SUBJECT: INFORMATION SECURITY
CLASS: VIII SEMESTER
SYLLABUS:
UNIT II
Classical Encryption Techniques
Block ciphers:
Simplified DES algorithm
Block cipher principles
Strength of DES
Block cipher design principles
Block cipher modes of operation
Characteris

Q on Networking Topics
Q.1 Each IP packet must contain _
a. Only Destination
b.Only Sourse
c.Source & destination
d.Sourse or Destination
RCOEM, Nagpur. BE VII Sem elective II Internetworking & TCP/IP
session 14-15
Lecture By Asst.Prof.Devishree Naidu,CSE

CPE 542: CRYPTOGRAPHY & NETWORK SECURITY
Chapter 7 Confidentiality Using Symmetric Encryption
Dr. Loai Tawalbeh
Computer Engineering Department
Jordan University of Science and Technology
Jordan
Dr. Loai Tawalbeh
Fall 2005
Confidentiality using Symmetric

The DES Algorithm Illustrated
by J. Orlin Grabbe
The DES (Data Encryption Standard) algorithm is the most widely used encryption algorithm
in the world. For many years, and among many people, "secret code making" and DES have
been synonymous. And despite

and treatment centers.
The increasing volume, value and confidentiality of these records regularly transmitted and stored by
commercial and government agencies has led to heightened recognition and concern over their
exposures to unauthorized access and u

Step 1: Create 16 subkeys, each of which is 48-bits long.
The 64-bit key is permuted according to the following table, PC-1. Since the first entry in the table is
"57", this means that the 57th bit of the original key K becomes the first bit of the permut

Cryptography and
Network Security
Chapter 10
Fifth Edition
by William Stallings
Lecture slides by Lawrie Brown
(with edits by RHB)
Outline
will consider:
Diffie-Hellman key exchange
ElGamal cryptography
Elliptic Curve cryptography
Pseudorandom Number

This means, for example, C3 and D3 are obtained from C2 and D2, respectively, by two left shifts, and C16
and D16 are obtained from C15 and D15, respectively, by one left shift. In all cases, by a single left shift is
meant a rotation of the bits one plac