five models of symmetric key algorithm
#1

[attachment=6589]
five models of symmetric key algorithm

Give a detail Compative study of all five models of symmetric key algorithm?
Ans. Secret Key Cryptography
With secret key cryptography, a single key is used for both encryption and decryption. the sender uses the key (or some set of rules) to encrypt the plaintext and sends the ciphertext to the receiver. The receiver applies the same key (or ruleset) to decrypt the message and recover the plaintext. Because a single key is used for both functions, secret key cryptography is also called symmetric encryption.
Secret key cryptography algorithms
Data Encryption Standard (DES)
Digital Encryption Standard (DES) is a symmetric block cipher with 64-bit block size that uses using a 56-bit key. DES encrypts and decrypts data in 64-bit blocks, using a 56-bit key. It takes a 64-bit block of plaintext as input and outputs a 64-bit block of ciphertext. Since it always operates on blocks of equal size and it uses both permutations and substitutions in the algorithm. DES has 16 rounds, meaning the main algorithm is repeated 16 times to produce the ciphertext. It has been found that the number of rounds is exponentially proportional to the amount of time required to find a key using a brute-force attack. So as the number of rounds increases, the security of the algorithm increases exponentially.
• Two important variants that strengthen DES are:
o Triple-DES (3DES): A variant of DES that employs up to three 56-bit keys and makes three encryption/decryption passes over the block; 3DES is also described in FIPS 46-3 and is the recommended replacement to DES.
o DESX: A variant devised by Ron Rivest. By combining 64 additional key bits to the plaintext prior to encryption, effectively increases the keylength to 120 bits.
Advanced Encryption Standard (AES)
In 1997, NIST initiated a very public, 4-1/2 year process to develop a new secure cryptosystem for U.S. government applications. The result, the Advanced Encryption Standard, became the official successor to DES in December 2001. AES uses an SKC scheme called Rijndael, a block cipher designed by Belgian cryptographers Joan Daemen and Vincent Rijmen. The algorithm can use a variable block length and key length; the latest specification allowed any combination of keys lengths of 128, 192, or 256 bits and blocks of length 128, 192, or 256 bits. NIST initially selected Rijndael in October 2000 and formal adoption as the AES standard came in December 2001. FIPS PUB 197 describes a 128-bit block cipher employing a 128-, 192-, or 256-bit key
Rijndael is a block cipher, designed by Joan Daemen and Vincent Rijmen as a candidate algorithm for the AES. AES stands for Advanced Encryption Standard. AES is a symmetric key encryption technique which will replace the commonly used Data Encryption Standard (DES). The Advanced Encryption Standard algorithm approved by NIST in December 2001 uses 128-bit blocks.
The cipher currently supports key lengths of 128, 192, and 256 bits. Each encryption key size causes the algorithm to behave slightly differently, so the increasing key sizes not only offer a larger number of bits with which you can scramble the data, but also increase the complexity of the cipher algorithm.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: the five principles of effective, symmetric multiprocessing in linux ppt, what is five pen pc technology, top five engg, five pen pc technology, five s marathi pdf, top five engineering,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  RSA ALGORITHM IMPLEMENTATION project uploader 2 2,410 26-06-2013, 06:39 PM
Last Post: arora_rachna04
  Resizing image using bilinear interpolation algorithm in MATLAB seminar addict 1 2,675 13-01-2013, 10:15 PM
Last Post: Guest
  Bresenham Line Drawing Algorithm Circle Drawing & Polygon Filling project report helper 1 4,641 16-12-2012, 07:35 AM
Last Post: Guest
  Offline Handwriting Recognition Using Genetic Algorithm project uploader 1 2,641 09-11-2012, 12:27 PM
Last Post: seminar details
  Speech Recognition System Based on Hidden Markov Models ppt seminar paper 1 2,044 27-10-2012, 01:34 PM
Last Post: seminar details
  Stego Machine – Video Steganography using Modified LSB Algorithm seminar details 1 2,455 25-10-2012, 01:40 PM
Last Post: seminar details
  ECONOMIC LOAD DISPATCH WITH VALVE-POINT EFFECT USING ARTIFICIAL BEE COLONY ALGORITHM seminar addict 1 1,883 24-10-2012, 04:02 PM
Last Post: seminar details
  The Geometric Efficient Matching Algorithm for Firewalls seminar details 0 1,212 09-06-2012, 05:16 PM
Last Post: seminar details
  An efficient algorithm for iris pattern recognition using 2D Gabor wavelet details seminar details 0 952 08-06-2012, 01:16 PM
Last Post: seminar details
  An Efficient K-Means Cluster Based Image Retrieval Algorithm using Learning seminar details 0 1,107 08-06-2012, 01:02 PM
Last Post: seminar details

Forum Jump: