SlideShare a Scribd company logo
Name:
Hussain Almohammadi
Course:
Networks and Information Security
Assignment:
Data Encryption Algorithm
Instructor’s Name:
Ibraheem aledane
Introduction:
I will write about Data Encryption Algorithms, and how it is important in
communication. Also, I will write about some of algorithms, and some useful
features, also will explain the strongest and weakness encryption.
Data encryption algorithms:
Encryption algorithms are used in computer communications and used FTP
transfer. So, the transfer is going to be secured. When we use algorithms in the
transfer, so the file will be translated to meaningless text, then the file will be
transferred like that the computer that receives the data will use a key to
translate the text to the it is original form. If the file is delay before gets to the
computer target, so it is not usable or another word it is encrypted.
Here are some used algorithms:
DES/3DES or TripleDES:
This is called Data Encryption Standard which the government of US used in
70s.This type mostly is used in ATM machine in order to encrypt PINs , and helps
to encrypt password in UNIX. TripleDES is a new version and it is more secure
method of encryption, also the data is encrypted three times, and use a unique
key for at least one version.
Blowfish:
No payment is required to use it, and it was developed by Bruce Schneier and
introduced in 1993.
AES
Advanced Encryption Standard it uses the Rijndael block cipher approved by the
National Institute of Standards and Technology (NIST). AES was originated by
cryptographers Joan Daemen and Vincent Rijmen and replaced DES as the U.S.
Government encryption technique in 2000.
Twofish
Twofish is kind of a block cipher developed by Counterpane Labs. It had been one
of five Advanced Encryption Standard (AES) also it is an open source.
IDEA
This type used in Pretty Good Privacy (PGP) Version 2 also it is an option algorithm
in OpenPGP.
MD5
Professor Ronald Riverst who developed MD5.MD5 is used to create digital
signatures. The old version is MD4 algorithm.
SHA 1
SHA 1 is like MD5.SHA 1 might be used instead of MD5 because it has more
security.
HMAC
This type is like MD5 and SHA 1, sometimes we can call it MD5 or SHA 1.
RSA Security
 RC4 RC4 is a variable key size stream cipher based on the use of a random
permutation.
 RC5 This is a parameterized algorithm with a variable block, key size and number
of rounds.
 RC6 This an evolution of RC5, it is also a parameterized algorithm that has
variable block, key and a number of rounds. This algorithm has integer
multiplication and 4 bit working registers.
Cipher algorithm.
A mechanism is used to encrypt or decrypt a message.
Ciphertext.
The result of encrypting message generated by cipher algorithm.
CTR, Counter.
Encryption mode.
Decryption.
The cipher algorithm will recognize encrypted message by the process.
Encryption.
The cipher algorithm will not recognize encrypted message by the process.
Plaintext.
An unencrypted message.
Private key.
(RFC 2828) used for asymmetric cryptography. A public key cryptosystem is a key
of a user's key pair that is known only by that user.
Public key
A public key which encrypts a message. A public key cryptosystem is a key of a
user's key pair that is publicly known.
Public key encryption.
Two keys are used. A public key is used to encrypt the message and a secret
private key to decrypt the message.
Secret key.
It is a single secret key that is used to encrypt and decrypt a message.
Stream cipher.
is process the data a bit or a byte at a time with a key resulting in a randomized
ciphertext or plaintext.
Symmetric encryption algorithm.
The encryption and the decryption may be the
same.
Here are some preconfigure data encryption algorithm. These are used to decrypt
SOAP messages:
WSS API URI
WSSDecryption.AES128 (the
default value)
http://www.w3.org/2001/04/xmlenc#aes128
-cbc
WSSDecryption.AES192 http://www.w3.org/2001/04/xmlenc#aes192
-cbc
WSSDecryption.AES256 http://www.w3.org/2001/04/xmlenc#aes256
-cbc
WSSDecryption.TRIPLE_DES http://www.w3.org/2001/04/xmlenc#tripled
es-cbc
Supported pre-configured key encryption algorithms. The algorithms are used to
decrypt SOAP messages:
WSS API URI
WSSDecryption.KW_AES128 http://www.w3.org/2001/04/xmlenc#kw-
aes128
WSSDecryption.KW_AES192 http://www.w3.org/2001/04/xmlenc#kw-
aes192
WSSDecryption.KW_AES256 http://www.w3.org/2001/04/xmlenc#kw-
aes256
WSSDecryption.KW_RSA_OAEP
(the default value)
http://www.w3.org/2001/04/xmlenc#rsa-
oaep-mgf1p
WSSDecryption.KW_RSA15 http://www.w3.org/2001/04/xmlenc#rsa-
1_5
WSSDecryption.KW_TRIPLE_DES http://www.w3.org/2001/04/xmlenc#kw-
tripledes
Strong and weak encryption:
Not all the algorithm are the same quality some of them are better than the
others. Here is a useful video to watch.
https://www.youtube.com/watch?v=h7QwYjZ0sz0
Concluding:
Data encrypting algorithms are extremely important for saving data and insure
the security by data encrypting algorithms we gain high security and availability.
There are some types we only have to know how to use them properly.
MyCrypto.net. (n.d.). Encryption algorithms. Retrieved October 25, 2006, from
http://www.mycrypto.net/encryption/crypto_algorithms.html
Webopedia. (2006). What is encryption algorithm? A Word Definition From the
Webopedia Computer Dictionary. Jupitermedia Corporation. Retrieved October
25, 2006, from http://www.webopedia.com/TERM/E/encryption_algorithm.html
http://networksorcery.com/enp/data/encryption.htm
https://www.ibm.com/support/knowledgecenter/en/SSAW57_8.5.5/com.ibm.we
bsphere.nd.multiplatform.doc/ae/rwbs_wssdecryptalgorithms.html

More Related Content

PPT
Encryption
PPTX
Encryption algorithms
ODP
Encryption Techniques
PPT
Encryption
PPT
Ch12 Cryptography it-slideshares.blogspot.com
PPT
Cryptography Lecture by Sam Bowne
PPTX
PPTX
Encryption techniques
Encryption
Encryption algorithms
Encryption Techniques
Encryption
Ch12 Cryptography it-slideshares.blogspot.com
Cryptography Lecture by Sam Bowne
Encryption techniques

What's hot (20)

PPTX
Encryption
PPT
Network Security
PPTX
Cryptography and network security
DOC
Encryption
PPTX
Pgp pretty good privacy
PPTX
Unit 7 : Network Security
PDF
Public Key Encryption & Hash functions
PPT
Encryption And Decryption
 
PPTX
Secure Encryption Technique (SET): A Private Key Cryptosystem
PPTX
PPTX
Data encryption
PPSX
5 Cryptography Part1
PDF
Encryption pres
PPT
fucking shit
PPT
Cryptography and Message Authentication NS3
PPTX
Aes (advance encryption standard)
PPTX
Pretty good privacy
PPT
Data security in data communication
PDF
Information Security Cryptography ( L02- Types Cryptography)
Encryption
Network Security
Cryptography and network security
Encryption
Pgp pretty good privacy
Unit 7 : Network Security
Public Key Encryption & Hash functions
Encryption And Decryption
 
Secure Encryption Technique (SET): A Private Key Cryptosystem
Data encryption
5 Cryptography Part1
Encryption pres
fucking shit
Cryptography and Message Authentication NS3
Aes (advance encryption standard)
Pretty good privacy
Data security in data communication
Information Security Cryptography ( L02- Types Cryptography)
Ad

Similar to Data encryption algorithm(edit) (20)

