SlideShare a Scribd company logo
CRYPTOGRAPHY & NETWOK
SECURITY- Symmetric key
Ciphers
Dr R Jegadeesan Prof-CSE
Jyothishmathi Institute of Technology and Science,
karimnagar
Symmetric & Asymmetric key Ciphers
Syllabus
UNIT – II: Symmetric key Ciphers: Block Cipher principles, DES, AES, Blowfish, RC5,
IDEA, Block cipher operation, Stream ciphers, RC4. Asymmetric key Ciphers: Principles of
public key cryptosystems, RSA algorithm, Elgamal Cryptography, Diffie-Hellman Key
Exchange, Knapsack Algorithm.
Objective of DES
2
Symmetric & Asymmetric key Ciphers
Aim & Objective :
❏ To review a short history of DES
❏ To define the basic structure of DES
❏ To describe the details of building elements of DES
❏ To describe the round keys generation process
❏ To analyze DES
UNIT – II: Symmetric key Ciphers: Block Cipher principles, DES, AES, Blowfish, RC5,
IDEA, Block cipher operation, Stream ciphers, RC4. Asymmetric key Ciphers: Principles of
public key cryptosystems, RSA algorithm, Elgamal Cryptography, Diffie-Hellman Key
Exchange, Knapsack Algorithm.
Objective of DES
3
Symmetric & Asymmetric key Ciphers
The Data Encryption Standard (DES) is a symmetric-key block
cipher published by the National Institute of Standards and
Technology (NIST).
In 1973, NIST published a request for proposals for a national
symmetric-key cryptosystem. A proposal from IBM, a modification of
a project called Lucifer, was accepted as DES. DES was published in
the Federal Register in March 1975 as a draft of the Federal
Information Processing Standard (FIPS).
Introduction & History
4
Symmetric & Asymmetric key Ciphers
DES is a block cipher, as shown in Figure 6.1.
Figure 6.1 Encryption and decryption with DES
Overview
5
Symmetric & Asymmetric key Ciphers
Figure 6.2 General structure of DES
General structure of DES
6
Symmetric & Asymmetric key Ciphers
Figure 6.3 Initial and final permutation steps in DES
Initial and Final Permutations
7
Symmetric & Asymmetric key Ciphers
DES uses 16 rounds. Each round of DES is a Feistel cipher.
Round Function
8
Figure 6.4
A round in DES
(encryption site)
Symmetric & Asymmetric key Ciphers
The heart of DES is the DES function. The DES function applies a 48-bit key to the rightmost 32 bits to
produce a 32-bit output.
DES Function
9
Figure 6.5
DES function
Symmetric & Asymmetric key Ciphers
Expansion P-box
Since RI−1 is a 32-bit input and KI is a 48-bit key, we first need to expand RI−1 to 48 bits.
Expansion P-box
10
Figure 6.6 Expansion permutation
Symmetric & Asymmetric key Ciphers
Although the relationship between the input and output can be defined mathematically, DES uses Table
6.2 to define this P-box.
Expansion P-box Table
11
Table 6.6 Expansion P-box table
Symmetric & Asymmetric key Ciphers
S-Boxes
The S-boxes do the real mixing (confusion). DES uses 8 S-boxes, each with a 6-bit input and a 4-bit
output. See Figure 6.7.
S-boxes
12
Figure 6.7 S-boxes
Symmetric & Asymmetric key Ciphers
S-Box rule
The S-boxes do the real mixing (confusion). DES uses 8 S-boxes, each with a 6-bit input and a 4-bit
output. See Figure 6.7.
S-box rules
13
Figure 6.8 S-box rule
Symmetric & Asymmetric key Ciphers
S-Box
Table 6.3 shows the permutation for S-box 1. For the rest of the boxes see the textbook.
S-box Table
14
UNIT-II : Symmetric & Asymmetric key Ciphers
Table 6.11 Straight permutation table
Straight Permutation
15
UNIT-II : Symmetric & Asymmetric key Ciphers
Figure 6.9 DES cipher and reverse cipher for the first approach
DES cipher and reverse cipher approach
16
Symmetric & Asymmetric key Ciphers
Figure 6.10
Key generation
Key generations
17
Symmetric & Asymmetric key Ciphers
Text & Reference Books
18
Book Details :
TEXT BOOKS:
1. Cryptography and Network Security – Principles and Practice: William Stallings, Pearson
Education, 6th Edition
