SlideShare a Scribd company logo
Secure communication
Most popular encryption algorithms overview
Agenda
One-time pad
Stream ciphers
A5/1
Symmetric block ciphers
DES (weak), 3DES (secure), AES (secure)
Asymmetric block ciphers
RSA (slow)
Elliptic curves (fast)
One-time pad
Main features:
Totally secure crypto technic
A key has to be the same length as
a plain text
A key has to be truly random
XOR operation is often used to
combine a key and a text
Impractical in most cases due to the
above key length requirement
Stream ciphers
Inspiration from the one-time pad
Types:
synchronous
self-synchronizing
LFSR (linear feedback shift registers)
A5/1 stream cipher
Features:
Used in GSM networks
114 bit length keystream
Based on three LSFRs
Successful attacks exist
DES
DES, Data Encryption Standard, was
developed in the 1970s at IBM and
based on design of Horst Feistel.
It is a symmetric-key algorithm based
on Feistel network.
Key size is 56 bits only and it is
considered insecure now.
3DES
3DES - Triple DES
Brute force attack on 2DES can use
“meet in the middle” technique.
It is a symmetric-key algorithm based
on Feistel network.
Key size is 168 bits only and it is
considered insecure now.
AES
AES, Advanced Encryption Standard,
established in 2001 by the NIST and
based on design of Joan Daemen
and Vincent Rijmen.
It is a symmetric-key algorithm based
on Galois field.
Supported key sizes are 128, 192 or
256 bits.
Block cipher modes
A mode of operation is used to encrypt more than one block of plain
data. The following is the list of some popular modes:
ECB - Electronic Codebook - the simplest mode
CBC - Cipher Block Chaining
OFB - Output Feedback - makes a synchronous stream cipher
CFB - Cipher Feedback - makes a self-synchronizing stream cipher
CTR - Counter - makes a synchronous stream cipher
RSA
RSA, described in 1977, was called
after its inventors Ron Rivest, Adi
Shamir, and Leonard Adleman.
It is a public key algorithm.
Key size could be in range of 1024 to
4096 bits
It is a relatively slow algorithm and
usually used to share keys for
symmetric algorithms.
Elliptic curve cryptography
It is based on the algebraic structure of
elliptic curves.
This is the fastest public key algorithm
as of now.
256 bit ECC public key provides
security compared to 3072 bit RSA
public key.
References
Introduction to Cryptography by Christof Paar
Cryptography and Computer Privacy
My blog
Learning Network Programming

More Related Content

PPT
block ciphers
Asad Ali
 
PPTX
RC 4
Sovan Paul
 
PPT
DES (Data Encryption Standard) pressentation
sarhadisoftengg
 
PPTX
Information and data security block cipher and the data encryption standard (...
Mazin Alwaaly
 
PPT
Block Ciphers Modes of Operation
Shafaan Khaliq Bhatti
 
PPTX
Data Encryption Standard (DES)
Haris Ahmed
 
PDF
Authenticated Encryption Gcm Ccm
Vittorio Giovara
 
PPT
13528 l8
ridhika_gulati
 
block ciphers
Asad Ali
 
RC 4
Sovan Paul
 
DES (Data Encryption Standard) pressentation
sarhadisoftengg
 
Information and data security block cipher and the data encryption standard (...
Mazin Alwaaly
 
Block Ciphers Modes of Operation
Shafaan Khaliq Bhatti
 
Data Encryption Standard (DES)
Haris Ahmed
 
Authenticated Encryption Gcm Ccm
Vittorio Giovara
 
13528 l8
ridhika_gulati
 

What's hot (20)

PDF
Block Ciphers Modes of Operation
Roman Oliynykov
 
PDF
Ch 12: Cryptography
Sam Bowne
 
PPTX
Information and data security advanced encryption standard (aes)
Mazin Alwaaly
 
PDF
Block Cipher Modes of Operation And Cmac For Authentication
Vittorio Giovara
 
PPTX
Cryptography - 101
n|u - The Open Security Community
 
PDF
Data encryption techniques and standard
Dr Sarika Jadhav
 
PDF
Triple Data Encryption Standard (t-DES)
Hardik Manocha
 
ODP
Encryption Techniques
Del Elson
 
PPTX
Block Cipher
Brandon Byungyong Jo
 
PPTX
Block cipher modes of operation
harshit chavda
 
PPT
Cryptography and Network Security
Ramki M
 
PPT
Des lecture
ANIKET UTTAM
 
PPTX
Cryptographic Algorithms: DES and RSA
aritraranjan
 
PPT
Data encryption standard
chauhankapil
 
PPTX
Overview on Cryptography and Network Security
Dr. Rupa Ch
 
PPTX
Information and network security 18 modern techniques block ciphers
Vaibhav Khanna
 
