Professional Documents
Culture Documents
MANUAL
PEO-I:
To excel in Computer Science and Engineering program to pursue their higher studies or
PEO-II:
To acquire knowledge in the latest technologies and innovations and an ability to identify,
PEO-III:
learning and continuous self-improvement in order to respond to the rapid pace of change in
PEO IV:
PEO-V:
To possess critical thinking, communication skills, teamwork, leadership skills and ethical
problems.
PO2. Problem Analysis: Identify, formulate, review research literature, and analyze
problems and design system components or processes that meet the specified needs with
appropriate consideration for the public health and safety, and the cultural, societal, and
environmental considerations.
research methods including design of experiments, analysis and interpretation of data, and
PO5. Modern Tool Usage: Create, select, and apply appropriate techniques, resources, and
modern engineering and IT tools including prediction and modeling to complex engineering
PO6. The Engineer and Society: Apply reasoning informed by the contextual knowledge to
assess societal, health, safety, legal and cultural issues and the consequent responsibilities
engineering solutions in societal and environmental contexts, and demonstrate the knowledge
PO8. Ethics: Apply ethical principles and commit to professional ethics and responsibilities
PO9. Individual and Team Work: Function effectively as an individual, and as a member
the engineering community and with society at large, such as, being able to comprehend and
write effective reports and design documentation, make effective presentations, and give and
the engineering and management principles and apply these to ones own work, as a member
PO12. Life-Long Learning: Recognize the need for, and have the preparation and ability to
engage in independent and life-long learning in the broadest context of technological change.
IV
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
PSO1: An ability to apply knowledge of software development concepts to select and apply
PSO2: Familiarity with various programming languages and paradigms, with practical
areas such as algorithm design, compiler design, artificial intelligence and information
security.
V
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
LIST OF EXPERIMENTS:
1. Implement the following SUBSTITUTION & TRANSPOSITION TECHNIQUES
concepts:
a) Caesar Cipher
b) Playfair Cipher
c) Hill Cipher
d) Vigenere Cipher
e) Rail fence row & Column Transformation
2. Implement the following algorithms
a) DES
b) RSA Algorithm
c) Diffiee-Hellman
d) MD5
e) SHA-1
3. Implement the SIGNATURE SCHEME - Digital Signature Standard
4. Demonstrate how to provide secure data storage, secure data transmission and for creating
digital signatures (GnuPG).
5. Setup a honey pot and monitor the honeypot on network (KF Sensor)
6. Installation of rootkits and study about the variety of options
7. Perform wireless audit on an access point or a router and decrypt WEP and WPA.( Net
Stumbler)
8. Demonstrate intrusion detection system (ids) using any tool (snort or any other s/w)
TOTAL: 45
PERIODS OUTCOMES:
At the end of the course, the student should be able to
Implement the cipher techniques
Develop the various security algorithms
Use different open source tools for network security and analysis
SOFTWARE:
C / C++ / Java or equivalent compiler GnuPG, KF Sensor or Equivalent, Snort, Net
Stumbler or Equivalent
HARDWARE:
Standalone desktops - 30 Nos. (or) Server supporting 30 terminals or more.
VI
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
C407.5 An Ability to Demonstrate Intrusion Detection System (IDS) using any tools.
CO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
C407.1 3 3 - 3 - - - - - 1 - - - 2 -
C407.2 3 3 - 3 - - - - - 1 - - - 2 -
C407.3 3 3 - 3 - - - - - 1 - - - 2 -
C407.4 3 3 - 3 - - - - - 1 - - - 2 -
C407.5 3 3 - 3 - - - - - 1 - - - 2 -
C407 3 3 - 3 - - - - - 1 - - - 2 -
AVG
VI
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
TABLE OF CONTENTS
S.No Particulars Page No.