2. Cryptography and Network Security: Atul Kahate, Mc Graw Hill, 3rd Edition
REFERENCE BOOKS:
1. Cryptography and Network Security: C K Shyamala, N Harini, Dr T R Padmanabhan, Wiley
India, 1st Edition.
2. Cryptography and Network Security : Forouzan Mukhopadhyay, Mc Graw Hill, 3rd Edition
3. Information Security, Principles, and Practice: Mark Stamp, Wiley India.
4. Principles of Computer Security: WM. Arthur Conklin, Greg White, TMH
5. Introduction to Network Security: Neal Krawetz, CENGAGE Learning
6. Network Security and Cryptography: Bernard Menezes, CENGAGE Learning
Symmetric & Asymmetric key Ciphers
Video reference
19
Video Link details (NPTEL, YOUTUBE Lectures and etc.)
•https://nptel.ac.in/courses/106105031/
•https://nptel.ac.in/courses/106105162/
•http://www.nptelvideos.in/2012/11/cryptography-and-network-
security.html
Symmetric & Asymmetric key Ciphers
Security courses
20
courses available on <www.coursera.org>, and http://neat.aicte-india.org
https://www.coursera.org/
Course 1 : Introduction to Cyber Security
Cyber Security. An introduction to modern information and system protection technology and
methods.
Course 2: Cyber security Specialization
-Cyber security Fundamentals. Construction of Secure Systems
Symmetric & Asymmetric key Ciphers
Security Tutorials
21
Tutorial topic wise
➢Cryptography Tutorial – Tutorialspoint www.tutorialspoint.com › cryptography
➢Cryptography Introduction – GeeksforGeeks www.geeksforgeeks.org › cryptography-
introduction
➢www.cse.iitm.ac.in › ~chester › courses › slides › 01_ Introduction
Symmetric & Asymmetric key Ciphers
Network Security MCQs
22
CNS – MCQs
1.Cryptography, a word with Greek origins, means
a. Corrupting Data b. Secret Writing
c. Open Writing d. Closed Writing
2.A transposition cipher reorders (permutes) symbols in a
a. block of packets b. block of slots
c. block of signals d. block of symbols
3.The cipher feedback (CFB) mode was created for those situations in which we need to send
or receive r bits of
a. Frames b. Pixels c. Data d. Encryption
4.In Cryptography, when text is treated at the bit level, each character is replaced by
a. 4 Bits b. 6 Bits c. 8 Bits d. 10 B its
a. 5.The Advanced Encryption Standard (AES) was designed
a. National Institute of Standards and Technology b. IBM
c. HP d. Intel
Symmetric & Asymmetric key Ciphers
Security Tutorial
23
CNS –Tutorial Problems:
The input to S-box 1 is 100011. What is the output?
If we write the first and the sixth bits together, we get 11 in binary, which is 3 in decimal. The
remaining bits are 0001 in binary, which is 1 in decimal. We look for the value in row 3, column 1,
in Table 6.3 (S-box 1). The result is 12 in decimal, which in binary is 1100. So the input 100011
yields the output 1100.
The input to S-box 8 is 000000. What is the output?
If we write the first and the sixth bits together, we get 00 in binary, which is 0 in decimal. The
remaining bits are 0000 in binary, which is 0 in decimal. We look for the value in row 0, column 0,
in Table 6.10 (S-box 8). The result is 13 in decimal, which is 1101 in binary. So the input 000000
yields the output 1101.
Symmetric & Asymmetric key Ciphers
CNS Questions
24
Universities & Important Questions:
1. State Euler’s Theorem,
2. Define Diffusion and Confusion.
3. Brief the strengths of Triple DES.
4. Describe meet-in-the-middle-attack
5. What are the essential steps to be taken to encrypt a data using public key cryptography.
6. What is factoring problem?
7. What is called avalanche effect?
8. Describe the use of S-Box in DES algorithm
9. What is an elliptic curve?
10. What is the role of the public key authority in key distribution system?
11. Explain possible attacks on RSA algorithm
12. State the requirements for message authentication?
13. What is message authentication?
25
Thank you

