SlideShare a Scribd company logo
1 of 13
Download to read offline
Computer Security & Network
Dr. Saif Kassim Alfraije Page 1
Introduction
Organizations with a need for intense information security, such as
government agencies, law enforcement, financial institutions, businesses, and
health care facilities, can leverage strong, modern cryptosystems to help ensure
that their data is not accessible to outsiders. All cryptosystems use either
asymmetric or symmetric encryption. Symmetric key systems typically operate
more quickly than asymmetric systems, but they require a highly secure means of
exchanging keys between users.
Suppose that someone wants to send a message to a receiver, and wants to
be sure that no-one else can read the message. However, there is the possibility that
someone else opens the letter or hears the electronic communication. the message
is called plaintext . Encoding the contents of the message in such a way that hides
its contents from outsiders is called encryption. The encrypted message is called
the ciphertext The word cipher has its origin in an Arabic word sifr , meaning
empty or zero.. The process of retrieving the plaintext from the ciphertext is called
decryption.
Cryptographic
Cryptographic terminology is the science/practice of “writing in secret”
(“crypto” == “secret,” “graphy” == “writing”). Cryptographic functions are
generally defined as algorithms or protocols, rules that govern how data is
processed to turn plaintext (unencrypted data) into ciphertext(encrypteddata).
Computer Security & Network
Dr. Saif Kassim Alfraije Page 2
A cryptographic system consists of essential components:
• Plaintext – the original message to be sent
• Cryptographic system (cryptosystem) or a cipher – consisting of
mathematical encryption and decryption algorithms for transforming
plaintext to ciphertext.
• Ciphertext – the result of applying an encryption algorithm to the original
message before it is sent to the recipient
• Key – a string of bits(sequence of symbols or a numerical) used by the two
mathematical algorithms in encrypting and decrypting processes
• Encipher (encrypt) : converting plaintext to ciphertext.
• Decipher (decrypt) : recovering ciphertext from plaintext.
• Cryptanalysis (code breaking) : the study of principles/ methods of
deciphering ciphertext without knowing key.
• Cryptology : the field of both cryptography and cryptanalysis
In this paper we shall focus on cipher structure as shown in figure 1.
Figure 1: Schematic representation of cryptographic cipher
Computer Security & Network
Dr. Saif Kassim Alfraije Page 3
Techniques of Cryptography
• Substitution Technique
o Caesar Cipher
o Monoalphabetic Cipher
o Homophonic Cipher
o Polygram substitution cipher
o Polyalphabetic Cipher
o Vigenère
• Transposition Technique
o Rail Fence Technique.
o Vernam Cipher(One -time Pads)
o Running Key Cipher.
o Playfair Cipher.
o Hill Cipher.
Encryption
Data, often referred to as plaintext, is encrypted using an encryption algorithm
and an encryption key. This process generates ciphertext that can only be viewed
in its original form if decrypted with the correct key. The primary purpose of
encryption is to protect the confidentiality (privacy) of digital data stored on
computer systems or transmitted via the Internet or other computer networks.
Computer Security & Network
Dr. Saif Kassim Alfraije Page 4
Why use encryption?
Decryption
Is simply the inverse of encryption, following the same steps but reversing the
order in which the keys are applied.
Model of Conventional Cryptosystems
An Entity A want to send some data to another one B. Before sending the data,
he will transform that data using a key in something apparently with no sense
(Encryption). Then the B entity will recover the initial data using also a key
(Decryption).
NOTE:
 Cryptography does not hide the existence of messages.
 Steganography hides even the existence of a message.
Computer Security & Network
Dr. Saif Kassim Alfraije Page 5
Referring to Fig above, with the message P and the encryption key K as input, the
encryption algorithm forms the ciphertext.
C = enck(P) ;
The intended receiver, in possession of the key is able to invert the transformation
P = deck(C);
C = Cipher Text (Encrypted text)
P = Plain text (Initial Text)
The security of conventional encryption depends on several factors:
• The Encryption Algorithm- It must be powerful enough that it is impractical
to decrypt a message on the basis of the ciphertext alone.
• Secrecy of the key- It was shown that the security of conventional
encryption depends on the secrecy of the key, not the secrecy of the
algorithm.
Figure 2: The figure representation of model conventional cryptosystem
Computer Security & Network
Dr. Saif Kassim Alfraije Page 6
Cryptographic Algorithms
Cryptographic algorithms are sequences of processes, or rules, used to
encipher and decipher messages in a cryptographic system. In simple terms,
they're processes that protect data by making sure that unwanted people can't
access it. All modern algorithms use a key to control encryption and
decryption; a message can be decrypted only if the key matches the encryption
key. The key used for decryption can be different from the encryption key, but
for most algorithms they are the same.
We have two main class of cryptographic algorithm: block and stream
 Block algorithms
Block algorithm are methods which partition the text into relatively large
(e.g. 128 bits) blocks and encode each block separately. The encoding of
each block generally depends on at most one of the previous blocks. the
same “key” is used at each block.
 Stream algorithms
Stream algorithm are algorithm which partition the text into small (e.g. 1 bit)
