SlideShare una empresa de Scribd logo
1 de 21
Cryptography and its Application in
Security
Guided by
Dr. T.J.Siddiqui
Akriti Gupta
Roll No.:- 04
M.Sc. 4th Sem
INTRODUCTION
CRYPTOGRAPHY IS THE SCIENCE OF PROTECTING DATA,
WHICH PROVIDES MEANS AND METHODS OF
CONVERTING DATA INTO UNREADABLE FORM, SO THAT
VALID USER CAN ACCESS INFORMATION AT THE
DESTINATION.
OBJECTIVE
Our main goal in this project is to study and implement existing
algorithms of cryptography. We will analyze the various
algorithms and then draw conclusion which algorithm is best for
data security. Implementation of algorithms of cryptography for
securing information includes any type of data-text, image.
SERVICES OF INFORMATION
SECURITY −
• Confidential
• Authentication
• Integrity
• Non-repudiation
Types of Cryptography
 Symmetric key cryptography
Single common key to encrypt and decrypt
Faster an Simpler
e.g. RSA Algorithm
 Asymmetric key cryptography
A pair of keys to use to encrypt and decrypt
Private and Public key are different.
METHDOLOGY
 RSA (Rivest-Shamir-Adleman )
 AES (Advanced Encryption
Standard)
 Blowfish
In 1977, Rivest, Shamir, and Adelman proposed a scheme using a
public key for encrypting messages and a corresponding private key
for decryption -this scheme is commonly referred to as RSA.
RSA operation
RSA algorithm is asymmetric cryptography algorithm. Asymmetric
actually means that it works on two different keys i.e. Public Key
and Private Key. As the name describes that the Public Key is
given to everyone and Private key is kept private.
RSA
Step 1: Choose two large prime numbers p and q. The product
n=p X q is referred to as the modulus and ∅(n).
Step 2: Choose an encryption key, e, such that gcd(e,∅(n))= 1.
The pair of integers,(e,n) is referred to as the Public key.
Step 3: Compute the decryption key, d= 𝑒−1
mod ∅(n). d is also
referred to as the private key.
Key generation
Encryption Let m be the message (or plaintext). We use 𝑚 to
denote the length of m. In the naive implementation of RSA, a
message is split into multiple blocks, each size b, except possibly
for last block. 𝑚 mod b, if different from 0,will be the size of the
last block . For each block 𝑚𝑖,calculate the corresponding
ciphertext 𝑐𝑖 as
𝑐𝑖=𝑚𝑖
𝑒
mod n (1)
Encryption
Decryption
Given block of ciphertext 𝑐𝑖, the corresponding plaintext is
𝑚𝑖=𝑐𝑖
𝑑
mod n (2)
A block of plaintext, 𝑚𝑖 is encrypted as 𝑐𝑖 using (1)
AES(advanced encryption standard)
Rijndael algorithm supports various blocks sizes-128,192, 256 bits.
Likewise, different key sizes may be used -128, 192 , or 256 bits.
AES employs 10 rounds for 128-bit keys, and 12 rounds for 192 and
14 rounds for 256 bit keys.
It is convenient to visualize a block (and its transformation during and
after each round) as a 4 X 4 array of bytes. We refer to this as the
state array and denote it as Ƭ.
Encryption
In the case of 128-bit AES, each round(except for last) employs the
following four steps :
1)Byte substitution
2)Row shift
3)Column mixing
4)Round key addition
The last round skips the “Column mixing” step. Also, there is a solitary
“Round key addition” step just before the first round.
Decryption
Decryption can proceed in the reverse order -from the 10th round
upwards with each step being substituted by its inverse operation.
We denote their inverses as
1) InverseByte substitution
2) InverseRow shift
3) InverseColumn mixing
4) InverseRound key addition
Blowfish
In 1993 an alternative to DES Encryption Technique Blowfish
is an encryption technique designed by Bruce Schneier .
Block Size: 64-bits
Key Size: 32-bits to 448-bits variable size
Number of subkeys: 18 [P-array]
Number of rounds: 16
Number of subsitution boxes: 4 [each having 512 entries of
32-bits each]
Thanks

