SlideShare a Scribd company logo
1 of 16
SEMINAR TOPIC
ON
IDEA
(INTERNATIONAL DATA ENCRYPTION ALGORITHM)
Present To: Present By:
Dr. Balwinder Singh Sachin Maithani
ME(Regular) ECE
202604
TABLE OF CONTENT
• 1.Introduction
• 2. Basic Idea about IDEA
• 3.Design Issues
• 4.Key generation Process
• 5.Sequence of operation in one round
• 6.Sequences of operation in last round
• 7.Encryption
• 8.Dcryption
• 9.Application of IDEA
INTRODUCTION
• IDEA is a symmetric block cipher algorithm.
• It was developed by Xuejia Lai and James L. Massey.
• Its patents are held by the Swiss company "Ascom-Tech AG".
INTRODUCTION
• It was meant to be a replacement for the Data Encryption Standard.
• IDEA was used in Pretty Good Privacy (PGP) v2.0 .
• It is developed at ETH in Zurich, Switzerland in 1990.
BASIC IDEA ABOUT IDEA
• Here Plain text is of 64 bit.
• Key is of 128 bit. And it is divided in 52 sub keys
• Cipher text is also as same as plain text in size that is of 64 bit.
• Number of identical rounds are 8 where in each round 6 keys are used.
• Like this 48 keys and in last round another 4 keys (6 * 8 = 48 + 4 =52 total) are
being used in both the encryption and decryption process.
DESIGN ISSUES
• The design philosophy behind the algorithm is one of “ mixing operation from
different algebraic groups”
• Lets take a look which different operations are used.
• 1) XOR
• 2) Addition
• 3) Multiplication
KEY GENERATION PROCESS
• First of all we will see how these 52 keys are generated.
• The 128 bit key is divided into 8 sub parts that is 16 bits each.
• Then the 128 bit key is cyclically shifted to the left by 25 position, so by doing this
we will have one new 128 bit key.
• Now similarly as above it is divided into 8 sub blocks and will be used in next
round.
• The same process is performed 9 times and 56 keys are generated from which the
first 52keys will be used.
• So likewise from K1 to K52 keys are generated.
SEQUENCE OF OPERATION IN ONE
ROUND
• 1) Multiply P1 and K1
• 2) Add P2 and second K2
• 3) Add P3 and third K3
• 4) Multiply P4 and K4
• 5) Step 1 ⊕ step 3
• 6) Step 2 ⊕ step 4
• 7) Multiply step 5 with K5
SEQUENCE OF OPERATION IN ONE
ROUND
• 8) Add result of step 6 and step 7
• 9) Multiply result of step 8 with K6.
• 10) Add result of step 7 and step 9.
• 11) XOR result of steps 1 and step 9.
• 12) XOR result of steps 3 and step 9.
• 13) XOR result of steps 2 and step 10.
• 14) XOR result of steps 4 and step 10. Sequence of operation in one round
• Same operations are performed in 8 rounds…
SEQUENCES OF OPERATION IN LAST
ROUND
• 1) Multiply P1 with K49.
• 2) Add P2 and K50.
• 3) Add P3 and K51.
• 4) Multiply P4 and K52.
ENCRYPTION
• First of all 64 bit plain text is divided into 4 16-bit parts and they are taken as an
input in first round.
• At the end of the first encryption round four 16-bit values are produced which are
used as input to the second encryption round
• The process is repeated in each of the subsequent 8 encryption rounds
• Note that in 9th round we have to use only 4 key( K49, K50, K51,K52) and have to
perform different operation as guided in previous slide.
DCRYPTION
• The computational process used for decryption of the ciphertext is essentially the
same as that used for encryption
• The only difference is that each of the 52 16-bit key sub-blocks used for decryption
is the inverse of the key sub-block used during encryption
• Do remember that the sub blocks must be used in reverse order than of the
encryption round.
APPLICATION
• Today, there are hundreds of IDEA-based security solutions available in many
market areas, ranging from Financial Services, and Broadcasting to Government
• The IDEA algorithm can easily be combined in any encryption software. Data
encryption can be used to protect data transmission and storage.
• Typical fields are:
• Audio and video data for cable TV, video conferencing, distance learning
• Sensitive financial and commercial data
• Email via public networks
• Smart cards
REFERENCES
• https://en.wikipedia.org/wiki/International_Data_Encryption_Algorithm
• https://www.educba.com/idea-algorithm/
• https://www.youtube.com/watch?v=5guYSKCFkzg
• https://www.youtube.com/watch?v=iOE_3GW0njg
Thank You

More Related Content

What's hot

What's hot (20)

Cryptography
CryptographyCryptography
Cryptography
 
One time pad Encryption:
One time pad Encryption:One time pad Encryption:
One time pad Encryption:
 
Topic20 The RC4 Algorithm.pptx
Topic20 The RC4 Algorithm.pptxTopic20 The RC4 Algorithm.pptx
Topic20 The RC4 Algorithm.pptx
 
Cryptography
CryptographyCryptography
Cryptography
 
block ciphers
block ciphersblock ciphers
block ciphers
 
A Brief History of Cryptography
A Brief History of CryptographyA Brief History of Cryptography
A Brief History of Cryptography
 
Cryptography - 101
Cryptography - 101Cryptography - 101
Cryptography - 101
 
Hash Function
Hash FunctionHash Function
Hash Function
 
Rotor Cipher and Enigma Machine
Rotor Cipher and Enigma MachineRotor Cipher and Enigma Machine
Rotor Cipher and Enigma Machine
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
Key Management and Distribution
Key Management and DistributionKey Management and Distribution
Key Management and Distribution
 
Steganography
SteganographySteganography
Steganography
 
Trible data encryption standard (3DES)
Trible data encryption standard (3DES)Trible data encryption standard (3DES)
Trible data encryption standard (3DES)
 
cryptography
cryptographycryptography
cryptography
 
Cryptographic Algorithms: DES and RSA
Cryptographic Algorithms: DES and RSACryptographic Algorithms: DES and RSA
Cryptographic Algorithms: DES and RSA
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
 
Cryptography
CryptographyCryptography
Cryptography
 
Two fish cipher
Two fish cipherTwo fish cipher
Two fish cipher
 
Cryptography
CryptographyCryptography
Cryptography
 

Similar to Idea alogorithim

Similar to Idea alogorithim (20)

Information and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmInformation and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithm
 
IDEA.ppt
IDEA.pptIDEA.ppt
IDEA.ppt
 
1 DES.pdf
1 DES.pdf1 DES.pdf
1 DES.pdf
 
Block ciphers & public key cryptography
Block ciphers & public key cryptographyBlock ciphers & public key cryptography
Block ciphers & public key cryptography
 
Symmetric encryption
Symmetric encryptionSymmetric encryption
Symmetric encryption
 
Des lecture
Des lectureDes lecture
Des lecture
 
Module 2.pptx
Module 2.pptxModule 2.pptx
Module 2.pptx
 
Two fish & Rijndael (AES) Encryption Algorithm
Two fish & Rijndael (AES) Encryption AlgorithmTwo fish & Rijndael (AES) Encryption Algorithm
Two fish & Rijndael (AES) Encryption Algorithm
 
SPARKNaCl: A verified, fast cryptographic library
SPARKNaCl: A verified, fast cryptographic librarySPARKNaCl: A verified, fast cryptographic library
SPARKNaCl: A verified, fast cryptographic library
 
4. Block Ciphers
4. Block Ciphers 4. Block Ciphers
4. Block Ciphers
 
Overview on Cryptography and Network Security
Overview on Cryptography and Network SecurityOverview on Cryptography and Network Security
Overview on Cryptography and Network Security
 
Information and network security 20 data encryption standard des
Information and network security 20 data encryption standard desInformation and network security 20 data encryption standard des
Information and network security 20 data encryption standard des
 
Super-Encryption Cryptography with IDEA and WAKE Algorithm
Super-Encryption Cryptography with IDEA and WAKE AlgorithmSuper-Encryption Cryptography with IDEA and WAKE Algorithm
Super-Encryption Cryptography with IDEA and WAKE Algorithm
 
Proposed Lightweight Block Cipher Algorithm for Securing Internet of Things
Proposed Lightweight Block Cipher Algorithm for Securing Internet of ThingsProposed Lightweight Block Cipher Algorithm for Securing Internet of Things
Proposed Lightweight Block Cipher Algorithm for Securing Internet of Things
 
3.pptx
3.pptx3.pptx
3.pptx
 
Lecture # 007 AES.pptx
Lecture # 007 AES.pptxLecture # 007 AES.pptx
Lecture # 007 AES.pptx
 
Deep hooks
Deep hooksDeep hooks
Deep hooks
 
section-8.ppt
section-8.pptsection-8.ppt
section-8.ppt
 
information security(Feistal Cipher)
information security(Feistal Cipher)information security(Feistal Cipher)
information security(Feistal Cipher)
 
Introducing an Encryption Algorithm based on IDEA
Introducing an Encryption Algorithm based on IDEAIntroducing an Encryption Algorithm based on IDEA
Introducing an Encryption Algorithm based on IDEA
 

More from SachinMaithani1 (7)

Industrial seminnar
Industrial seminnarIndustrial seminnar
Industrial seminnar
 
Indoorpropagation
Indoorpropagation Indoorpropagation
Indoorpropagation
 
Presentation
PresentationPresentation
Presentation
 
Seminar topic.on embeded system
Seminar topic.on embeded systemSeminar topic.on embeded system
Seminar topic.on embeded system
 
EDFA amplifier ppt
EDFA amplifier pptEDFA amplifier ppt
EDFA amplifier ppt
 
Walsh transform
Walsh transformWalsh transform
Walsh transform
 
Symbol timing estimation by sachin maithani
Symbol timing estimation by sachin maithaniSymbol timing estimation by sachin maithani
Symbol timing estimation by sachin maithani
 

Recently uploaded

Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
pritamlangde
 

Recently uploaded (20)

Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .ppt
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To Curves
 
Electromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxElectromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptx
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth Reinforcement
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Signal Processing and Linear System Analysis
Signal Processing and Linear System AnalysisSignal Processing and Linear System Analysis
Signal Processing and Linear System Analysis
 

Idea alogorithim

  • 1. SEMINAR TOPIC ON IDEA (INTERNATIONAL DATA ENCRYPTION ALGORITHM) Present To: Present By: Dr. Balwinder Singh Sachin Maithani ME(Regular) ECE 202604
  • 2. TABLE OF CONTENT • 1.Introduction • 2. Basic Idea about IDEA • 3.Design Issues • 4.Key generation Process • 5.Sequence of operation in one round • 6.Sequences of operation in last round • 7.Encryption • 8.Dcryption • 9.Application of IDEA
  • 3. INTRODUCTION • IDEA is a symmetric block cipher algorithm. • It was developed by Xuejia Lai and James L. Massey. • Its patents are held by the Swiss company "Ascom-Tech AG".
  • 4. INTRODUCTION • It was meant to be a replacement for the Data Encryption Standard. • IDEA was used in Pretty Good Privacy (PGP) v2.0 . • It is developed at ETH in Zurich, Switzerland in 1990.
  • 5. BASIC IDEA ABOUT IDEA • Here Plain text is of 64 bit. • Key is of 128 bit. And it is divided in 52 sub keys • Cipher text is also as same as plain text in size that is of 64 bit. • Number of identical rounds are 8 where in each round 6 keys are used. • Like this 48 keys and in last round another 4 keys (6 * 8 = 48 + 4 =52 total) are being used in both the encryption and decryption process.
  • 6. DESIGN ISSUES • The design philosophy behind the algorithm is one of “ mixing operation from different algebraic groups” • Lets take a look which different operations are used. • 1) XOR • 2) Addition • 3) Multiplication
  • 7. KEY GENERATION PROCESS • First of all we will see how these 52 keys are generated. • The 128 bit key is divided into 8 sub parts that is 16 bits each. • Then the 128 bit key is cyclically shifted to the left by 25 position, so by doing this we will have one new 128 bit key. • Now similarly as above it is divided into 8 sub blocks and will be used in next round. • The same process is performed 9 times and 56 keys are generated from which the first 52keys will be used. • So likewise from K1 to K52 keys are generated.
  • 8. SEQUENCE OF OPERATION IN ONE ROUND • 1) Multiply P1 and K1 • 2) Add P2 and second K2 • 3) Add P3 and third K3 • 4) Multiply P4 and K4 • 5) Step 1 ⊕ step 3 • 6) Step 2 ⊕ step 4 • 7) Multiply step 5 with K5
  • 9.
  • 10. SEQUENCE OF OPERATION IN ONE ROUND • 8) Add result of step 6 and step 7 • 9) Multiply result of step 8 with K6. • 10) Add result of step 7 and step 9. • 11) XOR result of steps 1 and step 9. • 12) XOR result of steps 3 and step 9. • 13) XOR result of steps 2 and step 10. • 14) XOR result of steps 4 and step 10. Sequence of operation in one round • Same operations are performed in 8 rounds…
  • 11. SEQUENCES OF OPERATION IN LAST ROUND • 1) Multiply P1 with K49. • 2) Add P2 and K50. • 3) Add P3 and K51. • 4) Multiply P4 and K52.
  • 12. ENCRYPTION • First of all 64 bit plain text is divided into 4 16-bit parts and they are taken as an input in first round. • At the end of the first encryption round four 16-bit values are produced which are used as input to the second encryption round • The process is repeated in each of the subsequent 8 encryption rounds • Note that in 9th round we have to use only 4 key( K49, K50, K51,K52) and have to perform different operation as guided in previous slide.
  • 13. DCRYPTION • The computational process used for decryption of the ciphertext is essentially the same as that used for encryption • The only difference is that each of the 52 16-bit key sub-blocks used for decryption is the inverse of the key sub-block used during encryption • Do remember that the sub blocks must be used in reverse order than of the encryption round.
  • 14. APPLICATION • Today, there are hundreds of IDEA-based security solutions available in many market areas, ranging from Financial Services, and Broadcasting to Government • The IDEA algorithm can easily be combined in any encryption software. Data encryption can be used to protect data transmission and storage. • Typical fields are: • Audio and video data for cable TV, video conferencing, distance learning • Sensitive financial and commercial data • Email via public networks • Smart cards
  • 15. REFERENCES • https://en.wikipedia.org/wiki/International_Data_Encryption_Algorithm • https://www.educba.com/idea-algorithm/ • https://www.youtube.com/watch?v=5guYSKCFkzg • https://www.youtube.com/watch?v=iOE_3GW0njg