## Are you sure?

This action might not be possible to undo. Are you sure you want to continue?

all types of other networks (often on a worldwide basis), the problem of protection the confidentiality and integrity of the information transmitted on these networks started to attract widespread attention in the late 1970¶s and early 1980¶s. Local area networks provided many user access points. Since a feature of LANs is that additional accesses points can be easily added without having any effect on other network users, an authorized person to gain access to proprietary of classified information could use these connections. To protect both equipment and information, network security must consider a wide range of administrative, physical, and technical issues. To select an appropriate set of network security measures, one first needs to evaluate the threat environment and assess the security techniques can be selected and applied Client Information. Galaxy Software solution is an ISO 9001: 2000 certified Offshore outsourcing Company Headquartered in Hyderabad - India providing IT services for SMEs (Small and Medium Enterprise) for the past Seven years. Galaxy Software solution empowers global innovators with sophisticated

outsourcing solutions. From product development, to application outsourcing, through globalization and cutting-edge business process solutions, we enable our clients to decrease costs, improve operations, and dominate their global markets. Our clients utilize Galaxy Software solution's world-class processes and best practices for uncompromised quality and efficiency. They leverage Galaxy Software solution's vast network of relationships to propel their business operations globally and accelerate innovation

Aims and Objectives y To keep information out of unauthorized users we have to maintain Secrecy.

y

Confirmation pact with decisive we must have to know with whom you are talking to previous to illuminating sensitive information. Non refutation deals amid signatures INTEGRITY CONTROL To design a secure system for the clients to transfer their valuable information to their destinations. To research existing literature relating to different approaches to network security. Writing dissertation with full detailed of developing process. Evolution of the project.

y y y

y

y y

Research methodology 1. For booming achievement of this project to meet my client¶s necessities, a thorough investigate on encryption technology and several encryption methodologies will be carried out Network design approach will be researched. The research will be perform utilizing research journals, textbooks, technology white papers, and talk with program lecturers. Most of the resources utilized were taken from online research sites like sciencedirect.com, techrepublic.com, findwhitepapers.com and ACM.com. The obtainable system comprises of files with literally no file security standards like encryption techniques are to be put into practice due to the factors such as Reading or tapping data, Manipulating and modifying data, Unlawful use of files, Corrosion of data files, Distortion of data transmission, Disturbance of the operation of equipment or systems, adjacent to which numerous security actions had to be taken up, The core concern of (1) is secrecy and confidentiality. Confidentiality has always played an vital role I diplomatic and military matters. Often Information ought to stored or transferred from one place to another devoid of being exposed to an rival or enemy. Key management is also associated to confidentiality. This deals with generating, distributing and storing keys.Items (2-4) are mainly concerned with reliability. Often the expression integrity is utilized as a gauge of genuineness of data. Also Computer files and networks must be secluded against intruders and Unauthorized. Items (5-6) are a diverse aspect of

the security of the information, its continuity. Here the information must be secluded against deliberate disruption at the time of its transmission and storage.

Content Information This research write up contains a total of five chapters with references and appendices that support the entire dissertation. The following are a list of chapters with its corresponding contents y Chapter Two: This chapter specifies the difficulty that occurs during transfer of data into different types of networks and the need to utilization of encryption. y Chapter three:This study covers the detail description of encryption and its functionalities. y Chapter four: The entire description about the how the text is converted into a coding format which cannot be understand by the individual. y Chapter five: It describes then properties of the algorithms¶ and best conditions for their enhanced performance. y Chapter seven: Data encryption standard and it deals with how the data is encrypted from step to step. y Chapter eight: It describes the blow fish algorithm and it is a symmetric block cipher that can be effectively used for encryption and safeguarding of data. y y Appendices References

CHAPTER-2 NETWORK SECURITY As a result of the rapidly growing use of networks and their interactions with all types of other networks (often on a world wide basis), the problem of protection the confidentiality and integrity of the information transmitted on these networks started to attract widespread attention in the late 1970¶s and early 1980¶s. Local area networks provided many user access points. Since a feature of LANs is that additional access points can be easily added without having any effect on other network users, an authorized person to gain access to proprietary of classified information could use these connections. To protect both equipment and information, network security must consider a wide range of administrative, physical, and technical issues. To select an appropriate set of network security measures, one first needs to evaluate the threat environment and assess the security techniques can be selected and applied. Problems of Network security can be diverged into area: 1. Secrecy 2. Authentication 3. Non-repudiation 4. Integrity control SECRECY The main aim of Secrecy is to keep away information from hands of unofficial users. It usually comes to mind when people imagine basing on network security. AUTHENTICATION Confirmation pact with decisive we must have to know with whom you are talking to previous to illuminating sensitive information. NON REPUDIATION

Non repudiation agreement with signatures. 4. INTEGRITY CONTROL It compact to be confident that a message you received was actually the one sent and not any other thing that a wicked adversary altered in transit or concocted

2.2 APPROACHES TO NETWORK SECURITY Secure communication in physically vulnerable networks depends on the disciplines of cryptography to guard the privacy and integrity of material passing between machines. Cryptography is a tactic for altering the depiction or look of a message through a location ± scrambling process or throughout a few method of transformation of letters or characters devoid of changing its in order content. To see where security fits into a communication network consider a seven-layer OSI Reference Model, it is usually only implemented in several of them . The two fundamental approaches to communication security are link ±oriented and end ±to- end encryption measures. As its name implies, link-oriented security measures protect message traffic transient over an individual transmission link among two nodes, regardless of the original source and the ultimate target of that information. The general scheme is shown in a 1.2 where encryption is performed independently on each communication link between successive modems. The encryption is done by means of a function called a Key. Each link corresponds to a data-link layer association in the OSI Reference Model. An advantage of link-oriented security is that, depending on the encryption method used , it can mask origin-to-destination information flow patterns and can Totally avoid all forms of traffic analysis by hiding message frequency and length patterns, but the weakness is that as information is encrypted merely on the links, the network nodes must be both physically secured and capable of isolation information from each of various independent data streams the could pass through the node. In contrast to this protection of individual links, end-to-end security uniformly protects each message along its entire route from source to destination as is shown in A1.3

for keeping packets in or keep packets out Firewalls can be installed. . To undertake these problems.Thus messages pass through the entire network of transmission links. local computers. Coming to transport layer. no one of them crack the authentication or non-repudiation trouble in satisfactorily general way. intermediate nodes switches in an encrypted form as provided by encryption device at the message originator. such as process to process. whole relatives can be encrypted end-to-end. As the network layer. which is why it led to later chapters. the solutions must be in the application layer. Even though these solutions aid with secrecy concern and several people are running hard to perk up them.

This means that details of the key must also be kept secret. In this process the code is again converted back to the original code. the next main division is the decryption. where the information cannot be understand by the outside person. The process must be reversible so that the intended recipient can return the information to its original. readable form. A strengthened system will with stand for a long time. The main characteristics of private key cryptosystem is as follows: 1) For both encryption and decryption the same private key is used In encryption.CHAPTER-3 ENCRYPTION AND DECRYPTION Encryption Encryption is the procedure of renovating information from an unsecured form into coded information. even though by giving great force can reduce this. The key is been in secrecy so that no other intruder can does not have a chance to know about the knowledge of the algorithm. And destination client will be in favor of receiving the original text. absolute the decryption process. Encryption is generally regarded as the safest method of guarding against accidental or purposeful security breaches. . An algorithm and a key control the transformation process is controlled by algorithm and a key. So the decryption acting a crucial role in this project. 2) After the encryption takes palce. And in this way the whole at the entire process of file transfer is carried out. The potentiality of the functionality is calculated in terms of work-factor-the strength of that is necessitate to ¶break¶ encryption. but reversing the process without the appropriate encryption information should be impossible.

that commonly work on projects projects that deal with communication. And the next factor was the performance efficiency that this algorithm supported. and the next one is administrator access. Subsequently that an attacker can might perform configuration alterations to the host like changing the port number of the host system an d make the system shutdown so that the system can shut down every time as it is started.The necessitate of the hour was to perform algorithms like Rijndeal and the refuge over the data transmitted could be secure.To perform this type of actions first the intruder has to get access of the administrator previliges.A general user can perform so many things on the system such as read files edit them. are given below in detail. Ways and Sources of File Threats 1) Unauthorized Access ³Unauthorized access´ it is the way that an intruder can get permit to enter into the machine and access the unauthorized files. 3) Confidentiality Breaches There suppose we assume that there is data that which is very confidential if that data is fell in the hands of intruder there may be a chance of modifying the data or he can change the entire . 2) Executing Commands Illicitly It¶s perceptibly adverse for an not known and untrusted person to be capable to execute commands on your server machines.2 Problem Definition The primary troubles that are discussed in APTS.and these things that an cannot perform. The goal of these type of attack is to admission some resource that your machine should not facilitate the attacker.2. The sternness of the problem is of two types problem: first one is user access.

