SlideShare a Scribd company logo
Chapter 2
Chapter 2
CONVENTIONAL
CONVENTIONAL
ENCRYPTION MESSAGE
ENCRYPTION MESSAGE
CONFIDENTIALITY
CONFIDENTIALITY
1
V.SIVA PRASAD
DEPT OF MCA
Outline
Outline
Conventional Encryption Principles
Conventional Encryption Algorithms
Cipher Block Modes of Operation
Location of Encryption Devices
Key Distribution
2
Conventional Encryption
Conventional Encryption
Principles
Principles
An encryption scheme has five ingredients:
◦ Plaintext
◦ Encryption algorithm
◦ Secret Key
◦ Ciphertext
◦ Decryption algorithm
Security depends on the secrecy of the key,
not the secrecy of the algorithm
3
Conventional Encryption
Conventional Encryption
Principles
Principles
4
Cryptography
Cryptography
Classified along three independent
dimensions:
◦ The type of operations used for transforming
plaintext to ciphertext
◦ The number of keys used
◦ symmetric (single key)
◦ asymmetric (two-keys, or public-key encryption)
◦ The way in which the plaintext is processed
5
Average time required for
Average time required for
exhaustive
exhaustive key search
key search
6
Key Size
(bits)
Number of
Alternative Keys
Time required at
106
Decryption/µs
32 232
= 4.3 x 109
2.15 milliseconds
56 256
= 7.2 x 1016
10 hours
128 2128
= 3.4 x 1038
5.4 x 1018
years
168 2168
= 3.7 x 1050
5.9 x 1030
years
Feistel Cipher Structure
Feistel Cipher Structure
Virtually all conventional block encryption algorithms, including
DES have a structure first described by Horst Feistel of IBM
in 1973
The realization of a Fesitel Network depends on the choice of
the following parameters and design features (see next slide):
7
Feistel Cipher Structure
Feistel Cipher Structure
Block size: larger block sizes mean greater
security
Key Size: larger key size means greater security
Number of rounds: multiple rounds offer
increasing security
Subkey generation algorithm: greater
complexity will lead to greater difficulty of
cryptanalysis.
Fast software encryption/decryption: the speed
of execution of the algorithm becomes a concern
8
9
Conventional Encryption
Conventional Encryption
Algorithms
Algorithms
Data Encryption Standard (DES)
◦ The most widely used encryption scheme
◦ The algorithm is reffered to the Data Encryption Algorithm (DEA)
◦ DES is a block cipher
◦ The plaintext is processed in 64-bit blocks
◦ The key is 56-bits in length
10
HENRIC JOHNSON 11
HENRIC JOHNSON 12
DES
DES
The overall processing at each iteration:
◦Li = Ri-1
◦Ri = Li-1 F(Ri-1, Ki)
Concerns about:
◦The algorithm and the key length
(56-bits)
13

Time to break a code (10
Time to break a code (106
6
decryptions/µs)
decryptions/µs)
HENRIC JOHNSON 14
Triple DEA
Triple DEA
Use three keys and three executions of the DES algorithm
(encrypt-decrypt-encrypt)
◦ C = ciphertext
◦ P = Plaintext
◦ EK[X] = encryption of X using key K
◦ DK[Y] = decryption of Y using key K
Effective key length of 168 bits
15
C = EK3[DK2[EK1[P]]]
Triple DEA
Triple DEA
16
Other Symmetric Block
Other Symmetric Block
Ciphers
Ciphers
International Data Encryption Algorithm (IDEA)
◦ 128-bit key
◦ Used in PGP
Blowfish
◦ Easy to implement
◦ High execution speed
◦ Run in less than 5K of memory
17
Other Symmetric Block
Other Symmetric Block
Ciphers
Ciphers
RC5
◦ Suitable for hardware and software
◦ Fast, simple
◦ Adaptable to processors of different word lengths
◦ Variable number of rounds
◦ Variable-length key
◦ Low memory requirement
◦ High security
◦ Data-dependent rotations
Cast-128
◦ Key size from 40 to 128 bits
◦ The round function differs from round to round
18
Cipher Block Modes of
Cipher Block Modes of
Operation
Operation
Cipher Block Chaining Mode (CBC)
◦ The input to the encryption algorithm is the XOR
of the current plaintext block and the preceding
ciphertext block.
◦ Repeating pattern of 64-bits are not exposed
19
i
i
1
i
1
i
i
K
1
i
i
1
i
i
K
i
1
i
K
K
i
K
i
1
i
k
i
P
P
C
C
]
[C
D
C
)
P
(C
]
[C
D
)]
P
(C
[E
D
]
[C
D
]
P
[C
E
C

















