Sei sulla pagina 1di 23

# ALL SAINTS’ COLLEGE OF TECHNOLOGY

GANDHINAGAR, BHOPAL

PRESENTED BY :

## NABILA ALI & IFFAT KHAN

A Dynamic
Modular Cipher Cryptography Technique
WHAT IS

CRYPTOGRAPHY?
INTRODUCTION

##  Security is a broad topic and covers a multitude of sins.

 it is concerned with making sure that nosy people cannot read, or worse
yet, secretly modify messages intended for other recipients.

##  Network Security problems can be divided into 4 areas:

i. Confidentiality ii. Authentication
iii. Non-repudiation iv. Integrity

##  Today’s major concept information security is to continue improve encryp

tion algorithm.
CRYPTOGRAPHY
 The Art and the Science of keeping messages secure is Cryptography.

##  Cryptography includes techniques such as encryption/decryption, hashing,

digital signatures, timestamps etc. to ensure information security

##  The main goals of Cryptography are:

1. Confidentiality
2. Authentication
3. Integrity
4. Non-repudiation

 In order for cryptography to serve its purposes well, secure and reliable crypt
ographic algorithms are necessary.
TERMINALOGY AND CONCEPTS

##  Cipher Text – Message altered to ne unreadable by anyone except the

intended recipient.

##  Key - Sequences that controls the operation and behavior of

the cryptographic algorithm. Keys are rules that used in algorithm to conve
rt a documents into secret document.
CRYPTOGRAPHY
TECHNIQUE

SECRET-KEY PUBLIC-KEY
CRYPTOGRAHY CRYPTOGRAPHY

## TYPES OF CRYPTOGRAPHY TECHNIQUE

EK(M)=C DK(C)=M

SYMMETRIC-KEY CRYPTOGRAPHY
MODULE CIPHER & STREAM CIPHER

Module Cipher –

• In this, plain text is divided into blocks of fixed length and algorithms are
applied to each block separately.

## • 128-bit Module of plaintext as input, and output a corresponding 128-bit

Module of cipher text.

Stream Cipher –

## • They encrypt individual characters of a plaintext message one at a time usi

ng an encryption transformation which varies with time.

## • They are word-oriented.

EK1(M)=C DK2(C)=M

K1 K2

PUBLIC-KEY CRYPTOGRAPHY
DYNAMIC KEY

• The dynamic key is the new and advance concept in the field of cryptography.

• Once the cryptographic operation executed the key has been discarded. The
concept of dynamic key is based on OTP.

• In this either a long message is divided in too many part or there are many m
essage in both case each message is encrypted with the help of sub keys.

## • Sub keys never share their complete info except few.

A DYNAMIC MODULAR
CIPHER CRYPTOGRAPHY TECHNIQUE

## 2. Dynamic Key Generation function.

3. Encryption procedure.

4. Decryption procedure.
MODULER DYNAMIC KEY GENERATION

## • In this algorithm, encryption of variable size plaintext is performed using a dyn

amic key of size 164 bits.

• User input a text key ‘IK’ .Minimum size of IK is 6 bits and it can have maximu
m 14 bits.

## Y1=a * yo+ b mod m

• ‘IBK’ is concatenated with the key entered by user to produce a matrix of
size 14X14.

## • The function Fr involves various matrix operations such as multiplication,

shift operation, modulus etc .

## • In which the random number yo is added to the final matrix to produce

the dynamic key.
MATRIX

TRANSPOSITION

TRANSPOSE (P’)

DK1 XOR

FRAGMENTARY CIPHER1

## ENCRYPTION PROCEDURE : ITERATION 1

ENCRYPTION PROCEDURE : ITERATION 2
DECRYPTION PROCEDURE : ITERATION 1
DECRYPTION PROCEDRE : ITERATION 2
FUNCTION USED IN ENCRYPTION & DECRYPTION

## TRANPOSITION CIPHER FUNCTION

• In this, the units of the plaintext are rearranged in a different and usually q
uite complex order .
PERFORMANCE ANALYSIS

## IN COMPARISION OF DYNAMIC KEY & SESSION KEY

IN COMPARISION OF TIME COMPLEXITIES
CONCLUSION

## • The main merit of the algorithm is little amounting of computational tim

e that one has to spend to encrypt a message.

• This algorithm uses the concept of dynamic key & modular cipher which
gives high peed, time & security.

• More work on the key size and key sharing technique may be optimized
in future.
THANK YOU
for listening