryption standardData encryption standard
Data encryption standard
chauhankapil
 
Ch03
Ch03Ch03
Ch03
Joe Christensen
 
Modern symmetric cipher
Modern symmetric cipherModern symmetric cipher
Modern symmetric cipher
Rupesh Mishra
 
A Tutorial on Linear and Differential Cryptanalysis by Howard M. Heys
A Tutorial on Linear and Differential Cryptanalysis by Howard M. HeysA Tutorial on Linear and Differential Cryptanalysis by Howard M. Heys
A Tutorial on Linear and Differential Cryptanalysis by Howard M. Heys
Information Security Awareness Group
 
Design and Simulation Triple-DES
Design and Simulation Triple-DESDesign and Simulation Triple-DES
Design and Simulation Triple-DES
chatsiri
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
Rashmi Burugupalli
 
Block cipher modes of operation
Block cipher modes of operation Block cipher modes of operation
Block cipher modes of operation
harshit chavda
 
Data encryption techniques and standard
Data encryption techniques and standardData encryption techniques and standard
Data encryption techniques and standard
Dr Sarika Jadhav
 
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
JAINAM KAPADIYA
 
Modes of Operation
Modes of Operation Modes of Operation
Modes of Operation
Showkot Usman
 
Des
DesDes
Des
Anshul Sharma
 
Chapter 3-block-cipher-des1
Chapter 3-block-cipher-des1Chapter 3-block-cipher-des1
Chapter 3-block-cipher-des1
Shiraz316
 
Block Cipher and Operation Modes
Block Cipher  and Operation Modes Block Cipher  and Operation Modes
Block Cipher and Operation Modes
SHUBHA CHATURVEDI
 
Data Encryption Standard
Data Encryption StandardData Encryption Standard
Data Encryption Standard
Adri Jovin
 
ASIC Implementation of Triple Data Encryption Algorithm (3DES)
ASIC Implementation of Triple Data Encryption Algorithm (3DES)ASIC Implementation of Triple Data Encryption Algorithm (3DES)
ASIC Implementation of Triple Data Encryption Algorithm (3DES)
Kevin Xiao Xiao
 
Block Ciphers Modes of Operation
Block Ciphers Modes of OperationBlock Ciphers Modes of Operation
Block Ciphers Modes of Operation
Shafaan Khaliq Bhatti
 
Cryptographic Algorithms: DES and RSA
Cryptographic Algorithms: DES and RSACryptographic Algorithms: DES and RSA
Cryptographic Algorithms: DES and RSA
aritraranjan
 
Information and data security block cipher and the data encryption standard (...
Information and data security block cipher and the data encryption standard (...Information and data security block cipher and the data encryption standard (...
Information and data security block cipher and the data encryption standard (...
Mazin Alwaaly
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
Haris Ahmed
 
Trible data encryption standard (3DES)
Trible data encryption standard (3DES)Trible data encryption standard (3DES)
Trible data encryption standard (3DES)
Ahmed Mohamed Mahmoud
 
Data encryption standard
Data encryption standardData encryption standard
Data encryption standard
chauhankapil
 
Modern symmetric cipher
Modern symmetric cipherModern symmetric cipher
Modern symmetric cipher
Rupesh Mishra
 
A Tutorial on Linear and Differential Cryptanalysis by Howard M. Heys
A Tutorial on Linear and Differential Cryptanalysis by Howard M. HeysA Tutorial on Linear and Differential Cryptanalysis by Howard M. Heys
A Tutorial on Linear and Differential Cryptanalysis by Howard M. Heys
Information Security Awareness Group
 
Design and Simulation Triple-DES
Design and Simulation Triple-DESDesign and Simulation Triple-DES
Design and Simulation Triple-DES
chatsiri
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
Rashmi Burugupalli
 
Block cipher modes of operation
Block cipher modes of operation Block cipher modes of operation
Block cipher modes of operation
harshit chavda
 
