SlideShare a Scribd company logo
1 of 11
Cryptography –
Encryption/Decryption
What is Cryptography?
      Cryptography derived its name from a
      Greek word called “Kryptos” which
      means “Hidden Secrets”.

      Cryptography is the practice and study
      of hiding information. It is the Art or
      Science of converting a plain
      intelligible data into an unintelligible
      data and again retransforming that
      message into its original form.

      It provides
      Confidentiality, Integrity, Accuracy.
What is Encryption / Decryption

   Encryption –
    ◦ The process of converting plain text into an
      unintelligible format (cipher text) is called
      Encryption.


   Decryption –
    ◦ The process of converting cipher text into a plain
      text is called Decryption.
What are the Types of Cryptography
   Symmetric Key Cryptography (Secret Key Cryptography)
    ◦ Same Key is used by both parties
    Advantages
     1. Simpler and Faster

    Disadvantages
    1. Less Secured




Image taken from :-
www.google.com
   Asymmetric Key Cryptography (Public Key Cryptography)
    ◦ 2 different keys are used
    ◦ Users get the Key from an Certificate Authority

    Advantages
    1. More Secured
    2. Authentication

    Disadvantages
    1. Relatively Complex




Image taken from :-
www.google.com
   What is a Key
    ◦ In cryptography, a key is a variable value that is applied
      using an algorithm to a string or block of unencrypted text
      to produce encrypted text, or to decrypt encrypted text.
      The length of the key is a factor in considering how
      difficult it will be to decrypt the text in a given message.

   What is a Block Cipher?
    ◦ A method of encrypting / decrypting data
    ◦ Key is used for encryption / decryption.
    ◦ Same size of I/P and O/P

   What is Initialization Vector?
    ◦ An initialization vector (IV) is an arbitrary number that can
      be used along with a secret key for data encryption.
    ◦ It is a group of hex values.
   What is DES?
    ◦ The Data Encryption Standard (DES) is a previously predominant
      algorithm used for encryption/decryption of electronic data. DES
      was developed in the early 70’s by IBM which was then submitted
      to the National Bureau of Standards (NBS).

    ◦ Like other private key cryptographic methods, both the sender
      and the receiver must know and use the same private key.

    ◦ DES uses a 56 bit encryption key which can give around 2^56 (ie)
      256 combinations to encrypt the plain text. DES is restricted with
      a Block Size of just 64bits.

    ◦ Sometimes DES is said to use 64 bit key, but 8bits out of it is
      used for some other purpose.

    ◦ The maximum amount that can be transferred with a single
      encryption is 32GB. DES uses the Feistel Network which divides
      block into 2 halves before going through the encryption steps.
   What is AES?
    ◦ The Advanced Encryption Standard (AES) is a specification for
      the Encryption of electronic data. Originally called “Rijndael” the
      cipher was developed by 2 Belgian Cryptographers “Joan
      Daemen” and “Vincent Rijmen” who submitted to the AES
      Selection process held by the NIST (National Institute of
      Standards and Technology) in the year 1997 which continued for
      3 years and the end result was given on 2nd October 2002 where
      Rijndael was chosen as the proposed standard.

    ◦ The algorithm described by AES is a Symmetric-Key
      Algorithm, meaning the same key is used for encrypting and
      decrypting the data. AES standard is a variant of Rijndael where
      the block size is restricted to 128bits and the key size of
      128, 192, 256 bits can be used.

    ◦ AES is based on a design principle known as a substitution-
      permutation network, and is fast in both software and hardware.
DES Encryption                                      AES Encryption
DES uses only 56 bits key which provides a         AES can use 128, 192, 256 bits keys which
combination of 2^56 = 256 combinations for         provides 2^128, 2^192, 2^256 combinations for
encryption.                                        encryption.
DES is restricted to use a Block Size of only 64   AES is restricted to use a Block Size of 128 bits
bits                                               (double of what is used in DES)
With 64 bits block size, the amount of data that   With AES, it is possible to transfer around 256
can be transferred with a single encryption key    billion GB of data. It is probably safe to say that
is just 32GB.                                      you can use a single AES encryption key for
                                                   any application.
DES uses a Feistel network, which divides the      AES uses Permutation-Substitution method,
block into 2 halves before going through the       which involves a series of substitution and
Encryption steps.                                  permutation steps to create the encrypted
                                                   block.
DES encryption is breakable through Brute          AES encryption on the other hand is still not
Force attack.                                      breakable, though there are some theoretical
                                                   discussions about breaking the AES.
DES is an old technique used for                   AES is relatively new.
encryption/decryption
Time required to check all the possible keys at    Time required to check all the possible keys at
50 billion keys per second – For a 128-bit key:    50 billion keys per second – For a 56-bit key:
5x1021 years (which makes it difficult for the     400 days.
hackers to decrypt the data)
THANK YOU

