INTRODUCTION Enhanced Simplified Symmetric Key Encryption Algorithm by Mahendra kumar shrivas.

Slides:



Advertisements
Similar presentations
Conventional Encryption: Algorithms
Advertisements

Differential Fault Analysis on AES Variants Kazuo Sakiyama, Yang Li The University of Electro-Communications Nagoya, Japan.
Data Integrity Proofs in Cloud Storage Sravan Kumar R, Ashutosh Saxena Communication Systems and Networks (COMSNETS), 2011 Third International Conference.
Block Ciphers and the Data Encryption Standard
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
INTRODUCTION COMPUTATIONAL MODELS. 2 What is Computer Science Sciences deal with building and studying models of real world objects /systems. What is.
1 Pertemuan 06 Kriptografi tradisional Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
The Design of Improved Dynamic AES and Hardware Implementation Using FPGA 游精允.
Secure Group Communications in Wireless Sensor Networks December 8, 2003 CS 526 Advance Internet and Web Systems Patrick D. Cook.
Dr Alejandra Flores-Mosri Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Decryption Algorithms Characterization Project ECE 526 spring 2007 Ravimohan Boggula,Rajesh reddy Bandala Southern Illinois University Carbondale.
On Error Preserving Encryption Algorithms for Wireless Video Transmission Ali Saman Tosun and Wu-Chi Feng The Ohio State University Department of Computer.
Network Security Chapter
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Ian Addison Primary School Teacher. Didn’t have PCs at school Owned my first PC at 16 Studied BTEC IT at college – this included breaking (and fixing)
Security in Wireless Sensor Networks using Cryptographic Techniques By, Delson T R, Assistant Professor, DEC, RSET 123rd August 2014Department seminar.
Chapter 20 Symmetric Encryption and Message Confidentiality.
569 Semantic Web. Dr. J. Lu University of windsor, Project Presentation Encrypted Web service application Encrypted Web Application Presented by:
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
Chapter 20 Symmetric Encryption and Message Confidentiality.
National Institute of Science & Technology Cryptology and Its Applications Akshat Mathur [1] Cryptology and Its Applications Presented By AKSHAT MATHUR.
Major Disciplines in Computer Science Ken Nguyen Department of Information Technology Clayton State University.
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
Chapter 2 Symmetric Encryption.
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
Biometric Encryption Base RSA Algorithm Supervisor: Ass. Prof. Dr. Dang Tran Khanh Student: Dung Ngo Dinh.
Hybrid Cryptography using symmetric key Encryption Sean Laurel Rex Bashyam, Karthik Shankar, Sai Theja kadiyala and Abdelshakour Abuzneid Department of.
Lecture 4 Data Encryption Standard (DES) Dr. Nermin Hamza
Lecture 8 (Chapter 18) Electronic Mail Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Information Technology. *At Home *In business *In Education *In Healthcare Computer Uses.
Virtualization of Infrastructure as a Service (IaaS): Redundancy Mechanism of the Controller Node in OpenStack Cloud Computing Platform BY Shahed murshed.
Survey on Different Data Mining Techniques for E- Crimes
Lightweight Cryptography for IoT
Section 2 Terms Autumn Buchsenschutz.
Security Using Armstrong Numbers and Authentication using Colors
Triple DES.
School of Computer Science and Engineering Pusan National University
Cryptography And Network Security
Blowfish Algorithm.
Chapter 8 Network Security.
Chapter-2 Classical Encryption Techniques.
BUSINESS PLUG-IN B3 HARDWARE AND SOFTWARE BASICS
ATM using fingerprint
M3: Encryption r By Andrew Stringer.
Symmetric Key Block Ciphers
CompTIA Security+ Study Guide (SY0-401)
Optimal Performance of Java Encryption
Efficient CRT-Based RSA Cryptosystems
Title of the Project ANNA UNIVERSITY :: CHENNAI
AES (Advance Encryption Standard)
Security through Encryption
Network Security – Kerberos
Cryptography Team Presentation 1
Section 2: Cryptography
DISSERTATION ON CRYPTOGRAPHY.
BlowFish Algorithm.
Exercise 1: Let’s Communicate - Decrypt The message
Computer Security Chapter Two
Cloud Storage-as-a-Service and Course Reflection
SOHAIL SHAHUL HAMEED Dr. BHARGAVI GOSWAMI
Advanced Encryption Standard
Gaurab KCa,b, Zachary Mitchella,c and Sarat Sreepathia
PGP CSC 492 Presentation May 2, 2007 Brandon Skari Ruby Matejcik.
Blowfish Encryption Algorithm
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

