SlideShare a Scribd company logo
1 of 26
PRESENTED BY:
1.BISWAJIT DATTA (09123002030)
2.AVIRUP SAMANTA (09123002071)
3.ANAND MOHAN MASKARA (09123002057)
COMPARATIVE STUDY OF
SYMMETRIC KEY
CRYPTOGRAPHY AND NEW
TECHNIQUE IMPLEMENTATION
INTRODUCTION
What is Cryptography?
Goal of Cryptography
HISTORY
The first use of cryptography in 1900 B.C.
PURPOSE OF CRYPTOGRAPHY
 Confidentiality
Authentication
 Integrity
 Non Repudiation
 Access Control
ENCRYPTION DECRYPTION
PLAIN
TEXT
PLAIN
TEXT
SENDER
CIPHE
RTEXT RECEIVER
BASIC BLOCK DIAGRAM
BASIC TERMINOLOGIES
Encryption
Decryption
Cryptosystem
TECHNIQUES OF CRYPTOGRAPHY
Substitution Technique
Transposition Technique
ENCRYPTION ALGORITHM
 Symmetric
 Asymmetric
SYMMETRIC ALGORITHM
Encryption Decryption
Key
Plaintext Cipher text
Original
Plaintext
Symmetric Cryptosystem
Data Encryption Standard (DES)
Advance Encryption Standard (AES)
ASYMMETRIC ALGORITHM
Rivest Shamir Adleman (RSA) Encryption
 Knapsack Algorithm
plaintext
encryption
public key
cipher text
decryption
private key
cipher text plaintext
SIMPLE ENCRYPTION SCHEME
(CAESAR’S CIPHER)
Substitution cipher:
Plain text: a b c d e f g h I j k l m n o p q r s t u v w x y z
Cipher text: m n b v c x z a s d f g h j k l p o I u y t r e w q
Example:
Plain text: HELLO WORLD
Cipher text: KHOOR ZRUOG
SIMPLE ENCRYPTION SCHEME
(RAIL FENCE TECHNIQUE)
H L O W R D
E L O L
 The Rail Fence Technique is an example of
Transposition Technique.
For example:
HELLO WORLDPlain text:
Cipher text: HLOWRDEL OL
SIMPLE ENCRYPTION SCHEME
(VERNAM CIPHER TECHNIQUE)
Vernam cipher uses a one time pad.
Example:
Plain text: HELLO WORLD
Cipher text: YW}}~F~C}U
Padding: SHARM QZNKP
DES (DATA ENCRYPTION STANDARD)
Example:
Plain text: HELLO WORLD
Cipher text: m0dh19VD0DXSrvJOhMOaEg==
DES was designed by IBM in
the 1970s and adopted by the
National Bureau of Standards
(NBS)
AES (ADVANCED ENCRYPTION STANDARD)
Example:
Plain text: HELLO WORLD
Cipher text: TpXlULf/l9GQX30osRMxTQ==
 128 Bit blocks
128 bit keys
MODIFIED ENCRYPTION TECHNIQUE
Modified encryption technique involves splitting up a
text into two parts, and then applying different
symmetric key cryptographic technique on them.
PLAIN TEXT : HELLO WORLD
PART 1 PART 2
HELLO WORLD
For example:
MODIFIED ENCRYPTION TECHNIQUE
APPLYING DIFFERENT TECHNIQUES ON TWO PARTS
PART 1 : HELLO
ENCRYPTED WITH CAESAR CIPHER: iffmp
PART 2: WORLD
ENCRYPTED WITH RAIL FENCE: olwrd
ENCRYPTED TEXT: iffmp olwrd
MODIFIED ENCRYPTION TECHNIQUE
Example: Hello World
Example: Hello World
MODIFIED ENCRYPTION TECHNIQUE
MODIFIED ENCRYPTION TECHNIQUE
Example: Hello World
Example: Hello World
MODIFIED ENCRYPTION TECHNIQUE
MODIFIED ENCRYPTION TECHNIQUE
MODIFIED ENCRYPTION TECHNIQUE
Advantage
Disadvantage
FUTURE SCOPE
 In future this technique can be modified by
implementing more encryption techniques of
cryptography to make the data more secure.
 The key can be conjugated as a single key.
CONCLUSION
Once the method has withstood all attacks for
sufficient length of time it may be used with a
reasonable amount of confidence.
THANK YOU

More Related Content

What's hot

What's hot (20)

Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementation
 
Cryptography
CryptographyCryptography
Cryptography
 
What is Cryptography?
What is Cryptography?What is Cryptography?
What is Cryptography?
 
