Unit-2 - Conventional Encryption Principles An encryption...

Info iconThis preview shows pages 1–17. Sign up to view the full content.

View Full Document Right Arrow Icon
1 Conventional Encryption Conventional Encryption Principles Principles An encryption scheme has five ingredients: Plaintext Encryption  algorithm Secret Key Ciphertext Decryption algorithm Security depends on the secrecy of the key, not the secrecy  of the algorithm
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
2 Conventional Encryption Conventional Encryption Principles Principles
Background image of page 2
3
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
4
Background image of page 4
5
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
6 Cryptography Cryptography Classified along three independent dimensions: The type of operations used for transforming plaintext to  ciphertext The number of keys used symmetric (single key) asymmetric (two-keys, or public-key encryption) The way in which the plaintext is processed
Background image of page 6
7 Average time required for Average time required for exhaustive exhaustive key search key search Key Size (bits) Number of Alternative Keys Time required at 10 6 Decryption/µs 32 2 32 = 4.3 x 10 9 2.15 milliseconds 56 2 56 = 7.2 x 10 16 10 hours 128 2 128 = 3.4 x 10 38 5.4 x 10 18 years 168 2 168 = 3.7 x 10 50 5.9 x 10 30 years
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
8
Background image of page 8
9 Feistel Cipher Structure Feistel Cipher Structure Virtually all conventional block encryption  algorithms, including DES have a structure first  described by Horst Feistel of IBM in 1973 The realization of a Fesitel Network depends on  the choice of the following parameters and design  features (see next slide):
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
10 Feistel Cipher Structure Feistel Cipher Structure Block size:  larger block sizes mean greater security Key Size:  larger key size means greater security Number of rounds:   multiple rounds offer  increasing security Subkey generation algorithm:  greater  complexity will lead to greater difficulty of cryptanalysis. Fast software encryption/decryption:  the  speed of execution of the algorithm becomes a concern
Background image of page 10
11
Background image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
12
Background image of page 12
13 Conventional Encryption Conventional Encryption Algorithms Algorithms Data Encryption Standard (DES) The most widely used encryption scheme The algorithm is reffered to the Data Encryption  Algorithm (DEA) DES is a block cipher The plaintext is processed in 64-bit blocks The key is 56-bits in length
Background image of page 13

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Henric Johnson 14
Background image of page 14
Henric Johnson 15
Background image of page 15

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
16
Background image of page 16
Image of page 17
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 02/23/2012 for the course CS 101 taught by Professor Martand during the Spring '10 term at Punjab Engineering College.

Page1 / 52

Unit-2 - Conventional Encryption Principles An encryption...

This preview shows document pages 1 - 17. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online