Hybrid Cryptography using symmetric key Encryption Sean Laurel Rex Bashyam, Karthik Shankar, Sai Theja kadiyala and Abdelshakour Abuzneid Department of.

Slides:



Advertisements
Similar presentations
6.1.2 Overview DES is a block cipher, as shown in Figure 6.1.
Advertisements

DES The Data Encryption Standard (DES) is a classic symmetric block cipher algorithm. DES was developed in the 1970’s as a US government standard The block.
“Advanced Encryption Standard” & “Modes of Operation”
Chap. 5: Advanced Encryption Standard (AES) Jen-Chang Liu, 2005 Adapted from lecture slides by Lawrie Brown.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
1 Lecture 3: Secret Key Cryptography Outline concepts DES IDEA AES.
1 CIS 5371 Cryptography 5b. Pseudorandom Objects in Practice Block Ciphers.
Cryptography and Network Security Chapter 5 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Rachana Y. Patil 1 Data Encryption Standard (DES) (DES)
Data Encryption Standard (DES)
Cryptography and Network Security
Advanced Encryption Standard(AES) Presented by: Venkata Marella Slide #9-1.
Akelarre 1 Akelarre Akelarre 2 Akelarre  Block cipher  Combines features of 2 strong ciphers o IDEA — “mixed mode” arithmetic o RC5 — keyed rotations.
AES clear a replacement for DES was needed
Advanced Encryption Standard. This Lecture Why AES? NIST Criteria for potential candidates The AES Cipher AES Functions and Inverse Functions AES Key.
Cryptography and Network Security (AES) Dr. Monther Aldwairi New York Institute of Technology- Amman Campus 10/18/2009 INCS 741: Cryptography 10/18/20091Dr.
Cryptography and Network Security Chapter 5. Chapter 5 –Advanced Encryption Standard "It seems very simple." "It is very simple. But if you don't know.
Cryptography and Network Security Chapter 5 Fourth Edition by William Stallings.
Lecture 13 Message Signing
Lecture 23 Symmetric Encryption
CS470, A.SelcukAfter the DES1 Block Ciphers After the DES CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Dr. Lo’ai Tawalbeh 2007 Chapter 5: Advanced Encryption Standard (AES) Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Decryption Algorithms Characterization Project ECE 526 spring 2007 Ravimohan Boggula,Rajesh reddy Bandala Southern Illinois University Carbondale.
Encryption Schemes Second Pass Brice Toth 21 November 2001.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Data Encryption Standard (DES). Symmetric Cryptography  C = E(P,K)  P = D(C,K)  Requirements  Given C, the only way to obtain P should be with  the.
The Digital Encryption Standard CSCI 5857: Encoding and Encryption.
A Cryptography Education Tool Anna Yu Department of Computer Science College of Engineering North Carolina A&T State University June 18, 2009.
Dr. Khalid A. Kaabneh Amman Arab University
Chapter 5 Advanced Encryption Standard. Origins clear a replacement for DES was needed –have theoretical attacks that can break it –have demonstrated.
Cryptography and Network Security
Chapter 5 –Advanced Encryption Standard "It seems very simple." "It is very simple. But if you don't know what the key is it's virtually indecipherable."
1 Chapter 3 Ciphers Mechanism that decides the process of encryption/decryption Stream Cipher: Bit-by-bit encryption / decryption Block Cipher: Block-by-block.
9/17/15UB Fall 2015 CSE565: S. Upadhyaya Lec 6.1 CSE565: Computer Security Lecture 6 Advanced Encryption Standard Shambhu Upadhyaya Computer Science &
Network Security Lecture 14 Presented by: Dr. Munam Ali Shah.
Chapter 20 Symmetric Encryption and Message Confidentiality.
TE/CS 536 Network Security Spring 2006 – Lectures 6&7 Secret Key Cryptography.
Chapter 20 Symmetric Encryption and Message Confidentiality.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Feistel Cipher Structure
AES Advanced Encryption Standard. Requirements for AES AES had to be a private key algorithm. It had to use a shared secret key. It had to support the.
 Cryptography is the science of using mathematics to encrypt and decrypt data.  Cryptography enables you to store sensitive.
Advanced Encryption Standard. Origins NIST issued a new version of DES in 1999 (FIPS PUB 46-3) DES should only be used in legacy systems 3DES will be.