PDF
State of the art parallel approaches for
PPT
Ch11 Basic Cryptography
PPT
security issue
PPTX
Basic Cryptography unit 4 CSS
PPT
Encryption Primer por Cathy Nolan
PDF
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
PPT
Cryptography
PPTX
Data encryption
PPTX
Seminar on Encryption and Authenticity
PDF
White Paper on Cryptography
PDF
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
PDF
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
PDF
Security in Manets using Cryptography Algorithms
PPTX
Unit III Public Key Crypto Systems.pptx
PDF
RSA 32-bit Implementation Technique
PPT
6. cryptography
PDF
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
PPT
Java Crypto
PPTX
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
PPT
Rsa Encryption in java
State of the art parallel approaches for
Ch11 Basic Cryptography
security issue
Basic Cryptography unit 4 CSS
Encryption Primer por Cathy Nolan
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
Cryptography
Data encryption
Seminar on Encryption and Authenticity
White Paper on Cryptography
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
Security in Manets using Cryptography Algorithms
Unit III Public Key Crypto Systems.pptx
RSA 32-bit Implementation Technique
6. cryptography
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
Java Crypto
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Rsa Encryption in java
Ad

Recently uploaded (20)

PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
RMMM.pdf make it easy to upload and study
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
Classroom Observation Tools for Teachers
PDF
01-Introduction-to-Information-Management.pdf
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Insiders guide to clinical Medicine.pdf
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PPTX
Pharma ospi slides which help in ospi learning
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
master seminar digital applications in india
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
RMMM.pdf make it easy to upload and study
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
2.FourierTransform-ShortQuestionswithAnswers.pdf
O7-L3 Supply Chain Operations - ICLT Program
Classroom Observation Tools for Teachers
01-Introduction-to-Information-Management.pdf
Renaissance Architecture: A Journey from Faith to Humanism
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Insiders guide to clinical Medicine.pdf
102 student loan defaulters named and shamed – Is someone you know on the list?
STATICS OF THE RIGID BODIES Hibbelers.pdf
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Pharma ospi slides which help in ospi learning
Microbial diseases, their pathogenesis and prophylaxis
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
O5-L3 Freight Transport Ops (International) V1.pdf
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
master seminar digital applications in india

Data encryption algorithm(edit)

