Cryptography Techniques
Cryptography Techniques
Cryptographic Techniques
Soumyadip Mal1, Utsab Banerjee2
1
B.Tech 4th year, 2B.Tech 4th year
Department of Electrical Engineering, Netaji Subhash Engineering College,Kolkata,India
Abstract—In today’s age, one which is witnessing a burst of advancement of technology, like never, security and privacy of
information and communication has become a very important aspect. Herein lies the advantages of cryptography and
cryptanalysis. Cryptography is a way that makes sure of the integrity, availability and identification, confidentiality,
authentication of user and as well as security and privacy of data that can be provided to the user. In this paper we have
defined and analyzed various symmetric cryptographic algorithms like DES, Triple DES, Blowfish, AES and IDEA and
asymmetric key cryptographic algorithms like RSA. They have been analyzed on their ability to secure data, key size, block
size, features. We have also forayed into the realms of DNA Cryptography, Elliptic Curves based Cryptography as well as
Quantum Cryptography all of which are emerging trends in the domain of Cryptography but hold massive potential
nonetheless, we believe.
Keywords-- Cryptography, Encryption, DES, Diffie Hellman, RC5, Triple DES, AES, RSA,Quantum
Cryptography,qubits,DNA Cryptography,Elliptic Curve Cryptography,Chaotic Cryptography,Shannon’s diffusion.
I. INTRODUCTION
Cryptography or cryptology is derived from Greek word kryptós meaning "hidden, secret" and graphein, meaning "writing" or
"study"[1][2].It is the study of the science and art behind securing communication from any third parties or the public.Modern
cryptography is mostly based on mathematical theory and computer science practice; cryptographic algorithms are designed
around computational hardness assumptions, making such algorithms hard to break in practice by any adversary. It is theoretically
possible to break such a system, but it is infeasible to do so by any known practical means. These schemes are therefore termed
computationally secure; theoretical advances, e.g., improvements in integer factorization algorithms, and faster computing
technology require these solutions to be continually adapted. There exist information-theoretically secure schemes that provably
cannot be broken even with unlimited computing power—an example is the one-time pad—but these schemes are more difficult to
implement than the best theoretically breakable but computationally secure mechanisms.There have been classical methods of
Crypptography which have been around for some time now.But the more advanced ones have all been invented in the computer
era.Now,let us breakdown a few jargons related to Cryptography before we get into it.
Cryptography Terminologies[2]:
•Plain Text: Any communication in the language that we speak that is the human language, takes the form of plain text. It is
understood by the sender, the recipient and also by anyone who gets an access to that message.
•Cipher Text: Cipher means a code or a secret message. When a plain text is codified using any suitable scheme the resulting
message is called as cipher text.
•Encryption: The process of encoding plain text messages into cipher text messages is called encryption.
•Decryption: The reverse process of transforming cipher text messages back to plain text is called as decryption.
•Key: An important aspect of performing encryption and decryption is the key. It is the key used for encryption and decryption that
makes the process of cryptography secure.
Purpose of Cryptography:
Cryptography serves following purposes[3]:
•Confidentiality: The principle of confidentiality specifies that only the sender and the intended recipient should be able to access
the contents of a message.
•Authentication: Authentication mechanisms help to establish proof of identities. This process ensures that the origin of the
message is correctly identified.
•Integrity: The integrity mechanism ensures that the contents of the message remain the same when it reaches the intended recipient
as sent by the sender.
•Non-repudiation: Non-repudiation does not allow the sender of a message to refute the claim of not sending the message.
•Access Control: Access Control specifies and controls who can access what.
•Availability: The principle of availability states that resources should be available to authorized parties all the times.
In SKC,the sender and the receiver know the same secret code, which is known as key. With the same key messages are encrypted
by the sender and decrypted by the receiver. It can be of 2 types : Stream Buffer, Block Buffer.Stream Buffer: Stream buffer encrypts
the digits of a message one at a time. Stream Cipher functions is used on a stream of data one at time by operating on it by bits. It
consists of two components: 1) a key stream generator and 2) mixing function. Mixing function uses XOR function, and key stream
generator is unit in stream encryption algorithm.
Block cipher : In Block cipher, it takes a number of bits and then encrypt them as a single unit. Data is encrypted/decrypted if data
is in the forms of blocks. In simple words , the plain text is divided into blocks which are used to produce blocks of cipher
textpadding the plaintext in blocks. 64 bits blocks have been commonly used.
Triple DES (3DES): 3DES or the Triple Data Encryption Algorithm (TDEA)[3][15][11] was developed to address the obvious
flaws in DES without designing a whole new cryptosystem. Data Encryption Standard (DES) uses a 56-bit key and is not deemed
sufficient to encrypt sensitive data. 3-DES simply extends the key size of DES by applying the algorithm three times in succession
with three different keys. The combined key size is thus 168 bits (3 times 56). TDEA involves using three 64-bit DEA keys (K1,
K2, K3) in Encrypt-Decrypt-Encrypt (EDE) mode, that is, the plain text is encrypted with K1, then decrypted with K2, and then
encrypted again with K3 [17]. The standards define three keying options:
Option 1, the preferred option, employs three mutually independent keys (K1≠K2≠K3≠K1). It gives keyspace of 3 × 56 = 168 bits
.Option 2 employs two mutually independent keys and a third key that is the same as the first key (K1≠K2 and K3 = K1). This gives
key space of 2 × 56= 112 bits
.Option 3 is a key bundle of three identical keys (K1 = K2 = K3). This option is equivalent to DES Algorithm.In 3-DES the 3-times
iteration is applied to increase the encryption level and average time. It is a known fact that 3DES is slower than other block cipher
methods.
Advanced Encryption Standard (AES): Advanced Encryption Standard (AES)[3][15][11] algorithm not only for security but also
for great speed. Both hardware and software implementation are faster still. New encryption standard recommended by NIST to
replace DES. Encrypts data blocks of 128 bits in 10, 12 and 14 round depending on key size as shown in Figure -2. It can be
implemented on various platforms specially in small devices. It is carefully tested for many security applications.
Algorithm Steps:
i) These steps used to encrypt128-bit block
ii) Usual Round:Execute the following operations which are described above.
1. Sub Bytes
2. Shift Rows
3. Mix Columns
4. Add Round Key , using K(round)
iii) Final Round: Execute the following operations which are described above.
1. Sub Bytes
2. Shift Rows
3. Add Round Key, using K(10)
1. Sub Bytes : The first transformation, Sub Bytes, is used at the encryption site. To substitute a byte, we interpret the byte as two
hexadecimal digits.
2. Shift Rows : In the encryption, the transformation is called Shift Rows.
3. Mix Columns : The Mix Columns transformation operates at the column level; it transforms each column of the state to a new
column.
4. Add Round Key : Add Round Key proceeds one column at a time. Add Round Key adds a round key word with each state
column matrix; the operation in Add Round Key is matrix addition.
The last step consists of XO Ring the output of the previous three steps with four words from the key schedule. And the last round
for encryption does not involve the “Mix columns” step.
v) Decryption: Decryption involves reversing all the steps taken in encryption using inverse functions like
Blowfish: Blowfish is one of the most common public domain encryption algorithms provided by Bruce Schneier -one of the
world's leading cryptologists, and the president of Counterpane Systems, a consulting firm specializing in cryptography and
computer security.The Blowfish algorithm was first introduced in 1993.The blowfish encryption is shown in figure below:
Operation of Blowfish: Blowfish encrypts 64-bit block cipher with variable length key.It contains two parts
•Subkey Generation: This process converts the key upto 448 bits long to subkeys to totaling 4168 bits.
•Data Encryption: This process involves the iteration of a simple function 16 times. Each round contains a key dependent
permutation and key-and data dependent substitution.
Blowfish suits the applications where the key remain onstant for a long time (e.g. communication link encryption) but not where
the key changes frequently (e.g.
packet switching).
IDEA(International Data Encryption Algorithm): DEA[3][15][11] is a block cipher algorithm and it operates on 64-bit plaintext
blocks. The key size is 128 bits long. The design of algorithm is one of mixing operations from different algebraic groups. Three
algebraic groups are mixed, and they are easily implemented in both hardware and software: XOR, Addition modulo 216 ,
Multiplication modulo 216 + 1. All these operations operate on 16-bit sub-blocks. This algorithm is efficient on 16-bit processors.