2.a DES 13
2.c Diffiee-Hellman 17
2.d MD5 19
2.e SHA-1 21
5. Setup a honey pot and monitor the honeypot on network (KF Sensor) 41
VI
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
ADDITIONAL PROGRAMS 53
VI
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
SECURITY LABORATORY
INTRODUCTION
Security means different things to different people.It is important in all protocols notjust
protocols in the security area.
Security Services
Confidentiality (privacy)
Authentication (who created or sent the data)
Integrity (has not been altered)
Non-repudiation (parties cannot later deny)
Access control (prevent misuse of resources)
Availability (permanence, non-erasure)
Cryptography Terminologies
VI
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
Plaintext (P)
Message to be encrypted
Uses P and K
Uses C and K
Security of the scheme
Classical Techniques
1. Substitution ciphers- Each letter or groups of letters of the plaintext are replaced by some
other letter or group of letters, to obtain the cipher text.
VI
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
JAVA PROGRAM
DEFGH IJKLMNOPQRSTUVWXYZABC
STEP 5: The encryption can be described with the following formula:
Ci=(Ti+k) (mod m)
Ci i-th character of the closed text
Ti i-th character of the closed text
k-shift
m - length of the alphabet
STEP 6: The process of decryption uses reverted procedure:
Ti=(Cik) (mod m)
The letter A becomes the letter D. B is replaced by E and C replaced by F, etc. The word
"example" would be encoded by: "hadpsoh".
STEP 7: SecurityThe key length is identical to the size of the given alphabet. Using the capital letters
A-Z as alphabet allows 26 different keys, with the 26th key rendered meaningless because it
VI
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
Output:
C:\Program Files\Java\jdk1.6.0_20\bin>java CeaserCipherr
Enter any String: panimalar
Result:
VI
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
C H Y B D
E F G I/J K
L P Q S T
U V W X Z
VI
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
Output:
Result:
VI
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
Algorithm:
STEP 3: First, you need to assign two numbers to each letter in the alphabet and also assign
numbers to space, . The key space is the set of all invertible matrices over Z26. 26 was chosen
because there are 26 characters, which solves some problems later on.
STEP 3: Encryption:
VI
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
OUTPUT :-
Inverse Matrix is :
-1.75 1.0 1.375
3.125 -1.5 -2.5625
-1.125 0.5 1.0625
Decrypted string is : cse
Result:
Thus the program has been successfully executed and verified
CS6711-SECURITY LAB 9 VII SEM/IV YEAR
VI
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
KeywordCIPHERCIPHERCIPHERCIPHERCIPHE
CiphertextVPXZTIQKTZWTCVPSWFDMTETIGAHLH
Output:
Encrypted message:
WMCEEIKLGRPIFVMEUGXQPWQVIOIAVEYXUEKFKBTALVXTGAFXYEVKPAGY
Decrypted message:
BEWARETHEJABBERWOCKMYSONTHEJAWSTHATBITETHECLAWSTHATCATCH
Result:
VI
PANIMALARINSTITUTE
PANIMALAR INSTITUTEOF
OFTECHNOLOGY
TECHNOLOGY DEPT OF OF
DEPT. CSECSE
Algorithm:
VI
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
Output:
I.....S.....E.....I.....L.....E....
.F...U.C...R.A...H.S...U.A...G.N...
..T.O...A.M...D. T...X.O...R.F... I.S
...Y.....N.....Q.....Y.....E.....U.
FUCRAHSUAGNTOAMDTXORFISISEILE
Result:
VI
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
Ex.No:2a.DES Algorithm:
Aim:
Algorithm :
VI
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
Output:
Result:
VI
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
Ex.No:2b.RSA Algorithm:
Aim:
VI
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
Output:
$ javac RSA.java
$ java RSA
Enter the plain text:
Sanfoundry
Encrypting String: Sanfoundry
String in Bytes: 8397110102111117110100114121
Decrypting Bytes: 8397110102111117110100114121
Decrypted String: Sanfoundry
Result:
Thus the program has been successfully executed and verified
VI
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
Aim:
Algorithm :
STEP 8:Meanwhile Bob generates a private random value b, calculates gb (mod p) and sends it to
Alice.