4) Destructive Behavior Among the destructive sorts of break-ins and attacks. confidentiality breaches and destructive behavior.data or he can replace the old data with new dataIn such type of situations the general user accounts on the system is enough to make damage against the company. It consists of . the bang on the computing competence²and accordingly the business ± cannot be less than if a fire or any other natural calamity takes place so that other disaster caused your computing equipment to be completely destroyed. The word Cryptology is derived from greek word µcruptos¶ which resemblances hidden and logos study and the combination of this two words gives cryptology. As several intruders of these types of break-ins are merely thrill-seekers and they do not have interest in nothing to see a shell prompt for your computer on their screen. unauthorized access.problems given above like execution of commands illicitly. one of the two major categories is. Data Destruction.3 Solution to the problem File Security The primary thing that we think about the file is it¶s security and we make the file to rid out of the problems that are discussed as above for that we have to perform file security. And this word fairly represents the science of concealing. 2. The subsequently chief area is cryptography. Cryptography Cryptography is a division of Cryptology. In this situation. Some of the intruders are those who want to delete the things which there aim is to data destruction. these are highly malicious.

will be applied to a particular message. Since the file as achieved to get the features so that it can store by itself. Key Management There are three basic elements in any encryption system: -.And the key must be kept secrecy so that even the intruder with about the algorithm can complete the decryption process.a means of changing information into code (the algorithm). This is normally achieved by programming keys into all encrypt prior to deployment. The key determines how the algorithm . and is used for standard algorithms such as DES and Triple DES. Suppose the intruder may try to open the file eh don¶t understand nothing as the file is already encrypted form. the password that which we are given will also be stored somewhere in the encrypted file in the encrypted form. In this way the password can be hidden into a file devoid of a necessitate of any database. .A person trying to share encrypted information with another person has to solve the problem of communicating the encryption key without compromising it. Private-Key-Encryption Coming to private key encryption the identical key is utilized for encryption and decryption. the task of key management (including key changes) is easily handled for a private key system. In a relatively small network of encrypts. Assume a user wants to encrypt a file just aaa.techniques for . In the same way as the user wants to decrypt the file.the encryption process .a system to control the key (key management). -. and -. And the Cryptology can be classified into two areas: Cryptography and Cryptanalysis. he should facilitate the identical password as that of encryption. This is one type of hiding password in a file . Private key encryption is a commonly used method of key management. and the keys should be stored securely within the devices.in the same way to decrypt the messages and signals.a secret starting point for the algorithm (the key).txt and given a password as ³srinvas´. and matching keys must be used to encrypt and decrypt messages.

resolve´. storage. The Gold Bug 4.1 INTRODUCTION This chapter presents basic concepts and terminology for constructing encryption systems. Two basic types of encryption in use today are known as private key (also called single or symmetrical key) encryption and public (or asymmetrical) key encryption. destruction and archiving of the key variables. The following topics are described: 1. selection. Types of Ciphers. CHAPTER-4 ENCRYPTION BASICS ³It may well be doubled whether human ingenuity can construct an enigma of the kind which human ingenuity may not. by proper application. Key management pact with the generation. It is generally desirable to change the keys on an irregular but managed basis. algorithms and modes. so it is necessary to change keys frequently in order that identical encryption is not applied to messages for a long period.2 ENCRYPTION BUILDING BLOCKS .The algorithm used in an encryption system normally remains the same for the life of the equipment. distribution. 4. How to recognize adequate Crypto: algorithms and modes. 3. How encryption system fails. 2. -Edgar Allen Poe.

are for Block ciphers. If the plain text message is: LOCAL AREA NETWORKS SECURITY Then the encrypted message reads YTIRUCES KROWTEN AERA LACOL. The functionality of encryption consists of two inputs. which transform data in fixed-sized blocks. one block at a time.1 TRANSPOSITION CIPHERS Transposition ciphers are based on the rearrangement of each character in the plain text message to produce a cipher text. This is one of the simplest encryption methods. Message Reversal: In this method the plain text is written backwards to produce a cipher text. The well-known algorithms.A modern devices of crypto has many essential elements that agree on how it works. however. Firstly in crypto algorithm. or alphanumeric character strings. which are usually expressed as decimal. Obviously. and periodically permuting the characters of the plain text. The encryption techniques include reserving the entire message. hexadecimal. . and one of them is known as plain text and second one is key. Which mainly consider mathematical transformation that worked out on data to encrypt or to decrypt it.2. When block ciphers are applied block by block to the data stream. reforming the message into a geometrical shape. 1. it is not very secure. The key consist of a finite number of bits. Let us now look at simple examples to illustrate this. The fundamental encryption and decryption processes are depicted in A1.1. since to do decipher it one merely reads the cipher text in reverse. To encrypt a digital data stream a bit at a time stream cipher are used. 4. rearranging the plain text by scrambling a sequence of columns.

Taking the letters off the figure according to a different path then creates the cipher text. Geometrical Pattern Encoding: In this method the message is rearrange with the aid of some type of geometric figure. one first transpose the plain text message into a rectangular form by columns. The columns are next rearranged and the letters are taken off in a horizontal fashion. the resulting cipher is HLRESCVANKVDKH. a typical example being a two-dimensional array or matrix. which we write into 5 X 5 matrix by columns as follows Column number Cipher text 1 T 2 O 3 B 4 U 5 R . Example:The plain text message ³The product Brochure is Ready´.2. Example: The plain text word 3 X 5 matrix by rows as follows Column number Cipher text 1 V E H 2 A K L 3 R N Y 4 5 is written into a C H S K D T If columns in the order 24155 take off the letters. 3. First the plain text is written into the figure according to particular pattern. Columnar Transposition In this method.

2 SUBSTITUTION CIPHERS Substitution enciphering involves the replacement of each character in the plain text by some other character. or a symbol. 2. we can thus choose one of these rearrangements A drawback in using columnar transposition ciphers for computer applications is that entire matrices of characters must be generated to encryption and decryption. The mapping from plain text to cipher text is thus one-to-many. This can be a letter . a number. To enhance the security of the plain text message. . Simple Substitution A corresponding character of cipher text replaces each character of plain text. 4.2. a single one-to-one mapping from plain text to cipher text is used to encrypt and entire message. Homophonic Substitution Each plain text character is encrypted with a variety of cipher text characters. The four basic classes of substitution ciphers are as follows: 1. that can be rearranged in 5! = 120 different ways.H E P R D U C T R O C H R E I S E A D Y Since there are five columns.

PolyGram Substitution These are the most general ciphers. is then written as Ek(M) = f(m1)f(m2) ««.f(a1).f(an-1)}. Here the function µf¶ represents a one-to-one mapping of each character of A to the corresponding character of C. A1. we only discuss simple substitution ciphers here. A simple substitution cipher then replaces each character of A by a corresponding character from an ordered cipher alphabet C denoted by {f(a0). Typically C is simply a rearrangement of the characters in A. they permit arbitrary substitutions for groups of plain text characters.2.f(a2).««. Where mi is a character of A.Bn where M is an unkeyed mixing transformation or permutation and the B1 are simple cryptographic transformation.2 illustrated the application of the basic principle to a 12-bit message block . The products are of the form B1MB2M««. A plain text message M=m1m2m3 ««.an-1}. a product cipher is the application of sequence of µn¶ enciphering functions f1. Polyalphabetic Substitution Multiple Cipher alphabets are used to change plain text to cipher text. 4. Suppose A is a plaint text n-character alphabet ordered us look as {a0.2 PRODUCT CIPHERS A product cipher involves a combination of transposition ( permutation) and substitution to produce a cipher text. the mappings are usually one-to-one as in simple substitution. .a1.fn where each f1 can be a permutation cipher P or a substitution cipher S .«««. but can change within a single message. For illustrative purposes.3.««. 4.f2. Thus .

Ek (M) = Ek(M1)Ek(M2) . This blend bits diverse dij boxes for the reason devoicing overall transformation from degeneration and making them to place in 3-bit block. Given that M is a plain text message.. .we should note that this example is for concept illustration purpose only . As shown figure A2.e. A block of message to be transformed iteratively I=1.. Li=Ri+1 (mod-2)f(Ki+1.r times is divided equally into halves denoted as Li and Ri. . since in practice longer locks should be used . i.5 for the (i+1)th iteration the encryption yields Li+1=Ri Ri+1=Li(mod-2)f(ki+1..Li+1) Ri=Li+1 .2..e.The enciphering scheme alternately applies µk¶ substitution Si and µk-1¶ permutations Pi yielding C= Ek (M) =SkPkSk-1«««. If the block is n bits long . The basic concept of block ciphering with partitioning and iteration is shown in A3...2...3 BLOCK CIPHERS Block ciphers involve encrypting and decrypting messages in blocks of information bits.m12) .S2P1S1 (M) The plain text of 12 bit is make parts into 3-bit sub block each performs as a diverse invertible substitution cipher kij which results in 12 bit are scramble by the permutation box Pi and it acts as the input to coming round of enciphering. M2 « and enciphers each Mi with the same key K..Ri) For decryption the of Ki+1 is reversed. then Li and Ri each have n/2 bits. i. This transformation function depends on Ri and Ki+1 for encryption and on Li+1 and Ki+1 for decryption. Encryption and Decryption is carried out by means of the set of iteration.M= ( m1m2.1.«. a block cipher breaks M into successive blocks M1.dependent keys Ki+1 and a transformation function f.

cryptosystems are designed to stand up against attack. the cipher mode defines how the algorithm is applied block by block to the data stream. When cryptosystems do fail. Typical data communication protocols are designed to deal with random errors:TCP/IP delivers data reliably even when a broad range of accidents and failures occur. We can immediately identify the letter standing for one digit based on the rules of arithmetic: M must stand for 1. This . The environment in which the code is used includes the rules for handling plain text. Systematic trail and error quickly yields the rest of the code.3 How Cryptosystems fail Networking systems fail to protect messages because people are motivated to attack them. A very trivial example illustrates the basic concepts of a ³weak´ code consider the codes used for cryptograms published as puzzles in news papers. The cipher itself is the mechanism by which a given message is transformed from plain text into cipher text. cryptograms use very simple encryption techniques that can be cracked by applying some basic rules. the distribution of keys. Here is a classic: SEND +MORE =MONEY We can tell that the solution requires a substitution of letters for digits by the way the problem is presented. we can identify weakness as failing into either of two categories: in the cipher itself or in the operating environment. the roles of people involved. But these protocols aren¶t designed to stand up against conscious attempts to fool them Unlike generic communication protocols.When block ciphers are applied to data stream. Typically. and the physical protections given to the various elements. 4.

Unfortunately.4 CHOOSING BETWEEN STRONG AND WEAK CRYPTO The advice any one would desire at this point is an ordered list of the technologies known to be the strongest. No security technology remains effective forever. prudent planners will anticipate hoe their system can migrate to a different crypto mechanism and key length in the future. we can decide if the risk is acceptable for out application In any case. However. Given the strength of modern codes. 4. . and what those problems are then when faced with a product containing a particular problem. Ideally the work factor should be large enough to make the cost of an attack greater than the potential benefits to the attacker.is perhaps the easiest example there is of cryptanalysis-the systematic breaking of the encrypted messaged and coding systems. Not all crypto products support all strong algorithms or modes. or provide comfortably long key lengths. The essential objective is choosing a strong code. it is difficult to choose reliably that way. The work factor is an estimate of how hard the attacker must work in order to by pass the protection and achieves valuable goal. Stronger systems present a larger work factor while weaker systems are easier to overcome. it is still important to select an appropriately strong alternative from the number available in today¶s market place. or a strong cryptosystem for that matter is to look at the work factor it presents an attacker. Cracking a code involves either an attack on the code itself or on the way the code is used. the real risk today is in how they are actually used.

If we don¶t know how the algorithm works. The longer mathematicians and crypt analysts have to look at the algorithm.2 NO RELIANCE ON ALGORITHM The algorithm should have been designed in the first place to resist crypt analysis.1. DES has stood the rest of time and is likely to be used for many years to come in some form or other.1. Good crypto algorithms rely exclusively on keys to protect the data.1PROPERTIES OF GOOD CRYPTO ALGORITHM Preferred algorithms generally have the following properties to some degree. Simple notations of statistical randomness do not guarantee strength against crypt analysis.4 SUBJECT TO ANALYSIS . 5. Revealing the algorithms should not significantly improve an attackers likelihood of success. in some cases. For example. keeping a crypto algorithm secret can be a double-edged sword. the algorithm had been published and subjected to scrutiny by the public cryptographic community. 5. This is not always true of algorithms used for encryption. the more likely they will find its weaknesses.1. 5.1 NO RELIANCE ON ALGORITHM SECRECY While it may.we can¶t tell if it has some easy-to-exploit flaw. 5.1.CHAPTER-5 CRYPTO ALGORITHM PROPERTIES 5.3 AVAILABLE FOR ANALYSIS Ideally. increase the attacker¶s work factor to keep as much secret as possible. some products use simple random number generators to produce a venom cipher key stream.

Bytes . This almost never occurs except in cases when the algorithm itself has been published. Taking the letters off the figure according to a different path then creates the cipher text. do not presume that it protect against any motivated attacker. It is always important to judge the experts rendering the opinion: are they within their scope of expertise? 5. The columns are next rearranged and the letters are taken off in a horizontal fashion.1. Since there are five columns. that can be rearranged in 5! = 120 different ways. Custom-built algorithms embedded in commercial software tend to have serious weaknesses if a commercial package claims to encrypt data and does not use a recognize algorithm. Substitution enciphering involves the replacement of each character in the plain text by some other character.Have recognized cryptanalysis published results regarding the algorithm strength? Ideally.columnar TranspositionIn this method. recognized experts should be openly discussing the algorithms and other experts review publishing analysis in referred professional journals that ensure the work. A drawback in using columnar transposition ciphers for computer applications is that entire matrices of characters must be generated to encryption and decryption Substitution cipher. we can thus choose one of these rearrangements. Implementing Rijndeal Notation and Conventions Rijndael Inputs and Outputs First the plain text is written into the figure according to particular pattern. one first transpose the plain text message into a rectangular form by columns. To enhance the security of the plain text message.5 NO PRACTICAL WEAKNESSES The analysis performed should show that there are no serious weaknesses in the algorithm that an attacker can easily exploit.

for example. If not particularly indicated. bit patterns will be obtainable with higher numbered bits to the left. Hence {011000011} identifies a exact limited field element. It is also suitable to denote byte values utilizing hexadecimal notation. Arrays of Bytes Entire input and out put are taken as single dimentional arrays of bytes at which x consists of bits 8x to 8x+7 from the sequence with bit 8x+j in the succession map to bit 7-j in the byte for 0 <= j < 8. Few finite field operations utilize a single additional bit (b8) to the left of an 8-bit byte. Where this bit is there it will come out immediately to the left of the left brace. like as a byte b with b0 b1 « b7: The values of bytes will be presented in binary as a concatenation of their its (0 or 1) between braces. 0 <=x < 24 or 0 <=x < 32. as in 1{1b}.A byte in Rijndael consists of a set of 8 bits and this is the general source for all cipher operations. Hence the value {011000011} can also be written as {63}. where the character signify the 4bit group containing the higher numbered bits is again to the left. And this type of bytes are construe as restricted field elements utilizing polynomial representation. . with each of two groups of four bits being signify by a character as Follows. And the sequence is represented by symbol b and x is represented for two notations as well as two representations bx or b[x]. with x in one of the ranges 0 <=x < 16.

For AES the range for c is 0 <=l < 4 where since kc as static value of 8. in the range 0 <=l < Nc. called rounds. each of which utilizes Nc words from this key schedule. each of which consists of an Nc word sub-array. The key schedule for Rijndael.And array is denoted by symbol k. c] = in[r + 4c] for 0 £ r < 4 and 0 £ c < Nc Arrays of 32-bit Words The four bytes in each column of the state can be thought of as an array of four bytes indexed by the row number r or as a single 32-bit word (bytes within all 32-bit words will always be enumerated using the index r). or s[r.Comming to the encryption and decryption functions the entire descryption as shown in the figure 1 Basing on the scheme at the initial of encryption or decryption the input array in is copied to the state array according to the scheme: s[r. denoted by the symbol k. The cipher iterates throughout a numeral of cycles. is an array of 32-bit words. with the lower elements initialized from the cipher key input so that byte 4i+r of the key is copied into byte r of key schedule word k[i]. hence allowing it to be referred to either as l p k . and its column number c. described below. The state can hence be considered as a one dimensional array of words for which the column number c provides the array index. c]. Hence word c of round .The Rijndael State The performance of Rijndael operates on a two dimensional array of bytes known as state which comprises of Xc-columns and 4-rows and Xc is primary supply which is of length 32. in the range 0 <=p < 4. Hence the key schedule can also be viewed as an array of round keys. and each and every byte is split into 2 indexes:its row number p with on the .

