You are on page 1of 37

BATCH MEMBERS:

K.SAINDHAVI
V.P.SANDHYA
SUPERVISED BY:
MRS.DAISY,M.E
ASST.PROFESSOR,ECE dept.

To improve security in RC6 algorithm by


inserting the symmetric layer.

In cryptography, RC6 is a symmetric key block


cipher derived from RC5.

RC6 proper has a block size of 128 bits and


supports key sizes of 128, 192 and 256 bits.

Key scheduling
Symmetry layer
Encryption layer
Decryption layer

1. User supplies 128-bit of data as KEY.


2. These key bytes are then loaded in little-endian
fashion into an array of four 32-bit words
L[0],L[1],L[2],L[3].
3. The number of 32 bit words that will be
generated for the additive round keys is 2r+8
(48 keys) and these are stored in the array S [0, ,
2r+3]. This array can be used in both Encryption and
decryption. Let P32 = B7E15163 and Q32 =
9E3779B9.

Example:If the key given is


01 23 45 67 89 ab cd ef 01 12 23 34 45 56 67
78 (128 bit)
These key can be loaded into arrays as,
L[0]=67 45 23 01 (32 bit)
L[1]=ef cd ab 89 (32 bit)
L[2]=34 23 12 01 (32 bit)
L[3]=78 67 56 45 (32 bit)

S [0] = P32
for i = 1 to 2r + 3 do
S [i] = S [i - 1] + Q32
A= B= i= j = 0
v = 3 X max{c, 2r + 4}
for s = 1 to v do
{
A = S [i] = (S [i] + A + B) <<< 3
B = L [j] = (L [j] + A + B) <<< (A + B)
i = (i + 1) mod (2r + 4)
j = (j + 1) mod c
}

The symmetry layer is fast by consisting of byte unit


logical operation and fixed rotate operation when
implemented via hardware and software.

It is placed between the encryption layer and


decryption layer.

Having the security of RC6 increase by inserting the


symmetry layer.
Have to be easy when implemented via software and
hardware.
There must be no difference between the proposed
algorithm and original one in the aspect of the
process speed.
Having RC6 to have the same way to encrypt and
. decrypt

The whole 128bits are divided into 32bits A, B,


C, and D which process separately with A, B
block and C, D block.
At First , with 32bit A and round key S[22], b
function is executed, which executes AND and OR
operations by turns after dividing 32bits block
into bytes.
The result of b function goes to 12bits left rotate
operation.
.

And the result goes to B after executing XOR


operation of 32 bits B and the result of the 12bits
left rotate operation.
After b function is executed with B`and round key
S[25], 29bits left rotate operation is executed.
And then output A is made by applying A and XOR
operation.
After that executing block C, D, output C', D'
is made by the same method.

In cryptography, encryption is the process of


transforming information (referred to as plaintext)
using an algorithm (called cipher) to make it
unreadable to anyone except those possessing
special knowledge, usually referred to as a key.
The result of the process is encrypted
information.
In cryptography, the encrypted information is
referred to as cipher text.

Input:
Plain text stored in four w-bit input registers A, B, C,
D
Number of rounds r.
w-bit round keys S[0, ,2r + 3]
Output:
Cipher text stored in A, B, C, D

The encryption of RC6 makes cipher text after


carrying out 10 rounds repeatedly with plain text
in the four storages (A, B, C and D) per 32bit
word.
After doing four words round function, it operates
left rotate operation.
Additionally, before and after executing the round
functions, it executes round key and add / subtract
operations.

Rotate operation is produced by the fixed 5bit


left rotate.
In encryption t,u,A,C is obtained as shown in the
pseudo code.
In encryption, first xor operation is performed
followed by shift and addition operation to get A
and C as shown in the pseudocode.

It is the reverse process of encryption


It converts the cipher text obtained from
encryption process into plain text.
It uses the keys for doing this.

Input:
Cipher text stored in four w-bit input registers A, B,
C, D.
Number r of rounds.
w-bit round keys S[0; ; 2r + 3].
Output:
Plaintext stored in A, B, C, D.

In decryption operation, the round key of


encryption is used with the inverse order.
After doing four words round function, it operates
left / right rotate per word with parallel operation.
In decryption, A and C are obtained by doing
subtraction operation first followed by rotate
operation and then xor operation as shown in the
pseudo code.
It performs the reverse operation of the
encryption process.

Thus the symmetry layer is placed between the


encryption and decryption layer to enhance
security in RC6 algorithm.

Enhanced Security.
Reliability.
Fast encryption and decryption.
Re-scheduling (key array can be used in
both encryption and decryption).

Defense
RF-ID
Satellite communication

[1]Advanced communication tech,


ICACT 2009,11th international conference.
[2].Report on the Development of the
Advanced
Encryption
Standard (AES)
http://www.csrc.nist.gov/encryption/aes/ro
und2/r2report.pdf.
[3] New European Schemes for Signatures.
Integrity. And Encryption (NESSIE).
http://cryptonessie.org/.

THANK YOU

You might also like