SlideShare a Scribd company logo
Subject
Wireless Networks
Topic: Encryption & Decryption
Presented By: MCS 4th Group No.1
Teacher: Dr. Faheem Khan
Bacha Khan University Charsadda KPK Pakistan
1
Group Members
 Didar Hussain Rno.30
 Adnan Khan Rno.38
 Mati Ur Rehman Rno.35
 Ishfaq Ahmad Rno.47
 Tariq Shah Rno.51
 Muhammad Javed Rno.17
Dec 2018By Didar Hussain
2
Contents
 Wireless communication
 Wireless network configuration
1. Adhoc
2. Infrastructure
3. Adhoc & infrastructure
 Service set
 Station
 Wireless network security
 Cryptography(encryption, decryption)
 Types of cryptography
1. Symmetric encryption
2. Asymmetric encryption
Dec 2018By Didar Hussain
3
Wireless Network
 In wireless network all devices connect with each other
wirelessly
 Its mean there is no cables are used in wireless networking
 It is to be noted that devices transmit voice and data using
electromagnetic waves
Dec 2018By Didar Hussain
4
Adhoc & infrastructure
Dec 2018By Didar Hussain
5
Basic & Extended service set
Dec 2018By Didar Hussain
6
Mobile Adhoc Networks (MANET)
Ad hoc networks:
 Complex wireless distributed system;
 Nodes can freely and dynamically self-organize into arbitrary
and temporary topologies;
What we expect out of ad hoc networks:
 Provide a multi-hop communication between mobile devises;
 Provide coverage in areas with low population densities.
Dec 2018By Didar Hussain
7
Wireless Network security
 We are living in the information age. We need to keep
information about every aspect of our lives. In other words,
information is an asset that has a value like any other asset.
 As an asset, information needs to be secured from attacks.
 To be secured, information needs to be hidden from
unauthorized access (confidentiality), protected from
unauthorized change (integrity), and available to an authorized
entity when it is needed (availability).
 These are also called the security goals.
Dec 2018By Didar Hussain
8
Wireless Network security
 Security goals
• Confidentiality
• Integrity
• Availability
 Attacks
Dec 2018By Didar Hussain
9
Security Attacks
Snooping
 Snooping refers to unauthorized access to data.
Traffic Analysis
 The hacker monitoring online traffic to understand the nature
of the transmission.
Modification
 After intercepting or accessing information, the attacker
modifies the information to make it beneficial to herself.
Dec 2018By Didar Hussain
10
Security Attacks
Masquerading
 Masquerading, or spoofing, happens when the attacker
impersonates somebody else.
Replaying
 In replaying, the attacker obtains a copy of a message sent by a
user and later tries to replay it.
Dec 2018By Didar Hussain
11
Security Attacks
Repudiation
 This type of attack is different from others because it is
performed by one of the two parties in the communication: the
sender or the receiver. The sender of the message might later
deny that she has sent the message; the receiver of the message
might later deny that he has received the message.
Dec 2018By Didar Hussain
12
Security Attacks
Denial of Service
 Denial of service (DoS) is a very common attack. It may slow
down or totally interrupt the service of a system. The attacker
can use several strategies to achieve this. She might send so
many bogus requests to a server that the server crashes because
of the heavy load. The attacker might intercept and delete a
server’s response to a client, making the client believe that the
server is not responding. The attacker may also intercept
requests from the clients, causing the clients to send requests
many times and overload the system.
Dec 2018By Didar Hussain
13
Technique for security
 The main aim of security is to protect the data from an
unauthorized access.
 So how we protect our data, its mean how we get three goals of
security?
 There is a special technique for security of data which is called
the cryptography technique.
Dec 2018By Didar Hussain
14
Cryptography technique
 The technique which is used the encryption and decryption
operations called the cryptography technique
 Encryption convert the original text (plain text) into an
unreadable form (cipher text). Decryption convert the cipher
text again to plain text
 The main aim of cryptography is to provide the security of
data over the internet.
 This security can be provided by the encrypting the data into
cipher text which is unknown to the intruders.
