You are on page 1of 26

Submitted by

P. Arun Goud M. Bhanu Prasad U. Jagadeeswar C. Praveen Kumar (08W81A0401) (08W81A0406) (08W81A0416) (08W81A0430)

I . Sharath Chandra M .Tech

N. Narasimha M. Tech

Cryptography:
Cryptography is the study of mathematical techniques related to aspects of information security such as confidentiality, data integrity, entity authentication, and data origin authentication. Cryptography is not the only means of providing information security, but rather one set of techniques.

Cryptographic goals:
Privacy or confidentiality

Data integrity
Authentication Non-repudiation

Types of cryptography:
Classic cryptography Symmetric cryptography Public key cryptography Private key cryptography

1. AES (Advanced Encryption Standard) 2.DES (Data Encryption Standard)

Cipher:
A cipher is any method of encrypting text (concealing its readability and meaning). It is also sometimes used to refer to the encrypted text message itself.
Types of cipher: 1.Block cipher 2.Stream cipher

What is AES.?
AES is a symmetric encryption algorithm processing data in block of 128 bits. AES may configured to use different key-lengths, the standard defines 3 lengths and the resulting

algorithms are named AES-128, AES-192 and AES-256


respectively to indicate the length in bits of the key.

What is DES.?
DES is the archetypal block cipher an algorithm that takes a fixed-length string of plain text bits and transforms it through a series of complicated operations into another cipher text bit string of the

same length.

Key size:
In cryptography key size or key length is the
size measured in bits of the key used in a cryptographic algorithm (such as a cipher). An algorithm's key length is distinct from its

cryptographic security, which is a logarithmic measure

of the fastest known computational attack on the


algorithm, also measured in bits.

Significance of key:
Keys are used to control the operation of a cipher so that only the correct key can convert encrypted text to plaintext. A key should therefore be large enough that a brute force attack is infeasible

Key Generation:
Key generation is the process of generating keys for cryptography. A key is used to encrypt and decrypt whatever data is being encrypted / decrypted. steps of key generation: 1. Rotate word step 2. The sub byte step

AES Key Generation:


Plain Text
128 cipher text

Cipher Key

SubByte
Round Key 1 ~Round key 9

Shift Row Mix Column


128

Key Schedule

Round Key 1 ~Round key 9

--------------------------------------------------------------------------------SubByte
Round Key 10

ShiftRow
128

Round Key 10

Cipher Text

AES -128, 192, 256

Rotate word step:

Key Length = 4, 6, 8 Number of Rounds = 10, 12, 14

Cipher Key = 2b 7e 15 16 28 ae d2 a6 ab f7 15 88 09 cf 4f 3c

W 0 2b 7e 15 16

W1 28 ae d2 a6

W2 ab f7 15 88

W3 09 cf 4f 3c

ROTATE WORD() 7e 15 16 2b ae d2 a6 28 f7 15 88 ab cf 4f 3c 09

Sub bytes step:


F

Rcon ROM operation:

DES Key Generation:

DES Modes of Operation:


ECB ( Electronic code block ) CBC (Cipher block chaining)

CFB ( Cipher feedback )


OFB ( Output feedback )

Electronic code block (ECB):


o This is the regular DES algorithm in which Data is

divided into 64-bit blocks and each block is encrypted one at a time.
o Separate encryptions with different blocks are totally

independent of each other.

Cipher block chaining (CBC):


In this mode of operation, each block of ECB

encrypted cipher text is XOR-ed with the next plaintext block to be encrypted, thus making all the blocks dependent on all the previous blocks.
This means that in order to find the plaintext of a

particular block, you need to know the cipher text, the key, and the cipher text for the previous block.

Cipher feedback (CFB):


In this mode, blocks of plaintext that are less than

64 bits long can be encrypted.


Normally, special processing has to be used to

handle files whose size is not a perfect multiple of 8 bytes, but this mode removes that necessity .

Output feedback (OFB):


This is similar to CFB mode, except that the cipher text

output of DES is fed back into the Shift Register, rather than the actual final cipher text.
The Shift Register is set to an arbitrary initial value,

and passed through the DES algorithm.


The output from DES is passed through the M-box and

then fed back into the Shift Register to prepare for the next block.

Comparison of AES and DES:


Advanced Encryption Standard not only assures security

but also improves the performance in a variety of settings such as smartcards, hardware implementations etc.
AES is federal information processing standard and there

are currently no known non-brute-force direct attacks against AES.


AES is strong enough to be certified for use by the US

government for top secret information

DES performs lots of bit manipulation in substitution and

permutation boxes in each of 16 rounds.


DES could not keep up with advancement in technology

and it is no longer appropriate for security.


By design AES is faster in software and works efficiently in

hardware. It works fast even on small devices such as smart phones, smart cards etc. AES provides more security due to larger block size and longer keys.

Conclusion:
We have studied both AES and DES encryption algorithms and have highlighted some of the important mathematical properties as well as the security issues of both algorithms. Since AES provides better security than DES and has less implementation complexity, it has emerged as one of the strongest and most efficient algorithms in existence today. Hence, the optimal solution is the use of a hybrid encryption system in which typically AES is used to encrypt large data block.

References:
J. D. Johnston, Testing Loudness ModelsReal vs. Artificial Content, 125 AES Convention, New York, NY, October 2-5, 2008.
J. D. Johnston and Smirnov, Serge, A Low Complexity Perceptually Tuned Room Correction System, 123 AES Convention, New York, NY, October 5-8, 2007.

J. D. Johnston, Perceptual Audio Coding - A History and Timeline, 41st Asilomar Conference on Signals, Systems and Computers, 2007.
J. Li, and J. D. Johnston, Perceptually layered scalable coding, 40th Asilomar Conf. on Signals, Systems and Computers, pp.2125-2129, Pacific Grove, CA, October 2006.

Thank you

Queries???

You might also like