create account

Cryptology Series Part 5:Types of Symmetric Systems by digicrypt

View this thread on: hive.blogpeakd.comecency.com
· @digicrypt ·
$2.54
Cryptology Series Part 5:Types of Symmetric Systems
<html>
<h3><br>
If you are new to my Cryptology Series or are having trouble with any of the terminology, I encourage you to go to my blog and check out parts 1,2,3 and especially part 4. Now let's get started!</h3>
<p><img src="https://i.imgsafe.org/b6fbe822a4.png" width="720" height="720"/></p>
<p><br></p>
<h1>Types of Symmetric Systems</h1>
<h1>Symmetric Cryptography&nbsp;</h1>
<h3>Uses symmetric keys known as secret keys, sender and receiver use two instances of the same key</h3>
<h3>Benefit: much faster and less computationally intensive</h3>
<h3>Weakness: Secure key distribution</h3>
<h3><br></h3>
<h3><br></h3>
<h1>Data Encryption Standard (DES)&nbsp;</h1>
<h3>In the 1970s IBM developed the Lucifer Cipher, 128 bit algorithm</h3>
<h3>NSA modified into 64 bit blocks with a 56 bit key, this became DES</h3>
<h3>Became a national cryptographic standard in 1977</h3>
<h3>Very widely used algorithm</h3>
<h3>Considered to be strong and efficient</h3>
<h3>DES dropped DES as a standard in 1986 however</h3>
<h3>In 1998 the Electronic Frontier Foundation built a computer for $250,000 that broke DES in three days using a brute force attack on the keyspace.</h3>
<h3><br></h3>
<h1><br></h1>
<h1>How Does DES Work?&nbsp;</h1>
<h3>DES is a symmetric block cipher, meaning when 64 bit chunks of PT go in 64 bits of CT comes out</h3>
<h3>Symmetric algorithm- the same key is used for encryption and decryption</h3>
<h3>Text is divided into blocks and thy are put through rounds of functions</h3>
<h3>•	64 bit blocks</h3>
<h3>•	56 bit key</h3>
<h3>•	48 bit round key</h3>
<h3>•	16 rounds</h3>
<h3>•	Has strong Avalanche Effect</h3>
<h3><img src="https://i.imgsafe.org/fa522ac959.png" width="434" height="463"/></h3>
<h3><br></h3>
<h1>DES Modes</h1>
<h3>Block ciphers have several modes of operation</h3>
<h3>Each mode specifies how the cipher will operate</h3>
<h3>Each mode is used for a specific operation</h3>
<h3><br></h3>
<h1>5 DES Modes</h1>
<h3>Electronic Code Book (ECB)</h3>
<h3>Cipher Block Chaining (CBC)</h3>
<h3>Cipher Feedback (CFB)</h3>
<h3>Output Feedback (OFB)</h3>
<h3>Counter Mode (CTR)</h3>
<h3><br></h3>
<h1>Triple DES</h1>
<h3>Was offered as a quick solution to the failures of DES</h3>
<h3>Uses 48 rounds of computation making it highly resistant to cryptanalysis</h3>
<h3>Operates much slower than DES</h3>
<h3>Later replaced by AES</h3>
<h3><br></h3>
<h1>Advanced Encryption Standard</h1>
<h3>AES was developed from the Rijndael Cipher</h3>
<h3>Supports</h3>
<h3>128 bit block/key 10 rounds</h3>
<h3>192 bit block/key 12 rounds</h3>
<h3>256 bit block/key 14 rounds</h3>
<h3><br></h3>
<h1>How does AES work?</h1>
<h3>Uses following processes</h3>
<h3>Key generation</h3>
<h3>Add round key</h3>
<h3>Byte substitution</h3>
<h3>Shift row</h3>
<h3>Mix columns</h3>
<h3><img src="https://i.imgsafe.org/fa526a9d25.png" width="917" height="834"/></h3>
<h3><br></h3>
<h1>Other symmetric systems…</h1>
<h3>International Data Encryption Algorithm&nbsp;</h3>
<h3>(IDEA)</h3>
<h3>Blowfish</h3>
<h3>RC4</h3>
<h3>RC5</h3>
<h3>RC6</h3>
<h3><br></h3>
<h3><br></h3>
<h3>Thank you for reading Cryptology Series Part 5:Types of Symmetric Systems</h3>
<h3>If you had any trouble with terminology or the concepts involved check out the other parts of my series</h3>
<h3>&nbsp;<a href="https://steemit.com/cryptocurrency/@digicrypt/cryptology-series-part-1-getting-the-basics"><strong>Cryptology Series Part 1: Getting the Basics</strong></a></h3>
<h3><a href="https://steemit.com/cryptocurrency/@digicrypt/cryptology-series-part-1-getting-the-basics">&nbsp;</a><a href="https://steemit.com/history/@digicrypt/cryptology-series-part-2-history-of-cryptography"><strong>Cryptology Series Part 2: History of Cryptography</strong></a></h3>
<h3>&nbsp;<a href="https://steemit.com/cryptocurrency/@digicrypt/cryptology-series-part-3-strength-of-cryptosystems"><strong>Cryptology Series Part 3: Strength Of Cryptosystems</strong></a>&nbsp;</h3>
<h3><a href="https://steemit.com/cryptocurrency/@digicrypt/cryptology-series-part-4-methods-of-encryption"><strong>Cryptology Series Part 4: Methods of Encryption</strong></a> &nbsp;&nbsp;&nbsp;&nbsp;</h3>
<h3><br></h3>
<h3>Part 6 will cover Types of Asymmetric Systems&nbsp;</h3>
<h3>Also I encourage you to check out my new series " Tales From The Crypto"&nbsp;</h3>
<h3>https://steemit.com/steemit/@digicrypt/tales-from-the-crypto-1-interview-with-htooms&nbsp;</h3>
<h3><br></h3>
<h3><br></h3>
<h3><br></h3>
<h3><img src="https://i.imgsafe.org/fa5d16dcfc.jpg" width="339" height="349"/></h3>
<h3>Follow my blog @digicrypt if you are interested in cryptocurrency, cryptology or blockchain.</h3>
<h3><br></h3>
<h3>DASH: XgQ9NBonMoCPKhF37agY4W8zk7gwQFnwGV</h3>
<h3>Ether: XE04RO3I0QA5UKB31OZK4O3CK3TOT03R4TM</h3>
<h3><img src="https://i.imgsafe.org/fa5d09b6e4.jpg" width="581" height="216"/></h3>
<h3><br></h3>
<h3><br></h3>
<p><br></p>
</html>
👍  , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , and 53 others
properties (23)
authordigicrypt
permlinkcryptology-series-part-5-types-of-symmetric-systems
categorycryptocurrency
json_metadata{"tags":["cryptocurrency","life","history","cryptography","bitcoin"],"users":["digicrypt"],"image":["https://i.imgsafe.org/b6fbe822a4.png","https://i.imgsafe.org/fa522ac959.png","https://i.imgsafe.org/fa526a9d25.png","https://i.imgsafe.org/fa5d16dcfc.jpg","https://i.imgsafe.org/fa5d09b6e4.jpg"],"links":["https://steemit.com/cryptocurrency/@digicrypt/cryptology-series-part-1-getting-the-basics","https://steemit.com/history/@digicrypt/cryptology-series-part-2-history-of-cryptography","https://steemit.com/cryptocurrency/@digicrypt/cryptology-series-part-3-strength-of-cryptosystems","https://steemit.com/cryptocurrency/@digicrypt/cryptology-series-part-4-methods-of-encryption","https://steemit.com/steemit/@digicrypt/tales-from-the-crypto-1-interview-with-htooms"],"app":"steemit/0.1","format":"html"}
created2017-04-13 16:51:45
last_update2017-04-13 16:51:45
depth0
children0
last_payout2017-04-20 16:51:45
cashout_time1969-12-31 23:59:59
total_payout_value2.115 HBD
curator_payout_value0.427 HBD
pending_payout_value0.000 HBD
promoted0.001 HBD
body_length4,887
author_reputation9,344,424,618,224
root_title"Cryptology Series Part 5:Types of Symmetric Systems"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd0
post_id3,006,837
net_rshares7,468,710,877,646
author_curate_reward""
vote details (117)