SlideShare una empresa de Scribd logo
1 de 24
 What is meant by cryptography ?
     • Its Greek word
     • Crypto means “ Secret”
      •   Graphie means “ Writing “

 Why Cryptography ?
     •    To convert the plain text to unreadable text

 What is need of Cryptography ?
   To secure the Sensitive Information

           •   Username – Password

           • Credit Card Number etc..
 CRYPTOGRAPHY COMPONENT
 Cryptanalysis
   basic component of cryptography is a cryptosystem

      Cryptanalyst
          •   Person working for unauthorized interceptor
      Cryptographer
          • Person working for legitimate sender or receiver
      Cryptology
          • encryption and decryption
 Cryptosystem
   A cryptosystem is a 5-tuple (Ε , D , M , K , C)

       •       M is the collection of plaintexts
       •        K is the set of keys
       •        C is the set of cipher texts

      How it works ?
           o Ε = Μ × K → C is the set of encipher (encryption)
           o D = C × K → M is the set of deciphering (decryption)
 Note
           •     Plaintext M : collection of original messages
            •     Cipher text C : set of messages in encrypted form
 Cryptosystem
          Encryption
              • Process of encoding (enciphering / encryption ) a message
          Decryption
             •   Process of decoding (deciphering or decryption) an
                  encrypted message to its original form.

 Alisa                                                            Kishan
                                   data, control
                      channel
                                    messages


data        secure                                  secure            data
            sender                                 receiver


                         Trudy
 CRYPTOGRAPHY




          CRYPTOGRAP
              HY

SYMMETRIC-KEY           ASYMMETRIC-
CRYPTOGRAPHY                KEY
                       CRYPTOGRAPHY
 Types of Cryptosystems
     Symmetric Key Cryptosystems
          • Also called single-key cryptosystems
          • M = D(K, E(K, M))

          • The encryption key and decryption key are the same
 Symmetric Cryptosystems
   Basic techniques for classical ciphers (Encryption)
      Substitution
           • One letter is exchanged for another
      Transposition
           • The order of the letters is rearranged Classical ciphers
      Mono-alphabetic
           • Letters of the plaintext alphabet are mapped into
               other unique letters
      Poly-alphabetic
        • Letters of the plaintext alphabet are mapped into
           letters of the cipher text space depending on their
           positions in the text
      Stream
           • Key stream is generated and used to encrypt the plaintext
                (Symmetric Key Algorithms)
 Transposition
 Example :-
                      Cipher-Text :-          TRHCEEIETGSSMAIAEASS
        T   5     T                                       R
        H   3         H                               C       E                               E
        E   1             I                       E               T                       G
        K   4                 S               S                       M               A
        E   2                     I       A                               E       S
        Y   6                         S                                       S


Refer (by key):   IETGIAESHCEESSMATRSS                                    T H E K E Y
                                                                          5 3 1 4 2 6

 Columnar                                                                T   H I S I S
                                                                          A   S E C R E
         • IEEIRSHSMESCSTATGSEA                                           T   M E S S A
                                                                          G   E
 Types of Cryptosystems
     Asymmetric cryptosystem
         • M = D (Kd , E (Ke , M ) )
         • The encryption key and decryption key are not the same
         • Kd ≠ Ke
 Asymmetric Key Cryptosystem
  (Public Key Cryptosystem)
       Uses public and private keys
            • Public key for encryption
            • Private key for decryption

       Examples

            • RSA
            • Trapdoor one-way function
            • Elliptical curve cryptography
 RSA Principle
   Developed by Ron Rivets , Adi Shamir, and Leonard    Adleman.
    (MIT, 1977)

                  C = me mod (pq)

• P , q : any two large prime numbers (more than 512 bits)

         •   e: public key
         •   d: private key

• Knowing C and e, it is “infeasible” to calculate m without
  knowing d , p and q

• Knowing d, p and q, it is easy to find the original
   plaintext message m = Cd mod (pq)
 RSA Principle

{m, e, p, q;                     {C, e, p, q;
C= me mod(pq)}                   m=Cd mod(pq)}
   Sender                            Receiver


                 Intruder
                            {C, e}
 What is Steganography?
           Its Greek Words:

                  • STEGANOS – “Covered”
                  • GRAPHIE – “Writing”