Lecture 23 Symmetric Encryption
Fifth Edition by William Stallings
Chapter 2 (C) –Advanced Encryption Standard. Origins clearly a replacement for DES was needed –have theoretical attacks that can break it –have demonstrated.
Advanced Encryption Standard Dr. Shengli Liu Tel: (O) Cryptography and Information Security Lab. Dept. of Computer.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
5.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 5 Introduction to Modern Symmetric-key Ciphers.
Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 7 September 9, 2004.
Network Security Lecture 3 Secret Key Cryptography
Module :MA3036NI Symmetric Encryption -3 Lecture Week 4.
Block Ciphers and the Data Encryption Standard. Modern Block Ciphers  One of the most widely used types of cryptographic algorithms  Used in symmetric.
CSE 5/7353 – January 25 th 2006 Cryptography. Conventional Encryption Shared Key Substitution Transposition.
Information and Computer Security CPIS 312 Lab 6 & 7 1 TRIGUI Mohamed Salim Symmetric key cryptography.
Lecture 4 Data Encryption Standard (DES) Dr. Nermin Hamza
Provides Confidentiality
INTRODUCTION Enhanced Simplified Symmetric Key Encryption Algorithm by Mahendra kumar shrivas.
Triple DES.
School of Computer Science and Engineering Pusan National University
Networks and Communication Systems Department
Security Implementation Using Present-Puffin Protocol
Computer Security IT423 Semester II
Cryptography and Network Security Chapter 5 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
SOHAIL SHAHUL HAMEED Dr. BHARGAVI GOSWAMI
Advanced Encryption Standard
Presentation transcript:

Hybrid Cryptography using symmetric key Encryption Sean Laurel Rex Bashyam, Karthik Shankar, Sai Theja kadiyala and Abdelshakour Abuzneid Department of Electrical Engineering and Computer Engineering, University of Bridgeport, CT. AbstractBackground References Introduction Conclusion and Acknowledgement An Efficient algorithm should provide maximum security with operation in less time the hybrid combination of above mentioned algorithms are more secured and it also provides completion in less time as when combined. We can also implement some other algorithms to improve the security of the system by improving the key length and also by using efficient combination of algorithms in future. Acknowledgement: We would like to thank IEEE, IJCS, Microsoft visual studio and our Professor. Abdel-shakour Abuzneid for his guidance and support that made this project possible Here we discuss about DES, AES and Blowfish algorithms in detail DES: In 1970, NIST and FIPS standards introduced an encryption algorithm for transfer of data in secured way. They fixed some methods to code the input text basically in DES we use 64 bit block size for word and 56 bit key.Generally here, the 64bit word and 56 bit key is mixed to form a 64 bit cipher word, and then the same is repeated for decryption. AES: In 1997 NIST along with FIPS standard formed a new symmetric key algorithm. AES [8] has 64 bit block size. In AES we have 128, 192 and 256 bit key size with 10, 12 and 14 rounds respectively. In AES the data and key is mixed to form a strong key. Blowfish: Blowfish is one of the fastest and flexible symmetric key encryption method, which was introduced in 1993 by NIST standard, which has 64 bit block size and has variable key lengths of 32 to 448 bits which easily adapts in hybrid cryptography. fig.3.AES flow diagram crucial methods are introduced to deploy the majority networks to acquire the required data. Because of the defect of only the single data encryption and the use of famous encryption algorithm, which was not improved in traditional methods of the registration process, a combined encryption algorithm is proposed in this thesis[1- 4]. This proposed algorithm provides new step to avoid shortcomings. We use some famous algorithms to encrypt a data as follows. At first, we create new algorithm in order to provide security issue and time constraint of operation then we combine AES using multiplexing of keys, Improvement in DES key size and blowfish algorithm, then we encrypt data using the proposed algorithm. This can enhance the security and complicates the Encryption. In this paper we provide both the encryption and decryption that supports in real time application and algorithm has a practical value. Index Terms— Hybrid encryption, Advance Encryption Standard (AES), Data Encryption Standard (DES), Blowfish, Key length Encryption is a method of converting plain text to cipher text. Generally lot of secured information’s are transferred using internet services these can be easily retrieved by eavesdroppers in the community system. Encryption is mainly employed in banking, accounting, state and national bureau, military and geographical locations. Generally we have so many encryption algorithms which encrypt data, each encryption algorithm has its own style of formatting plain text to cipher text. The main problem nowadays faced by the network