Más contenido relacionado

Similar a Cryptography and its Application in Security

Advanced Encryption Standard (AES) with Dynamic Substitution Box
Advanced Encryption Standard (AES) with Dynamic Substitution BoxAdvanced Encryption Standard (AES) with Dynamic Substitution Box
Advanced Encryption Standard (AES) with Dynamic Substitution BoxHardik Manocha
 
Renas Rajab Asaad
Renas Rajab Asaad Renas Rajab Asaad
Renas Rajab Asaad Renas Rekany
 
Analysis of Cryptographic Algorithms
Analysis of Cryptographic AlgorithmsAnalysis of Cryptographic Algorithms
Analysis of Cryptographic Algorithmsijsrd.com
 
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...IJEACS
 
Survey of Hybrid Encryption Algorithm for Mobile Communication
Survey of Hybrid Encryption Algorithm for Mobile CommunicationSurvey of Hybrid Encryption Algorithm for Mobile Communication
Survey of Hybrid Encryption Algorithm for Mobile Communicationijsrd.com
 
Cryptography
CryptographyCryptography
CryptographyRohan04
 
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...ijistjournal
 
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...IJCNCJournal
 
B03302007012
B03302007012B03302007012
B03302007012theijes
 
IRJET- Comparative Analysis of Encryption Techniques
IRJET-  	  Comparative Analysis of Encryption TechniquesIRJET-  	  Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption TechniquesIRJET Journal
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographySeema Goel
 
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...ams1ams11
 
A Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions AlgorithmsA Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions Algorithmsijsrd.com
 
Seminar on Encryption and Authenticity
Seminar on Encryption and AuthenticitySeminar on Encryption and Authenticity
Seminar on Encryption and AuthenticityHardik Manocha
 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxjibonjibon5
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securityNagendra Um
 

Similar a Cryptography and its Application in Security (20)

Advanced Encryption Standard (AES) with Dynamic Substitution Box
Advanced Encryption Standard (AES) with Dynamic Substitution BoxAdvanced Encryption Standard (AES) with Dynamic Substitution Box
Advanced Encryption Standard (AES) with Dynamic Substitution Box
 
Renas Rajab Asaad
Renas Rajab Asaad Renas Rajab Asaad
Renas Rajab Asaad
 
Analysis of Cryptographic Algorithms
Analysis of Cryptographic AlgorithmsAnalysis of Cryptographic Algorithms
Analysis of Cryptographic Algorithms
 
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
 
Ijetcas14 355
Ijetcas14 355Ijetcas14 355
Ijetcas14 355
 
Survey of Hybrid Encryption Algorithm for Mobile Communication
Survey of Hybrid Encryption Algorithm for Mobile CommunicationSurvey of Hybrid Encryption Algorithm for Mobile Communication
Survey of Hybrid Encryption Algorithm for Mobile Communication
 
Cryptography
CryptographyCryptography
Cryptography
 
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
 
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
 
B03302007012
B03302007012B03302007012
B03302007012
 
IRJET- Comparative Analysis of Encryption Techniques
IRJET-  	  Comparative Analysis of Encryption TechniquesIRJET-  	  Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption Techniques
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Ch34508510
Ch34508510Ch34508510
Ch34508510
 
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
 
A Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions AlgorithmsA Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions Algorithms
 
H42054550
H42054550H42054550
H42054550
 
Moein
MoeinMoein
Moein
 
Seminar on Encryption and Authenticity
Seminar on Encryption and AuthenticitySeminar on Encryption and Authenticity
Seminar on Encryption and Authenticity
 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 

Último

AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
 
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSUNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSrknatarajan
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01KreezheaRecto
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdfSuman Jyoti
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Christo Ananth
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 

Último (20)

(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSUNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 

