0% found this document useful (0 votes)
8 views10 pages

IDEA

IDEA (International Data Encryption Algorithm) is a symmetric-key block cipher developed in 1991 that uses a 128-bit key to encrypt 64-bit blocks of data through a series of mathematical operations. It features strong security and fast encryption, making it suitable for applications like secure communication and data storage, but it is also vulnerable to brute-force attacks due to its key size. The algorithm operates using a Feistel network and involves multiple rounds of processing with sub-keys generated from the main key.

Uploaded by

FBI
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views10 pages

IDEA

IDEA (International Data Encryption Algorithm) is a symmetric-key block cipher developed in 1991 that uses a 128-bit key to encrypt 64-bit blocks of data through a series of mathematical operations. It features strong security and fast encryption, making it suitable for applications like secure communication and data storage, but it is also vulnerable to brute-force attacks due to its key size. The algorithm operates using a Feistel network and involves multiple rounds of processing with sub-keys generated from the main key.

Uploaded by

FBI
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

IDEA

 Encryption algorithms such as IDEA (International


Data Encryption Algorithm) provide a secure
method of protecting data.

 IDEA was initially developed as a proprietary


cipher by Swiss cryptographers Xuejia Lai and
James L. Massey in 1991.

 It was then standardized by the International


Organization for Standardization (ISO) in 1992.

What is IDEA Encryption?

 IDEA encryption is a symmetric-key block cipher


that operates on 64-bit blocks of data.

 It uses a 128-bit key and a series of complex


mathematical operations to scramble plaintext into
ciphertext.

 IDEA encryption uses a Feistel network, which


divides the plaintext into two halves and then
applies a series of rounds to each half, using a
combination of XOR, modulo, and multiplication
operations.

 This process creates a unique key for each block of


data.

How Does IDEA Encryption Work?


 IDEA encryption works by taking 64-bit blocks of
data and dividing them into two halves, each
containing 32 bits.

 These two halves are then passed through a series


of rounds, where they undergo a combination of
XOR, modulo, and multiplication operations.

 This process creates a unique key for each block of


data.

 The key used in IDEA encryption is a 128-bit key


that is created by the user.

 The key is then divided into eight 16-bit subkeys.


These subkeys are then used in the encryption
process to produce the ciphertext.

 Each round of the IDEA encryption process


involves the use of six of these subkeys.
The 64-bit input plain text block-divided into 4 part

(16 bits each) Declare p1 to p4.

Therefore, p1 to p4 will be the inputs for the initial

round of the algorithm.

 There are 8 such rounds.

 The key is made up of 128 bits.

 In each round, 6 sub-keys will be produced.

 Each one of the sub-keys includes 16 bits.

 All these sub-keys will be put on the 4 input

blocks p1 to p4.

 The last actions include Output Transformation,

which usually benefits simply 4 sub-Keys.

 The last result is 4 blocks of ciphertext C1 to C4

(each of 16 bits).

 They are mixed to create the last 64-bit

ciphertext block.
The 14 steps for a complete round are the following:

Single Round Information

 There are 8 rounds in IDEA.

 Every single requires several operations around the four

data blocks applying 6 keys.

 These steps work in numerous mathematical activities.


 There are multiple *, add * & XOR procedures.

 Multiply * means multiplication modulo.

 Add* requires addition modulo.

Sub-key generation for a round −


 In the first round bit position 1-96 of the key are utilized. Bits 97-128
remain unutilized. They are given to round 2.
 In round second bits 97-128 are first used, thus circular left shift of 25
bit appears and new bits from 26-89 are used. Bits position 90-128 and
1-25 remains unused.
 In round third unused bit 90-128 and 1-25 are first used again, circular
leftshift of 25 bit appears and bit position 51-82 are used. Bit position
83-128 and 1-50 remains unused.
 In the fourth round bit 83-128 and 1-50 are used.
 In the fifth round circular left-shift of 25 bit appears and bit position 76-
128 and 1-43 are used. Bit position 44-75 remains unused.
 In the sixth round unused bit of fifth round is used and left circular shift
of 25 bit occur thus making bit position 37-100 unused.
 In the seventh round unused bit of sixth round i.e., 37-100 are first
used and circular left shift of 25 bit appear bit position 126-128 and 1-
29 are used. Bit 30-125 remain unused.
 Unused bit position 30-125 from round seven is used and key is
disabled.

Output Transformation
 It can be a one-time procedure.

 It requires places by the end of the 8th round.

 The Output transformation input is a 64-bit value divided

into 4 sub-blocks (state R1 to R4 every among 16 bits).

 The four 16 bits Sub-keys (K1 to K4) are used here.

 The process of the outcome transformation can be as

follows.
Strengths of IDEA Encryption:

IDEA encryption offers a number of strengths, which


include:

 Strong Security: IDEA encryption uses a 128-bit


key, making it extremely difficult to crack. It is also
resistant to differential and linear attacks.

 Fast Encryption: IDEA encryption is a fast


encryption algorithm, making it ideal for use in
real-time applications.

 Simple Design: IDEA encryption uses a simple


design, making it easy to implement and use.

Weaknesses of IDEA Encryption:


IDEA encryption also has a few weaknesses, which include:

 Vulnerable to Brute-Force Attacks: Although IDEA


encryption is considered secure, it is still
vulnerable to brute-force attacks.

 Limited Key Size: IDEA encryption uses a 128-bit


key, which is smaller than some other encryption
algorithms.

Applications of IDEA Encryption:

IDEA encryption has a wide range of applications,


including:

 Secure Communication: IDEA encryption can be


used to secure communication between two
parties, such as in email or instant messaging
applications.

 Data Storage: IDEA encryption can be used to


encrypt sensitive data stored on a hard drive or
other storage devices.

 Digital Signatures: IDEA encryption can be used to


create digital signatures, which can be used to
verify the authenticity of digital documents.

You might also like