100% found this document useful (1 vote)
1K views

Encryption

The document discusses the International Data Encryption Algorithm (IDEA) cipher and how it is improved upon by Pretty Good Privacy (PGP). IDEA is a symmetric-key algorithm that encrypts 64-bit blocks using a 128-bit key and 8 rounds of mathematical operations. However, IDEA has weaknesses as it uses a single lengthy key. PGP addresses this by randomly generating a new IDEA key for each session and encrypting the key with RSA public-key encryption. As a result, PGP provides one of the strongest and fastest encryption algorithms.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
1K views

Encryption

The document discusses the International Data Encryption Algorithm (IDEA) cipher and how it is improved upon by Pretty Good Privacy (PGP). IDEA is a symmetric-key algorithm that encrypts 64-bit blocks using a 128-bit key and 8 rounds of mathematical operations. However, IDEA has weaknesses as it uses a single lengthy key. PGP addresses this by randomly generating a new IDEA key for each session and encrypting the key with RSA public-key encryption. As a result, PGP provides one of the strongest and fastest encryption algorithms.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 20

INTERNATIONAL DATA

ENCRYPTION ALGORITHM

Presented by :

Priyadarsani Behera
C.V.Raman clg of engg
TALK FLOW
 Introduction
 Features of Idea Cipher
 The IDEA cipher algorithm
 Problems with IDEA cipher
 PGP Improvements
 PGP Encryption
 PGP Decryption
 Summary
 References
INTRODUCTION:-
Sometimes the data transmitted between
application processes is confidential, and the
applications would prefer that others not be
able to read it.
For example :-Military communication of voice
signals over the transmission channel must be ultra
secure. So the speech signal has to be coded to a
non-readable format & hence it is secure over the
network.
 Data Security is an important issue in computer networks
and cryptographic algorithm are essential part in security.

International Data Encryption Algorithm (IDEA) is


considered one of the most important post-DES
cryptographic algorithm.

As- - -
*IDEA is highly secure.
*It would take one bilion computers testing,one bilion
combinations per second and 10,000 bilion years to crack
the code.
 It can be widely used in audio and video data
for cable TV, video conforencing,sensitive
financial and commercial data ,e-mail via public
networks, transmission lines via modem , router
or ATM link and smart cards.
 There are currently no known effective attack
against the IDEA ciphers.
 It was originally developed by James Massey
and Lai in 1990.1990.
FEATURES OF IDEA cipher
 Message is encrypted with a 128-bit IDEA key via
different combinations of operations:
a. Additions
b. Multiplication
c. XOR

Speed: faster than DES in software.


The IDEA Cipher algorithm :

1. Original text is divided into 64-bit blocks.


2. Each 64-bit block is further divided into four 16-bit sub-blocks: X1,
X2, X3, X4.
3. The 128-bit IDEA session key is divided into eight 16-bit key-
blocks: Ki,1, Ki,2, Ki,3, Ki,4, Ki,5, Ki,6, Ki,7, Ki,8.
4. Addition and Multiplication are perform on each block of Xn and
Ki,j.
5. The combination of operations are performed eight times to get the
final encryption.
IDEA ALGORITHM
Description
1. Multiply X1 by the first subkey.
2. Add X2 and the second subkey.
3. Add X3 and the third subkey.
4. Multiply X4 by the fourth subkey.
5. XOR the results of Steps 1 and 3.
6. XOR the results of Steps 2 and 4.
7. Multiply the results of Step 5 by the fifth subkey.
8. Add the results of Steps 6 and 7.
9. Multiply the results of Step 8 by the sixth subkey.
10. Add the results of Step 7 and 9.
11. XOR the results of Steps 1 and 9.
12. XOR the results of Steps 3 and 9.
13. XOR the results of Steps 2 and 10.
14. XOR the results of Steps 4 and 10.
 The output of the round is the four sub-blocks that are
the results of Steps 11, 12, 13, and 14. Swap the two
inner blocks (except for the last round) and that is the
input to the next round. After the 8th round, there is a
final transformation stage shown in Fig. 1. Finally the
four sub-blocks are attached to get the final encrypted
result.

 Here each stage is using only three basic functional


units that were mentioned earlier.
PROBLEMS WITH IDEA CIPHER:
1. IDEA is a symmetric-key cryptosystem. In
order to decrypt a cipher, one must know
the very same key that is used to encrypt
the message.

2. Since the IDEA key is 128-bit long, it is not


easy to memorize and therefore it must be
recorded.
Symmetric-key schematic
PGP Improvements:

1) Instead of using the same key each time, PGP (Pretty


Good Privacy) randomly generated a new IDEA key
for every session. The same message sent at different
times will be totally different and remembering the
key will be useless and unnecessary.
2) The IDEA key is encrypted via RSA public key
encryption algorithm. Decryption can be achieved
only by those who knows the complementary key.
3) PGP compresses packages with GZIP.
How PGP Encrypts:
1. Original text is encrypted into IDEA cipher text
with a 128-bit random key via IDEA encryption.
2. The IDEA session key is encrypted with a large
public key via RSA encryption.
3. The encrypted IDEA session key is appended to
the IDEA cipher text.
4. GZIP is used to compress the data into a PGP
package.
PGP Encryption:

15
How PGP Decrypts:

1) PGP package is decompressed and is separated


into the encrypted IDEA session key and the
encrypted IDEA cipher text.
2) IDEA session key is decrypted with RSA private
key.
3) IDEA session key decrypts the IDEA cipher text
into the original plain text.
PGP Decryption:

17
SUMMARY

Although IDEA is a very strong


encrypting algorithm, also it has
weaknesses: IDEA uses a single and
lengthy key.

PGP uses the strengths of one


algorithm to compensate for the
weaknesses of others.AS a result , PGP
is one of the strongest and fastest
encryption algorithm in existence.
References:-
[1] Y. Qin, J.C. Oh, B. Kim, CMOS implementation of the IDEA
encryption algorithm, IEEE Midwest Symp. Circuits Syst. (2000) 272–275.
[2] J. Wilson, Data security hits home, IEEE Micro. (1995) 88.

[3] Feisthammel, Patrick, “PGP – Pretty Good Privacy.”


“http://www.rubin.ch/pgp/pgp.en.html”, 2000.
[4] “PGP Security BIND vulnerability COVERT CyberCop Gauntlet.”
“www.pgp.com”, 2001.

You might also like