SlideShare a Scribd company logo
Data Encryption Techniques and Standard
-- Asst. Prof. Sarika Jadhav
Pratibha College of Commerce and Computer Studies, Chinchwad, Pune
Types of cryptography
The Data Encryption Techniques and Standard
•The DES (Data Encryption Standard) algorithm is a symmetric-key block cipher
•The algorithm takes the plain text in 64-bit blocks and converts them into ciphertext using 48-bit keys.
•Since it’s a symmetric-key algorithm, it employs the same key in both encrypting and decrypting the data.
•DES is based on the Feistel block cipher, called LUCIFER.
• DES uses 16 rounds of the Feistel structure, using a different key for each round.
•DES became the approved federal encryption standard in November 1976 .For the longest time, DES
was the data encryption standard in information security.
•DES’s dominance came to an end in 2002, when the Advanced Encryption Standard (AES) replaced the
DES encryption algorithm as the accepted standard.
•Triple DES is a symmetric key-block cipher which applies the DES cipher in triplicate. It encrypts with the
first key (k1), decrypts using the second key (k2), then encrypts with the third key (k3).
Features
The DES algorithm is a combination of two fundamental building blocks of encryption: substitution
and transposition.
The algorithm derives its strength from repeated application of these two techniques, for a total of 16
cycles.
The algorithm begins by encrypting the plaintext as blocks of 64 bits.
The key is 64 bits long - it can be any 56-bit number.
The 8 bits are often used as check digits
Features: –
Block size = 64 bits
– Key size = 56 bits (in reality, 64 bits, but 8 are used as
parity-check bits for error control)
– Number of rounds = 16
– 16 intermediary keys, each 48 bits
Working Principle of DES:
The Feistel (F) function
The F-function operates on half a block (32 bits) at a time and consists of four stages:
Four Stages of DES:
1. Expansion — 32-bit half-block is expanded to 48 bits using the expansion
Permutation ( duplicating half of the bits)
The output consists of eight 6-bit (8 * 6 = 48 bits) pieces.
2. Key mixing — Result is combined with a subkey using an XOR operation.
16 48- bit subkeys — one for each round — are derived from the main key using the key
schedule .
3. Substitution — The block is divided into eight 6-bit pieces before processing by the S-boxes, or substitution
boxes.
Each of the eight S-boxes replaces its six input bits with four output bits according to a non-linear
transformation.
The S-boxes provide the core of the security of DES
4. Permutation — 32 outputs from the S-boxes are rearranged according to a fixed permutation, the P-box.
This is designed so that, after permutation, each S-box's output bits are spread across 4 different S boxes in the next
round.
The alternation of substitution from the S-boxes, and permutation of bits from the P-box and E-expansion provides
- "confusion and diffusion" respectively.
Key schedule
Advanced Encryption Standard ( AES )
Commercial-grade symmetric algorithm
AES is based on a design principle known as a substitution-permutation network
Combination of both substitution and permutation
It is fast in both software and hardware
AES does not use a Feistel network.
AES has a fixed block size of 128 bits, and a key size of 128, 192, or 256 bits.
AES operates on a 4×4 column-major order matrix of bytes
Most AES calculations are done in a special finite field.
The key size used for an AES cipher specifies the number of repetitions of transformation
rounds that convert the plaintext, into the ciphertext.
The number of cycles of repetition are as follows:
10 cycles of repetition for 128-bit keys.
12 cycles of repetition for 192-bit keys.
14 cycles of repetition for 256-bit keys.
High-level description of the algorithm
● KeyExpansions—round keys are derived from the cipher key using Rijndael's key schedule.
AES requires a separate 128-bit round key block for each round plus one more.
● InitialRound
○ AddRoundKey—each byte of the state is combined with a block of the round key using bitwise xor.
● Rounds
○ SubBytes—a non-linear substitution step where each byte is replaced with another according to a lookup
table.
○ ShiftRows—a transposition step where the last three rows of the state are shifted cyclically a certain number
of steps.
○ MixColumns—a mixing operation which operates on the columns of the state, combining the four bytes in
each column.
○ AddRoundKey
● Final Round (no MixColumns)
○ SubBytes
○ ShiftRows
○ AddRoundKey.
The SubBytes steps
In the ShiftRows step, bytes in each row of the state are shifted
cyclically to the left. The number of places each byte is shifted differs
for each row.
The ShiftRows step
In the SubBytes step, each byte in the state is
replaced with its entry in a fixed 8-bit lookup
table, S; bij =S(aij).
The MixColumns step
In the MixColumns step, each column of the state is multiplied
with a fixed polynomial c(x).
The AddRoundKey step
In the AddRoundKey step, each byte of the state is
combined with a byte of the round subkey using the
XORoperation (⊕).
Group-Oriented Cryptography
● A class of cryptographic schemes to provide security in scenarios where a group of
participants can communicate securely over some computer network in such a way that
the exchanged messages would be unintelligible for outsiders and non-pertaining
users.
1. Broadcast encryption: To prevent unauthorized users from extracting data, the broadcaster
encrypts the message and only the authorized users have the decryption keys to recover the data.
1. Traitor tracing: these traitor-tracing schemes use a secret-key encryption scheme to encrypt data.
A public-key traitor tracing allows everyone to perform encryption, and thus anyone can broadcast
messages to authorized users securely.
3. Threshold cryptosystems: Threshold cryptosystems allow one to send encrypted messages
to a group, while only a group achieving a “threshold" has the ability to reconstruct the plaintext.
Steganography and its types
● Steganography is a technique of hiding
communication by concealing the secret message
into a fake message.
Types of Steganography
Image Steganography
● The image Steganography is used to hide a secret message inside an image.
The most widely used technique to hide secret bit inside the LSB of the cover
image.
● The most widely used technique to hide secret bit inside the LSB of the cover
image.
Audio Steganography
● Audio stenography can conceal the secret message in the audio file with the
help of its digital representation.
Video Steganography
● Video Steganography brings more possibilities of disguising a large amount of
data because it is a combination of image and sound.
Text Steganography:
● Text Steganography uses data compression. Data compression encodes
information in one representation into another representation. The new
representation of data is smaller in size.
Data encryption techniques and standard
Ad

