A Comparison of the 3DES and AES Encryption Standards
|
|
|
- Jeffrey Atkinson
- 10 years ago
- Views:
Transcription
1 , pp A Comparison of the 3DES and AES Encryption Standards Noura Aleisa [email protected] Abstract A comparison of two encryption standards, 3DES and AES is presented. It may seem that DES is insecure and no longer of any use, but that is not the case since the DES and 3DES algorithms are still beyond the capability of most attacks in the present day. However, the power of computers is increasing and stronger algorithms are required to face hacker attacks. AES has been designed in software and hardware and it works quickly and efficiently, even on small devices such as smart phones. With a large block size and a longer keys, AES will provide more security in the long term. Keywords: encryption, cryptography, cryptology, algorithm, cryptanalysis, AES, 3DES 1. Introduction It may be surprising to discover that encryption has been known for thousands of years, and methods have varied from those simply based on paper and pencil to others using more complex and specialized mechanical equipment, and today has resulted in the use of computer techniques, encryption applications, and digital signatures years ago, the Egyptians used hieroglyphic symbols to confuse the reader and this is believed to be the first attempt at cryptography. Several other ancient civilizations have also been found to have used cryptography techniques. For instance, the Arabic civilization discovered cryptanalytic techniques and were the first to publish a systematic analysis of cryptography. Another example is the great civilization of India, which has been shown to have used numerous forms of cryptographic communication. They used a finger communication system similar to the sign language or signing used by the hearing and speech impaired today [7]. Cryptography is derived from the Greek word crypto, which means secret, hidden, or concealed. The idea of cryptography is to allow two people to communicate using a secure method in such a way that prevents an outsider from understanding their messages. It is the art of secret writing which allows the passage of information in hidden form so that only authorized people are able to understand it. In the present day, any secure communication environment would not be complete without cryptographic methods. Cryptology can provide a high level of security to any sensitive information that needs to be protected, such as in s, file transfers, saved information on hard disks, backups, and so on. Cryptography is extremely important in wireless communication because it is easier to break into than a hard-wired network. The goal of this paper is to present the reader with an introduction to traditional encryption, the benefits and drawbacks of encryption to the non-professional user, the security provided by the data encryption algorithm 3DES against attackers, and to discuss its merits in comparison with one of the first cyphers, AES. In this section, the world of cryptography is introduced and a brief description of its history is mentioned. In the second part, the advantages and disadvantages of using different encryption systems are discussed. In the third part, the 3DES system and its security issues are explained. Finally, I have introduced the reader is introduced to a comparison between 3DES and AES. ISSN: IJSIA Copyright c 2015 SERSC
2 2. Encryption Methodology There are many reasons why we might want to encrypt data. For instance, individuals may share the same work space with people they don t trust. Another reason, in the business world, is as an extra security layer for a company's sensitive data, such as financial data, because this information might be of benefit to its competitors. Furthermore, two people might want to ensure privacy in an conversation, transporting important information on a hard disk or a computer could be easy prey to competitors without encryption, and companies might use encryption to store sensitive personal data on their clients, such as credit cards information, and medical records. Cryptology consists of both encryption and decryption; the original information is referred to as plaintext, and the encrypted information as ciphertext. To convert the plaintext to ciphertext an algorithm needs to be implement using a secret key to guarantee security and create a digital signature. To encrypt plaintext to ciphertext, two types of keys are available: symmetric or asymmetric. 2.1 Symmetric Key Encryption Symmetric or single secret key encryption is one of the oldest encrypting methods and is usually as simple as shifting the letters of the text by a specific number. Symmetric keys provide only a single key for the encryption and decryption processes which can be a number, a word, or random letters, and anyone with the key will have the ability to decrypt the ciphertext. The difficulty in this process is delivering the key from the sender to the recipient and ensuring that the recipient has received the key. If the key is lost or obtained by a third party then the encrypted data become unavailable. One of the great benefits of the secret key system is the ability to translate passwords easily with the key and the speed of encryption. When compared to the asymmetric key system, the symmetric key system is an attractive method since its application doesn't require the external involvement of users. 