1 00:00:08,380 --> 00:00:10,330 Let us continue with cryptography. 2 00:00:11,740 --> 00:00:19,150 In this video, we are going to learn advanced encryption algorithms like data encryption standards 3 00:00:19,300 --> 00:00:24,190 and advanced encryption standard is the data encryption standard. 4 00:00:24,190 --> 00:00:28,330 This is an outdated key method of data encryption. 5 00:00:29,470 --> 00:00:35,620 This is the secret key encryption scheme adopted as a standard in USA in 1977. 6 00:00:36,650 --> 00:00:44,000 It uses a 56 bertke, which is truly considered by many to be insufficient as it can be cracked by brute 7 00:00:44,000 --> 00:00:52,640 force, a variant called Tripolis, or tedious, uses a longer key and is more secure but has never 8 00:00:52,640 --> 00:00:53,430 become popular. 9 00:00:54,570 --> 00:01:02,910 The advanced encryption standard that this is is expected to supposedly is and is the standard encryption 10 00:01:02,910 --> 00:01:03,420 algorithm. 11 00:01:05,060 --> 00:01:13,210 The data encryption standard, the DEA is a jointly developed 1974 by IBM and the U.S. government to 12 00:01:13,220 --> 00:01:17,440 set the standard that everyone could use to securely communicate with each other. 13 00:01:18,560 --> 00:01:23,690 It operates on blocks of 64 bits using a secret key that is 56 Bedazzler. 14 00:01:25,220 --> 00:01:29,260 The original proposal used a security that was a 64 bit sloup. 15 00:01:30,420 --> 00:01:35,630 It is widely believed that the removal of these aid bills from the key was done to make it possible 16 00:01:35,630 --> 00:01:39,110 for U.S. government agencies to secretly crack Mrs.. 17 00:01:40,730 --> 00:01:45,320 This started out as the Lucifer algorithm developed by IBM. 18 00:01:46,680 --> 00:01:53,430 The US National Security Agency NSA made several modifications after which it was adopted as a federal 19 00:01:53,430 --> 00:02:01,650 information boosting standard FBI Standard Politics three and and standard extra one nine to have a 20 00:02:01,650 --> 00:02:03,750 look at a diagram on your screen. 21 00:02:04,560 --> 00:02:07,410 We will discuss steps performed in the years ago. 22 00:02:08,430 --> 00:02:16,080 The plain text is divided into 64, which blocks initial permutation is performed on 64 bit plain text 23 00:02:16,080 --> 00:02:16,470 book. 24 00:02:17,340 --> 00:02:25,100 Of the initial permutation block is divided into two halves of 32 bit, each left plaintext L and right 25 00:02:25,110 --> 00:02:26,070 plaintext are. 26 00:02:27,630 --> 00:02:35,160 And, ah, go through 16 rounds, each of which is filled with the 48 Besuki, the round KIGEN reader 27 00:02:35,160 --> 00:02:42,120 is an algorithm which is filled with an input of 56 key, and it gives the output of 48 with round. 28 00:02:43,020 --> 00:02:51,780 In case of these, the round algorithm is invoked 16 times after 16 ounce allanah a combined and then 29 00:02:51,780 --> 00:02:58,050 the final permutation is performed combined bloc of 64, which is the result of this process, produces 30 00:02:58,050 --> 00:03:00,180 a 64 bit ciphertext block. 31 00:03:01,690 --> 00:03:09,040 After all, the blocks are processed, processed, we get a combined full ciphertext, this was quite 32 00:03:09,040 --> 00:03:14,830 influential at that time and it's simple enough to understand four building blocks using modern ciphers. 33 00:03:15,070 --> 00:03:18,570 But by now it is considered obsolete and insecure. 34 00:03:19,030 --> 00:03:25,930 Some of the disadvantages of DSA, which is the gear that is selected on the rounds, are problem. 35 00:03:26,500 --> 00:03:32,020 The splitting of keys in order to have and swiping them might throw the same result if death continues 36 00:03:32,020 --> 00:03:36,940 ones and zeros, this ends up in using the same key 2016 cycles. 37 00:03:37,860 --> 00:03:41,240 There can be the same output from different inputs and permutations. 38 00:03:41,800 --> 00:03:43,690 These are called the keys. 39 00:03:44,680 --> 00:03:50,010 The message is encrypted with a particular key and is taken once complained of that encryption with 40 00:03:50,050 --> 00:03:54,080 the same as the encryption of the complement of the message and complement of the key. 41 00:03:54,430 --> 00:03:56,680 Let us start with advanced encryption. 42 00:03:56,680 --> 00:03:57,790 Standard is. 43 00:03:58,810 --> 00:04:02,750 It is the symmetric encryption standard for security encryption. 44 00:04:03,980 --> 00:04:10,490 U.S. was created by two Belgian cryptographers, Vincent Riesman and John Berman, as a replacement 45 00:04:10,490 --> 00:04:11,660 of the old these. 46 00:04:12,790 --> 00:04:20,800 The standard comprises with three blocks, Cyprus is 128, is 192 and is 256. 47 00:04:21,850 --> 00:04:31,010 Each of the Cyprus has a 128 bit block size with geysers of 128, 192 and 256 bits, respectively. 48 00:04:32,230 --> 00:04:38,950 The algorithm is name original and has several simple steps of known cryptographic mechanism that are 49 00:04:38,950 --> 00:04:40,120 put in chain together. 50 00:04:40,630 --> 00:04:43,440 So it is effectively hard to correct the algorithm. 51 00:04:44,740 --> 00:04:51,730 The heart of algorithm is around its box mechanism substitution, then a second step about transposition 52 00:04:52,060 --> 00:04:55,160 matrix operation influenced by the classical cipher. 53 00:04:55,420 --> 00:04:59,500 And this is all going over and over and made it quite complex to break. 54 00:05:01,070 --> 00:05:05,750 The U.S. has been adopted by the U.S. government and is now used worldwide. 55 00:05:06,860 --> 00:05:12,460 It supersedes the data encryption standard, that is the disease which was published in 1977. 56 00:05:14,290 --> 00:05:20,230 The algorithm described by eight years is a symmetric algorithm, meaning the same is used for both 57 00:05:20,230 --> 00:05:22,150 encrypting and decryption the data. 58 00:05:22,670 --> 00:05:28,990 Now I will tell you why he replace these with new and updated features. 59 00:05:29,830 --> 00:05:32,650 Ediacara Block Encryption Implementation. 60 00:05:33,740 --> 00:05:43,550 128 group encryption with 128, 192 and 256 with Killens Semitic algorithm requiring only one encryption 61 00:05:43,550 --> 00:05:53,050 and decryption key data security for over 20 to 30 years, worldwide access, no royalties and all is 62 00:05:53,150 --> 00:05:53,990 implementation. 63 00:05:54,500 --> 00:05:59,540 In the next lecture, we will see asymmetric encryption with a real life example.