HENRIC JOHNSON 20
Location of Encryption
Location of Encryption
Device
Device
Link encryption:
◦ A lot of encryption devices
◦ High level of security
◦ Decrypt each packet at every switch
End-to-end encryption
◦ The source encrypt and the receiver decrypts
◦ Payload encrypted
◦ Header in the clear
High Security: Both link and end-to-end
encryption are needed (see Figure 2.9)
21
HENRIC JOHNSON 22
Key Distribution
Key Distribution
1. A key could be selected by A and physically
delivered to B.
2. A third party could select the key and
physically deliver it to A and B.
3. If A and B have previously used a key, one
party could transmit the new key to the
other, encrypted using the old key.
4. If A and B each have an encrypted
connection to a third party C, C could deliver
a key on the encrypted links to A and B.
23
Key Distribution (See Figure
Key Distribution (See Figure
2.10)
2.10)
Session key:
◦ Data encrypted with a one-time session key.At the conclusion of
the session the key is destroyed
Permanent key:
◦ Used between entities for the purpose of distributing session keys
24
25

More Related Content

PPT
Conventional Encryption NS2
PPT
Chapter 2
PPT
Chapter 2
PPT
Conventional Encryption messagge Confendiatilty
PPTX
CISSP Certification Security Engineering-Part2
PPT
Encryption
PPTX
Data Encryption Standard
PDF
3 Basics of Cryptography Basics of Cryptography
Conventional Encryption NS2
Chapter 2
Chapter 2
Conventional Encryption messagge Confendiatilty
CISSP Certification Security Engineering-Part2
Encryption
Data Encryption Standard
3 Basics of Cryptography Basics of Cryptography

Similar to DATA ENCRTPTION STANDARDS IN CRYPTOGRAPY (20)

PPTX
CH02-CompSec4e.pptx
PPTX
Overview on Cryptography and Network Security
PPTX
Securing Text Messages Application Using MED
PPTX
Different types of Symmetric key Cryptography
PDF
4. Block Ciphers
PPTX
How to do Cryptography right in Android Part One
PPTX
Cybersecurity cyberlab3
PPT
ICSE6104 Lecture bbbbbbbbbbbbbbbbbbbb 2.ppt
PPTX
Fundamentals of Information Encryption
PPTX
Network Security(MD5)
PPTX
Network security Encryption
PDF
Data Science Unit 02 SPPU Sem 6 PPT-2.pdf
PDF
Triple Data Encryption Standard (t-DES)
PPT
Day5
PDF
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
PPT
Jaimin chp-8 - network security-new -use this - 2011 batch
PPTX
Symmetric ciphermodel
PPT
Cryptography - Overview
PPT
Unit V network management and security
CH02-CompSec4e.pptx
Overview on Cryptography and Network Security
Securing Text Messages Application Using MED
Different types of Symmetric key Cryptography
4. Block Ciphers
How to do Cryptography right in Android Part One
Cybersecurity cyberlab3
ICSE6104 Lecture bbbbbbbbbbbbbbbbbbbb 2.ppt
Fundamentals of Information Encryption
Network Security(MD5)
Network security Encryption
Data Science Unit 02 SPPU Sem 6 PPT-2.pdf
Triple Data Encryption Standard (t-DES)
Day5
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Jaimin chp-8 - network security-new -use this - 2011 batch
Symmetric ciphermodel
Cryptography - Overview
Unit V network management and security
Ad

Recently uploaded (20)

PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PDF
Hazard Identification & Risk Assessment .pdf
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Supply Chain Operations Speaking Notes -ICLT Program
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PPTX
History, Philosophy and sociology of education (1).pptx
PDF
What if we spent less time fighting change, and more time building what’s rig...
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PDF
RMMM.pdf make it easy to upload and study
PDF
Computing-Curriculum for Schools in Ghana
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
A systematic review of self-coping strategies used by university students to ...
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PPTX
Unit 4 Skeletal System.ppt.pptxopresentatiom
PPTX
Lesson notes of climatology university.
PPTX
Orientation - ARALprogram of Deped to the Parents.pptx
Paper A Mock Exam 9_ Attempt review.pdf.
Hazard Identification & Risk Assessment .pdf
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
Final Presentation General Medicine 03-08-2024.pptx
Supply Chain Operations Speaking Notes -ICLT Program
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
History, Philosophy and sociology of education (1).pptx
What if we spent less time fighting change, and more time building what’s rig...
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
RMMM.pdf make it easy to upload and study
Computing-Curriculum for Schools in Ghana
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
A systematic review of self-coping strategies used by university students to ...
Practical Manual AGRO-233 Principles and Practices of Natural Farming
A powerpoint presentation on the Revised K-10 Science Shaping Paper
Chinmaya Tiranga quiz Grand Finale.pdf
Unit 4 Skeletal System.ppt.pptxopresentatiom
Lesson notes of climatology university.
Orientation - ARALprogram of Deped to the Parents.pptx
Ad

