SlideShare una empresa de Scribd logo
1 de 31
CONTENTS
o   Introduction
o   Need of Cryptography
o   Types of Attacks
o   Techniques of Cryptography
o   Encryption Algorithm
    •   Symmetric
    •   Asymmetric
o   Digital Signature
o   Conclusion
INTRODUCTION
 What   is Cryptography?
     “Hidden Writing”

     Mainly used to protect Information.


 Goal   of Cryptography

     Ensure security of communication over insecure
      medium

     Communicate even with possibility of adversary
NEED OF ENCRYPTION
 Confidentiality

 Integrity

 Authentication

 Nonrepudiation

 Access  Control
 Availability
TYPES OF ATTACKS
   A General View

   A Technical View

   A Practical Side of Attacks

   Programs that Attack
PLAIN                                      PLAIN
     TEXT                                       TEXT




             ENCRYPTION            DECRYPTION




                          CIPHER
                           TEXT
SENDER                                                  RECEIVER



                    BASIC BLOCK DIAGRAM
BASIC TERMINOLOGIES
 Encryption
     Encryption is the process of encoding a message so that its
      meaning is not obvious
 Decryption
     Decryption is the reverse process, transforming an encrypted
      message back into its normal, original form
 Cryptosystem
     A system for     encryption   and   decryption   is   called   a
      cryptosystem.
BASIC TERMINOLOGIES
 Plaintext
 Cipher     text
 Key    –
     key refers to a sequence of symbols or a numerical value used
      by an algorithm to alter information & making that information
      secure
 Encryption        algorithm
     The cryptosystem involves a set of rules for how to encrypt the
      plaintext and how to decrypt the cipher text.
 Cryptanalysis
     Cryptanalysis is an attempt to break the cipher text.
TECHNIQUES OF CRYPTOGRAPHY
 Substitution   Technique

     Caesar Cipher
     Monoalphabetic Cipher
     Homophonic Cipher
     Polyalphabetic Cipher
 Transposition   Technique

     Rail Fence Technique
     Vernam Cipher(One -time Pads)
     Simple Columnar Cipher
ENCRYPTION ALGORITHM
 Symmetric
    Same key for encryption and decryption

    Key distribution problem


 Asymmetric
    Key pairs for encryption and decryption

    Public and private keys
SYMMETRIC ALGORITHM
 It   is also called as Secret Key Cryptography
    Single key used for both encrypt & decrypt
    Key must be known to both the parties




              Key

                                                                   Original
  Plaintext                        Ciphertext                      Plaintext
                    Encryption                        Decryption


                             Symmetric Cryptosystem
ASYMMETRIC ALGORITHM
 Private keys are used for decrypting.
 Public keys are used for encrypting


                     encryption
    plaintext                             ciphertext
                     public key

                     decryption
   ciphertext                              plaintext
                     private key
COMPARISON
                    Secret Key (Symmetric)     Public Key (Asymmetric)
Number of Key       1                          2
Protection of Key   Must be kept secret        One key must be kept secret
                                               & other can be freely
                                               exposed
Best Uses           secrecy and integrity of   Key exchange, authentication
                    data



Key Distribution    Problematic                Safer


Speed               Fast                       Slow; typically, 10,000 times
                                               slower than secret key
SYMMETRIC ALGORITHM

 Data   Encryption Standard (DES):
  56 bits key


 Advance       Encryption Standard (AES):
 128, 192 or 256 bits key


 International
             Data Encryption
 Algorithm(IDEA):
 128 bits key
DATA ENCRYPTION STANDARD
 Developed by IBM and it is known as the Data Encryption
  Standard
 It is also known as Data Encryption Algorithm

 The DES algorithm is a careful and complex combination of
  two fundamental building blocks of encryption:
    Substitution and
    Transposition
 DES uses only standard arithmetic and logical operations on
  numbers up to 64 bits long
Plain text (64 bits)



          Initial Permutation (IP)



