Contact Me @ +91-9953926905

Thursday, January 6, 2011

Security Techniques & Encryption Algorithms

Now a days a security is necessary for the any application.Taking an example of india-pakistan.The war is not going only at physical side but also the digital(cyber side).Pakistani hackers are hacking indian websites and indian hackers are hacking paskitani websites.So the security is necessary.
Generally Encryption algorithms are used for the security purpose.Generally these are divided into to parts.
A.Symentic key encryption :- in this encryption the key which is used to encrypt the data is same for the sender and the receiver.
B.Public key encryption :- in this the key which is going to be used for the encryption algorithm is different for the sender and the receiver.It is based on the public key and private key.
There are lots of techniques of encryption algorithms.Several techniques i am showing here.
(1) Steam Ciphering and block ciphering :- It looks at the input palintext(data | information )as a stream of bits and encrypts them one bit(or byte) at a time as the steam progresses.In this technique, the length of the Plaintext and the key size will be same.Wireless LAN uses steam Cipher
In block cipher ,one whole block of plaintext is take to produce the ciphertext block(encrypted block) of equal length.Block may be of 64 bits or the 128 bits.
(2) Symmetric Key Cryptography :- Here the same key is used for the both side of encryption and the decryption.It is like a lock where the same key is used for it to lock and the unlock it.It is called also convential classical algorithms.
In this cryptography there are four components.
1.Plaintext
2.Encryption/Decryption algorithms
3.Secret Key
4.Cipher Text(Encrypted Text)
Where c1 c2 are the cipher text p1 p2 are the plain text Ek is the encryption algorithms where k defiens the Key.and same as Dk is the decryption algorithms where K defines the key.
Here in 1st phase if the cipher text is generated then it is the key for the next plaintext to produe the new cipher text.same as in decryption.
This algorithms have many types some of are here.
  1. DES Data encryption standard,this algorithm is the most widely used,researched a lot time and implemented new things day by day.
  2. 3DES - Here on plain text the DES algorythm is implemented 3 times to make that Plaintext more encrypted for the security incesement.
  3. AES Advance Encryption Standards,This is the current accepted standard for the encryption by FIPS(Fedaral Information Processing Standard) Of USA.
  4. Skipjack/FORTEZZA :- This is the token based symentric algorithm used by defence personnel in US.
(3) DES (Data Encryption Standard) :- It employees the principle of scrambling and substitution.This process are repeated the numbers of times with keys to ensure that the palintext is completely transofrmed into a throughlt scrambled bit stream.
Working of DES :-
3DES(Tripple DES) :- It uses the same DES algoritm 3 times in succession with different keys.This incereses the keysize resulting in higher security.There are 2 different flavour of 3DES.One uses two 56 bit key and the other uses three 56 bits keyy.By using three 56 bits key,the effective security can be incresed to the key size,to 168 bits.3DES is used widely in the world now a days for the reason of the security purpose.
(4) AES (Advance Encryption Standard) :- DES algorithm widely used over the world.But after starting the use they come to know that this encryption algorithm have some drwabacks.so to overcome the drwabacks AES came.AES had to be a symmetric cipher with block size of 128 bits.it supports the key of 128- bits,192bits and 256 bits.
Characteristics of AES :-
1.Design Simplicity.
2.Resistance against all famous known attacks.
3.Wide range of platforms.
4.Speed and coe compactness.
In Each Block the operation works as per shown in the below figure.
(5) Public Key Cryptography :- Here is not like symetric key encrtption.Here at the both side the key is defferent which is going to be used for the encryption and the decryption.These encryption and the decryption keys are the key of 1 pairs.one of these keys from the key pair is made public and another one kept private or the secret.
(Author Chintan Gurjar )
Posted By :- Chintan Gurjar

11 Visitor Reactions & Comments:

Amarjit Singh said...

This is what I like about you most. Wonderful post.

Handsome DeviL said...

Its a quality post yar...i also like to start from the deep..thats y i have made this...

Amarjit Singh said...

Keep it up dude

Handsome DeviL said...

Thanx Uncle.. :P

H[4]ck3r said...

nice post.. the basic of data security over unsecure channel..

Handsome DeviL said...

@H[4]ck3r Thank You Buddy.

WeBeXpLoiT said...

But if the packet was captured then it is easy to decrypt key ?

Handsome DeviL said...

in most of case the answer is "no" because if i captured the packet then i have to find that which encryption technique the guy has used. If the guy is very clever then he has done 3 or more than 3 times encryption.. And which algo he has used how would we come to know..AES DES 3DES PUBLIC KEY CRYPTOGRAPHY OR MD5 SHA1 MD4 So its to difficult to do that...

H[4]ck3r said...

decryption by an attacker depends on his cryptanalysis... and all these algorithms use a long key. So brute force attack will take many years to break by the system available this time... and these algo use diffusion and confusion theory so statics based cryptanalysis is almost impossible..

Handsome DeviL said...

@H[4]ck3r that was i said in my comment..na...

anti spam software said...

This hacking technique should only be used when necessary.