Cryptography Report
Cryptography Report
UNIVERSITY BELGAUM-590014
Cryptography
A Mini Project Report
On
Submitted by:
Prof. Nethra H L
Asst. Professor, Dept. of CSE
Technology is advancing day-to-day. For a better and faster technology, information security is a
must. This requires data authentication at the execution levels. Cryptography is a useful tool
through which secure data independency can be established. It uses two basic operations namely
encryption and decryption for secure data communication. A large number of cryptographic
techniques have been proposed and implemented so far. In this paper, we have surveyed some of
the proposed mechanisms based on Symmetric Key Cryptography and have made a basic
comparison study among them. The basic features, advantages, drawbacks and applications of
various Symmetric Key Cryptography algorithms have been mentioned in this paper.
CHAPTER 1
1 INTRODUCTION
Cryptography is the art of transforming a readable text (plain text) into an unreadable one (cipher
text) which ensures data privacy. The word “crypto” mean “hidden” and “graphy” mean “to
write”. It is concerned with information security, data encryption, data authentication and access
control. There are two types of cryptography- Symmetric Key (Secret Key) cryptography and
Asymmetric Key (Public Key) cryptography. In this brief, we have discussed some of the
proposed algorithms based on Symmetric Key cryptography. Symmetric Key Cryptography uses a
common key (Secret key) for both encryption and decryption purposes. Thus, it is more effective
to the Asymmetric Key counterpart. Various algorithms and mechanisms have been developed so
far to implement Symmetric Key cryptography.
There are various algorithms for symmetric key cryptography such as AES, DES, 3DES,
RC4,Blowfish, etc. In this section, we have described these basic symmetric key algorithms.
Karlheinz Hafner et al. [1] proposed a self-testing cryptographic chip to secure data over
communication networks and hard disks. It provides autonomous data transfer and has various
key management functions. The pilot chip was named as the Siemens Coprocessor Unit for rapid
encipherment, or simply SICURE.The chip is divided into a collection of self-testable modules.
The total fault coverage is obtained by taking the average fault coverage of the individual
modules. It provides low hardware penalty with high fault coverage. A VLSI implementation of
cryptography known as VINCI was presented by R. Zimmermann, A. Curiger, H. Bonnenberg,
H. Kaeslin, N. Felber, and W. Fichtner [2].Unlike the self-testing chip, the VINCI implements
both encryption and decryption techniques in a single hardware component. The cryptographic
chip executes DES algorithm with a throughput of 20 Mbps or more, whereas VINCI has a
throughput of more than 177 Mbps. So, it can be applied in high-speed network protocols like
FDDI or ATM.The processing speed of VINCI is higher than the data Encryption Algorithm
(IDEA) developed by Lai and Massey[3][4].It incorporates an eight-stage pipelining where each
computation uses a hardware unit that operates in parallel. Unlike BIST, it helps in fault
localization. It incorporates boundary scan schemes and self-testing through hardware
redundancy, concurrent controller check, computation of invariant,etc.The self-testing scheme is
further studied in details by H. Bonnenberg in 1993[5].In 1996,David Naccache and David
MRaYhhi [6] surveyed the pre-existing crypto-dedicated microprocessors and proposed the
possible evaluations of some microprocessors. The problem of inserting a chip into a card is
removed by the smart cards. Hence, they provide better processing capacities, storage and
portability. The executing programs are written in ROM which cannot be modified. This
guarantees the control of the code. The quality of the cards along with public key cryptography
provides solutions to many security problems. The card gathers all elements into a single chip to
prevent illegal access. True Random Based Differential Power Analysis (DPA) Countermeasure
circuit for an AES Engine had been proposed by Po-Chun Liu, Hsie-Chia Chang and Chen-Yi
Lee [7].According to them, DPA attack is a big threat to the crypto chips as it can disclose the
secret key efficiently without much effort. Several methods had been proposed earlier to resist
these attacks but it increases the hardware cost and degrades the throughput.
CHAPTER 4
Various mechanisms had been proposed so far, based on symmetric key cryptography. They
ensure excellent data security. But there are certain areas that remained open. Strong revocation
techniques for Oblivious Attribute Certificates need to be developed. In case of Peer-to-Peer
Security, the data recovery should be fast and it should handle large number of computers. SOA
can be applicable for high data transfer. Self-certification of public key helps in data security but
it requires large storage. So, methods can be developed to reduce the storage and time
requirements simultaneously. Digital watermarking has various parameters like robustness,
transparency, security, capacity, complexity, etc. But we IEEE-32331 cannot achieve them
simultaneously. Depending on this condition, an appropriate algorithm can be developed. It can
be analyzed, how a large message can be embed, retaining its robustness. Better cryptographic
methods improve the system performance and operate efficiently in different scenarios.
CHAPTER 5
CONCLUSION
Cryptography plays a vital role in ensuring data security through various aspects like
authentication, confidentiality, non-repudiation, data integrity, etc. In this paper, we have
analyzed various symmetric cryptographic mechanisms developed so far. These encryption and
decryption techniques depend upon the type of data and the channel through which the data is
being communicated. We have drawn a comparison analysis of the proposed mechanisms based
on their basic features, advantages, drawbacks and applications. Among those, the digital
watermarking scheme and public key certification and revocations are found to be highly
efficient. The watermarking scheme is based on Steganographic systems, where the information
is directly embed into media data. The public key certification and revocation techniques ensure
the validation of public keys, which is essential for data privacy. They both render robustness,
transparency, security, imperceptibility, possibility of verification, flexibility and efficiency.
CHAPTER 6
REFERENCES