2.2 Asymmetric Key Encryption The asymmetric key system, also known as public key encryption, is more secure because it is necessary to use two keys, a public and private one, to encrypt and decrypt a text. The public key can be known to anyone, and the receiver will give the sender his public key and the sender will use it to encrypt the text to be sent. The receiver will receive the ciphertext and decrypt it using his private key. The private key is never distributed, which is why the threat from a third party is considerably reduced because without the private key the text can't be decrypted [2]. In order to get the public key to the other person, a digital certificate is needed, which is a data package containing information such as the organization name, certificate issued date, user's and country, and the public key that determines the personal identity of a user or server. When a securely encrypted communication is required, a query will be sent over the network to the receiver which will send back a copy of the certificate. The public key of the receiver can be extracted from the copy which can also be used to identify the holder [6]. Even though the public and private keys in asymmetric cryptography have solved the security problem of sending the key, it still has drawbacks in the area of security. Firstly, public key encryption is much slower than single secret key encryption. Secondly, it is only efficient for a small amount of data such as , but not for bulk encryption. Another disadvantage is the key validation problem; the published public-key could be created for a specific person A but by another person B, so when someone wants to send an encrypted message to A using his public key it will be sent to B instead. B can then decrypt it with his private key and read a message. If we assume that B knows the real public key of A then he could re-encrypt the message and send it again to A after changing the context of the message. In theory, we can say that B is sitting in the middle 242 Copyright c 2015 SERSC
3 of the conversation of two people and he has the ability to delete and modify the content of the messages. 2.3 Digital Signatures The importance of a signature, whether digitally or on paper, to confirm and document the identity of the sender, especially in the sensitive and confidential correspondence, cannot be overstressed. A digital signature does not mean the same thing as a written signature, which may show information such as the sender's name and telephone number. A digital signature is used to authenticate the identity of the sender and, for the encryption mechanism, consists of the following steps. First, the sender generates a text message hash, which uses certain algorithms not to encrypt the text but to generate a unique hash. Changing one character of text (even by just one bit) will change the hash and it would never generate the original text of that hash again. Secondly, the sender will encrypt the generated hash for the text using his secret key and sends the message. Third, the receiver will decrypt the hash using the public key of the sender. Finally, the receiver will generate a new hash for the text and he will compare the two hashes; if they match, it will mean that the sender is certainly the owner of the sender's public key and if they don't that will mean that the message has been hacked. Digital signatures depend on the secret key of the signer which can only be generated by him or herself [1]. 3. Encryption Algorithms 3.1 Data Encryption Standard (DES) On May 15, 1973, the Data Encryption Standard (DES) was developed at IBM as an improvement on an older system called LUCIFER. DES was designed to work better in hardware than software and is an algorithm which encrypts text in 64-bit blocks with a 56-bit key. The algorithm is applied in three stages. First of all, the plaintext is constructed by permuting the bits of the text χ based on initial permutation IP which is applied as x 0 = IP ( x ) = L 0 R 0, where L 0 is the first 32 bits and R 0 is the last 32 bits. Secondly, sixteen iterations of a specific function that includes permutation and substitution phases are applied. We can write Lᵢ= Rᵢ ı Rᵢ = Lᵢ ı XOR f (Rᵢ ı, Kᵢ ), where K is the key and f is the function. Finally, an inverse permutation IPˉ¹ to the sixteen bit string R and L to obtain the ciphertext using the y = IP -1 ( R 16 L 16 ) formula is utilized [12]. It might seem to be an extremely complicated scheme and the decryption using DES would require a completely different approach, but it might be a surprise to discover that the same algorithm would work to decrypt the same text, the only difference being that the process in decryption is applied in reverse [3]. Since the time DES was adopted in 1977, backdoor DES crackers have been developed that can decode DES messages in less than a week. For instance, a brute force attack tries as many keys as possible to decrypt ciphertext into plaintext by attaching a special parallel computer using a million chips that try a million keys each per second. Another attack was recorded in 1998, under the direction of John Gilmore of the EFF( Electronic Frontier Foundation). A machine costing $220,000, called Deep Crack, was built to be able to go through the whole 56-bit key and break it within 5 days by using 46 chips that could test 90 billion keys a second [8]. 3.2 Double DES Because DES has already proved that a very competent algorithm can be considered highly insecure and unreliable, methods were sought to reuse it by making it stronger and Copyright c 2015 SERSC 243