More Related Content

PPT
12 symmetric key cryptography
drewz lin
 
PPT
13 asymmetric key cryptography
drewz lin
 
PDF
symmetric key encryption algorithms
Rashmi Burugupalli
 
PPT
Design and Simulation Triple-DES
chatsiri
 
PPTX
Cryptographic Algorithms: DES and RSA
aritraranjan
 
PPTX
Double DES & Triple DES
Hemant Sharma
 
PPTX
Different types of Symmetric key Cryptography
subhradeep mitra
 
PPTX
Symmetric encryption
DR RICHMOND ADEBIAYE
 
12 symmetric key cryptography
drewz lin
 
13 asymmetric key cryptography
drewz lin
 
symmetric key encryption algorithms
Rashmi Burugupalli
 
Design and Simulation Triple-DES
chatsiri
 
Cryptographic Algorithms: DES and RSA
aritraranjan
 
Double DES & Triple DES
Hemant Sharma
 
Different types of Symmetric key Cryptography
subhradeep mitra
 
Symmetric encryption
DR RICHMOND ADEBIAYE
 

What's hot (20)

PPTX
Trible data encryption standard (3DES)
Ahmed Mohamed Mahmoud
 
PPTX
ASIC Implementation of Triple Data Encryption Algorithm (3DES)
Kevin Xiao Xiao
 
PPTX
Cryptography
Deepak Kumar
 
PPTX
Cryptography
Smruti Ranjan Sahoo
 
PPT
Chapter 3: Block Ciphers and the Data Encryption Standard
Shafaan Khaliq Bhatti
 
PPTX
Data Encryption Standard (DES)
Haris Ahmed
 
PPT
Ch03 block-cipher-and-data-encryption-standard
tarekiceiuk
 
PDF
Cryptography Attacks and Applications
UTD Computer Security Group
 
PPT
(Crypto) DES And RSA Algorithms Overview
EL Bachir Nouni
 
PPT
block ciphers
Asad Ali
 
PPT
Minor Project- AES Implementation in Verilog
Hardik Manocha
 
PPTX
Overview on Cryptography and Network Security
Dr. Rupa Ch
 
PDF
cns 2marks
ilakiyadinesh
 
PDF
Computer network (3)
NYversity
 
PPTX
Cryptography - 101
n|u - The Open Security Community
 
PDF
Chapter 3-block-cipher-des1
Shiraz316
 
PPTX
Tiny encryption algorithm
Farah M. Altufaili
 
PPTX
Unit 2
KRAMANJANEYULU1
 
PDF
Advanced Encryption Standard (AES)
Hardik Manocha
 
PDF
CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
 
Trible data encryption standard (3DES)
Ahmed Mohamed Mahmoud
 
ASIC Implementation of Triple Data Encryption Algorithm (3DES)
Kevin Xiao Xiao
 
Cryptography
Deepak Kumar
 
Cryptography
Smruti Ranjan Sahoo
 
Chapter 3: Block Ciphers and the Data Encryption Standard
Shafaan Khaliq Bhatti
 
Data Encryption Standard (DES)
Haris Ahmed
 
Ch03 block-cipher-and-data-encryption-standard
tarekiceiuk
 
Cryptography Attacks and Applications
UTD Computer Security Group
 
(Crypto) DES And RSA Algorithms Overview
EL Bachir Nouni
 
block ciphers
Asad Ali
 
Minor Project- AES Implementation in Verilog
Hardik Manocha
 
Overview on Cryptography and Network Security
Dr. Rupa Ch
 
cns 2marks
ilakiyadinesh
 
Computer network (3)
NYversity
 
Chapter 3-block-cipher-des1
Shiraz316
 
Tiny encryption algorithm
Farah M. Altufaili
 
Advanced Encryption Standard (AES)
Hardik Manocha
 
CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
 
Ad

Similar to CRYPTOGRAPHY & NETWOK SECURITY- Symmetric key Ciphers (20)

