The document presents a micro-project proposal and report on symmetric key cryptography, focusing on the use of a single secret key for both encryption and decryption of data. It outlines the aims, intended outcomes, and methodologies for implementing a demonstration of the Data Encryption Standard (DES) algorithm, highlighting its importance in securing sensitive information. The report also discusses the vulnerabilities of DES and the need for secure key generation to maintain data confidentiality and integrity.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
13 views3 pages
New Microsoft Word Document
The document presents a micro-project proposal and report on symmetric key cryptography, focusing on the use of a single secret key for both encryption and decryption of data. It outlines the aims, intended outcomes, and methodologies for implementing a demonstration of the Data Encryption Standard (DES) algorithm, highlighting its importance in securing sensitive information. The report also discusses the vulnerabilities of DES and the need for secure key generation to maintain data confidentiality and integrity.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3
PART A - MICRO-PROJECT PROPOSAL ''Case Study Of Symmetric Key
Cryptography'' 1.0 Brief Introduction Symmetric encryption is a type of
encryption where only one key (a secret key)is used to both encrypt and decrypt electronic data. The entities communicating via symmetric encryption must exchange the key so that it can be used in the decryption process. Both sender and receiver uses a common key to encrypt and decrypt the message. This secret key is known only to the sender and to the receiver. It is also called as secret key cryptography. The success of this approach depends on the strength of the random number generator that is used to create the secret key. Symmetric Key Cryptography is widely used in today's Internet and primarily consists of two types of algorithms, Block and Stream. Some common encryption algorithms include the Advanced Encryption Standard (AES) and the Data Encryption Standard (DES). This form of encryption is traditionally faster than Asymmetric however it requires both the sender and the recipient of the data to have the secret key. Asymmetric cryptography does not rely on sharing a secret key and forms the basis of the FIDO authentication framework. 2.0 Aim of the Micro-project •To secure our sensitive information. • To improve confidentiality, Integrity, Availability. •To encrypt and decrypt the information. 3.0 Intended Course Outcome • Apply cryptographic algorithms and protocol to maintain computer security. •Apply the encrypt and decrypt algorithm to protect our sensitive data. • Apply user identification and authentication methods. •Maintain secured network ication. Classical cryptanalysis involves an interesting combination of analytical reasoning, application of mathematical tools, pattern finding, patience, determination, and luck. Cryptanalysts are also called attackers. Cryptology embraces both cryptography and cryptanalysis. By using symmetric encryption algorithms, data is "scrambled" so that it can't be understood by anyone who does not possess the secret key to decrypt it. Once the intended recipient who possesses the key has the message, the algorithm reverses its action so that the message is returned to its original readable form. The secret key that the sender and recipient both use could be a specific password or code or it can be random string of letters or numbers that have been generated by a secure random number generator (RNG). For banking-grade encryption, the symmetric keys must be created using an RNG that is certified according to industry standards, such as FIPS 140-2. 5.0 Proposed Methodology • Understand the topic to given us. • Discuss about the topic with group members. • Divided the topic throughout each member of group. •Collected information from members and verify from our mentor. 6.0 Resources Required S.No Name of Resources required/material Specifications Qty Remarks 1Computer/laptop Core i5 - 3750 3.20 GHz 8 GB Ram 64- bit operating system 1-------- 2Software Microsoft word, Python IDLE PART B - MICRO-PROJECT REPORT ''CaseStudy Of Symmetric Key Cryptography'' 1.0 Rational : In this project we implement small demo of a DES algorithm to secure sensitive data. Symmetric encryption is a type of encryption where only one key (a secret key) is used to both encrypt and decrypt electronic data. The entities communicating via symmetric encryption must exchange the key so that it can be used in the decryption process. Due to the better performance and faster speed of symmetric encryption, symmetric cryptography is typically used for bulk encryption of large amounts of data. 2.0 Course Outcomes Addressed : •Apply cryptographic algorithms and protocol to maintain computer security. • Apply encrypt and decrypt algorithm to protect our sensitive data. • Apply user identification and authentication methods. • Maintain secured network. 3.0 Literature Review : DES is a block cipher and encrypts data in blocks of size of 64 bits each, whichmeans 64 bits of plain text goes as the input to DES, which produces 64 bits of cipher text. The same algorithm and key are used for encryption and decryption, with minor differences. The key length is 56 bits. During this time when the Internet provides essential communication between tens of millions of people and is being increasingly used as a tool for commerce, security becomes a tremendously important issue to deal with. There are many aspects to security and many applications, ranging from secure commerce and payments to private communications and protecting passwords. DES uses the same key to encrypt and decrypt a message, so both the sender and the receiver must know and use the same private key. DES was once the go-to, symmetric key algorithm for the encryption of electronic data. 4.0 Actual Methodology Followed : • Understand the topic to given us. • Discuss about the topic with group members. •Divided the topic throughout each member of group. •Collected information from members and verify from our mentor 5.0 Actual Resources Used : S. No Name of Resources required/material Specifications Qty Remarks 1Computer/laptop Core i5 -3750 3.20 GHz 8 GB Ram 64- bit operating system 1-------- 2Software Microsoft word, python IDLE --------- 6.0Introduction Data encryption standard (DES) has been found vulnerable against very powerful attacks and therefore, the popularity of DES has been found slightly on the decline.DES is a block cipher and encrypts data in blocks of size of 64 bits each, which means 64 bits of plain text goes as the input to DES, which produces 64 bits of cipher text. The same algorithm and key are used for encryption and decryption, with minor differences. The key length is 56 bits. The basic idea is shown in the figure.