DATA ENCRTPTION STANDARDS IN CRYPTOGRAPY

  • 1. Chapter 2 Chapter 2 CONVENTIONAL CONVENTIONAL ENCRYPTION MESSAGE ENCRYPTION MESSAGE CONFIDENTIALITY CONFIDENTIALITY 1 V.SIVA PRASAD DEPT OF MCA
  • 2. Outline Outline Conventional Encryption Principles Conventional Encryption Algorithms Cipher Block Modes of Operation Location of Encryption Devices Key Distribution 2
  • 3. Conventional Encryption Conventional Encryption Principles Principles An encryption scheme has five ingredients: ◦ Plaintext ◦ Encryption algorithm ◦ Secret Key ◦ Ciphertext ◦ Decryption algorithm Security depends on the secrecy of the key, not the secrecy of the algorithm 3
  • 5. Cryptography Cryptography Classified along three independent dimensions: ◦ The type of operations used for transforming plaintext to ciphertext ◦ The number of keys used ◦ symmetric (single key) ◦ asymmetric (two-keys, or public-key encryption) ◦ The way in which the plaintext is processed 5
  • 6. Average time required for Average time required for exhaustive exhaustive key search key search 6 Key Size (bits) Number of Alternative Keys Time required at 106 Decryption/µs 32 232 = 4.3 x 109 2.15 milliseconds 56 256 = 7.2 x 1016 10 hours 128 2128 = 3.4 x 1038 5.4 x 1018 years 168 2168 = 3.7 x 1050 5.9 x 1030 years
  • 7. Feistel Cipher Structure Feistel Cipher Structure Virtually all conventional block encryption algorithms, including DES have a structure first described by Horst Feistel of IBM in 1973 The realization of a Fesitel Network depends on the choice of the following parameters and design features (see next slide): 7
  • 8. Feistel Cipher Structure Feistel Cipher Structure Block size: larger block sizes mean greater security Key Size: larger key size means greater security Number of rounds: multiple rounds offer increasing security Subkey generation algorithm: greater complexity will lead to greater difficulty of cryptanalysis. Fast software encryption/decryption: the speed of execution of the algorithm becomes a concern 8
  • 9. 9
  • 10. Conventional Encryption Conventional Encryption Algorithms Algorithms Data Encryption Standard (DES) ◦ The most widely used encryption scheme ◦ The algorithm is reffered to the Data Encryption Algorithm (DEA) ◦ DES is a block cipher ◦ The plaintext is processed in 64-bit blocks ◦ The key is 56-bits in length 10
  • 13. DES DES The overall processing at each iteration: ◦Li = Ri-1 ◦Ri = Li-1 F(Ri-1, Ki) Concerns about: ◦The algorithm and the key length (56-bits) 13 
  • 14. Time to break a code (10 Time to break a code (106 6 decryptions/µs) decryptions/µs) HENRIC JOHNSON 14
  • 15. Triple DEA Triple DEA Use three keys and three executions of the DES algorithm (encrypt-decrypt-encrypt) ◦ C = ciphertext ◦ P = Plaintext ◦ EK[X] = encryption of X using key K ◦ DK[Y] = decryption of Y using key K Effective key length of 168 bits 15 C = EK3[DK2[EK1[P]]]
  • 17. Other Symmetric Block Other Symmetric Block Ciphers Ciphers International Data Encryption Algorithm (IDEA) ◦ 128-bit key ◦ Used in PGP Blowfish ◦ Easy to implement ◦ High execution speed ◦ Run in less than 5K of memory 17
  • 18. Other Symmetric Block Other Symmetric Block Ciphers Ciphers RC5 ◦ Suitable for hardware and software ◦ Fast, simple ◦ Adaptable to processors of different word lengths ◦ Variable number of rounds ◦ Variable-length key ◦ Low memory requirement ◦ High security ◦ Data-dependent rotations Cast-128 ◦ Key size from 40 to 128 bits ◦ The round function differs from round to round 18
  • 19. Cipher Block Modes of Cipher Block Modes of Operation Operation Cipher Block Chaining Mode (CBC) ◦ The input to the encryption algorithm is the XOR of the current plaintext block and the preceding ciphertext block. ◦ Repeating pattern of 64-bits are not exposed 19 i i 1 i 1 i i K 1 i i 1 i i K i 1 i K K i K i 1 i k i P P C C ] [C D C ) P (C ] [C D )] P (C [E D ] [C D ] P [C E C                 
  • 21. Location of Encryption Location of Encryption Device Device Link encryption: ◦ A lot of encryption devices ◦ High level of security ◦ Decrypt each packet at every switch End-to-end encryption ◦ The source encrypt and the receiver decrypts ◦ Payload encrypted ◦ Header in the clear High Security: Both link and end-to-end encryption are needed (see Figure 2.9) 21
  • 23. Key Distribution Key Distribution 1. A key could be selected by A and physically delivered to B. 2. A third party could select the key and physically deliver it to A and B. 3. If A and B have previously used a key, one party could transmit the new key to the other, encrypted using the old key. 4. If A and B each have an encrypted connection to a third party C, C could deliver a key on the encrypted links to A and B. 23
  • 24. Key Distribution (See Figure Key Distribution (See Figure 2.10) 2.10) Session key: ◦ Data encrypted with a one-time session key.At the conclusion of the session the key is destroyed Permanent key: ◦ Used between entities for the purpose of distributing session keys 24
  • 25. 25