SlideShare una empresa de Scribd logo
1 de 17
Descargar para leer sin conexión
Cryptography and Network
             Security

                             Bhaskaran Raman
                       Department of CSE, IIT Kanpur

Reference: Whitfield Diffie and Martin E. Hellman, “ Privacy and
Authentication: An Introduction to Cryptography” , in Proc. IEEE,
               vol. 67, no.3, pp. 397 - 427, 1979




     Fundamentals of Wired and Wireless Networks, Kameswari Chebrolu and Bhaskaran Raman, 09­13 May 2005
Cryptography Fundamentals
●
    Privacy versus Authentication:
    –   Privacy: preventing third party from snooping
    –   Authentication: preventing impostering
●
    Two kinds of authentication:
    –   Guarantee that no third party has modified data
    –   Receiver can prove that only the sender
        originated the data
         ●
             Digital Signature
         ●
             E.g., for electronic transactions
     Fundamentals of Wired and Wireless Networks, Kameswari Chebrolu and Bhaskaran Raman, 09­13 May 2005
Cryptographic Privacy
                                                   Eavesdropper
                P                          C                                   P
    Sender            Encryption                              Decryption              Receiver
                      C = SK(P)
                                         Network              C = S­1K(P)
                                            Key: K

●
    Encrypt before sending, decrypt on receiving
    –   Terms: plain text and cipher text
●
    Two components: key, and the algorithm
    –   Should algorithm be secret?
          ●
              Yes, for military systems; no, for commercial systems
●
    Key distribution must be secure
     Fundamentals of Wired and Wireless Networks, Kameswari Chebrolu and Bhaskaran Raman, 09­13 May 2005
Cryptographic Authentication
                                       Eavesdropper

                                                 C'
                P                                                              P'
    Sender            Encryption                              Decryption              Receiver
                      C = SK(P)
                                         Network              C' = S­1K(P')
                                            Key: K


●
    The same system can also be used for
    authentication



     Fundamentals of Wired and Wireless Networks, Kameswari Chebrolu and Bhaskaran Raman, 09­13 May 2005
Cryptanalysis
●
    Cryptanalysis: attacker tries to break the system
    –   E.g., by guessing the plain text for a given cipher text
    –   Or, by guessing the cipher text for some plain text
●
    Possible attacks:
    –   Cipher-text only attack
    –   Known plain-text attack
    –   Chosen plain-text attack
    –   Chosen text attack
         Fundamentals of Wired and Wireless Networks, Kameswari Chebrolu and Bhaskaran Raman, 09­13 May 2005
Security Guarantees
●
    Two possibilities:
    –   Unconditional
    –   Computational security
●
    Unconditional security: an example
    –   One-time tape
●
    Most systems have computational security
    –   How much security to have?
    –   Depends on cost-benefit analysis for attacker
     Fundamentals of Wired and Wireless Networks, Kameswari Chebrolu and Bhaskaran Raman, 09­13 May 2005
Public-Key Systems
●
    Shared-key ==> difficulties in key distribution
    –   C(n,2) = O(n^2) keys
●
    Public key system
    –   Public component and a private component
    –   Two kinds:
         ●
             Public key distribution: establish shared key first
         ●
             Public key cryptography: use public/private keys in
             encryption/decryption
    –   Public key cryptography can also be used for
        digital signatures
     Fundamentals of Wired and Wireless Networks, Kameswari Chebrolu and Bhaskaran Raman, 09­13 May 2005
Some Example Systems
●
    Permuted alphabet (common puzzle)
    –   Can be attacked using frequency analysis,
        patterns, digrams, trigrams
    –   Attack becomes difficult if alphabet size is large
●
    Transposition
●
    Poly-alphabetic: periodic or running key
●
    Codes versus ciphering
    –   Codes are stronger, and also achieve data
        compression
     Fundamentals of Wired and Wireless Networks, Kameswari Chebrolu and Bhaskaran Raman, 09­13 May 2005
Some Popular Systems
●
    Private key systems:
    –   DES, 3DES
●
    Public key systems:
    –   RSA: based on difficulty of factoring
    –   Galois-Field (GF) system: based on difficulty of
        finding logarithm
    –   Based on knapsack problem


     Fundamentals of Wired and Wireless Networks, Kameswari Chebrolu and Bhaskaran Raman, 09­13 May 2005
Digital Encryption Standard
           (DES)
             64 bits       +          64 bits                    64 bits

        Plain­text                     Key                    Cipher­text


         P          R1           R2                           R16          P­1

Permutation, 16 rounds of identical operation, inverse permutation

                   Li­1                             Ri­1
Each round uses a 
different 48­bit key                                 F         Ki
Ki (from K) and a 
                                                     +
combiner function F