          LPT                RPT



key     16 rounds          16 rounds   key



             Final Permutation



             Cipher text (64 bits)



      BROAD LEVEL STEPS IN DES
DATA ENCRYPTION STANDARD
 1st  64 bit plain text is handed over to initial
  permutation function.
 IP is performed over the plain text.
 IP produces two halves of the permuted blocks
  left plain text (LPT) & right plain text (RPT).
 Now LPT & RPT goes 16 rounds of encryption
  process, each with its own key.
 Now LPT & RPT are rejoined and FINAL
  PERMUTATION (FP) is performed on the
  combined block.
 The result is 64 bit cipher text.
DETAILS OF ONE ROUND IN DES

             Key Transformation


            Expansion Permutation


             S- box Substitution


             P- box Permutation


               XOR and Swap
ADVANTAGES OF DES:

o   DES is also an ANSI and ISO standard - anybody
    can learn the details and implement it.
o   Since DES was designed to run on hardware, it is
    fast in hardware.
o   Hard to crack.


DISADVANTAGES OF DES:

o   Hardware implementations of DES are very fast;
    DES was not designed for software and hence runs
    relatively slowly.
ASYMMETRIC ALGORITHM
   Rivest Shamir Adleman (RSA) Encryption:

    Based on factoring the product of large prime numbers.

   Knapsack Algorithm:

    If M1,M2…., Mn are given values & S is the sum,
    S=b1M1+b2M2….+bnMn
    where, bi can be 0 or 1
RSA

 It is named after its three inventors Rivest
  Shamir and Adleman
 This algorithm was introduced in 1978 and to
  date remains secure.
 RSA has been the subject of extensive
  cryptanalysis, and no serious flaws have yet been
  found.
 The encryption algorithm is based on the
  underlying problem of factoring large numbers.
RSA

   p and q are two large prime numbers

   n=p.q

   m = (p-1)(q-1)

   a is such that 1 < a < m and gcd (m , a) = 1.

   b is such that ( a. b) mod m = 1
RSA ENCRYPTION & DECRYPTION

 Message M < n.
 Encryption key = (a , n).

 Decryption key = (b , n).

 Encrypt => E = Ma mod n.

 Decrypt => M = Eb mod n.
 Advantage


     Individuals can post their public key on their Web
      site.
     The number of the keys is only twice of the
      number of user.

 Disadvantage


     It is slower than symmetric algorithms.
     The cipher text may be larger than plain text.
DIGITAL SIGNATURE
    When an author signs a document, it cannot
     be changed.

    When you send a document
     electronically, you can also sign it.

    Digital signature can be done in two ways:

        You can sign the whole document

        You can sign a digest of the document
Signing the whole document




 You can not provide these aspects of security using the
  secret key.
 The method provides authentication & non-repudiation.
Signing the digest




 The   two most common hash functions are:
     Message digest 5 (MD5)
     Secure hash algorithm (SHA-1)
 The   properties of hash function
     One-way: the digest can only be created from the
      message, but not vice versa
     One-to-one: be very difficult to find two messages that
      create the same digest.
Sender site
Receiver site
APPLICATIONS OF ENCRYPTION
   Cryptographic Hash Function

   Digital Signature

   Certificate

   Secure electronic transactions

   Office equipment
CONCLUSION
 RSA finds its strongest application when parties
  who have no prior relationship want to share
  sensitive data with each other.
 Thus , even though slower as compared to
  symmetric algorithms it is & will be widely used as it
  can be used in digital signature for long haul
  transmission.
Cryptography

Más contenido relacionado

La actualidad más candente (20)

Overview of cryptography
Overview of cryptographyOverview of cryptography
Overview of cryptography
 
cryptography
cryptographycryptography
cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Cryptography - 101
Cryptography - 101Cryptography - 101
Cryptography - 101
 
Cryptography Intro
Cryptography IntroCryptography Intro
Cryptography Intro
 
Encryption
EncryptionEncryption
Encryption
 
Cryptography
CryptographyCryptography
Cryptography
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementation
 
Cryptography
CryptographyCryptography
Cryptography
 
cryptography
cryptographycryptography
cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
2. public key cryptography and RSA
2. public key cryptography and RSA2. public key cryptography and RSA
2. public key cryptography and RSA
 
Cryptography
CryptographyCryptography
Cryptography
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 

Destacado

Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securitypatisa
 
What is Cryptography?
What is Cryptography?What is Cryptography?
What is Cryptography?Pratik Poddar
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and CryptographyAdam Reagan
 
Digital Signature
Digital SignatureDigital Signature
Digital Signaturesaurav5884
 
Data encryption, Description, DES
Data encryption, Description, DESData encryption, Description, DES
Data encryption, Description, DESHuawei Technologies
 
Digital signature
Digital  signatureDigital  signature
Digital signatureAJAL A J
 
Hash Techniques in Cryptography
Hash Techniques in CryptographyHash Techniques in Cryptography
Hash Techniques in CryptographyBasudev Saha
 
Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2AfiqEfendy Zaen
 
Digital signature
Digital  signatureDigital  signature
Digital signatureAJAL A J
 
Aes (advance encryption standard)
Aes (advance encryption standard) Aes (advance encryption standard)
Aes (advance encryption standard) Sina Manavi
 
Idea(international data encryption algorithm)
Idea(international data encryption algorithm)Idea(international data encryption algorithm)
Idea(international data encryption algorithm)SAurabh PRajapati
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptographyRahulprasad Yadav
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithmsRashmi Burugupalli
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryptionAashish R
 
Seminar ppt on digital signature
Seminar ppt on digital signatureSeminar ppt on digital signature
Seminar ppt on digital signaturejolly9293
 

Destacado (20)

Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
DES
DESDES
DES
 
Cryptography
CryptographyCryptography
Cryptography
 
What is Cryptography?
What is Cryptography?What is Cryptography?
What is Cryptography?
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Data encryption, Description, DES
Data encryption, Description, DESData encryption, Description, DES
Data encryption, Description, DES
 
Tiny encryption algorithm
Tiny encryption algorithmTiny encryption algorithm
Tiny encryption algorithm
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 
Hash Techniques in Cryptography
Hash Techniques in CryptographyHash Techniques in Cryptography
Hash Techniques in Cryptography
 
Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 
Aes (advance encryption standard)
Aes (advance encryption standard) Aes (advance encryption standard)
Aes (advance encryption standard)
 
Idea(international data encryption algorithm)
Idea(international data encryption algorithm)Idea(international data encryption algorithm)
Idea(international data encryption algorithm)
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptography
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryption
 
Seminar ppt on digital signature
Seminar ppt on digital signatureSeminar ppt on digital signature
Seminar ppt on digital signature
 

Similar a Cryptography

Seminar on Encryption and Authenticity
Seminar on Encryption and AuthenticitySeminar on Encryption and Authenticity
Seminar on Encryption and AuthenticityHardik Manocha
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarDurlove Kumbhakar
 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxukd789555
 
Ch12 Encryption
Ch12 EncryptionCh12 Encryption
Ch12 Encryptionphanleson
 
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfAn Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfKailasS9
 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxjibonjibon5
 
cryptography-Final.pptx
cryptography-Final.pptxcryptography-Final.pptx
cryptography-Final.pptxkarthikvcyber
 
Basic Cryptography.pdf
Basic Cryptography.pdfBasic Cryptography.pdf
Basic Cryptography.pdfSetiya Nugroho
 
Introduction To PKI Technology
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI TechnologySylvain Maret
 
Cryptography
CryptographyCryptography
CryptographyRohan04
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Saif Kassim
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securityNagendra Um
 

Similar a Cryptography (20)

Elementry Cryptography
Elementry CryptographyElementry Cryptography
Elementry Cryptography
 