           Steganography is about Hiding messages
         Digital Applications of Steganography
          • Can be hidden in digital data
                - MS Word (doc)
                - Web pages (html)
                - Sound files (mp3, wav, cda)
                - Video files (mpeg, avi)
               - Digital images (bmp, gif, jpg)
 Today, steganography is used primarily to protect
  digital rights
              •   “watermarking” copyright notices
              •   “fingerprinting” a serial ID
 History of Steganography
             Chinese silk balls
             Invisible ink-jet technology
             Microdots
             Easter eggs

   Hiding a message within a text
        Shift some words by one point/pixel
             - Shifted words (or their first letters) make the sentence
        Use different fonts

              - Letter by letter or word by word
 A Real Example
   During WW2 the following cipher message
    was actually sent by a German spy
      “Apparently, neutral’s protest is thoroughly
      discounted and ignored. Isman hard hit.
      Blockade issue affect pretext for embargo on
      by products, ejecting suets and vegetable
      oils.”

     Hidden Message

                • “ Pershing sails from NY June 1”
 Modern Steganography
      Hiding one message within another
       (“container”)
         Most containers are rich media
            • Images , audio, video ,mp3 etc.


      Copyright notices embedded in digital art

                • Prove ownership

       Digital cameras EXIF tags

                • Not secretive, but hidden from the eyez
                • Embed info such as camera type, date, shutter speed ,
                   focal length,..


 Similarly , possible to embed messages in invisible parts of html pages
 Steganography System
 Comparison
Cryptography
   C = Ek (P)             Plain text
    P = Dk (C)                         f       Ciphertext

                          Key


Steganography
                 secret message
                                           f   Stego message
                 cover image
 Hiding a Message in an Image
 Original Picture    Embedded picture
CryptographyVsStegnoGraphy
CryptographyVsStegnoGraphy

Más contenido relacionado

La actualidad más candente

Ch12 Encryption
Ch12 EncryptionCh12 Encryption
Ch12 Encryption
phanleson
 
IS Unit 1_Conventional Encryption_Classical Encryption Techniques
IS Unit 1_Conventional Encryption_Classical Encryption TechniquesIS Unit 1_Conventional Encryption_Classical Encryption Techniques
IS Unit 1_Conventional Encryption_Classical Encryption Techniques
Sarthak Patel
 
The rsa algorithm
The rsa algorithmThe rsa algorithm
The rsa algorithm
Komal Singh
 

La actualidad más candente (20)

RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
Data Protection Techniques and Cryptography
Data Protection Techniques and CryptographyData Protection Techniques and Cryptography
Data Protection Techniques and Cryptography
 
Ch12 Encryption
Ch12 EncryptionCh12 Encryption
Ch12 Encryption
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
2 classical cryptosystems
2 classical cryptosystems2 classical cryptosystems
2 classical cryptosystems
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
Chapter 8 cryptography lanjutan
Chapter 8 cryptography lanjutanChapter 8 cryptography lanjutan
Chapter 8 cryptography lanjutan
 
rsa-1
rsa-1rsa-1
rsa-1
 
Network Security & Cryptography
Network Security & CryptographyNetwork Security & Cryptography
Network Security & Cryptography
 
Computer Security Lecture 7: RSA
Computer Security Lecture 7: RSAComputer Security Lecture 7: RSA
Computer Security Lecture 7: RSA
 
CNS - Unit - 4 - Public Key Cryptosystem
CNS - Unit - 4 - Public Key Cryptosystem CNS - Unit - 4 - Public Key Cryptosystem
CNS - Unit - 4 - Public Key Cryptosystem
 
Applications of-linear-algebra-hill-cipher
Applications of-linear-algebra-hill-cipherApplications of-linear-algebra-hill-cipher
Applications of-linear-algebra-hill-cipher
 
basic encryption and decryption
 basic encryption and decryption basic encryption and decryption
basic encryption and decryption
 
IS Unit 1_Conventional Encryption_Classical Encryption Techniques
IS Unit 1_Conventional Encryption_Classical Encryption TechniquesIS Unit 1_Conventional Encryption_Classical Encryption Techniques
IS Unit 1_Conventional Encryption_Classical Encryption Techniques
 
Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network SecurityClassical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Security
 
Presentation about RSA
Presentation about RSAPresentation about RSA
Presentation about RSA
 
Security Attacks on RSA
Security Attacks on RSASecurity Attacks on RSA
Security Attacks on RSA
 
Elementry Cryptography
Elementry CryptographyElementry Cryptography
Elementry Cryptography
 
The rsa algorithm
The rsa algorithmThe rsa algorithm
The rsa algorithm
 
Pertemuan 7 cryptography
Pertemuan 7  cryptographyPertemuan 7  cryptography
Pertemuan 7 cryptography
 

Similar a CryptographyVsStegnoGraphy

Cryptography
CryptographyCryptography
Cryptography
Rohan04
 

Similar a CryptographyVsStegnoGraphy (20)

Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & Steganography
 
Cryptography and steganography lesson and discription.pptx
Cryptography and steganography lesson and discription.pptxCryptography and steganography lesson and discription.pptx
Cryptography and steganography lesson and discription.pptx
 
Cryptography and network security Nit701
Cryptography and network security Nit701Cryptography and network security Nit701
Cryptography and network security Nit701
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
RSA
RSARSA
RSA
 
Cryptography
CryptographyCryptography
Cryptography
 
Overview Of Cryptography
Overview Of CryptographyOverview Of Cryptography
Overview Of Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography and applications
Cryptography and applicationsCryptography and applications
Cryptography and applications
 
Cryptography
CryptographyCryptography
Cryptography
 
Information security (Symmetric encryption, cryptography, crypto-analysis)
Information security (Symmetric encryption, cryptography, crypto-analysis)Information security (Symmetric encryption, cryptography, crypto-analysis)
Information security (Symmetric encryption, cryptography, crypto-analysis)
 
security system by desu star chapter 2 (1).pptx
security system by desu star chapter 2 (1).pptxsecurity system by desu star chapter 2 (1).pptx
security system by desu star chapter 2 (1).pptx
 
Cryptography
CryptographyCryptography
Cryptography
 
Symmetric Encryption Techniques
Symmetric Encryption Techniques Symmetric Encryption Techniques
Symmetric Encryption Techniques
 
Cryptography Intro
Cryptography IntroCryptography Intro
Cryptography Intro
 
Cryptography
CryptographyCryptography
Cryptography
 
New ppt.ppt
New ppt.pptNew ppt.ppt
New ppt.ppt
 
Fundamentals of cryptography workshop
Fundamentals of cryptography workshopFundamentals of cryptography workshop
Fundamentals of cryptography workshop
 
Ch02 classic nemo
Ch02 classic nemoCh02 classic nemo
Ch02 classic nemo
 
Cryptography
CryptographyCryptography
Cryptography
 

Último

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
ssuserdda66b
 

Último (20)

Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 

CryptographyVsStegnoGraphy

  • 1.
  • 2.  What is meant by cryptography ? • Its Greek word • Crypto means “ Secret” • Graphie means “ Writing “  Why Cryptography ? • To convert the plain text to unreadable text  What is need of Cryptography ?  To secure the Sensitive Information • Username – Password • Credit Card Number etc..
  • 4.  Cryptanalysis basic component of cryptography is a cryptosystem  Cryptanalyst • Person working for unauthorized interceptor  Cryptographer • Person working for legitimate sender or receiver  Cryptology • encryption and decryption
  • 5.  Cryptosystem  A cryptosystem is a 5-tuple (Ε , D , M , K , C) • M is the collection of plaintexts • K is the set of keys • C is the set of cipher texts  How it works ? o Ε = Μ × K → C is the set of encipher (encryption) o D = C × K → M is the set of deciphering (decryption)  Note • Plaintext M : collection of original messages • Cipher text C : set of messages in encrypted form
  • 6.  Cryptosystem  Encryption • Process of encoding (enciphering / encryption ) a message  Decryption • Process of decoding (deciphering or decryption) an encrypted message to its original form. Alisa Kishan data, control channel messages data secure secure data sender receiver Trudy
  • 7.  CRYPTOGRAPHY CRYPTOGRAP HY SYMMETRIC-KEY ASYMMETRIC- CRYPTOGRAPHY KEY CRYPTOGRAPHY
  • 8.  Types of Cryptosystems  Symmetric Key Cryptosystems • Also called single-key cryptosystems • M = D(K, E(K, M)) • The encryption key and decryption key are the same
  • 9.  Symmetric Cryptosystems  Basic techniques for classical ciphers (Encryption)  Substitution • One letter is exchanged for another  Transposition • The order of the letters is rearranged Classical ciphers  Mono-alphabetic • Letters of the plaintext alphabet are mapped into other unique letters  Poly-alphabetic • Letters of the plaintext alphabet are mapped into letters of the cipher text space depending on their positions in the text  Stream • Key stream is generated and used to encrypt the plaintext (Symmetric Key Algorithms)
  • 10.  Transposition  Example :- Cipher-Text :- TRHCEEIETGSSMAIAEASS T 5 T R H 3 H C E E E 1 I E T G K 4 S S M A E 2 I A E S Y 6 S S Refer (by key): IETGIAESHCEESSMATRSS T H E K E Y 5 3 1 4 2 6  Columnar T H I S I S A S E C R E • IEEIRSHSMESCSTATGSEA T M E S S A G E
  • 11.  Types of Cryptosystems  Asymmetric cryptosystem • M = D (Kd , E (Ke , M ) ) • The encryption key and decryption key are not the same • Kd ≠ Ke
  • 12.  Asymmetric Key Cryptosystem (Public Key Cryptosystem)  Uses public and private keys • Public key for encryption • Private key for decryption  Examples • RSA • Trapdoor one-way function • Elliptical curve cryptography
  • 13.  RSA Principle  Developed by Ron Rivets , Adi Shamir, and Leonard Adleman. (MIT, 1977)  C = me mod (pq) • P , q : any two large prime numbers (more than 512 bits) • e: public key • d: private key • Knowing C and e, it is “infeasible” to calculate m without knowing d , p and q • Knowing d, p and q, it is easy to find the original plaintext message m = Cd mod (pq)
  • 14.  RSA Principle {m, e, p, q; {C, e, p, q; C= me mod(pq)} m=Cd mod(pq)} Sender Receiver Intruder {C, e}
  • 15.
  • 16.  What is Steganography?  Its Greek Words: • STEGANOS – “Covered” • GRAPHIE – “Writing”  Steganography is about Hiding messages  Digital Applications of Steganography • Can be hidden in digital data - MS Word (doc) - Web pages (html) - Sound files (mp3, wav, cda) - Video files (mpeg, avi) - Digital images (bmp, gif, jpg)  Today, steganography is used primarily to protect digital rights • “watermarking” copyright notices • “fingerprinting” a serial ID
  • 17.  History of Steganography  Chinese silk balls  Invisible ink-jet technology  Microdots  Easter eggs  Hiding a message within a text  Shift some words by one point/pixel - Shifted words (or their first letters) make the sentence  Use different fonts - Letter by letter or word by word
  • 18.  A Real Example  During WW2 the following cipher message was actually sent by a German spy “Apparently, neutral’s protest is thoroughly discounted and ignored. Isman hard hit. Blockade issue affect pretext for embargo on by products, ejecting suets and vegetable oils.”  Hidden Message • “ Pershing sails from NY June 1”
  • 19.  Modern Steganography  Hiding one message within another (“container”)  Most containers are rich media • Images , audio, video ,mp3 etc.  Copyright notices embedded in digital art • Prove ownership  Digital cameras EXIF tags • Not secretive, but hidden from the eyez • Embed info such as camera type, date, shutter speed , focal length,..  Similarly , possible to embed messages in invisible parts of html pages
  • 21.  Comparison Cryptography C = Ek (P) Plain text P = Dk (C) f Ciphertext Key Steganography secret message f Stego message cover image
  • 22.  Hiding a Message in an Image Original Picture Embedded picture

Notas del editor

  1. Cryptography
  2. Cryptography
  3. Cryptography
  4. Cryptography
  5. Cryptography
  6. Cryptography
  7. Cryptography
  8. Cryptography
  9. Cryptography
  10. Cryptography
  11. Cryptography
  12. Cryptography
  13. Cryptography
  14. Cryptography
  15. Cryptography
  16. Cryptography
  17. Cryptography
  18. Cryptography
  19. EXIF = Exchangeable Image File Format Cryptography
  20. Cryptography
  21. Cryptography
  22. Cryptography
  23. Cryptography
  24. Cryptography