INTRODUCTION Enhanced Simplified Symmetric Key Encryption Algorithm by Mahendra kumar shrivas

AGENDA 1. Summary of Concepts 2. Problem Domain 3. Research Methods 4. Results & Discussions 5. References 6. Conclusion & Future Steps

SUMMARY OF CONCEPTS Bits 0 & 1 Sequence of 8 bits known as Byte 10000001 How do we share information? Email, Images, Office Files, Video, Audio, etc. These are just sequence of 0 & 1 internally

SUMMARY OF CONCEPTS 1. Computer Network and Internet 2. Is sharing of data secure over Network/Internet? 3. Hackers 4. So how do we share the information securely? 5. Cryptography

SUMMARY OF CONCEPTS

SUMMARY OF CONCEPTS

SUMMARY OF CONCEPTS 1. Most commonly used Symmetric Key Cryptography :- DES Triple-DES AES Blowfish

PROBLEM DOMAIN Is it possible to reduce the complexity of algorithms mathematical manipulations and still ensure maximum security? Can the new encryption algorithms design and implementation to enhance performance? How effective is an algorithm using variable key length vary from 65 bytes to 72 bytes of symmetric key technique for encryption and decryption of data? Can the proposed Algorithm be comparable to DES, Triple-DES, Blowfish and AES?

FLOW CHART OF PROPOSED ENCRYPTION ALGORITHM

FLOW CHART OF PROPOSED DECRYPTION ALGORITHM

RESEARCH METHODS Experimental research design was used in this work. For the experiment researchers collected the following performance metrics :- Avalanche effect Encryption Time Decryption Time Memory Requirement CPU Execution Time

Avalanche Effect RESULTS & DISCUSSIONS

Encryption Time RESULTS & DISCUSSIONS

Decryption Time RESULTS & DISCUSSIONS

Memory Requirement RESULTS & DISCUSSIONS

CPU Execution Time RESULTS & DISCUSSIONS

REFERENCES 1. Shrivas, M. K., & Singh, S. V. (2014, June). Added Advanced Encryption Standard (A-AES): With 512 Bits Data Block And 512, 768 And 1024 Bits Encryption Key. International Journal of ICT and Management, Vol-II(Issue-1), 65-71. Retrieved 2016, from http://www.ijictm.org/admin/html/mail/attach/2014-08-06-03-48-23.pdf   2. Shrivas, M. K., & Singh, S. V. (2015). Implementing ADDED ADVANCED ENCRYPTION STANDARD (A-AES) to Secure Data on the Cloud. 3rd International Conference On Management, Communication and Technology (ICMCT) (pp. 17-24). Accra, Ghana: IJICTM. Retrieved 2016, from http://www.ijictm.org/admin/html/mail/attach/2015-08-07-09-55-57.pdf 3. Shrivas, M. K., Dr. Amoako, A., Boateng, S. O., & Dr. Yeboah, T. (2015, 10). Migration Model for unsecure Database driven Software System to Secure System using Cryptography. The International Journal of ICT and Management, Vol-II(Issue-2), 1-8. Retrieved 2016, from http://www.ijictm.org/admin/html/mail/attach/2015-12-10-08-23- 09.pdf 4. Agrawal, M., & Mishra, P. (2012). A Comparative Survey on Symmetric Key Encryption Techniques. International Journal on Computer Science and Engineering, 877-882. 5. Vikendra S.(2013). ANALYSING SPACE COMPLEXITY OF VARIOUS ENCRYPTION ALGORITHMS. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 1,, 414-419.

CONCLUSION/FUTURE STEPS Smallest avalanche effect Encryption and Decryption Time Less Memory Consumption Fastest Execution Suitable for devices with low processing and memory capabilities Need more complex Cryptanalysis

THANK YOU Enhanced Simplified Symmetric Key Encryption Algorithm by Mahendra kumar shrivas