Here the round key for round n as a whole. which is k[Nc * n + c]. Finite Field Operations Finite Field Addition The addition of two finite field elements is achieved by adding the coefficients for corresponding powers in their polynomial representations.c] or kn. so that 1 + 1 = 0.f(b2). will also be referred to using two dimensional array notation as either k[n.-] and . that is.f(bn1)}. n k . this addition being performed in GF(2). As a result. addition and subtraction are equally equivalent to an exclusive-and operation on the bytes that symbolize field elements.c . will sometimes be referred to by replacing the second index with µ-¶ as in k[n. the subsequent expressions are equivalent: (polynomial notation) {01010111} Å {10000011} _ {11010100} (binary notation) {57} Å {83} _ {d4} (Hex Notation) Finite Field Multiplication A simple substitution cipher then replaces each character of A by a corresponding character from an ordered cipher alphabet C denoted by {f(b0).. Addition operations for limited field elements will be denote by the symbol Å.f(b1). For instance. modulo 2. an Nc word sub-array.«««. Here the function µf¶ represents a one-to-one mapping of each character of B to the .key n.

.Cn where N is an un-keyed mixing transformation or permutation and the C1 are simple cryptographic transformation.. Thus .««.corresponding character of C..fn where each f1 can be a permutation cipher P or a substitution cipher S .. Typically C is simply a rearrangement of the characters in B. A plain text message N=n1n2n3 ««. A1.m12) .Product cipherA product cipher involves a combination of transposition ( permutation) and substitution to produce a cipher text.2 illustrated the application of the basic principle to a 12-bit message block .f2.. The products are of the form C1MC2N««. Where mi is a character of B. M= ( m1m2. This process is illustrated in the following example of the product {57} · {83} _ {c1} (where · is used to represent finite field multiplication): This intermediate result is now divided by m(x) above: .. is then written as Ek(n) = f(n1)f(n2) ««.we should note that this example is for concept illustration purpose only .. a product cipher is the application of sequence of µn¶ enciphering functions f1. since in practice longer locks should be used Since this polynomial has powers of x up to 8 it cannot be represented by a single byte and will be written as either 1{00011011} or 1{1b} as indicated earlier.

a finite field element can be multiplied by all powers of x from 0 to 7. for any binary polynomial b(x) of degree less than 8. using an exclusive-or operation is used in modular polynomial to get the final outcome . the preliminary result is 1{10010000}. Multiplication of this element by any other field element can then be achieve by addition the outcome for the appropriate powers of x. multiplying 10001000 by x. and there is a neutral element {01}. Multiplication by Repeated Shifts The unlimited field facet 00000010 is the polynomial y. where the outcome that suits within a single byte. the extended Euclidean algorithm can be used to compute polynomials a(x) and c(x). For instance. For instance. Due to replicate this process.and for cancelling additional bit modular polynomial is added.The bit that is extra is removed by supplementary one. Table 1 carries out this calculation for . Furthermore: It hence follows that the set of 256 byte values. In case where the highest bit as given top most preference and it will flow over y8 term.Multiplication is associative. that is 00000010. the modular polynomial. which represents with the next element by the value augment all its power y by 1. It move byte by position 1 to the position i+1. such that: Which shows that the polynomials a(x) and b(x) are mutual inverses. with the XOR as addition and multiplication as clear above has the structure of the limited field GF(256).

increase the attacker's work factor to keep as much secret as possible.the product of the field elements {57} and {83} to give {c1}. increase the attacker's work factor to keep as much secret as possible.we can't tell if it has some easy-toexploit flaw. increase the attacker's work factor to keep as much secret as possible. Revealing the algorithms should not significantly improve an attackers likelihood of success. the more likely they will find its weaknesses. Good crypto algorithms rely exclusively on keys to protect the data. Good crypto algorithms rely exclusively on keys to protect the data. If we don't know how the algorithm works. . If we don't know how the algorithm works. .we can't tell if it has some easy-to-exploit flaw. While it may. keeping a crypto algorithm secret can be a double-edged sword.we can't tell if it has some easy-to-exploit flaw. Revealing the algorithms should not significantly improve an attacker likelihood of success. If we don't know how the algorithm works. Good crypto algorithms rely exclusively on keys to protect the data. keeping a crypto algorithm secret can be a double-edged sword. keeping a crypto algorithm secret can be a double-edged sword. DES has stood the rest of time and is likely to be used for many years to come in some form or other. in some cases. in some cases. in some cases. The longer mathematicians and crypt analysts have to look at the algorithm. Revealing the algorithms should not significantly improve an attackers likelihood of success. Finite Field Multiplication Using Tables While it may. While it may.

By using Rijindeal we get the following tables in this table using the previous instance shows For the Rijndael field [4] is a generator[57] equals [05][54] and [76] = [69][20]where the braces .

and the same way the other operation can be multiplication this can be attained by algebraically growing the polynomial product and amass like powers of x to give: where: .The unlimited field facet (62) + (50) = (b2) is the polynomial y. In case where the highest bit as given top most preference and it will flow over y8 term. that is the preliminary result is {57} · {83} = {03}(62) + (50) The bit that is extra is removed by supplementary one. the modular polynomial. For instance. where the outcome that suits within a single byte. We have to perform so many application for the permutations and combinations like to perform addition and multiplication which these operations can be performed by some mechanizes that to perform some operations such as like addition can be performed for this we have to perform by accumulation the finite field coefficients such as identical powers which relates to xor function which corresponds to their appropriate bytes and sis of 32-bit of x. using an exclusive-or operation is used in modular polynomial to get the final outcome . which represents with the next element by the value augment all its power y by 1.and for cancelling additional bit modular polynomial is added. multiplying by x. Polynomials with Coefficients in GF(256) Four term polynomial is represented as follows: Four term polynomial is represented as fields with fine number of elements where as the four term polynomial generally consists of four coefficients which each coefficient represented by a byte and consists the bytes in the form of 32-bytes word. It move byte by position 1 to the position i+1.

For instance. The bit that is extra is removed by supplementary one. this can conveniently be written in matrix form as: For the reason that x4+1 which is not educable and each and every polynomial multiplications are invertible. that is the preliminary result is A for a.b. a polynomial that has an inverse has been chosen: . For Rijndael.. though. multiplying by x. In Rijndael the polynomial used is x4 + 1. We have to perform so many application for the permutations and combinations like to perform a addition (XOR and multiplication which these operations can be performed by some mechanizes that to perform some operations such as polynomial coefficients: : If one of the polynomials is fixed.

For illustrative purposes.Suppose B is a plaint text n-character alphabet ordered us look as {b0.we should note that this example is for concept illustration purpose only . The 12-bit plaintext block is divided into four 3-bit sub-blocks each of which is acted on by a different invertible 3-bit to 3-bit mapping or substitution cipher Sij.S2P1S1 (M) Where each Si is a function of the key K.. Thus . since in practice longer locks should be used . A plain text message N=n1n2n3 ««. Homophonic Substitution Each plain text character is encrypted with a variety of cipher text characters.f(b2). polynomial has to inverse has been chosen basic classes of substitution ciphers are as follows Simple Substitution A corresponding character of cipher text replaces each character of plain text..M= ( m1m2.For Rijndael.bn-1}.Cn where N is an un-keyed mixing transformation or permutation and the C1 are simple cryptographic transformation. Where mi is a character of B..f(b1).fn where each f1 can be a permutation cipher P or a substitution cipher S . The mapping from plain text to cipher text is thus one-to-many Polyalphabetic Substitution Multiple Cipher alphabets are used to change plain text to cipher text.b1..Product cipherA product cipher involves a combination of transposition ( permutation) and substitution to produce a cipher text. . A1. A simple substitution cipher then replaces each character of A by a corresponding character from an ordered cipher alphabet C denoted by {f(b0).2 illustrated the application of the basic principle to a 12-bit message block . Here the function µf¶ represents a one-to-one mapping of each character of B to the corresponding character of C. but can change within a single message.f(bn-1)}..««. we only discuss simple substitution ciphers here. the mappings are usually one-to-one as in simple substitution. The products are of the form C1MC2N««. Typically C is simply a rearrangement of the characters in B.The numeral of rounds for the cipher (Nn) varies with the block length and the key length as shown in the below table.. they permit arbitrary substitutions for groups of plain text characters. The resulting 12 bits are scrambled by the permutation box Pi and input to the next round of enciphering.«««.The enciphering scheme alternately applies µk¶ substitution Si and µk-1¶ permutations Pi yielding C= Ek (M) =SkPkSk-1«««.««. a product cipher is the application of sequence of µn¶ enciphering functions f1.f2.. a single one-to-one mapping from plain text to cipher text is used to encrypt and entire message.m12) .These are the most general ciphers. is then written as Ek(n) = f(n1)f(n2) ««..