More Related Content

What's hot (20)

AES Encryption
AES EncryptionAES Encryption
AES Encryption
Rahul Marwaha
 
RC4&RC5
RC4&RC5RC4&RC5
RC4&RC5
Mohamed El-Serngawy
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption Standard
Prince Rachit
 
Hash function
Hash function Hash function
Hash function
Salman Memon
 
Unit 2
Unit 2Unit 2
Unit 2
KRAMANJANEYULU1
 
Symmetric and asymmetric key
Symmetric and asymmetric keySymmetric and asymmetric key
Symmetric and asymmetric key
Triad Square InfoSec
 
Cryptography and network security Nit701
Cryptography and network security Nit701Cryptography and network security Nit701
Cryptography and network security Nit701
Amit Pathak
 
DES.ppt
DES.pptDES.ppt
DES.ppt
RizwanBasha12
 
Symmetric encryption
Symmetric encryptionSymmetric encryption
Symmetric encryption
DR RICHMOND ADEBIAYE
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
Rashmi Burugupalli
 
Tcp presentation
Tcp presentationTcp presentation
Tcp presentation
Ramla Sheikh
 
Computer Security Lecture 7: RSA
Computer Security Lecture 7: RSAComputer Security Lecture 7: RSA
Computer Security Lecture 7: RSA
Mohamed Loey
 
Rsa Crptosystem
Rsa CrptosystemRsa Crptosystem
Rsa Crptosystem
Amlan Patel
 
Hash table
Hash tableHash table
Hash table
Rajendran
 
18 hashing
18 hashing18 hashing
18 hashing
deonnash
 
Set associative mapping
Set associative mappingSet associative mapping
Set associative mapping
Ashik Khan
 
AES KEY EXPANSION .pptx
AES KEY EXPANSION .pptxAES KEY EXPANSION .pptx
AES KEY EXPANSION .pptx
AhmudulHassan
 
RC 4
RC 4 RC 4
RC 4
Sovan Paul
 
MD-5 : Algorithm
MD-5 : AlgorithmMD-5 : Algorithm
MD-5 : Algorithm
Sahil Kureel
 
(Crypto) DES And RSA Algorithms Overview
(Crypto) DES And RSA Algorithms Overview(Crypto) DES And RSA Algorithms Overview
(Crypto) DES And RSA Algorithms Overview
EL Bachir Nouni
 

Similar to Data encryption techniques and standard (20)

Encryption techniqudgfhgvj,hbkes (2).pptx
Encryption techniqudgfhgvj,hbkes (2).pptxEncryption techniqudgfhgvj,hbkes (2).pptx
Encryption techniqudgfhgvj,hbkes (2).pptx
huachuhulk
 
Fundamentals of Information Encryption
Fundamentals of Information EncryptionFundamentals of Information Encryption
Fundamentals of Information Encryption
Amna Magzoub
 
block ciphers
block ciphersblock ciphers
block ciphers
Asad Ali
 
Information and data security block cipher and the data encryption standard (...
Information and data security block cipher and the data encryption standard (...Information and data security block cipher and the data encryption standard (...
Information and data security block cipher and the data encryption standard (...
Mazin Alwaaly
 
NS UNIT 1 Advanced Encryption Standard& RSA
NS UNIT 1 Advanced Encryption Standard& RSANS UNIT 1 Advanced Encryption Standard& RSA
NS UNIT 1 Advanced Encryption Standard& RSA
AntonySuresh13
 
Encryption
EncryptionEncryption
Encryption
IGZ Software house
 
Unit II.ppt.............................
Unit II.ppt.............................Unit II.ppt.............................
Unit II.ppt.............................
r47381047
 
Lecture # 007 AES.pptx
Lecture # 007 AES.pptxLecture # 007 AES.pptx
Lecture # 007 AES.pptx
MuhammadJavedNaro
 
chap3.pdf
chap3.pdfchap3.pdf
chap3.pdf
NickySanthosh1
 
619cb9e9-b273-4ed7-9181-937ba84734ab-.pptx
619cb9e9-b273-4ed7-9181-937ba84734ab-.pptx619cb9e9-b273-4ed7-9181-937ba84734ab-.pptx
619cb9e9-b273-4ed7-9181-937ba84734ab-.pptx
nyasarajan23
 
Software EngineeringModule 2 (Complete).pptx
Software EngineeringModule 2 (Complete).pptxSoftware EngineeringModule 2 (Complete).pptx
Software EngineeringModule 2 (Complete).pptx
20PZSB7038SachinP1
 
1 DES.pdf
1 DES.pdf1 DES.pdf
1 DES.pdf
nitin571047
 
Information and network security 24 advanced encryption standard aes
Information and network security 24 advanced encryption standard aesInformation and network security 24 advanced encryption standard aes
Information and network security 24 advanced encryption standard aes
Vaibhav Khanna
 
CNS Module 3_AES. in cryptography and network security
CNS Module 3_AES. in cryptography and network securityCNS Module 3_AES. in cryptography and network security
CNS Module 3_AES. in cryptography and network security
bodamaddy
 
Cryptography Introduction
Cryptography IntroductionCryptography Introduction
Cryptography Introduction
indupps
 
Enhancement of DES Algorithm with Multi State Logic
Enhancement of DES Algorithm with Multi State LogicEnhancement of DES Algorithm with Multi State Logic
Enhancement of DES Algorithm with Multi State Logic
IJORCS
 
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
editor1knowledgecuddle
 
Msc 1
Msc 1Msc 1
Msc 1
Prof. Ihab Ali
 
Unit 2
Unit  2Unit  2
Unit 2
tamil arasan
 
AES.ppt
AES.pptAES.ppt
AES.ppt
BincySam2
 
Encryption techniqudgfhgvj,hbkes (2).pptx
Encryption techniqudgfhgvj,hbkes (2).pptxEncryption techniqudgfhgvj,hbkes (2).pptx
Encryption techniqudgfhgvj,hbkes (2).pptx
huachuhulk
 
Fundamentals of Information Encryption
Fundamentals of Information EncryptionFundamentals of Information Encryption
Fundamentals of Information Encryption
Amna Magzoub
 
block ciphers
block ciphersblock ciphers
block ciphers
Asad Ali
 
Information and data security block cipher and the data encryption standard (...
Information and data security block cipher and the data encryption standard (...Information and data security block cipher and the data encryption standard (...
Information and data security block cipher and the data encryption standard (...
Mazin Alwaaly
 
NS UNIT 1 Advanced Encryption Standard& RSA
NS UNIT 1 Advanced Encryption Standard& RSANS UNIT 1 Advanced Encryption Standard& RSA
NS UNIT 1 Advanced Encryption Standard& RSA
AntonySuresh13
 
Unit II.ppt.............................
Unit II.ppt.............................Unit II.ppt.............................
Unit II.ppt.............................
r47381047
 
619cb9e9-b273-4ed7-9181-937ba84734ab-.pptx
619cb9e9-b273-4ed7-9181-937ba84734ab-.pptx619cb9e9-b273-4ed7-9181-937ba84734ab-.pptx
619cb9e9-b273-4ed7-9181-937ba84734ab-.pptx
nyasarajan23
 
Software EngineeringModule 2 (Complete).pptx
Software EngineeringModule 2 (Complete).pptxSoftware EngineeringModule 2 (Complete).pptx
Software EngineeringModule 2 (Complete).pptx
20PZSB7038SachinP1
 
Information and network security 24 advanced encryption standard aes
Information and network security 24 advanced encryption standard aesInformation and network security 24 advanced encryption standard aes
Information and network security 24 advanced encryption standard aes
Vaibhav Khanna
 
CNS Module 3_AES. in cryptography and network security
CNS Module 3_AES. in cryptography and network securityCNS Module 3_AES. in cryptography and network security
CNS Module 3_AES. in cryptography and network security
bodamaddy
 
Cryptography Introduction
Cryptography IntroductionCryptography Introduction
Cryptography Introduction
indupps
 
Enhancement of DES Algorithm with Multi State Logic
Enhancement of DES Algorithm with Multi State LogicEnhancement of DES Algorithm with Multi State Logic
Enhancement of DES Algorithm with Multi State Logic
IJORCS
 
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
editor1knowledgecuddle
 
Ad

Recently uploaded (20)

UiPath AgentHack - Build the AI agents of tomorrow_Enablement 1.pptx
UiPath AgentHack - Build the AI agents of tomorrow_Enablement 1.pptxUiPath AgentHack - Build the AI agents of tomorrow_Enablement 1.pptx
UiPath AgentHack - Build the AI agents of tomorrow_Enablement 1.pptx
anabulhac
 
Secondary Storage for a microcontroller system
Secondary Storage for a microcontroller systemSecondary Storage for a microcontroller system
Secondary Storage for a microcontroller system
fizarcse
 
Digital Technologies for Culture, Arts and Heritage: Insights from Interdisci...
Digital Technologies for Culture, Arts and Heritage: Insights from Interdisci...Digital Technologies for Culture, Arts and Heritage: Insights from Interdisci...
Digital Technologies for Culture, Arts and Heritage: Insights from Interdisci...
Vasileios Komianos
 
Kit-Works Team Study_아직도 Dockefile.pdf_김성호
Kit-Works Team Study_아직도 Dockefile.pdf_김성호Kit-Works Team Study_아직도 Dockefile.pdf_김성호
Kit-Works Team Study_아직도 Dockefile.pdf_김성호
Wonjun Hwang
 
Who's choice? Making decisions with and about Artificial Intelligence, Keele ...
Who's choice? Making decisions with and about Artificial Intelligence, Keele ...Who's choice? Making decisions with and about Artificial Intelligence, Keele ...
Who's choice? Making decisions with and about Artificial Intelligence, Keele ...
Alan Dix
 
MULTI-STAKEHOLDER CONSULTATION PROGRAM On Implementation of DNF 2.0 and Way F...
MULTI-STAKEHOLDER CONSULTATION PROGRAM On Implementation of DNF 2.0 and Way F...MULTI-STAKEHOLDER CONSULTATION PROGRAM On Implementation of DNF 2.0 and Way F...
MULTI-STAKEHOLDER CONSULTATION PROGRAM On Implementation of DNF 2.0 and Way F...
ICT Frame Magazine Pvt. Ltd.
 
Shoehorning dependency injection into a FP language, what does it take?
Shoehorning dependency injection into a FP language, what does it take?Shoehorning dependency injection into a FP language, what does it take?
Shoehorning dependency injection into a FP language, what does it take?
Eric Torreborre
 
ICDCC 2025: Securing Agentic AI - Eryk Budi Pratama.pdf
ICDCC 2025: Securing Agentic AI - Eryk Budi Pratama.pdfICDCC 2025: Securing Agentic AI - Eryk Budi Pratama.pdf
ICDCC 2025: Securing Agentic AI - Eryk Budi Pratama.pdf
Eryk Budi Pratama
 
Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...
Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...
Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...
Maarten Verwaest
 
In-App Guidance_ Save Enterprises Millions in Training & IT Costs.pptx
In-App Guidance_ Save Enterprises Millions in Training & IT Costs.pptxIn-App Guidance_ Save Enterprises Millions in Training & IT Costs.pptx
In-App Guidance_ Save Enterprises Millions in Training & IT Costs.pptx
aptyai
 
DNF 2.0 Implementations Challenges in Nepal
DNF 2.0 Implementations Challenges in NepalDNF 2.0 Implementations Challenges in Nepal
DNF 2.0 Implementations Challenges in Nepal
ICT Frame Magazine Pvt. Ltd.
 
Build With AI - In Person Session Slides.pdf
Build With AI - In Person Session Slides.pdfBuild With AI - In Person Session Slides.pdf
Build With AI - In Person Session Slides.pdf
Google Developer Group - Harare
 
Top 5 Qualities to Look for in Salesforce Partners in 2025
Top 5 Qualities to Look for in Salesforce Partners in 2025Top 5 Qualities to Look for in Salesforce Partners in 2025
Top 5 Qualities to Look for in Salesforce Partners in 2025
Damco Salesforce Services
 
論文紹介:"InfLoRA: Interference-Free Low-Rank Adaptation for Continual Learning" ...
論文紹介:"InfLoRA: Interference-Free Low-Rank Adaptation for Continual Learning" ...論文紹介:"InfLoRA: Interference-Free Low-Rank Adaptation for Continual Learning" ...
論文紹介:"InfLoRA: Interference-Free Low-Rank Adaptation for Continual Learning" ...
Toru Tamaki
 
Kit-Works Team Study_팀스터디_김한솔_nuqs_20250509.pdf
Kit-Works Team Study_팀스터디_김한솔_nuqs_20250509.pdfKit-Works Team Study_팀스터디_김한솔_nuqs_20250509.pdf
Kit-Works Team Study_팀스터디_김한솔_nuqs_20250509.pdf
Wonjun Hwang
 
Master Data Management - Enterprise Application Integration
Master Data Management - Enterprise Application IntegrationMaster Data Management - Enterprise Application Integration
Master Data Management - Enterprise Application Integration
Sherif Rasmy
 
DevOpsDays SLC - Platform Engineers are Product Managers.pptx
DevOpsDays SLC - Platform Engineers are Product Managers.pptxDevOpsDays SLC - Platform Engineers are Product Managers.pptx
DevOpsDays SLC - Platform Engineers are Product Managers.pptx
Justin Reock
 
Mastering Testing in the Modern F&B Landscape
Mastering Testing in the Modern F&B LandscapeMastering Testing in the Modern F&B Landscape
Mastering Testing in the Modern F&B Landscape
marketing943205
 
Building the Customer Identity Community, Together.pdf
Building the Customer Identity Community, Together.pdfBuilding the Customer Identity Community, Together.pdf
Building the Customer Identity Community, Together.pdf
Cheryl Hung
 
IT484 Cyber Forensics_Information Technology
IT484 Cyber Forensics_Information TechnologyIT484 Cyber Forensics_Information Technology
IT484 Cyber Forensics_Information Technology
SHEHABALYAMANI
 
UiPath AgentHack - Build the AI agents of tomorrow_Enablement 1.pptx
UiPath AgentHack - Build the AI agents of tomorrow_Enablement 1.pptxUiPath AgentHack - Build the AI agents of tomorrow_Enablement 1.pptx
UiPath AgentHack - Build the AI agents of tomorrow_Enablement 1.pptx
anabulhac
 
Secondary Storage for a microcontroller system
Secondary Storage for a microcontroller systemSecondary Storage for a microcontroller system
Secondary Storage for a microcontroller system
fizarcse
 
Digital Technologies for Culture, Arts and Heritage: Insights from Interdisci...
Digital Technologies for Culture, Arts and Heritage: Insights from Interdisci...Digital Technologies for Culture, Arts and Heritage: Insights from Interdisci...
Digital Technologies for Culture, Arts and Heritage: Insights from Interdisci...
Vasileios Komianos
 
Kit-Works Team Study_아직도 Dockefile.pdf_김성호
Kit-Works Team Study_아직도 Dockefile.pdf_김성호Kit-Works Team Study_아직도 Dockefile.pdf_김성호
Kit-Works Team Study_아직도 Dockefile.pdf_김성호
Wonjun Hwang
 
Who's choice? Making decisions with and about Artificial Intelligence, Keele ...
Who's choice? Making decisions with and about Artificial Intelligence, Keele ...Who's choice? Making decisions with and about Artificial Intelligence, Keele ...
Who's choice? Making decisions with and about Artificial Intelligence, Keele ...
Alan Dix
 
MULTI-STAKEHOLDER CONSULTATION PROGRAM On Implementation of DNF 2.0 and Way F...
MULTI-STAKEHOLDER CONSULTATION PROGRAM On Implementation of DNF 2.0 and Way F...MULTI-STAKEHOLDER CONSULTATION PROGRAM On Implementation of DNF 2.0 and Way F...
MULTI-STAKEHOLDER CONSULTATION PROGRAM On Implementation of DNF 2.0 and Way F...
ICT Frame Magazine Pvt. Ltd.
 
Shoehorning dependency injection into a FP language, what does it take?
Shoehorning dependency injection into a FP language, what does it take?Shoehorning dependency injection into a FP language, what does it take?
Shoehorning dependency injection into a FP language, what does it take?
Eric Torreborre
 
ICDCC 2025: Securing Agentic AI - Eryk Budi Pratama.pdf
ICDCC 2025: Securing Agentic AI - Eryk Budi Pratama.pdfICDCC 2025: Securing Agentic AI - Eryk Budi Pratama.pdf
ICDCC 2025: Securing Agentic AI - Eryk Budi Pratama.pdf
Eryk Budi Pratama
 
Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...
Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...
Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...
Maarten Verwaest
 
In-App Guidance_ Save Enterprises Millions in Training & IT Costs.pptx
In-App Guidance_ Save Enterprises Millions in Training & IT Costs.pptxIn-App Guidance_ Save Enterprises Millions in Training & IT Costs.pptx
In-App Guidance_ Save Enterprises Millions in Training & IT Costs.pptx
aptyai
 
Top 5 Qualities to Look for in Salesforce Partners in 2025
Top 5 Qualities to Look for in Salesforce Partners in 2025Top 5 Qualities to Look for in Salesforce Partners in 2025
Top 5 Qualities to Look for in Salesforce Partners in 2025
Damco Salesforce Services
 
論文紹介:"InfLoRA: Interference-Free Low-Rank Adaptation for Continual Learning" ...
論文紹介:"InfLoRA: Interference-Free Low-Rank Adaptation for Continual Learning" ...論文紹介:"InfLoRA: Interference-Free Low-Rank Adaptation for Continual Learning" ...
論文紹介:"InfLoRA: Interference-Free Low-Rank Adaptation for Continual Learning" ...
Toru Tamaki
 
Kit-Works Team Study_팀스터디_김한솔_nuqs_20250509.pdf
Kit-Works Team Study_팀스터디_김한솔_nuqs_20250509.pdfKit-Works Team Study_팀스터디_김한솔_nuqs_20250509.pdf
Kit-Works Team Study_팀스터디_김한솔_nuqs_20250509.pdf
Wonjun Hwang
 
Master Data Management - Enterprise Application Integration
Master Data Management - Enterprise Application IntegrationMaster Data Management - Enterprise Application Integration
Master Data Management - Enterprise Application Integration
Sherif Rasmy
 
DevOpsDays SLC - Platform Engineers are Product Managers.pptx
DevOpsDays SLC - Platform Engineers are Product Managers.pptxDevOpsDays SLC - Platform Engineers are Product Managers.pptx
DevOpsDays SLC - Platform Engineers are Product Managers.pptx
Justin Reock
 
Mastering Testing in the Modern F&B Landscape
Mastering Testing in the Modern F&B LandscapeMastering Testing in the Modern F&B Landscape
Mastering Testing in the Modern F&B Landscape
marketing943205
 
Building the Customer Identity Community, Together.pdf
Building the Customer Identity Community, Together.pdfBuilding the Customer Identity Community, Together.pdf
Building the Customer Identity Community, Together.pdf
Cheryl Hung
 
IT484 Cyber Forensics_Information Technology
IT484 Cyber Forensics_Information TechnologyIT484 Cyber Forensics_Information Technology
IT484 Cyber Forensics_Information Technology
SHEHABALYAMANI
 
Ad

Data encryption techniques and standard

  • 1. Data Encryption Techniques and Standard -- Asst. Prof. Sarika Jadhav Pratibha College of Commerce and Computer Studies, Chinchwad, Pune
  • 3. The Data Encryption Techniques and Standard •The DES (Data Encryption Standard) algorithm is a symmetric-key block cipher •The algorithm takes the plain text in 64-bit blocks and converts them into ciphertext using 48-bit keys. •Since it’s a symmetric-key algorithm, it employs the same key in both encrypting and decrypting the data. •DES is based on the Feistel block cipher, called LUCIFER. • DES uses 16 rounds of the Feistel structure, using a different key for each round. •DES became the approved federal encryption standard in November 1976 .For the longest time, DES was the data encryption standard in information security. •DES’s dominance came to an end in 2002, when the Advanced Encryption Standard (AES) replaced the DES encryption algorithm as the accepted standard. •Triple DES is a symmetric key-block cipher which applies the DES cipher in triplicate. It encrypts with the first key (k1), decrypts using the second key (k2), then encrypts with the third key (k3).
  • 4. Features The DES algorithm is a combination of two fundamental building blocks of encryption: substitution and transposition. The algorithm derives its strength from repeated application of these two techniques, for a total of 16 cycles. The algorithm begins by encrypting the plaintext as blocks of 64 bits. The key is 64 bits long - it can be any 56-bit number. The 8 bits are often used as check digits Features: – Block size = 64 bits – Key size = 56 bits (in reality, 64 bits, but 8 are used as parity-check bits for error control) – Number of rounds = 16 – 16 intermediary keys, each 48 bits
  • 6. The Feistel (F) function The F-function operates on half a block (32 bits) at a time and consists of four stages:
  • 7. Four Stages of DES: 1. Expansion — 32-bit half-block is expanded to 48 bits using the expansion Permutation ( duplicating half of the bits) The output consists of eight 6-bit (8 * 6 = 48 bits) pieces. 2. Key mixing — Result is combined with a subkey using an XOR operation. 16 48- bit subkeys — one for each round — are derived from the main key using the key schedule . 3. Substitution — The block is divided into eight 6-bit pieces before processing by the S-boxes, or substitution boxes. Each of the eight S-boxes replaces its six input bits with four output bits according to a non-linear transformation. The S-boxes provide the core of the security of DES 4. Permutation — 32 outputs from the S-boxes are rearranged according to a fixed permutation, the P-box. This is designed so that, after permutation, each S-box's output bits are spread across 4 different S boxes in the next round. The alternation of substitution from the S-boxes, and permutation of bits from the P-box and E-expansion provides - "confusion and diffusion" respectively.
  • 9. Advanced Encryption Standard ( AES ) Commercial-grade symmetric algorithm AES is based on a design principle known as a substitution-permutation network Combination of both substitution and permutation It is fast in both software and hardware AES does not use a Feistel network. AES has a fixed block size of 128 bits, and a key size of 128, 192, or 256 bits. AES operates on a 4×4 column-major order matrix of bytes Most AES calculations are done in a special finite field. The key size used for an AES cipher specifies the number of repetitions of transformation rounds that convert the plaintext, into the ciphertext. The number of cycles of repetition are as follows: 10 cycles of repetition for 128-bit keys. 12 cycles of repetition for 192-bit keys. 14 cycles of repetition for 256-bit keys.
  • 10. High-level description of the algorithm ● KeyExpansions—round keys are derived from the cipher key using Rijndael's key schedule. AES requires a separate 128-bit round key block for each round plus one more. ● InitialRound ○ AddRoundKey—each byte of the state is combined with a block of the round key using bitwise xor. ● Rounds ○ SubBytes—a non-linear substitution step where each byte is replaced with another according to a lookup table. ○ ShiftRows—a transposition step where the last three rows of the state are shifted cyclically a certain number of steps. ○ MixColumns—a mixing operation which operates on the columns of the state, combining the four bytes in each column. ○ AddRoundKey ● Final Round (no MixColumns) ○ SubBytes ○ ShiftRows ○ AddRoundKey.
  • 11. The SubBytes steps In the ShiftRows step, bytes in each row of the state are shifted cyclically to the left. The number of places each byte is shifted differs for each row. The ShiftRows step In the SubBytes step, each byte in the state is replaced with its entry in a fixed 8-bit lookup table, S; bij =S(aij).
  • 12. The MixColumns step In the MixColumns step, each column of the state is multiplied with a fixed polynomial c(x). The AddRoundKey step In the AddRoundKey step, each byte of the state is combined with a byte of the round subkey using the XORoperation (⊕).
  • 13. Group-Oriented Cryptography ● A class of cryptographic schemes to provide security in scenarios where a group of participants can communicate securely over some computer network in such a way that the exchanged messages would be unintelligible for outsiders and non-pertaining users. 1. Broadcast encryption: To prevent unauthorized users from extracting data, the broadcaster encrypts the message and only the authorized users have the decryption keys to recover the data. 1. Traitor tracing: these traitor-tracing schemes use a secret-key encryption scheme to encrypt data. A public-key traitor tracing allows everyone to perform encryption, and thus anyone can broadcast messages to authorized users securely. 3. Threshold cryptosystems: Threshold cryptosystems allow one to send encrypted messages to a group, while only a group achieving a “threshold" has the ability to reconstruct the plaintext.
  • 14. Steganography and its types ● Steganography is a technique of hiding communication by concealing the secret message into a fake message.
  • 15. Types of Steganography Image Steganography ● The image Steganography is used to hide a secret message inside an image. The most widely used technique to hide secret bit inside the LSB of the cover image. ● The most widely used technique to hide secret bit inside the LSB of the cover image. Audio Steganography ● Audio stenography can conceal the secret message in the audio file with the help of its digital representation.
  • 16. Video Steganography ● Video Steganography brings more possibilities of disguising a large amount of data because it is a combination of image and sound. Text Steganography: ● Text Steganography uses data compression. Data compression encodes information in one representation into another representation. The new representation of data is smaller in size.
  翻译: