SlideShare a Scribd company logo
A Novel Encryption, Decryption Process Using
Permutation Choice
Y.S.R Engineering College Of Y.V.U::Proddatur
Presenting By :
I. Raja Sekhar Reddy
IV B.Tech CSE
1011102026
E-mail:irsreddy26@gmail.com
• Introduction
• Existing Method
• Proposed Method
• Features
• Conclusion
Contents:
What is Security?
Why we need to provide Security?
How the security will be provided?
Introduction:
Encryption and Decryption:
• Confidentiality
• Integrity
• Authentication
• Non-repudiation
SECURITY SERVICES:
EXISTING METHOD:
new encryption technique
The proposed method consists of
Encryption
Single round encryption
Key generation
Round function
Decryption
Single round decryption
Key generation
Round function
PROPOSED METHOD:
ENCRYPTION:
SINGLE ROUND ENCRYPTION:
KEY GENERATION:
ROUND FUNCTION: Selection inputs Round Function
S3 S2 S1 S0
0 0 0 0 F1
0 0 0 1 F2
0 0 1 0 F3
0 0 1 1 F4
0 1 0 0 F5
0 1 0 1 F6
0 1 1 0 F7
0 1 1 1 F8
1 0 0 0 F9
1 0 0 1 F10
1 0 1 0 F11
1 0 1 1 F12
1 1 0 0 F13
1 1 0 1 F14
1 1 1 0 F15
1 1 1 1 F16
DECRYPTION:
SINGLE ROUND DECRYPTION:
KEY GENERATION:
ROUND FUNCTION: Selection lines Round Function
S3 S2 S1 S0
0 0 0 0 F1
0 0 0 1 F2
0 0 1 0 F3
0 0 1 1 F4
0 1 0 0 F5
0 1 0 1 F6
0 1 1 0 F7
0 1 1 1 F8
1 0 0 0 F9
1 0 0 1 F10
1 0 1 0 F11
1 0 1 1 F12
1 1 0 0 F13
1 1 0 1 F14
1 1 1 0 F15
1 1 1 1 F16
FEATURES:
 More secure
 Key size will be 1024-bit
 Plain text block size will be 2048-bit
 Round function will be changed to round to round
The goal of the encryption algorithm designing is to frustrate the hackers and
makes the cryptanalysis difficult. The key value play more important role in
encryption process. Altering each value of the plain text to get the final cipher text
make the cryptanalysis still more complex. The goal of the present paper is to
increase the security which makes complex to break. The round function and
permutation choices are not fixed, it is changed according to the user.
Conclusion:
Any Queries?
THANK YOU

More Related Content

PPT
Classical Encryption Techniques in Network Security
PPTX
Cryptography and Encryptions,Network Security,Caesar Cipher
PDF
researchpaperfinal1
PDF
Iaetsd enhanced cryptography algorithm for providing
PDF
Design and Implementation of New Encryption algorithm to Enhance Performance...
PDF
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
PDF
03 UNIT-2.pdf
PDF
ASCII Value Based Encryption System (AVB)
Classical Encryption Techniques in Network Security
Cryptography and Encryptions,Network Security,Caesar Cipher
researchpaperfinal1
Iaetsd enhanced cryptography algorithm for providing
Design and Implementation of New Encryption algorithm to Enhance Performance...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
03 UNIT-2.pdf
ASCII Value Based Encryption System (AVB)

Similar to new encryption technique (20)