The SubBytes Transformation The SubBytes transformation is a non-linear byte substitution that acts on every byte of the state in isolation to produce a new byte value using an S-box substitution table. 2. Primarily the multiplicative inverse in the finite field explain prior (with element {00} mapped to itself). which is invertible. This replacement. The act of this transformation is demonstrate in Figure 2 for a block size of 6. . Here and somewhere else a prime on a variable on the left of an equation specify that its value is to be efficient with the value on the right. is build by composing two transformations: 1. Second the affine transformation over GF(2) defined by: For 0 £ i < 8 where bi is bit i of the byte and ci is bit i of a byte c with the value {63} or {01100011}.

In matrix form the latter component of the S-box transformation can be expressed as: The final result of this two stage transformation is given in the following table. Nc) depends on row number r and block length as follows: . The ShiftRows Transformation The ShiftRows transformation operates individually on each of the last Three rows of the state by cyclically shifting the bytes in the row such that: Where the shift amount h(r.

.This By interchanging the rows lowest bytes wrap has the effect of moving bytes to the top most priority bytes which the utilization is demonstrated in the lower positions in the row except that the around into the top of the row where the needs are described below 6. The MixColumns Transformation The mixed column transformation is by changing elements in the matrix and treated as each and every column as four-term polynomial. In the preceding matrix all the values are finite elements as argued in The mechanism of transformation is shown in the Figure 4 for a cipher block size of 6.

build which establish a whole sum of Nc (Nn + 1) words here nc represents number of cipher rounds .The Xor RoundKey Transformation In the Xor RoundKey transformation Nc words from the key schedule (the round key described later) are each added (XOR¶ d) into the columns of the state so that: where the round key words are added to the k rounds which then the range as to be from the o with the value o is being utilized and is represented by the initial key round as shown in the diagram and the primary key is to applied prior to the round function K round. The Key Schedule The output of the cipher key is the round key by taking the responsibility of the key schedule with each and every round require a supplementary initial set with round essential nc word. c (shortened to k r The byte that consists of each word as a key address that is shown aboveThe act of this alteration is demonstrate in Figure 5 for a cipher block size of 6.

key schedules for Nk _ 6 and Nk > 6 respectively. . The Inverse Cipher The above represented cipher code is a inverse cipher which is straight forward. The output of the cipher key is the round key by taking the responsibility of the key schedule with each and every round require a supplementary initial set with round essential nc word.b3.b1 ] . The rounds which then the range as to be from the o with the value o is being utilized and is represented by the initial Remember the key which is described in the fig6 where nk=4 and nc=6 and can be produced depending on the necessary utilizing a buffer of max(nc.b1.And the key scheduled is deliberate as solitary dimensional array with I an index of range k 0 £ i < Nc (Nn + 1) each or which individually comprises of a sub-array of Nc words.b0 ] to an output [b0.nk)and this mechanism figured out in 6 and can also be diverse into some what easier.. Nc) are given in Table 6. The Inverse ShiftRows Transformation The InvShiftRows transformation mainly deals individually with the last three the state cyclically altering the bytes the row in a way where the cyclic shift values h(r.b2. build which establish a whole sum [b3. The expansion of the input key into the key schedule proceeds according to the subsequent pseudo code.b2.

The Inverse SubBytes Transformation The needed for the inverse InvSubBytes transformation is given above. The below table is called inverse S-box table which is required for transformations as above discussed. The Inverse MixColumns Transformation The InvMixColumns transformation acts independently on every This By interchanging the rows lowest bytes wrap has the effect of moving bytes to the top most priority bytes which the utilization is demonstrated in the lower positions in the row except that the around into the top of the row discussed above. .

Therefore. thereby achieving this efficiency.By transforming the inverse cipher into the identical sequence of operations as the cipher itself. provide that an This type of cipher utilizes the identical type of keys for the forward cipher but the way of execution is different though a continuous group of actions of transformations are to be are to be transformed the inverse transform to convert since these do not operate in association with the column-mixing step. it can be carried out in the identical way. The performance of the forward only have the structure where it functions only round function to outcome in an proficient type of execution . CHAPTER-6 THE DES AND TRIPLE DES ALGORITHMS .The Equivalent Inverse Cipher This type of cipher utilizes the identical type of keys for the forward cipher but the way of execution is different though a continuous group of actions of transformations are to be are to be transformed the inverse transform to convert into forward cipher this the reason that some of the alterations and the type of execution is entirely different from others the order of sub bytes and jumping of row transformations does not taken into consideration subBytes moves are changes the value and the locations and in the same way the shift rows does the the thing that is exactly opposite which is done by the subbyte subsequently XorRoundKey and InvMixColumns are made to come into action to make the forward and inverse to be identical form to perform round key addition column mixing the execution must be linear to the column input so that: InvMixColumns(state xor h)=InvMixColumns(state) xor InvMixColumns(h) where as h is the representation of a round key which is in the form of a state array.

were classified. the proposed DES was subjected to intense criticism. . The second area of concern was that the design criteria for the internal structure of DES.1. are utilized to reverse the encryption. the key length in IBM¶s original LUCIFER algorithm was 128 bits. As with any encryption scheme. an enormous reduction in key size of 72 bits. which has not subsided to this day. Two areas drew the critics¶ fire. but that of the proposed system was only 56 bits. Thus users could not be sure that the internal structure of DES was free of any hidden weak points that would enable NSA decipher messages without benefit of the key. Critics feared that this key length was too short to withstand Brute Force attacks. 6. First. the S-boxes.1 DATA ENCRYPTION STANDARD The most widely used encryption scheme is based on (DES) adapted in 1977 by the National Bureau of Standards has tailored Data Encryption Standard which is most widely used encryption in data encryption algorithm for 56-bit are utilized by 64 bit block and algoritham converts 64 bit input into as 64 bit output.2 DES ENCRYPTION The overall scheme for DES encryption is illustrated in Figure below. there are two inputs to the encryption function: the plain text to be encrypted and the key. the plain text must be 64 bits in length and the key is 56 bits in length.6. In this case. Before its adoption as a standard.

2(a) Encryption using DES Looking at the left hand side of the figure. we can see the processing of the plain text proceeds in three phases. This is go behind by a phase comprising of 16 rounds of the identical function. as dipected in the figure. DES has the exact organization of Feistel cipher. Considering the exception of the primary and final permutations. the pre-output is passed through a permutation (IP-1) that is the inverse of the initial permutation function. the 64-bit plain text passes through an initial permutation (IP) that rearranges the bits to produce the permuted input. The output of the last (sixteen) round consists of 64 bits that are a function of the input plain text and the key. The left and right bisect of the output are swop to fabricate the preoutput. Finally.1.Fig 6. First. which involve together permutation and exchange functions. . to produce the 64-bit cipher text.

fn where each f1 can be a permutation cipher P or a substitution cipher S .1Initial Permutation: The input to a table comprises of 64 bits A product cipher involves a combination of transposition ( permutation) and substitution to produce a cipher text.. the key is accepted through a permutation function.The right-hand portion of fig above shows the way in which the 56-bit key is used.1..Li+1) Ri=Li+1 When block ciphers are applied to data stream. Then. The permutation function is the same for each round. but a different sub key is produced because of the repeated iteration of the key bit.Bn where M is an un.S2P1S1 (M) reversed.we should note that this example is for concept illustration purpose only .. Thus . At first.f2. since in practice longer locks should be used . A1. Details of Single Round: .e. a product cipher is the application of sequence of 'n' enciphering functions f1. a sub key (Ki) is produced by the combination of a left circular shift and a permutation.m12) .. 6.2.The enciphering scheme alternately applies 'k' substitution Si and 'k-1' permutations Pi yielding C= Ek (M) =SkPkSk-1«««..««..keyed mixing transformation or permutation and the B1 are simple cryptographic transformation. the cipher mode defines how the algorithm is applied block by block to the data stream.2 illustrated the application of the basic principle to a 12-bit message block . for each of the 16 rounds. M= ( m1m2.. Li=Ri+1 (mod-2)f(Ki+1.. i. The products are of the form B1MB2M««.

While it may.Fig 6. The essential objective is choosing a strong code.we can't tell if it has some easy-to-exploit flaw.2 (b) Process involved in Single round Figure: show the internal structure of a single round. . However. The work factor is an estimate of how hard the attacker must work in order to by pass the protection and achieves valuable goal. . If we don't know how the algorithm works.1. increase the attacker's work factor to keep as much secret as possible. it is still important to select an appropriately strong alternative from the number available in today's market place. Revealing the algorithms should not significantly improve an attackers like lihood of success. or a strong cryptosystem for that matter is to look at the work factor it presents an attacker. Good crypto algorithms rely exclusively on keys to protect the data. in some cases. keeping a crypto algorithm secret can be a double-edged sword.

every bit of key and keep on repeating till the entire q-array has become xored with key bits. To enhance the security of the plain text message. we can thus choose one of these rearrangements A drawback in using columnar transposition ciphers for computer applications is that entire matrices of characters must be generated to encryption and decryption.1. In contrast to this protection of individual links. rearranging the plain text by scrambling a sequence of columns. utilizing the 64-bit key. utilizing the 64-bit key. Replace the output of q1 and q2 and encrypt this with the subkey. And carry this process till the q-array and all the four p-boxes in array and the output varying constantly an at last there is a necessitate of 521 alterations for the outcome of all requisite keys .By DES algorithm Encrypt the all-zero string. 1. intermediate nodes switches in an encrypted form as provided by encryption device at the message originator. Replace the output of q1 and q2 and encrypt this with the subkey.3 Thus messages pass through the entire network of transmission links. end-to-end security uniformly protects each message along its entire route from source to destination as is shown in A1. network security must consider a wide range of administrative. . local computers.To protect both equipment and information. and technical issues. physical. Let us now look at simple examples to illustrate this.and kkep on continue for the process for each and every bit of key and keep on repeating till the entire q-array has become xored with key bits.2.2KEY GENERATION: The subkeys are calculated using the Blowfish algorithm: Initially the q-array and the four pboxes in array with a fixed string and this string consists of hexadecimal digits of pi and next xor q1 with 32 bits of key labeled C0 and D0. Message Reversal: In this method the plain text is written backwards to produce a cipher textcan be rearranged in 5! = 120 different ways. and periodically permuting the characters of the plain text.ki). reserving the entire message. one first needs to evaluate the threat environment and assess the security techniques can be selected and appliedmust be both physically secured and capable of isolation information from each of various independent data streams the could pass through the node. reforming the message into a geometrical shape.A 48-bit that serves as input to the function F(R1-1.By DES algorithm Encrypt the all-zero string. To select an appropriate set of network security measures. And carry this process till the q-array and all the four pboxes in array and the output varying constantly an at last there is a necessitate of 521 alterations for the outcome of all requisite keys and this perform this process number of times.

Every TDEA encryption/decryption procedure (as specified in ANSI X9. h3) Keying Option 1: independent keys are h1.f(b2).Encryption that is managed by the user can cause problems in a managed network by rendering necessary files inaccessible to the network managers . The subsequent operations are utilized: In TDE A technique the alteration of 64 block I into a 64-bit block that defines as below O = CK3(VK2(CK1(I))) the same technique is followed by: O = VK1(CK2(VK3(I))) specifies the following keying options for bundle as below. 6. The best proficient method 65to break TDEA is through thorough search of the key space. Here the function µf¶ represents a oneto-one mapping of each character of B to the corresponding character of C. A TDEA mode of operation is backward compatible with its single DES counterpart if. h2 and h3 Keying Option 2: h3 = h1 where h1 and h2 are autonomous keys and.and this perform this process number of times. Even though a number of excellent algorithms have been urbanized TDEA is utilized regularly for the reason that: It has been frequently tested and found to be much protected. A plain text message .2 TRIPLE DATA ENCRYPTION ALGORITHM Every TDEA operation is a compound technique of des encryption and the below operations are utilized where let us Let CK (I) and VK(I) symbolize the DES encryption and decryption of I utilizing DES key K correspondingly. Use by criminals with malicious intent Encryption keys can become lost rendering the associated data unrecoverable .A 48-bit that serves as input to the function F(R11. Keying Option 3: h1 equal sh2 = h3.In this document we talk about TDA simple substitution cipher then replaces each character of A by a corresponding character from an ordered cipher alphabet C denoted by {f(b0).ki). h2. with compatible keying options for TDEA operation.«««.52) is a compound procedure of DES encryption and decryption operation. The standard (h1. An encrypted plaintext work out utilizing a single DES mode of operation can be decrypted appropriately by a corresponding TDEA mode of operation.f(bn-1)}. 1.f(b1).

OFB correspondingly.fn where each f1 can be a permutation cipher P or a substitution cipher S .... The 12-bit plaintext block is divided into four 3-bit sub-blocks each of which is acted on by a different invertible 3-bit to 3-bit mapping or substitution cipher Sij.««.S2P1S1 (M) Where each Si is a function of the key K. since in practice longer locks should be used .N=n1n2n3 ««. When utilizing Keying Option 3 (K1 = K2 = K3).. TCBC. CFB.Cn where N is an un-keyed mixing transformation or permutation and the C1 are simple cryptographic transformation. TECB. Where mi is a character of B. Thus . Typically C is simply a rearrangement of the characters in B. a product cipher is the application of sequence of µn¶ enciphering functions f1.2 illustrated the application of the basic principle to a 12-bit message block .we should note that this example is for concept illustration purpose only . is then written as Ek(n) = f(n1)f(n2) ««.f2.M= ( m1m2. CBC.... A1. The products are of the form C1MC2N««.The enciphering scheme alternately applies µk¶ substitution Si and µk-1¶ permutations Pi yielding C= Ek (M) =SkPkSk-1«««. TCFB and TOFB modes are backward attuned with single DES modes of process ECB. I DE DES Ek1 DES Dk2 O DES Ek3 DES Dk1 I DES Ek2 DES Dk3 O Fig 6..2 (a) TDEA encryption and decryption process .action can be decrypted accurately by a consequent single DES mode of operation.m12) .Product cipherA product cipher involves a combination of transposition ( permutation) and substitution to produce a cipher text.

7.It is more suitable for applications at where the key does not change frequently and it has a very difficult initialization phase essential for any encryption can occur.Blowfish is simple iterating encryption function sixteen times.and this is not a trouble in others. This system is a not a mess yet for older desktop and laptop computers.devoid of altering of keys.The main advantage of blow fish is it is freeware which is and license-free. It is introduced in 1993 by Bruce Schneier as a free option to presented encryption algorithms.and intention is to make data safe.Variable-length key block cipher is Blowfish.the range size of the block is 64 bits. even though it does avert utilization in the minimum embedded systems like early on smartcards.the motive is the supplementary computational effort obligatory gives fortification footprint of merely over 4 kilobytes of RAM.Each and every new key has to pre ±process identical to encrypt four kilobytes of text and is really slothful estimate to other block ciphers.1 BLOWFISH ALGORITHM It successfully utilized for encryption because it is a symmetric block cipher and it mainly comprises of variable key length from 32 bit to 448 bits. In one application.CHAPTER-7 THE BLOWFIHS ALGORITHM Blow fish is the fastest block cipher in the rife use. Blowfish is does not patent and is accordingly generously reachable for someone to utilize.448 bits. and is accessible free for each and every one. This recompense has throws in to its fame in cryptographic software. the real encryption of data is very capable on huge microprocessors.It is faster than any other algoritham with implementation on 32-bit microprocessor with large data caches. .This keep away this its utilization in secure applications . it is an advantage: the password-hashing technique utilized in Open BSD utilized an algorithm derivative from Blowfish that carries utilization of the unhurried key schedule.

