Sei sulla pagina 1di 13

SCHOOL OF COMPUTING

DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING


1156CS601- MINOR PROJECT
SUMMER /INTENSIVE SEMESTER(19-20)
REVIEW - I

“AN EFFICIENT ALGORITHM FOR SECURE


COMMUNICATION USING DES”

SUPERVISED BY PRESENTED BY

Mrs. P.ARIVUBRAKAN 1. N SAI KUMAR (VTU 6978)(16UECS0302)


2. O RAMESH (VTU 7989)(16UECD0122)
3. SK AZEEZ BABA (VTU 7988)(16UECD0136)

BATCH NO: 14 PRESENTED


1
DATE:07/08/2019
AGENDA

• ABSTRACT
• OBJECTIVE
• INTRODUCTION
• LITERATURE REVIEW
• DESIGN AND METHODOLOGIES
• IMPLEMENTATION
• CONCLUSION
• REFERENCES

BATCH NO: PRESENTED DATE: 2


ABSTRACT

 With the development of information technology and popularization of the


Internet, computer network security has gradually become the focus of
attention.
 The data transmission on the network should ensure its confidentiality,
authenticity, integrity and non-repudiation.
 The only effective way to solve these problems is to use modern
cryptography. It is to make full use of the symmetric key cryptographic
algorithm and the convenience in key management of public key
cryptosystem.
 Here, the most data encryption techniques , especially the AEC and CEC
algorithms are proposed. The application program is in windows operation
system and a data encryption system technology program is designed.

BATCH NO: 14 PRESENTED


3
DATE:07/08/2019
 The system fully combines the symmetric key encryption algorithm and the
public key encryption algorithm to provide a practical model operation for
fast and secure transmission of confidential data.
 It is also laid a practical and basic foundation for establishing a perfect and
tight computer network security mechanism.

BATCH NO: 14 PRESENTED


4
DATE:07/08/2019
OBJECTIVES

 To transfer data without involvement of any third parties.


 To transfer data with more security and reliability.
 To use simple algorithms for the secure communication.
 To make the security codes even more secure, so that no other can breach
the code.

BATCH NO:14 PRESENTED


5
DATE:07/08/2019
INTRODUCTION

 Cryptography is the study and practice of techniques for secured


communications.
 Here the plain text(unencrypted text) is converted into cipher
text(encrypted text).
 The cipher text(encrypted text) is again converted to plain text(decrypted
test)
 The process of converting text form to another form to obtain secured
communication
 Present we are using some algorithms in which a third party i.e., hacker can
involve and can break the encryption

BATCH NO: 14 PRESENTED


6
DATE:07/08/2019
 Here the DES algorithm helps us to increase the reliability of the data.
 The data can’t be hacked here because the breaching of security code is not
possible.
 Here Mat Lab(R-Lab) is used for implementing the DES algorithm.

BATCH NO: 14 PRESENTED


7
DATE:07/08/2019
LITERATURE REVIEW

 SEUNG-JO-HAN, Heang-Soo-Oh,2017, “The improved data encryption


standard (DES) algorithm”, IEEE
The DES must be stronger than the cryptosystems in the security.
 Dudhatra Nilesh, Malti Nagle, 2018, “The New Cryptography Algorithm
with High throughput”, IEEE
Algorithm has been compared by using some components like throughput of key
generation, to generate Encryption text and to generate Decryption text. If any brute force attacks
are applied on this algorithm, how much security is provided by this algorithm is included. In this
algorithm some arithmetic and logical mathematical operations are performed.
Tingyuan Nie, Teng Zhang, 2015, “Study of DES and Blowfish
encryption algorithm”, IEEE
Here we evaluated performance in execution speed based on different memory sizes
and compared them. The experimental results show the relationship between function run speed
and memory size.

BATCH NO: 14 PRESENTED


8
DATE:07/08/2019
DESIGN AND METHODOLOGIES

Encryption : Conversion of plain text (Unencrypted text) to Cipher text


(encrypted text)

Cryptographic Key

This is a Fdskji93
plain text Cryptographic Algorithm Nkfkjk3f
message jiklmqlm

BATCH NO:14 PRESENTED


9
DATE:07/08/2019
Decryption :
The process of converting cipher text (encrypted text) to plain text
(decrypted text)

Decrypted key

#$%&$?! The plain


Skjgnfkvf Decryption Algorithm text you
z3@4yhl entered

BATCH NO: 14 PRESENTED


10
DATE:07/08/2019
IMPLEMENTATION
Sender
Plain text P
Decimal String

Public key e, n Blocks of numbers


P1,p2,p3………pn

Cipher text C
Private key d, n C1=P1^e mod n
C2=P2 ^e mod n
.

E, p, q
Recovered Decimal
Text
P1=C1^d mod n
Random number
P2=C2^d mod n
generator
BATCH NO: 14 PRESENTED
11
DATE:07/08/2019
CONCLUSION

• Cryptography is used for secured communication. So that no third party


can be involved in the communication and one can’t breach the security
keys. It is very difficult to the breach the code and to enter into the
communication. Using DES we can provide more security and reliability to
the data in the communication.

BATCH NO:14 PRESENTED


12
DATE:07/08/2019
REFERENCES(as per IEEE format only)

 SEUNG-JO-HAN, Heang-Soo-Oh,2017, “The improved data encryption


standard (DES) algorithm”, IEEE , volume no:16, issue no:7, page no:32-
39.
 Dudhatra Nilesh, Malti Nagle, 2018, “The New Cryptography Algorithm
with High throughput”, IEEE , vol:38, issue no:3, page no:243-250.
 Tingyuan Nie, Teng Zhang, 2015, “Study of DES and Blowfish
encryption algorithm”, IEEE, vol:4, issue no:1.
 E.Biham, A.Shamir,1992,”Differential cryptanalysis of the full 16
round DES”, IEEE, vol:4, issue no:12.

BATCH NO:14 PRESENTED


13
DATE:07/08/2019

Potrebbero piacerti anche