4 more secure, rather than writing a totally new algorithm. Two main improvements have resulted in Double DES and Triple DES or 3DES. Double DES essentially does twice what DES does with two keys uses in one encryption process. If the attempt to crack the key in DES is 2⁵⁶, then the attempts to crack two different keys consisting of n bits is 2²ⁿ. However, that is not quite true since the concept of the meet-in-the-middle attack has been introduced which involves encryption from one end and decryption from the other and matching the outputs in the middle. 3.3 Triple or 3DES With the idea that Double DES may not be strong enough to prevent a meet-in-themiddle attack has led to the development of 3DES, which was developed in 1999 by IBM by a team led by Walter Tuchman [11]. This type of attack is one of the main reasons why double DES was replaced by Triple DES or 3DES, which is DES with three different keys. It is essential to avoid having the same key for the encryption steps since the output will only be a slower version of DES. 3DES has two forms, one requiring three completely different keys and the other only two completely different keys. The first method uses three keys to encrypt the plaintext, firstly using key k1, followed by encryption with key k2, and lastly a third encryption is carried out with key k3. We perform the operation C = EK3(EK2(EK1(P))) to encrypt the plaintext and P = DK3(DK2( DK1(C))) for decryption. PGP and S/MIME are examples of products that use the three keys 3DES. Even though 3DES uses three keys to provide a high level of security, it still has a drawback since its required 56 * 3 = 168 bits for the keys, which can be difficult to make work in practical situations. Because of this, the method of 3DES using two keys has arisen. In 3DES with two keys, encryption is applied using key k1, the output of the previous step is decrypted using key k2. Finally, encryption of the output of step 2 is encrypted again using key k1. We perform the operation C = EK1(DK2(EK1(P))) to encrypt the plaintext and P = DK1(EK2(DK3(C))) for decryption. This method is also referred to as Encrypt- Decrypt- Encrypt (EDE) [3]. 3DES has advantages over previous algorithms in that it is easy to implement and more secure, but may still not be completely secure. Another advantage is that 3DES can perform single DES encryption if k3= k2= k1, which is sometimes desired in implementations which also support single DES for legacy reasons. 3DES is very efficient in hardware but not particularly in software. It is popular in financial systems as well as for protecting biometric information in electronic passports [8]. However, when addressing security, 3DES has a flaw. With three independent keys, an overall key length of 168 bits is generated, which is a summation of three 56 bit keys that can face a meet-in-the-middle attack. For 3DES with two independent keys, the overall key length is reduced to 112 bits, which might not be sufficient. Nevertheless, this vulnerability will only come into effect with chosen plaintext or known plaintext attacks. In addition, another vulnerability exists that could give an opportunity to a hacker to retrieve a key and reduce the length of it, subsequently reducing the amount of time needed to crack the key. Attacks on two key 3DES have been documented but the required data made it impractical due to the strong interdependency between the keys [4, 13]. It is still possible to make a successful attack only if the keys are secure enough and a connection between the security of the keys and the text can be made. Another attack was made in 1994 by Matsui and Yamagishi called linear cryptanalysis (LC). This attack was one of the most prominent plaintext attacks against block ciphers. LC uses a linear approximation to describe the behavior of the block cipher and, given sufficient pairs of plaintext and its corresponding ciphertext, key information can be obtained and increasing the data usually 244 Copyright c 2015 SERSC
5 gives rise to a higher probability of success. Matsui has successfully obtained a key with 243 known plaintexts [7]. Besides, 3DES is not practical when used to encrypt large messages, and there is the issue of unsafe key transmission between the users. It is considered slow by todays standards and outdated when compared to modern algorithms such as RC6 and Blowfish. 3.4 Advanced Encryption Standard (AES) On January 1997 in the US, the National Institute of Standards and Technology (NIST) announced a contest to develop a new encryption system and asked for some important restrictions. The developed system had to be publicly disclosed, unclassified, free for use worldwide, usable with 128, 192, and 256 bit key sizes, and symmetric block cipher algorithms for blocks of 182 bits [10]. On 26 May 2002, 3DES was replaced by Advanced Encryption standard (AES) [9]. AES and 3DES are commonly used block ciphers, and which one to choose depends on the requirement. AES outperforms 3DES both in software and in hardware. AES is based on the Rijndael algorithm, created by Joan Daemen and Vincent Rijmen, which is a combination of a strong algorithm with a strong key. The Rijndael block cipher can use different block and key lengths, such as 128, 192, and 256 bit. This versatility can produce faster and more secure symmetric block ciphers. Another algorithm which might be considered as an alternative to the Rijndael block cypher is the Twofish algorithm, which can use blocks of 128 bits with keys up to 256 bits. The Rijndael algorithm s combination of security, performance, efficiency, implementability, and flexibility made it an appropriate selection for AES [7]. 4. A Comparison of 3DES and AES In this section, the differences between the two encryption standards are highlighted in terms of security and performance. AES uses three common key lengths, 128, 192, and 256 bits, whereas for 3DES the encryption key is still limited to 56 bits, according to the DES standard. However, since it is equivalent to DES applied three times, the implementer can choose to have either 2 or 3 different 56 bit keys, meaning that 3DES can have encryption key lengths of 168, 112, or 56 bits. However, due to certain vulnerabilities when reapplying the same encryption three times, a 168 bit key has a reduced security equivalent to 112 bits, and using 112 bits has a reduced security equivalent to 80 bits. The bottom line is that 3DES uses identical encryption to DES whereas AES uses a completely different one, 3DES has a shorter length and weaker encryption keys when compared to AES, and 3DES repeatedly applies encryption keys while AES does not. AES is strongly resistant to differential, truncated differential, linear, interpolation and Square attacks, in contrast to 3DES which is vulnerable to differential and linear cryptanalysis and it has weak substitution tables. In addition, the time required to check all possible keys at 50 billion keys per second in AES for a 128-bit key is 5 x 1021 years, whereas 3DES with a 56 bit key would take 400 days. In addition, 3DES uses a block length of 64 bits which is half the size of an AES block length of 128 bits. Another drawback when using 3DES is the need to switch encryption keys after every 32 GB of data transfer to reduce the possibility of leaks. Conversely, using AES provides additional insurance since it is difficult to decypher data from identical blocks. The process of 3DES encryption using 3DES is much longer than AES, because repeating the same encryption process three times in 3DES takes some time when compared to the AES encryption process which is much faster. However, this rule does not apply when we include software and hardware. If we used 3DES with accelerated hardware that departs to software implemented by AES, the results might be slower. In this case we have to measure each one s speed separately. Copyright c 2015 SERSC 245
6 5. Conclusions When it comes to security, the winner is undoubtedly AES as it is considered unbreakable in practical use. After discussing the flaws of DES, thus of 3DES as well, it may seem that DES is insecure and no longer of any use, but that is not the case. The 1997 attack required a great deal of cooperation and the 1998 machine is too expensive to implement, and so the DES and 3DES algorithms are still beyond the capability of most attacks in the present day. However, the power of computers is increasing and stronger algorithms are required to face hacker attacks. The response to that requirement is AES. It has been designed in software and hardware and it works quickly and efficiently, even on small devices such as smart phones. With a larger block size and longer keys using a 128 bit block and with 128, 192 and 256 bit keys, respectively, AES will provide more security in the long term. In conclusion, I am pretty confident that I have learned and introduced the main concepts of traditional cryptography through these four parts. I also believe that I have a general understanding of Triple Data Encryption Standards and its security issues comparing with Advanced Encryption Standards. References [1] H. Delfs and H. Knebl, Introduction to Cryptography: Principles and Applications, Springer- Verlag, Berlin Heidelberg New York, (2007). [2] M. E. Flannagan, R. Fuller and J. Khan, Best Damn Cisco Internet-working Book Period, Syngress Publishing, Rockland, (2003). [3] A. Kahate, Cryptography and network security, The Tata McGraw-Hill publishing company limited, New Delhi, (2003). [4] R. C. Merkel and M. E. Hellman, On the Security of Multiple Encryption, Communications of the ACM, vol. 24, no. 7, (1981). [5] E. Maiwald, Network Security: A beginner's Guide, Osborne-McGraw Hill, (2001). [6] Microsoft support, Description of Symmetric and Asymmetric Encryption, (2007). [7] R. A. Mollin, Codes: The Guide To Secrecy From Ancient To Modern Times, Chapman and Hall/CRC, Boca Raton, (2005). [8] C. Paar, J. Pelzl and B. Preneel, Understanding Cryptography: A Textbook for Students and Practitioners, Springer Heidelberg Dordrecht, Bochum, (2010). [9] V. K. Pachghare, Cryptography and information security, PHI learning Private limited, New Delhi, (2009). [10] C. P. Pfleeger and S. L. Pfleeger, Security in Computing, Pearson education, Inc., New Jersey, (2003). [11] T. Sobh, K. Elleithy and A. Mahmood, Novel Algorithms and Techniques In Telecommunications, Automation and Industrial Electronics. Springer Science+ Business Media B. V., Bridgeport, (2008). [12] D. R. Stinson, Cryptography, Theory and Practice. CRC Press, Inc., Boca Raton, (1995). [13] P. Van Oorschot and M. J. Wiener, A Known-Plaintext Attack on Two-Key Triple Encryption, Springer- Verlag, Berlin Heidelberg New York, (1990). 246 Copyright c 2015 SERSC
Cryptography and Network Security
Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 3: Block ciphers and DES Ion Petre Department of IT, Åbo Akademi University January 17, 2012 1 Data Encryption Standard
Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010
CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Introduction to Cryptography What is cryptography?
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
A PPENDIX H RITERIA FOR AES E VALUATION C RITERIA FOR
A PPENDIX H RITERIA FOR AES E VALUATION C RITERIA FOR William Stallings Copyright 20010 H.1 THE ORIGINS OF AES...2 H.2 AES EVALUATION...3 Supplement to Cryptography and Network Security, Fifth Edition
Split Based Encryption in Secure File Transfer
Split Based Encryption in Secure File Transfer Parul Rathor, Rohit Sehgal Assistant Professor, Dept. of CSE, IET, Nagpur University, India Assistant Professor, Dept. of CSE, IET, Alwar, Rajasthan Technical
Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms
Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms Radhika G #1, K.V.V. Satyanarayana *2, Tejaswi A #3 1,2,3 Dept of CSE, K L University, Vaddeswaram-522502,
A Comparative Study Of Two Symmetric Encryption Algorithms Across Different Platforms.
