International Data Encryption Algorithm is one of the strongest cryptographic algorithms launched
in 1990.
IDEA is not as popular as DES for two primary reasons:
o It is patented unlike DES and therefore must be licensed before it can be used in
commercial applications.
o DES has a long history as compared to IDEA.
One popular e-mail privacy technology known as pretty good privacy (PGP) is based on
IDEA.
BASIC PRINCIPLES
o IDEA is a block cipher
o Works on 64 bit plain text blocks.
o Key consists of 128 bits
o Same algorithm is used for encryption and decryption
in 1990.
IDEA is not as popular as DES for two primary reasons:
o It is patented unlike DES and therefore must be licensed before it can be used in
commercial applications.
o DES has a long history as compared to IDEA.
One popular e-mail privacy technology known as pretty good privacy (PGP) is based on
IDEA.
BASIC PRINCIPLES
o IDEA is a block cipher
o Works on 64 bit plain text blocks.
o Key consists of 128 bits
o Same algorithm is used for encryption and decryption
o 64 bit plain text block is divided into four portions of plain text each of size 16 bits(say P1to P4).
o P1 to P4 are the inputs to the first round of the algorithm.
o There are eight such rounds.
o The key consists of 128 bits. In each round 6 subkeys are used and after the round
operation an output transformation is performed using subkeys( K49 to K52).
o The final output produced is the output produced by the output transformation step which
is the four blocks of cipher text named C1 to C4( 16 bits each).
o These are combined to form the final 64 bit cipher text block.
SUB KEY GENERATION
o Each rounds makes use of 6 subkeys (8X6=48) and the final output transformation uses
four subkeys( 48+4 =52 subkeys).
o 128 bit key is divided into 8 parts K1 to K8 each of 16 bits.
o Of which K1 to K6 is used for ROUND 1 operation.
o For the remaining round subkeys are generated by performing key shifting.
o The orginal key is shifted left circularly by 25 bits.
o And hence 52 subkeys are generated.
OPERATIONS
o Operations performed are:
Addition,
Multiplication,
XOR
ROUNDS
o Each round involves a series of operation on the four data blocks using six keys.
1. Multiply P1and K1 i.e, S1=P1 x K1
2. Add P2 and K2 i.e, S2=P2 + K2
3. Add P3 and K3 i.e, S3=P3 + K3
4. Multiply P4 and K4 i.e, S4=P4 x K4
5. XOR step1 and step3 i.e, S5=S1⊕S2
6. XOR step2 and step4 i.e, S6=S3⊕S4
7. Multiply step5 and K5 i.e, S7=S5 x K5
8. Add step6 and step7 i.e, S8=S6 + S7
9. Multiply step8 with K6 i.e, S9=S8 x K6
10. Add step7 and step9 i.e, S10=S7 + S9
11. XOR step1 and step9 i.e, S11=S1 ⊕ S9
12. XOR step3 and step9 i.e, S12=S3 ⊕ S9
13. XOR step2 and step10 i.e, S13=S2 ⊕ S10
14. XOR step4 and step10 i.e, S14=S4 ⊕ S10
OUTPUT TRANSFORMATION
o It is a one time operation
o Takes place at the end of 8th round.
o The output of this process is the final 64 bit cipher text which is the combination of four
four cipher text blocks C1 to C4.
DECRYPTION
o The process is exactly same as that of encryption process.
o There are some alterations in the generation and patterns of subkeys.
o The decryption subkeys are actually an inverse of the encryption subkeys. That is while
subkey generation an right circular shift is performed.
STRENGTH OF IDEA
o IDEA uses 128 bit key which is double than the size of DES.
o Thus to break IDEA 2 ^ 128 encryption operations would be required.
o Thus IDEA is more secured.
Comments
Post a Comment