Dec 2018By Didar Hussain
15
Purpose of cryptography
 The main purpose of cryptography is for the following four parameters-
 1. Authentication: Authentication is used for the proof of the identities
of sender and receiver. We use authentication to define that the origin of
the message is identified and known to the receiver.
 2. Integrity: Integrity is used to define that the content i.e. sent by the sender
is same as the content received by the receiver.
 3. Confidentiality: Confidentiality defines that the only sender and
intended receiver are allowed to send the content of the message.
 4. Access control: Access control specifies and controls on who can access
the process.
Dec 2018By Didar Hussain
16
Types of cryptography
 Cryptography can be divided into two main parts and these
are:-
 1. Symmetric key cryptography: Symmetric key
cryptography can be defined as the part of cryptography
in which a single key is used for both encryption and
decryption process.
 2. Asymmetric key cryptography: Asymmetric key
cryptography can be defined as a part of cryptography in
which two keys are used. One key is used for encryption
process and another key is used for decryption process.
Dec 2018By Didar Hussain
17
Types of cryptography
Symmetric key encryption
 When the sender and receiver use the same key for encryption
and decryption called symmetric
Asymmetric key encryption
 When the sender and receiver use different keys for encryption
and decryption called asymmetric encryption, it has further the
following two types
1. Private key encryption
2. Public key encryption
Dec 2018By Didar Hussain
18
Types of cryptography
Private key encryption
 When the sender use the private key for encryption and
receiver the public key for decryption called the private key
encryption
Public key encryption
 When the sender use the public key for encryption and receiver
use the private key for decryption called the public key
encryption
Dec 2018By Didar Hussain
19
Types of cryptography
Dec 2018By Didar Hussain
20
Symmetric key
Cryptography
Asymmetric key
Cryptography
Cryptography
DES,AES,3DES,
BLOWFISH
RSA,ELLIPTIC,
CURVE
Algorithm for public key encryption
 DES(Data Encryption Standard)
 3DES(3 Data Encryption Standard)
 AES(Advance Encryption Standard)
 It is configured on any layer 3 devices such as firewall, router, multi layer
switch MLS.
 In cryptography, the AES also known as Rijndael, is a block cipher
adopted as an encryption standard by the US government specifies an
encryption algorithm capable of protecting sensitive data.
 The AES algorithm is symmetric block cipher that can encrypt and
decrypt information.
 The AES algorithm uses cryptographic key of 128, 192 and 256 bits to
encrypt and decrypt data in blocks of 128 bits
Dec 2018By Didar Hussain
21
Cryptography Process
Dec 2018By Didar Hussain
22
Problems in cryptography algorithms
 The main problem of the cryptography algorithms are
 1. Key size: - Key size is a major problem for encryption and
decryption of text data. There are no criteria to decide the size
of the key. Strong key make encryption strong. If the size of
the key is large than the encryption and decryption process
makes slow.
 2. Number of Key: - Some of the algorithm used more than one
key for encryption. There are no criteria to use any number of
key. More number of keys create complexity and difficult to
share because single key can be easily share.
Dec 2018By Didar Hussain
23
Problems in cryptography algorithms
 3. Selection of key:-Generally key is a numeric value which is
decided by the user. Key is shared between sender and receiver.
How to decide a key for encryption is also a problem.
Selection of key is mostly based on algorithm are
techniques used for encryption and decryption.
 4. Arithmetic complexity:- Arithmetic complexity is measure in
term of calculation or mathematical operation used for
encryption and decryption . Complex calculation takes more
time to encrypt the text. So reduce complex calculation is also
a difficult problem.
 5. Execution time:-Any algorithm which takes time to encrypt
the text into cipher text is known as execution time. The
execution time is depends on the operation used in the
algorithm. Reducing execution time is also a difficult problem.
Dec 2018By Didar Hussain
24
Objectives
 1. Reducing Key Size: - Key size is a major problem for in
encrypting and decrypting. Each and every algorithm objective
is to reduce key length but key should be effective and work
efficiently for text data.
 2. Automatic Generation of Key: - Symmetric key based
algorithm used common key shared by sender and receiver.
These key are decided by the sender and same key is used by
receiver in our proposed work shared key is generated
automatically based on the length of the text.