  • 1. Name: Hussain Almohammadi Course: Networks and Information Security Assignment: Data Encryption Algorithm Instructor’s Name: Ibraheem aledane
  • 2. Introduction: I will write about Data Encryption Algorithms, and how it is important in communication. Also, I will write about some of algorithms, and some useful features, also will explain the strongest and weakness encryption. Data encryption algorithms: Encryption algorithms are used in computer communications and used FTP transfer. So, the transfer is going to be secured. When we use algorithms in the transfer, so the file will be translated to meaningless text, then the file will be transferred like that the computer that receives the data will use a key to translate the text to the it is original form. If the file is delay before gets to the computer target, so it is not usable or another word it is encrypted. Here are some used algorithms: DES/3DES or TripleDES: This is called Data Encryption Standard which the government of US used in 70s.This type mostly is used in ATM machine in order to encrypt PINs , and helps to encrypt password in UNIX. TripleDES is a new version and it is more secure method of encryption, also the data is encrypted three times, and use a unique key for at least one version. Blowfish: No payment is required to use it, and it was developed by Bruce Schneier and introduced in 1993.
  • 3. AES Advanced Encryption Standard it uses the Rijndael block cipher approved by the National Institute of Standards and Technology (NIST). AES was originated by cryptographers Joan Daemen and Vincent Rijmen and replaced DES as the U.S. Government encryption technique in 2000. Twofish Twofish is kind of a block cipher developed by Counterpane Labs. It had been one of five Advanced Encryption Standard (AES) also it is an open source. IDEA This type used in Pretty Good Privacy (PGP) Version 2 also it is an option algorithm in OpenPGP. MD5 Professor Ronald Riverst who developed MD5.MD5 is used to create digital signatures. The old version is MD4 algorithm. SHA 1 SHA 1 is like MD5.SHA 1 might be used instead of MD5 because it has more security. HMAC This type is like MD5 and SHA 1, sometimes we can call it MD5 or SHA 1. RSA Security  RC4 RC4 is a variable key size stream cipher based on the use of a random permutation.  RC5 This is a parameterized algorithm with a variable block, key size and number of rounds.
  • 4.  RC6 This an evolution of RC5, it is also a parameterized algorithm that has variable block, key and a number of rounds. This algorithm has integer multiplication and 4 bit working registers. Cipher algorithm. A mechanism is used to encrypt or decrypt a message. Ciphertext. The result of encrypting message generated by cipher algorithm. CTR, Counter. Encryption mode. Decryption. The cipher algorithm will recognize encrypted message by the process. Encryption. The cipher algorithm will not recognize encrypted message by the process. Plaintext. An unencrypted message. Private key. (RFC 2828) used for asymmetric cryptography. A public key cryptosystem is a key of a user's key pair that is known only by that user. Public key A public key which encrypts a message. A public key cryptosystem is a key of a user's key pair that is publicly known.
  • 5. Public key encryption. Two keys are used. A public key is used to encrypt the message and a secret private key to decrypt the message. Secret key. It is a single secret key that is used to encrypt and decrypt a message. Stream cipher. is process the data a bit or a byte at a time with a key resulting in a randomized ciphertext or plaintext. Symmetric encryption algorithm. The encryption and the decryption may be the same. Here are some preconfigure data encryption algorithm. These are used to decrypt SOAP messages: WSS API URI WSSDecryption.AES128 (the default value) http://www.w3.org/2001/04/xmlenc#aes128 -cbc WSSDecryption.AES192 http://www.w3.org/2001/04/xmlenc#aes192 -cbc WSSDecryption.AES256 http://www.w3.org/2001/04/xmlenc#aes256 -cbc WSSDecryption.TRIPLE_DES http://www.w3.org/2001/04/xmlenc#tripled es-cbc
  • 6. Supported pre-configured key encryption algorithms. The algorithms are used to decrypt SOAP messages: WSS API URI WSSDecryption.KW_AES128 http://www.w3.org/2001/04/xmlenc#kw- aes128 WSSDecryption.KW_AES192 http://www.w3.org/2001/04/xmlenc#kw- aes192 WSSDecryption.KW_AES256 http://www.w3.org/2001/04/xmlenc#kw- aes256 WSSDecryption.KW_RSA_OAEP (the default value) http://www.w3.org/2001/04/xmlenc#rsa- oaep-mgf1p WSSDecryption.KW_RSA15 http://www.w3.org/2001/04/xmlenc#rsa- 1_5 WSSDecryption.KW_TRIPLE_DES http://www.w3.org/2001/04/xmlenc#kw- tripledes
  • 7. Strong and weak encryption: Not all the algorithm are the same quality some of them are better than the others. Here is a useful video to watch. https://www.youtube.com/watch?v=h7QwYjZ0sz0 Concluding: Data encrypting algorithms are extremely important for saving data and insure the security by data encrypting algorithms we gain high security and availability. There are some types we only have to know how to use them properly.
  • 8. MyCrypto.net. (n.d.). Encryption algorithms. Retrieved October 25, 2006, from http://www.mycrypto.net/encryption/crypto_algorithms.html Webopedia. (2006). What is encryption algorithm? A Word Definition From the Webopedia Computer Dictionary. Jupitermedia Corporation. Retrieved October 25, 2006, from http://www.webopedia.com/TERM/E/encryption_algorithm.html http://networksorcery.com/enp/data/encryption.htm https://www.ibm.com/support/knowledgecenter/en/SSAW57_8.5.5/com.ibm.we bsphere.nd.multiplatform.doc/ae/rwbs_wssdecryptalgorithms.html