You are on page 1of 4

Encryption 

is the process of transforming information (referred to as plaintext) using


an algorithm (called cipher) to make it unreadable to anyone except those possessing special
knowledge, usually referred to as a key. The result of the process is encrypted information (in
cryptography, referred to as cipher text). In many contexts, the word encryption also implicitly refers
to the reverse process, decryption (e.g. “software for encryption” can typically also perform
decryption), to make the encrypted information readable again (i.e. to make it
unencrypted).Decryption requires a secret key or password.

Encryption can be used to protect data "at rest", such as files on computers and storage devices
(e.g. USB flash drives). In recent years there have been numerous reports of confidential data such as
customers' personal records being exposed through loss or theft of laptops or backup drives.
Encrypting such files at rest helps protect them should physical security measures fail. Digital rights
management systems which prevent unauthorized use or reproduction of copyrighted material and
protect software against reverse engineering (see also copy protection) are another somewhat different
example of using encryption on data at rest.

Encryption is also used to protect data in transit, for example data being transferred via networks (e.g.
the Internet, e-commerce), mobile telephones, wireless microphones, wireless
intercomsystems, Bluetooth devices and bank automatic teller machines. There have been numerous
reports of data in transit being intercepted in recent years. Encrypting data in transit also helps to
secure it as it is often difficult to physically secure all access to networks.

Encryption, by itself, can protect the confidentiality of messages, but other techniques are still needed
to protect the integrity and authenticity of a message; for example, verification of a message
authentication code (MAC) or a digital signature. Standards and cryptographic software and hardware
to perform encryption are widely available, but successfully using encryption to ensure security may
be a challenging problem. A single slip-up in system design or execution can allow successful attacks.
Sometimes an adversary can obtain unencrypted information without directly undoing the encryption.
Symmetric Key Encryption

Symmetric key encryption uses same key, called secret key, for both encryption and decryption. Users
exchanging data keep this key to themselves. Message encrypted with a secret key can be decrypted
only with the same secret key. The algorithm used for symmetric key encryption is called secret-key
algorithm. Since secret-key algorithms are mostly used for encrypting the content of the message they
are also called content-encryption algorithms. The major vulnerability of secret-key algorithm is the
need for sharing the secret-key. One way of solving this is by deriving the same secret key at both
ends from a user supplied text string (password) and the algorithm used for this is called password-
based encryption algorithm. Another solution is to securely send the secret-key from one end to other
end. This is done using another class of encryption called asymmetric algorithm, which is discussed
later. Strength of the symmetric key encryption depends on the size of the key used. For the same
algorithm, encrypting using longer key is tougher to break than the one done using smaller key.
Strength of the key is not liner with the length of the key but doubles with each additional bit.

The Data Encryption Standard (DES) is a block cipher that uses shared secret encryption. It was


selected by the National Bureau of Standards as an official Federal Information Processing
Standard (FIPS) for the United States in 1976 and which has subsequently enjoyed widespread use
internationally. It is based on a symmetric-key algorithm that uses a 56-bit key. The algorithm was
initially controversial with classified design elements, a relatively short key length, and suspicions
about a National Security Agency (NSA) backdoor. DES consequently came under intense academic
scrutiny which motivated the modern understanding of block ciphers and their cryptanalysis.
DES is now considered to be insecure for many applications. This is chiefly due to the 56-bit key size
being too small; in January, 1999,distributed.net and the Electronic Frontier Foundation collaborated
to publicly break a DES key in 22 hours and 15 minutes (see chronology). There are also some
analytical results which demonstrate theoretical weaknesses in the cipher, although they are infeasible
to mount in practice. The algorithm is believed to be practically secure in the form of Triple DES,
although there are theoretical attacks. In recent years, the cipher has been superseded by the Advanced
Encryption Standard (AES). Furthermore, DES has been withdrawn as a standard by the National
Institute of Standards and Technology (formerly the National Bureau of Standards).
International Data Encryption Algorithm (IDEA) is a block cipher designed by James
Massey of ETH Zurich and Xuejia Lai and was first described in 1991. As a block cipher, it is
also symmetric. The algorithm was intended as a replacement for the Data Encryption Standard[DES].
IDEA is a minor revision of an earlier cipher, PES (Proposed Encryption Standard); IDEA was
originally called IPES (Improved PES). The cipher was designed under a research contract with the
Hasler Foundation, which became part of Ascom-Tech AG. The cipher is patented in a number of
countries but is freely available for non-commercial use. The name "IDEA" is also a trademark.
The patents will expire in 2011–2012. Today, IDEA is licensed in all the countries where it is
patented by MediaCrypt. IDEA was used in Pretty Good Privacy (PGP) v2.0, and was incorporated
after the original cipher used in v1.0, BassOmatic, was found to be insecure.  IDEA is an optional
algorithm in the OpenPGP standard. IDEA operates on 64-bit blocks using a 128-bit key, and consists
of a series of eight identical transformations (a round, see the illustration) and an output
transformation (the half-round). The processes for encryption and decryption are similar.

CAST stands for Carlisle Adams and Stafford Tavares, the inventors of CAST. CAST is a popular
64-bit block cipher which belongs to the class of encryption algorithms known as Feistel ciphers.
CAST-128 is a DES-like Substitution-Permutation Network (SPN) cryptosystem. It has the Feistel
structure and utilizes eight fixed S-boxes. CAST-128 supports variable key lengths between 40 and
128 bits. CAST-128 is a 12- or 16-round Feistel network with a 64-bit block size and a key size of
between 40 to 128 bits (but only in 8-bit increments). The full 16 rounds are used when the key size is
longer than 80 bits. Components include large 8×32-bit S-boxes based on bent functions, key-
dependent rotations, modular addition and subtraction, and XOR operations. There are three
alternating types of round function, but they are similar in structure and differ only in the choice of the
exact operation (addition, subtraction or XOR) at various points.

Rivest Cipher 4 (RC4) .RC4 was developed by Ron Rivest in 1987. It is a variable-key-size stream
cipher. It is a cipher with a key size of up to 2048 bits (256 bytes). The algorithm is very fast. Its
security is unknown, but breaking it does not seem trivial either. Because of its speed, it may have
uses in certain applications. It accepts keys of arbitrary length(long key length) RC4 has weaknesses
that argue against its use in new systems. It is especially vulnerable when the beginning of the output
key-stream is not discarded, or non-random or related keys are used; some ways of using RC4 can
lead to very insecure cryptosystems such as WEP. For this reason, it is very important that the same
RC4 key never be used to encrypt two different data streams.
Advanced Encryption Standard (AES) is a symmetric-key encryption standard adopted by the U.S.
government. The standard comprises three block ciphers, AES-128, AES-192 and AES-256, adopted
from a larger collection originally published as Rijndael. Each of these ciphers has a 128-bit block
size, with key sizes of 128, 192 and 256 bits, respectively. The AES ciphers have been analyzed
extensively and are now used worldwide, as was the case with its predecessor, the Data Encryption
Standard (DES).

AES is based on a design principle known as a Substitution permutation network. It is fast in


both software and hardware. Unlike its predecessor, DES, AES does not use a Feistel network.

AES has a fixed block size of 128 bits and a key size of 128, 192, or 256 bits, whereas Rijndael can be
specified with block and key sizes in any multiple of 32 bits, with a minimum of 128 bits. The block
size has a maximum of 256 bits, but the key size has no theoretical maximum.

AES operates on a 4×4 array of bytes, termed the state (versions of Rijndael with a larger block size
have additional columns in the state). Most AES calculations are done in a special finite field.

The AES cipher is specified as a number of repetitions of transformation rounds that convert the input
plaintext into the final output of cipher text. Each round consists of several processing steps, including
one that depends on the encryption key. A set of reverse rounds are applied to transform cipher text
back into the original plaintext using the same encryption key.

You might also like