Li-1 K Ri-1 + f Li Ri Fig 7. The functioning of a Feistal Network is given as Split each block into halves and next is Right half becomes new left halve and next is New right half is the concluding result when the left half is XOR¶d with the result of applying f to the right half and the key.1.keep in mind preceding rounds can be consequent even if the function f is not invertible.1 Feistel Networks A Feistel network is a general method of transforming any function (usually called an Ffunction) into a permutation is the normal method of feistal networks.1.It It is invented by Horst Feistel and as well as utilized in several block cipher designs.1 (a) Fiestel network 7.2 The Blowfish Algorithm: .7.1.

m12) .Cn where N is an un-keyed mixing transformation or permutation and the C1 are simple cryptographic transformation. It is introduced in 1993 by Bruce Schneider as a free option to presented encryption algorithms. Every round comprises of a key reliant permutation. and a .we should note that this example is for concept illustration purpose only . a product cipher is the application of sequence of µn¶ enciphering functions f1. Where mi is a character of B. A simple substitution cipher then replaces each character of corresponding character from an ordered cipher alphabet C A by a by denoted {f(b0)..A key-expansion part and a dataencryption part are the two parts that the algoritahm comprises. and is accessible free for each and every one. The products are of the form C1MC2N««. It is faster than any other algorithm with implementation on 32-bit microprocessor with large data caches. Thus .f(bn-1)}.««. Here the function µf¶ represents a one-to-one mapping of each character of B to the corresponding character of C. Typically C is simply a rearrangement of the characters in Byproduct cipherA product cipher involves a combination of transposition (permutation) and substitution to produce a cipher text. Variable-length key block cipher is Blowfish.f2. It is more suitable for applications at where the key does not change frequently and it has a very difficult initialization phase essential for any encryption can occur.2 illustrated the application of the basic principle to a 12-bit message block ... A1. Data encryption carries through 16-round Feistel network.448 bits. the real encryption of data is very capable on huge microprocessors. since in practice longer locks should be used 7..It successfully utilized for encryption because it is a symmetric block cipher and it mainly comprises of variable key length from 32 bit to 448 bits and intention is to make data safe. The main advantage of blow fish is it is freeware which is and license-free.. Key expansion change a key of at most 448 bits into numerous sub key arrays totaling 4168 bytes.. 64-bit block cipher. is then written as Ek(n) = f(n1)f(n2) ««. A plain text message N=n1n2n3 ««.2 DESCRIPTION OF THE ALGORITHM Blowfish is a variable-length key.f(b2). Blowfish is simple iterating encryption function sixteen times the range size of the block is 64 bits. M= ( m1m2..«««.f(b1).fn where each f1 can be a permutation cipher P or a substitution cipher S .

0... interchange xl and ar again for previous swap. And carry this process till the q-array and all the four p-boxes in array and the output varying constantly an at last there is a necessitate of 521 alterations for the outcome of all requisite keys and this perform this process number of times..and kkep on continue for the process for each and every bit of key and keep on repeating till the entire q-array has become xored with key bits..p2. Replace the output of q1 and q2 and encrypt this with the subkey. P2. The only additional operations are four indexed array data lookups per round.Subkeys It utilizes a large number of subkeys.255. p2. . utilizing the subkeys. p4.255. 2.To revel the loop and make certain or to arrange the all sub keys in order it require greatest speed and make certain that all sub keys are stored in cache.255.q2... p4.q3«««««q18.1. Then. P18 are utilized in the undo order .2. p1...key. apart from that P1. There are four 32-bit p-boxes with 256 entries each:p1..255.0.. p3.for i = 1 to 16: xL = xL XOR Pi xR = F(xL) XOR xR interchange Swap xl and xr.and data-dependent changeover. p3.p4. 7. The keys must be processed earlier to any data encryption or decryption. 7.1. Encryption It consists of 16 rounds where the input is of 64-bit data elements ie x and divided into two halve of 32-bit xl.0..3 Generating the Subkeys The subkeys are calculated using the Blowfish algorithm: Initially the q-array and the four pboxes in array with a fixed string and this string consists of hexadecimal digits of pi and next xor q1 with 32 bits of key.By Blowfish algorithm Encrypt the all-zero string. Decryption is accurately identical as encryption..2. p2.1. p1. p3. Lastely again by combining x1 and xr achieve the ciphertext.0...1.. xR = xR XOR P17 and xL = xL XOR P18.After the completion of the sixteenth round..xr.1. All process are XORs and additions on 32-bit words..... The q ±array comprises of 18 32 ±bit subkeys:q1.

Generally in sub key generation highly linked key bits like an alphanumeric ASCII string with the bit of each byte to 0 that will create random subkeys It is the most time taking process for generating sub keys and difficult for brute-force and the sub key are very long to be store on tape. Split each block into halves and next is Right half becomes new left halve and next is New right half is the concluding result when the left half is XOR¶d with the result of applying f to the right half and the key keep in mind preceding rounds can be consequent even if the function f is not invertible manufacture process is fixed. The subkey is dependent on each bit of the key and the limit of the key is certainThe 448 limit on the key size make certain that the each bit of each sub key depends on every bit of the key.com.com.2. The letter pi is take for two reasons for the random sequence that are not linked to the algorithm and the next is to store the piece of algorithm. During sub key producing each key of sub key alter with each pair of sub keys produced and this is to guard the the attacks on the sub key and it reduces the storage necessitate. Evolution of project: Most of the resources utilized were taken from online research sites like sciencedirect.4 DESIGN DECISIONS A 64-bit block size yields a 32-bit word size.To maintains block-size compatibility with existing algorithms a 32-bit word size is yield by 64-bit block size and it can scale up to128block as well as down to slighter The starting process are selected as are many options like as XOR. The mainly able way to break blowfish is through thorough hunt of the keyspace.com. techrepublic. findwhitepapers. and . ADD. The obtainable system comprises of files .com and ACM. and MOV from a cache are proficient on architectures that are provided by several companies and all the sub keys. To safeguard the complete entropy subkey generation is intended as well as it is planned to share out set of allowed sub keys erratically all through the domain of achievable sub keys.7.

hardware implementations and the speeds associated with the 192 and 256-bit key sizes were addressed. Corrosion of data files. STRENGTHS y Encryption is the most effective way to achieve data security . and yTo be implement as a stream cipher. The third area of evaluation was algorithm and execution characteristics like as flexibility. Key management is also associated to confidentiality. 2) Cost. This deals with generating. it become evident that the a variety of issues being analyzed and discuss often cross into extra than one of the three main criteria headings. Distortion of data transmission. and relation refuge as compare to other candidates. and memory necessities. and to facilitate additional cryptographic services. All through Round 1. The core concern of (1) is secrecy and confidentiality. distributing and storing keys. Next cost was a second vital area of evaluation that encompassed licensing necessities. and algorithm ease. adjacent to which numerous security actions had to be taken up. As one of NIST¶s aim was that the final AES algorithm be accessible worldwide on a royalty-free basis. Often Information ought to stored or transferred from one place to another devoid of being exposed to an rival or enemy. and efficient firmware implementations were measured helpful. During Rounds 1 and 2. randomness of the algorithm output. hardware and software suitability. Manipulating and modifying data. The virtual minimalism of an algorithm¶s intends was also an appraisal factor. During Round 2. Flexibility comprises the ability of an algorithm: yTo handle key and block sizes away from the minimum that must be supported. Also Computer files and networks must be secluded against intruders and Unauthorized.with literally no file security standards like encryption techniques are to be put into practice due to the factors such as Reading or tapping data. computational speed on different platforms. public comments were particularly hunted on intellectual assets claims and any potential conflict. Often the expression integrity is utilized as a gauge of genuineness of data. The tempo of the algorithm on a range of platforms required to be measured.Items (2-4) are mainly concerned with reliability. Disturbance of the operation of equipment or systems. Items (5-6) are a diverse aspect of the security of the information. its continuity Developing Process The appraisal criteria were divided into three main categories: 1) Security. Defense was the mainly vital factor in the appraisal and encompasses features like conflict of the algorithm to cryptanalysis. hashing algorithm. and 3) Algorithm and execution Characteristics. soundness of its mathematical basis. Unlawful use of files. It must be realistic to execute an algorithm in equally hardware and software. Confidentiality has always played an vital role I diplomatic and military matters. Memory necessities and software execution constraints for software implementations of the candidates were also vital considerations. yTo be apply steadily and efficiently in many diverse types of environments. the spotlight was mainly on the speed related with 128-bit keys.

it is a variable-length key block cipher. like as the Pentium and the PowerPC. sound and image. The best proficient method to break Blowfish is through thorough search of the key space. It is tremendously rapid due to its taking benefits of built-in instructions on the present microprocessors for basic bit shuffling operations. It is only appropriate for applications where the key has not change often. Even though a number of excellent algorithms have been urbanized BLOWFISH is utilized regularly for the reason that: It has been frequently tested and found to be much protected. For financial transactions and payment processing industries.5. like a communications link or an automatic file encryptor. For . The recital indices here are the security and pace of the algorithm. Integrity: Data cannot be changed in the transmission process. The more complex the encryption the more processing it will take y y y Use by criminals with malicious intent Encryption keys can become lost rendering the associated data unrecoverable. text. Linux comprises Blowfish in the mainline kernel.47. This study is applied to diverse types of data. starting with v2. y y y WEAKNESS y Encryption takes computer processor time. Blowfish is a 16 pass block encryption algorithm that has never been broken. the actual encryption of data is very resourceful on large microprocessors. Encryption that is managed by the user can cause problems in a managed network by rendering necessary files inaccessible to the network managers CONCLUSION In this document we talk about Blowfish. It is appreciably earlier than DES when execute on 32-bit microprocessors with huge data caches. Even though there is a compound initialization phase requisite before any encryption can take place.y Encrypting a file makes its contents unrecognizable to applications and to anyone snooping around on your home or office computer Confidentiality: Only genuine destination can access data.

2003. Practical Cryptography. Morris Dworkin. The results obtain here have been transformed into modules of equations of high orders thus the future performance of the algorithm may be predict from these equations REFERENCES: y [BCMO] NIST Special Publication 800-38A Recommendations for Block Cipher Modes of Operation. Department Of Commerce/National Institute of Standards and Technology. U. y y y y . December 2001. the file volume is altered and its affect on the recital of the algorithm was noticed. Department Of Commerce/National Institute of Standards and Technology. Housley. [CMS] RFC 3852 Cryptographic Message Syntax (CMS). R. Furthermore. U.each and every case the encryption/decryption key length has been altered and its outcome on the performance was discerned. July 2004 (obsoletes RFC 3369 and RFC 2630). John Wiley. Guidelines for Implementing and Using the NBS Data Encryption Standard. [FIPS46] Federal Information Processing Standard (FIPS) 46-3. 1 April 1981. Methods and Techniques. [FERG] Niels Ferguson and Bruce Schneier.S.S. 25 October 1999. [FIPS74] Federal Information Processing Standard 74 (FIPS PUB 74). Data Encryption Standard (DES). This has revealed that changing the key length has no outcome on the encryption or decryption time where altering the plaintext file size is straightly reflected on the processing time.

Handbook of Applied Cryptography. The Blowfish Encryption Algorithm -. April 2000. 2 December 1980. doctoral dissertation.S. Department Of Commerce/National Institute of Standards and Technology. [PKCS5] PKCS #5. Description of a New Variable-Length Key. RSA Laboratories. Algorithms and Source Code in C. September 1995 . [TMOVS] NIST Special Publication 800-20 Modes of Operation Validation System for the Triple Data Encryption Algorithm (TMOVS): Requirements and Procedures.One Year Later. 15 November 1999. CRC Press LLC. Cryptographic Message Syntax Standard. [RANK] Rankl. Fast Software Encryption 1993: 191-204 Bruce Schneier.0.y [FIPS81] Federal Information Processing Standard (FIPS 81). November 1993. Prentice Hall 1998.S. [FIPS197] Federal Information Processing Standards Publication FIPS PUB 197 Advanced Encryption Standard (AES). John Wiley. RSA Laboratories. 64-bit Block Cipher (Blowfish). Bruce Schneier. October 1997. 137. 1997. Smart Card Handbook. EDI Message Implementation Guidelines for Customs Declarations. W and W. John Wiley. van Oorschot and Vanstone. "Cryptanalysis and design of iterated block ciphers". Version 2.Dr. [PKCS7] PKCS #5. 26 November 2001. p. U. Applied Cryptography . U. Dobb's Journl 20(9). [NZEDI] New Zealand Customs Service. Password-Based Encryption Standard. Cryptography and Network Security: Principles and Practice. [STAL] William Stallings. 1997.5. y y y y y y y y y Vincent Rijmen. Department Of Commerce/National Institute of Standards and Technology. [SCHN] Bruce Schneier. Version 1. DES Modes of Operation. 1996. second edition. ISBN 0138690170 (3rd edition 2002. March 1999. Effing. ISBN 0130914290).Protocols. 2nd edition. [MENE] Menezes.

1007/BF00630563.S. "Exhaustive Cryptanalysis of the NBS Data Encryption Standard" IEEE Computer 10(6). Differential Cryptanalysis of the Data Encryption Standard. Lecture Notes in Computer Science 3152: 1±22. "Differential Cryptanalysis of DES-like Cryptosystems". Wiretap Politics. "On Multiple Linear Approximations". CRYPTO 1992: pp512±520 * Coppersmith. Nathan Keller: Enhancing Differential-Linear Cryptanalysis.962. LNCS 1039. * Biham. De Canniere and M.Serge Vaudenay. Eli and Adi Shamir.. D.. 1996. Product Block Cipher System for Data Security. pp74±84 * Ehrsam et al. Filed February 24. C. Springer-Verlag. Gollmann. 1975 . * Diffie. and Chip Design. Journal of Cryptology 4 (1): 3±72. ISBN 0-387-97930-1. 38(3).539. Don." Fast Software Encryption (FSE'96). http://www. A Fast New DES Implementation in Software Cracking DES: Secrets of Encryption Research. 27--32. Eli. pp. doi:10.springerlink. 1993. Electronic Frontier Foundation * Biryukov.1007/b99099.com/content/k54h077np8714058/. Wiener: DES is not a Group.. A. The data encryption standard (DES) and its strength against attacks. Orr Dunkelman.springerlink. http://www. (preprint) * Biham. Ed. Cryptology 10(3): 195±206 (1997) * Biham. ASIACRYPT 2002: pp254±266 * Biham. Eli and Alex Biryukov: An Improvement of Davies' Attack on DES. U. Springer Verlag. Keith W. (preprint). Eli. IBM Journal of Research and Development. 243±250. Whitfield and Martin Hellman. Michael J. Eli and Adi Shamir (1991). doi:10. Quisquater (2004).com/content/16udaqwwl9ffrtxt/. June 1977. "On the weak keys of Blowfish. * Campbell. J. * Biham. ISBN 3-540-97930-1. (1994). Patent 3.

Hellman: Differential-Linear Cryptanalysis. doi:10.46. Mitsuru (1994).springerlink. Lecture Notes in Computer Science 765: 386±397. Steven. 1998. * Junod. Wiretap Politics and Chip Design". * Kaliski. http://www. O'Reilly. "On the Complexity of Matsui's Attack. 2001. CRYPTO 1994: 17±25 * Levy. John. Martin E. CRYPTO 1994: pp26±39 * Knudsen.1007/3-540-48658-5_1.FSE 2000: pp262±272 * Langford. * National Bureau of Standards. Washington D.com/content/92509p5l4ravyn62/.* Gilmore. FIPS-Pub.. Data Encryption Standard. Lars.1007/3-540-48285-7.C. doi:10. "Linear Cryptanalysis Method for DES Cipher". National Bureau of Standards. Department of Commerce. ISBN 0-14-024432-8. January 1977. Fast Software Encryption . pp199±211. Susan K.S. Crypto: How the Code Rebels Beat the Government²Saving Privacy in the Digital Age." Selected Areas in Cryptography. 2001. Matt Robshaw: Linear Cryptanalysis Using Multiple Approximations. John Erik Mathiassen: A Chosen-Plaintext Linear Attack on DES. U. * Matsui.. Lecture Notes in Computer Science 839: 1±11. (preprint) * Mitsuru Matsui (1994)..com/content/vrteugmt7erqqbw1/. Burton S. "The First Experimental Cryptanalysis of the Data Encryption Standard". "Cracking DES: Secrets of Encryption Research. Pascal.springerlink. ISBN 1-56592-520-3. http://www. .

- IMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION
- Cryptanalysis and Brute Force Attacks Paper
- Copy of Cryptography Ppt[1]
- p103 Cryptography
- Electronic Data Interchange
- Assignment 1.docx
- A Competative Study of Cryptography Technique
- 06_RSA
- lec2.pdf
- Encryption
- 16097330 Encryption
- Answer Review Week 4_Suryadin Akbar_1113100.pdf
- Rsa Algorithm
- sadbshf
- CYBER CRIME & SECURITY
- Netwok Security
- 45
- Distributed Privacy Preservation Matchmaking protocol in Mobile Social Networks
- Protection Course
- Enabling Data Dynamic and Indirect Mutual Trust for Cloud Computing Storage Systems
- Principles of Cryptography
- Combining Private and Public Key Encryption Techniques for Providing Extreme Secure Environment for an Academic Institution Application
- Database
- An Encryption and Decryption More Secure Elgamal Cryptosystem
- 3.2 Self Securing Storage (S4)
- CSE 3043 Week 3 Lecture Cryptography Part 1
- Secured Communication through Hybrid Crypto-Steganography
- An Algorithm to Secure an Image Using Logistic Chaotic Mapping With Shuffling
- ANALYSIS OF SECURITY REQUIREMENTS OF FUTURISTIC MOBILE APPLICATIONS
- Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks(2015)

Close Dialog## Are you sure?

This action might not be possible to undo. Are you sure you want to continue?

Loading