First year project Describe DES Algorithm Describe DES Algorithm Using a flash animation Perrollaz Romain Ladet Jérémy.

Slides:



Advertisements
Similar presentations
WHAT DO WE (THINK WE) KNOW ABOUT THEM?. PROCEDURE: Distribute hand-outs ABOUT people in different countries. Students had to: 1 select key words from.
Advertisements

Origins  clear a replacement for DES was needed Key size is too small Key size is too small The variants are just patches The variants are just patches.
1 Lecture 3: Secret Key Cryptography Outline concepts DES IDEA AES.
Cryptography and Network Security Chapter 3
Week 2 - Friday.  What did we talk about last time?  Substitution ciphers  Vigenère ciphers  One-time pad.
The Advanced Encryption Standard (AES) Simplified.
Data Encryption Standard (DES)
History Applications Attacks Advantages & Disadvantages Conclusion.
Cryptography and Network Security
Simplified DES CS-480b Network Security Dick Steflik.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
AES clear a replacement for DES was needed
DES 1 Data Encryption Standard DES 2 Data Encryption Standard  DES developed in 1970’s  Based on IBM Lucifer cipher  U.S. government standard  DES.
1 Chapter 3 – Block Ciphers and the Data Encryption Standard Modern Block Ciphers  now look at modern block ciphers  one of the most widely used types.
1 Chapter 3 – Block Ciphers and the Data Encryption Standard Modern Block Ciphers  now look at modern block ciphers  one of the most widely used types.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 5 Wenbing Zhao Department of Electrical and Computer Engineering.
Cryptography and Network Security Chapter 5. Chapter 5 –Advanced Encryption Standard "It seems very simple." "It is very simple. But if you don't know.
Cryptography and Network Security Chapter 5 Fourth Edition by William Stallings.
Computer Networking Lecture 21: Security and Cryptography Thanks to various folks from , semester’s past and others.
CS Network Security Lecture 2 Prof. Katz. 9/7/2000Lecture 2 - Data Encryption2 DES – Data Encryption Standard Private key. Encrypts by series of.
ICS 454 Principles of Cryptography Advanced Encryption Standard (AES) (AES) Sultan Almuhammadi.
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
The Digital Encryption Standard CSCI 5857: Encoding and Encryption.
Lecture 3: Cryptographic Tools modified from slides of Lawrie Brown.
Chapter 5 –Advanced Encryption Standard "It seems very simple." "It is very simple. But if you don't know what the key is it's virtually indecipherable."
Understanding Cryptography – A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl Chapter 3 – The Data Encryption.
1 Chapter 3 Ciphers Mechanism that decides the process of encryption/decryption Stream Cipher: Bit-by-bit encryption / decryption Block Cipher: Block-by-block.
Guillaume ZMUDA – Hoel NAUDY PROJECT : PROJECT : ALGORITHM SHA-1.
Comparison AES-Rijndael/Serpent 2G1704: Internet Security and Privacy Weltz Max 2G1704: Internet Security and Privacy Weltz Max.
Classical &ontemporyryptology 1 AESAES Classical &ontemporyryptology 2 Advanced Encryption Standard Since DES was becoming less reliable as new cryptanalysis.
Feistel Model Last Updated: Aug 27, Feistel Cipher Structure Described by Horst Feistel (IBM) in 1973 Many symmetric encryption algorithms use this.
Network Security Lecture 14 Presented by: Dr. Munam Ali Shah.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Feistel Cipher Structure
13. Other Block Ciphers 13.1 LUCIFER 13.2 MADRYGA 13.3 NEWDES 13.4 FEAL 13.5 REDOC 13.6 LOKI.
ISEP / Fakulta Elektrotecknika 1 Project Of Telecommunication Subject: Describe following “ MAC - Message Authentication Code " modes: Describe following.
Data Encryption Standard (DES) © 2000 Gregory Kesden.
DES Algorithm Data Encryption Standard. DES Features Block cipher, 64 bits per block 64-bit key, with only 56 bits effective ECB mode and CBC mode.
Transboundary Trust Space February 16, 2012 Ensuring trust in information exchange – proposal and approaches from Russia and CIS-states (RCC states) National.
Data Encryption Standard CS-471/971. Category of Standard: Computer Security. Explanation: The Data Encryption Standard (DES) specifies a FIPS approved.
Public / Private Keys was a big year… DES: Adopted as an encryption standard by the US government. It was an open standard. The NSA calls it “One.
Cracking the DES Encryption
Computer and Network Security Rabie A. Ramadan Lecture 3.
1 A Basic Introduction to Flash. Outline What is a flash? Macromedia Flash MX 2004 Flash concepts Flash Demos Conclusion Additional help 2.
Chapter 2 Symmetric Encryption.
Plaintextciphertext encryption algorithmdecryption algorithm plaintext.
© Information Security Group, ICU1 Block Cipher- introduction  DES Description: Feistel, S-box Exhaustive Search, DC and LC Modes of Operation  AES Description:
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
Block Cipher- introduction
Data Encryption Standard (DES) most widely used block cipher in world adopted in 1977 by NBS (now NIST) – as FIPS PUB 46 encrypts 64-bit data using 56-bit.
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
DES: Data Encryption Standard
CSE 5/7353 – January 25 th 2006 Cryptography. Conventional Encryption Shared Key Substitution Transposition.
Lecture 5 Page 1 CS 236 Online More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Information and Computer Security CPIS 312 Lab 6 & 7 1 TRIGUI Mohamed Salim Symmetric key cryptography.
1 CPCS425: Information Security (Topic 5) Topic 5  Symmetrical Cryptography  Understand the principles of modern symmetric (conventional) cryptography.
@Yuan Xue Announcement Project Release Team forming Homework 1 will be released next Tuesday.
Hybrid Cryptography using symmetric key Encryption Sean Laurel Rex Bashyam, Karthik Shankar, Sai Theja kadiyala and Abdelshakour Abuzneid Department of.
Data Encryption Standard (DES) Financial companies found the need for a cryptographic algorithm that would have the blessing of the US government (=NSA)
Triple DES.
Data Encryption Standard
Chapter -2 Block Ciphers and the Data Encryption Standard
DATA ENCRYPTION STANDARD (DES)
The Secure Hash Function (SHA)
Advanced Encryption Standard
Feistel Cipher Structure
Data Encryption Standard (DES)
Presentation transcript:

First year project Describe DES Algorithm Describe DES Algorithm Using a flash animation Perrollaz Romain Ladet Jérémy

Plan Introduction Introduction Why have we choose this subject ? Why have we choose this subject ? How did we catch the information ? How did we catch the information ? Presentation of the project Presentation of the project What is the DES ? What is the DES ? What is a flash animation ? What is a flash animation ? Avantages/drawbacks Avantages/drawbacks Conclusion Conclusion

Introduction Why have we chose this topic ? Why have we chose this topic ? First of all, during our first year in ISEP, the studies in telecommunication were our favorites ones. We are interested in knowing different ways and technologies which permit transmitting and presenting information. Secondly, we never used the flash tool before. So, it was for us the best way to discover a new kind of presentation. Finally, the DES crypting technology, even if it is almost disappeared, was a standard in the 80s. Moreover, it permitted the creation of the 3-DES and the AES more powerful, secure and fast.

Introduction How did we catch the information ? How did we catch the information ? By using the internet, either french or english, we found all the information we were looking for. By using the internet, either french or english, we found all the information we were looking for. About the flash animation, we found some help on the internet and moreover some of the french students who came with us were able to help us About the flash animation, we found some help on the internet and moreover some of the french students who came with us were able to help us

Presentation of the project What is the DES ? What is the DES ? General General Designer(s)IBM Designer(s)IBM First published 1975 First published 1975 Derived fromLucifer (cifer) Derived fromLucifer (cifer) Algorithm Algorithm Block size(s) 64 bits Block size(s) 64 bits Key size(s) 56 bits Key size(s) 56 bits StructureFeistel network StructureFeistel network Number of rounds16 Number of rounds16

Historical 70s, the beginning. 70s, the beginning. 1972, US governement need a new way to encrypt information 1972, US governement need a new way to encrypt information 1973, the governement consult NSA. 1973, the governement consult NSA. 1974, IBM propose an algorithm. 1974, IBM propose an algorithm. 1975, the publication in the federal register. 1975, the publication in the federal register. 1976, DES was approved as a federal standard. 1976, DES was approved as a federal standard.

How does the algorithm work ? Text split in 64 bits blocks (8 octets) Text split in 64 bits blocks (8 octets) Initial permutation of blocks Initial permutation of blocks Block hashing in 2 parts: left and right, namely G and D Block hashing in 2 parts: left and right, namely G and D permutation and substitution step repeated 16 times (called rounds) permutation and substitution step repeated 16 times (called rounds) Concatenation of the 2 parts and inverse of the initial permutation. Concatenation of the 2 parts and inverse of the initial permutation.

Presentation of the project What is flash animation ? What is flash animation ? An interactive tool wide spread on the internet An interactive tool wide spread on the internet Flash uses Action Script language Flash uses Action Script language Easy to conceive thanks to layer masks and chronogram Easy to conceive thanks to layer masks and chronogram Real time application Real time application

Advantages/Drawbacks Advantages Advantages Improve our Information Technologies skills by using flash animation program Improve our Information Technologies skills by using flash animation program work in foreign language (English) work in foreign language (English) Work in group which is necessary in engineer’s life Work in group which is necessary in engineer’s life

Advantages/Drawbacks Drawbacks Drawbacks No flash background No flash background No software to create flash animation No software to create flash animation We had to discover Macromedia flashplayer We had to discover Macromedia flashplayer We don’t receive any example We don’t receive any example

Conclusion Good coordination between us, we learnt to work together efficiently. Good coordination between us, we learnt to work together efficiently. First « professionnal » experience in another country. First « professionnal » experience in another country. Learning a crypting technology and a new maneer of presenting information. Learning a crypting technology and a new maneer of presenting information.