Seminar on Encryption and Authenticity
Seminar on Encryption and AuthenticitySeminar on Encryption and Authenticity
Seminar on Encryption and Authenticity
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab Kumbhakar
 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
 
Ch12 Encryption
Ch12 EncryptionCh12 Encryption
Ch12 Encryption
 
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfAn Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
 
cryptography-Final.pptx
cryptography-Final.pptxcryptography-Final.pptx
cryptography-Final.pptx
 
Basic Cryptography.pdf
Basic Cryptography.pdfBasic Cryptography.pdf
Basic Cryptography.pdf
 
IS-cryptograpy algorithms.pptx
IS-cryptograpy algorithms.pptxIS-cryptograpy algorithms.pptx
IS-cryptograpy algorithms.pptx
 
82 86
82 8682 86
82 86
 
82 86
82 8682 86
82 86
 
Introduction To PKI Technology
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI Technology
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01
 
Day5
Day5Day5
Day5
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Cns 1
Cns 1Cns 1
Cns 1
 
Public key algorithm
Public key algorithmPublic key algorithm
Public key algorithm
 

Último

Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

Último (20)

Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

Cryptography

  • 1. CONTENTS o Introduction o Need of Cryptography o Types of Attacks o Techniques of Cryptography o Encryption Algorithm • Symmetric • Asymmetric o Digital Signature o Conclusion
  • 2. INTRODUCTION  What is Cryptography?  “Hidden Writing”  Mainly used to protect Information.  Goal of Cryptography  Ensure security of communication over insecure medium  Communicate even with possibility of adversary
  • 3. NEED OF ENCRYPTION  Confidentiality  Integrity  Authentication  Nonrepudiation  Access Control  Availability
  • 4. TYPES OF ATTACKS  A General View  A Technical View  A Practical Side of Attacks  Programs that Attack
  • 5. PLAIN PLAIN TEXT TEXT ENCRYPTION DECRYPTION CIPHER TEXT SENDER RECEIVER BASIC BLOCK DIAGRAM
  • 6. BASIC TERMINOLOGIES  Encryption  Encryption is the process of encoding a message so that its meaning is not obvious  Decryption  Decryption is the reverse process, transforming an encrypted message back into its normal, original form  Cryptosystem  A system for encryption and decryption is called a cryptosystem.
  • 7. BASIC TERMINOLOGIES  Plaintext  Cipher text  Key –  key refers to a sequence of symbols or a numerical value used by an algorithm to alter information & making that information secure  Encryption algorithm  The cryptosystem involves a set of rules for how to encrypt the plaintext and how to decrypt the cipher text.  Cryptanalysis  Cryptanalysis is an attempt to break the cipher text.
  • 8. TECHNIQUES OF CRYPTOGRAPHY  Substitution Technique  Caesar Cipher  Monoalphabetic Cipher  Homophonic Cipher  Polyalphabetic Cipher  Transposition Technique  Rail Fence Technique  Vernam Cipher(One -time Pads)  Simple Columnar Cipher
  • 9. ENCRYPTION ALGORITHM  Symmetric  Same key for encryption and decryption  Key distribution problem  Asymmetric  Key pairs for encryption and decryption  Public and private keys
  • 10. SYMMETRIC ALGORITHM  It is also called as Secret Key Cryptography  Single key used for both encrypt & decrypt  Key must be known to both the parties Key Original Plaintext Ciphertext Plaintext Encryption Decryption Symmetric Cryptosystem
  • 11. ASYMMETRIC ALGORITHM  Private keys are used for decrypting.  Public keys are used for encrypting encryption plaintext ciphertext public key decryption ciphertext plaintext private key
  • 12. COMPARISON Secret Key (Symmetric) Public Key (Asymmetric) Number of Key 1 2 Protection of Key Must be kept secret One key must be kept secret & other can be freely exposed Best Uses secrecy and integrity of Key exchange, authentication data Key Distribution Problematic Safer Speed Fast Slow; typically, 10,000 times slower than secret key
  • 13. SYMMETRIC ALGORITHM  Data Encryption Standard (DES): 56 bits key  Advance Encryption Standard (AES): 128, 192 or 256 bits key  International Data Encryption Algorithm(IDEA): 128 bits key
  • 14. DATA ENCRYPTION STANDARD  Developed by IBM and it is known as the Data Encryption Standard  It is also known as Data Encryption Algorithm  The DES algorithm is a careful and complex combination of two fundamental building blocks of encryption:  Substitution and  Transposition  DES uses only standard arithmetic and logical operations on numbers up to 64 bits long
  • 15. Plain text (64 bits) Initial Permutation (IP) LPT RPT key 16 rounds 16 rounds key Final Permutation Cipher text (64 bits) BROAD LEVEL STEPS IN DES
  • 16. DATA ENCRYPTION STANDARD  1st 64 bit plain text is handed over to initial permutation function.  IP is performed over the plain text.  IP produces two halves of the permuted blocks left plain text (LPT) & right plain text (RPT).  Now LPT & RPT goes 16 rounds of encryption process, each with its own key.  Now LPT & RPT are rejoined and FINAL PERMUTATION (FP) is performed on the combined block.  The result is 64 bit cipher text.
  • 17. DETAILS OF ONE ROUND IN DES Key Transformation Expansion Permutation S- box Substitution P- box Permutation XOR and Swap
  • 18. ADVANTAGES OF DES: o DES is also an ANSI and ISO standard - anybody can learn the details and implement it. o Since DES was designed to run on hardware, it is fast in hardware. o Hard to crack. DISADVANTAGES OF DES: o Hardware implementations of DES are very fast; DES was not designed for software and hence runs relatively slowly.
  • 19. ASYMMETRIC ALGORITHM  Rivest Shamir Adleman (RSA) Encryption: Based on factoring the product of large prime numbers.  Knapsack Algorithm: If M1,M2…., Mn are given values & S is the sum, S=b1M1+b2M2….+bnMn where, bi can be 0 or 1
  • 20. RSA  It is named after its three inventors Rivest Shamir and Adleman  This algorithm was introduced in 1978 and to date remains secure.  RSA has been the subject of extensive cryptanalysis, and no serious flaws have yet been found.  The encryption algorithm is based on the underlying problem of factoring large numbers.
  • 21. RSA  p and q are two large prime numbers  n=p.q  m = (p-1)(q-1)  a is such that 1 < a < m and gcd (m , a) = 1.  b is such that ( a. b) mod m = 1
  • 22. RSA ENCRYPTION & DECRYPTION  Message M < n.  Encryption key = (a , n).  Decryption key = (b , n).  Encrypt => E = Ma mod n.  Decrypt => M = Eb mod n.
  • 23.  Advantage  Individuals can post their public key on their Web site.  The number of the keys is only twice of the number of user.  Disadvantage  It is slower than symmetric algorithms.  The cipher text may be larger than plain text.
  • 24. DIGITAL SIGNATURE  When an author signs a document, it cannot be changed.  When you send a document electronically, you can also sign it.  Digital signature can be done in two ways:  You can sign the whole document  You can sign a digest of the document
  • 25. Signing the whole document  You can not provide these aspects of security using the secret key.  The method provides authentication & non-repudiation.
  • 26. Signing the digest  The two most common hash functions are:  Message digest 5 (MD5)  Secure hash algorithm (SHA-1)  The properties of hash function  One-way: the digest can only be created from the message, but not vice versa  One-to-one: be very difficult to find two messages that create the same digest.
  • 29. APPLICATIONS OF ENCRYPTION  Cryptographic Hash Function  Digital Signature  Certificate  Secure electronic transactions  Office equipment
  • 30. CONCLUSION  RSA finds its strongest application when parties who have no prior relationship want to share sensitive data with each other.  Thus , even though slower as compared to symmetric algorithms it is & will be widely used as it can be used in digital signature for long haul transmission.