IDEA is symmetric key algorithm based on the concept of Substitution-Permutation Structure, is a block cipher that uses a 64bit
plain text with 8 rounds and a Key Length of 128-bit permuted into 52 sub-keys each of 128-bits. It does not contain S-boxes and
same algorithm is used in reversed for decryption .
RC4: RC4 is a stream cipher symmetric key algorithm. as the data stream is simply XOR with generated key sequence. It uses a
variable length key 256 bits to initialize a 256-bit state table. A state table is used for generation of pseudo-random bits which is
XOR with the plaintext to generate the cipher text.
RC6: RC6 is a derivative of RC5. RC6 is designed by Matt Robshaw, Ron Rivest Ray Sidney and is a symmetric key algorithm
that is used to congregate the requirements of AES contest . RC6 was also presentedto the CRYPTREC and NESSIE projects. It is
patented by RSA Security . RC6 offers good performance in terms of security and compatibility. RC6 is a Feistel Structured private
key algorithm that makes use a 128 bit plain text with 20 rounds and avariable Key Length of 128, 192, and 256 bit. As RC6 works
on the principle of RC that can sustain an extensive range of key sizes, word-lengths and number of rounds, RC6 does not contain
S-boxes and same algorithm is used in reversed for decryption.
Serpent: Serpent is an Advanced Encryption Standard (AES) competition, stood 2nd to Rijndael, is a symmetric key block cipher,
designed by Eli Biham, Ross Anderson, and Lars Knudsen. Serpent is a symmetric key algorithm that is based on substitution-
permutation network Structure. It consists of a 128 bit plain text with 32 rounds and a variable Key Length of 128, 192 and 256 bit.
It also contains 8 S-boxes and same algorithm is used in reversed for decryption. Security presented by Serpent was based on more
conventional approaches than the other AES finalists. The Serpent is open in the public sphere and not yet patented.
Twofish: Twofish is also a symmetric key algorithm based on the Feistel Structure and was designed by Bruce Schneier along with
Doug Whiting, John Kelsey, David Wagner, Niels Ferguson and Chris Hall,. The AES is a block cipher that uses a 128 bit plain
text with 16 rounds and a variable Key Length of 128, 192, 256 bit. It makes use of 4 S-boxes (depending on Key) and same
algorithm is used in reversed for decryption. The inventors extends the Blowfish team to enhance the earlier block cipher Blowfish
to its modified version named Twofish to met the standards of AES for algorithm designing. It was one of the finalists of the AES
, but was not selected for standardization. The Twofish is an open to public sphere and not yet patented.
TEA: TEA is also a Feistel Structured symmetric key algorithm. TEA is a block cipher that uses a 64 bit plain text with 64 rounds
and a Key Length of 128-bit with variable rounds having 32 cycles. It does not contain S-boxes and same algorithm is used in
reversed for decryption. TEA is designed to maximize speed and minimize memory footprint. Cryptographers have discovered
three related-key attacks on TEA. Each TEA key can be found to have three equal keys, thus it can be used as a hash function.
David Wheeler and Roger Needham have proposed extensions of TEA that counter the above attacks.
CAST: CAST is symmetric key algorithm based on the backbone concept of Feistel Structure. It is designed by Stafford Taveres
and Carlisle Adams, is considered to be a solid algorithm. The CAST is a block cipher that uses a 64 bit plain text with 12 or 16
rounds and a variable Key Length of 40 to128-bit. It also contains 4 S-boxes and same algorithm is used in reversed for decryption.
Bruce Schneier, John Kelsey, and David Wagner have discovered a related-key attack on the 64 bit of CAST that requires 2^17
chosen plaintexts, one related query, and 2^48 offline computations. CAST is patented, which was generously released it for free
use.
RC2: RC2 is designed by Ron Rivest and a variable-key-size encryption algorithm from 0 bytes to the maximum string length that
the computer system supports. RC2 is a variable-key-size 64-bit block cipher. It is designed to be a replacement for DES. RC2 is
three times faster than DES in software implementations. The algorithm encryption speed is independent of key size.
RSA: RSA is designed by Ron Rivest, Adi Shamir, and Leonard Adleman in 1978. It is one of the best known public key
cryptosystems for key exchange or digital signatures or encryption of blocks of data. RSA uses a variable size encryption block and
a variable size key. It is an asymmetric (public key) cryptosystem based on number theory, which is a block cipher system. It uses
two prime numbers to generate the public and private keys. These two different keys are used for encryption and decryption purpose.
Sender encrypts the message using Receiver public key and when the message gets transmit to receiver, then receiver can decrypt
it using his own private key [12, 13]. RSA operations can be decomposed in three broad steps; key generation, encryption and
decryption. RSA have many flaws in its design therefore not preferred for the commercial use. When the small values of p & q are
selected for the designing of key then the encryption process becomes too weak and one can be able to decrypt the data by using
random probability theory and side channel attacks. On the other hand if large p & q lengths are selected then it consumes more
time and the performance gets degraded in comparison with DES. Further, the algorithm also requires of similar lengths for p & q,
practically this is very tough conditions to satisfy. Padding techniques are required in such cases increases the system’s overheads
by taking more processing time.
Encryption:
Plaintext: p<n
Ciphertext: C=p^e mod n
Decryption:
Ciphertext: C
Plaintext: P=C^d mod n.
Diffie-Hellman: This algorithm was introduced in 1976 by Diffie-Hellman. In it, each party generates a key pair and distributes
the public key. After obtaining an authentic copy of publickeys, then shared secret can be used as the key for a symmetric cipher.The
Diffie-Hellman algorithm grants two users to establish a shared secret key and to communicate over an insecure communication
channel . One way authentication is free with this type of algorithm. The biggest limitation of this kind of algorithm is
communication made using this algorithm is itself vulnerable to man in the middle attack.
MD5: MD5’s full form is message-digest algorithm. MD5 is derived from MD4 & was designed by Ron Rivest in 1991 . MD5 is
widely used hash function producing a 128-bit hash value, typically expressed in text format as a 32 dig it hexadecimal number.
MD5 has been utilized in a wide variety of cryptographic applications, and is also commonly used to verify data integrity.
KASUMI: KASUMI[6] is a 64-bit block cipher with a 128-bit secret key. It has a recursive Feistel structure in the same manner as
the MISTY1 construction. KASUMI has8 rounds; each round is composed of two functions: the F O function that has 3 rounds of
the F I function, and the F L function that has a Feistel structure per forming logical AND/OR operations with subkeys. The order
of the two functions depends on the round number: in the even rounds the F O function is applied first, and in the odd rounds the F
L function is applied first. The F I function is a 4-round unbalanced Feistel structure using two types of S-boxes, 9 bits and 7 bits
in size.
LUCIFER:. Lucifer, a direct predecessor of the DES algorithm, is a block-cipher having a 128 bit block size and 128 bit key length.
Its general design principles and properties are described and discussed. A simple FORTRAN program is presented which
implements the algorithm, providing a modern, secure cryptographic algorithm that can be used in personal computers. Lucifer is
of special interest because it is in the same class of product ciphers as DES but is much simpler. Study of Lucifer may reveal
cryptanalytic methods that can be applied to DES.
CAMELLIA: We present a new 128-bit block cipher called Camellia[14]. Camellia supports 128-bit block size and 128-, 192-,
and 256-bit keys, i.e. the same inter-face specifications as the Advanced Encryption Standard (AES). Efficiency on both software
and hardware platforms is a remarkable characteristic of Camellia in addition to its high level of security. It is confirmed that
Camellia provides strong security against differential and linear cryptanalysis. Compared to the AES finalists, i.e. MARS, RC6,
Rijndael, Serpent, and Twofish, Camellia offers at least comparable encryption speed in software and hardware. An optimized
implementation of Camellia in assembly language can encrypt on a Pentium III (800MHz) at the rate of more than 276Mbits per
second, which is much faster than the speed of an optimized DES implementation. In addition, a distinguishing feature is its small
hardware design. The hardware design, which includes both encryption and decryption, occupies approximately 11K gates, which
is the smallest among all existing 128-bit block ciphers as far as we know.
MARS: MARS[13] is described as a shared-key (symmetric) block cipher supporting 128-bit blocks and variable key size. MARS
is designed to take advantage of the powerful operations supported in today’s computers, resulting in a much improved
security/performance tradeoff over existing ciphers. As a result, MARS offers better security than triple DES while running
significantly faster than single DES. The current C implementation runs at rates of about 65Mbit/sec. on a 200 MHz Pentium-Pro,
and 85Mbit/sec. on a 200 MHz PowerPC. In hardware, MARS can achieve a 10*speedup factor. Still, both hardware and software
implementations of MARS are remarkably compact, and easily fit on a smartcard and in other limited-resource environments. The
combination of high security, high speed, and flexibility, makes MARS an excellent choice for the encryption needs of the
information world well into the next century.
CLEFIA: CLEFIA[10] is a new 128-bit block cipher supporting key lengths of 128, 192 and 256 bits, which is compatible with
AES. CLEFIA achieves enough immunity against known attacks and flexibility for efficient implementation in both hardware and
software by adopting several novel and state-of-the-art design techniques. CLEFIA achieves a good performance profile both in
hardware and software. In hardware using a 0.09μm CMOS ASIC library, about 1.60Gbps with less than 6Kgates, and in software,
about 13 cycles/byte, 1.48Gbps on 2.4 GHz AMD Athlon 64 is achieved. CLEFIA is a highly efficient block cipher, especially in
hardware.
SKIPJACK: Skipjack[5] is a block cipher that supports a 64-bit block size and a 80-bit key. The block is internally divided into
four 16-bit words, where each round applies a keyed non-linear permutation to one word from the block.Skipjack uses two different
types of round functions, the A-rounds and the B-rounds. Each encryption consists of a total of 32 rounds, applied in a specific
order: First we apply 8 A-rounds, then 8 B-rounds, then another 8 A-rounds, and finally we finish with 8 more B-rounds. We repeat
the definitions of the A-rounds and the B-rounds here for convenience.
GOST 28147-89: GOST[12] algorithm is a symmetric block cipher, which conforms to Feistel scheme. 64-bit blocks of data are
submitted to the input and converted into 64-bit blocks of encrypted data by 256-bit key. In each round the right side of plain text
messages is processed by function F, which converts data with three cryptographic operations: adding data and sub key modulo
2^32, substitution of data using S-boxes, and left cyclic shift by 11 positions. Output of F-function is added modulo 2 to the left
part of the plaintext, then right and left sides are swapped for next round. The algorithm has 32 rounds. In the last round of encryption
right and left parts are not swapped.
GOST uses 8 S-boxes, which convert 4-bit input to 4-bit output. Unlike most encryption algorithms, GOST has no predefined S-
boxes and any values can be used for them. Secret key contains 256 bits and is represented as a sequence of eight 32-bit words: K1,
K2, K3, K4, K5, K6, K7 and K8. In each round of encryption one of these 32-bit words is used as a round subkey. When round
subkey is calculated, the following principle is used: from round 1 to round 24 the order is straight, (K1, K2, K3, K4, K5, K6, K7,
K8, K1, K2, etc.); from round 25 to round 32 reversed order is used (K8, K7, K6, K5, K4, K3, K2, K1).
TURING: Turing[8] (named after Alan Turing) is a stream cipher designed to simultaneously be:
–Extremely fast in software on commodity PCs,
–Usable in very little RAM on embedded processors, and
–Able to exploit parallelism to enable fast hardware implementation.
The Turing stream cipher has a major component, the word-oriented Linear Feedback Shift Register (LFSR), which originated
with the design of the SOBER family of ciphers . Analyses of the SOBER family are found in . The efficient LFSR updating method
is modelled after that of SNOW .Turing combines the LFSR generator with a keyed mixing-function reminiscent of a block cipher
round. The S-box used in this mixing round is partially derived
from the SOBER-t32 S-box . Further aspects of this mixing function have been derived from Rijndael , Twofish , tc24 and
SAFER++.
Turing is designed to meet the needs of embedded applications that place severe constraints on the amount of processing
power, program space and memory available for software encryption algorithms. Since most of the mobile telephones in use
incorporate a microprocessor and memory, a software stream cipher that is fast and uses little memory would be ideal for this
application. Turing over-comes the inefficiency of binary LFSRs in a manner similar to SOBER and SNOW, and a number of
techniques to greatly increase the generation speed of the pseudo-random stream in software on a general processor. Turing allows
an implementation tradeoff between small memory use, or very high speed using pre-computed tables. Reference source code
showing small memory, key agile,
and speed-optimized implementations is available at , along with a test harness with test vectors. The reference implementation
(TuringRef.c) should be viewed as the definitive description of Turing.Turing has four components: key loading, Initialisation
vector (IV) loading, an LFSR, and a keyed non-linear filter (NLF). The key loading initializes the keyed S-boxes, and the IV loading
initializes the LFSR. The LFSR and NLF then
generate key stream in 160-bit blocks . Five 32-bit words selected from the LFSR are first mixed, then passed through a highly-
nonlinear, key-dependent S-box transformation, and mixed again. The resulting 5-wordnonlin-ear blockis combined with 5 new
LFSR words to create 160 bits of key stream.The final addition of 5 LFSR words (called whitening) provides the output with good
statistical properties, while the nonlinear block hides the linear properties of the LFSR. For each 160-bit block of key stream, the
LFSR state is updated 5 times.
Achterbahn-128/80: Achterbahn[9] is a stream cipher proposal submitted to the eSTREAM project.After the cryptanalysis of the
rst two versions , it has moved on to a newone called Achterbahn-128/80 published in June 2006. Achterbahn-128/80 corresponds
to two keystream generators with key sizes of 128 bits and 80 bits,respectively. Their maximal keystream length is limited to 2^63.
We present here two attacks against both generators. The attack against the
80-bit variant, Achterbahn-80, has complexity 2^61. The attack against Achterbahn-
128 requires 2^80.58 operations and 2^61 keystream bits. These attacks are based
on an improvement of the attack against Achterbahn version 2 and also on an
algorithm that makes prot of the independence of the constituent registers.
[1] Mandal et al. designed an algorithm to merge both RSA algorithm and Diffie-Hellman Algorithm to provide a higher level of
data security. Actually, their intent was to secure data of smaller as well as larger size by obtaining one randomly chosen key pair
from set of RSA keys and one randomly chosen secret key using Diffie-Hellman algorithm and then applying RSA encryption to
make even public components of Diffie-Hellman algorithm inaccessible for any eavesdropper freely.
[2] Wang et al. described a complete set of practical solution to file encryption based on RSA algorithm. With analysis of the present
situation of the application of RSA algorithm, they found the feasibility of using it for file encryption..The conventional RSA
algorithm used C + + Class Library to develop RSA encryption algorithm and realized Groupware encapsulation with 32-bit
windows platform.
[3] Anjula Gupta and Navpreet Kaur Walia have described the various cryptographic algorithms and did a comparative analysis
between the different types of cryptography.
[4] Atito et al. proposed a technique which is a composition of both encryption and data hiding using some properties of
Deoxyribonucleic Acid (DNA) sequences, consisting of mainly of two phases. In the first phase, the secret data is encrypted using
a DNA and Amino Acids-Based Playfair cipher. While in the second phase the encrypted data is steganographically hidden into
some reference DNA sequence using an insertion technique.
[5] Knudsen and have examined the structure of the NSA-designed block cipher by cryptanalysing a large number of variants of
the algorithm.
[6] Saito in his paper has concentrated on single-key attacks considered to be practical attacks and has proposed a single-key attack
on 6-round KASUMI. The attack, which applies a technique of higher order differential attacks, requires 260.8 data and 265.4
encryption time.According to him, the attack is the most powerful single-key attack against reduced-round KASUMI in terms of
time complexity.
[7] Zhang and Fu have analysed the PCR code,chaos code, the united chaos encryption algorithm based on logistic map and henon
map,etc.
[8] Rose and Hawkes have proposed the very idea of Turing cipher along the analysis of Key Loading and IV loading,Analysis of
Whitening and the LFSR(Linear Feedback Shift Registers ) of Turing. Turing offers up to 256-bit key strength, and is designed for
extremely efficient software implementation.It combines an LFSR generator based on that of SOBER with a keyed mixing function
reminiscent of a block cipher round. Aspects of the block mixer round have been derived from Rijndael, Twofish, tc24 and
SAFER++ .
[9] Plasencia has presented two key-recovery attacks against Achterbahn-128/8
[10] Shirai et al. have proposed a new 128-bit blockcipher CLEFIA supporting key lengths of 128, 192 and 256 bits, which is
compatible with AES.
[11] Mitali,Kumar and Sharma has analyzed the encryption and decryption time of various algorithms on different settings of data.
[12] Babenko and Maro have done an algebraic analysis of GOST 28147-89 encryption algorithm (also known as simply GOST),
which was the basis of most secure information systems in Russia. The general idea of algebraic analysis is based on the
representation of initial encryption algorithm as a system of multivariate quadratic equations, which define relations between a
secret key and a cipher text. Extended linearization method is evaluated as a method for solving the nonlinear system of equations.
[13] Burwick et al. has described MARS, a shared-key (symmetric) block cipher supporting128-bit blocks and variable key size.
MARS is designed to take advantage of the powerful operations supported in today’s computers, resulting in a much improved
security/performance tradeoff over existing ciphers. As a result, MARS offers better security than triple DES while running
significantly faster than single DES. The current C implementation runs at rates of about 65 Mbit/sec. on a 200 MHz Pentium-Pro,
and 85 Mbit/sec. on a 200 MHz PowerPC. In hardware, MARS can achieve a 10x speedup factor. Still, both hardware and software
implementations of MARS are remarkably compact, and easily fit on a smartcard and in other limited-resource environments. The
combination of high security, high speed, and flexibility, makes MARS an excellent choice for the encryption needs of the
information world well into the next century.
[14] Aoki et al. has presented a new 128-bit block cipher called Camellia. Camellia supports 128-bit block size and 128-, 192-, and
256-bit keys, i.e. the same interface specifications as the Advanced Encryption Standard (AES). Efficiency on both software and
hardware platforms is a remarkable characteristic of Camellia in addition to its high level of security. It is confirmed that Camellia
provides strong security against differential and linear cryptanalysis. Compared to the AES finalists, i.e. MARS, RC6, Rijndael,
Serpent, and Twofish, Camellia offers at least comparable encryption speed in software and hardware. An optimized implementation
of Camellia in assembly language can encrypt on a Pentium III (800MHz) at the rate of more than 276 Mbits per second, which is
much faster than the speed of an optimized DES implementation. In addition, a distinguishing feature is its small hardware design.
The hardware design, which includes both encryption and decryption, occupies approximately 11K gates, which is the smallest
among all existing 128-bit block ciphers as far as we know.
[15] Amalraj and Jose have given a brief idea bout the different types of Public Key Cryptography.
3DES IBM 1978 112 or 168 64 bits 48 Feistel Yes Adequate Security
AES Joan Daemen 1998 128, 192, 128 bits 10,12, 14 Substitution- Yes Replacement for
& incent 256 bits Permution DES, Excellent
Rijmen Security
Blowfish Bruce 1993 32-448 64 bits 16 Feistel Yes Excellent Security
Schneier
RC4 Ron Rivest 1987 Variable 40- 256 Feistel Stream Yes Fast Cipher in SSL
2048
RC2 Ron Rivest 1987 8-128 64 by 64 bits 16 Feistel - Stream Cipher
default
Twofish Bruce 1993 128- 256 128 bits 16 Feistel Yes Good Security
Schneier
Serpent Anderson,, 1998 128- 256 128 bits 32 Substitution Yes Good Security
Lars Knudsen Permutation
IDEA James 1991 128 bits 64 bits 8.5 Substitution No Not Strong Enough
Massey Permutation
RC6 Ron Rivest, 1998 128 bits to 128 bits 20 Feistel Yes Good Security
Matt 256 bits
Robshaw
RSA Rivest,, 1977 1,024 to 128 bits 1 Public Key algorithm No Excellent
Shamir, 4,096 Security, low
Adleman speed
VI. CONCLUSION
Cryptographic landscape is witnessing advancements in a way like never before. Newer and advance methods are cropping up more
frequently.In this paper,we have ventured to present Cryptography with all its facets.In this study of reverie,we have covered aspects
of classical cryptographic approach as well the modern ones.The possibilities in this field are endless.Security and privacy is not
for granted,especially in today’s world where information is power.Cryptography along with crypatanalysis are very useful tools
that make a huge difference and as such should be used with the utmost care and caution.
VII. ACKNOWLEDGMENT
We would like to take this opportunity to thank our professors and friends,all of whom share the same passion for Cryptography
and without whose help,it would have been quite impossible to write this paper.
VIII. REFERENCES
[1] Mandal, B.K. , Bhattacharyya , Bandyopadhyay S.K. , “Designing and Performance Analysis of a Proposed Symmetric
Cryptography Algorithm ”, Communication Systems and Network Technologies (CSNT), 2013, pp. 453 – 461.
[2] Wang, Suli , Liu, Ganlai , “File encryption and decryption system based on RSA algorithm”, Computational and Information
Sciences (ICCIS), 2011, pp. 797 – 800.
[3] Anjula Gupta,Navpreet Kaur Walia ,” Cryptography Algorithms: A Review”, 2014 IJEDR,Volume 2, Issue 2,ISSN: 2321-9939
[4] A. Atito,A. Khalifa,S. Z. Rida,” DNA-Based Data Encryption and Hiding Using Playfair and Insertion Techniques”, J. of
Commun. & Comput. Eng ISSN 2090-6234 www.m-sciences.com Volume 2, Issue 3, 2012, Pages 44: 49.
[5] Lars Knudsen , David Wagner, “On the structure of Skipjack”, Discrete Applied Mathematics 111 (2001) 103–116.
[6] Teruo Saito, “A Single-Key Attack on 6-Round KASUMI”,IACR.
[7] Yunpeng Zhang and Liu He Bochen Fu, “Research on DNA Cryptography”, Applied Cryptography and Network Security.
[8] Gregory G. Rose and Philip Hawkes, “Turing: a Fast Stream Cipher”, Qualcomm Australia.
[9] María Naya-Plasencia, “Cryptanalysis of Achterbahn-128/80”, INRIA, projet CODES, Domaine de Voluceau.
[10] Taizo Shirai1, Kyoji Shibutani, Toru Akishita, Shiho Moriai, and Tetsu Iwata.” The 128-bit Blockcipher CLEFIA (Extended
Abstract)”,SONY Corporation.
[11] Mitali, Vijay Kumar and Arvind Sharma,” A Survey on Various Cryptography Techniques”, International Journal of Emerging
Trends & Technology in Computer Science (IJETTCS), Volume 3, Issue 4, July-August 2014,ISSN 2278-6856
[12] Ludmila Babenko, Ekaterina Maro,” Algebraic Cryptanalysis of GOST Encryption Algorithm”, Journal of Computer and
Communications, 2014, 2, 10-17 Published Online March 2014 in SciRes.
[13] Carolynn Burwick,Don Coppersmith,Edward D’Avignon, Rosario Gennaro, Shai Halevi, Charanjit Jutla ,Stephen M. Matyas
Jr. ,Luke O’Connor ,Mohammad Peyravian ,David Safford and Nevenko Zunic,” MARS - a candidate cipher for AES”,IBM
Corporation.
[14] Kazumaro Aoki, Tetsuya Ichikawa,Masayuki Kanda,Mitsuru Matsui,Shiho Moriai, Junko Nakajima and Toshio Tokita,”
Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms — Design and Analysis —“
[15] A. Joseph Amalraj, Dr. J. John Raybin Jose,” A SURVEY PAPER ON CRYPTOGRAPHY TECHNIQUES”, International
Journal of Computer Science and Mobile Computing, Vol.5 Issue.8, August- 2016, pg. 55-59