SlideShare una empresa de Scribd logo
1 de 18
Cryptography




Presented To:-           Presented By:-
Mr. Anurag Sharma   Rohan Jain , CS B ,
1000210077
Overview
•   Cryptography………………..……….An introduction
•   Objectives………………………………….Brief Aspect
•   Terminology……………..…..To Make You Familiar
•   How………………….…………………….Demonstration
•   Methods………………………….......Public & Private
•   Implementation………………..Hashing Algorithm
•   Cryptography in Networking Security………....…
•   Applications……………………………Real Life Scope
Introduction
 The Word Cryptology is made up of “Kryptos", which means
  hidden and “Logos" which means word.
 In Laymen Words, it is an Art and science of protecting data.
 Technically, It involves logical transformation of information.
 The Principles of Cryptography are today applied to the
  encryption of fax ,television, and computer network
  communications and many other fields.
 Since the secure exchange of computer data is of great
  importance to banking, government, and commercial
  communications as well as for individuals.
Objectives
1)Confidentiality :-The information cannot be understood by
anyone for whom it was unintended.

2) Integrity :-The information cannot be altered in storage or
transit between sender and intended receiver without the
alteration being detected. (Data Is Not Corrupted).

3)Non-repudiation :-The creator/sender of the information
cannot deny at a later stage his or her intentions in the
creation or transmission of the information.

4) Authentication :-The sender and receiver can confirm each
other’s identity and the origin/destination of the information.
(Source Of Data IS Genuine).
Terminology
R   O         H          A       N         J        A            I        N
                                                                                  Plain Text(Can
                                                                              Be Variable Length)


                       Encryption Using Key                                    Using Algorithms
                                                                          (MD4,MD5,SHA-1,RSA)

                                                                                    Cipher Text
    00   B8       3c     Ef   G0 Xh        99   3d      2f



                                                                     Using Algorithm (Same As
                  Decryption Using Same                              Used To Encrypt the Text)
                           Keys


R   O         H          A      N      J        A            I        N
HOW…??
A Simple Demonstration:-Substitution Cipher
To Encode:-> S          E     C     R    E     T
Key :-> Offset the 3rd letter so the alphabets begin with it.
         So starting with:-
                           ABCDEFGHIJKLMNOPQRSTUVWXYZ
         and sliding everything by 3, we get:-
                           DEFGHIJKLMNOPQRSTUVWXYZABC
         So D=A, E=B, F=C…..and so on.
Encoded:-> V      H     F     U       H          W

To Decode:-> Provide anyone the key i.e.,
              =>Offset the 3rd letter so the alphabets begin with it.
Cryptography Methods : Modern
           Cryptography
o Symmetric-Key Cryptography.
o Asymmetric-Key Cryptography.
o Cryptanalysis.
Private(Symmetric) Cryptography
In symmetric-key encryption each end already has a secret key
(code) that it can use to encrypt a packet of information before it
is sent over the network to another computer.
Private Cryptography Methods:-
DES (Data Encryption Standard)               AES(Advanced Encryption Standard)

Older                                        Newer

Breakable                                    Unbreakable

Smaller Key (56-bit Encryption).             Bigger Key(128/192bit /256 bit Encryption).

7*10^16 Key Combinations.                    3*10^35 Key Combinations.

Smaller Block Size (64 bits).                Larger Block Size (128bits).

For DES with 64 bits, the maximum amount For AES with 128 bits, the maximum
of data that can be transferred with a single amount of data that can be transferred
encryption key is 32GB.                       with a single encryption key is 256 EB.
Public/Asymmetric Cryptography
Asymmetric/Public encryption uses two different keys at once
i.e., combination of a private key and a public key. The private
key is known only to your computer while the public key is
given by your computer to any computer that wants to
communicate securely with it.
 To decode an
encrypted Message a
computer must use the
public key provided by
originating computer,
and its own private key
Cryptanalysis
   The Study of methods to break Cryptosystems.
   Often targeted at obtaining a key.
   Cryptanalysis Attacks:-
o   Brute force
    o Trying all key values in the keyspace.
o Frequency Analysis
    o Guess values based on frequency of occurrence.
o Dictionary Attack
    o Find plaintext based on common words.
Implementation of Encryption Keys
             :Hash Function
A hash function is any algorithm or subroutine that maps large
data sets of variable length to smaller data sets of a fixed
length. For example, a person's name, having a variable
length, could be hashed to a single integer.
Basic Idea:-
Input Number                                     10,667
Hashing Function                          Input# x 143
Hash Value                                1,525,381

Public keys generally use more complex algorithms and very
large hash values for encrypting, including 40-bit or even 128-
bit numbers. A 128-bit number has a possible 2128.
• The values returned by a hash function are called hash
  values, hash codes, digest ,hash sums, checksums or
  simply hashes.
• A Cryptographic hash function (specifically, SHA-1) at work.
  Note that even small changes in the source input (here in
  the word "over") drastically change the resulting output.
               V
                   U
Cryptography in Networking
 Transport Layer Security (TLS) and its predecessor, Secure
  Sockets Layer (SSL), are cryptographic protocols that
  provide communication security over the Internet.
 Several versions of the protocols are in widespread use in
  applications such as web browsing, electronic mail, Internet
  faxing, instant messaging and voice-over-IP (VoIP).
 When you're accessing sensitive information, such as an
  online bank account or a payment transfer service like PayPal
  or Google Checkout.
The client request the SSL connection by sending the request.
Server provides it’s secure certificate to client to show it’s
authenticity.
Client validates the certificate and request a one time session
with server.
Server completes the SSL handshake and the session begins.
Applications

•   ATM Cards
•   E-Commerce
•   Computer Passwords
•   Electronic Fund Transfer
•   Digital Signatures
•   Network Security
•   Storage Integrity
References
    http://en.wikipedia.org/wiki/Cryptography

http://en.wikipedia.org/wiki/Cryptographic_hash
                    function

http://computer.howstuffworks.com/encryption.ht
                      m

http://en.wikipedia.org/wiki/Secure_Sockets_Layer
Queries ??

Más contenido relacionado

La actualidad más candente

Different types of Symmetric key Cryptography
Different types of Symmetric key CryptographyDifferent types of Symmetric key Cryptography
Different types of Symmetric key Cryptography
subhradeep mitra
 
Data security in data communication
Data security in data communicationData security in data communication
Data security in data communication
Mohd Arif
 
Cryptography and Message Authentication NS3
Cryptography and Message Authentication NS3Cryptography and Message Authentication NS3
Cryptography and Message Authentication NS3
koolkampus
 

La actualidad más candente (20)

Different types of Symmetric key Cryptography
Different types of Symmetric key CryptographyDifferent types of Symmetric key Cryptography
Different types of Symmetric key Cryptography
 
Seminar on Encryption and Authenticity
Seminar on Encryption and AuthenticitySeminar on Encryption and Authenticity
Seminar on Encryption and Authenticity
 
Itt project
Itt projectItt project
Itt project
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Cryptography and applications
Cryptography and applicationsCryptography and applications
Cryptography and applications
 
Topic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesTopic1 substitution transposition-techniques
Topic1 substitution transposition-techniques
 
Strong cryptography in PHP
Strong cryptography in PHPStrong cryptography in PHP
Strong cryptography in PHP
 
Cryptography
CryptographyCryptography
Cryptography
 
cryptography
cryptographycryptography
cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Data security in data communication
Data security in data communicationData security in data communication
Data security in data communication
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
Is case study
Is   case studyIs   case study
Is case study
 
Cryptography and Message Authentication NS3
Cryptography and Message Authentication NS3Cryptography and Message Authentication NS3
Cryptography and Message Authentication NS3
 
Cryptography - A Brief History
Cryptography - A Brief HistoryCryptography - A Brief History
Cryptography - A Brief History
 
Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overview
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Public Key Encryption & Hash functions
Public Key Encryption & Hash functionsPublic Key Encryption & Hash functions
Public Key Encryption & Hash functions
 
Network Security & Cryptography
Network Security & CryptographyNetwork Security & Cryptography
Network Security & Cryptography
 
Cryptography cse,ru
Cryptography cse,ruCryptography cse,ru
Cryptography cse,ru
 

Similar a Cryptography

6. cryptography
6. cryptography6. cryptography
6. cryptography
7wounders
 

Similar a Cryptography (20)

Introduction To PKI Technology
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI Technology
 
Overview Of Cryptography
Overview Of CryptographyOverview Of Cryptography
Overview Of Cryptography
 
Network Security: Standards and Cryptography
Network Security: Standards and CryptographyNetwork Security: Standards and Cryptography
Network Security: Standards and Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Dnssec tutorial-crypto-defs
Dnssec tutorial-crypto-defsDnssec tutorial-crypto-defs
Dnssec tutorial-crypto-defs
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Basic Cryptography.pdf
Basic Cryptography.pdfBasic Cryptography.pdf
Basic Cryptography.pdf
 
Day5
Day5Day5
Day5
 
Cryptography Key Management.pptx
Cryptography Key Management.pptxCryptography Key Management.pptx
Cryptography Key Management.pptx
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)
 
Cryptography
CryptographyCryptography
Cryptography
 
Ch11 Basic Cryptography
Ch11 Basic CryptographyCh11 Basic Cryptography
Ch11 Basic Cryptography
 
Moein
MoeinMoein
Moein
 
Computer Cryptography and Encryption [by: Magoiga].pptx
Computer Cryptography and Encryption [by: Magoiga].pptxComputer Cryptography and Encryption [by: Magoiga].pptx
Computer Cryptography and Encryption [by: Magoiga].pptx
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Encryption
EncryptionEncryption
Encryption
 

Último

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Último (20)

Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
latest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answerslatest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answers
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Philosophy of china and it's charactistics
Philosophy of china and it's charactisticsPhilosophy of china and it's charactistics
Philosophy of china and it's charactistics
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 

