Devising is the act of planning, inventing
(Subsitution Cipher)
1
AES, DES
Columnar Transposition Cipher
Rijndeal cipher
Rijndael is a family of ciphers that encrypt and decrypt data in 128-bit blocks.
The name Rijndael comes from the names of its Belgian creators, Joan Daemen and Vincent Rijmen.
2
Security through obscurity is a controversial principle that equates “secrecy” with “security.”
3
4
5
6
7
8
doo·uh·bl
feasible
9
10
11
Symmetric Key Algorithm
12
13
DES is a block cipher that operates on data
blocks of 64 bits in size. DES uses a
64-bit key 8 × 8 including 1 bit for parity,
so the actual key is 56 bits.
-12
pico = 10
The Data Encryption Standard (DES) is a symmetric-key block cipher that operates on 64-bit blocks of data.
It uses a key of 56 bits, but due to the inclusion of parity bits, the effective key size is 48 bits. DES operates
through a series of 16 rounds, each using a different 48-bit round key generated from the original 56-bit key.
14
Advanced Encryption Standard
Diffe-Hellman Key Exchange 1976 originally conceptualized by Ralph Merkle and
published by Whitfield Diffie and Martin Hellman
RSA is asymmetric crypto algorithm proposed 1978 by Ron Rivest, Adi Sharmir and Len Adleman at MIT
Rijndael cipher : Pronounce as rin-dale
Rijndael is a family of ciphers that encrypt and decrypt data in 128-bit blocks.
The name Rijndael comes from the names of its Belgian creators, Joan Daemen and Vincent Rijmen.
The number of rounds in Rijndael depends on the key size. It uses 10 rounds for 128-bit keys, 12 rounds for 192-bit keys,
and 14 rounds for 256-bit keys.
DES operates through a series of 16 rounds
15
16
17
18
19
AES Expansion/Schedule
20
The number of rounds depends on
the key length as follows :
128 bit key – 10 rounds
192 bit key – 12 rounds
256 bit key – 14 rounds
21
22
AES Selection Criteria
23
24
25
26
27
28
29
Dealing with Block Swapping and Replay Attacks
30
31
32
The MD5 (message-digest algorithm) hashing algorithm is a one-way cryptographic function that
accepts a message of any length as input and returns as output a fixed-length digest value to be
used for authenticating the original message.
Non-trivial: tasks that are extremely difficult and time consuming.
Nonce: In cryptography, a nonce is an arbitrary number that can be used just once in a cryptographic
communication.
Block Cipher Mode of Operation
33
ECB: Electronic Code Book Mode
CBC: Cipher Block Chaining Mode
CFB: Cipher Feedback Mode
CTR: Counter
OFB: Output Feedback Modes
34
35
CTR (short for counter), CTR is similar to OFB
36
Diffie-Hellman Symmetric Key Exchange Protocol
37
38
39
Modular Arithmetic
40
21 + 9 -9 + 9 (mod 10)
41
42
43
Euler Totient Theorem
44
45
46
47
RSA Asymmetric Crypto Algorithm
RSA is used primarily for secure key exchange and
digital signatures.
RSA is more computationally intensive than AES, and much slower.
It's normally used to encrypt only small amounts of data.
48
49
50
51
52
Understanding RSA with OpenSSL
53
54
55
Use Crypto API to Encrypt and Decrypt
56
Public-Key Cryptography Standards #7
57
58
Use Crypto API to Sign and Verify
59
60
Mini Capstone: Enhance Registration Web Site Security
61
62
63
64