IDEA (International Data Encryption Algorithm) is a symmetric-key block cipher developed in 1991 that uses a 128-bit key to encrypt 64-bit blocks of data through a series of mathematical operations. It features strong security and fast encryption, making it suitable for applications like secure communication and data storage, but it is also vulnerable to brute-force attacks due to its key size. The algorithm operates using a Feistel network and involves multiple rounds of processing with sub-keys generated from the main key.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
8 views10 pages
IDEA
IDEA (International Data Encryption Algorithm) is a symmetric-key block cipher developed in 1991 that uses a 128-bit key to encrypt 64-bit blocks of data through a series of mathematical operations. It features strong security and fast encryption, making it suitable for applications like secure communication and data storage, but it is also vulnerable to brute-force attacks due to its key size. The algorithm operates using a Feistel network and involves multiple rounds of processing with sub-keys generated from the main key.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10
IDEA
Encryption algorithms such as IDEA (International
Data Encryption Algorithm) provide a secure method of protecting data.
IDEA was initially developed as a proprietary
cipher by Swiss cryptographers Xuejia Lai and James L. Massey in 1991.
It was then standardized by the International
Organization for Standardization (ISO) in 1992.
What is IDEA Encryption?
IDEA encryption is a symmetric-key block cipher
that operates on 64-bit blocks of data.
It uses a 128-bit key and a series of complex
mathematical operations to scramble plaintext into ciphertext.
IDEA encryption uses a Feistel network, which
divides the plaintext into two halves and then applies a series of rounds to each half, using a combination of XOR, modulo, and multiplication operations.
This process creates a unique key for each block of
data.
How Does IDEA Encryption Work?
IDEA encryption works by taking 64-bit blocks of data and dividing them into two halves, each containing 32 bits.
These two halves are then passed through a series
of rounds, where they undergo a combination of XOR, modulo, and multiplication operations.
This process creates a unique key for each block of
data.
The key used in IDEA encryption is a 128-bit key
that is created by the user.
The key is then divided into eight 16-bit subkeys.
These subkeys are then used in the encryption process to produce the ciphertext.
Each round of the IDEA encryption process
involves the use of six of these subkeys. The 64-bit input plain text block-divided into 4 part
(16 bits each) Declare p1 to p4.
Therefore, p1 to p4 will be the inputs for the initial
round of the algorithm.
There are 8 such rounds.
The key is made up of 128 bits.
In each round, 6 sub-keys will be produced.
Each one of the sub-keys includes 16 bits.
All these sub-keys will be put on the 4 input
blocks p1 to p4.
The last actions include Output Transformation,
which usually benefits simply 4 sub-Keys.
The last result is 4 blocks of ciphertext C1 to C4
(each of 16 bits).
They are mixed to create the last 64-bit
ciphertext block. The 14 steps for a complete round are the following:
Single Round Information
There are 8 rounds in IDEA.
Every single requires several operations around the four
data blocks applying 6 keys.
These steps work in numerous mathematical activities.
There are multiple *, add * & XOR procedures.
Multiply * means multiplication modulo.
Add* requires addition modulo.
Sub-key generation for a round −
In the first round bit position 1-96 of the key are utilized. Bits 97-128 remain unutilized. They are given to round 2. In round second bits 97-128 are first used, thus circular left shift of 25 bit appears and new bits from 26-89 are used. Bits position 90-128 and 1-25 remains unused. In round third unused bit 90-128 and 1-25 are first used again, circular leftshift of 25 bit appears and bit position 51-82 are used. Bit position 83-128 and 1-50 remains unused. In the fourth round bit 83-128 and 1-50 are used. In the fifth round circular left-shift of 25 bit appears and bit position 76- 128 and 1-43 are used. Bit position 44-75 remains unused. In the sixth round unused bit of fifth round is used and left circular shift of 25 bit occur thus making bit position 37-100 unused. In the seventh round unused bit of sixth round i.e., 37-100 are first used and circular left shift of 25 bit appear bit position 126-128 and 1- 29 are used. Bit 30-125 remain unused. Unused bit position 30-125 from round seven is used and key is disabled.
Output Transformation It can be a one-time procedure.
It requires places by the end of the 8th round.
The Output transformation input is a 64-bit value divided
into 4 sub-blocks (state R1 to R4 every among 16 bits).
The four 16 bits Sub-keys (K1 to K4) are used here.
The process of the outcome transformation can be as
follows. Strengths of IDEA Encryption:
IDEA encryption offers a number of strengths, which
include:
Strong Security: IDEA encryption uses a 128-bit
key, making it extremely difficult to crack. It is also resistant to differential and linear attacks.
Fast Encryption: IDEA encryption is a fast
encryption algorithm, making it ideal for use in real-time applications.
Simple Design: IDEA encryption uses a simple
design, making it easy to implement and use.
Weaknesses of IDEA Encryption:
IDEA encryption also has a few weaknesses, which include:
Vulnerable to Brute-Force Attacks: Although IDEA
encryption is considered secure, it is still vulnerable to brute-force attacks.
Limited Key Size: IDEA encryption uses a 128-bit
key, which is smaller than some other encryption algorithms.
Applications of IDEA Encryption:
IDEA encryption has a wide range of applications,
including:
Secure Communication: IDEA encryption can be
used to secure communication between two parties, such as in email or instant messaging applications.
Data Storage: IDEA encryption can be used to
encrypt sensitive data stored on a hard drive or other storage devices.
Digital Signatures: IDEA encryption can be used to
create digital signatures, which can be used to verify the authenticity of digital documents.