SlideShare a Scribd company logo
Secure communication
Most popular encryption algorithms overview
Agenda
One-time pad
Stream ciphers
A5/1
Symmetric block ciphers
DES (weak), 3DES (secure), AES (secure)
Asymmetric block ciphers
RSA (slow)
Elliptic curves (fast)
One-time pad
Main features:
Totally secure crypto technic
A key has to be the same length as
a plain text
A key has to be truly random
XOR operation is often used to
combine a key and a text
Impractical in most cases due to the
above key length requirement
Stream ciphers
Inspiration from the one-time pad
Types:
synchronous
self-synchronizing
LFSR (linear feedback shift registers)
A5/1 stream cipher
Features:
Used in GSM networks
114 bit length keystream
Based on three LSFRs
Successful attacks exist
DES
DES, Data Encryption Standard, was
developed in the 1970s at IBM and
based on design of Horst Feistel.
It is a symmetric-key algorithm based
on Feistel network.
Key size is 56 bits only and it is
considered insecure now.
3DES
3DES - Triple DES
Brute force attack on 2DES can use
“meet in the middle” technique.
It is a symmetric-key algorithm based
on Feistel network.
Key size is 168 bits only and it is
considered insecure now.
AES
AES, Advanced Encryption Standard,
established in 2001 by the NIST and
based on design of Joan Daemen
and Vincent Rijmen.
It is a symmetric-key algorithm based
on Galois field.
Supported key sizes are 128, 192 or
256 bits.
Block cipher modes
A mode of operation is used to encrypt more than one block of plain
data. The following is the list of some popular modes:
ECB - Electronic Codebook - the simplest mode
CBC - Cipher Block Chaining
OFB - Output Feedback - makes a synchronous stream cipher
CFB - Cipher Feedback - makes a self-synchronizing stream cipher
CTR - Counter - makes a synchronous stream cipher
RSA
RSA, described in 1977, was called
after its inventors Ron Rivest, Adi
Shamir, and Leonard Adleman.
It is a public key algorithm.
Key size could be in range of 1024 to
4096 bits
It is a relatively slow algorithm and
usually used to share keys for
symmetric algorithms.
Elliptic curve cryptography
It is based on the algebraic structure of
elliptic curves.
This is the fastest public key algorithm
as of now.
256 bit ECC public key provides
security compared to 3072 bit RSA
public key.
References
Introduction to Cryptography by Christof Paar
Cryptography and Computer Privacy
My blog
Learning Network Programming

More Related Content

PPTX
RC 4
PPT
DES (Data Encryption Standard) pressentation
PPTX
Information and data security block cipher and the data encryption standard (...
PPT
Block Ciphers Modes of Operation
PPTX
Data Encryption Standard (DES)
PDF
Authenticated Encryption Gcm Ccm
PPT
13528 l8
PPT
block ciphers
RC 4
DES (Data Encryption Standard) pressentation
Information and data security block cipher and the data encryption standard (...
Block Ciphers Modes of Operation
Data Encryption Standard (DES)
Authenticated Encryption Gcm Ccm
13528 l8
block ciphers

What's hot (20)

PDF
Block Ciphers Modes of Operation
PDF
Ch 12: Cryptography
PPTX
Information and data security advanced encryption standard (aes)
PDF
Block Cipher Modes of Operation And Cmac For Authentication
PPTX
PDF
Data encryption techniques and standard
PDF
Triple Data Encryption Standard (t-DES)
ODP
Encryption Techniques
PPTX
Block Cipher
PPTX
Block cipher modes of operation
PPT
Cryptography and Network Security
PPT
Des lecture
PPTX
Cryptographic Algorithms: DES and RSA
PPT
Data encryption standard
PPTX
Overview on Cryptography and Network Security
PPTX
Information and network security 18 modern techniques block ciphers
PPTX
Trible data encryption standard (3DES)
ODP
Network Security Topic 3 cryptography
PPT
PPT
Stream ciphers presentation
Block Ciphers Modes of Operation
Ch 12: Cryptography
Information and data security advanced encryption standard (aes)
Block Cipher Modes of Operation And Cmac For Authentication
Data encryption techniques and standard
Triple Data Encryption Standard (t-DES)
Encryption Techniques
Block Cipher
Block cipher modes of operation
Cryptography and Network Security
Des lecture
Cryptographic Algorithms: DES and RSA
Data encryption standard
Overview on Cryptography and Network Security
Information and network security 18 modern techniques block ciphers
Trible data encryption standard (3DES)
Network Security Topic 3 cryptography
Stream ciphers presentation
Ad

