• Save
Security techniques
Upcoming SlideShare
Loading in...5
×

Like this? Share it with your network

Share

Security techniques

  • 317 views
Uploaded on

Now a days a security is necessary for the any application.Taking an example of india-pakistan.The war is not going only at physical side but also the digital(cyber side).Pakistani hackers are......

Now a days a security is necessary for the any application.Taking an example of india-pakistan.The war is not going only at physical side but also the digital(cyber side).Pakistani hackers are hacking indian websites and indian hackers are hacking paskitani websites.So the security is necessary.

More in: Technology , Education
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
317
On Slideshare
317
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
0
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Security Techniques & EncryptionAlgorithmsNow a days a security is necessary for the any application.Taking an example of india-pakistan.The waris not going only at physical side but also the digital(cyber side).Pakistani hackers are hacking indianwebsites and indian hackers are hacking paskitani websites.So the security is necessary.Generally Encryption algorithms are used for the security purpose.Generally these are divided into toparts.A.Symentic key encryption :- in this encryption the key which is used to encrypt the data is same for thesender and the receiver.B.Public key encryption :- in this the key which is going to be used for the encryption algorithm isdifferent for the sender and the receiver.It is based on the public key and private key.There are lots of techniques of encryption algorithms.Several techniques i am showing here.(1) Steam Ciphering and block ciphering :- It looks at the input palintext(data | information )as a streamof bits and encrypts them one bit(or byte) at a time as the steam progresses.In this technique, the lengthof the Plaintext and the key size will be same.Wireless LAN uses steam Cipher
  • 2. In block cipher ,one whole block of plaintext is take to produce the ciphertext block(encrypted block) ofequal length.Block may be of 64 bits or the 128 bits.(2) Symmetric Key Cryptography :- Here the same key is used for the both side of encryption and thedecryption.It is like a lock where the same key is used for it to lock and the unlock it.It is called alsoconvential classical algorithms.In this cryptography there are four components.1.Plaintext2.Encryption/Decryption algorithms3.Secret Key4.Cipher Text(Encrypted Text)
  • 3. Where c1 c2 are the cipher text p1 p2 are the plain text Ek is the encryption algorithms where k defiensthe Key.and same as Dk is the decryption algorithms where K defines the key.Here in 1stphase if the cipher text is generated then it is the key for the next plaintext to produe the newcipher text.same as in decryption.This algorithms have many types some of are here.1. DES – Data encryption standard,this algorithm is the most widely used,researched a lot time andimplemented new things day by day.2. 3DES - Here on plain text the DES algorythm is implemented 3 times to make that Plaintextmore encrypted for the security incesement.3. AES – Advance Encryption Standards,This is the current accepted standard for the encryption byFIPS(Fedaral Information Processing Standard) Of USA.4. Skipjack/FORTEZZA :- This is the token – based symentric algorithm used by defence personnelin US.(3) DES (Data Encryption Standard) :- It employees the principle of scrambling and substitution.Thisprocess are repeated the numbers of times with keys to ensure that the palintext is completelytransofrmed into a throughlt scrambled bit stream.Working of DES :-
  • 4. 3DES(Tripple DES) :- It uses the same DES algoritm 3 times in succession with different keys.Thisincereses the keysize resulting in higher security.There are 2 different flavour of 3DES.One uses two 56 –bit key and the other uses three 56 – bits keyy.By using three 56 – bits key,the effective security can beincresed to the key size,to 168 bits.3DES is used widely in the world now a days for the reason of thesecurity purpose.
  • 5. (4) AES (Advance Encryption Standard) :- DES algorithm widely used over the world.But after startingthe use they come to know that this encryption algorithm have some drwabacks.so to overcome thedrwabacks AES came.AES had to be a symmetric cipher with block size of 128 bits.it supports the key of128- bits,192bits and 256 bits.Characteristics of AES :-1.Design Simplicity.2.Resistance against all famous known attacks.3.Wide range of platforms.4.Speed and coe compactness.
  • 6. In Each Block the operation works as per shown in the below figure.(5) Public Key Cryptography :- Here is not like symetric key encrtption.Here at the both side the key isdefferent which is going to be used for the encryption and the decryption.These encryption and the
  • 7. decryption keys are the key of 1 pairs.one of these keys from the key pair is made public and another onekept private or the secret.Terms used in this :-1.Plaintext :- This is the human readable message which will be converted in to the encrypted code.2.CipherText :- this is the encrypted code.3.Encryption Algorithms :- Here key will be used and it will be bind with the encryption algorithm andwhatever the input of Plaintext came in this phase,this will convert it into the cipher text.4. Decryption Algorithms:- Same here decryption of the cipher text is done with the help of the key whichwas used to encrypt the key in order to make the ciphetext into the plain text.By – Chintan GurjarSkype: chintan.letsnurtureEmail – chintangurjar1990@gmail.com