PPTX
Fundamentals of Information Encryption
PPTX
Cryptographic algorithms
PPTX
Cryptographic algorithms
PPTX
Cryptography in discrete structure .pptx
PPTX
Block Ciphers and DES.pptx
PPTX
NS UNIT 1 Advanced Encryption Standard& RSA
PDF
IRJET- Design and Implementation of 256-Bit Symmetric Key Cryptography Algori...
PDF
Analysing space complexity of various encryption algorithms 2
PPT
data encryption standard algorithm in cryptography
PPT
DATA ENCRYPTION STANDARD ALGORITHM , PPT
PPTX
Cryptographic Algorithms: DES and RSA
PDF
IRJET- Message Encryption using Hybrid Cryptography
PDF
Colour Based Cryptography
PDF
Nearest Prime Cipher for Data Confidentiality and Integrity
PPT
Cryptography Symmetric Key Algorithm (CSE)
PDF
Data Encryption and Decryption Algorithm Using Hamming Code and Arithmetic Op...
PPTX
Image encryption using aes key expansion
PDF
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
PPT
DATA ENCRYPTION STANDARD (DES) / lucifer
PDF
Fundamentals of Information Encryption
Cryptographic algorithms
Cryptographic algorithms
Cryptography in discrete structure .pptx
Block Ciphers and DES.pptx
NS UNIT 1 Advanced Encryption Standard& RSA
IRJET- Design and Implementation of 256-Bit Symmetric Key Cryptography Algori...
Analysing space complexity of various encryption algorithms 2
data encryption standard algorithm in cryptography
DATA ENCRYPTION STANDARD ALGORITHM , PPT
Cryptographic Algorithms: DES and RSA
IRJET- Message Encryption using Hybrid Cryptography
Colour Based Cryptography
Nearest Prime Cipher for Data Confidentiality and Integrity
Cryptography Symmetric Key Algorithm (CSE)
Data Encryption and Decryption Algorithm Using Hamming Code and Arithmetic Op...
Image encryption using aes key expansion
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
DATA ENCRYPTION STANDARD (DES) / lucifer
Ad

Recently uploaded (20)

PDF
R24 SURVEYING LAB MANUAL for civil enggi
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPT
Mechanical Engineering MATERIALS Selection
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
Current and future trends in Computer Vision.pptx
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
DOCX
573137875-Attendance-Management-System-original
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PDF
PPT on Performance Review to get promotions
PPTX
Geodesy 1.pptx...............................................
PPT
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPTX
additive manufacturing of ss316l using mig welding
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
R24 SURVEYING LAB MANUAL for civil enggi
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
CYBER-CRIMES AND SECURITY A guide to understanding
Mechanical Engineering MATERIALS Selection
Foundation to blockchain - A guide to Blockchain Tech
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Current and future trends in Computer Vision.pptx
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
573137875-Attendance-Management-System-original
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPT on Performance Review to get promotions
Geodesy 1.pptx...............................................
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
additive manufacturing of ss316l using mig welding
OOP with Java - Java Introduction (Basics)
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Ad

new encryption technique

  • 1. A Novel Encryption, Decryption Process Using Permutation Choice Y.S.R Engineering College Of Y.V.U::Proddatur Presenting By : I. Raja Sekhar Reddy IV B.Tech CSE 1011102026 E-mail:irsreddy26@gmail.com
  • 2. • Introduction • Existing Method • Proposed Method • Features • Conclusion Contents:
  • 3. What is Security? Why we need to provide Security? How the security will be provided? Introduction:
  • 5. • Confidentiality • Integrity • Authentication • Non-repudiation SECURITY SERVICES:
  • 8. The proposed method consists of Encryption Single round encryption Key generation Round function Decryption Single round decryption Key generation Round function PROPOSED METHOD:
  • 12. ROUND FUNCTION: Selection inputs Round Function S3 S2 S1 S0 0 0 0 0 F1 0 0 0 1 F2 0 0 1 0 F3 0 0 1 1 F4 0 1 0 0 F5 0 1 0 1 F6 0 1 1 0 F7 0 1 1 1 F8 1 0 0 0 F9 1 0 0 1 F10 1 0 1 0 F11 1 0 1 1 F12 1 1 0 0 F13 1 1 0 1 F14 1 1 1 0 F15 1 1 1 1 F16
  • 16. ROUND FUNCTION: Selection lines Round Function S3 S2 S1 S0 0 0 0 0 F1 0 0 0 1 F2 0 0 1 0 F3 0 0 1 1 F4 0 1 0 0 F5 0 1 0 1 F6 0 1 1 0 F7 0 1 1 1 F8 1 0 0 0 F9 1 0 0 1 F10 1 0 1 0 F11 1 0 1 1 F12 1 1 0 0 F13 1 1 0 1 F14 1 1 1 0 F15 1 1 1 1 F16
  • 17. FEATURES:  More secure  Key size will be 1024-bit  Plain text block size will be 2048-bit  Round function will be changed to round to round
  • 18. The goal of the encryption algorithm designing is to frustrate the hackers and makes the cryptanalysis difficult. The key value play more important role in encryption process. Altering each value of the plain text to get the final cipher text make the cryptanalysis still more complex. The goal of the present paper is to increase the security which makes complex to break. The round function and permutation choices are not fixed, it is changed according to the user. Conclusion: