SlideShare a Scribd company logo
1 of 26
Download to read offline
Encryption
Merey Sovet,
Askar Nurkey,
Shalkar Rashid
Definition
• An algorithm is basically a procedure or a formula for
solving a data snooping problem. An ​encryption
algorithm is a set of mathematical procedure for
performing encryption on data. Through the use of such
an algorithm, information is made in the cipher text and
requires the use of a key to transforming the data into its
original form.
• Encryption​: It is the process of locking up information
using cryptography. Information that has been locked
this way is encrypted.
• A plain text from a user can be encrypted to a cipher text, then
send through a communication channel and no eavesdropper
can interfere with the plain text. When it reaches the receiver
end, the cipher text is decrypted to the original plain text.
Encoding
• Encoding is the process of converting data into a format
required for a number of information processing needs,
including:
Decoding
• Decoding ​is the reverse process of encoding which is to
extract the information from the converted format.
• For example, decoding Binary Coded Decimal requires
some simple calculations in base-2 arithmetic. Decoding
ASCII values is a straightforward process since there is a
one to one mapping between characters and numbers.
The term decoding is also used for digital to analog
conversion. In the filed of communication, decoding is
the process of converting received messages in to a
message written using a specific language
Types of Methods
• In encryption algorithm we have two types .They are
Symmetric Encryption
Asymmetric Encryption
Symmetric Encryption
• This is the simplest kind of encryption that involves only
one secret key to cipher and decipher information.
Symmetrical encryption is an old and best-known
technique.
• It uses a secret key that can either be a number, a word
or a string of random letters. It is a blended with the plain
text of a message to change the content in a particular
way. The sender and the recipient should know the
secret key that is used to encrypt and decrypt all the
messages
• .Blowfish, AES, RC4, DES, RC5, and RC6 are examples
of symmetric encryption
Asymmetric Encryption
Definition of Asymmetric
Encryption
• A message that is encrypted using a public key can only
be decrypted using a private key, while also, a message
encrypted using a private key can be decrypted using a
public key. Security of the public key is not required
because it is publicly available and can be passed over
the internet. Asymmetric key has a far better power in
ensuring the security of information transmitted during
communication.
• Popular asymmetric key encryption algorithm includes
EIGamal, RSA, DSA, Elliptic curve techniques, PKCS.
1. AES(​Advanced Encryption
Standard​)
• AES is an encryption standard chosen by the National
Institute of Standards and Technology(NIST) , USA to
protect classified information. It has been accepted world
wide as a desirable algorithm to encrypt sensitive data.
• It is a block cipher which operates on block size of 128 bits for
both encrypting as well as decrypting
• The number of rounds performed by the
algorithm strictly depends on the size of
key
Key Size(in bits) Rounds
❖128.....................................10
❖192.....................................12
❖256.....................................14
The larger the number of keys the more secure will
be the data
2.DES(​Data Encryption Standard​)
• DES use symmetric system means both sender and
receiver side we used same key for encryption and
decryption
• It used 64 bits of block for encryption and decryption.
Sixteen rounds of transportation and substitution are
performed in order to achieve DES
DES Working
• It is a symmetric block encryption algorithm when 64-bit
blocks of plain text go in , 64-bit blocks of cipher text
come out.
• It uses a 64-bit key:56 bits make up the true key, and 8
bits are used for parity
• When it applied to data, it divides the message in to
blocks and operates on them one at a time .Then the
result is64-bit blocks of cipher text
DES Modes
• In Block ciphers have several modes of
operation. Each mode specifies how a
block cipher will operate
Electronic Code Book
Cipher Block Chaining
Cipher Feedback
Output Feedback
Counter Mode
Triple DES
3.RC4, RC5, RC6
• A series of symmetric algorithms developed by RSA
Security
RC4 : A variable key-size stream cipher with byte-
oriented operations . The algorithm is based on the
random permutation
RC5 : a parameterized algorithm with a variable block
size, a variable key size, and a variable number of
rounds. Allowable choices for the block size are 32 bits
(for experimentation and evaluation purposes only), 64
bits (for use a drop-in replacement for DES), and 128
bits
• RC6 ​- a block cipher based on RC5. RC6 is a
parameterized algorithm where the block size, the key
size, and the number of rounds are variable. The upper
limit on the key size is 2040 bits. RC6 adds two features
to RC5: the inclusion of integer multiplication and the use
of four 4-bit working registers instead of RC5​��​s two 2-
bit registers.
4.Kerberos
• Require that each client (each request for Service) prove
it’s identity.
• Does not require user to enter password every time a
service is requested.
• It uses Needham-Schroedar Algorithm
• Kerberos assumes that network connections (rather than
servers and work stations) are the weak link in network
security
• The Needham-Schroeder Public-key Protocol provides
mutual authentication
5.MD5
• The MD5 hashing algorithm was created in the early
1990’s, and is one of a family of Message-Digest
algorithms. Several of these were developed by Ronald
Rivest
• Ronald Rivest is a cryptographer with significant
contributions to the field. He is a professor at MIT. He’s
also one of the inventors of RSA Algorithm . He’s a giant
in the cryptography world
MD5 Working
• Md5 algorithm first divides the input into blocks of 512
bits each. 64 Bits recording the length of the original
input are inserted at the end of the last block. If the last
block is less than 512 bits, some extra bits are padded to
the end.
• The algorithm consists of a set of buffers and tables to
combine and shift the data through five computational
steps .Four rounds of computation are done to compute
the hash of the input value
• MD5 is quite computationally efficient, compared to other
hashing functions
6. SHA
• SHA Algorithm was developed by NIST along with NSA
• In 1993, SHA was published as a Federal Information
Processing Standard
• This algorithm uses Asymmetric Encryption
• It has following Versions:
SHA-1
SHA-256
SHA-384
SHA-526
7.RSA
• RSA (Rivest–Shamir–Adleman) ​is an algorithm used
by modern computers to encrypt and decrypt messages.
It is an asymmetric cryptographic algorithm. Asymmetric
means that there are two different keys. This is also
called public key cryptography, because one of the keys
can be given to anyone. The other key must be kept
private. The algorithm is based on the fact that finding
the factors of a large composite number is difficult: when
the integers are prime numbers, the problem is called
prime factorization. It is also a key pair (public and
private key) generator.
Thanks for attention!!!

More Related Content

What's hot

What's hot (20)

CNIT 141 6. Hash Functions
CNIT 141 6. Hash FunctionsCNIT 141 6. Hash Functions
CNIT 141 6. Hash Functions
 
network and cyber security
network and cyber securitynetwork and cyber security
network and cyber security
 
Encryption
EncryptionEncryption
Encryption
 
RC 4
RC 4 RC 4
RC 4
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography Ashik
Cryptography AshikCryptography Ashik
Cryptography Ashik
 
Cryptography in Python
Cryptography in PythonCryptography in Python
Cryptography in Python
 
Pgp1
Pgp1Pgp1
Pgp1
 
Hash Function & Analysis
Hash Function & AnalysisHash Function & Analysis
Hash Function & Analysis
 
Cryptography
CryptographyCryptography
Cryptography
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security 18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
CRYPTOGRAPHY
CRYPTOGRAPHYCRYPTOGRAPHY
CRYPTOGRAPHY
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
Cryptography using python
Cryptography using pythonCryptography using python
Cryptography using python
 
Ch 12: Cryptography
Ch 12: CryptographyCh 12: Cryptography
Ch 12: Cryptography
 
MD5Algorithm
MD5AlgorithmMD5Algorithm
MD5Algorithm
 
A study of cryptography for satellite applications
A study of cryptography for satellite applicationsA study of cryptography for satellite applications
A study of cryptography for satellite applications
 
Hash
HashHash
Hash
 
Cryptography Introduction
Cryptography IntroductionCryptography Introduction
Cryptography Introduction
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 

