Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
<ul><li>Data Encryption </li></ul><ul><li>Tayyab Arif </li></ul><ul><li>Allama Iqbal Open Unviersity Pakistan </li></ul><u...
<ul><li>Encryption Definition: </li></ul><ul><ul><li>The action of disguising information so that it can be recovered easi...
<ul><ul><li>A message is cleartext (plaintext) is encrypted (disguised) through the use of an encryption key to create a C...
<ul><ul><li>The encryption key may be changed from time to time to make an intruder’s task more difficult.  </li></ul></ul...
<ul><li>In symmetric (Single key): </li></ul><ul><ul><li>The encryption and decryption keys are the same. </li></ul></ul><...
<ul><li>Encryption Methods: </li></ul><ul><ul><li>Encryption is accomplished by scrambling the bits, characters, words, or...
<ul><li>Transposition: </li></ul><ul><ul><li>In which the order of the bits patterns, characters, words or phrases is rear...
<ul><li>Data Encryption Standard (DES): </li></ul><ul><ul><li>Most widely used algorithm </li></ul></ul><ul><ul><li>Pionee...
<ul><li>DES Algorithm: </li></ul><ul><ul><li>The algorithm accepts plaintext, P, and performs an initial permutation, IP, ...
<ul><li>Public Key Cryptosystem </li></ul><ul><ul><li>It is an asymmetric cryptosystem. </li></ul></ul><ul><ul><li>First a...
<ul><li>Public key encryption can achieved: </li></ul><ul><ul><li>Privacy </li></ul></ul><ul><ul><li>Authentication </li><...
<ul><li>Tayyab Arif </li></ul><ul><li>Allama Iqbal Open Unviersity Pakistan </li></ul><ul><li>Book: Telecommunication Prim...
Upcoming SlideShare
Loading in …5
×

Data encryption, Description, DES

10,936 views

Published on

Telecommuncations Primer Signals, Building Blocks and Networks.
Data Encryption & Description, DES, Single and Two key Concept

Published in: Education, Technology
  • ⇒⇒⇒WRITE-MY-PAPER.net ⇐⇐⇐ has really great writers to help you get the grades you need, they are fast and do great research. Support will always contact you if there is any confusion with the requirements of your paper so they can make sure you are getting exactly what you need.
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • If you’re struggling with your assignments like me, check out ⇒ www.HelpWriting.net ⇐.
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • I pasted a website that might be helpful to you: HelpWriting.net Good luck!
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Dating for everyone is here: ❤❤❤ http://bit.ly/2u6xbL5 ❤❤❤
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Follow the link, new dating source: ♥♥♥ http://bit.ly/2u6xbL5 ♥♥♥
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here