Dec 2018By Didar Hussain
25
Objectives
 3. Reducing Arithmetic Complexity: - our objective is to
reduce avoid or minimize arithmetic calculation by
replacing with simple calculations. In our proposed method we
use simple ASCCI code and binary number form for
encrypting and simple one division.
 4. Reducing Memory and Execution Time: - Each algorithm
needs memory to perform calculation and storing temporary
data, algorithm need time to perform calculation complex
calculation needs more CPU time .Our objective to reduce
memory and execution time.
Dec 2018By Didar Hussain
26
Objectives
 5. Minimizing Number of keys: - Each algorithm needs
key to encrypt text into non readable form. Number of key
is also a critical issue because more number of keys create
complexity during encryption and decryption process. Some
algorithm used more number of key some required less
number of key. Our objective is to use minimum number
of key and make strong encryption.
Dec 2018By Didar Hussain
27
References
 Data Communications AND Networking FIFTH EDITION
BEHROUZ A. FOROUZAN
 Singh, Swati, and Sudhir Kumar. "Analysis of Various
Cryptographic Algorithms." Analysis 5.3 (2018).
 Goud, Amarkant, and Vijay Kumar Verma. "Data Encryption
and Decryption Process Using Private Key
Cryptography." International Journal 3.6 (2018).
 Sawant, Anil Gopal, Vilas N. Nitnaware, and Anupama A.
Deshpande. "Advanced Encryption Standard Block Cipher
Algorithm." (2018).
Dec 2018By Didar Hussain
28
The End
Thanks
Dec 2018By Didar Hussain
29

More Related Content

PPTX
PDF
International Journal of Engineering Research and Development (IJERD)
PDF
Mj3422172221
PDF
International Refereed Journal of Engineering and Science (IRJES)
PPTX
Unit 1 Introducation
PPT
Online security & encryption
PDF
Prevention of Cheating Message based on Block Cipher using Digital Envelope
PPTX
Cryptography and Encryptions,Network Security,Caesar Cipher
International Journal of Engineering Research and Development (IJERD)
Mj3422172221
International Refereed Journal of Engineering and Science (IRJES)
Unit 1 Introducation
Online security & encryption
Prevention of Cheating Message based on Block Cipher using Digital Envelope
Cryptography and Encryptions,Network Security,Caesar Cipher

What's hot (20)

PPT
Websphere - Introduction to ssl part ii
PDF
A Review on Various Methods of Cryptography for Cyber Security
PDF
Analysis of Cryptography Techniques
PDF
Skyriver Communications – Fixed Wireless Security
PDF
Achieving data integrity by forming the digital signature using RSA and SHA-1...
PPTX
Security pre
PDF
Secure 3 kany-vanda
PDF
Network security & cryptography full notes
PDF
Network security unit 1,2,3
PDF
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
PDF
Overview on Symmetric Key Encryption Algorithms
PPTX
Secrity project keyvan
PDF
Analysis of Cryptographic Algorithms for Network Security
PDF
DES- Data Encryption Standard
PPSX
Web security for e-commerce
PDF
1 s2.0-s1877050915013460-main
PPTX
Cryptography
PPT
Lecture 6 web security
Websphere - Introduction to ssl part ii
A Review on Various Methods of Cryptography for Cyber Security
Analysis of Cryptography Techniques
Skyriver Communications – Fixed Wireless Security
Achieving data integrity by forming the digital signature using RSA and SHA-1...
Security pre
Secure 3 kany-vanda
Network security & cryptography full notes
Network security unit 1,2,3
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Overview on Symmetric Key Encryption Algorithms
Secrity project keyvan
Analysis of Cryptographic Algorithms for Network Security
DES- Data Encryption Standard
Web security for e-commerce
1 s2.0-s1877050915013460-main
Cryptography
Lecture 6 web security
Ad

Similar to Wireless Networks Encryption and Decryption (20)

PPTX
Information Security and Privacy-Unit-2.pptx
PDF
Cryptography
PPTX
Networking Security in data communication.pptx
PPTX
Cryptography and Network Security-ch1-4.pptx
PPTX
CRYPTOGRAPHY crytopgraphy wh is sd wkd ,w d .pptx
PDF
Computer Security (Cryptography) Ch01
PPT
Fundamentals of cryptography
PDF
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
PPT
Computer and Network Security
PDF
IRJET- A Survey on Cryptography, Encryption and Compression Techniques
PPTX
PRESENTATION ON CRYPTOGRAPHY.pptx
PPTX
PPT
network security
PPTX
groupWork.pptx
PPTX
Mastering Network Security: Protecting Networks from Cyber Threats with Firew...