A Comparative Study Of Two Symmetric Algorithms Across Different Platforms. Dr. S.A.M Rizvi 1,Dr. Syed Zeeshan Hussain 2 and Neeta Wadhwa 3 Deptt. of Computer Science, Jamia Millia Islamia, New Delhi,
IT Networks & Security CERT Luncheon Series: Cryptography
IT Networks & Security CERT Luncheon Series: Cryptography Presented by Addam Schroll, IT Security & Privacy Analyst 1 Outline History Terms & Definitions Symmetric and Asymmetric Algorithms Hashing PKI
SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES
www.arpapress.com/volumes/vol8issue1/ijrras_8_1_10.pdf SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES Malek Jakob Kakish Amman Arab University, Department of Computer Information Systems, P.O.Box 2234,
CSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Secret Key Cryptography (I) 1 Introductory Remarks Roadmap Feistel Cipher DES AES Introduction
The Misuse of RC4 in Microsoft Word and Excel
The Misuse of RC4 in Microsoft Word and Excel Hongjun Wu Institute for Infocomm Research, Singapore [email protected] Abstract. In this report, we point out a serious security flaw in Microsoft
1 Data Encryption Algorithm
Date: Monday, September 23, 2002 Prof.: Dr Jean-Yves Chouinard Design of Secure Computer Systems CSI4138/CEG4394 Notes on the Data Encryption Standard (DES) The Data Encryption Standard (DES) has been
How To Encrypt With A 64 Bit Block Cipher
The Data Encryption Standard (DES) As mentioned earlier there are two main types of cryptography in use today - symmetric or secret key cryptography and asymmetric or public key cryptography. Symmetric
Keywords Web Service, security, DES, cryptography.
Volume 3, Issue 10, October 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Provide the
Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key
Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key Julia Juremi Ramlan Mahmod Salasiah Sulaiman Jazrin Ramli Faculty of Computer Science and Information Technology, Universiti Putra
Common Pitfalls in Cryptography for Software Developers. OWASP AppSec Israel July 2006. The OWASP Foundation http://www.owasp.org/
Common Pitfalls in Cryptography for Software Developers OWASP AppSec Israel July 2006 Shay Zalalichin, CISSP AppSec Division Manager, Comsec Consulting [email protected] Copyright 2006 - The OWASP
CRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
Chapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
ELECTRONIC COMMERCE OBJECTIVE QUESTIONS
MODULE 13 ELECTRONIC COMMERCE OBJECTIVE QUESTIONS There are 4 alternative answers to each question. One of them is correct. Pick the correct answer. Do not guess. A key is given at the end of the module
Effective Secure Encryption Scheme [One Time Pad] Using Complement Approach Sharad Patil 1 Ajay Kumar 2
Effective Secure Encryption Scheme [One Time Pad] Using Complement Approach Sharad Patil 1 Ajay Kumar 2 Research Student, Bharti Vidyapeeth, Pune, India [email protected] Modern College of Engineering,
How To Understand And Understand The History Of Cryptography
CSE497b Introduction to Computer and Network Security - Spring 2007 - Professors Jaeger Lecture 5 - Cryptography CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/
Cryptography & Digital Signatures
Cryptography & Digital Signatures CS 594 Special Topics/Kent Law School: Computer and Network Privacy and Security: Ethical, Legal, and Technical Consideration Prof. Sloan s Slides, 2007, 2008 Robert H.
Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1
Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 Goals v understand principles of network security: cryptography and its many uses beyond
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No. # 11 Block Cipher Standards (DES) (Refer Slide
CIS433/533 - Computer and Network Security Cryptography
CIS433/533 - Computer and Network Security Cryptography Professor Kevin Butler Winter 2011 Computer and Information Science A historical moment Mary Queen of Scots is being held by Queen Elizabeth and
How To Use Pretty Good Privacy (Pgp) For A Secure Communication
Cryptographic process for Cyber Safeguard by using PGP Bharatratna P. Gaikwad 1 Department of Computer Science and IT, Dr. Babasaheb Ambedkar Marathwada University Aurangabad, India 1 ABSTRACT: Data security
Data Encryption WHITE PAPER ON. Prepared by Mohammed Samiuddin. www.itmr.ac.in
01 0110 0001 01101 WHITE PAPER ON Data Encryption Prepared by Mohammed Samiuddin www.itmr.ac.in Contents INTRODUCTION... 2 NEED FOR DATA ENCRYPTION... 3 DUE CARE... 3 REPUTATIONAL RISK... 3 REGULATORY
Network Security Technology Network Management
COMPUTER NETWORKS Network Security Technology Network Management Source Encryption E(K,P) Decryption D(K,C) Destination The author of these slides is Dr. Mark Pullen of George Mason University. Permission
7! Cryptographic Techniques! A Brief Introduction
7! Cryptographic Techniques! A Brief Introduction 7.1! Introduction to Cryptography! 7.2! Symmetric Encryption! 7.3! Asymmetric (Public-Key) Encryption! 7.4! Digital Signatures! 7.5! Public Key Infrastructures
Techniques of Asymmetric File Encryption. Alvin Li Thomas Jefferson High School For Science and Technology Computer Systems Lab
Techniques of Asymmetric File Encryption Alvin Li Thomas Jefferson High School For Science and Technology Computer Systems Lab Abstract As more and more people are linking to the Internet, threats to the
Lecture 4 Data Encryption Standard (DES)
Lecture 4 Data Encryption Standard (DES) 1 Block Ciphers Map n-bit plaintext blocks to n-bit ciphertext blocks (n = block length). For n-bit plaintext and ciphertext blocks and a fixed key, the encryption
A Study of New Trends in Blowfish Algorithm
A Study of New Trends in Blowfish Algorithm Gurjeevan Singh*, Ashwani Kumar**, K. S. Sandha*** *(Department of ECE, Shaheed Bhagat Singh College of Engg. & Tech. (Polywing), Ferozepur-152004) **(Department
AStudyofEncryptionAlgorithmsAESDESandRSAforSecurity
Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 15 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
Ky Vu DeVry University, Atlanta Georgia College of Arts & Science
Ky Vu DeVry University, Atlanta Georgia College of Arts & Science Table of Contents - Objective - Cryptography: An Overview - Symmetric Key - Asymmetric Key - Transparent Key: A Paradigm Shift - Security
EXAM questions for the course TTM4135 - Information Security May 2013. Part 1
EXAM questions for the course TTM4135 - Information Security May 2013 Part 1 This part consists of 5 questions all from one common topic. The number of maximal points for every correctly answered question
Evaluation of the RC4 Algorithm for Data Encryption
Evaluation of the RC4 Algorithm for Data Encryption Allam Mousa (1) and Ahmad Hamad (2) (1) Electrical Engineering Department An-Najah University, Nablus, Palestine (2) Systems Engineer PalTel Company,
AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES
HYBRID RSA-AES ENCRYPTION FOR WEB SERVICES AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES Kalyani Ganesh
How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and
How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and non-repudiation. How to obtain a digital certificate. Installing
Application Layer (1)
Application Layer (1) Functionality: providing applications (e-mail, Web service, USENET, ftp etc) providing support protocols to allow the real applications to function properly (e.g. HTTP for Web appl.)
Chapter 8. Network Security
Chapter 8 Network Security Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic Principles Need for Security Some people who
Chapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
Network Security. Chapter 3 Symmetric Cryptography. Symmetric Encryption. Modes of Encryption. Symmetric Block Ciphers - Modes of Encryption ECB (1)
Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Network Security Chapter 3 Symmetric Cryptography General Description Modes of ion Data ion Standard (DES)
SECURITY IN NETWORKS
SECURITY IN NETWORKS GOALS Understand principles of network security: Cryptography and its many uses beyond confidentiality Authentication Message integrity Security in practice: Security in application,
Developing and Investigation of a New Technique Combining Message Authentication and Encryption
Developing and Investigation of a New Technique Combining Message Authentication and Encryption Eyas El-Qawasmeh and Saleem Masadeh Computer Science Dept. Jordan University for Science and Technology P.O.
An Introduction to Cryptography as Applied to the Smart Grid
An Introduction to Cryptography as Applied to the Smart Grid Jacques Benoit, Cooper Power Systems Western Power Delivery Automation Conference Spokane, Washington March 2011 Agenda > Introduction > Symmetric
Network Security. HIT Shimrit Tzur-David
Network Security HIT Shimrit Tzur-David 1 Goals: 2 Network Security Understand principles of network security: cryptography and its many uses beyond confidentiality authentication message integrity key
Savitribai Phule Pune University
Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter
Information Security
Information Security Dr. Vedat Coşkun Malardalen September 15th, 2009 08:00 10:00 [email protected] www.isikun.edu.tr/~vedatcoskun What needs to be secured? With the rapid advances in networked
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
A Novel Approach to combine Public-key encryption with Symmetric-key encryption
Volume 1, No. 4, June 2012 ISSN 2278-1080 The International Journal of Computer Science & Applications (TIJCSA) RESEARCH PAPER Available Online at http://www.journalofcomputerscience.com/ A Novel Approach
Cryptography and Network Security Chapter 3
Cryptography and Network Security Chapter 3 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 3 Block Ciphers and the Data Encryption Standard All the afternoon
Sandeep Mahapatra Department of Computer Science and Engineering PEC, University of Technology [email protected]
Computing For Nation Development, March 10 11, 2011 Bharati Vidyapeeth s Institute of Computer Applications and Management, New Delhi A Comparative Evaluation of Various Encryptions Techniques Committing
Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code
Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University
Computer Networks Network Security and Ethics Week 14 College of Information Science and Engineering Ritsumeikan University Security Intro for Admins l Network administrators can break security into two
Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 [email protected] Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室
Network Security 孫 宏 民 [email protected] Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室 Security Attacks Normal flow: sender receiver Interruption: Information source Information destination
Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human
Int Jr of Mathematics Sciences & Applications Vol3, No1, January-June 2013 Copyright Mind Reader Publications ISSN No: 2230-9888 wwwjournalshubcom Mathematical Model Based Total Security System with Qualitative
What is network security?
Network security Network Security Srinidhi Varadarajan Foundations: what is security? cryptography authentication message integrity key distribution and certification Security in practice: application
The Advanced Encryption Standard (AES)
The Advanced Encryption Standard (AES) Conception - Why A New Cipher? Conception - Why A New Cipher? DES had outlived its usefulness Vulnerabilities were becoming known 56-bit key was too small Too slow
159.334 Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology
Network Security 1 Professor Richard Harris School of Engineering and Advanced Technology Presentation Outline Overview of Identification and Authentication The importance of identification and Authentication
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
HASH CODE BASED SECURITY IN CLOUD COMPUTING
ABSTRACT HASH CODE BASED SECURITY IN CLOUD COMPUTING Kaleem Ur Rehman M.Tech student (CSE), College of Engineering, TMU Moradabad (India) The Hash functions describe as a phenomenon of information security
6.857 Computer and Network Security Fall Term, 1997 Lecture 4 : 16 September 1997 Lecturer: Ron Rivest Scribe: Michelle Goldberg 1 Conditionally Secure Cryptography Conditionally (or computationally) secure
Application of Automatic Variable Password Technique in Das s Remote System Authentication Scheme Using Smart Card
Application of Automatic Variable Password Technique in Das s Remote System Authentication Scheme Using Smart Card C. Koner, Member, IACSIT, C. T. Bhunia, Sr. Member, IEEE and U. Maulik, Sr. Member, IEEE
How To Encrypt Data With Encryption
USING ENCRYPTION TO PROTECT SENSITIVE INFORMATION Commonwealth Office of Technology Security Month Seminars Alternate Title? Boy, am I surprised. The Entrust guy who has mentioned PKI during every Security
Application Layer (1)
Application Layer (1) Functionality: providing applications (e-mail, www, USENET etc) providing support protocols to allow the real applications to function properly security comprising a large number
Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the
Securing Data at Rest ViSolve IT Security Team
Securing Data at Rest ViSolve IT Security Team 1 Table of Contents 1 Introduction... 3 2 Why Data at Rest needs to be secure?... 4 3 Securing Data... 4 3.1 Encryption - Access Control Approach... 5 3.1.1
Table of Contents. Bibliografische Informationen http://d-nb.info/996514864. digitalisiert durch
1 Introduction to Cryptography and Data Security 1 1.1 Overview of Cryptology (and This Book) 2 1.2 Symmetric Cryptography 4 1.2.1 Basics 4 1.2.2 Simple Symmetric Encryption: The Substitution Cipher...
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
Message Authentication Codes
2 MAC Message Authentication Codes : and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 28 October 2013 css322y13s2l08, Steve/Courses/2013/s2/css322/lectures/mac.tex,
Chapter 7: Network security
Chapter 7: Network security Foundations: what is security? cryptography authentication message integrity key distribution and certification Security in practice: application layer: secure e-mail transport
NETWORK SECURITY. Farooq Ashraf. Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran 31261, Saudi Arabia
NETWORK SECURITY Farooq Ashraf Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran 31261, Saudi Arabia O u t l i n e o f t h e P r e s e n t a t i o n What is Security
E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications
Learning objectives E-commerce Security Threats and Protection Mechanisms. This lecture covers internet security issues and discusses their impact on an e-commerce. Nov 19, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html
Authentication requirement Authentication function MAC Hash function Security of
UNIT 3 AUTHENTICATION Authentication requirement Authentication function MAC Hash function Security of hash function and MAC SHA HMAC CMAC Digital signature and authentication protocols DSS Slides Courtesy
Secure Network Communication Based on Text-to-Image Encryption
Secure Network Communication Based on Text-to-Image Encryption Ahmad Abusukhon 1, Mohamad Talib 2, Issa Ottoum 3 1 IT Faculty, - Computer Network Department Al-Zaytoonah University of Jordan Amman, JORDAN
Cryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g.
Cryptography: Motivation Many areas have sensitive information, e.g. Data Structures and Algorithms Cryptography Goodrich & Tamassia Sections 3.1.3 & 3.1.4 Introduction Simple Methods Asymmetric methods:
A NEW APPROACH FOR COMPLEX ENCRYPTING AND DECRYPTING DATA
A NEW APPROACH FOR COMPLEX ENCRYPTING AND DECRYPTING DATA ABSTRACT Obaida Mohammad Awad Al-Hazaimeh Department of Information Technology, Al-balqa Applied University, AL-Huson University College, Irbid,
Introduction to Encryption
Computers and Society Introduction to Encryption Chris Brooks Department of Computer Science University of San Francisco Department of Computer Science University of San Francisco p.1/35 3-0: Terminology
Message Authentication
Message Authentication message authentication is concerned with: protecting the integrity of a message validating identity of originator non-repudiation of origin (dispute resolution) will consider the
Block encryption. CS-4920: Lecture 7 Secret key cryptography. Determining the plaintext ciphertext mapping. CS4920-Lecture 7 4/1/2015
CS-4920: Lecture 7 Secret key cryptography Reading Chapter 3 (pp. 59-75, 92-93) Today s Outcomes Discuss block and key length issues related to secret key cryptography Define several terms related to secret
Network Security - ISA 656 Email Security
Network Security - ISA 656 Angelos Stavrou November 13, 2007 The Usual Questions The Usual Questions Assets What are we trying to protect? Against whom? 2 / 33 Assets The Usual Questions Assets Confidentiality
Center for Internet Security. INTEGRATED INTELLIGENCE CENTER Technical White Paper William F. Pelgrin, CIS President and CEO
INTEGRATED INTELLIGENCE CENTER Technical White Paper William F. Pelgrin, CIS President and CEO Private and Public Key Cryptography and Ransomware December 2014 Authored by:ted Fischer (CIS) Security Operations
Insight Guide. Encryption: A Guide
Encryption: A Guide for Beginners If you read anything about information security, you re likely to have come across the word encryption. It s a fundamental building block when it comes to securing your
1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies
1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies Dave Corbett Technical Product Manager Implementing Forward Secrecy 1 Agenda Part 1: Introduction Why is Forward Secrecy important?
Compter Networks Chapter 9: Network Security
Goals of this chapter Compter Networks Chapter 9: Network Security Give a brief glimpse of security in communication networks Basic goals and mechanisms Holger Karl Slide set: Günter Schäfer, TU Ilmenau
FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION
FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION INTRODUCTION GANESH ESWAR KUMAR. P Dr. M.G.R University, Maduravoyal, Chennai. Email: [email protected] Every day, millions of people
Network Security (2) CPSC 441 Department of Computer Science University of Calgary
Network Security (2) CPSC 441 Department of Computer Science University of Calgary 1 Friends and enemies: Alice, Bob, Trudy well-known in network security world Bob, Alice (lovers!) want to communicate
File System Encryption in C#
INTEGRATED FILE-LEVEL CRYPTOGRAPHICAL ACCESS CONTROL Abstract Ryan Seifert [email protected] T. Andrew Yang [email protected] Division of Computing and Mathematics University of Houston - Clear Lake,
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
Cryptography & Network Security. Introduction. Chester Rebeiro IIT Madras
Cryptography & Network Security Introduction Chester Rebeiro IIT Madras The Connected World 2 Information Storage 3 Increased Security Breaches 81% more in 2015 http://www.pwc.co.uk/assets/pdf/2015-isbs-executive-summary-02.pdf
Lecture Note 8 ATTACKS ON CRYPTOSYSTEMS I. Sourav Mukhopadhyay
Lecture Note 8 ATTACKS ON CRYPTOSYSTEMS I Sourav Mukhopadhyay Cryptography and Network Security - MA61027 Attacks on Cryptosystems Up to this point, we have mainly seen how ciphers are implemented. We
CSE/EE 461 Lecture 23
CSE/EE 461 Lecture 23 Network Security David Wetherall [email protected] Last Time Naming Application Presentation How do we name hosts etc.? Session Transport Network Domain Name System (DNS) Data
AC76/AT76 CRYPTOGRAPHY & NETWORK SECURITY DEC 2014
Q.2a. Define Virus. What are the four phases of Viruses? In addition, list out the types of Viruses. A virus is a piece of software that can infect other programs by modifying them; the modification includes
Content Teaching Academy at James Madison University
Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect
Blaze Vault Online Backup. Whitepaper Data Security
Blaze Vault Online Backup Version 5.x Jun 2006 Table of Content 1 Introduction... 3 2 Blaze Vault Offsite Backup Server Secure, Robust and Reliable... 4 2.1 Secure 256-bit SSL communication... 4 2.2 Backup
A Standards-based Approach to IP Protection for HDLs
A Standards-based Approach to IP Protection for HDLs John Shields Staff Engineer, Modelsim Overview Introduction A Brief Status First Look at The Flow Encryption Technology Concepts Key Management Second
