SlideShare a Scribd company logo
1 of 12
IDEA (International Data
Encryption Algorithm)
Aman Kumar Mishra (13000116137)
Computer Science &Engineering
History
IDEA is a symmetric block cipher algorithm.
It was developed by Xuejia Lai and James L. Massey.
Its patents are held by the Swiss company "Ascom-
Tech AG".
It was meant to be a replacement for the Data
Encryption Standard.
IDEA was used in Pretty Good Privacy (PGP) v2.0.
It is developed at ETH(Eidgenossische Technische
Hochschule) in Zurich, Switzerland in 1990.
Basic idea about IDEA
Here Plain text is of 64 bit.
Key is of 128 bit. And it is divided in 52 sub keys (how?? Thhat we
will see in next slide.)
Cipher text is also as same as plain text in size that is of 64 bit.
Number of identical rounds are 8 where in each round 6 keys are
used.
Like this 48 keys and in last round another 4 keys (6 * 8 = 48 + 4
=52 total) are being used in both the encryption and decryption
process.
Design issue
The design philosophy behind the
algorithm is one of “ mixing operation
from different algebraic groups”
Lets take a look which different
operations are used.
1) XOR
2) Addition
3) Multiplication
Key generation process
First of all we will see how these 52 keys are generated.
The 128 bit key is divided into 8 sub parts that is 16 bits each.
Then the 128 bit key is cyclically shifted to the left by 25
position, so by doing this we will have one new 128 bit key.
Now similarly as above it is divided into 8 sub blocks and will
be used in next round.
The same process is performed 9 times ans 56 keys are
generated from which the first 52keys will be used.
So likewise from K1 to K52 keys are generated.
Sequence of operation in one round
1) Multiply P1 and K1
2) Add P2 and second K2
3) Add P3 and third K3
4) Multiply P4 and K4
5) Step 1 ⊕ step 3
6) Step 2 ⊕ step 4
7) Multiply step 5 with K5
8) Add result of step 6 and step 7
9) Multiply result of step 8 with K6.
10) Add result of step 7 and step 9.
11) XOR result of steps 1 and step 9.
12) XOR result of steps 3 and step 9.
13) XOR result of steps 2 and step 10.
14) XOR result of steps 4 and step 10.
Same operations are performed in 8 rounds…
An encryption round of IDEA
Sequence of operation in last round
1) Multiply P1 with K49.
2) Add P2 and K50.
3) Add P3 and K51.
4) Multiply P4 and K52.
Encryption
First of all 64 bit plain text is divided into 4 16-bit parts and they
are taken as an input in first round.
At the end of the first encryption round four 16-bit values are
produced which are used as input to the second encryption
round.
The process is repeated in each of the subsequent 8 encryption
rounds.
Note that in 9th round we have to use only 4 key( K49, K50,
K51,K52) and have to perform different operation as guided in
previous slide.
Decryption
The computational process used for decryption of
the ciphertext is essentially the same as that used
for encryption.
The only difference is that each of the 52 16-bit
key sub-blocks used for decryption is the inverse
of the key sub-block used during encryption.
Do remember that the sub blocks must be used in
reverse order than of the encryption round.
Applications of IDEA
Today, there are hundreds of IDEA-based security solutions
available in many market areas, ranging from Financial
Services, and Broadcasting to Government.
The IDEA algorithm can easily be combined in any
encryption software. Data encryption can be used to
protect data transmission and storage.
Typical fields are:
1) Audio and video data for cable TV, video conferencing,
distance learning
2) Sensitive financial and commercial data
3) Email via public networks
4) Smart cards
Idea (international data encryption algorithm)

More Related Content

What's hot (20)

Idea alogorithim
Idea alogorithimIdea alogorithim
Idea alogorithim
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
cryptography
cryptographycryptography
cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Diffie hellman key exchange algorithm
Diffie hellman key exchange algorithmDiffie hellman key exchange algorithm
Diffie hellman key exchange algorithm
 
RC4&RC5
RC4&RC5RC4&RC5
RC4&RC5
 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithms
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
Cryptography - 101
Cryptography - 101Cryptography - 101
Cryptography - 101
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Symmetric & Asymmetric Cryptography
Symmetric & Asymmetric CryptographySymmetric & Asymmetric Cryptography
Symmetric & Asymmetric Cryptography
 
Classical Encryption Techniques
Classical Encryption TechniquesClassical Encryption Techniques
Classical Encryption Techniques
 