Cryptography and its Application in Security

  • 1. Cryptography and its Application in Security Guided by Dr. T.J.Siddiqui Akriti Gupta Roll No.:- 04 M.Sc. 4th Sem
  • 2. INTRODUCTION CRYPTOGRAPHY IS THE SCIENCE OF PROTECTING DATA, WHICH PROVIDES MEANS AND METHODS OF CONVERTING DATA INTO UNREADABLE FORM, SO THAT VALID USER CAN ACCESS INFORMATION AT THE DESTINATION.
  • 3.
  • 4. OBJECTIVE Our main goal in this project is to study and implement existing algorithms of cryptography. We will analyze the various algorithms and then draw conclusion which algorithm is best for data security. Implementation of algorithms of cryptography for securing information includes any type of data-text, image.
  • 5. SERVICES OF INFORMATION SECURITY − • Confidential • Authentication • Integrity • Non-repudiation
  • 6. Types of Cryptography  Symmetric key cryptography Single common key to encrypt and decrypt Faster an Simpler e.g. RSA Algorithm  Asymmetric key cryptography A pair of keys to use to encrypt and decrypt Private and Public key are different.
  • 7. METHDOLOGY  RSA (Rivest-Shamir-Adleman )  AES (Advanced Encryption Standard)  Blowfish
  • 8. In 1977, Rivest, Shamir, and Adelman proposed a scheme using a public key for encrypting messages and a corresponding private key for decryption -this scheme is commonly referred to as RSA. RSA operation RSA algorithm is asymmetric cryptography algorithm. Asymmetric actually means that it works on two different keys i.e. Public Key and Private Key. As the name describes that the Public Key is given to everyone and Private key is kept private. RSA
  • 9. Step 1: Choose two large prime numbers p and q. The product n=p X q is referred to as the modulus and ∅(n). Step 2: Choose an encryption key, e, such that gcd(e,∅(n))= 1. The pair of integers,(e,n) is referred to as the Public key. Step 3: Compute the decryption key, d= 𝑒−1 mod ∅(n). d is also referred to as the private key. Key generation
  • 10. Encryption Let m be the message (or plaintext). We use 𝑚 to denote the length of m. In the naive implementation of RSA, a message is split into multiple blocks, each size b, except possibly for last block. 𝑚 mod b, if different from 0,will be the size of the last block . For each block 𝑚𝑖,calculate the corresponding ciphertext 𝑐𝑖 as 𝑐𝑖=𝑚𝑖 𝑒 mod n (1) Encryption
  • 11. Decryption Given block of ciphertext 𝑐𝑖, the corresponding plaintext is 𝑚𝑖=𝑐𝑖 𝑑 mod n (2) A block of plaintext, 𝑚𝑖 is encrypted as 𝑐𝑖 using (1)
  • 12. AES(advanced encryption standard) Rijndael algorithm supports various blocks sizes-128,192, 256 bits. Likewise, different key sizes may be used -128, 192 , or 256 bits. AES employs 10 rounds for 128-bit keys, and 12 rounds for 192 and 14 rounds for 256 bit keys. It is convenient to visualize a block (and its transformation during and after each round) as a 4 X 4 array of bytes. We refer to this as the state array and denote it as Ƭ.
  • 13. Encryption In the case of 128-bit AES, each round(except for last) employs the following four steps : 1)Byte substitution 2)Row shift 3)Column mixing 4)Round key addition The last round skips the “Column mixing” step. Also, there is a solitary “Round key addition” step just before the first round.
  • 14. Decryption Decryption can proceed in the reverse order -from the 10th round upwards with each step being substituted by its inverse operation. We denote their inverses as 1) InverseByte substitution 2) InverseRow shift 3) InverseColumn mixing 4) InverseRound key addition
  • 15.
  • 16. Blowfish In 1993 an alternative to DES Encryption Technique Blowfish is an encryption technique designed by Bruce Schneier . Block Size: 64-bits Key Size: 32-bits to 448-bits variable size Number of subkeys: 18 [P-array] Number of rounds: 16 Number of subsitution boxes: 4 [each having 512 entries of 32-bits each]
  • 17.
  • 18.
  • 19.
  • 20.