PPTX
Trible data encryption standard (3DES)
Ahmed Mohamed Mahmoud
 
ODP
Network Security Topic 3 cryptography
Khawar Nehal [email protected]
 
PPT
Moein
itrraincity
 
PPT
Stream ciphers presentation
degarden
 
Block Ciphers Modes of Operation
Roman Oliynykov
 
Ch 12: Cryptography
Sam Bowne
 
Information and data security advanced encryption standard (aes)
Mazin Alwaaly
 
Block Cipher Modes of Operation And Cmac For Authentication
Vittorio Giovara
 
Data encryption techniques and standard
Dr Sarika Jadhav
 
Triple Data Encryption Standard (t-DES)
Hardik Manocha
 
Encryption Techniques
Del Elson
 
Block Cipher
Brandon Byungyong Jo
 
Block cipher modes of operation
harshit chavda
 
Cryptography and Network Security
Ramki M
 
Des lecture
ANIKET UTTAM
 
Cryptographic Algorithms: DES and RSA
aritraranjan
 
Data encryption standard
chauhankapil
 
Overview on Cryptography and Network Security
Dr. Rupa Ch
 
Information and network security 18 modern techniques block ciphers
Vaibhav Khanna
 
Trible data encryption standard (3DES)
Ahmed Mohamed Mahmoud
 
Network Security Topic 3 cryptography
Khawar Nehal [email protected]
 
Stream ciphers presentation
degarden
 
Ad

Viewers also liked (13)

PPTX
Network sockets
Denys Haryachyy
 
PPTX
C++ 11
Denys Haryachyy
 
PPTX
Git basics
Denys Haryachyy
 
PPTX
Understanding iptables
Denys Haryachyy
 
PPTX
DPDK KNI interface
Denys Haryachyy
 
PPTX
Vagrant
Denys Haryachyy
 
PPTX
History of the personal computer
Denys Haryachyy
 
PPTX
Understanding DPDK algorithmics
Denys Haryachyy
 
PPTX
Understanding DPDK
Denys Haryachyy
 
PPTX
Security in Data Communication and Networking
Zahidul Hossain
 
PDF
DPDK Summit - 08 Sept 2014 - Intel - Networking Workloads on Intel Architecture
Jim St. Leger
 
PDF
DPDK Summit 2015 - Intel - Keith Wiles
Jim St. Leger
 
PDF
Intel DPDK Step by Step instructions
Hisaki Ohara
 
Network sockets
Denys Haryachyy
 
Git basics
Denys Haryachyy
 
Understanding iptables
Denys Haryachyy
 
DPDK KNI interface
Denys Haryachyy
 
History of the personal computer
Denys Haryachyy
 
Understanding DPDK algorithmics
Denys Haryachyy
 
Understanding DPDK
Denys Haryachyy
 
Security in Data Communication and Networking
Zahidul Hossain
 
DPDK Summit - 08 Sept 2014 - Intel - Networking Workloads on Intel Architecture
Jim St. Leger
 
DPDK Summit 2015 - Intel - Keith Wiles
Jim St. Leger
 
Intel DPDK Step by Step instructions
Hisaki Ohara
 
Ad

Similar to Secure communication (20)

PPT
Cryptography Lecture by Sam Bowne
SecurityTube.Net
 
PPT
Ch12 Cryptography it-slideshares.blogspot.com
phanleson
 
PDF
Chapter 8 cryptography lanjutan
newbie2019
 
PDF
CISSP Prep: Ch 4. Security Engineering (Part 2)
Sam Bowne
 
PPT
Cryptography
amiable_indian
 
PPT
Block Cipher Stream Cipher DESUnit 3.ppt
SuryaBasnet3
 
PDF
Network security
Sisir Ghosh
 
PPT
Day5
Jai4uk
 
PPTX
Modern symmetric cipher
Rupesh Mishra
 
PPT
Unit V network management and security
sangusajjan
 
PPT
Ch11 Basic Cryptography
Information Technology
 
PDF
Basic Cryptography.pdf
Setiya Nugroho
 
DOC
Encryption
Vijay Kumar
 
PPTX
Ch02 NetSec5e Network Security Essential Chapter 2.pptx
ridozulfahmi1
 
PPT
CISSP EXAM PREPARATION FOR A PASSED SCORE
rinelaam
 
PPTX
Cryptography and Network Security-MOD_3.pptx
MrsPrajnaUR
 
PPTX
Introduction to Network Security presentation
krishkiran2408
 
PPT
Class3
ankitasinghbsc
 
PPT
Network Security and Cryptography
Adam Reagan
 
ODP
Encryption basics
Kevin OBrien
 
Cryptography Lecture by Sam Bowne
SecurityTube.Net
 
Ch12 Cryptography it-slideshares.blogspot.com
phanleson
 
Chapter 8 cryptography lanjutan
newbie2019
 
CISSP Prep: Ch 4. Security Engineering (Part 2)
Sam Bowne
 
Cryptography
amiable_indian
 
Block Cipher Stream Cipher DESUnit 3.ppt
SuryaBasnet3
 
Network security
Sisir Ghosh
 
Day5
Jai4uk
 
Modern symmetric cipher
Rupesh Mishra
 
Unit V network management and security
sangusajjan
 
Ch11 Basic Cryptography
Information Technology
 
Basic Cryptography.pdf
Setiya Nugroho
 
Encryption
Vijay Kumar
 
Ch02 NetSec5e Network Security Essential Chapter 2.pptx
ridozulfahmi1
 
CISSP EXAM PREPARATION FOR A PASSED SCORE
rinelaam
 
Cryptography and Network Security-MOD_3.pptx
MrsPrajnaUR
 
Introduction to Network Security presentation
krishkiran2408
 
Network Security and Cryptography
Adam Reagan
 
Encryption basics
Kevin OBrien
 

Recently uploaded (20)

PPTX
ASSIGNMENT_1[1][1][1][1][1] (1) variables.pptx
kr2589474
 
PDF
An Experience-Based Look at AI Lead Generation Pricing, Features & B2B Results
Thomas albart
 
PDF
Download iTop VPN Free 6.1.0.5882 Crack Full Activated Pre Latest 2025
imang66g
 
PPT
Why Reliable Server Maintenance Service in New York is Crucial for Your Business
Sam Vohra
 
PDF
ChatPharo: an Open Architecture for Understanding How to Talk Live to LLMs
ESUG
 
PPTX
classification of computer and basic part of digital computer
ravisinghrajpurohit3
 
PDF
Salesforce Implementation Services Provider.pdf
VALiNTRY360
 
PPTX
ConcordeApp: Engineering Global Impact & Unlocking Billions in Event ROI with AI
chastechaste14
 
PPTX
slidesgo-unlocking-the-code-the-dynamic-dance-of-variables-and-constants-2024...
kr2589474
 
PPTX
The-Dawn-of-AI-Reshaping-Our-World.pptxx
parthbhanushali307
 
PDF
Generating Union types w/ Static Analysis
K. Matthew Dupree
 
PPTX
Web Testing.pptx528278vshbuqffqhhqiwnwuq
studylike474
 
PPTX
Odoo Integration Services by Candidroot Solutions
CandidRoot Solutions Private Limited
 
PDF
Summary Of Odoo 18.1 to 18.4 : The Way For Odoo 19
CandidRoot Solutions Private Limited
 
PDF
vAdobe Premiere Pro 2025 (v25.2.3.004) Crack Pre-Activated Latest
imang66g
 
PPTX
AI-Ready Handoff: Auto-Summaries & Draft Emails from MQL to Slack in One Flow
bbedford2
 
PDF
49784907924775488180_LRN2959_Data_Pump_23ai.pdf
Abilash868456
 
PDF
Enhancing Healthcare RPM Platforms with Contextual AI Integration
Cadabra Studio
 
PPTX
Explanation about Structures in C language.pptx
Veeral Rathod
 
PPTX
Maximizing Revenue with Marketo Measure: A Deep Dive into Multi-Touch Attribu...
bbedford2
 