PPTX
b0e51366-166f-469b-9ea1-14a24e624a3e.pptx
Tejaswini Vontela
 
PDF
ENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTION
IJNSA Journal
 
PDF
Nearest Prime Cipher for Data Confidentiality and Integrity
Eswar Publications
 
PDF
Renas Rajab Asaad
Renas Rekany
 
PDF
Blockchain Technology - Week 9 - Blockciphers
Ferdin Joe John Joseph PhD
 
PDF
Nt1330 Unit 4 Dthm Paper
Jennifer Reither
 
PDF
Using Cipher Key to Generate Dynamic S-Box in AES Cipher System
CSCJournals
 
PPTX
IEDA 3302 e-commerce_secure-communications.pptx
ssuser6d0da2
 
PDF
A novel efficient multiple encryption algorithm for real time images
IJECEIAES
 
PPT
A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON DNA CRYPTOGRAPHY
Abhishek Majumdar
 
PPT
Data encryption standard
Vasuki Ramasamy
 
PPTX
Idea(international data encryption algorithm)
SAurabh PRajapati
 
PDF
Aes 128 192_256_bits_project_report
sakhi rehman
 
PPTX
Data Encryption Standard (DES) and Alternatives.pptx
MohammedAljubairi
 
PDF
paper4.pdf
aminasouyah
 
PDF
doc4.pdf
aminasouyah
 
PDF
sheet4.pdf
aminasouyah
 
PDF
doc4.pdf
aminasouyah
 
PDF
lecture3.pdf
aminasouyah
 
b0e51366-166f-469b-9ea1-14a24e624a3e.pptx
Tejaswini Vontela
 
ENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTION
IJNSA Journal
 
Nearest Prime Cipher for Data Confidentiality and Integrity
Eswar Publications
 
Renas Rajab Asaad
Renas Rekany
 
Blockchain Technology - Week 9 - Blockciphers
Ferdin Joe John Joseph PhD
 
Nt1330 Unit 4 Dthm Paper
Jennifer Reither
 
Using Cipher Key to Generate Dynamic S-Box in AES Cipher System
CSCJournals
 
IEDA 3302 e-commerce_secure-communications.pptx
ssuser6d0da2
 
A novel efficient multiple encryption algorithm for real time images
IJECEIAES
 
A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON DNA CRYPTOGRAPHY
Abhishek Majumdar
 
Data encryption standard
Vasuki Ramasamy
 
Idea(international data encryption algorithm)
SAurabh PRajapati
 
Aes 128 192_256_bits_project_report
sakhi rehman
 
Data Encryption Standard (DES) and Alternatives.pptx
MohammedAljubairi
 
paper4.pdf
aminasouyah
 
doc4.pdf
aminasouyah
 
sheet4.pdf
aminasouyah
 
doc4.pdf
aminasouyah
 
lecture3.pdf
aminasouyah
 
Ad

More from Jyothishmathi Institute of Technology and Science Karimnagar (20)

PDF
JAVA PROGRAMMING- GUI Programming with Swing - The Swing Buttons
Jyothishmathi Institute of Technology and Science Karimnagar
 
PDF
JAVA PROGRAMMING - The Collections Framework
Jyothishmathi Institute of Technology and Science Karimnagar
 
PDF
JAVA PROGRAMMING- Exception handling - Multithreading
Jyothishmathi Institute of Technology and Science Karimnagar
 
PDF
JAVA PROGRAMMING – Packages - Stream based I/O
Jyothishmathi Institute of Technology and Science Karimnagar
 
PDF
Java programming -Object-Oriented Thinking- Inheritance
Jyothishmathi Institute of Technology and Science Karimnagar
 
PDF
Compiler Design- Machine Independent Optimizations
Jyothishmathi Institute of Technology and Science Karimnagar
 
PDF
COMPILER DESIGN Run-Time Environments
Jyothishmathi Institute of Technology and Science Karimnagar
 
PDF
COMPILER DESIGN- Syntax Directed Translation
Jyothishmathi Institute of Technology and Science Karimnagar
 
