3-Way Encryption

2,313 views

Published on

Presentation on 3-way encryption algorithm as a part of Computers and Network Security course in College

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
2,313
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
29
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

3-Way Encryption

  1. 1. 3-Way Encryption Algorithm <ul>By Rajeev N Bharshetty Tarun T Arya </ul>
  2. 2. Basics <ul><li>Symmetric key encryption.
  3. 3. Block cipher.
  4. 4. 96 bit blocks as input.
  5. 5. Key- 96 bit.
  6. 6. 11 rounds.
  7. 7. Basic operations: XOR, rearrangement. </li></ul>
  8. 8. Functions Used... <ul><li>Mu – To Inverse the order of bits.
  9. 9. Gamma – Non Linear Operation.
  10. 10. Theta – Linear Operation
  11. 11. Pi_1 – Randomizing sequence 1.
  12. 12. Pi_2 - Randomizing sequence 2.
  13. 13. Rho – Round function (theta,pi_1,gamma,pi_2)
  14. 14. rndcon_gen – To generate round constants.
  15. 15. Encrypt – For encryption(XOR with key and round const + rho).
  16. 16. Decrypt – For decryption. </li></ul>
  17. 17. One Round <ul><li>Divides 96bit block into 3 32 bit blocks.
  18. 18. Start round constant START_E 0x0b0b.
  19. 19. Start round constant START_D 0xb1b1.
  20. 20. XOR with key and round constants.
  21. 21. The 32 bit blocks are rearranged using theta() and gamma functions (show the code).
  22. 22. These set of operations are done for 11 times.
  23. 23. The reverse of the same is done for decryption. </li></ul>
  24. 24. DEMO <ul><li>Time for DEMO
  25. 25. Usage: ./a.out inp_file out_file x key
  26. 26. where x is d for decrypt or x is e for encrypt,
  27. 27. and the key is twelve characters </li></ul>
  28. 28. Merits <ul><li>3-way algorithm is efficient in wide range of platforms from 8-bit processors to specialized hardware.
  29. 29. 3-way algorithm resembles more mathematical features which enable all the decryption to be done in exactly same way as in encryption.
  30. 30. 3-way encryption ensures total security in on-line transactions.
  31. 31. This algorithm provides additional security to protect customers order information such as credit card numbers. </li></ul>
  32. 32. Demerits <ul><li>3-WAY algorithm requires a lot of space for its execution.
  33. 33. Key exchange is a problem. </li></ul>
  34. 34. Applications <ul><li>Three way algorithms are used in web browsing, electronic mail, internet faxing, instant messaging and voice-over-IP.
  35. 35. 3-way algorithm has prominent role in establishing network over wide ranges.
  36. 36. They are used in many web applications.
  37. 37. 3-way algorithm provides more security when compared to any other algorithms. </li></ul>
  38. 38. Thank You

×