blocks and let the encoding of each block depend on many previous blocks.
A stream cipher is synchronous if its key sequence does not depend on the
plain- and ciphertexts but only on the previous elements of the key sequence
and the initial key.
for each block, a different “key” is generated.
Note
Today's encryption algorithms are divided into two categories: symmetric
and asymmetric.
Computer Security & Network
Dr. Saif Kassim Alfraije Page 7
Cryptography type
 An encryption system in which the sender and receiver of a message share a
single, common key that is used to encrypt and decrypt the message.
 In other terms, Data is encrypted and decrypted using the same key.
 Symmetric-key cryptography is sometimes called secret-key cryptography.
Now we explain all main steps to Encryption plain text by using Symmetric-
key cryptography
Figure 3: Schematic representation Symmetric Encryption
Computer Security & Network
Dr. Saif Kassim Alfraije Page 8
Merits:
 SIMPLER
 FASTER
De-Merits:
 Two parties must somehow exchange the key in a secure way.
 Public key is distributed in a non-secure way b/n Client/Server.
 Easy for hackers to get the key as it is shared in unsecure way
Figure 4: Schematic representation main steps to work Symmetric
Computer Security & Network
Dr. Saif Kassim Alfraije Page 9
 Asymmetric encryption use two keys:
 Public Key - to encrypt the data
 Private Key - to decrypt the data
 These keys are generated together.
 The Public key(s) is distributed freely between the sender and receiver.
 The other is named as Private Key and it is kept hidden.
 The Private Key is only used for Decryption and will not be shared between
the sender and receiver.
Figure 5: Schematic representation main steps to work Asymmetric
Computer Security & Network
Dr. Saif Kassim Alfraije Page 10
Merits:
 Two parties don't need to have their private keys already shared in order to
communicate using encryption.
 Authentication and Non-Repudiation are possible. (Authentication means
that you can encrypt the message with my public key and only I can decrypt
it with my private key. Non-repudiation means that you can "sign" the
message with your private key and I can verify that it came from you with
your public key.)
De-Merits:
 Asymmetric Encryption algorithms are comparatively complex.
 Time consuming process for Encryption and Decryption.
Which one is better?
 Although, symmetric encryption is fast, it is not as safe as asymmetric
encryption because someone could “steal” the key and decode the messages.
But because of its speed, it's commonly used for e-commerce transactions.
 Asymmetric encryption is more complex--and more secure. Asymmetric
encryption's added safety comes at a price: More computation is required, so
the process takes longer.
Computer Security & Network
Dr. Saif Kassim Alfraije Page 11
Cryptanalysis
Cryptanalysis is the art of deciphering encrypted communications without
knowing the proper keys. Cryptanalysis is finding a weakness in the cipher that can
be exploited with a complexity less than brute force.. Some of the more important
ones for a system implementer are described below.
• Ciphertext-only attack ( Only know algorithm / ciphertext, statistical, can
identify plaintext): This is the situation where the attacker does not know
anything about the contents of the message, and must work from ciphertext
only. In practice it is quite often possible to make guesses about the
plaintext, as many types of messages have fixed format headers. Even
ordinary letters and documents begin in a very predictable way. It may also
be possible to guess that some ciphertext block contains a common word.
 Known-plaintext attack (know/suspect plaintext & ciphertext to attack
cipher): The attacker knows or can guess the plaintext for some parts of the
ciphertext. The task is to decrypt the rest of the ciphertext blocks using this
information. This may be done by determining the key used to encrypt the
data, or via some shortcut.
Figure 6: Representation of Ciphertext-only attack
Computer Security & Network
Dr. Saif Kassim Alfraije Page 12
 Chosen-plaintext attack (selects plaintext and obtain ciphertext to attack
cipher): The attacker is able to have any text he likes encrypted with the
unknown key. The task is to determine the key used for encryption. Some
encryption methods, particularly RSA, are extremely vulnerable to chosen-
plaintext attacks. When such algorithms are used, extreme care must be
taken to design the entire system so that an attacker can never have chosen
plaintext encrypted.
Figure 7: Representation of Known-plaintext attack
Figure 8: Representation of Chosen-plaintext attack
Computer Security & Network
Dr. Saif Kassim Alfraije Page 13
 Chosen Ciphertext Attacks (select ciphertext and obtain plaintext to
attack cipher): Attacker obtains the decryption of any ciphertext of its
choice (under the key being attacked)
Summary
For individuals and organizations that require privacy and secrecy, a
strong cryptosystem is an essential component of the overall security
framework. Government, law enforcement, financial, and health care
organizations possess data that must remain secure to avoid damaging
consequences. Cryptosystems provide the power to secure communications
and safeguard data. Symmetric systems typically provide the best
performance, but they require a secure method of exchanging keys between
users. Asymmetric systems do not need users to exchange keys, but their
performance may be many times less than secret key systems. Modern
cryptography is heavily based on mathematical theory and computer
science practice; cryptographic algorithms are designed
around computational hardness assumptions.
Figure 9: Representation of Chosen Ciphertext -plaintext

