new encryption technique
Post on 15-Jul-2015
115 Views
Preview:
TRANSCRIPT
A Novel Encryption, Decryption Process Using
Permutation Choice
Y.S.R Engineering College Of Y.V.U::Proddatur
Presenting By :
I. Raja Sekhar Reddy
IV B.Tech CSE
1011102026
E-mail:irsreddy26@gmail.com
• Introduction
• Existing Method
• Proposed Method
• Features
• Conclusion
Contents:
What is Security?
Why we need to provide Security?
How the security will be provided?
Introduction:
Encryption and Decryption:
• Confidentiality
• Integrity
• Authentication
• Non-repudiation
SECURITY SERVICES:
EXISTING METHOD:
The proposed method consists of
Encryption
Single round encryption
Key generation
Round function
Decryption
Single round decryption
Key generation
Round function
PROPOSED METHOD:
ENCRYPTION:
SINGLE ROUND ENCRYPTION:
KEY GENERATION:
ROUND FUNCTION:Selection inputs Round Function
S3 S2 S1 S0
0 0 0 0 F1
0 0 0 1 F2
0 0 1 0 F3
0 0 1 1 F4
0 1 0 0 F5
0 1 0 1 F6
0 1 1 0 F7
0 1 1 1 F8
1 0 0 0 F9
1 0 0 1 F10
1 0 1 0 F11
1 0 1 1 F12
1 1 0 0 F13
1 1 0 1 F14
1 1 1 0 F15
1 1 1 1 F16
DECRYPTION:
SINGLE ROUND DECRYPTION:
KEY GENERATION:
ROUND FUNCTION:Selection lines Round Function
S3 S2 S1 S0
0 0 0 0 F1
0 0 0 1 F2
0 0 1 0 F3
0 0 1 1 F4
0 1 0 0 F5
0 1 0 1 F6
0 1 1 0 F7
0 1 1 1 F8
1 0 0 0 F9
1 0 0 1 F10
1 0 1 0 F11
1 0 1 1 F12
1 1 0 0 F13
1 1 0 1 F14
1 1 1 0 F15
1 1 1 1 F16
FEATURES:
More secure
Key size will be 1024-bit
Plain text block size will be 2048-bit
Round function will be changed to round to round
The goal of the encryption algorithm designing is to frustrate the hackers andmakes the cryptanalysis difficult. The key value play more important role inencryption process. Altering each value of the plain text to get the final cipher textmake the cryptanalysis still more complex. The goal of the present paper is toincrease the security which makes complex to break. The round function andpermutation choices are not fixed, it is changed according to the user.
Conclusion:
Any Queries?
THANK YOU
top related