PDF
COMPILER DESIGN- Introduction & Lexical Analysis:
Jyothishmathi Institute of Technology and Science Karimnagar
 
PPTX
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
Jyothishmathi Institute of Technology and Science Karimnagar
 
PDF
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
Jyothishmathi Institute of Technology and Science Karimnagar
 
PDF
CRYPTOGRAPHY & NETWORK SECURITY- Cryptographic Hash Functions
Jyothishmathi Institute of Technology and Science Karimnagar
 
PDF
Computer Forensics Working with Windows and DOS Systems
Jyothishmathi Institute of Technology and Science Karimnagar
 
JAVA PROGRAMMING- GUI Programming with Swing - The Swing Buttons
Jyothishmathi Institute of Technology and Science Karimnagar
 
JAVA PROGRAMMING - The Collections Framework
Jyothishmathi Institute of Technology and Science Karimnagar
 
JAVA PROGRAMMING- Exception handling - Multithreading
Jyothishmathi Institute of Technology and Science Karimnagar
 
JAVA PROGRAMMING – Packages - Stream based I/O
Jyothishmathi Institute of Technology and Science Karimnagar
 
Java programming -Object-Oriented Thinking- Inheritance
Jyothishmathi Institute of Technology and Science Karimnagar
 
Compiler Design- Machine Independent Optimizations
Jyothishmathi Institute of Technology and Science Karimnagar
 
COMPILER DESIGN- Syntax Directed Translation
Jyothishmathi Institute of Technology and Science Karimnagar
 
COMPILER DESIGN- Introduction & Lexical Analysis:
Jyothishmathi Institute of Technology and Science Karimnagar
 
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
Jyothishmathi Institute of Technology and Science Karimnagar
 
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
Jyothishmathi Institute of Technology and Science Karimnagar
 
CRYPTOGRAPHY & NETWORK SECURITY- Cryptographic Hash Functions
Jyothishmathi Institute of Technology and Science Karimnagar
 
Computer Forensics Working with Windows and DOS Systems
Jyothishmathi Institute of Technology and Science Karimnagar
 

Recently uploaded (20)

PDF
agentic-ai-and-the-future-of-autonomous-systems.pdf
siddharthnetsavvies
 
PDF
Google’s NotebookLM Unveils Video Overviews
SOFTTECHHUB
 
PPTX
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
PDF
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
AbdullahSani29
 
PDF
REPORT: Heating appliances market in Poland 2024
SPIUG
 
PDF
Doc9.....................................
SofiaCollazos
 
PDF
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
PDF
CIFDAQ's Token Spotlight: SKY - A Forgotten Giant's Comeback?
CIFDAQ
 
PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
PDF
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
PDF
CIFDAQ's Teaching Thursday: Moving Averages Made Simple
CIFDAQ
 
PDF
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
PDF
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
PDF
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
PDF
CIFDAQ'S Market Insight: BTC to ETH money in motion
CIFDAQ
 
PDF
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
PDF
Make GenAI investments go further with the Dell AI Factory - Infographic
Principled Technologies
 
PDF
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
PDF
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
agentic-ai-and-the-future-of-autonomous-systems.pdf
siddharthnetsavvies
 
Google’s NotebookLM Unveils Video Overviews
SOFTTECHHUB
 
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
AbdullahSani29
 
REPORT: Heating appliances market in Poland 2024
SPIUG
 
Doc9.....................................
SofiaCollazos
 
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
CIFDAQ's Token Spotlight: SKY - A Forgotten Giant's Comeback?
CIFDAQ
 
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
CIFDAQ's Teaching Thursday: Moving Averages Made Simple
CIFDAQ
 
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
CIFDAQ'S Market Insight: BTC to ETH money in motion
CIFDAQ
 
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
Make GenAI investments go further with the Dell AI Factory - Infographic
Principled Technologies
 