Information and data security advanced encryption standard (aes)
Information and data security advanced encryption standard (aes)Information and data security advanced encryption standard (aes)
Information and data security advanced encryption standard (aes)
 
Elliptic Curve Cryptography
Elliptic Curve CryptographyElliptic Curve Cryptography
Elliptic Curve Cryptography
 
Secure Hash Algorithm
Secure Hash AlgorithmSecure Hash Algorithm
Secure Hash Algorithm
 
Intro to modern cryptography
Intro to modern cryptographyIntro to modern cryptography
Intro to modern cryptography
 
Encryption
EncryptionEncryption
Encryption
 
Elliptical curve cryptography
Elliptical curve cryptographyElliptical curve cryptography
Elliptical curve cryptography
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
 

Similar to Idea (international data encryption algorithm)

Aes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_reportAes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_reportsakhi rehman
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
hardware implementation of aes encryption and decryption for low area & low p...
hardware implementation of aes encryption and decryption for low area & low p...hardware implementation of aes encryption and decryption for low area & low p...
hardware implementation of aes encryption and decryption for low area & low p...Kumar Goud
 
Data Encryption standard in cryptography
Data Encryption standard in cryptographyData Encryption standard in cryptography
Data Encryption standard in cryptographyNithyasriA2
 
Renas Rajab Asaad
Renas Rajab Asaad Renas Rajab Asaad
Renas Rajab Asaad Renas Rekany
 
Cybersecurity Research Paper
Cybersecurity Research PaperCybersecurity Research Paper
Cybersecurity Research PaperShubham Gupta
 
IP Core Design of Hight Lightweight Cipher and its Implementation
IP Core Design of Hight Lightweight Cipher and its Implementation IP Core Design of Hight Lightweight Cipher and its Implementation
IP Core Design of Hight Lightweight Cipher and its Implementation csandit
 
IP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATION
IP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATIONIP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATION
IP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATIONcscpconf
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Implementation of Various Cryptosystem Using Chaos
Implementation of Various Cryptosystem Using ChaosImplementation of Various Cryptosystem Using Chaos
Implementation of Various Cryptosystem Using ChaosIOSR Journals
 
Overview on Cryptography and Network Security
Overview on Cryptography and Network SecurityOverview on Cryptography and Network Security
Overview on Cryptography and Network SecurityDr. Rupa Ch
 
New Lightweight Cryptographic Algorithm
New Lightweight Cryptographic AlgorithmNew Lightweight Cryptographic Algorithm
New Lightweight Cryptographic Algorithmarunkumar2949
 

Similar to Idea (international data encryption algorithm) (20)

Introducing an Encryption Algorithm based on IDEA
Introducing an Encryption Algorithm based on IDEAIntroducing an Encryption Algorithm based on IDEA
Introducing an Encryption Algorithm based on IDEA
 
Renas Rajab Asaad
Renas Rajab AsaadRenas Rajab Asaad
Renas Rajab Asaad
 
Aes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_reportAes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_report
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
hardware implementation of aes encryption and decryption for low area & low p...
hardware implementation of aes encryption and decryption for low area & low p...hardware implementation of aes encryption and decryption for low area & low p...
hardware implementation of aes encryption and decryption for low area & low p...
 
Data Encryption standard in cryptography
Data Encryption standard in cryptographyData Encryption standard in cryptography
Data Encryption standard in cryptography
 
Renas Rajab Asaad
Renas Rajab Asaad Renas Rajab Asaad
Renas Rajab Asaad
 
Cybersecurity Research Paper
Cybersecurity Research PaperCybersecurity Research Paper
Cybersecurity Research Paper
 
section-8.ppt
section-8.pptsection-8.ppt
section-8.ppt
 
03 UNIT-2.pdf
03 UNIT-2.pdf03 UNIT-2.pdf
03 UNIT-2.pdf
 
IP Core Design of Hight Lightweight Cipher and its Implementation
IP Core Design of Hight Lightweight Cipher and its Implementation IP Core Design of Hight Lightweight Cipher and its Implementation
IP Core Design of Hight Lightweight Cipher and its Implementation
 
IP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATION
IP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATIONIP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATION
IP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATION
 
Final report
Final reportFinal report
Final report
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
chap3.pdf
chap3.pdfchap3.pdf
chap3.pdf
 