Data encryption techniques and standard
Data encryption techniques and standardData encryption techniques and standard
Data encryption techniques and standard
Dr Sarika Jadhav
 
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
JAINAM KAPADIYA
 
Chapter 3-block-cipher-des1
Chapter 3-block-cipher-des1Chapter 3-block-cipher-des1
Chapter 3-block-cipher-des1
Shiraz316
 
Block Cipher and Operation Modes
Block Cipher  and Operation Modes Block Cipher  and Operation Modes
Block Cipher and Operation Modes
SHUBHA CHATURVEDI
 
Data Encryption Standard
Data Encryption StandardData Encryption Standard
Data Encryption Standard
Adri Jovin
 
ASIC Implementation of Triple Data Encryption Algorithm (3DES)
ASIC Implementation of Triple Data Encryption Algorithm (3DES)ASIC Implementation of Triple Data Encryption Algorithm (3DES)
ASIC Implementation of Triple Data Encryption Algorithm (3DES)
Kevin Xiao Xiao
 
Cryptographic Algorithms: DES and RSA
Cryptographic Algorithms: DES and RSACryptographic Algorithms: DES and RSA
Cryptographic Algorithms: DES and RSA
aritraranjan
 

Similar to presentation based on data encryption standards (20)

Unit 2
Unit 2Unit 2
Unit 2
KRAMANJANEYULU1
 
CNS2 unit 2.pdf
CNS2 unit 2.pdfCNS2 unit 2.pdf
CNS2 unit 2.pdf
Padamata Rameshbabu
 
Block Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption StandardBlock Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption Standard
Dr.Florence Dayana
 
Block Ciphers and DES.pptx
Block Ciphers and DES.pptxBlock Ciphers and DES.pptx
Block Ciphers and DES.pptx
DrAnilKannur1
 
Unit II.ppt.............................
Unit II.ppt.............................Unit II.ppt.............................
Unit II.ppt.............................
r47381047
 
Day5
Day5Day5
Day5
Jai4uk
 
Secure Encryption Technique (SET): A Private Key Cryptosystem
Secure Encryption Technique (SET): A Private Key CryptosystemSecure Encryption Technique (SET): A Private Key Cryptosystem
Secure Encryption Technique (SET): A Private Key Cryptosystem
Avishek Datta
 
Unit 2
Unit 2Unit 2
Unit 2
Vinod Kumar Gorrepati
 
Bakiya
BakiyaBakiya
Bakiya
NIVEDHINIMANIVANNAN
 
Block Cipher Stream Cipher DESUnit 3.ppt
Block Cipher Stream Cipher  DESUnit 3.pptBlock Cipher Stream Cipher  DESUnit 3.ppt
Block Cipher Stream Cipher DESUnit 3.ppt
SuryaBasnet3
 
Network security Encryption
Network security EncryptionNetwork security Encryption
Network security Encryption
Joel Briza
 
DES.ppt
DES.pptDES.ppt
DES.ppt
RizwanBasha12
 
block cipher and its principle and charateristics.pptx
block cipher and its principle and charateristics.pptxblock cipher and its principle and charateristics.pptx
block cipher and its principle and charateristics.pptx
ajajkhan16
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
Seema Goel
 
Secured algorithm for gsm encryption & decryption
Secured algorithm for gsm encryption & decryptionSecured algorithm for gsm encryption & decryption
Secured algorithm for gsm encryption & decryption
Tharindu Weerasinghe
 
Unit 2
Unit  2Unit  2
Unit 2
tamil arasan
 
Network Security UNIT-II
Network Security UNIT-IINetwork Security UNIT-II
Network Security UNIT-II
rathnadeepa2
 
Jaimin chp-8 - network security-new -use this - 2011 batch
Jaimin   chp-8 - network security-new -use this -  2011 batchJaimin   chp-8 - network security-new -use this -  2011 batch
Jaimin chp-8 - network security-new -use this - 2011 batch
Jaimin Jani
 
cns 2marks
cns 2markscns 2marks
cns 2marks
ilakiyadinesh
 
4255596.ppt
4255596.ppt4255596.ppt
4255596.ppt
ShahidMehmood285010
 
Block Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption StandardBlock Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption Standard
Dr.Florence Dayana
 
Block Ciphers and DES.pptx
Block Ciphers and DES.pptxBlock Ciphers and DES.pptx
Block Ciphers and DES.pptx
DrAnilKannur1
 
Unit II.ppt.............................
Unit II.ppt.............................Unit II.ppt.............................
Unit II.ppt.............................
r47381047
 
Secure Encryption Technique (SET): A Private Key Cryptosystem
Secure Encryption Technique (SET): A Private Key CryptosystemSecure Encryption Technique (SET): A Private Key Cryptosystem
Secure Encryption Technique (SET): A Private Key Cryptosystem
Avishek Datta
 
Block Cipher Stream Cipher DESUnit 3.ppt
Block Cipher Stream Cipher  DESUnit 3.pptBlock Cipher Stream Cipher  DESUnit 3.ppt
Block Cipher Stream Cipher DESUnit 3.ppt
SuryaBasnet3
 
Network security Encryption
Network security EncryptionNetwork security Encryption
Network security Encryption
Joel Briza
 
block cipher and its principle and charateristics.pptx
block cipher and its principle and charateristics.pptxblock cipher and its principle and charateristics.pptx
block cipher and its principle and charateristics.pptx
ajajkhan16
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
Seema Goel
 
Secured algorithm for gsm encryption & decryption
Secured algorithm for gsm encryption & decryptionSecured algorithm for gsm encryption & decryption
Secured algorithm for gsm encryption & decryption
Tharindu Weerasinghe
 
Network Security UNIT-II
Network Security UNIT-IINetwork Security UNIT-II
Network Security UNIT-II
rathnadeepa2
 
Jaimin chp-8 - network security-new -use this - 2011 batch
Jaimin   chp-8 - network security-new -use this -  2011 batchJaimin   chp-8 - network security-new -use this -  2011 batch
Jaimin chp-8 - network security-new -use this - 2011 batch
Jaimin Jani
 
Ad

Recently uploaded (20)

fluke dealers in bangalore..............
fluke dealers in bangalore..............fluke dealers in bangalore..............
fluke dealers in bangalore..............
Haresh Vaswani
 
DT REPORT by Tech titan GROUP to introduce the subject design Thinking
DT REPORT by Tech titan GROUP to introduce the subject design ThinkingDT REPORT by Tech titan GROUP to introduce the subject design Thinking
DT REPORT by Tech titan GROUP to introduce the subject design Thinking
DhruvChotaliya2
 
The Gaussian Process Modeling Module in UQLab
The Gaussian Process Modeling Module in UQLabThe Gaussian Process Modeling Module in UQLab
The Gaussian Process Modeling Module in UQLab
Journal of Soft Computing in Civil Engineering
 
Compiler Design_Lexical Analysis phase.pptx
Compiler Design_Lexical Analysis phase.pptxCompiler Design_Lexical Analysis phase.pptx
Compiler Design_Lexical Analysis phase.pptx
RushaliDeshmukh2
 
Oil-gas_Unconventional oil and gass_reseviours.pdf
Oil-gas_Unconventional oil and gass_reseviours.pdfOil-gas_Unconventional oil and gass_reseviours.pdf
Oil-gas_Unconventional oil and gass_reseviours.pdf
M7md3li2
 
railway wheels, descaling after reheating and before forging
railway wheels, descaling after reheating and before forgingrailway wheels, descaling after reheating and before forging
railway wheels, descaling after reheating and before forging
Javad Kadkhodapour
 
AI-assisted Software Testing (3-hours tutorial)
AI-assisted Software Testing (3-hours tutorial)AI-assisted Software Testing (3-hours tutorial)
AI-assisted Software Testing (3-hours tutorial)
Vəhid Gəruslu
 
Smart Storage Solutions.pptx for production engineering
Smart Storage Solutions.pptx for production engineeringSmart Storage Solutions.pptx for production engineering
Smart Storage Solutions.pptx for production engineering
rushikeshnavghare94
 
Data Structures_Searching and Sorting.pptx
Data Structures_Searching and Sorting.pptxData Structures_Searching and Sorting.pptx
Data Structures_Searching and Sorting.pptx
RushaliDeshmukh2
 
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptxLidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
RishavKumar530754
 
Structural Response of Reinforced Self-Compacting Concrete Deep Beam Using Fi...
Structural Response of Reinforced Self-Compacting Concrete Deep Beam Using Fi...Structural Response of Reinforced Self-Compacting Concrete Deep Beam Using Fi...
Structural Response of Reinforced Self-Compacting Concrete Deep Beam Using Fi...
Journal of Soft Computing in Civil Engineering
 
Machine learning project on employee attrition detection using (2).pptx
Machine learning project on employee attrition detection using (2).pptxMachine learning project on employee attrition detection using (2).pptx
Machine learning project on employee attrition detection using (2).pptx
rajeswari89780
 
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptxExplainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
MahaveerVPandit
 
15th International Conference on Computer Science, Engineering and Applicatio...
15th International Conference on Computer Science, Engineering and Applicatio...15th International Conference on Computer Science, Engineering and Applicatio...
15th International Conference on Computer Science, Engineering and Applicatio...
IJCSES Journal
 
introduction to machine learining for beginers
introduction to machine learining for beginersintroduction to machine learining for beginers
introduction to machine learining for beginers
JoydebSheet
 
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITYADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ijscai
 
theory-slides-for react for beginners.pptx
theory-slides-for react for beginners.pptxtheory-slides-for react for beginners.pptx
theory-slides-for react for beginners.pptx
sanchezvanessa7896
 
DSP and MV the Color image processing.ppt
DSP and MV the  Color image processing.pptDSP and MV the  Color image processing.ppt
DSP and MV the Color image processing.ppt
HafizAhamed8
 
IntroSlides-April-BuildWithAI-VertexAI.pdf
IntroSlides-April-BuildWithAI-VertexAI.pdfIntroSlides-April-BuildWithAI-VertexAI.pdf
IntroSlides-April-BuildWithAI-VertexAI.pdf
Luiz Carneiro
 
Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...
Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...
Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...
Journal of Soft Computing in Civil Engineering
 
fluke dealers in bangalore..............
fluke dealers in bangalore..............fluke dealers in bangalore..............
fluke dealers in bangalore..............
Haresh Vaswani
 
DT REPORT by Tech titan GROUP to introduce the subject design Thinking
DT REPORT by Tech titan GROUP to introduce the subject design ThinkingDT REPORT by Tech titan GROUP to introduce the subject design Thinking
DT REPORT by Tech titan GROUP to introduce the subject design Thinking
DhruvChotaliya2
 
Compiler Design_Lexical Analysis phase.pptx
Compiler Design_Lexical Analysis phase.pptxCompiler Design_Lexical Analysis phase.pptx
Compiler Design_Lexical Analysis phase.pptx
RushaliDeshmukh2
 
Oil-gas_Unconventional oil and gass_reseviours.pdf
Oil-gas_Unconventional oil and gass_reseviours.pdfOil-gas_Unconventional oil and gass_reseviours.pdf
Oil-gas_Unconventional oil and gass_reseviours.pdf
M7md3li2
 
railway wheels, descaling after reheating and before forging
railway wheels, descaling after reheating and before forgingrailway wheels, descaling after reheating and before forging
railway wheels, descaling after reheating and before forging
Javad Kadkhodapour
 
AI-assisted Software Testing (3-hours tutorial)
AI-assisted Software Testing (3-hours tutorial)AI-assisted Software Testing (3-hours tutorial)
AI-assisted Software Testing (3-hours tutorial)
Vəhid Gəruslu
 