Alice takes gb and her private random value a to compute (gb)a = gab(mod p).
Bob takes ga and his private random value b to compute (ga)b = gab (mod p).
Alice and Bob adopt gab (mod p) as the shared secret.
STEP 9:Terminate the program.
VI
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
Output:
1. Enter prime number:
2. 11
3. Enter primitive root of 11:7
4. Enter value for x less than 11:
5. 3
6. R1=2
7. Enter value for y less than 11:6
8. R2=4
9. Key calculated at Alice's side:9
10. Key calculated at Bob's side:9
11. Deffie hellman secret key Encryption has Taken
Result:
VI
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
Ex.No:2d.MD5- Algorithm:
Aim:
Algorithm :
STEP 1:Start the program.MD5 algorithm can be used as a digital signature mechanism.
STEP 2: Suppose a b-bit message as input, and that we need to find its message digest.
STEP 3: append padded bits:
The message is padded so that its length is congruent to 448, modulo 512.
Means extended to just 64 bits shy of being of 512 bits long.
A single 1 bit is appended to the message, and then 0 bits are appended so that the length in
bits equals 448 modulo 512.
STEP 4: append length:
A 64 bit representation of b is appended to the result of the previous step.
The resulting message has a length that is an exact multiple of 512 bits.
STEP 5: Initialize MD Buffer
-A four-word buffer (A,B,C,D) is used to compute the message digest.
Here each of A,B,C,D, is a 32 bit register.
These registers are initialized to the following values in hexadecimal:
word A: 01 23 45 67
word B: 89 ab cd ef
word C: fe dc ba 98
word D: 76 54 32 10
STEP 6:Terminate the program.
VI
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
MD5("") = D41D8CD98F00B204E9800998ECF8427E
MD5("abc") = 900150983CD24FB0D6963F7D28E17F72
MD5("abcdefghijklmnopqrstuvwxyz") = C3FCD3D76192E4007DFB496CCA67E13B
Result:
VI
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
Ex.No:2e.SHA-1 Algorithm:
Aim:
Algorithm :
VI
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
Output
SHA1("") = DA39A3EE5E6B4B0D3255BFEF95601890AFD80709
SHA1("abc") = A9993E364706816ABA3E25717850C26C9CD0D89D
SHA1("abcdefghijklmnopqrstuvwxyz") =
32D10C7B8CF96570CA04CE37F2A19D84240D3A89
Result:
VI
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
Algorithm:
Calculate
In the unlikely case that , start again with a different random
Calculate
In the unlikely case that , start again with a different random
The signature is
Verifying
The signature scheme is correct in the sense that the verifier will always accept genuine
signatures. This can be shown as follows:
Thus
VI
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
Output:
VI
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
p:
fd7f5381 1d751229 52df4a9c 2eece4e7 f611b752 3cef4400 c31e3f80 b6512669
455d4022 51fb593d 8d58fabf c5f5ba30 f6cb9b55 6cd7813b 801d346f f26660b7
6b9950a5 a49f9fe8 047b1022 c24fbba9 d7feb7c6 1bf83b57 e7c6a8a6 150f04fb
83f6d3c5 1ec30235 54135a16 9132f675 f3ae2b61 d72aeff2 2203199d d14801c7
q:
9760508f 15230bcc b292b982 a2eb840b f0581cf5
g:
f7e1a085 d69b3dde cbbcab5c 36b857b9 7994afbb fa3aea82 f9574c0b 3d078267
5159578e bad4594f e6710710 8180b449 167123e8 4c281613 b7cf0932 8cc8a6e1
3c167a8b 547c8d28 e0a3ae1e 2bb3a675 916ea37f 0bfa2135 62f1fb62 7a01243b
cca4f1be a8519089 a883dfe1 5ae59f06 928b665e 807b5525 64014c3b fecf492a
y:
baa058c9 8eb5aeac 9765d9fe 69d899b0 abf75247 6771a3c5 eda49f86 2ec63b66
f633627d 8c48d701 fceb6c66 f7def93c f37eeaff 363a8358 e2441f99 5901766b
2ab9f753 4ed138db dad7bb47 d03e453f 6f3e00f6 d3993f20 402791fd ffcb9be6
e376ed72 e3a14062 09681a97 5177d679 c67db65e 308f6265 80fa0b66 13be04d5
VI
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
9913c979 4dee6680
p:
d6a640b1 3ce12e5f e1accc6e ff3883bf 635f47ff 3b07e599 c632d579 951a1131
dae81e18 2443e068 aff6cc02 e862e00c 5ad649a6 e5036b38 eb3e48d1 d78c5d39
352e4345 79e1bd11
g:
b4ef16c9 14c2f66f 18ee2117 db1d4da0 851705a2 ff241f03 35e2c1f6 5b2be728
