Presentation is loading. Please wait.

Presentation is loading. Please wait.

INTRODUCTION Enhanced Simplified Symmetric Key Encryption Algorithm by Mahendra kumar shrivas.

Similar presentations


Presentation on theme: "INTRODUCTION Enhanced Simplified Symmetric Key Encryption Algorithm by Mahendra kumar shrivas."— Presentation transcript:

1 INTRODUCTION Enhanced Simplified Symmetric Key Encryption Algorithm by Mahendra kumar shrivas

2 AGENDA 1. Summary of Concepts 2. Problem Domain 3. Research Methods
4. Results & Discussions 5. References 6. Conclusion & Future Steps

3 SUMMARY OF CONCEPTS Bits 0 & 1 Sequence of 8 bits known as Byte
How do we share information? , Images, Office Files, Video, Audio, etc. These are just sequence of 0 & 1 internally

4 SUMMARY OF CONCEPTS 1. Computer Network and Internet
2. Is sharing of data secure over Network/Internet? 3. Hackers 4. So how do we share the information securely? 5. Cryptography

5 SUMMARY OF CONCEPTS

6 SUMMARY OF CONCEPTS

7 SUMMARY OF CONCEPTS 1. Most commonly used Symmetric Key Cryptography :- DES Triple-DES AES Blowfish

8 PROBLEM DOMAIN Is it possible to reduce the complexity of algorithms mathematical manipulations and still ensure maximum security? Can the new encryption algorithms design and implementation to enhance performance? How effective is an algorithm using variable key length vary from 65 bytes to 72 bytes of symmetric key technique for encryption and decryption of data? Can the proposed Algorithm be comparable to DES, Triple-DES, Blowfish and AES?

9 FLOW CHART OF PROPOSED ENCRYPTION ALGORITHM

10 FLOW CHART OF PROPOSED DECRYPTION ALGORITHM

11 RESEARCH METHODS Experimental research design was used in this work.
For the experiment researchers collected the following performance metrics :- Avalanche effect Encryption Time Decryption Time Memory Requirement CPU Execution Time

12 Avalanche Effect RESULTS & DISCUSSIONS

13 Encryption Time RESULTS & DISCUSSIONS

14 Decryption Time RESULTS & DISCUSSIONS

15 Memory Requirement RESULTS & DISCUSSIONS

16 CPU Execution Time RESULTS & DISCUSSIONS

17 REFERENCES 1. Shrivas, M. K., & Singh, S. V. (2014, June). Added Advanced Encryption Standard (A-AES): With 512 Bits Data Block And 512, 768 And 1024 Bits Encryption Key. International Journal of ICT and Management, Vol-II(Issue-1), Retrieved 2016, from 2. Shrivas, M. K., & Singh, S. V. (2015). Implementing ADDED ADVANCED ENCRYPTION STANDARD (A-AES) to Secure Data on the Cloud. 3rd International Conference On Management, Communication and Technology (ICMCT) (pp ). Accra, Ghana: IJICTM. Retrieved 2016, from 3. Shrivas, M. K., Dr. Amoako, A., Boateng, S. O., & Dr. Yeboah, T. (2015, 10). Migration Model for unsecure Database driven Software System to Secure System using Cryptography. The International Journal of ICT and Management, Vol-II(Issue-2), 1-8. Retrieved 2016, from 09.pdf 4. Agrawal, M., & Mishra, P. (2012). A Comparative Survey on Symmetric Key Encryption Techniques. International Journal on Computer Science and Engineering, 5. Vikendra S.(2013). ANALYSING SPACE COMPLEXITY OF VARIOUS ENCRYPTION ALGORITHMS. International Journal of Computer Engineering and Technology (IJCET), ISSN (Print), ISSN 0976 – 6375(Online) Volume 4, Issue 1,,

18 CONCLUSION/FUTURE STEPS
Smallest avalanche effect Encryption and Decryption Time Less Memory Consumption Fastest Execution Suitable for devices with low processing and memory capabilities Need more complex Cryptanalysis

19 THANK YOU Enhanced Simplified Symmetric Key Encryption Algorithm by Mahendra kumar shrivas


Download ppt "INTRODUCTION Enhanced Simplified Symmetric Key Encryption Algorithm by Mahendra kumar shrivas."

Similar presentations


Ads by Google