Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
61 views

Lecture 1-Introduction and Encryption Methods

This document provides an introduction to data encryption techniques and standards. It discusses symmetric and asymmetric encryption methods. Symmetric encryption uses a shared secret key for encryption and decryption, while asymmetric encryption uses different keys. It also describes common cryptographic concepts like plaintext, ciphertext, encryption algorithms, decryption algorithms, secret keys, ciphers, cryptography, and cryptanalysis. Specific encryption methods and ciphers covered include substitution ciphers, transposition ciphers, block ciphers, stream ciphers, the Data Encryption Standard (DES), Triple DES, and the Advanced Encryption Standard (AES).

Uploaded by

sameer15112000
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
61 views

Lecture 1-Introduction and Encryption Methods

This document provides an introduction to data encryption techniques and standards. It discusses symmetric and asymmetric encryption methods. Symmetric encryption uses a shared secret key for encryption and decryption, while asymmetric encryption uses different keys. It also describes common cryptographic concepts like plaintext, ciphertext, encryption algorithms, decryption algorithms, secret keys, ciphers, cryptography, and cryptanalysis. Specific encryption methods and ciphers covered include substitution ciphers, transposition ciphers, block ciphers, stream ciphers, the Data Encryption Standard (DES), Triple DES, and the Advanced Encryption Standard (AES).

Uploaded by

sameer15112000
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

Sanjivani Rural Education Society’s

Sanjivani College of Engineering, Kopargaon-423 603


(An Autonomous Institute, Affiliated to Savitribai Phule Pune University, Pune)
NACC ‘A’ Grade Accredited, ISO 9001:2015 Certified

Department of Computer Engineering


(NBA Accredited)

UNIT-2: Data Encryption Techniques and Standards


Lecture-01 Introduction

Prof. P.M. Dhanrao


Assistant Professor
E-mail : dhanraopravincomp@sanjivani.org.in
Contact No: 9028526256
Contents
• Introduction,
• Encryption Methods: Symmetric, Asymmetric,
• Cryptography,
• Substitution Ciphers.
• Transposition Ciphers,
• Stenography applications and limitations,
• Block Ciphers and methods of operations,
• Feistal Cipher,
• Data Encryption Standard (DES),
• Triple DES,
• DES Design Criteria, Weak Keys in DES Algorithms,
• Advance Encryption Standard (AES).

DEPARTMENT OF COMPUTER ENGINEERING , SCOE,KOPARGAON 2


Basic terminology
• Plaintext: original message to be encrypted

• Ciphertext: the encrypted message

• Enciphering or encryption: the process of converting plaintext into ciphertext

• Encryption algorithm: performs encryption


• Two inputs: a plaintext and a secret key

DEPARTMENT OF COMPUTER ENGINEERING , SCOE,KOPARGAON 3


• Deciphering or decryption: recovering plaintext from ciphertext

• Decryption algorithm: performs decryption


• Two inputs: ciphertext and secret key

• Secret key: same key used for encryption and decryption


• Also referred to as a symmetric key

DEPARTMENT OF COMPUTER ENGINEERING , SCOE,KOPARGAON 4


• Cipher or cryptographic system : a scheme for encryption and decryption

• Cryptography: science of studying ciphers

• Cryptanalysis: science of studying attacks against cryptographic systems

• Cryptology: cryptography + cryptanalysis

DEPARTMENT OF COMPUTER ENGINEERING , SCOE,KOPARGAON 5


Ciphers
• Symmetric cipher: same key used for encryption and decryption
• Block cipher: encrypts a block of plaintext at a time (typically 64 or 128 bits)
• Stream cipher: encrypts data one bit or one byte at a time

• Asymmetric cipher: different keys used for encryption and decryption

DEPARTMENT OF COMPUTER ENGINEERING , SCOE,KOPARGAON 6


Symmetric Encryption
• or conventional / private-key / single-key

• sender and recipient share a common key

• all classical encryption algorithms are private-key

• was only type prior to invention of public-key in 1970’s

• and by far most widely used

DEPARTMENT OF COMPUTER ENGINEERING , SCOE,KOPARGAON 7


Symmetric Cipher Model

DEPARTMENT OF COMPUTER ENGINEERING , SCOE,KOPARGAON 8


Requirements
• two requirements for secure use of symmetric encryption:
• a strong encryption algorithm
• a secret key known only to sender / receiver
• mathematically have:
Y = EK(X)
X = DK(Y)
• assume encryption algorithm is known
• implies a secure channel to distribute key

DEPARTMENT OF COMPUTER ENGINEERING , SCOE,KOPARGAON 9


Cryptography
• characterize cryptographic system by:
• type of encryption operations used
• substitution / transposition / product
• number of keys used
• single-key or private / two-key or public
• way in which plaintext is processed
• block / stream

DEPARTMENT OF COMPUTER ENGINEERING , SCOE,KOPARGAON 10


Cryptanalysis

• objective to recover key not just message


• general approaches:
• cryptanalytic attack
• brute-force attack

DEPARTMENT OF COMPUTER ENGINEERING , SCOE,KOPARGAON 11


Cryptanalytic Attacks
• ciphertext only
• only know algorithm & ciphertext, is statistical, know or can identify plaintext
• known plaintext
• know/suspect plaintext & ciphertext
• chosen plaintext
• select plaintext and obtain ciphertext
• chosen ciphertext
• select ciphertext and obtain plaintext
• chosen text
• select plaintext or ciphertext to en/decrypt

DEPARTMENT OF COMPUTER ENGINEERING , SCOE,KOPARGAON 12


More Definitions
• unconditional security

• no matter how much computer power or time is available, the cipher cannot be
broken since the ciphertext provides insufficient information to uniquely determine
the corresponding plaintext

• computational security

• given limited computing resources (eg time needed for calculations is greater than
age of universe), the cipher cannot be broken

DEPARTMENT OF COMPUTER ENGINEERING , SCOE,KOPARGAON 13


Brute Force Search
• always possible to simply try every key
• most basic attack, proportional to key size
• assume either know / recognise plaintext

Key Size (bits) Number of Time required at 1 Time required at 106


Alternative Keys decryption/µs decryptions/µs
32 232 = 4.3  109 231 µs = 35.8 minutes 2.15 milliseconds
56 256 = 7.2  1016 255 µs = 1142 years 10.01 hours
128 2128 = 3.4  1038 2127 µs = 5.4  1024 5.4  1018 years
years
168 2168 = 3.7  1050 2167 µs = 5.9  1036 5.9  1030 years
years
26 characters 26! = 4  1026 2  1026 µs = 6.4  1012 6.4  106 years
(permutation) years

DEPARTMENT OF COMPUTER ENGINEERING , SCOE,KOPARGAON 14


THANK YOU

You might also like