2689c2d3 dc8254ae c1b6ef36 fc687f5f 41f0279d 106a6807 3a5f7555 709a29b3
b7aba640 1a24388d
l:
384
Sun RSA private CRT key, 1024 bits
modulus: 115153566492780149823791597948385406618805766082270821869506
227097262812316657808535070269492357553195979052330631965219444725885744421681
08
524544816665882912673643642286528386700772658983959949850307434203826214823227
75
803049658977040864589749955956811139364508153931320897150409896051829217648915
39
355803919
public exponent: 65537
private exponent: 651875630084096549805860549595663302494422070227848008202798
575660840492690847108755528479815442455951725413349168547483314666579354875012
32
320767306758651608951234374082446757132488826000929376777783576123269953285419
50
030412763383433157129815129004228814193497853311080385173874635735798894921575
65
131041
prime p: 129294277070314059708537367360791501153343461020919990387678
772432118178899876130387775186652492651118615425310006063387257250787668245713
65
290882157779167
prime q: 890631581706870348247089384980476972921628943580183462114508
639453583393270958968411843296266190113851808907447003295443860426070298987272
40
00844944674257
VI
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
Result:
VI
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
Demonstrate how to provide secure data storage, secure data transmission and for creating
digital signatures using GnuPG security tool.
Introduction:
GPG, or GNU Privacy Guard, is a public key cryptography implementation. This allows
for the secure transmission of information between parties and can be used to verify that
the origin of a message is genuine.
GPG relies on a security concept known as public key encryption. The idea is that you can
split the encrypting and decrypting stages of the transmission into two separate pieces.
That way, you can freely distribute the encrypting portion, as long as you secure the
decrypting portion.
This would allow for a one-way message transfer that can be created and encrypted by
anyone, but only be decrypted by the designated user (the one with the private decrypting
key). If both of the parties create public/private key pairs and give each other their public
encrypting keys, they can both encrypt messages to each other.So in this scenario, each
party has their own private key and the other user's public key.
Another benefit of this system is that the sender of a message can "sign" the message with
their private key. The public key that the receiver has can be used to verify that the
signature is actually being sent by the indicated user.
This can prevent a third-party from "spoofing" the identity of someone. It also helps to
ensure that the message was transmitted in-full, without damage or file corruption.
Using GPG correctly can help you secure your communications with different people.
This is extremely helpful, especially when dealing with sensitive information, but also
when dealing with regular, every day messaging.
Because of the way that certain encrypted communications can be flagged by monitoring
programs, it is recommended to use encryption for everything, not just "secret" data. That
VI
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
will make it more difficult for people to know when you are sending important data or just
sending a friendly hello.
Installing Gpg4win
The installation assistant will start and ask you for the language to be used with the installation process:
Choose all the program that are run on your computer and click on[Next]
VI
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
The next page displays the licensing agreement it is only important if you wish to modify or
forward Gpg4win. If you only want to use the software, you can do this right away without
reading the license.
click on[Next]
On the page that contains the selection of components you can decide which programs you want
to install.
A default selection has already been made for you. Yo can also install individual components at a
later time.
Moving your mouse cursor over a component will display a brief description. Another useful
feature is the display of required hard drive space for all selected components.
VI
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
click on[Next]
The system will suggest a folder for the installation, e.g.: C:nProgrammenGNUnGnuPG
You can accept the suggestion or select a different folder for installing Gpg4win.
click on[Next]
CS6711-SECURITY LAB 31 VII SEM/IV YEAR
VI
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
Now you can decide which links should be installed the system will automatically create a link
with the start menu. You can change this link later on using the Windows dashboard settings.
click on[Next]
If you have selected the default setting link with start menu you can define the name
of this start menu on the next page or simply accept the name.
Click on [Install]
CS6711-SECURITY LAB 32 VII SEM/IV YEAR
VI
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
During the installation process that follows, you will see a progress bar and information on which
file is currently being installed. You can press [ Show details ] at any time to show the installation
log.
The last page of the installation process is shown once the installation has been successfully
completed:
VI
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
You have the option of displaying the README file, which contains important information on
the Gpg4win version you have just installed. If you do not wish to view this file, deactivate this
option.
Then click on [ Finish ].
Creating a certificate
You will see the main Kleopatra screen the certificate administration:
VI
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
Choose the first option from the dialog box then press next button.
VI
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
In the certificate option dialog, click on [ Create personal OpenPGP key pair ].
Now enter your e-mail address and your name in the following window. Name and e-mail
address will be made publicly visible later.
You also have the option of adding a comment for the key pair. Usually this field stays empty, but
if you are creating a key for test purposes, you should enter "test" so you do not forget it is a test
key. This comment becomes part of your login name, and will become public just like your name
and e-mail address.
VI
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
VI
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
VI
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
a revocation certificate will be generated to the screen. Copy and paste this to a secure
location, or print it for later use
VI
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
Please move it to a medium which you can hide away; if Mallory gets
access to this certificate he can use it to make your key unusable.
It is smart to print this certificate and store it away, just in case
your media become unreadable. But have some caution: The print system
of your machine might store the data and make it available to others!
You can easily encrypt and decrypt messages after you have configured your keys with
the other party.
-----BEGIN PGP MESSAGE-----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=DdwB
-----BEGIN PGP PUBLIC KEY BLOCK-----
Panimalar Institute of Technology
Security Lab
Dept. of CSE
Result:
VI
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
Aim:
SETUP A HONEY POT AND MONITOR THE HONEYPOT ON NETWORK using KF Sensor
Security tool.
Algorithm:
KF Sensor is the tool to setup as honeypot when KF Sensor is running it places a siren
icon in the windows system tray in the bottom right of the screen. If there are no alerts
then green icon is displayed.
The KF Sensor automatically starts during windows boot Click Next to setup wizard.
Select all port classes to include and Click Next.
Send the email and Send from email enter the ID and Click Next.
Select the options such as Denial of Service[DOS], Port Activity, Proxy Emulsion,
Network Port Analyzer, Click Next.
VI
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
Result:
VI
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
VI
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
VI
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
Result:
VI
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
Vi Stumbler (Vi Stumbler) is one of the Wi-Fi hacking tool which only compatible with
windows, this tool also a freeware. With this program, we can search for wireless network which
open and infiltrate the network. Its having some compatibility and network adapter issues
Algorithm:
Download and install Vi stumbler
It is highly recommended that your PC should have wireless network card in order to
access wireless router.
Now Run Vi stumbler in record mode and configure wireless card.
There are several indicators regarding the strength of the signal, such as GREEN indicates
Strong, YELLOW and other color indicates a weaker signal, RED indicates a very weak
and GREY indicates a signal loss.
Lock symbol with GREEN bubble indicates the Access point has encryption enabled.
MAC assigned to Wireless Access Point is displayed on right hand pane.
The next coloumn displays the Access points Service Set Identifier[SSID] which is useful
to crack the password.
To decrypt use WireShark tool by selecting EditpreferencesIEEE 802.11
Enter the WEP keys as a string of hexadecimal numbers as A1B2C3D4E5
VI
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
Result:
Thus the program has been successfully executed and verified
VI
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
VI
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
VI
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
VI
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
VI
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
Result:
Thus the program has been successfully executed and verified.
VI
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
ADDITIONAL PROGRAMS
VI
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
STEP 4: where modulus m is the size of the alphabet and a and b are the key of the cipher. The
value a must be chosen such that a and m are coprime. The decryption function is
STEP 5: where a1 is the modular multiplicative inverse of a modulo m. I.e., it satisfies the
equation
STEP 5: The multiplicative inverse of a only exists if a and m are coprime. Hence without the
restriction on a decryption might not be possible. It can be shown as follows that decryption
function is the inverse of the encryption function,
VI
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
Output:
Result:
VI
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
Algorithm:
The 16 input bytes are substituted by looking up a fixed table (S-box) given in design. The result
is in a matrix of four rows and four columns.
STEP 5:Shiftrows
Each of the four rows of the matrix is shifted to the left. Any entries that fall off are re-inserted
on the right side of row. Shift is carried out as follows
VI
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
The result is a new matrix consisting of the same 16 bytes but shifted with respect to each
other.
STEP 6:MixColumns
Each column of four bytes is now transformed using a special mathematical function. This
function takes as input the four bytes of one column and outputs four completely new bytes,
which replace the original column. The result is another new matrix consisting of 16 new bytes. It
should be noted that this step is not performed in the last round.
STEP 7:Addroundkey
The 16 bytes of the matrix are now considered as 128 bits and are XORed to the 128 bits of the
round key. If this is the last round then the output is the ciphertext. Otherwise, the resulting 128
bits are interpreted as 16 bytes and we begin another similar round.
The process of decryption of an AES ciphertext is similar to the encryption process in the reverse
order. Each round consists of the four processes conducted in the reverse order
Result:
VI
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
Algorithm:
STEP 5:Simple: It uses addition, XOR, lookup table with 32-bit operands.
STEP 6:Secure: The key length is variable ,it can be in the range of 32~448 bits: default 128 bits
key length.
STEP 7:It is suitable for applications where the key does not change often, like communication
link or an automatic file encryptor.
VI
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
STEP 9:Blowfish symmetric block cipher algorithm encrypts block data of 64-bits at a time.it
will follows the feistel network and this algorithm is divided into two parts.
1. Key-expansion
2. Data Encryption
STEP 10:Key-expansion:
It will converts a key of at most 448 bits into several subkey arrays totaling 4168 bytes. Blowfish
uses large number of subkeys.
P1,P2,.,P18
----------------------------------------------------
Algorithm:Blowfish Encryption
------------------------------------------------------------------
Divide x into two 32-bit halves: xL, xR
xL = XL XOR Pi
xR = F(XL) XOR xR
VI
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
Swap XL and xR
xR = xR XOR P17
xL = xL XOR P18
Recombine xL and xR
Output:
Result:
VI
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
Algorithm:
STEP 3: RC5 encryption and decryption both expand the random key into 2(r+1) words that will be
used sequentially (and only once each) during the encryption and decryption processes
STEP 4: Key expansion
VI
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF CSE
A = A + S[0] B
= B + S[1]
for i = 1 to r do:
A = ((A ^ B) <<< B) + S[2 * i]
B = ((B ^ A) <<< A) + S[2 * i + 1]
# The ciphertext block consists of the two-word wide block composed of A and B, in that order.
return A, B
STEP 6: Decryption
Decryption is a fairly straight-forward reversal of the encryption process
return A, B
Result: