Top Banner
A Novel Encryption, Decryption Process Using Permutation Choice Y.S.R Engineering College Of Y.V.U::Proddatur Presenting By : I. Raja Sekhar Reddy IV B.Tech CSE 1011102026 E-mail:[email protected]
20
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: new encryption technique

A Novel Encryption, Decryption Process Using

Permutation Choice

Y.S.R Engineering College Of Y.V.U::Proddatur

Presenting By :

I. Raja Sekhar Reddy

IV B.Tech CSE

1011102026

E-mail:[email protected]

Page 2: new encryption technique

• Introduction

• Existing Method

• Proposed Method

• Features

• Conclusion

Contents:

Page 3: new encryption technique

What is Security?

Why we need to provide Security?

How the security will be provided?

Introduction:

Page 4: new encryption technique

Encryption and Decryption:

Page 5: new encryption technique

• Confidentiality

• Integrity

• Authentication

• Non-repudiation

SECURITY SERVICES:

Page 6: new encryption technique

EXISTING METHOD:

Page 7: new encryption technique
Page 8: new encryption technique

The proposed method consists of

Encryption

Single round encryption

Key generation

Round function

Decryption

Single round decryption

Key generation

Round function

PROPOSED METHOD:

Page 9: new encryption technique

ENCRYPTION:

Page 10: new encryption technique

SINGLE ROUND ENCRYPTION:

Page 11: new encryption technique

KEY GENERATION:

Page 12: new encryption technique

ROUND FUNCTION:Selection inputs Round Function

S3 S2 S1 S0

0 0 0 0 F1

0 0 0 1 F2

0 0 1 0 F3

0 0 1 1 F4

0 1 0 0 F5

0 1 0 1 F6

0 1 1 0 F7

0 1 1 1 F8

1 0 0 0 F9

1 0 0 1 F10

1 0 1 0 F11

1 0 1 1 F12

1 1 0 0 F13

1 1 0 1 F14

1 1 1 0 F15

1 1 1 1 F16

Page 13: new encryption technique

DECRYPTION:

Page 14: new encryption technique

SINGLE ROUND DECRYPTION:

Page 15: new encryption technique

KEY GENERATION:

Page 16: new encryption technique

ROUND FUNCTION:Selection lines Round Function

S3 S2 S1 S0

0 0 0 0 F1

0 0 0 1 F2

0 0 1 0 F3

0 0 1 1 F4

0 1 0 0 F5

0 1 0 1 F6

0 1 1 0 F7

0 1 1 1 F8

1 0 0 0 F9

1 0 0 1 F10

1 0 1 0 F11

1 0 1 1 F12

1 1 0 0 F13

1 1 0 1 F14

1 1 1 0 F15

1 1 1 1 F16

Page 17: new encryption technique

FEATURES:

More secure

Key size will be 1024-bit

Plain text block size will be 2048-bit

Round function will be changed to round to round

Page 18: new encryption technique

The goal of the encryption algorithm designing is to frustrate the hackers andmakes the cryptanalysis difficult. The key value play more important role inencryption process. Altering each value of the plain text to get the final cipher textmake the cryptanalysis still more complex. The goal of the present paper is toincrease the security which makes complex to break. The round function andpermutation choices are not fixed, it is changed according to the user.

Conclusion:

Page 19: new encryption technique

Any Queries?

Page 20: new encryption technique

THANK YOU