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 

CRYPTOGRAPHY & NETWOK SECURITY- Symmetric key Ciphers

  • 1. CRYPTOGRAPHY & NETWOK SECURITY- Symmetric key Ciphers Dr R Jegadeesan Prof-CSE Jyothishmathi Institute of Technology and Science, karimnagar
  • 2. Symmetric & Asymmetric key Ciphers Syllabus UNIT – II: Symmetric key Ciphers: Block Cipher principles, DES, AES, Blowfish, RC5, IDEA, Block cipher operation, Stream ciphers, RC4. Asymmetric key Ciphers: Principles of public key cryptosystems, RSA algorithm, Elgamal Cryptography, Diffie-Hellman Key Exchange, Knapsack Algorithm. Objective of DES 2
  • 3. Symmetric & Asymmetric key Ciphers Aim & Objective : ❏ To review a short history of DES ❏ To define the basic structure of DES ❏ To describe the details of building elements of DES ❏ To describe the round keys generation process ❏ To analyze DES UNIT – II: Symmetric key Ciphers: Block Cipher principles, DES, AES, Blowfish, RC5, IDEA, Block cipher operation, Stream ciphers, RC4. Asymmetric key Ciphers: Principles of public key cryptosystems, RSA algorithm, Elgamal Cryptography, Diffie-Hellman Key Exchange, Knapsack Algorithm. Objective of DES 3
  • 4. Symmetric & Asymmetric key Ciphers The Data Encryption Standard (DES) is a symmetric-key block cipher published by the National Institute of Standards and Technology (NIST). In 1973, NIST published a request for proposals for a national symmetric-key cryptosystem. A proposal from IBM, a modification of a project called Lucifer, was accepted as DES. DES was published in the Federal Register in March 1975 as a draft of the Federal Information Processing Standard (FIPS). Introduction & History 4
  • 5. Symmetric & Asymmetric key Ciphers DES is a block cipher, as shown in Figure 6.1. Figure 6.1 Encryption and decryption with DES Overview 5
  • 6. Symmetric & Asymmetric key Ciphers Figure 6.2 General structure of DES General structure of DES 6
  • 7. Symmetric & Asymmetric key Ciphers Figure 6.3 Initial and final permutation steps in DES Initial and Final Permutations 7
  • 8. Symmetric & Asymmetric key Ciphers DES uses 16 rounds. Each round of DES is a Feistel cipher. Round Function 8 Figure 6.4 A round in DES (encryption site)
  • 9. Symmetric & Asymmetric key Ciphers The heart of DES is the DES function. The DES function applies a 48-bit key to the rightmost 32 bits to produce a 32-bit output. DES Function 9 Figure 6.5 DES function
  • 10. Symmetric & Asymmetric key Ciphers Expansion P-box Since RI−1 is a 32-bit input and KI is a 48-bit key, we first need to expand RI−1 to 48 bits. Expansion P-box 10 Figure 6.6 Expansion permutation
  • 11. Symmetric & Asymmetric key Ciphers Although the relationship between the input and output can be defined mathematically, DES uses Table 6.2 to define this P-box. Expansion P-box Table 11 Table 6.6 Expansion P-box table
  • 12. Symmetric & Asymmetric key Ciphers S-Boxes The S-boxes do the real mixing (confusion). DES uses 8 S-boxes, each with a 6-bit input and a 4-bit output. See Figure 6.7. S-boxes 12 Figure 6.7 S-boxes
  • 13. Symmetric & Asymmetric key Ciphers S-Box rule The S-boxes do the real mixing (confusion). DES uses 8 S-boxes, each with a 6-bit input and a 4-bit output. See Figure 6.7. S-box rules 13 Figure 6.8 S-box rule
  • 14. Symmetric & Asymmetric key Ciphers S-Box Table 6.3 shows the permutation for S-box 1. For the rest of the boxes see the textbook. S-box Table 14
  • 15. UNIT-II : Symmetric & Asymmetric key Ciphers Table 6.11 Straight permutation table Straight Permutation 15
  • 16. UNIT-II : Symmetric & Asymmetric key Ciphers Figure 6.9 DES cipher and reverse cipher for the first approach DES cipher and reverse cipher approach 16
  • 17. Symmetric & Asymmetric key Ciphers Figure 6.10 Key generation Key generations 17
