Professional Documents
Culture Documents
P. Arun Goud M. Bhanu Prasad U. Jagadeeswar C. Praveen Kumar (08W81A0401) (08W81A0406) (08W81A0416) (08W81A0430)
N. Narasimha M. Tech
Cryptography:
Cryptography is the study of mathematical techniques related to aspects of information security such as confidentiality, data integrity, entity authentication, and data origin authentication. Cryptography is not the only means of providing information security, but rather one set of techniques.
Cryptographic goals:
Privacy or confidentiality
Data integrity
Authentication Non-repudiation
Types of cryptography:
Classic cryptography Symmetric cryptography Public key cryptography Private key cryptography
Cipher:
A cipher is any method of encrypting text (concealing its readability and meaning). It is also sometimes used to refer to the encrypted text message itself.
Types of cipher: 1.Block cipher 2.Stream cipher
What is AES.?
AES is a symmetric encryption algorithm processing data in block of 128 bits. AES may configured to use different key-lengths, the standard defines 3 lengths and the resulting
What is DES.?
DES is the archetypal block cipher an algorithm that takes a fixed-length string of plain text bits and transforms it through a series of complicated operations into another cipher text bit string of the
same length.
Key size:
In cryptography key size or key length is the
size measured in bits of the key used in a cryptographic algorithm (such as a cipher). An algorithm's key length is distinct from its
Significance of key:
Keys are used to control the operation of a cipher so that only the correct key can convert encrypted text to plaintext. A key should therefore be large enough that a brute force attack is infeasible
Key Generation:
Key generation is the process of generating keys for cryptography. A key is used to encrypt and decrypt whatever data is being encrypted / decrypted. steps of key generation: 1. Rotate word step 2. The sub byte step
Cipher Key
SubByte
Round Key 1 ~Round key 9
Key Schedule
--------------------------------------------------------------------------------SubByte
Round Key 10
ShiftRow
128
Round Key 10
Cipher Text
Cipher Key = 2b 7e 15 16 28 ae d2 a6 ab f7 15 88 09 cf 4f 3c
W 0 2b 7e 15 16
W1 28 ae d2 a6
W2 ab f7 15 88
W3 09 cf 4f 3c
ROTATE WORD() 7e 15 16 2b ae d2 a6 28 f7 15 88 ab cf 4f 3c 09
divided into 64-bit blocks and each block is encrypted one at a time.
o Separate encryptions with different blocks are totally
encrypted cipher text is XOR-ed with the next plaintext block to be encrypted, thus making all the blocks dependent on all the previous blocks.
This means that in order to find the plaintext of a
particular block, you need to know the cipher text, the key, and the cipher text for the previous block.
handle files whose size is not a perfect multiple of 8 bytes, but this mode removes that necessity .
output of DES is fed back into the Shift Register, rather than the actual final cipher text.
The Shift Register is set to an arbitrary initial value,
then fed back into the Shift Register to prepare for the next block.
but also improves the performance in a variety of settings such as smartcards, hardware implementations etc.
AES is federal information processing standard and there
hardware. It works fast even on small devices such as smart phones, smart cards etc. AES provides more security due to larger block size and longer keys.
Conclusion:
We have studied both AES and DES encryption algorithms and have highlighted some of the important mathematical properties as well as the security issues of both algorithms. Since AES provides better security than DES and has less implementation complexity, it has emerged as one of the strongest and most efficient algorithms in existence today. Hence, the optimal solution is the use of a hybrid encryption system in which typically AES is used to encrypt large data block.
References:
J. D. Johnston, Testing Loudness ModelsReal vs. Artificial Content, 125 AES Convention, New York, NY, October 2-5, 2008.
J. D. Johnston and Smirnov, Serge, A Low Complexity Perceptually Tuned Room Correction System, 123 AES Convention, New York, NY, October 5-8, 2007.
J. D. Johnston, Perceptual Audio Coding - A History and Timeline, 41st Asilomar Conference on Signals, Systems and Computers, 2007.
J. Li, and J. D. Johnston, Perceptually layered scalable coding, 40th Asilomar Conf. on Signals, Systems and Computers, pp.2125-2129, Pacific Grove, CA, October 2006.
Thank you
Queries???