2. Definition
• An algorithm is basically a procedure or a formula for
solving a data snooping problem. An encryption
algorithm is a set of mathematical procedure for
performing encryption on data. Through the use of such
an algorithm, information is made in the cipher text and
requires the use of a key to transforming the data into its
original form.
3. • Encryption: It is the process of locking up information
using cryptography. Information that has been locked
this way is encrypted.
• A plain text from a user can be encrypted to a cipher text, then
send through a communication channel and no eavesdropper
can interfere with the plain text. When it reaches the receiver
end, the cipher text is decrypted to the original plain text.
4. Encoding
• Encoding is the process of converting data into a format
required for a number of information processing needs,
including:
5. Decoding
• Decoding is the reverse process of encoding which is to
extract the information from the converted format.
• For example, decoding Binary Coded Decimal requires
some simple calculations in base-2 arithmetic. Decoding
ASCII values is a straightforward process since there is a
one to one mapping between characters and numbers.
The term decoding is also used for digital to analog
conversion. In the filed of communication, decoding is
the process of converting received messages in to a
message written using a specific language
6. Types of Methods
• In encryption algorithm we have two types .They are
Symmetric Encryption
Asymmetric Encryption
7. Symmetric Encryption
• This is the simplest kind of encryption that involves only
one secret key to cipher and decipher information.
Symmetrical encryption is an old and best-known
technique.
• It uses a secret key that can either be a number, a word
or a string of random letters. It is a blended with the plain
text of a message to change the content in a particular
way. The sender and the recipient should know the
secret key that is used to encrypt and decrypt all the
messages
• .Blowfish, AES, RC4, DES, RC5, and RC6 are examples
of symmetric encryption
10. Definition of Asymmetric
Encryption
• A message that is encrypted using a public key can only
be decrypted using a private key, while also, a message
encrypted using a private key can be decrypted using a
public key. Security of the public key is not required
because it is publicly available and can be passed over
the internet. Asymmetric key has a far better power in
ensuring the security of information transmitted during
communication.
• Popular asymmetric key encryption algorithm includes
EIGamal, RSA, DSA, Elliptic curve techniques, PKCS.
11. 1. AES(Advanced Encryption
Standard)
• AES is an encryption standard chosen by the National
Institute of Standards and Technology(NIST) , USA to
protect classified information. It has been accepted world
wide as a desirable algorithm to encrypt sensitive data.
• It is a block cipher which operates on block size of 128 bits for
both encrypting as well as decrypting
12. • The number of rounds performed by the
algorithm strictly depends on the size of
key
Key Size(in bits) Rounds
❖128.....................................10
❖192.....................................12
❖256.....................................14
The larger the number of keys the more secure will
be the data
13. 2.DES(Data Encryption Standard)
• DES use symmetric system means both sender and
receiver side we used same key for encryption and
decryption
• It used 64 bits of block for encryption and decryption.
Sixteen rounds of transportation and substitution are
performed in order to achieve DES
14. DES Working
• It is a symmetric block encryption algorithm when 64-bit
blocks of plain text go in , 64-bit blocks of cipher text
come out.
• It uses a 64-bit key:56 bits make up the true key, and 8
bits are used for parity
• When it applied to data, it divides the message in to
blocks and operates on them one at a time .Then the
result is64-bit blocks of cipher text
15. DES Modes
• In Block ciphers have several modes of
operation. Each mode specifies how a
block cipher will operate
Electronic Code Book
Cipher Block Chaining
Cipher Feedback
Output Feedback
Counter Mode
17. 3.RC4, RC5, RC6
• A series of symmetric algorithms developed by RSA
Security
RC4 : A variable key-size stream cipher with byte-
oriented operations . The algorithm is based on the
random permutation
RC5 : a parameterized algorithm with a variable block
size, a variable key size, and a variable number of
rounds. Allowable choices for the block size are 32 bits
(for experimentation and evaluation purposes only), 64
bits (for use a drop-in replacement for DES), and 128
bits
18. • RC6 - a block cipher based on RC5. RC6 is a
parameterized algorithm where the block size, the key
size, and the number of rounds are variable. The upper
limit on the key size is 2040 bits. RC6 adds two features
to RC5: the inclusion of integer multiplication and the use
of four 4-bit working registers instead of RC5��s two 2-
bit registers.
19. 4.Kerberos
• Require that each client (each request for Service) prove
it’s identity.
• Does not require user to enter password every time a
service is requested.
• It uses Needham-Schroedar Algorithm
• Kerberos assumes that network connections (rather than
servers and work stations) are the weak link in network
security
• The Needham-Schroeder Public-key Protocol provides
mutual authentication
20.
21. 5.MD5
• The MD5 hashing algorithm was created in the early
1990’s, and is one of a family of Message-Digest
algorithms. Several of these were developed by Ronald
Rivest
• Ronald Rivest is a cryptographer with significant
contributions to the field. He is a professor at MIT. He’s
also one of the inventors of RSA Algorithm . He’s a giant
in the cryptography world
22. MD5 Working
• Md5 algorithm first divides the input into blocks of 512
bits each. 64 Bits recording the length of the original
input are inserted at the end of the last block. If the last
block is less than 512 bits, some extra bits are padded to
the end.
• The algorithm consists of a set of buffers and tables to
combine and shift the data through five computational
steps .Four rounds of computation are done to compute
the hash of the input value
• MD5 is quite computationally efficient, compared to other
hashing functions
23. 6. SHA
• SHA Algorithm was developed by NIST along with NSA
• In 1993, SHA was published as a Federal Information
Processing Standard
• This algorithm uses Asymmetric Encryption
• It has following Versions:
SHA-1
SHA-256
SHA-384
SHA-526
24.
25. 7.RSA
• RSA (Rivest–Shamir–Adleman) is an algorithm used
by modern computers to encrypt and decrypt messages.
It is an asymmetric cryptographic algorithm. Asymmetric
means that there are two different keys. This is also
called public key cryptography, because one of the keys
can be given to anyone. The other key must be kept
private. The algorithm is based on the fact that finding
the factors of a large composite number is difficult: when
the integers are prime numbers, the problem is called
prime factorization. It is also a key pair (public and
private key) generator.