  • 18. Symmetric & Asymmetric key Ciphers Text & Reference Books 18 Book Details : TEXT BOOKS: 1. Cryptography and Network Security – Principles and Practice: William Stallings, Pearson Education, 6th Edition 2. Cryptography and Network Security: Atul Kahate, Mc Graw Hill, 3rd Edition REFERENCE BOOKS: 1. Cryptography and Network Security: C K Shyamala, N Harini, Dr T R Padmanabhan, Wiley India, 1st Edition. 2. Cryptography and Network Security : Forouzan Mukhopadhyay, Mc Graw Hill, 3rd Edition 3. Information Security, Principles, and Practice: Mark Stamp, Wiley India. 4. Principles of Computer Security: WM. Arthur Conklin, Greg White, TMH 5. Introduction to Network Security: Neal Krawetz, CENGAGE Learning 6. Network Security and Cryptography: Bernard Menezes, CENGAGE Learning
  • 19. Symmetric & Asymmetric key Ciphers Video reference 19 Video Link details (NPTEL, YOUTUBE Lectures and etc.) •https://nptel.ac.in/courses/106105031/ •https://nptel.ac.in/courses/106105162/ •http://www.nptelvideos.in/2012/11/cryptography-and-network- security.html
  • 20. Symmetric & Asymmetric key Ciphers Security courses 20 courses available on <www.coursera.org>, and http://neat.aicte-india.org https://www.coursera.org/ Course 1 : Introduction to Cyber Security Cyber Security. An introduction to modern information and system protection technology and methods. Course 2: Cyber security Specialization -Cyber security Fundamentals. Construction of Secure Systems
  • 21. Symmetric & Asymmetric key Ciphers Security Tutorials 21 Tutorial topic wise ➢Cryptography Tutorial – Tutorialspoint www.tutorialspoint.com › cryptography ➢Cryptography Introduction – GeeksforGeeks www.geeksforgeeks.org › cryptography- introduction ➢www.cse.iitm.ac.in › ~chester › courses › slides › 01_ Introduction
  • 22. Symmetric & Asymmetric key Ciphers Network Security MCQs 22 CNS – MCQs 1.Cryptography, a word with Greek origins, means a. Corrupting Data b. Secret Writing c. Open Writing d. Closed Writing 2.A transposition cipher reorders (permutes) symbols in a a. block of packets b. block of slots c. block of signals d. block of symbols 3.The cipher feedback (CFB) mode was created for those situations in which we need to send or receive r bits of a. Frames b. Pixels c. Data d. Encryption 4.In Cryptography, when text is treated at the bit level, each character is replaced by a. 4 Bits b. 6 Bits c. 8 Bits d. 10 B its a. 5.The Advanced Encryption Standard (AES) was designed a. National Institute of Standards and Technology b. IBM c. HP d. Intel
  • 23. Symmetric & Asymmetric key Ciphers Security Tutorial 23 CNS –Tutorial Problems: The input to S-box 1 is 100011. What is the output? If we write the first and the sixth bits together, we get 11 in binary, which is 3 in decimal. The remaining bits are 0001 in binary, which is 1 in decimal. We look for the value in row 3, column 1, in Table 6.3 (S-box 1). The result is 12 in decimal, which in binary is 1100. So the input 100011 yields the output 1100. The input to S-box 8 is 000000. What is the output? If we write the first and the sixth bits together, we get 00 in binary, which is 0 in decimal. The remaining bits are 0000 in binary, which is 0 in decimal. We look for the value in row 0, column 0, in Table 6.10 (S-box 8). The result is 13 in decimal, which is 1101 in binary. So the input 000000 yields the output 1101.
  • 24. Symmetric & Asymmetric key Ciphers CNS Questions 24 Universities & Important Questions: 1. State Euler’s Theorem, 2. Define Diffusion and Confusion. 3. Brief the strengths of Triple DES. 4. Describe meet-in-the-middle-attack 5. What are the essential steps to be taken to encrypt a data using public key cryptography. 6. What is factoring problem? 7. What is called avalanche effect? 8. Describe the use of S-Box in DES algorithm 9. What is an elliptic curve? 10. What is the role of the public key authority in key distribution system? 11. Explain possible attacks on RSA algorithm 12. State the requirements for message authentication? 13. What is message authentication?