More Related Content

What's hot

Encryption And Decryption
Encryption And DecryptionEncryption And Decryption
Encryption And Decryption
NA
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
Uday Meena
 

What's hot (20)

Symmetric and asymmetric key
Symmetric and asymmetric keySymmetric and asymmetric key
Symmetric and asymmetric key
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Hash Function
Hash FunctionHash Function
Hash Function
 
Security services and mechanisms
Security services and mechanismsSecurity services and mechanisms
Security services and mechanisms
 
block ciphers
block ciphersblock ciphers
block ciphers
 
Encryption ppt
Encryption pptEncryption ppt
Encryption ppt
 
IP Security
IP SecurityIP Security
IP Security
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
 
Encryption And Decryption
Encryption And DecryptionEncryption And Decryption
Encryption And Decryption
 
Key management
Key managementKey management
Key management
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Data encryption
Data encryptionData encryption
Data encryption
 
Cryptography and Information Security
Cryptography and Information SecurityCryptography and Information Security
Cryptography and Information Security
 
Cryptography and applications
Cryptography and applicationsCryptography and applications
Cryptography and applications
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
 

Viewers also liked

6. Security Threats with E-Commerce
6. Security Threats with E-Commerce6. Security Threats with E-Commerce
6. Security Threats with E-Commerce
Jitendra Tomar
 
Types of computer network
Types of computer networkTypes of computer network
Types of computer network
Amit Shaw
 
Ppt's of e governance
Ppt's of e governancePpt's of e governance
Ppt's of e governance
Shelly
 
How does rotary heat machine work on fabric
How does rotary heat machine work on fabricHow does rotary heat machine work on fabric
How does rotary heat machine work on fabric
Fei Yue Paper Industrial Co.,Ltd.
 
Cryptography and E-Commerce
Cryptography and E-CommerceCryptography and E-Commerce
Cryptography and E-Commerce
Hiep Luong
 
NEURAL Network Design Training
NEURAL Network Design  TrainingNEURAL Network Design  Training
NEURAL Network Design Training
ESCOM
 

Viewers also liked (20)

cryptography
cryptographycryptography
cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Next generation block ciphers
Next generation block ciphersNext generation block ciphers
Next generation block ciphers
 
E - governance
E - governanceE - governance
E - governance
 
6. Security Threats with E-Commerce
6. Security Threats with E-Commerce6. Security Threats with E-Commerce
6. Security Threats with E-Commerce
 
E governance
E governanceE governance
E governance
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
types of network
types of networktypes of network
types of network
 
Types of computer network
Types of computer networkTypes of computer network
Types of computer network
 
Ppt's of e governance
Ppt's of e governancePpt's of e governance
Ppt's of e governance
 
How does rotary heat machine work on fabric
How does rotary heat machine work on fabricHow does rotary heat machine work on fabric
How does rotary heat machine work on fabric
 
Sublimation vs Digital Printing By Sukhvir Sabharwal
Sublimation vs Digital Printing By Sukhvir SabharwalSublimation vs Digital Printing By Sukhvir Sabharwal
Sublimation vs Digital Printing By Sukhvir Sabharwal
 
Smartplug ppt
Smartplug pptSmartplug ppt
Smartplug ppt
 
Lessons from Software for Synthetic Biology
Lessons from Software for Synthetic BiologyLessons from Software for Synthetic Biology
Lessons from Software for Synthetic Biology
 
Thesis presentation
Thesis presentationThesis presentation
Thesis presentation
 
Virtual manufacturing
Virtual manufacturingVirtual manufacturing
Virtual manufacturing
 
Cryptography and E-Commerce
Cryptography and E-CommerceCryptography and E-Commerce
Cryptography and E-Commerce
 
Analysis and applications of artificial neural networks
Analysis and applications of artificial neural networksAnalysis and applications of artificial neural networks
Analysis and applications of artificial neural networks
 
NEURAL Network Design Training
NEURAL Network Design  TrainingNEURAL Network Design  Training
NEURAL Network Design Training
 
Cryptography
CryptographyCryptography
Cryptography
 

Similar to Cryptography

PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
ijistjournal
 
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfAn Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
KailasS9
 
A Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysA Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated Keys
IJORCS
 
A Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysA Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated Keys
IJORCS
 

Similar to Cryptography (20)

Cryptography
Cryptography Cryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
82 86
82 8682 86
82 86
 
82 86
82 8682 86
82 86
 
Encryption
EncryptionEncryption
Encryption
 
IMAGE SECURITY BY 3 DES.pdf
IMAGE SECURITY BY 3 DES.pdfIMAGE SECURITY BY 3 DES.pdf
IMAGE SECURITY BY 3 DES.pdf
 
Encryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES AlgorithmEncryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES Algorithm
 
Seminar on Encryption and Authenticity
Seminar on Encryption and AuthenticitySeminar on Encryption and Authenticity
Seminar on Encryption and Authenticity
 