engineers is security, time taken to complete, probability of encrypting the data. The basic idea of increasing key size will improve the security. But the method of implementing in single algorithm will have the same security issue. To avoid this we propose hybrid algorithm (fig.1), which will use three or four encryption methods to generate a new key with more security fig.1. overview of hybrid cryptography We commonly have two types of encryption algorithms (a) symmetric key encryption, (b) Asymmetric key encryption algorithm. Where symmetric key uses a shared key and other algorithm uses private key and public key. Here we analyze three algorithms they are: Data encryption standard (DES), Advanced Encryption Standard (AES), Blowfish Algorithm. Fig.2.Key Expansion in Blowfish An efficient algorithm should provide maximum security with operation in less time the hybrid combination Proposal work 1.Sowmya nag k., h.b.bhuvaneswari, nuthan a.c, “Implementation of advanced encryption Standard-192 bit using multiple keys” ieee transcation,vol 5,pg34-39, Najib A. Kofahil,“Performance evaluation of three Encryption/ decryption algoriithms” ISSN IEEE, Penchalaiah, N. and Seshadri, R. “Effective Comparison and Evaluation of DES and Rijndael Algorithm (AES)”, International Journal of Computer Science and Engineering, Vol. 02, No. 05, 2010, Seung-jo han “The improved data encryption standard (des) algorithm”Ieee transaction ISSN ,volume,issue,December Algorithm and mathematical approach As name suggest hybrid cryptography. Here we combine two or three encryption algorithms to form an strong new encryption algorithm. Here, we considered two main constraints (a) Key length (b) Time to complete operation without error. Firstly, when the length of key increases a common key length to fit all three operations. In this proposal, we used 256 bit as the new key length, which has 128, 96, 32 like AES, DES and blowfish respectively. Here the key is having 3 parts where first 128 bits are allotted for AES algorithm and here we use multiplexing of keys to provide extra safety to keys. AES using multiple keys, where AES uses the 64 bit block of data(fig 4). fig.4. AES using multiple keys Similarly 128 bits are split into two parts. They are taken as k1 and k2 where usually k1 and k2 is directly multiplexed to form 64 bit output which is EXOR’ed with input data, then 64 bit key is split in two halves again then multiplexed, then shift rows, mixing of columns and then round key is produced it is again Moored with data. Similarly 9 rounds are completed in final round except mix columns operation rest is done(fig 3). fig.5. Improved DES using 96 bits The next 96 bits are allotted for DES, In DES the input data 64 bits are expanded and mixed to form 52 bits and 96 bits are split into 2 parts as 84 and 12 bits, where 12 bits are allotted for parity bits the rest 84 bits are altered and complex operation is done The first sub key is fed to main algorithm to mix with data; again we use 7 bit left and right shift operation to complete 16 rounds. The left out 32 bits are encrypted using blowfish algorithm (fig 2 (b)), generally the key size is 32 bits, where the 32 bits are separated in 4 equal parts as(8*4)=32 bits. Each 8 bit is sent to s box to form a new 32 bit using substitution. Here the operation is as follows K i =K 1 mod K 2 K b =K i XOR K 3 K i =K b mod K 4 Where K i is the final key produced in a single round Each time the same operation is done to form a new round key and this is sent to main algorithm, where this main algorithm has data expansion operation. The data expansion in blowfish algorithm follows fiestel network which has 18 rounds [4]. Every time a new key forms it will be appended with data to form the encrypted data(fig 2 (b)). Thus after forming the new encrypted key (long key, combination of DES, AES and Blowfish). The similar operation is done in vice versa to get the original text fig.6. Timing Diagram for Hybrid Cryptography crucial methods are introduced to deploy the majority networks to acquire the required data. Because of the defect of only the single data encryption and the use of famous encryption algorithm, which was not improved in traditional methods of the registration process, a combined encryption algorithm is proposed in this thesis[1- 4]. This proposed algorithm provides new step to avoid shortcomings. We use some famous algorithms to encrypt a data as follows. At first, we create new algorithm in order to provide security issue and time constraint of operation then we combine AES using multiplexing of keys, Improvement in DES key size and blowfish algorithm, then we encrypt data using the proposed algorithm. This can enhance the security and complicates the Encryption. In this paper we provide both the encryption and decryption that supports in real time application and algorithm has a practical value. Index Terms— Hybrid encryption, Advance Encryption Standard (AES), Data Encryption Standard (DES), Blowfish, Key length