Академический Документы
Профессиональный Документы
Культура Документы
ABSTRACT – Data sharing and networking, in today’s date, form the basis of computer science
and technology. In today’s competitive world, data security is more important than data sharing
or generation as data is the most valuable resource one can possess. Be it public sector units or
multinational companies, every organization has increased the need for data security. Data
integrity, authentication, security, and confidentiality is enhancing day by day to facilitate
stronger security. To enable data security, various cryptography techniques are used. This paper
primarily focuses on reviewing the existing encryption methods and surveying their algorithms.
INTRODUCTION – Let us suppose you have thought of some idea and want to patent it. You
will design its documentation and all the necessary stuff. While transferring it over the network,
someone steals your idea and patents it before you and you suffer a huge loss. This is due to data
insecurity and theft. Had you secured your file using some encryption standards, this won’t
happen. Therefore all data transmissions need to be very secure and confidential. Data
encryption is a very efficient and effective standard to establish security over the network.
Cryptography is a branch that will end at infinity and give rise to endless discoveries and
development in computer science. Cryptography previously meant a process of converting useful
information into a nonreadable format using transposition, replacement and shift techniques. Post
world war I and advancement in computer science, the encryption standards have become more
and more complex and tougher to crack the security key.
BASIC TERMS –
1. ENCRYPTION
Encryption is said to be the process of converting simple text or say plain text or any file
in its original form to a form which is not readable or understandable by a random person
generally referred as cipher text or encrypted form. Ciphertext has no meaning and is of
no use unless the key to read it is known.
E.g.: Plain Text – Hello user! Your code is 7XX4yr.
Encrypted Text – Ydfs%n^&aas8)$qwLV9fsdds441_+/>
2. DECRYPTION
Decryption is said to be the process of converting ciphertext or encrypted code or files
into its recognizable form such that it conveys some meaningful information i.e. back to
plain text. Decryption process generally requires an authentic key to be completed to
ensure data security.
E.g.: Encrypted Text – Ydfs%n^&aas8)$qwLV9fsdds441_+/>
Suppose key to decrypt the same is HighFive. When the user enters HighFive as a
key or in general terms password, plain text is displayed.
Plain Text – Hello user! Your code is 7XX4yr.
3. KEY
What kind of encryption algorithm will be used for the process completely relies on the
type of key we choose. Key can be referred as a password or say a combination of
alphabets and numbers that play the most vital role in cryptography. It is used both at the
time of encryption and decryption to authenticate the process and convert plaintext into
ciphertext and vice versa.
DIAGRAMMATIC REPRESENTATION –
1. PROCESS OF ENCRYPTION
Encryption key of
specified bits
2. PROCESS OF DECRYPTION
Decryption key of
specified bits
CRYPTOGRAPHIC GOALS –
1. SECRECY – It ensures that the data over transmission is accessed only by legitimate
users and not any third party.
2. AUTHENTICATION – The trueness or identity of the sender is verified to ensure
whether the data is coming from an authorized place or not.
3. AUTHORIZATION – Only those with proper access rights are allowed to control the
information or data over the transmission.
4. NON-REPUDIATION – Neither the sender nor the receiver should be able to deny
the transmission of data.
5. INTEGRITY – It ensures that the data or information has not been changed even in
the smallest way. Only the authorized user has rights to alter data.
CATEGORISATION OF ENCRYPTION
1. DES (DATA ENCRYPTION STANDARD) – Till the late 70s, i.e. until modern
cryptography came into action, DES was considered to be the most powerful encryption
algorithm. Developed at IBM, DES is kept in the insecure category due to its very small
key size. It uses 64 bit key for serving the purpose out of which only 56-bit keys are in
use as 8 bit is used as parity bits. This algorithm can run in several modes involving 16
rounds of various permutations and combinations.
PLAINTEXT
INITIAL STAGE
OF ROUND 1
56 BIT KEY FOR ENCRYPTION
PERMUTATION
ROUND 2
EXPANSION OF KEY
(128/192/256 BITS)
FIRST ROUND
ADD ROUND KEY (XOR
DATA AND ROUND KEY)
BYTE SUBSTITUTION
INTERMEDIATE
ADD COLUMNS
BYTE SUBSTITUTION
FINAL ROUND
STOP
START
DATA
HASHED VALUE
PUBLIC KEY
SIGNATURE ALGORITHM
SIGNATURE
YES
EQUAL? CORRECT DIGITAL
SIGNATURE
VERIFICATION ALGORITHM
HASHED VALUE
STOP
PRIVATE KEY