Smart Storage Solutions.pptx for production engineering
Smart Storage Solutions.pptx for production engineeringSmart Storage Solutions.pptx for production engineering
Smart Storage Solutions.pptx for production engineering
rushikeshnavghare94
 
Data Structures_Searching and Sorting.pptx
Data Structures_Searching and Sorting.pptxData Structures_Searching and Sorting.pptx
Data Structures_Searching and Sorting.pptx
RushaliDeshmukh2
 
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptxLidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
RishavKumar530754
 
Machine learning project on employee attrition detection using (2).pptx
Machine learning project on employee attrition detection using (2).pptxMachine learning project on employee attrition detection using (2).pptx
Machine learning project on employee attrition detection using (2).pptx
rajeswari89780
 
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptxExplainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
MahaveerVPandit
 
15th International Conference on Computer Science, Engineering and Applicatio...
15th International Conference on Computer Science, Engineering and Applicatio...15th International Conference on Computer Science, Engineering and Applicatio...
15th International Conference on Computer Science, Engineering and Applicatio...
IJCSES Journal
 
introduction to machine learining for beginers
introduction to machine learining for beginersintroduction to machine learining for beginers
introduction to machine learining for beginers
JoydebSheet
 
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITYADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ijscai
 
theory-slides-for react for beginners.pptx
theory-slides-for react for beginners.pptxtheory-slides-for react for beginners.pptx
theory-slides-for react for beginners.pptx
sanchezvanessa7896
 
DSP and MV the Color image processing.ppt
DSP and MV the  Color image processing.pptDSP and MV the  Color image processing.ppt
DSP and MV the Color image processing.ppt
HafizAhamed8
 
IntroSlides-April-BuildWithAI-VertexAI.pdf
IntroSlides-April-BuildWithAI-VertexAI.pdfIntroSlides-April-BuildWithAI-VertexAI.pdf
IntroSlides-April-BuildWithAI-VertexAI.pdf
Luiz Carneiro
 
Ad

presentation based on data encryption standards

  • 2.  BLOCK CIPHER A block cipher is a method of encrypting text(to produce cipher text) in which cryptographic keys and algorithms are applied to a block of data. At once as a group rather than to a one bit.  Typically, a block size of 64 or 128 bits is used.
  • 3.  CIPHER TEXT ENCRYPTION ALGORITHM PLAIN TEXT BLOCK CIPHER b bits b bits Key (k)
  • 4.   A stream cipher is one that encrypts a digital data stream one bit or one byte at a time.  Since encryption if each digit is depend on current state.  Stream cipher is generally faster than block cipher. STREAM CIPHER
  • 5.  Example of Stream Cipher Key Stream Plain text Cipher text Stream Cipher text Plain text Key (Example of stream encryption) (Example of stream decryption)
  • 6.   Feistel cipher is proposed by the Claude Shannon and also known as Feistel network.  Feistel cipher is a symmetric structure used in the construction of block cipher.  Feistel cipher is iterative in nature and its internal functions called round.  Feistel networks are develop the concept of product cipher.  The product cipher that combine the multiple rounds of repeated operation, such as Feistel Cipher
  • 7.   Bit shifting(often called permutation box or P-box)  Simple non-linear functions(often called substitution boxes or S-box)  Linear mixing(in the sense of modular algebra) using Xor. Feistel Cipher
  • 8.   To produce function with large amount , Shannon describe the Confusion and Diffusion.  Confusion means that each character of the cipher text should be depend on several part of the key.  Confusion refers to making the relationship between the cipher text and symmetric key. Feistel Cipher
  • 9.   Diffusion means if we change a character of the plain text, the several character of the cipher text should be changed.  Similarly ,if we change the character of the cipher text, the several character of plain text should be changed.  The simplest way to achieve the both diffusion and confusion is to use a substitution-permutation network. Feistel Cipher
  • 10.   Substitution each plaintext element or group of elements is uniquely replaced by a corresponding cipher text element or group of elements.  Permutation, a sequence of plaintext elements is replaced by a permutation of that sequence.  That is, no elements are added or deleted or replaced in the sequence, rather the order in which the elements appear in the sequence is changed. Feistel Cipher
  • 11.   In feistal cipher structure partitions input block into two halves.  The plaintext block is divided into two halves.  The two halves of the data pass through rounds of processing and then combine to produce the cipher text block.  Each round has as inputs and derived from the previous round, as well as a sub key. Feistel Cipher Structure
  • 12.   All rounds have the same structure.  A substitution is performed on the left half of the data.  This is done by applying a round function to the right the data and the output of that function and the left half of the data. Cont..
  • 14.   Block size: Larger block sizes mean greater security (all other things being equal) but reduced encryption/decryption speed for a given algorithm.  Key size: Larger key size means greater security but may decrease encryption/decryption speed.  The greater security is achieved by greater resistance to brute-force attacks and greater confusion. Feistel Cipher Design Principles
  • 15.   Number of rounds: The essence of the Feistel cipher is that a single round offers inadequate security but that multiple rounds offer increasing security.  A typical size is 16 rounds.  Sub key generation algorithm: Greater complexity in this algorithm should lead to greater difficulty of cryptanalysis.  Round function F: Again, greater complexity generally means greater resistance to cryptanalysis. Cont..
  • 16.   The Data Encryption Standard (DES) has been the most widely used data encryption algorithm.  There are two main types of cryptography in use symmetric or secret key cryptography and asymmetric or public key cryptography.  Secret key cryptography, it involves the use of only one key or same key which is used for both encryption and decryption. DATA ENCRYPTION STANDARD
  • 17.  DATA ENCRYPTION STANDARD E{P,K} D{C,K} Plaintext(p) Secret Key (K) Cipher text (C) Secret Key (K) Plaintext (P) Secrete key encryption
  • 18.  General Depiction of DES Encryption Algorithm Cont..
  • 19.   Block length is 64-bit.  Key length is 56-bit.  No of rounds is 16  Each round is applied on one block cipher. Cont..
  • 20.  Substitution box(s-box) has extensively used in almost all cryptographic algorithm, such as data encryption standard(DES) and advance encryption standard(AES)  S-box is basic component of symmetric key algorithm.  The s-box provide the confusion.  S-box is used to make the relation between the plain text and the cipher text.  the S-box takes m input and transform into n output bits.  The s-box is an m*n substitution box that means we can represent in matrix. Substitution boxes
  • 21.   PERMUTATION BOX(p-box) is a method of bit- shuffling used to permute or transpose the bit across s-box.  A p-box is a permutation of all the bits.it take the output of all the s-boxes of one round, permutes the bits and feeds them into the s-box of the next round.  At each round ,the round key is combined using some group operations, typically xor. PERMUTATION BOX
  • 22.   DES (and most of the other major symmetric ciphers) is based on a cipher known as the Feistel block cipher.  It consists of a number of rounds where each round contains bit-shuffling, non-linear substitutions (S-boxes) and exclusive OR operations.  As with most encryption schemes, DES expects two inputs - the plaintext to be encrypted and the secret key. Workings of DES
  • 23.  The manner in which the plaintext is accepted, and the key arrangement used for encryption and decryption, both determine the type of cipher it is.  DES is therefore a symmetric, 64 bit block cipher as it uses the same key for both encryption and decryption and only operates on 64 bit blocks of data at a time.  The key size used is 56 bits, however a 64 bit (or eight- byte)key is actually input.  All blocks are numbered from left to right which makes the eight bit Cont..
  • 24.   All blocks are numbered from left to right which makes the eight bit  Once a plain-text message is received to b encrypted, it is arranged into 64 bit blocks required for input.  If the number of bits in the message is not evenly divisible by 64,then the last block will be padded. Cont..
  • 25.