logo

Encryption Algorithm Assignment

   

Added on  2020-10-05

6 Pages1103 Words186 Views
Encryption Algorithm

TABLE OF CONTENTSINTRODUCTION...........................................................................................................................1MAIN BODY..................................................................................................................................1Level of security provided by Triple DES and RSA..................................................................1CONCLUSION................................................................................................................................2REFERENCES................................................................................................................................3

INTRODUCTIONEncryption Algorithm is commonly used to convert the secured data into Cipher text byapplying some computation techniques. This can be referred as a process by which scrambledinformation can be transformed into unscrambled words by adopting various mathematical steps.This meaningless data can be again brought back to original form using key to unlock those dataconversions. This report will cover 3 DES (Data Encryption Standard) and RSA (Rivest, AdiShamir and Leonard Adleman) method to secure the confidential data into cipher format. Thestudy is completely based on cryptography techniques which provides various methods toconvert data into non readable form.MAIN BODYLevel of security provided by Triple DES and RSAInformation security of large confidential data is the huge matter of concern in thismodern world so to secure this data cryptography has provided various methods to convert thereadable data into unreadable format. Cipher and decipher are the two terms which are used tolock or unlock the encrypted data. Considering these factors, various algorithms are designed toconvert scrambled words into unscrambled form (Patil and et.al., 2016). Multiple algorithmicsteps are involved to transfer the information security. Triple Data Encryption Standard and RSAare two popularly used techniques among all. This encryption methods are described below:Triple data encryption standard3 DES technique was mainly designed to provide powerful data security by applyingDES cipher algorithm three times in each data block. It is a symmetric-key block cipher whichadopts simple method of increasing the key size of DES in order to protect confidential data frominformation hackers (Khan and Tuteja, 2015). Total key length of triple DES is 168 bits in whichthree 56 bits of keys are involved. This cryptographic method uses a “key bundle” whichcontains 3 DES keys namely, k1, k2, k3. These are 56 bits long keys which uses a computationalformula to convert plain text into cipher text such as cipher text= Ek(DK(Ek (Plaintext)). Inthis formula, DES will contain 3 keys for encrypting the plain text into unscramble words wherek1 is used to encrypt the text while k2 is used to again decrypt that cipher text and finally thirdkey is applied to encrypt that combined data.In this way, reverse formula need to be applied in case of decryption which is as follows:1

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Assignment On Wireless Networking Concepts (Doc)
|9
|1534
|47

Principles and Methods in Cryptographic Security | PPT
|12
|646
|11

Security in Information Technology | Assignments
|13
|3545
|119

Analysis of Ciphers Techniques
|14
|2343
|240

Principle and Method in Cryptographic Security | Discussion
|4
|638
|19

World Interoperability Assignment PDF
|6
|1956
|35