0% found this document useful (0 votes)
16 views16 pages

CNS Assignment 2

The document discusses various encryption algorithms, focusing on symmetric key block ciphers like DES and AES. It highlights the vulnerabilities of DES, particularly its short key length, and introduces AES as a more secure alternative with longer key lengths and improved security features. The text also outlines the encryption and decryption processes involved in these algorithms.

Uploaded by

ssaishiva97
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
16 views16 pages

CNS Assignment 2

The document discusses various encryption algorithms, focusing on symmetric key block ciphers like DES and AES. It highlights the vulnerabilities of DES, particularly its short key length, and introduces AES as a more secure alternative with longer key lengths and improved security features. The text also outlines the encryption and decryption processes involved in these algorithms.

Uploaded by

ssaishiva97
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 16
‘ iF Kocuss Row encryphion happen in Rc Ge, | pen, Blow t's lord Aappent in Rog i- Emetypaors — Mappenct tim Kees — ———_ 0 ' Hy Res ie OBR © ‘symm ef c Key block encryption algonthm ° olesgned by Por Riles’ iv 149. TE is Notable fev beng simple, fast And consumer lE55 memory, | Res $5 tal’ Glock “'ctphey “and acld¥este; duo word APocer at a@ stim é » Depending on: Nyt plaintert blocie SIE, numboy of Yount and Key 8 te; vortous | instancer Of Res ban be detinet anol | each tnétance *s clenoted as Res. } wiaPbh i weword site th bit ¥ =no0:. of yeoundl — : 1 b Biegpotre Uv leytey | hr et ake: qiAlibseadoventees AS t _ << Encryption i> we divide the ‘npuk — plain text bloc | wt two | registers ® ond Beoch | of Site w bits. AStew umolergoing Ane | encryption process the Fesull of Aan | Co egether esa eee ae ee: Sloce. Res €ncryption AQ eV | Yone me thi Ralite tion of planters block? A ond 6 by adding .6c04 and SEID ty tele Yespec tively, HW sae Operations one moef ge D KR p ang ®+ A= ang Deyclic eft Shist news value o 4A by B bit WAdol staxin te Re cutout of Pie ous } Step. this 7S new Value oO Aw S),XOR .B with new vader of Mang! store * | im Be 5 sdeyclic left shift now adees ok phy Abit madltiadto the tnput of Prewouy SteR Tis Ps. the nec Veenene of R. 8) Repexk enkive proceby jo t TF Limes, | ee A= A+ S005 } I Rey @= Be say S42 sala I oy i = Lo tomy oo: t a cero ‘ ca Mise Sl2a%"15 Re, B= Care). Tper wlas mittatty ” developed as a ‘proprietary cipher oval bby swiss Cryptosvaphert xvedia, lat anol. Tames t- Massey in. (94), > ve \ STDEA encryption tS 0a Symmetric key bloce, cipher that Operates on Gubit bloce of olata. rst uses oO bit key anol Sevier. of Comp mathematical opevakors tof scramble — plaintext into — cepheytient.. a this pre ces® creates OQ unque vis) fv ME Bloc: Ph. clad knee * aid Fi - v8 fenerypor stepsi- [Al -— } ' « a. K expanstoni~ i es roe bt Key js! 'expomoledd inty sa 16-b4 subkeyr, which are Used 1, the aneryption sounols« © dnitial permudtorhion ‘ The 6u-bidt plantert block Ee cenee an Wital permedartion Rouncls (6x loge) -- ails athe. enichyption pro cess ConsisH of 4 yound$+an each yourd, the ++ fallovring operations are performeds— ssubstitution Csubayted)y- 16-bit Block owe subst tutecl UsINA a Fixed | *Penimnkation CShif Routt):Roust of 16-bit bocer ame shifted. ale | smi xing (ixcolumna) \~ Block! ore mited usivig micbalan rr mu thpli ream anc! adloli ton operat uns ——— “Keg OUR" The cunvenk 16, ae Ore Moped usith:, Yun of ebay Final. granieormbctoo ltl be dhs ——— ee after 64 Youncls , & Finet. er Ye Ne Keel Be Keto Be RGA qe turkey s steps ASteP 3 step 2 r Step qe steps FKs | g step 6 + Step? q. Steppe Bee lo stept + Step o tle Step 4 Astep4 sSteps a Stepg 13 Steps Asteplo \U-Stepu A stepig encry Biewersh * an encrypton tethnigue | st Bruce schnetem tn 1994 | designed as an atternodive to DES Encryption _ STE is a symmetyic Bloc Copher algorithm, ‘ ide + Y- bits : : tn ae Sac? le setae ee | 3enumber of subkeyd +16" | Uenumber of vounds "16 | svnumber of substitutton boxe iy aoe im deat | Encryption Stepsim pKey Expansion = . x i | he “eviginad Key ts used to w Wialige | the Panay anol S-boxe# The Parray consist of 18 entyies and the Seg consist of four 26¢- 4 JOKES + en — 2) Seats) remnu lan ogi f vet The bu-bit jpolointerk block Uundlergoes an iWiktad — permutatton, i DRoundt Cl6)4- : Ss Giuish eset a Felstel nekwone Structure where the 6u-by bloadts chivided tity j tun av-bit hatver. the Weft hate ig tofed with o tunction of vofy tm each rouncl. Gol hor the functton thvewe, Follo wt ssules\udion Colon) tne woe Bsr diviclec/ Blor four gain YING S-berest ae © ea Substtuted | | * XOR operod ont Th | Xeked with Sua SEB oulput is athe left Beet Meee ol Fok the” end ‘of a u) Final Permutah nd Agter 16 Younds, o& is Pe to cata oe - net 6uU-bit one cack opine SMa pp ec Frol Peamutocky,, ts ctpherterd. tt consis @ Rar peeraiee PS YoR cixidth ao bit a+ Rounal®*~ enc’ Consist 04 32. ee te ae cguoes Hon of Func The: desonp wal cush [ete {ty ebin b)Post- processing eee, eo 16 YountA fs Plocesse! a follovst ,. $$ ou BE Olp of 16 pourds of & ft Sah bit FCT | ou bit “cipher teak wi ae bat Ley 2X) Explan the step? in. the vanow Tounl) of Aes, Des. a Aes 6a C advanced _€r Encryptior on Standard )s- Lin Bom ous wot clely 5 used Synmetn'c~Ke, | tion algorithm tho. veplacect encryp Des Coatea Enerypton Standarcl) a | the standlard enctyption dlgen tire in } 300). | [> Aes operater on fixed) S8e blocs | ef data and supports Bass |. Sire of WF, LW2pTS SE bits | | Four steps in mn each ieee’ ‘ i |») ) gubbyles: ~ | Zach fytes in the Stofe a non-linear Substitution $-boxe The Seem Substitution table introduce & con fuSton, i ashift Rowsi- a8yte in each Yous Bre the are Shifted to the left the fivee = Semaiwt unchonged Pe is shifted « by ae SeCong] You one position 4. thir Tou a ee ek | Ewo positions andl fou ee” BB: ae setters = a? The ; Operation —, ov ond Spready er : Stote. dy A [Subst tute Byter | =4 ser Roust_| i U0 [EX coturnns | Wad “toma eg Bound Key 2 " Mx Columns: oles Huston tes QUOSS the seach column of the state undergo O& miding opetakions This invowes multiplying cack byte by Constant tm galots Freid, Foitowect by spchc additons. StHis operation provides father didfusion anc! | miting of the s ‘ Wadd Found Keys ii She Jound key 15 /KoReol with Me state | The Yound key ts clewveds “Aga, tee? Oginet Key Ahrough' Ley exponsior' procs. This operation acl ERE ay te the state, prov Key matenole obi pes Cdata_encryption Stands Standard) <— pes, iS & Syn mebri C ~ Ke AGO er, ensuring *he same Key encrypH ool | decryp data. | | Gok Some . mae hove w ky sronsfox makion}~ 1 | weThe pes process’ user a Sb-bit Kugywhick is obtained by eliminating | au. the bits present in eAtevYy eth | position ™ 6u-bitkeye In this Step oO us-bit Key ts generated Wis. 56 BE Key te pt tito: two eeual harvet ond) depending upon ae number of younols f the Left -th a Bas ee 56 Shift Athion, 2! 28 23 Gs bias) Narain ist by i" i: SETS | een Permutations’ ot we “had wo 32-bit plan aa, Fcattle rteft plain text ond Right Plaih Text furing etponsion permuted ron 1 ep a leapandedl from 32 bi Ay uses “Ht Bestoley bimereasings the. bit site Aibeh wig sri) the BH ore perencled gi bs 2 to Us, ‘ | the nome + ae Permudes yal 3) 4 {S161 4] 8] Gajio fus{tz] fs iii tsy ic guts? UR [Sp ie), Fito! aes fa) v3 hufTic (stax uBR URE [Sibox Substtution, ‘so piocess , thad Ifoeo the us-bitt mpuf. fom the XOR operation involving, the Compie sseo/ | Key and expanded! RPT and praduces & 32-bit oufpud using: the emia techniquer . eosin ys ce btocic Tey a ga 7 Apboxs This straight do dovward ~ permutahory mechanism involet, Sim ple potmutatioy| This” is called pb’ | permutation. aa pr <4 +) ih oe a ee ee / | 4). box permutah 2 é : : The output S bax consis of s2bit, These ga-bits ave permute ol) using oO } aller 29 | tt | 5 XOR ond 6 Bu eT ane | “nore “tha coe Rowe as 1 oe | these operationt only on the w-bi Y [hort perton of the 6u- bit orviginoA ee The Left hard portion wat untouched so fans AL this juncture, pthc lett hott portion of ape tnittet 1 Bu bit Plain tent Blo cig, 3, XoReol with the) oudpup’ Re j ced by P-b | Permutation. EB Ia othe Yesutt of this xog operation Geouomer the ens Tigh hal$ *The olol wight hott becomes the new lett hath, ino process of sLsapping, Bega! 6u-ft Poi taes Block | ba Gen ) anioy Vi eeys van fav 2 powwow | | ey So} | 1 hot the Vuineabig ee of pes from the futerneds OD deve 8 some — ulnerabilitied, Of DES: from “the Drternet s+ \ ee | Iv Key fengthi~ the 56-bit | pes ss “es constolere d | todays Secunity Stan | tn computing pewer ee ae brute- force attacker mote. pra heal, allowing attacker to leerypt pee Pamcryptect aka within %eaSenable timefens, [ ; 2. exhoiative, Beat Kes) anche The key Space, of DES vs relatively smatt , with 2% € possible Keys. oi modem computing . capabilities , exhaustive key Search attace are feasible DES vunevatee “to bute—force oe ptinean_anol Dit feventiod crypt onoulyses bes 1s & Vutnerable - to” Move Spphist' ~cated + Ciyptanalysis | technvgues Sucl, as neat ond’? ditterventios Cryptomouysis, These. methoold exploi ‘ t Cettain statsh ol peer Of the odgonthn mee... more recenk| -force attacey. ee rte Woes chatlengess- nes Challenger fas been concluctes to determine olemonstiate the vulnerability) of pes to brute-force attocters these chaltenges invove attem pting & break Def ~ancryptec} Paesages Uaithin Os cA tne, Frm, | 5) Triple _DES_C30ES) for Fegacy Support.— ATO ahhFeSS the vulnerabilittes of pes, the use of triple pes }s Te tCommenclec! + 3pDeEs invowet applyin bess three timer with ilisderet Keys, prowling Vo longer effective key tergth « J of hagas b> — ee el a : ~ sds AGsio @ net's “Transit onto GES . Recogniting the vulne vabiliter Of bes, the National mostitute a | Stondards’ anol Technology ist | Setectecl te Adwanced) Enovyption Stanclorol @és) at a move Se Clive Ond modem encryphion algew thm, Acs, Supports Key lengtd of 128,99, Onck. 956 bUS makin. Vesistankt i Sik Move Brute ar fe ferret odtoc. ay Gkamine —whweh Sy | browses ond explore Some teat-wWorld exa | and aia user Symmetric enc S 3 €s onde between cu gl a * Compatadi' sign ottwoare. + prod& cay Ir veal fe use CY ptogvaphe AMovithmrss WETY OE. thls y tie eaten) [Behinol tt hea sani of these AJON Mame. cryptographic algorithons. s phy a cmcey tole in Sec uring Vartous Sof tu are Prodes c4$ “ancl. Sen cer, otebs amples Yea Sor Algor thm Choi cesye hehinghs Mery set | © Transport Jaye, Security andl HTTPS i ‘ . > Tran spor& layer See aes yeh or {ike aes’ Poy ok Io ‘Rolentaily, lo vPecsenee. Zhe, Sy sSecumty: Aes is widely Aegarded QS Secure ond ethevenk, Briss an Bed hatance Performance , “eported by most moder Server. co RNG Pr nema 2-0pen Ssb i Se Sey . | opensae Support Various oiyptographtc | aigovthrns , including RSA, DSA PRES ang | sr 2 | Reasons - ae |.yvers is ame Steaibility altos it to ‘Legacy ceases < use. Cases. Ove se AN\govithns fay a cee | Systema. Compad'bility with legacy 3. PaP Cprekty Sool privacy) | pretty hood privacy uses a asym metre Jaignthms like RSfoncd OSA for Key jexchonge and digital Signahures. Reason — | strusti- ASymmetwe algorithm route strong trust mechanisms. 1 * Privacy 4- PP cee ensuTer. privacy eno} | authenticity of messoges. Ursgn CSecure sheu) i eens . s doy Ky * ssu emplo pif-fre-Hellmon 1 | | exchange pee Aes fay enoryphion Reo sonsi~ |. security. pif fre -He ltman ‘ensure, Secuye | | Key exchange- | + €ffrwenvy, AES | encrypton 5+ G94 CQN SZ 6 effieienk fix olaka AS) ie $essony. privacy _gucrd) Gp _ Conbinet _Sammetiic anol -aagynm ~ ae (rs A) aigonth mn 6: — 3 : ee ws marek re meryenon (AES lesa teens courte enoryption for ty Seachange ancl olyte! signatures. « pr teroprobilitye Gph 1s compabible with Pap | | |G) TwHe cn yet | vera crypt Corsic. Enoryp bon), Tpke! boat's? UU Sd HOS: fort cult, enciyph'ons | | Reasons} ~ ; | ‘ se cumty % AGS ‘8 volu st and widely | Accepted. ; | * Performance? es balonces Se cum by ‘and Pperdyymance. fo Ns le en oryp hi

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy