SlideShare a Scribd company logo
Cryptography and its Application in
Security
Guided by
Dr. T.J.Siddiqui
Akriti Gupta
Roll No.:- 04
M.Sc. 4th Sem
INTRODUCTION
CRYPTOGRAPHY IS THE SCIENCE OF PROTECTING DATA,
WHICH PROVIDES MEANS AND METHODS OF
CONVERTING DATA INTO UNREADABLE FORM, SO THAT
VALID USER CAN ACCESS INFORMATION AT THE
DESTINATION.
OBJECTIVE
Our main goal in this project is to study and implement existing
algorithms of cryptography. We will analyze the various
algorithms and then draw conclusion which algorithm is best for
data security. Implementation of algorithms of cryptography for
securing information includes any type of data-text, image.
SERVICES OF INFORMATION
SECURITY −
• Confidential
• Authentication
• Integrity
• Non-repudiation
Types of Cryptography
 Symmetric key cryptography
Single common key to encrypt and decrypt
Faster an Simpler
e.g. RSA Algorithm
 Asymmetric key cryptography
A pair of keys to use to encrypt and decrypt
Private and Public key are different.
METHDOLOGY
 RSA (Rivest-Shamir-Adleman )
 AES (Advanced Encryption
Standard)
 Blowfish
In 1977, Rivest, Shamir, and Adelman proposed a scheme using a
public key for encrypting messages and a corresponding private key
for decryption -this scheme is commonly referred to as RSA.
RSA operation
RSA algorithm is asymmetric cryptography algorithm. Asymmetric
actually means that it works on two different keys i.e. Public Key
and Private Key. As the name describes that the Public Key is
given to everyone and Private key is kept private.
RSA
Step 1: Choose two large prime numbers p and q. The product
n=p X q is referred to as the modulus and ∅(n).
Step 2: Choose an encryption key, e, such that gcd(e,∅(n))= 1.
The pair of integers,(e,n) is referred to as the Public key.
Step 3: Compute the decryption key, d= 𝑒−1
mod ∅(n). d is also
referred to as the private key.
Key generation
Encryption Let m be the message (or plaintext). We use 𝑚 to
denote the length of m. In the naive implementation of RSA, a
message is split into multiple blocks, each size b, except possibly
for last block. 𝑚 mod b, if different from 0,will be the size of the
last block . For each block 𝑚𝑖,calculate the corresponding
ciphertext 𝑐𝑖 as
𝑐𝑖=𝑚𝑖
𝑒
mod n (1)
Encryption
Decryption
Given block of ciphertext 𝑐𝑖, the corresponding plaintext is
𝑚𝑖=𝑐𝑖
𝑑
mod n (2)
A block of plaintext, 𝑚𝑖 is encrypted as 𝑐𝑖 using (1)
AES(advanced encryption standard)
Rijndael algorithm supports various blocks sizes-128,192, 256 bits.
Likewise, different key sizes may be used -128, 192 , or 256 bits.
AES employs 10 rounds for 128-bit keys, and 12 rounds for 192 and
14 rounds for 256 bit keys.
It is convenient to visualize a block (and its transformation during and
after each round) as a 4 X 4 array of bytes. We refer to this as the
state array and denote it as Ƭ.
Encryption
In the case of 128-bit AES, each round(except for last) employs the
following four steps :
1)Byte substitution
2)Row shift
3)Column mixing
4)Round key addition
The last round skips the “Column mixing” step. Also, there is a solitary
“Round key addition” step just before the first round.
Decryption
Decryption can proceed in the reverse order -from the 10th round
upwards with each step being substituted by its inverse operation.
We denote their inverses as
1) InverseByte substitution
2) InverseRow shift
3) InverseColumn mixing
4) InverseRound key addition
Blowfish
In 1993 an alternative to DES Encryption Technique Blowfish
is an encryption technique designed by Bruce Schneier .
Block Size: 64-bits
Key Size: 32-bits to 448-bits variable size
Number of subkeys: 18 [P-array]
Number of rounds: 16
Number of subsitution boxes: 4 [each having 512 entries of
32-bits each]
Thanks

More Related Content

Similar to Cryptography and its Application in Security

Advanced Encryption Standard (AES) with Dynamic Substitution Box
Advanced Encryption Standard (AES) with Dynamic Substitution BoxAdvanced Encryption Standard (AES) with Dynamic Substitution Box
Advanced Encryption Standard (AES) with Dynamic Substitution Box
Hardik Manocha
 
Renas Rajab Asaad
Renas Rajab Asaad Renas Rajab Asaad
Renas Rajab Asaad
Renas Rekany
 
Analysis of Cryptographic Algorithms
Analysis of Cryptographic AlgorithmsAnalysis of Cryptographic Algorithms
Analysis of Cryptographic Algorithms
ijsrd.com
 
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
IJEACS
 
Survey of Hybrid Encryption Algorithm for Mobile Communication
Survey of Hybrid Encryption Algorithm for Mobile CommunicationSurvey of Hybrid Encryption Algorithm for Mobile Communication
Survey of Hybrid Encryption Algorithm for Mobile Communication
ijsrd.com
 
Cryptography
CryptographyCryptography
CryptographyRohan04
 
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
ijistjournal
 
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
IJCNCJournal
 
B03302007012
B03302007012B03302007012
B03302007012
theijes
 
IRJET- Comparative Analysis of Encryption Techniques
IRJET-  	  Comparative Analysis of Encryption TechniquesIRJET-  	  Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption Techniques
IRJET Journal
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
Seema Goel
 
Ch34508510
Ch34508510Ch34508510
Ch34508510
IJERA Editor
 
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
ams1ams11
 
A Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions AlgorithmsA Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions Algorithms
ijsrd.com
 
H42054550
H42054550H42054550
H42054550
IJERA Editor
 
Moein
MoeinMoein
Seminar on Encryption and Authenticity
Seminar on Encryption and AuthenticitySeminar on Encryption and Authenticity
Seminar on Encryption and Authenticity
Hardik Manocha
 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
jibonjibon5
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
Nagendra Um
 

Similar to Cryptography and its Application in Security (20)

Advanced Encryption Standard (AES) with Dynamic Substitution Box
Advanced Encryption Standard (AES) with Dynamic Substitution BoxAdvanced Encryption Standard (AES) with Dynamic Substitution Box
Advanced Encryption Standard (AES) with Dynamic Substitution Box
 
Renas Rajab Asaad
Renas Rajab Asaad Renas Rajab Asaad
Renas Rajab Asaad
 
Analysis of Cryptographic Algorithms
Analysis of Cryptographic AlgorithmsAnalysis of Cryptographic Algorithms
Analysis of Cryptographic Algorithms
 
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
 
Ijetcas14 355
Ijetcas14 355Ijetcas14 355
Ijetcas14 355
 
Survey of Hybrid Encryption Algorithm for Mobile Communication
Survey of Hybrid Encryption Algorithm for Mobile CommunicationSurvey of Hybrid Encryption Algorithm for Mobile Communication
Survey of Hybrid Encryption Algorithm for Mobile Communication
 
Cryptography
CryptographyCryptography
Cryptography
 
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
 
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
 
B03302007012
B03302007012B03302007012
B03302007012
 
IRJET- Comparative Analysis of Encryption Techniques
IRJET-  	  Comparative Analysis of Encryption TechniquesIRJET-  	  Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption Techniques
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Ch34508510
Ch34508510Ch34508510
Ch34508510
 
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
 
A Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions AlgorithmsA Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions Algorithms
 
H42054550
H42054550H42054550
H42054550
 
Moein
MoeinMoein
Moein
 
Seminar on Encryption and Authenticity
Seminar on Encryption and AuthenticitySeminar on Encryption and Authenticity
Seminar on Encryption and Authenticity
 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 

Recently uploaded

ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
ongomchris
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 

Recently uploaded (20)

ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 

Cryptography and its Application in Security

  • 1. Cryptography and its Application in Security Guided by Dr. T.J.Siddiqui Akriti Gupta Roll No.:- 04 M.Sc. 4th Sem
  • 2. INTRODUCTION CRYPTOGRAPHY IS THE SCIENCE OF PROTECTING DATA, WHICH PROVIDES MEANS AND METHODS OF CONVERTING DATA INTO UNREADABLE FORM, SO THAT VALID USER CAN ACCESS INFORMATION AT THE DESTINATION.
  • 3.
  • 4. OBJECTIVE Our main goal in this project is to study and implement existing algorithms of cryptography. We will analyze the various algorithms and then draw conclusion which algorithm is best for data security. Implementation of algorithms of cryptography for securing information includes any type of data-text, image.
  • 5. SERVICES OF INFORMATION SECURITY − • Confidential • Authentication • Integrity • Non-repudiation
  • 6. Types of Cryptography  Symmetric key cryptography Single common key to encrypt and decrypt Faster an Simpler e.g. RSA Algorithm  Asymmetric key cryptography A pair of keys to use to encrypt and decrypt Private and Public key are different.
  • 7. METHDOLOGY  RSA (Rivest-Shamir-Adleman )  AES (Advanced Encryption Standard)  Blowfish
  • 8. In 1977, Rivest, Shamir, and Adelman proposed a scheme using a public key for encrypting messages and a corresponding private key for decryption -this scheme is commonly referred to as RSA. RSA operation RSA algorithm is asymmetric cryptography algorithm. Asymmetric actually means that it works on two different keys i.e. Public Key and Private Key. As the name describes that the Public Key is given to everyone and Private key is kept private. RSA
  • 9. Step 1: Choose two large prime numbers p and q. The product n=p X q is referred to as the modulus and ∅(n). Step 2: Choose an encryption key, e, such that gcd(e,∅(n))= 1. The pair of integers,(e,n) is referred to as the Public key. Step 3: Compute the decryption key, d= 𝑒−1 mod ∅(n). d is also referred to as the private key. Key generation
  • 10. Encryption Let m be the message (or plaintext). We use 𝑚 to denote the length of m. In the naive implementation of RSA, a message is split into multiple blocks, each size b, except possibly for last block. 𝑚 mod b, if different from 0,will be the size of the last block . For each block 𝑚𝑖,calculate the corresponding ciphertext 𝑐𝑖 as 𝑐𝑖=𝑚𝑖 𝑒 mod n (1) Encryption
  • 11. Decryption Given block of ciphertext 𝑐𝑖, the corresponding plaintext is 𝑚𝑖=𝑐𝑖 𝑑 mod n (2) A block of plaintext, 𝑚𝑖 is encrypted as 𝑐𝑖 using (1)
  • 12. AES(advanced encryption standard) Rijndael algorithm supports various blocks sizes-128,192, 256 bits. Likewise, different key sizes may be used -128, 192 , or 256 bits. AES employs 10 rounds for 128-bit keys, and 12 rounds for 192 and 14 rounds for 256 bit keys. It is convenient to visualize a block (and its transformation during and after each round) as a 4 X 4 array of bytes. We refer to this as the state array and denote it as Ƭ.
  • 13. Encryption In the case of 128-bit AES, each round(except for last) employs the following four steps : 1)Byte substitution 2)Row shift 3)Column mixing 4)Round key addition The last round skips the “Column mixing” step. Also, there is a solitary “Round key addition” step just before the first round.
  • 14. Decryption Decryption can proceed in the reverse order -from the 10th round upwards with each step being substituted by its inverse operation. We denote their inverses as 1) InverseByte substitution 2) InverseRow shift 3) InverseColumn mixing 4) InverseRound key addition
  • 15.
  • 16. Blowfish In 1993 an alternative to DES Encryption Technique Blowfish is an encryption technique designed by Bruce Schneier . Block Size: 64-bits Key Size: 32-bits to 448-bits variable size Number of subkeys: 18 [P-array] Number of rounds: 16 Number of subsitution boxes: 4 [each having 512 entries of 32-bits each]
  • 17.
  • 18.
  • 19.
  • 20.