More Related Content

What's hot

Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securityshraddha mane
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptographyVaibhav Khanna
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementationAkash Jadhav
 
Cryptology - Antônio Lacerda
Cryptology - Antônio LacerdaCryptology - Antônio Lacerda
Cryptology - Antônio LacerdaRodrigo Almeida
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation finaladrigee12
 
Cryptanalysis 101
Cryptanalysis 101Cryptanalysis 101
Cryptanalysis 101rahat ali
 
Network security and cryptography
Network security and cryptographyNetwork security and cryptography
Network security and cryptographyPavithra renu
 
Encryption And Decryption
Encryption And DecryptionEncryption And Decryption
Encryption And DecryptionNA
 
Information Security Cryptography ( L01- introduction )
Information Security Cryptography ( L01- introduction )Information Security Cryptography ( L01- introduction )
Information Security Cryptography ( L01- introduction )Anas Rock
 
Seminar report on symmetric key
Seminar report on symmetric keySeminar report on symmetric key
Seminar report on symmetric keyRajat Tripathi
 
Network security & cryptography full notes
Network security & cryptography full notesNetwork security & cryptography full notes
Network security & cryptography full notesgangadhar9989166446
 

What's hot (20)

Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptography
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementation
 
Cryptology - Antônio Lacerda
Cryptology - Antônio LacerdaCryptology - Antônio Lacerda
Cryptology - Antônio Lacerda
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation final
 
Cryptanalysis 101
Cryptanalysis 101Cryptanalysis 101
Cryptanalysis 101
 
Network security and cryptography
Network security and cryptographyNetwork security and cryptography
Network security and cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Encryption And Decryption
Encryption And DecryptionEncryption And Decryption
Encryption And Decryption
 
Cryptography
CryptographyCryptography
Cryptography
 
Information Security Cryptography ( L01- introduction )
Information Security Cryptography ( L01- introduction )Information Security Cryptography ( L01- introduction )
Information Security Cryptography ( L01- introduction )
 