Data encryption, Description, DES

  1. 1. <ul><li>Data Encryption </li></ul><ul><li>Tayyab Arif </li></ul><ul><li>Allama Iqbal Open Unviersity Pakistan </li></ul><ul><li>Book: Telecommunication Primer </li></ul><ul><li>BS(cs) 7 th Semster </li></ul><ul><li>Mob: 00923445064252 </li></ul>
  2. 2. <ul><li>Encryption Definition: </li></ul><ul><ul><li>The action of disguising information so that it can be recovered easily by the persons who have the key, but is highly resistant to recovery by persons who do not have the key. </li></ul></ul><ul><ul><li>Tayyab Arif 00923445064252, Allama Iqbal Open University </li></ul></ul>
  3. 3. <ul><ul><li>A message is cleartext (plaintext) is encrypted (disguised) through the use of an encryption key to create a Ciphertext. </li></ul></ul><ul><ul><li>Tayyab Arif 00923445064252, Allama Iqbal Open University </li></ul></ul>
  4. 4. <ul><ul><li>The encryption key may be changed from time to time to make an intruder’s task more difficult. </li></ul></ul><ul><ul><li>Restoration of a ciphertext to cleartext is achieved by the action of decryption using a decryption key. </li></ul></ul><ul><ul><li>Tayyab Arif 00923445064252, Allama Iqbal Open University </li></ul></ul>
  5. 5. <ul><li>In symmetric (Single key): </li></ul><ul><ul><li>The encryption and decryption keys are the same. </li></ul></ul><ul><li>In asymmetric (two keys): </li></ul><ul><ul><li>The encryption and decryption keys are different. </li></ul></ul><ul><ul><li>Tayyab Arif 00923445064252, Allama Iqbal Open University </li></ul></ul>
  6. 6. <ul><li>Encryption Methods: </li></ul><ul><ul><li>Encryption is accomplished by scrambling the bits, characters, words, or phrases in the original message. Scrambling involves two activities: </li></ul></ul><ul><ul><ul><li>Transposition </li></ul></ul></ul><ul><ul><ul><li>Substitution </li></ul></ul></ul><ul><ul><ul><li>Tayyab Arif 00923445064252, Allama Iqbal Open University </li></ul></ul></ul>
  7. 7. <ul><li>Transposition: </li></ul><ul><ul><li>In which the order of the bits patterns, characters, words or phrases is rearranged. </li></ul></ul><ul><li>Substitution: </li></ul><ul><ul><li>In which new bit patterns, characters, words, or phrases are substituted for the originals without changing their order. </li></ul></ul><ul><ul><li>Tayyab Arif 00923445064252, Allama Iqbal Open University </li></ul></ul>
  8. 8. <ul><li>Data Encryption Standard (DES): </li></ul><ul><ul><li>Most widely used algorithm </li></ul></ul><ul><ul><li>Pioneered by IBM </li></ul></ul><ul><ul><li>It is symmetric cryptosystem </li></ul></ul><ul><ul><li>Developed to protect sensitive, unclassified, US government, Computer data. </li></ul></ul><ul><ul><li>Used to provide authentication of electronic funds transfer messages. </li></ul></ul><ul><ul><li>Tayyab Arif 00923445064252, Allama Iqbal Open University </li></ul></ul>
  9. 9. <ul><li>DES Algorithm: </li></ul><ul><ul><li>The algorithm accepts plaintext, P, and performs an initial permutation, IP, on P producing P 0 , The block is then broken into left and right halves, the Left (L 0 ) being the first 32 bits of P 0 and the right (R 0 ) being the last 32 bits of P 0 . </li></ul></ul><ul><ul><li>With L 0 and R 0 , 16 rounds are performed until L 16 and R 16 are generated. </li></ul></ul><ul><ul><li>The inverse permutation, IP -1 , is applied to L 16 R 16 to produce ciphertext C. </li></ul></ul><ul><ul><li>Tayyab Arif 00923445064252, Allama Iqbal Open University </li></ul></ul>
  10. 10. <ul><li>Public Key Cryptosystem </li></ul><ul><ul><li>It is an asymmetric cryptosystem. </li></ul></ul><ul><ul><li>First announced in 1976. </li></ul></ul><ul><ul><li>Offer a radically different approach to encryption. </li></ul></ul><ul><ul><li>The idea depends on the use of a pair of keys that differ in a complementary way. </li></ul></ul><ul><ul><li>Several algorithms are proposed </li></ul></ul><ul><ul><li>RSA algorithm is considered to be highly secure. </li></ul></ul><ul><ul><li>Tayyab Arif 00923445064252, Allama Iqbal Open University </li></ul></ul>
  11. 11. <ul><li>Public key encryption can achieved: </li></ul><ul><ul><li>Privacy </li></ul></ul><ul><ul><li>Authentication </li></ul></ul>
  12. 12. <ul><li>Tayyab Arif </li></ul><ul><li>Allama Iqbal Open Unviersity Pakistan </li></ul><ul><li>Book: Telecommunication Primer </li></ul><ul><li>BS(cs) 7 th Semster </li></ul><ul><li>Mob: 00923445064252 </li></ul><ul><li>[email_address] </li></ul><ul><li>www.youtube.com/tayyab8632 </li></ul>

×