PDF
20CS2008 Computer Networks
PPTX
IT235 POC - Unit I priciples of cryptography
PPTX
Fundamental Concept of Cryptography in Computer Security
PPTX
Network security & cryptography
PPTX
Network security & cryptography
Information Security and Privacy-Unit-2.pptx
Cryptography
Networking Security in data communication.pptx
Cryptography and Network Security-ch1-4.pptx
CRYPTOGRAPHY crytopgraphy wh is sd wkd ,w d .pptx
Computer Security (Cryptography) Ch01
Fundamentals of cryptography
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Computer and Network Security
IRJET- A Survey on Cryptography, Encryption and Compression Techniques
PRESENTATION ON CRYPTOGRAPHY.pptx
network security
groupWork.pptx
Mastering Network Security: Protecting Networks from Cyber Threats with Firew...
20CS2008 Computer Networks
IT235 POC - Unit I priciples of cryptography
Fundamental Concept of Cryptography in Computer Security
Network security & cryptography
Network security & cryptography
Ad

Recently uploaded (20)

PDF
RMMM.pdf make it easy to upload and study
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
Cell Types and Its function , kingdom of life
PDF
Insiders guide to clinical Medicine.pdf
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
master seminar digital applications in india
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
Lesson notes of climatology university.
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
01-Introduction-to-Information-Management.pdf
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
Pre independence Education in Inndia.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
Complications of Minimal Access Surgery at WLH
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
Sports Quiz easy sports quiz sports quiz
RMMM.pdf make it easy to upload and study
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Microbial diseases, their pathogenesis and prophylaxis
Cell Types and Its function , kingdom of life
Insiders guide to clinical Medicine.pdf
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
master seminar digital applications in india
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Module 4: Burden of Disease Tutorial Slides S2 2025
Lesson notes of climatology university.
O5-L3 Freight Transport Ops (International) V1.pdf
01-Introduction-to-Information-Management.pdf
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Pre independence Education in Inndia.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
102 student loan defaulters named and shamed – Is someone you know on the list?
Complications of Minimal Access Surgery at WLH
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Anesthesia in Laparoscopic Surgery in India
Sports Quiz easy sports quiz sports quiz

Wireless Networks Encryption and Decryption

  • 1. Subject Wireless Networks Topic: Encryption & Decryption Presented By: MCS 4th Group No.1 Teacher: Dr. Faheem Khan Bacha Khan University Charsadda KPK Pakistan 1
  • 2. Group Members  Didar Hussain Rno.30  Adnan Khan Rno.38  Mati Ur Rehman Rno.35  Ishfaq Ahmad Rno.47  Tariq Shah Rno.51  Muhammad Javed Rno.17 Dec 2018By Didar Hussain 2
  • 3. Contents  Wireless communication  Wireless network configuration 1. Adhoc 2. Infrastructure 3. Adhoc & infrastructure  Service set  Station  Wireless network security  Cryptography(encryption, decryption)  Types of cryptography 1. Symmetric encryption 2. Asymmetric encryption Dec 2018By Didar Hussain 3
  • 4. Wireless Network  In wireless network all devices connect with each other wirelessly  Its mean there is no cables are used in wireless networking  It is to be noted that devices transmit voice and data using electromagnetic waves Dec 2018By Didar Hussain 4
  • 5. Adhoc & infrastructure Dec 2018By Didar Hussain 5
  • 6. Basic & Extended service set Dec 2018By Didar Hussain 6
  • 7. Mobile Adhoc Networks (MANET) Ad hoc networks:  Complex wireless distributed system;  Nodes can freely and dynamically self-organize into arbitrary and temporary topologies; What we expect out of ad hoc networks:  Provide a multi-hop communication between mobile devises;  Provide coverage in areas with low population densities. Dec 2018By Didar Hussain 7
  • 8. Wireless Network security  We are living in the information age. We need to keep information about every aspect of our lives. In other words, information is an asset that has a value like any other asset.  As an asset, information needs to be secured from attacks.  To be secured, information needs to be hidden from unauthorized access (confidentiality), protected from unauthorized change (integrity), and available to an authorized entity when it is needed (availability).  These are also called the security goals. Dec 2018By Didar Hussain 8