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
 
DESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptx
DESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptxDESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptx
DESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptx
 
Basic Cryptography.pdf
Basic Cryptography.pdfBasic Cryptography.pdf
Basic Cryptography.pdf
 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
 
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfAn Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
 
AES Abstract
AES AbstractAES Abstract
AES Abstract
 
Overview of cryptography
Overview of cryptographyOverview of cryptography
Overview of cryptography
 
A Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysA Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated Keys
 
A Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysA Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated Keys
 
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Recently uploaded (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

Cryptography

  • 2.
  • 3. What is Cryptography? Cryptography derived its name from a Greek word called “Kryptos” which means “Hidden Secrets”. Cryptography is the practice and study of hiding information. It is the Art or Science of converting a plain intelligible data into an unintelligible data and again retransforming that message into its original form. It provides Confidentiality, Integrity, Accuracy.
  • 4. What is Encryption / Decryption  Encryption – ◦ The process of converting plain text into an unintelligible format (cipher text) is called Encryption.  Decryption – ◦ The process of converting cipher text into a plain text is called Decryption.
  • 5. What are the Types of Cryptography  Symmetric Key Cryptography (Secret Key Cryptography) ◦ Same Key is used by both parties Advantages 1. Simpler and Faster Disadvantages 1. Less Secured Image taken from :- www.google.com
  • 6. Asymmetric Key Cryptography (Public Key Cryptography) ◦ 2 different keys are used ◦ Users get the Key from an Certificate Authority Advantages 1. More Secured 2. Authentication Disadvantages 1. Relatively Complex Image taken from :- www.google.com
  • 7. What is a Key ◦ In cryptography, a key is a variable value that is applied using an algorithm to a string or block of unencrypted text to produce encrypted text, or to decrypt encrypted text. The length of the key is a factor in considering how difficult it will be to decrypt the text in a given message.  What is a Block Cipher? ◦ A method of encrypting / decrypting data ◦ Key is used for encryption / decryption. ◦ Same size of I/P and O/P  What is Initialization Vector? ◦ An initialization vector (IV) is an arbitrary number that can be used along with a secret key for data encryption. ◦ It is a group of hex values.
  • 8. What is DES? ◦ The Data Encryption Standard (DES) is a previously predominant algorithm used for encryption/decryption of electronic data. DES was developed in the early 70’s by IBM which was then submitted to the National Bureau of Standards (NBS). ◦ Like other private key cryptographic methods, both the sender and the receiver must know and use the same private key. ◦ DES uses a 56 bit encryption key which can give around 2^56 (ie) 256 combinations to encrypt the plain text. DES is restricted with a Block Size of just 64bits. ◦ Sometimes DES is said to use 64 bit key, but 8bits out of it is used for some other purpose. ◦ The maximum amount that can be transferred with a single encryption is 32GB. DES uses the Feistel Network which divides block into 2 halves before going through the encryption steps.
  • 9. What is AES? ◦ The Advanced Encryption Standard (AES) is a specification for the Encryption of electronic data. Originally called “Rijndael” the cipher was developed by 2 Belgian Cryptographers “Joan Daemen” and “Vincent Rijmen” who submitted to the AES Selection process held by the NIST (National Institute of Standards and Technology) in the year 1997 which continued for 3 years and the end result was given on 2nd October 2002 where Rijndael was chosen as the proposed standard. ◦ The algorithm described by AES is a Symmetric-Key Algorithm, meaning the same key is used for encrypting and decrypting the data. AES standard is a variant of Rijndael where the block size is restricted to 128bits and the key size of 128, 192, 256 bits can be used. ◦ AES is based on a design principle known as a substitution- permutation network, and is fast in both software and hardware.
  • 10. DES Encryption AES Encryption DES uses only 56 bits key which provides a AES can use 128, 192, 256 bits keys which combination of 2^56 = 256 combinations for provides 2^128, 2^192, 2^256 combinations for encryption. encryption. DES is restricted to use a Block Size of only 64 AES is restricted to use a Block Size of 128 bits bits (double of what is used in DES) With 64 bits block size, the amount of data that With AES, it is possible to transfer around 256 can be transferred with a single encryption key billion GB of data. It is probably safe to say that is just 32GB. you can use a single AES encryption key for any application. DES uses a Feistel network, which divides the AES uses Permutation-Substitution method, block into 2 halves before going through the which involves a series of substitution and Encryption steps. permutation steps to create the encrypted block. DES encryption is breakable through Brute AES encryption on the other hand is still not Force attack. breakable, though there are some theoretical discussions about breaking the AES. DES is an old technique used for AES is relatively new. encryption/decryption Time required to check all the possible keys at Time required to check all the possible keys at 50 billion keys per second – For a 128-bit key: 50 billion keys per second – For a 56-bit key: 5x1021 years (which makes it difficult for the 400 days. hackers to decrypt the data)