Similar to Encryption pres

UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4  CRYPTOGRAPHIC SYSTEMS.pptxUNIT 4  CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptxssuserd5e356
 
Basic Cryptography.pdf
Basic Cryptography.pdfBasic Cryptography.pdf
Basic Cryptography.pdfSetiya Nugroho
 
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...editor1knowledgecuddle
 
Cryptographic Chronicles: Unveiling Definitions, Algorithms, Attacks, and App...
Cryptographic Chronicles: Unveiling Definitions, Algorithms, Attacks, and App...Cryptographic Chronicles: Unveiling Definitions, Algorithms, Attacks, and App...
Cryptographic Chronicles: Unveiling Definitions, Algorithms, Attacks, and App...zachdwg
 
IS413 Topic 5.pptx
IS413 Topic 5.pptxIS413 Topic 5.pptx
IS413 Topic 5.pptxWarrenPhiri4
 
Encryption in php
Encryption in phpEncryption in php
Encryption in phpsana mateen
 
CISSP Prep: Ch 4. Security Engineering (Part 2)
CISSP Prep: Ch 4. Security Engineering (Part 2)CISSP Prep: Ch 4. Security Engineering (Part 2)
CISSP Prep: Ch 4. Security Engineering (Part 2)Sam Bowne
 
Information Security Lesson 8 - Cryptography - Eric Vanderburg
Information Security Lesson 8 - Cryptography - Eric VanderburgInformation Security Lesson 8 - Cryptography - Eric Vanderburg
Information Security Lesson 8 - Cryptography - Eric VanderburgEric Vanderburg
 
7-cryptography.ppt
7-cryptography.ppt7-cryptography.ppt
7-cryptography.pptGhamdan5
 
the art of the fking dum crypto_basic.ppt
the art of the fking dum crypto_basic.pptthe art of the fking dum crypto_basic.ppt
the art of the fking dum crypto_basic.pptjamkhan10
 
This is the presentation ofcryptography.ppt
This is the presentation ofcryptography.pptThis is the presentation ofcryptography.ppt
This is the presentation ofcryptography.pptvimalguptaofficial
 
Crytography CertCourse Module 1 & 2.ppt
Crytography CertCourse Module 1 & 2.pptCrytography CertCourse Module 1 & 2.ppt
Crytography CertCourse Module 1 & 2.pptMuhammadShajid1
 
Best book for the cryptography doctor.ppt
Best book for the cryptography doctor.pptBest book for the cryptography doctor.ppt
Best book for the cryptography doctor.pptnicolausalex722
 

Similar to Encryption pres (20)

Encryption algorithms
Encryption algorithmsEncryption algorithms
Encryption algorithms
 
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4  CRYPTOGRAPHIC SYSTEMS.pptxUNIT 4  CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
 
Basic Cryptography.pdf
Basic Cryptography.pdfBasic Cryptography.pdf
Basic Cryptography.pdf
 
groupWork.pptx
groupWork.pptxgroupWork.pptx
groupWork.pptx
 
CISSP - Chapter 3 - Cryptography
CISSP - Chapter 3 - CryptographyCISSP - Chapter 3 - Cryptography
CISSP - Chapter 3 - Cryptography
 
Lesson 1
Lesson 1Lesson 1
Lesson 1
 
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
 
Cryptographic Chronicles: Unveiling Definitions, Algorithms, Attacks, and App...
Cryptographic Chronicles: Unveiling Definitions, Algorithms, Attacks, and App...Cryptographic Chronicles: Unveiling Definitions, Algorithms, Attacks, and App...
Cryptographic Chronicles: Unveiling Definitions, Algorithms, Attacks, and App...
 
IS413 Topic 5.pptx
IS413 Topic 5.pptxIS413 Topic 5.pptx
IS413 Topic 5.pptx
 
Encryption in php
Encryption in phpEncryption in php
Encryption in php
 
CISSP Prep: Ch 4. Security Engineering (Part 2)
CISSP Prep: Ch 4. Security Engineering (Part 2)CISSP Prep: Ch 4. Security Engineering (Part 2)
CISSP Prep: Ch 4. Security Engineering (Part 2)
 
Information Security Lesson 8 - Cryptography - Eric Vanderburg
Information Security Lesson 8 - Cryptography - Eric VanderburgInformation Security Lesson 8 - Cryptography - Eric Vanderburg
Information Security Lesson 8 - Cryptography - Eric Vanderburg
 
7-cryptography.ppt
7-cryptography.ppt7-cryptography.ppt
7-cryptography.ppt
 
7-cryptography.ppt
7-cryptography.ppt7-cryptography.ppt
7-cryptography.ppt
 
7-cryptography.ppt
7-cryptography.ppt7-cryptography.ppt
7-cryptography.ppt
 
the art of the fking dum crypto_basic.ppt
the art of the fking dum crypto_basic.pptthe art of the fking dum crypto_basic.ppt
the art of the fking dum crypto_basic.ppt
 
This is the presentation ofcryptography.ppt
This is the presentation ofcryptography.pptThis is the presentation ofcryptography.ppt
This is the presentation ofcryptography.ppt
 
7 cryptography
7 cryptography7 cryptography
7 cryptography
 
Crytography CertCourse Module 1 & 2.ppt
Crytography CertCourse Module 1 & 2.pptCrytography CertCourse Module 1 & 2.ppt
Crytography CertCourse Module 1 & 2.ppt
 
Best book for the cryptography doctor.ppt
Best book for the cryptography doctor.pptBest book for the cryptography doctor.ppt
Best book for the cryptography doctor.ppt
 

Recently uploaded

AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Servicegwenoracqe6
 

Recently uploaded (20)

AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 

Encryption pres

  • 2. Definition • An algorithm is basically a procedure or a formula for solving a data snooping problem. An ​encryption algorithm is a set of mathematical procedure for performing encryption on data. Through the use of such an algorithm, information is made in the cipher text and requires the use of a key to transforming the data into its original form.
  • 3. • Encryption​: It is the process of locking up information using cryptography. Information that has been locked this way is encrypted. • A plain text from a user can be encrypted to a cipher text, then send through a communication channel and no eavesdropper can interfere with the plain text. When it reaches the receiver end, the cipher text is decrypted to the original plain text.
  • 4. Encoding • Encoding is the process of converting data into a format required for a number of information processing needs, including:
  • 5. Decoding • Decoding ​is the reverse process of encoding which is to extract the information from the converted format. • For example, decoding Binary Coded Decimal requires some simple calculations in base-2 arithmetic. Decoding ASCII values is a straightforward process since there is a one to one mapping between characters and numbers. The term decoding is also used for digital to analog conversion. In the filed of communication, decoding is the process of converting received messages in to a message written using a specific language
  • 6. Types of Methods • In encryption algorithm we have two types .They are Symmetric Encryption Asymmetric Encryption
  • 7. Symmetric Encryption • This is the simplest kind of encryption that involves only one secret key to cipher and decipher information. Symmetrical encryption is an old and best-known technique. • It uses a secret key that can either be a number, a word or a string of random letters. It is a blended with the plain text of a message to change the content in a particular way. The sender and the recipient should know the secret key that is used to encrypt and decrypt all the messages • .Blowfish, AES, RC4, DES, RC5, and RC6 are examples of symmetric encryption
  • 8.
  • 10. Definition of Asymmetric Encryption • A message that is encrypted using a public key can only be decrypted using a private key, while also, a message encrypted using a private key can be decrypted using a public key. Security of the public key is not required because it is publicly available and can be passed over the internet. Asymmetric key has a far better power in ensuring the security of information transmitted during communication. • Popular asymmetric key encryption algorithm includes EIGamal, RSA, DSA, Elliptic curve techniques, PKCS.
  • 11. 1. AES(​Advanced Encryption Standard​) • AES is an encryption standard chosen by the National Institute of Standards and Technology(NIST) , USA to protect classified information. It has been accepted world wide as a desirable algorithm to encrypt sensitive data. • It is a block cipher which operates on block size of 128 bits for both encrypting as well as decrypting
  • 12. • The number of rounds performed by the algorithm strictly depends on the size of key Key Size(in bits) Rounds ❖128.....................................10 ❖192.....................................12 ❖256.....................................14 The larger the number of keys the more secure will be the data
  • 13. 2.DES(​Data Encryption Standard​) • DES use symmetric system means both sender and receiver side we used same key for encryption and decryption • It used 64 bits of block for encryption and decryption. Sixteen rounds of transportation and substitution are performed in order to achieve DES
  • 14. DES Working • It is a symmetric block encryption algorithm when 64-bit blocks of plain text go in , 64-bit blocks of cipher text come out. • It uses a 64-bit key:56 bits make up the true key, and 8 bits are used for parity • When it applied to data, it divides the message in to blocks and operates on them one at a time .Then the result is64-bit blocks of cipher text
  • 15. DES Modes • In Block ciphers have several modes of operation. Each mode specifies how a block cipher will operate Electronic Code Book Cipher Block Chaining Cipher Feedback Output Feedback Counter Mode
  • 17. 3.RC4, RC5, RC6 • A series of symmetric algorithms developed by RSA Security RC4 : A variable key-size stream cipher with byte- oriented operations . The algorithm is based on the random permutation RC5 : a parameterized algorithm with a variable block size, a variable key size, and a variable number of rounds. Allowable choices for the block size are 32 bits (for experimentation and evaluation purposes only), 64 bits (for use a drop-in replacement for DES), and 128 bits
  • 18. • RC6 ​- a block cipher based on RC5. RC6 is a parameterized algorithm where the block size, the key size, and the number of rounds are variable. The upper limit on the key size is 2040 bits. RC6 adds two features to RC5: the inclusion of integer multiplication and the use of four 4-bit working registers instead of RC5​��​s two 2- bit registers.
  • 19. 4.Kerberos • Require that each client (each request for Service) prove it’s identity. • Does not require user to enter password every time a service is requested. • It uses Needham-Schroedar Algorithm • Kerberos assumes that network connections (rather than servers and work stations) are the weak link in network security • The Needham-Schroeder Public-key Protocol provides mutual authentication
  • 20.
  • 21. 5.MD5 • The MD5 hashing algorithm was created in the early 1990’s, and is one of a family of Message-Digest algorithms. Several of these were developed by Ronald Rivest • Ronald Rivest is a cryptographer with significant contributions to the field. He is a professor at MIT. He’s also one of the inventors of RSA Algorithm . He’s a giant in the cryptography world
  • 22. MD5 Working • Md5 algorithm first divides the input into blocks of 512 bits each. 64 Bits recording the length of the original input are inserted at the end of the last block. If the last block is less than 512 bits, some extra bits are padded to the end. • The algorithm consists of a set of buffers and tables to combine and shift the data through five computational steps .Four rounds of computation are done to compute the hash of the input value • MD5 is quite computationally efficient, compared to other hashing functions
  • 23. 6. SHA • SHA Algorithm was developed by NIST along with NSA • In 1993, SHA was published as a Federal Information Processing Standard • This algorithm uses Asymmetric Encryption • It has following Versions: SHA-1 SHA-256 SHA-384 SHA-526
  • 24.
  • 25. 7.RSA • RSA (Rivest–Shamir–Adleman) ​is an algorithm used by modern computers to encrypt and decrypt messages. It is an asymmetric cryptographic algorithm. Asymmetric means that there are two different keys. This is also called public key cryptography, because one of the keys can be given to anyone. The other key must be kept private. The algorithm is based on the fact that finding the factors of a large composite number is difficult: when the integers are prime numbers, the problem is called prime factorization. It is also a key pair (public and private key) generator.