  • 9. Wireless Network security  Security goals • Confidentiality • Integrity • Availability  Attacks Dec 2018By Didar Hussain 9
  • 10. Security Attacks Snooping  Snooping refers to unauthorized access to data. Traffic Analysis  The hacker monitoring online traffic to understand the nature of the transmission. Modification  After intercepting or accessing information, the attacker modifies the information to make it beneficial to herself. Dec 2018By Didar Hussain 10
  • 11. Security Attacks Masquerading  Masquerading, or spoofing, happens when the attacker impersonates somebody else. Replaying  In replaying, the attacker obtains a copy of a message sent by a user and later tries to replay it. Dec 2018By Didar Hussain 11
  • 12. Security Attacks Repudiation  This type of attack is different from others because it is performed by one of the two parties in the communication: the sender or the receiver. The sender of the message might later deny that she has sent the message; the receiver of the message might later deny that he has received the message. Dec 2018By Didar Hussain 12
  • 13. Security Attacks Denial of Service  Denial of service (DoS) is a very common attack. It may slow down or totally interrupt the service of a system. The attacker can use several strategies to achieve this. She might send so many bogus requests to a server that the server crashes because of the heavy load. The attacker might intercept and delete a server’s response to a client, making the client believe that the server is not responding. The attacker may also intercept requests from the clients, causing the clients to send requests many times and overload the system. Dec 2018By Didar Hussain 13
  • 14. Technique for security  The main aim of security is to protect the data from an unauthorized access.  So how we protect our data, its mean how we get three goals of security?  There is a special technique for security of data which is called the cryptography technique. Dec 2018By Didar Hussain 14
  • 15. Cryptography technique  The technique which is used the encryption and decryption operations called the cryptography technique  Encryption convert the original text (plain text) into an unreadable form (cipher text). Decryption convert the cipher text again to plain text  The main aim of cryptography is to provide the security of data over the internet.  This security can be provided by the encrypting the data into cipher text which is unknown to the intruders. Dec 2018By Didar Hussain 15
  • 16. Purpose of cryptography  The main purpose of cryptography is for the following four parameters-  1. Authentication: Authentication is used for the proof of the identities of sender and receiver. We use authentication to define that the origin of the message is identified and known to the receiver.  2. Integrity: Integrity is used to define that the content i.e. sent by the sender is same as the content received by the receiver.  3. Confidentiality: Confidentiality defines that the only sender and intended receiver are allowed to send the content of the message.  4. Access control: Access control specifies and controls on who can access the process. Dec 2018By Didar Hussain 16
  • 17. Types of cryptography  Cryptography can be divided into two main parts and these are:-  1. Symmetric key cryptography: Symmetric key cryptography can be defined as the part of cryptography in which a single key is used for both encryption and decryption process.  2. Asymmetric key cryptography: Asymmetric key cryptography can be defined as a part of cryptography in which two keys are used. One key is used for encryption process and another key is used for decryption process. Dec 2018By Didar Hussain 17
  • 18. Types of cryptography Symmetric key encryption  When the sender and receiver use the same key for encryption and decryption called symmetric Asymmetric key encryption  When the sender and receiver use different keys for encryption and decryption called asymmetric encryption, it has further the following two types 1. Private key encryption 2. Public key encryption Dec 2018By Didar Hussain 18
  • 19. Types of cryptography Private key encryption  When the sender use the private key for encryption and receiver the public key for decryption called the private key encryption Public key encryption  When the sender use the public key for encryption and receiver use the private key for decryption called the public key encryption Dec 2018By Didar Hussain 19
  • 20. Types of cryptography Dec 2018By Didar Hussain 20 Symmetric key Cryptography Asymmetric key Cryptography Cryptography DES,AES,3DES, BLOWFISH RSA,ELLIPTIC, CURVE
  • 21. Algorithm for public key encryption  DES(Data Encryption Standard)  3DES(3 Data Encryption Standard)  AES(Advance Encryption Standard)  It is configured on any layer 3 devices such as firewall, router, multi layer switch MLS.  In cryptography, the AES also known as Rijndael, is a block cipher adopted as an encryption standard by the US government specifies an encryption algorithm capable of protecting sensitive data.  The AES algorithm is symmetric block cipher that can encrypt and decrypt information.  The AES algorithm uses cryptographic key of 128, 192 and 256 bits to encrypt and decrypt data in blocks of 128 bits Dec 2018By Didar Hussain 21
  • 23. Problems in cryptography algorithms  The main problem of the cryptography algorithms are  1. Key size: - Key size is a major problem for encryption and decryption of text data. There are no criteria to decide the size of the key. Strong key make encryption strong. If the size of the key is large than the encryption and decryption process makes slow.  2. Number of Key: - Some of the algorithm used more than one key for encryption. There are no criteria to use any number of key. More number of keys create complexity and difficult to share because single key can be easily share. Dec 2018By Didar Hussain 23
  • 24. Problems in cryptography algorithms  3. Selection of key:-Generally key is a numeric value which is decided by the user. Key is shared between sender and receiver. How to decide a key for encryption is also a problem. Selection of key is mostly based on algorithm are techniques used for encryption and decryption.  4. Arithmetic complexity:- Arithmetic complexity is measure in term of calculation or mathematical operation used for encryption and decryption . Complex calculation takes more time to encrypt the text. So reduce complex calculation is also a difficult problem.  5. Execution time:-Any algorithm which takes time to encrypt the text into cipher text is known as execution time. The execution time is depends on the operation used in the algorithm. Reducing execution time is also a difficult problem. Dec 2018By Didar Hussain 24
  • 25. Objectives  1. Reducing Key Size: - Key size is a major problem for in encrypting and decrypting. Each and every algorithm objective is to reduce key length but key should be effective and work efficiently for text data.  2. Automatic Generation of Key: - Symmetric key based algorithm used common key shared by sender and receiver. These key are decided by the sender and same key is used by receiver in our proposed work shared key is generated automatically based on the length of the text. Dec 2018By Didar Hussain 25
  • 26. Objectives  3. Reducing Arithmetic Complexity: - our objective is to reduce avoid or minimize arithmetic calculation by replacing with simple calculations. In our proposed method we use simple ASCCI code and binary number form for encrypting and simple one division.  4. Reducing Memory and Execution Time: - Each algorithm needs memory to perform calculation and storing temporary data, algorithm need time to perform calculation complex calculation needs more CPU time .Our objective to reduce memory and execution time. Dec 2018By Didar Hussain 26
  • 27. Objectives  5. Minimizing Number of keys: - Each algorithm needs key to encrypt text into non readable form. Number of key is also a critical issue because more number of keys create complexity during encryption and decryption process. Some algorithm used more number of key some required less number of key. Our objective is to use minimum number of key and make strong encryption. Dec 2018By Didar Hussain 27
  • 28. References  Data Communications AND Networking FIFTH EDITION BEHROUZ A. FOROUZAN  Singh, Swati, and Sudhir Kumar. "Analysis of Various Cryptographic Algorithms." Analysis 5.3 (2018).  Goud, Amarkant, and Vijay Kumar Verma. "Data Encryption and Decryption Process Using Private Key Cryptography." International Journal 3.6 (2018).  Sawant, Anil Gopal, Vilas N. Nitnaware, and Anupama A. Deshpande. "Advanced Encryption Standard Block Cipher Algorithm." (2018). Dec 2018By Didar Hussain 28
  • 29. The End Thanks Dec 2018By Didar Hussain 29