Cryptography basices
Cryptography basicesCryptography basices
Cryptography basices
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cryptography Fundamentals
Cryptography FundamentalsCryptography Fundamentals
Cryptography Fundamentals
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography and E-Commerce
Cryptography and E-CommerceCryptography and E-Commerce
Cryptography and E-Commerce
 
Overview of cryptography
Overview of cryptographyOverview of cryptography
Overview of cryptography
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & Cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cryptography-Known plain text attack
Cryptography-Known plain text attack Cryptography-Known plain text attack
Cryptography-Known plain text attack
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
Cryptography Cryptography
Cryptography
 
Applied Cryptography
Applied CryptographyApplied Cryptography
Applied Cryptography
 

Similar to COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMPLEMETATION

SYMMETRIC CRYPTOGRAPHY
SYMMETRIC CRYPTOGRAPHY SYMMETRIC CRYPTOGRAPHY
SYMMETRIC CRYPTOGRAPHY Santosh Naidu
 
02 Information System Security
02  Information System Security02  Information System Security
02 Information System SecurityShu Shin
 
Performance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption techniquePerformance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption techniqueAncy Mariam Babu
 
Computer Cryptography and Encryption [by: Magoiga].pptx
Computer Cryptography and Encryption [by: Magoiga].pptxComputer Cryptography and Encryption [by: Magoiga].pptx
Computer Cryptography and Encryption [by: Magoiga].pptxmagoigamtatiro1
 
Encryptolog y-1216310707267721-9
Encryptolog y-1216310707267721-9Encryptolog y-1216310707267721-9
Encryptolog y-1216310707267721-9Shan Raja
 
Information System Security.pptx
Information System  Security.pptxInformation System  Security.pptx
Information System Security.pptxGIT
 
CH02-CompSec4e.pptx
CH02-CompSec4e.pptxCH02-CompSec4e.pptx
CH02-CompSec4e.pptxams1ams11
 
Authenticated Encryption Gcm Ccm
Authenticated Encryption Gcm CcmAuthenticated Encryption Gcm Ccm
Authenticated Encryption Gcm CcmVittorio Giovara
 
The Cryptography has YOU
The Cryptography has YOUThe Cryptography has YOU
The Cryptography has YOUYurii Bilyk
 
Classical cryptographic techniques, Feistel cipher structure
Classical cryptographic techniques, Feistel cipher structureClassical cryptographic techniques, Feistel cipher structure
Classical cryptographic techniques, Feistel cipher structureAdri Jovin
 
CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2Hamed Moghaddam
 
A Novel Secure Combination Technique of Steganography and Cryptography
A Novel Secure Combination Technique of Steganography and CryptographyA Novel Secure Combination Technique of Steganography and Cryptography
A Novel Secure Combination Technique of Steganography and CryptographyZac Darcy
 

Similar to COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMPLEMETATION (20)

SYMMETRIC CRYPTOGRAPHY
SYMMETRIC CRYPTOGRAPHY SYMMETRIC CRYPTOGRAPHY
SYMMETRIC CRYPTOGRAPHY
 
02 Information System Security
02  Information System Security02  Information System Security
02 Information System Security
 
Performance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption techniquePerformance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption technique
 
Computer Cryptography and Encryption [by: Magoiga].pptx
Computer Cryptography and Encryption [by: Magoiga].pptxComputer Cryptography and Encryption [by: Magoiga].pptx
Computer Cryptography and Encryption [by: Magoiga].pptx
 
Day5
Day5Day5
Day5
 
Iss lecture 2
Iss lecture 2Iss lecture 2
Iss lecture 2
 
Encryption
EncryptionEncryption
Encryption
 
Encryptolog y-1216310707267721-9
Encryptolog y-1216310707267721-9Encryptolog y-1216310707267721-9
Encryptolog y-1216310707267721-9
 
Cryptography
CryptographyCryptography
Cryptography
 
Classical cryptography1
Classical cryptography1Classical cryptography1
Classical cryptography1
 
Pavan
PavanPavan
Pavan
 
Cryptography
CryptographyCryptography
Cryptography
 
Classical cryptography
Classical cryptographyClassical cryptography
Classical cryptography
 
Information System Security.pptx
Information System  Security.pptxInformation System  Security.pptx
Information System Security.pptx
 
CH02-CompSec4e.pptx
CH02-CompSec4e.pptxCH02-CompSec4e.pptx
CH02-CompSec4e.pptx
 
Authenticated Encryption Gcm Ccm
Authenticated Encryption Gcm CcmAuthenticated Encryption Gcm Ccm
Authenticated Encryption Gcm Ccm
 
The Cryptography has YOU
The Cryptography has YOUThe Cryptography has YOU
The Cryptography has YOU
 
Classical cryptographic techniques, Feistel cipher structure
Classical cryptographic techniques, Feistel cipher structureClassical cryptographic techniques, Feistel cipher structure
Classical cryptographic techniques, Feistel cipher structure
 
CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2
 
A Novel Secure Combination Technique of Steganography and Cryptography
A Novel Secure Combination Technique of Steganography and CryptographyA Novel Secure Combination Technique of Steganography and Cryptography
A Novel Secure Combination Technique of Steganography and Cryptography
 

COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMPLEMETATION