![Page 1: COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMPLEMETATION](https://reader036.vdocument.in/reader036/viewer/2022062900/58ea559c1a28abb8208b50d9/html5/thumbnails/1.jpg)
PRESENTED BY: 1.BISWAJIT DATTA (09123002030) 2.AVIRUP SAMANTA (09123002071) 3.ANAND MOHAN MASKARA (09123002057)
COMPARATIVE STUDY OF SYMMETRIC KEY CRYPTOGRAPHY AND NEW TECHNIQUE IMPLEMENTATION
![Page 2: COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMPLEMETATION](https://reader036.vdocument.in/reader036/viewer/2022062900/58ea559c1a28abb8208b50d9/html5/thumbnails/2.jpg)
INTRODUCTION
What is Cryptography?
Goal of Cryptography
![Page 3: COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMPLEMETATION](https://reader036.vdocument.in/reader036/viewer/2022062900/58ea559c1a28abb8208b50d9/html5/thumbnails/3.jpg)
HISTORY
The first use of cryptography in 1900 B.C.
![Page 4: COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMPLEMETATION](https://reader036.vdocument.in/reader036/viewer/2022062900/58ea559c1a28abb8208b50d9/html5/thumbnails/4.jpg)
PURPOSE OF CRYPTOGRAPHY
ConfidentialityAuthentication Integrity Non Repudiation Access Control
![Page 5: COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMPLEMETATION](https://reader036.vdocument.in/reader036/viewer/2022062900/58ea559c1a28abb8208b50d9/html5/thumbnails/5.jpg)
ENCRYPTION
DECRYPTION
PLAIN TEXT
PLAIN
TEXT
SENDER
CIPHERTEX
T RECEIVER
BASIC BLOCK DIAGRAM
![Page 6: COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMPLEMETATION](https://reader036.vdocument.in/reader036/viewer/2022062900/58ea559c1a28abb8208b50d9/html5/thumbnails/6.jpg)
BASIC TERMINOLOGIES
Encryption
Decryption
Cryptosystem
![Page 7: COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMPLEMETATION](https://reader036.vdocument.in/reader036/viewer/2022062900/58ea559c1a28abb8208b50d9/html5/thumbnails/7.jpg)
TECHNIQUES OF CRYPTOGRAPHY
Substitution Technique
Transposition Technique
![Page 8: COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMPLEMETATION](https://reader036.vdocument.in/reader036/viewer/2022062900/58ea559c1a28abb8208b50d9/html5/thumbnails/8.jpg)
ENCRYPTION ALGORITHM
Symmetric
Asymmetric
![Page 9: COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMPLEMETATION](https://reader036.vdocument.in/reader036/viewer/2022062900/58ea559c1a28abb8208b50d9/html5/thumbnails/9.jpg)
SYMMETRIC ALGORITHM
Encryption
Decryption
KeyPlaintext
Cipher text
OriginalPlaintext
Symmetric Cryptosystem
Data Encryption Standard (DES)Advance Encryption Standard (AES)
![Page 10: COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMPLEMETATION](https://reader036.vdocument.in/reader036/viewer/2022062900/58ea559c1a28abb8208b50d9/html5/thumbnails/10.jpg)
ASYMMETRIC ALGORITHM
Rivest Shamir Adleman (RSA) Encryption
Knapsack Algorithmplaintext
encryption
public keycipher text
decryption
private keycipher text plaintext
![Page 11: COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMPLEMETATION](https://reader036.vdocument.in/reader036/viewer/2022062900/58ea559c1a28abb8208b50d9/html5/thumbnails/11.jpg)
SIMPLE ENCRYPTION SCHEME(CAESAR’S CIPHER)
Substitution cipher:Plain text: a b c d e f g h I j k l m n o p q r s t u v w x y z
Cipher text: m n b v c x z a s d f g h j k l p o I u y t r e w q
Example: Plain text: HELLO WORLD Cipher text: KHOOR ZRUOG
![Page 12: COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMPLEMETATION](https://reader036.vdocument.in/reader036/viewer/2022062900/58ea559c1a28abb8208b50d9/html5/thumbnails/12.jpg)
SIMPLE ENCRYPTION SCHEME(RAIL FENCE TECHNIQUE)
H L O W R D
E L O L
The Rail Fence Technique is an example of Transposition Technique.
For example:
HELLO WORLDPlain text:
Cipher text: HLOWRDEL OL
![Page 13: COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMPLEMETATION](https://reader036.vdocument.in/reader036/viewer/2022062900/58ea559c1a28abb8208b50d9/html5/thumbnails/13.jpg)
SIMPLE ENCRYPTION SCHEME(VERNAM CIPHER TECHNIQUE)
Vernam cipher uses a one time pad.
Example:
Plain text: HELLO WORLD
Cipher text: YW}}~F~C}U
Padding:
SHARM QZNKP
![Page 14: COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMPLEMETATION](https://reader036.vdocument.in/reader036/viewer/2022062900/58ea559c1a28abb8208b50d9/html5/thumbnails/14.jpg)
DES (DATA ENCRYPTION STANDARD)
Example:Plain text: HELLO WORLD
Cipher text: m0dh19VD0DXSrvJOhMOaEg==
DES was designed by IBM in the 1970s and adopted by the National Bureau of Standards (NBS)
![Page 15: COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMPLEMETATION](https://reader036.vdocument.in/reader036/viewer/2022062900/58ea559c1a28abb8208b50d9/html5/thumbnails/15.jpg)
AES (ADVANCED ENCRYPTION STANDARD)
Example:Plain text: HELLO WORLD
Cipher text: TpXlULf/l9GQX30osRMxTQ==
128 Bit blocks128 bit keys
![Page 16: COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMPLEMETATION](https://reader036.vdocument.in/reader036/viewer/2022062900/58ea559c1a28abb8208b50d9/html5/thumbnails/16.jpg)
MODIFIED ENCRYPTION TECHNIQUE
Modified encryption technique involves splitting up a text into two parts, and then applying different symmetric key cryptographic technique on them.
PLAIN TEXT : HELLO WORLD
PART 1 PART 2
HELLO WORLD
For example:
![Page 17: COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMPLEMETATION](https://reader036.vdocument.in/reader036/viewer/2022062900/58ea559c1a28abb8208b50d9/html5/thumbnails/17.jpg)
MODIFIED ENCRYPTION TECHNIQUE
APPLYING DIFFERENT TECHNIQUES ON TWO PARTSPART 1 : HELLO
ENCRYPTED WITH CAESAR CIPHER: iffmp
PART 2: WORLD
ENCRYPTED WITH RAIL FENCE: olwrd
ENCRYPTED TEXT: iffmp olwrd
![Page 18: COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMPLEMETATION](https://reader036.vdocument.in/reader036/viewer/2022062900/58ea559c1a28abb8208b50d9/html5/thumbnails/18.jpg)
MODIFIED ENCRYPTION TECHNIQUE
Example: Hello World
![Page 19: COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMPLEMETATION](https://reader036.vdocument.in/reader036/viewer/2022062900/58ea559c1a28abb8208b50d9/html5/thumbnails/19.jpg)
Example: Hello World
MODIFIED ENCRYPTION TECHNIQUE
![Page 20: COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMPLEMETATION](https://reader036.vdocument.in/reader036/viewer/2022062900/58ea559c1a28abb8208b50d9/html5/thumbnails/20.jpg)
MODIFIED ENCRYPTION TECHNIQUE
Example: Hello World
![Page 21: COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMPLEMETATION](https://reader036.vdocument.in/reader036/viewer/2022062900/58ea559c1a28abb8208b50d9/html5/thumbnails/21.jpg)
Example: Hello World
MODIFIED ENCRYPTION TECHNIQUE
![Page 22: COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMPLEMETATION](https://reader036.vdocument.in/reader036/viewer/2022062900/58ea559c1a28abb8208b50d9/html5/thumbnails/22.jpg)
MODIFIED ENCRYPTION TECHNIQUE
![Page 23: COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMPLEMETATION](https://reader036.vdocument.in/reader036/viewer/2022062900/58ea559c1a28abb8208b50d9/html5/thumbnails/23.jpg)
MODIFIED ENCRYPTION TECHNIQUE
Advantage
Disadvantage
![Page 24: COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMPLEMETATION](https://reader036.vdocument.in/reader036/viewer/2022062900/58ea559c1a28abb8208b50d9/html5/thumbnails/24.jpg)
FUTURE SCOPE
In future this technique can be modified by implementing more encryption techniques of cryptography to make the data more secure.
The key can be conjugated as a single key.
![Page 25: COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMPLEMETATION](https://reader036.vdocument.in/reader036/viewer/2022062900/58ea559c1a28abb8208b50d9/html5/thumbnails/25.jpg)
CONCLUSION
Once the method has withstood all attacks for sufficient length of time it may be used with a reasonable amount of confidence.
![Page 26: COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMPLEMETATION](https://reader036.vdocument.in/reader036/viewer/2022062900/58ea559c1a28abb8208b50d9/html5/thumbnails/26.jpg)
THANK YOU