ASSIGNMENT_1[1][1][1][1][1] (1) variables.pptx
kr2589474
 
An Experience-Based Look at AI Lead Generation Pricing, Features & B2B Results
Thomas albart
 
Download iTop VPN Free 6.1.0.5882 Crack Full Activated Pre Latest 2025
imang66g
 
Why Reliable Server Maintenance Service in New York is Crucial for Your Business
Sam Vohra
 
ChatPharo: an Open Architecture for Understanding How to Talk Live to LLMs
ESUG
 
classification of computer and basic part of digital computer
ravisinghrajpurohit3
 
Salesforce Implementation Services Provider.pdf
VALiNTRY360
 
ConcordeApp: Engineering Global Impact & Unlocking Billions in Event ROI with AI
chastechaste14
 
slidesgo-unlocking-the-code-the-dynamic-dance-of-variables-and-constants-2024...
kr2589474
 
The-Dawn-of-AI-Reshaping-Our-World.pptxx
parthbhanushali307
 
Generating Union types w/ Static Analysis
K. Matthew Dupree
 
Web Testing.pptx528278vshbuqffqhhqiwnwuq
studylike474
 
Odoo Integration Services by Candidroot Solutions
CandidRoot Solutions Private Limited
 
Summary Of Odoo 18.1 to 18.4 : The Way For Odoo 19
CandidRoot Solutions Private Limited
 
vAdobe Premiere Pro 2025 (v25.2.3.004) Crack Pre-Activated Latest
imang66g
 
AI-Ready Handoff: Auto-Summaries & Draft Emails from MQL to Slack in One Flow
bbedford2
 
49784907924775488180_LRN2959_Data_Pump_23ai.pdf
Abilash868456
 
Enhancing Healthcare RPM Platforms with Contextual AI Integration
Cadabra Studio
 
Explanation about Structures in C language.pptx
Veeral Rathod
 
Maximizing Revenue with Marketo Measure: A Deep Dive into Multi-Touch Attribu...
bbedford2
 

Secure communication

  • 1. Secure communication Most popular encryption algorithms overview
  • 2. Agenda One-time pad Stream ciphers A5/1 Symmetric block ciphers DES (weak), 3DES (secure), AES (secure) Asymmetric block ciphers RSA (slow) Elliptic curves (fast)
  • 3. One-time pad Main features: Totally secure crypto technic A key has to be the same length as a plain text A key has to be truly random XOR operation is often used to combine a key and a text Impractical in most cases due to the above key length requirement
  • 4. Stream ciphers Inspiration from the one-time pad Types: synchronous self-synchronizing LFSR (linear feedback shift registers)
  • 5. A5/1 stream cipher Features: Used in GSM networks 114 bit length keystream Based on three LSFRs Successful attacks exist
  • 6. DES DES, Data Encryption Standard, was developed in the 1970s at IBM and based on design of Horst Feistel. It is a symmetric-key algorithm based on Feistel network. Key size is 56 bits only and it is considered insecure now.
  • 7. 3DES 3DES - Triple DES Brute force attack on 2DES can use “meet in the middle” technique. It is a symmetric-key algorithm based on Feistel network. Key size is 168 bits only and it is considered insecure now.
  • 8. AES AES, Advanced Encryption Standard, established in 2001 by the NIST and based on design of Joan Daemen and Vincent Rijmen. It is a symmetric-key algorithm based on Galois field. Supported key sizes are 128, 192 or 256 bits.
  • 9. Block cipher modes A mode of operation is used to encrypt more than one block of plain data. The following is the list of some popular modes: ECB - Electronic Codebook - the simplest mode CBC - Cipher Block Chaining OFB - Output Feedback - makes a synchronous stream cipher CFB - Cipher Feedback - makes a self-synchronizing stream cipher CTR - Counter - makes a synchronous stream cipher
  • 10. RSA RSA, described in 1977, was called after its inventors Ron Rivest, Adi Shamir, and Leonard Adleman. It is a public key algorithm. Key size could be in range of 1024 to 4096 bits It is a relatively slow algorithm and usually used to share keys for symmetric algorithms.
  • 11. Elliptic curve cryptography It is based on the algebraic structure of elliptic curves. This is the fastest public key algorithm as of now. 256 bit ECC public key provides security compared to 3072 bit RSA public key.
  • 12. References Introduction to Cryptography by Christof Paar Cryptography and Computer Privacy