Crytography
CrytographyCrytography
Crytography
 
Criptography
CriptographyCriptography
Criptography
 
Seminar report on symmetric key
Seminar report on symmetric keySeminar report on symmetric key
Seminar report on symmetric key
 
Network security & cryptography full notes
Network security & cryptography full notesNetwork security & cryptography full notes
Network security & cryptography full notes
 

Viewers also liked

Bank of Ireland Enterprise Week - Social Media for small business
Bank of Ireland Enterprise Week - Social Media for small businessBank of Ireland Enterprise Week - Social Media for small business
Bank of Ireland Enterprise Week - Social Media for small businessStephen Jio
 
Project management
Project managementProject management
Project managementSaumya Sahu
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network SecurityPa Van Tanku
 
Distributed system notes unit I
Distributed system notes unit IDistributed system notes unit I
Distributed system notes unit INANDINI SHARMA
 
TYBSC IT SEM 6 PROJECT MANAGEMENT NOTES
TYBSC IT SEM 6 PROJECT MANAGEMENT NOTESTYBSC IT SEM 6 PROJECT MANAGEMENT NOTES
TYBSC IT SEM 6 PROJECT MANAGEMENT NOTESWE-IT TUTORIALS
 
Business Process Re-engineering
Business Process Re-engineeringBusiness Process Re-engineering
Business Process Re-engineeringrinkimusaddi
 
Bpr business process reengineering ppt excellent
Bpr business process reengineering ppt excellentBpr business process reengineering ppt excellent
Bpr business process reengineering ppt excellentSwaraj
 
Fault tolerance in distributed systems
Fault tolerance in distributed systemsFault tolerance in distributed systems
Fault tolerance in distributed systemssumitjain2013
 
Business Process Reengineering Complete
Business Process Reengineering   CompleteBusiness Process Reengineering   Complete
Business Process Reengineering CompleteRoy Antony Arnold G
 
Business process reengineering
Business process reengineeringBusiness process reengineering
Business process reengineeringNeelkamal Sharma
 
Computer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewComputer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewMohamed Loey
 
Distributed computing
Distributed computingDistributed computing
Distributed computingshivli0769
 
Business process reengineering
Business process reengineeringBusiness process reengineering
Business process reengineeringKavindra Singh
 
Business process reengineering
Business process reengineeringBusiness process reengineering
Business process reengineeringAniket Verma
 
Distributed Systems
Distributed SystemsDistributed Systems
Distributed SystemsRupsee
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and CryptographyAdam Reagan
 

Viewers also liked (19)

Bank of Ireland Enterprise Week - Social Media for small business
Bank of Ireland Enterprise Week - Social Media for small businessBank of Ireland Enterprise Week - Social Media for small business
Bank of Ireland Enterprise Week - Social Media for small business
 
Project management
Project managementProject management
Project management
 
Lecture12
Lecture12Lecture12
Lecture12
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
Distributed system notes unit I
Distributed system notes unit IDistributed system notes unit I
Distributed system notes unit I
 
TYBSC IT SEM 6 PROJECT MANAGEMENT NOTES
TYBSC IT SEM 6 PROJECT MANAGEMENT NOTESTYBSC IT SEM 6 PROJECT MANAGEMENT NOTES
TYBSC IT SEM 6 PROJECT MANAGEMENT NOTES
 
Business Process Re-engineering
Business Process Re-engineeringBusiness Process Re-engineering
Business Process Re-engineering
 
Bpr business process reengineering ppt excellent
Bpr business process reengineering ppt excellentBpr business process reengineering ppt excellent
Bpr business process reengineering ppt excellent
 
Fault tolerance in distributed systems
Fault tolerance in distributed systemsFault tolerance in distributed systems
Fault tolerance in distributed systems
 
Bpr ppt
Bpr pptBpr ppt
Bpr ppt
 
Distributed Systems
Distributed SystemsDistributed Systems
Distributed Systems
 
Business Process Reengineering Complete
Business Process Reengineering   CompleteBusiness Process Reengineering   Complete
Business Process Reengineering Complete
 
Business process reengineering
Business process reengineeringBusiness process reengineering
Business process reengineering
 
Computer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewComputer Security Lecture 1: Overview
Computer Security Lecture 1: Overview
 
Distributed computing
Distributed computingDistributed computing
Distributed computing
 
Business process reengineering
Business process reengineeringBusiness process reengineering
Business process reengineering
 
Business process reengineering
Business process reengineeringBusiness process reengineering
Business process reengineering
 
Distributed Systems
Distributed SystemsDistributed Systems
Distributed Systems
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 

Similar to Computer Security (Cryptography) Ch01

A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfYasmine Anino
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarDurlove Kumbhakar
 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxukd789555
 
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.pptPresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.pptso6281019
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPrabhatMishraAbvp
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptvinitajain703
 
Presentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHYPresentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHYBARATH800940
 
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.pptCRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.pptPayalChopra9
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Cryptography- "A Black Art"
Cryptography- "A Black Art"Cryptography- "A Black Art"
Cryptography- "A Black Art"Aditya Raina
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityEditor IJCATR
 
Bt0088 cryptography and network security1
Bt0088 cryptography and network security1Bt0088 cryptography and network security1
Bt0088 cryptography and network security1Techglyphs
 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxjibonjibon5
 
Cryptography Methodologies
Cryptography MethodologiesCryptography Methodologies
Cryptography Methodologiesijtsrd
 

Similar to Computer Security (Cryptography) Ch01 (20)

Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdf
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab Kumbhakar
 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
 
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.pptPresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
 
Presentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHYPresentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHY
 
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.pptCRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
 
N45028390
N45028390N45028390
N45028390
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Analysis of Cryptography Techniques
Analysis of Cryptography TechniquesAnalysis of Cryptography Techniques
Analysis of Cryptography Techniques
 
Cryptography- "A Black Art"
Cryptography- "A Black Art"Cryptography- "A Black Art"
Cryptography- "A Black Art"
 
Data encryption
Data encryptionData encryption
Data encryption
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
 
Bt0088 cryptography and network security1
Bt0088 cryptography and network security1Bt0088 cryptography and network security1
Bt0088 cryptography and network security1
 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
 
Cryptography Methodologies
Cryptography MethodologiesCryptography Methodologies
Cryptography Methodologies
 
encrption.PDF
encrption.PDFencrption.PDF
encrption.PDF
 
encrption.PDF
encrption.PDFencrption.PDF
encrption.PDF
 

Recently uploaded

Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdfssuserdda66b
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 

Recently uploaded (20)

Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 

Computer Security (Cryptography) Ch01

  • 1. Computer Security & Network Dr. Saif Kassim Alfraije Page 1 Introduction Organizations with a need for intense information security, such as government agencies, law enforcement, financial institutions, businesses, and health care facilities, can leverage strong, modern cryptosystems to help ensure that their data is not accessible to outsiders. All cryptosystems use either asymmetric or symmetric encryption. Symmetric key systems typically operate more quickly than asymmetric systems, but they require a highly secure means of exchanging keys between users. Suppose that someone wants to send a message to a receiver, and wants to be sure that no-one else can read the message. However, there is the possibility that someone else opens the letter or hears the electronic communication. the message is called plaintext . Encoding the contents of the message in such a way that hides its contents from outsiders is called encryption. The encrypted message is called the ciphertext The word cipher has its origin in an Arabic word sifr , meaning empty or zero.. The process of retrieving the plaintext from the ciphertext is called decryption. Cryptographic Cryptographic terminology is the science/practice of “writing in secret” (“crypto” == “secret,” “graphy” == “writing”). Cryptographic functions are generally defined as algorithms or protocols, rules that govern how data is processed to turn plaintext (unencrypted data) into ciphertext(encrypteddata).
  • 2. Computer Security & Network Dr. Saif Kassim Alfraije Page 2 A cryptographic system consists of essential components: • Plaintext – the original message to be sent • Cryptographic system (cryptosystem) or a cipher – consisting of mathematical encryption and decryption algorithms for transforming plaintext to ciphertext. • Ciphertext – the result of applying an encryption algorithm to the original message before it is sent to the recipient • Key – a string of bits(sequence of symbols or a numerical) used by the two mathematical algorithms in encrypting and decrypting processes • Encipher (encrypt) : converting plaintext to ciphertext. • Decipher (decrypt) : recovering ciphertext from plaintext. • Cryptanalysis (code breaking) : the study of principles/ methods of deciphering ciphertext without knowing key. • Cryptology : the field of both cryptography and cryptanalysis In this paper we shall focus on cipher structure as shown in figure 1. Figure 1: Schematic representation of cryptographic cipher
  • 3. Computer Security & Network Dr. Saif Kassim Alfraije Page 3 Techniques of Cryptography • Substitution Technique o Caesar Cipher o Monoalphabetic Cipher o Homophonic Cipher o Polygram substitution cipher o Polyalphabetic Cipher o Vigenère • Transposition Technique o Rail Fence Technique. o Vernam Cipher(One -time Pads) o Running Key Cipher. o Playfair Cipher. o Hill Cipher. Encryption Data, often referred to as plaintext, is encrypted using an encryption algorithm and an encryption key. This process generates ciphertext that can only be viewed in its original form if decrypted with the correct key. The primary purpose of encryption is to protect the confidentiality (privacy) of digital data stored on computer systems or transmitted via the Internet or other computer networks.
  • 4. Computer Security & Network Dr. Saif Kassim Alfraije Page 4 Why use encryption? Decryption Is simply the inverse of encryption, following the same steps but reversing the order in which the keys are applied. Model of Conventional Cryptosystems An Entity A want to send some data to another one B. Before sending the data, he will transform that data using a key in something apparently with no sense (Encryption). Then the B entity will recover the initial data using also a key (Decryption). NOTE:  Cryptography does not hide the existence of messages.  Steganography hides even the existence of a message.
  • 5. Computer Security & Network Dr. Saif Kassim Alfraije Page 5 Referring to Fig above, with the message P and the encryption key K as input, the encryption algorithm forms the ciphertext. C = enck(P) ; The intended receiver, in possession of the key is able to invert the transformation P = deck(C); C = Cipher Text (Encrypted text) P = Plain text (Initial Text) The security of conventional encryption depends on several factors: • The Encryption Algorithm- It must be powerful enough that it is impractical to decrypt a message on the basis of the ciphertext alone. • Secrecy of the key- It was shown that the security of conventional encryption depends on the secrecy of the key, not the secrecy of the algorithm. Figure 2: The figure representation of model conventional cryptosystem
  • 6. Computer Security & Network Dr. Saif Kassim Alfraije Page 6 Cryptographic Algorithms Cryptographic algorithms are sequences of processes, or rules, used to encipher and decipher messages in a cryptographic system. In simple terms, they're processes that protect data by making sure that unwanted people can't access it. All modern algorithms use a key to control encryption and decryption; a message can be decrypted only if the key matches the encryption key. The key used for decryption can be different from the encryption key, but for most algorithms they are the same. We have two main class of cryptographic algorithm: block and stream  Block algorithms Block algorithm are methods which partition the text into relatively large (e.g. 128 bits) blocks and encode each block separately. The encoding of each block generally depends on at most one of the previous blocks. the same “key” is used at each block.  Stream algorithms Stream algorithm are algorithm which partition the text into small (e.g. 1 bit) blocks and let the encoding of each block depend on many previous blocks. A stream cipher is synchronous if its key sequence does not depend on the plain- and ciphertexts but only on the previous elements of the key sequence and the initial key. for each block, a different “key” is generated. Note Today's encryption algorithms are divided into two categories: symmetric and asymmetric.
  • 7. Computer Security & Network Dr. Saif Kassim Alfraije Page 7 Cryptography type  An encryption system in which the sender and receiver of a message share a single, common key that is used to encrypt and decrypt the message.  In other terms, Data is encrypted and decrypted using the same key.  Symmetric-key cryptography is sometimes called secret-key cryptography. Now we explain all main steps to Encryption plain text by using Symmetric- key cryptography Figure 3: Schematic representation Symmetric Encryption
  • 8. Computer Security & Network Dr. Saif Kassim Alfraije Page 8 Merits:  SIMPLER  FASTER De-Merits:  Two parties must somehow exchange the key in a secure way.  Public key is distributed in a non-secure way b/n Client/Server.  Easy for hackers to get the key as it is shared in unsecure way Figure 4: Schematic representation main steps to work Symmetric
  • 9. Computer Security & Network Dr. Saif Kassim Alfraije Page 9  Asymmetric encryption use two keys:  Public Key - to encrypt the data  Private Key - to decrypt the data  These keys are generated together.  The Public key(s) is distributed freely between the sender and receiver.  The other is named as Private Key and it is kept hidden.  The Private Key is only used for Decryption and will not be shared between the sender and receiver. Figure 5: Schematic representation main steps to work Asymmetric
  • 10. Computer Security & Network Dr. Saif Kassim Alfraije Page 10 Merits:  Two parties don't need to have their private keys already shared in order to communicate using encryption.  Authentication and Non-Repudiation are possible. (Authentication means that you can encrypt the message with my public key and only I can decrypt it with my private key. Non-repudiation means that you can "sign" the message with your private key and I can verify that it came from you with your public key.) De-Merits:  Asymmetric Encryption algorithms are comparatively complex.  Time consuming process for Encryption and Decryption. Which one is better?  Although, symmetric encryption is fast, it is not as safe as asymmetric encryption because someone could “steal” the key and decode the messages. But because of its speed, it's commonly used for e-commerce transactions.  Asymmetric encryption is more complex--and more secure. Asymmetric encryption's added safety comes at a price: More computation is required, so the process takes longer.
  • 11. Computer Security & Network Dr. Saif Kassim Alfraije Page 11 Cryptanalysis Cryptanalysis is the art of deciphering encrypted communications without knowing the proper keys. Cryptanalysis is finding a weakness in the cipher that can be exploited with a complexity less than brute force.. Some of the more important ones for a system implementer are described below. • Ciphertext-only attack ( Only know algorithm / ciphertext, statistical, can identify plaintext): This is the situation where the attacker does not know anything about the contents of the message, and must work from ciphertext only. In practice it is quite often possible to make guesses about the plaintext, as many types of messages have fixed format headers. Even ordinary letters and documents begin in a very predictable way. It may also be possible to guess that some ciphertext block contains a common word.  Known-plaintext attack (know/suspect plaintext & ciphertext to attack cipher): The attacker knows or can guess the plaintext for some parts of the ciphertext. The task is to decrypt the rest of the ciphertext blocks using this information. This may be done by determining the key used to encrypt the data, or via some shortcut. Figure 6: Representation of Ciphertext-only attack
  • 12. Computer Security & Network Dr. Saif Kassim Alfraije Page 12  Chosen-plaintext attack (selects plaintext and obtain ciphertext to attack cipher): The attacker is able to have any text he likes encrypted with the unknown key. The task is to determine the key used for encryption. Some encryption methods, particularly RSA, are extremely vulnerable to chosen- plaintext attacks. When such algorithms are used, extreme care must be taken to design the entire system so that an attacker can never have chosen plaintext encrypted. Figure 7: Representation of Known-plaintext attack Figure 8: Representation of Chosen-plaintext attack
  • 13. Computer Security & Network Dr. Saif Kassim Alfraije Page 13  Chosen Ciphertext Attacks (select ciphertext and obtain plaintext to attack cipher): Attacker obtains the decryption of any ciphertext of its choice (under the key being attacked) Summary For individuals and organizations that require privacy and secrecy, a strong cryptosystem is an essential component of the overall security framework. Government, law enforcement, financial, and health care organizations possess data that must remain secure to avoid damaging consequences. Cryptosystems provide the power to secure communications and safeguard data. Symmetric systems typically provide the best performance, but they require a secure method of exchanging keys between users. Asymmetric systems do not need users to exchange keys, but their performance may be many times less than secret key systems. Modern cryptography is heavily based on mathematical theory and computer science practice; cryptographic algorithms are designed around computational hardness assumptions. Figure 9: Representation of Chosen Ciphertext -plaintext