Implementation of Various Cryptosystem Using Chaos
Implementation of Various Cryptosystem Using ChaosImplementation of Various Cryptosystem Using Chaos
Implementation of Various Cryptosystem Using Chaos
 
CNS2 unit 2.pdf
CNS2 unit 2.pdfCNS2 unit 2.pdf
CNS2 unit 2.pdf
 
Overview on Cryptography and Network Security
Overview on Cryptography and Network SecurityOverview on Cryptography and Network Security
Overview on Cryptography and Network Security
 
New Lightweight Cryptographic Algorithm
New Lightweight Cryptographic AlgorithmNew Lightweight Cryptographic Algorithm
New Lightweight Cryptographic Algorithm
 
1 DES.pdf
1 DES.pdf1 DES.pdf
1 DES.pdf
 

Recently uploaded

Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIkoyaldeepu123
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixingviprabot1
 

Recently uploaded (20)

Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixing
 

Idea (international data encryption algorithm)

  • 1. IDEA (International Data Encryption Algorithm) Aman Kumar Mishra (13000116137) Computer Science &Engineering
  • 2. History IDEA is a symmetric block cipher algorithm. It was developed by Xuejia Lai and James L. Massey. Its patents are held by the Swiss company "Ascom- Tech AG". It was meant to be a replacement for the Data Encryption Standard. IDEA was used in Pretty Good Privacy (PGP) v2.0. It is developed at ETH(Eidgenossische Technische Hochschule) in Zurich, Switzerland in 1990.
  • 3. Basic idea about IDEA Here Plain text is of 64 bit. Key is of 128 bit. And it is divided in 52 sub keys (how?? Thhat we will see in next slide.) Cipher text is also as same as plain text in size that is of 64 bit. Number of identical rounds are 8 where in each round 6 keys are used. Like this 48 keys and in last round another 4 keys (6 * 8 = 48 + 4 =52 total) are being used in both the encryption and decryption process.
  • 4. Design issue The design philosophy behind the algorithm is one of “ mixing operation from different algebraic groups” Lets take a look which different operations are used. 1) XOR 2) Addition 3) Multiplication
  • 5. Key generation process First of all we will see how these 52 keys are generated. The 128 bit key is divided into 8 sub parts that is 16 bits each. Then the 128 bit key is cyclically shifted to the left by 25 position, so by doing this we will have one new 128 bit key. Now similarly as above it is divided into 8 sub blocks and will be used in next round. The same process is performed 9 times ans 56 keys are generated from which the first 52keys will be used. So likewise from K1 to K52 keys are generated.
  • 6. Sequence of operation in one round 1) Multiply P1 and K1 2) Add P2 and second K2 3) Add P3 and third K3 4) Multiply P4 and K4 5) Step 1 ⊕ step 3 6) Step 2 ⊕ step 4 7) Multiply step 5 with K5 8) Add result of step 6 and step 7 9) Multiply result of step 8 with K6. 10) Add result of step 7 and step 9. 11) XOR result of steps 1 and step 9. 12) XOR result of steps 3 and step 9. 13) XOR result of steps 2 and step 10. 14) XOR result of steps 4 and step 10. Same operations are performed in 8 rounds…
  • 8. Sequence of operation in last round 1) Multiply P1 with K49. 2) Add P2 and K50. 3) Add P3 and K51. 4) Multiply P4 and K52.
  • 9. Encryption First of all 64 bit plain text is divided into 4 16-bit parts and they are taken as an input in first round. At the end of the first encryption round four 16-bit values are produced which are used as input to the second encryption round. The process is repeated in each of the subsequent 8 encryption rounds. Note that in 9th round we have to use only 4 key( K49, K50, K51,K52) and have to perform different operation as guided in previous slide.
  • 10. Decryption The computational process used for decryption of the ciphertext is essentially the same as that used for encryption. The only difference is that each of the 52 16-bit key sub-blocks used for decryption is the inverse of the key sub-block used during encryption. Do remember that the sub blocks must be used in reverse order than of the encryption round.
  • 11. Applications of IDEA Today, there are hundreds of IDEA-based security solutions available in many market areas, ranging from Financial Services, and Broadcasting to Government. The IDEA algorithm can easily be combined in any encryption software. Data encryption can be used to protect data transmission and storage. Typical fields are: 1) Audio and video data for cable TV, video conferencing, distance learning 2) Sensitive financial and commercial data 3) Email via public networks 4) Smart cards