network security using des algorithem

14
Network Security With DES Algorithm Submitted By: Drashti Vadaviya (201304101510011) M.Tech 1 st SEM CGPIT Submitted To: Prof. Trunal Patel 1 CGPIT,Bardol i

Upload: drashti-vadaviya

Post on 28-Nov-2015

15 views

Category:

Documents


3 download

DESCRIPTION

network security algorithem

TRANSCRIPT

Network Security With

DES Algorithm

Submitted By:Drashti Vadaviya

(201304101510011)M.Tech 1st SEM

CGPIT

Submitted To:Prof. Trunal Patel

1CGPIT,Bardoli

2CGPIT,Bardoli

Security

3CGPIT,Bardoli

Symmetric key algorithms

The first class of encryption algorithm is Symmetric Key Algorithm because they use the same key for encryption and decryption.

Cryptographic algorithms can be implemented in either hardware (for speed) or in software (for flexibility).

4CGPIT,Bardoli

Example

5CGPIT,Bardoli

Data Encryption Standards

In January 1977, the U.S. Government adopted a product cipher developed by IBM as its official standard for unclassified information. This cipher, DES (Data Encryption Standard), was widely adopted by the industry for use in security products. It is no longer secure in its original form, but in a modified form it is still useful.

6CGPIT,Bardoli

Data Encryption Standards

The algorithm, which is parameterized by a 56-bit key has 19 distinct stages.The first stage is a key-independent transposition on the 64-bit plaintext. The last stage is the exact inverse of this transposition. The stage prior to the last one exchanges the leftmost 32 bits with the rightmost 32 bits. The remaining 16 stages are functionally identical but are parameterized by different functions of the key.

7CGPIT,Bardoli

Shift

The operation of one of these intermediate stages is illustrated in Fig. Each stage takes two 32-bit inputs and produces two 32-bit outputs. The left output is simply a copy of the right input. The right output is the bitwise XOR of the left input and a function of the right input and the key for this stage, Ki.

8CGPIT,Bardoli

Key Generation

9CGPIT,Bardoli

F(Ri,Ki)

10CGPIT,Bardoli

Limitation

11CGPIT,Bardoli

Triple DES

12CGPIT,Bardoli

Conclusion

DES key size is too short for proper security.

Also , DES uses 64-bit blocks, Which raises some potential issues when encryption several GB of data with the same key.

3DES is a trick to reuse implementations, by cascading three instances of DES(with distinct keys).

3DES is believed to be secure, but it is slow.

13CGPIT,Bardoli

References

[1] Andrew S. Tannenbaum, “computer networks” Fourth Edition.[p.780]

[2] Behrouz A. Forouzan, “Data Communication and Networking” Fourth Edition.[p.935]

[3] Hasan Mathkour , “ A secured cryptographic messaging system” , International conference on machine Lerning and computing,2011.

[4] Dr. Brain Gladman, “ A Specification For Rijndael, the AES Algorithm”, v3.1, 3rd march 2001.

14CGPIT,Bardoli