Viewers also liked (13)

PPTX
Network sockets
PPTX
PPTX
Git basics
PPTX
Understanding iptables
PPTX
DPDK KNI interface
PPTX
PPTX
History of the personal computer
PPTX
Understanding DPDK algorithmics
PPTX
Understanding DPDK
PPTX
Security in Data Communication and Networking
PDF
DPDK Summit - 08 Sept 2014 - Intel - Networking Workloads on Intel Architecture
PDF
DPDK Summit 2015 - Intel - Keith Wiles
PDF
Intel DPDK Step by Step instructions
Network sockets
Git basics
Understanding iptables
DPDK KNI interface
History of the personal computer
Understanding DPDK algorithmics
Understanding DPDK
Security in Data Communication and Networking
DPDK Summit - 08 Sept 2014 - Intel - Networking Workloads on Intel Architecture
DPDK Summit 2015 - Intel - Keith Wiles
Intel DPDK Step by Step instructions
Ad

Similar to Secure communication (20)

PDF
Introduction to Cryptography
PPTX
Cryptography
PPTX
Difference between ECC and RSA PublicKey
PPT
CISSP EXAM PREPARATION FOR A PASSED SCORE
PDF
Data encryption algorithm(edit)
PPTX
Encryption algorithms
PDF
Basic Cryptography.pdf
PPTX
Seminar on Encryption and Authenticity
DOC
Encryption
PDF
Encryption pres
PPT
6. cryptography
PPT
Encryption
PPTX
Introduction to security_and_crypto
PPTX
Introduction to security_and_crypto
PPTX
Introduction to security_and_crypto
PPTX
Introduction to security_and_crypto
PPTX
Introduction to security_and_crypto
PPTX
Introduction to security_and_crypto
PPTX
Introduction to security_and_crypto
PPTX
Secured algorithm for gsm encryption & decryption
Introduction to Cryptography
Cryptography
Difference between ECC and RSA PublicKey
CISSP EXAM PREPARATION FOR A PASSED SCORE
Data encryption algorithm(edit)
Encryption algorithms
Basic Cryptography.pdf
Seminar on Encryption and Authenticity
Encryption
Encryption pres
6. cryptography
Encryption
Introduction to security_and_crypto
Introduction to security_and_crypto
Introduction to security_and_crypto
Introduction to security_and_crypto
Introduction to security_and_crypto
Introduction to security_and_crypto
Introduction to security_and_crypto
Secured algorithm for gsm encryption & decryption

Recently uploaded (20)

PDF
Design an Analysis of Algorithms II-SECS-1021-03
PPTX
Advanced SystemCare Ultimate Crack + Portable (2025)
PDF
Complete Guide to Website Development in Malaysia for SMEs
PPTX
CHAPTER 2 - PM Management and IT Context
PDF
Designing Intelligence for the Shop Floor.pdf
PPTX
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
DOCX
Greta — No-Code AI for Building Full-Stack Web & Mobile Apps
PDF
medical staffing services at VALiNTRY
PPTX
Log360_SIEM_Solutions Overview PPT_Feb 2020.pptx
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PDF
Odoo Companies in India – Driving Business Transformation.pdf
PDF
Navsoft: AI-Powered Business Solutions & Custom Software Development
PDF
17 Powerful Integrations Your Next-Gen MLM Software Needs
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
PPTX
Patient Appointment Booking in Odoo with online payment
PDF
Salesforce Agentforce AI Implementation.pdf
PPTX
Reimagine Home Health with the Power of Agentic AI​
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PDF
Tally Prime Crack Download New Version 5.1 [2025] (License Key Free
Design an Analysis of Algorithms II-SECS-1021-03
Advanced SystemCare Ultimate Crack + Portable (2025)
Complete Guide to Website Development in Malaysia for SMEs
CHAPTER 2 - PM Management and IT Context
Designing Intelligence for the Shop Floor.pdf
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
How to Choose the Right IT Partner for Your Business in Malaysia
Greta — No-Code AI for Building Full-Stack Web & Mobile Apps
medical staffing services at VALiNTRY
Log360_SIEM_Solutions Overview PPT_Feb 2020.pptx
Wondershare Filmora 15 Crack With Activation Key [2025
Odoo Companies in India – Driving Business Transformation.pdf
Navsoft: AI-Powered Business Solutions & Custom Software Development
17 Powerful Integrations Your Next-Gen MLM Software Needs
Internet Downloader Manager (IDM) Crack 6.42 Build 41
Patient Appointment Booking in Odoo with online payment
Salesforce Agentforce AI Implementation.pdf
Reimagine Home Health with the Power of Agentic AI​
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
Tally Prime Crack Download New Version 5.1 [2025] (License Key Free

Secure communication

  • 1. Secure communication Most popular encryption algorithms overview
  • 2. Agenda One-time pad Stream ciphers A5/1 Symmetric block ciphers DES (weak), 3DES (secure), AES (secure) Asymmetric block ciphers RSA (slow) Elliptic curves (fast)
  • 3. One-time pad Main features: Totally secure crypto technic A key has to be the same length as a plain text A key has to be truly random XOR operation is often used to combine a key and a text Impractical in most cases due to the above key length requirement
  • 4. Stream ciphers Inspiration from the one-time pad Types: synchronous self-synchronizing LFSR (linear feedback shift registers)
  • 5. A5/1 stream cipher Features: Used in GSM networks 114 bit length keystream Based on three LSFRs Successful attacks exist
  • 6. DES DES, Data Encryption Standard, was developed in the 1970s at IBM and based on design of Horst Feistel. It is a symmetric-key algorithm based on Feistel network. Key size is 56 bits only and it is considered insecure now.
  • 7. 3DES 3DES - Triple DES Brute force attack on 2DES can use “meet in the middle” technique. It is a symmetric-key algorithm based on Feistel network. Key size is 168 bits only and it is considered insecure now.
  • 8. AES AES, Advanced Encryption Standard, established in 2001 by the NIST and based on design of Joan Daemen and Vincent Rijmen. It is a symmetric-key algorithm based on Galois field. Supported key sizes are 128, 192 or 256 bits.
  • 9. Block cipher modes A mode of operation is used to encrypt more than one block of plain data. The following is the list of some popular modes: ECB - Electronic Codebook - the simplest mode CBC - Cipher Block Chaining OFB - Output Feedback - makes a synchronous stream cipher CFB - Cipher Feedback - makes a self-synchronizing stream cipher CTR - Counter - makes a synchronous stream cipher
  • 10. RSA RSA, described in 1977, was called after its inventors Ron Rivest, Adi Shamir, and Leonard Adleman. It is a public key algorithm. Key size could be in range of 1024 to 4096 bits It is a relatively slow algorithm and usually used to share keys for symmetric algorithms.
  • 11. Elliptic curve cryptography It is based on the algebraic structure of elliptic curves. This is the fastest public key algorithm as of now. 256 bit ECC public key provides security compared to 3072 bit RSA public key.
  • 12. References Introduction to Cryptography by Christof Paar Cryptography and Computer Privacy