Cryptography

  • 1. Cryptography Presented To:- Presented By:- Mr. Anurag Sharma Rohan Jain , CS B , 1000210077
  • 2. Overview • Cryptography………………..……….An introduction • Objectives………………………………….Brief Aspect • Terminology……………..…..To Make You Familiar • How………………….…………………….Demonstration • Methods………………………….......Public & Private • Implementation………………..Hashing Algorithm • Cryptography in Networking Security………....… • Applications……………………………Real Life Scope
  • 3. Introduction  The Word Cryptology is made up of “Kryptos", which means hidden and “Logos" which means word.  In Laymen Words, it is an Art and science of protecting data.  Technically, It involves logical transformation of information.  The Principles of Cryptography are today applied to the encryption of fax ,television, and computer network communications and many other fields.  Since the secure exchange of computer data is of great importance to banking, government, and commercial communications as well as for individuals.
  • 4. Objectives 1)Confidentiality :-The information cannot be understood by anyone for whom it was unintended. 2) Integrity :-The information cannot be altered in storage or transit between sender and intended receiver without the alteration being detected. (Data Is Not Corrupted). 3)Non-repudiation :-The creator/sender of the information cannot deny at a later stage his or her intentions in the creation or transmission of the information. 4) Authentication :-The sender and receiver can confirm each other’s identity and the origin/destination of the information. (Source Of Data IS Genuine).
  • 5. Terminology R O H A N J A I N Plain Text(Can Be Variable Length) Encryption Using Key Using Algorithms (MD4,MD5,SHA-1,RSA) Cipher Text 00 B8 3c Ef G0 Xh 99 3d 2f Using Algorithm (Same As Decryption Using Same Used To Encrypt the Text) Keys R O H A N J A I N
  • 6. HOW…?? A Simple Demonstration:-Substitution Cipher To Encode:-> S E C R E T Key :-> Offset the 3rd letter so the alphabets begin with it. So starting with:- ABCDEFGHIJKLMNOPQRSTUVWXYZ and sliding everything by 3, we get:- DEFGHIJKLMNOPQRSTUVWXYZABC So D=A, E=B, F=C…..and so on. Encoded:-> V H F U H W To Decode:-> Provide anyone the key i.e., =>Offset the 3rd letter so the alphabets begin with it.
  • 7. Cryptography Methods : Modern Cryptography o Symmetric-Key Cryptography. o Asymmetric-Key Cryptography. o Cryptanalysis.
  • 8. Private(Symmetric) Cryptography In symmetric-key encryption each end already has a secret key (code) that it can use to encrypt a packet of information before it is sent over the network to another computer.
  • 9. Private Cryptography Methods:- DES (Data Encryption Standard) AES(Advanced Encryption Standard) Older Newer Breakable Unbreakable Smaller Key (56-bit Encryption). Bigger Key(128/192bit /256 bit Encryption). 7*10^16 Key Combinations. 3*10^35 Key Combinations. Smaller Block Size (64 bits). Larger Block Size (128bits). For DES with 64 bits, the maximum amount For AES with 128 bits, the maximum of data that can be transferred with a single amount of data that can be transferred encryption key is 32GB. with a single encryption key is 256 EB.
  • 10. Public/Asymmetric Cryptography Asymmetric/Public encryption uses two different keys at once i.e., combination of a private key and a public key. The private key is known only to your computer while the public key is given by your computer to any computer that wants to communicate securely with it.  To decode an encrypted Message a computer must use the public key provided by originating computer, and its own private key
  • 11. Cryptanalysis  The Study of methods to break Cryptosystems.  Often targeted at obtaining a key.  Cryptanalysis Attacks:- o Brute force o Trying all key values in the keyspace. o Frequency Analysis o Guess values based on frequency of occurrence. o Dictionary Attack o Find plaintext based on common words.
  • 12. Implementation of Encryption Keys :Hash Function A hash function is any algorithm or subroutine that maps large data sets of variable length to smaller data sets of a fixed length. For example, a person's name, having a variable length, could be hashed to a single integer. Basic Idea:- Input Number 10,667 Hashing Function Input# x 143 Hash Value 1,525,381 Public keys generally use more complex algorithms and very large hash values for encrypting, including 40-bit or even 128- bit numbers. A 128-bit number has a possible 2128.
  • 13. • The values returned by a hash function are called hash values, hash codes, digest ,hash sums, checksums or simply hashes. • A Cryptographic hash function (specifically, SHA-1) at work. Note that even small changes in the source input (here in the word "over") drastically change the resulting output. V U
  • 14. Cryptography in Networking  Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), are cryptographic protocols that provide communication security over the Internet.  Several versions of the protocols are in widespread use in applications such as web browsing, electronic mail, Internet faxing, instant messaging and voice-over-IP (VoIP).  When you're accessing sensitive information, such as an online bank account or a payment transfer service like PayPal or Google Checkout.
  • 15. The client request the SSL connection by sending the request. Server provides it’s secure certificate to client to show it’s authenticity. Client validates the certificate and request a one time session with server. Server completes the SSL handshake and the session begins.
  • 16. Applications • ATM Cards • E-Commerce • Computer Passwords • Electronic Fund Transfer • Digital Signatures • Network Security • Storage Integrity
  • 17. References http://en.wikipedia.org/wiki/Cryptography http://en.wikipedia.org/wiki/Cryptographic_hash function http://computer.howstuffworks.com/encryption.ht m http://en.wikipedia.org/wiki/Secure_Sockets_Layer