Beruflich Dokumente
Kultur Dokumente
Graduate Programs
Source: https://www.stanfieldit.com/wp-content/uploads/Cyber-Security-Statistics-2019.png
Modified Key Scheduling Operation of IDEA
Introduction
• Massive reports of computer
related crimes had identified
issues of data breaches. At the
point that an attack becomes
successful, entities who own
these data are on great danger.
• These data are used for
important transactions such us
business, education,
government security to name a
Figure 3. Cyber Security Statistics in 2019
few.
Source: https://www.stanfieldit.com/wp-content/uploads/Cyber-Security-Statistics-2019.png
Modified Key Scheduling Operation of IDEA
Introduction
• Cryptography is a field of
science that learns about
how to conceal an important
information.
• Files are turned into forms
that cannot be read by
anyone and return it back to
the original data by using
various techniques.
• These techniques ensure that
information cannot be known
by any unwanted party. Figure 4. Cryptography
• The algorithm is also using a 128 bits key size for stronger
encryption.
Original 128-bit
Secret Key
K1 (BITS
97 – 112)
Unused
K3 (BITS K4 (BITS 17- …. K6 (BITS bits (65 –
1-16) 32) 49 - 64) 128)
Thank You!