                          Li­1                      Ri­1
Fundamentals of Wired and Wireless Networks, Kameswari Chebrolu and Bhaskaran Raman, 09­13 May 2005
Triple-DES (3DES)
●
    DES can be broken with 2^55 tries:
    –   4500 years on an Alpha workstation
    –   But only 6 months with 9000 Alphas
●
    Triple-DES:
    –   Use DES thrice, with 3 separate keys, or with
        two keys (K1 first, then K2, then K1 again)




     Fundamentals of Wired and Wireless Networks, Kameswari Chebrolu and Bhaskaran Raman, 09­13 May 2005
Rivest, Shamir, Adleman (RSA)
  Public-Key Crypto-System
●
    Based on the fact that finding large (e.g. 100
    digit) prime numbers is easy, but factoring
    the product of two such numbers appears
    computationally infeasible
●
    Choose very large prime numbers P and Q
    –   N=PxQ
    –   N is public; P, Q are secret
●
    Euler totient: Phi(N) = (P-1)(Q-1) = Number
    of integers less than N & relatively prime to N
     Fundamentals of Wired and Wireless Networks, Kameswari Chebrolu and Bhaskaran Raman, 09­13 May 2005
RSA (continued)
●
    Next, choose E in [2, Phi(N)-1], E is public
●
    A message is represented as a sequence
    M1, M2, M3..., where each M in [0, N-1]
●
    Encryption: C = ME mod N
●
    Using the secret Phi(N), A can compute D
    such that ED = 1 mod Phi(N)
●
    ED = k x Phi(N) + 1
●
    Then, for any X < N, Xk x Phi(N)+1 = X mod N
     Fundamentals of Wired and Wireless Networks, Kameswari Chebrolu and Bhaskaran Raman, 09­13 May 2005
RSA (Continued)
●
    Decryption: CD = MED = Mk x Phi(N)+1 = M mod N
●
    Example: Choose P = 17, Q = 31
    –   N = 527, Phi(N) = 480
    –   Choose E = 7, then D = 343
    –   If M = 2, Encryption: C = 128
    –   Decryption: D = CD mod N = 128343 mod 527 = 2



     Fundamentals of Wired and Wireless Networks, Kameswari Chebrolu and Bhaskaran Raman, 09­13 May 2005
Taxonomy of Ciphers
●
    Block ciphers: divide plain text into blocks
    and encrypt each independently
●
    Properties required:
    –   No bit of plain text should appear directly in
        cipher text
    –   Changing even one bit in plain text should result
        in huge (50%) change in cipher text
    –   Exact opposite of properties required for
        systematic error correction codes
●
    Stream cipher: encryption depends on
    current state
     Fundamentals of Wired and Wireless Networks, Kameswari Chebrolu and Bhaskaran Raman, 09­13 May 2005
Key Management
●
    Keys need to be generated periodically
    –   New users
    –   Some keys may be compromised
●
    Addressing the O(n^2) problem with key
    distribution
    –   Link encryption
    –   Key Distribution Centre (KDC): all eggs in one
        basket
    –   Multiple KDCs: better security
●
    Key management easier in public key
    cryptography
     Fundamentals of Wired and Wireless Networks, Kameswari Chebrolu and Bhaskaran Raman, 09­13 May 2005
Some Non-Crypto Attacks
●
    Man-in-the-middle attack: play a trick by
    being in the middle
●
    Traffic analysis:
    –   Can learn information by just looking at
        presence/absence of traffic, or its volume
    –   Can be countered using data padding
●
    Playback or replay attacks:
    –   To counter: need to verify timeliness of message
        from sender while authenticating
    –   Beware of issues of time synchronization
     Fundamentals of Wired and Wireless Networks, Kameswari Chebrolu and Bhaskaran Raman, 09­13 May 2005

Más contenido relacionado

La actualidad más candente

Quantum cryptography for secured communication networks
Quantum cryptography for secured communication networksQuantum cryptography for secured communication networks
Quantum cryptography for secured communication networksIJECEIAES
 
Elgamal signature for content distribution with network coding
Elgamal signature for content distribution with network codingElgamal signature for content distribution with network coding
Elgamal signature for content distribution with network codingijwmn
 
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”IOSR Journals
 
Network coding
Network codingNetwork coding
Network codingLishi He
 
Ecc cipher processor based on knapsack algorithm
Ecc cipher processor based on knapsack algorithmEcc cipher processor based on knapsack algorithm
Ecc cipher processor based on knapsack algorithmAlexander Decker
 
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...IDES Editor
 
Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...
Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...
Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...IOSR Journals
 
Symposium on Jainism and Mathematics - presentation : 2020
Symposium on  Jainism and Mathematics  - presentation : 2020 Symposium on  Jainism and Mathematics  - presentation : 2020
Symposium on Jainism and Mathematics - presentation : 2020 Anil Jain
 
Cancellation of Zigbee interference in OFDM based WLAN for multipath channel
Cancellation of Zigbee interference in OFDM based WLAN for multipath channelCancellation of Zigbee interference in OFDM based WLAN for multipath channel
Cancellation of Zigbee interference in OFDM based WLAN for multipath channelIDES Editor
 
Aes cryptography algorithm based on intelligent blum blum-shub prn gs publica...
Aes cryptography algorithm based on intelligent blum blum-shub prn gs publica...Aes cryptography algorithm based on intelligent blum blum-shub prn gs publica...
Aes cryptography algorithm based on intelligent blum blum-shub prn gs publica...zaidinvisible
 
Cryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using VerilogCryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using Verilogijcncs
 
Analysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuAnalysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuIJNSA Journal
 
Analysis and improvement of pairing free certificate-less two-party authentic...
Analysis and improvement of pairing free certificate-less two-party authentic...Analysis and improvement of pairing free certificate-less two-party authentic...
Analysis and improvement of pairing free certificate-less two-party authentic...ijsptm
 
Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detectionIaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detectionIaetsd Iaetsd
 
A New Key Agreement Protocol Using BDP and CSP in Non Commutative Groups
A New Key Agreement Protocol Using BDP and CSP in Non Commutative GroupsA New Key Agreement Protocol Using BDP and CSP in Non Commutative Groups
A New Key Agreement Protocol Using BDP and CSP in Non Commutative GroupsEswar Publications
 
A short introduction to Network coding
A short introduction to Network codingA short introduction to Network coding
A short introduction to Network codingArash Pourdamghani
 

La actualidad más candente (18)

Quantum cryptography for secured communication networks
Quantum cryptography for secured communication networksQuantum cryptography for secured communication networks
Quantum cryptography for secured communication networks
 
Elgamal signature for content distribution with network coding
Elgamal signature for content distribution with network codingElgamal signature for content distribution with network coding
Elgamal signature for content distribution with network coding
 
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
 
Network coding
Network codingNetwork coding
Network coding
 
Introduction to Network Coding
Introduction to Network CodingIntroduction to Network Coding
Introduction to Network Coding
 
Ecc cipher processor based on knapsack algorithm
Ecc cipher processor based on knapsack algorithmEcc cipher processor based on knapsack algorithm
Ecc cipher processor based on knapsack algorithm
 
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...
 
Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...
Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...
Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...
 
Symposium on Jainism and Mathematics - presentation : 2020
Symposium on  Jainism and Mathematics  - presentation : 2020 Symposium on  Jainism and Mathematics  - presentation : 2020
Symposium on Jainism and Mathematics - presentation : 2020
 
Cancellation of Zigbee interference in OFDM based WLAN for multipath channel
Cancellation of Zigbee interference in OFDM based WLAN for multipath channelCancellation of Zigbee interference in OFDM based WLAN for multipath channel
Cancellation of Zigbee interference in OFDM based WLAN for multipath channel
 
Aes cryptography algorithm based on intelligent blum blum-shub prn gs publica...
Aes cryptography algorithm based on intelligent blum blum-shub prn gs publica...Aes cryptography algorithm based on intelligent blum blum-shub prn gs publica...
Aes cryptography algorithm based on intelligent blum blum-shub prn gs publica...
 
Cryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using VerilogCryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using Verilog
 
Analysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuAnalysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpu
 
Analysis and improvement of pairing free certificate-less two-party authentic...
Analysis and improvement of pairing free certificate-less two-party authentic...Analysis and improvement of pairing free certificate-less two-party authentic...
Analysis and improvement of pairing free certificate-less two-party authentic...
 
Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detectionIaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detection
 
A New Key Agreement Protocol Using BDP and CSP in Non Commutative Groups
A New Key Agreement Protocol Using BDP and CSP in Non Commutative GroupsA New Key Agreement Protocol Using BDP and CSP in Non Commutative Groups
A New Key Agreement Protocol Using BDP and CSP in Non Commutative Groups
 
Network Coding
Network CodingNetwork Coding
Network Coding
 
A short introduction to Network coding
A short introduction to Network codingA short introduction to Network coding
A short introduction to Network coding
 

Destacado

How to Backdoor Diffie-Hellman
How to Backdoor Diffie-HellmanHow to Backdoor Diffie-Hellman
How to Backdoor Diffie-HellmanDavid Wong
 
Cryptography and RSA algorithm
Cryptography and RSA algorithmCryptography and RSA algorithm
Cryptography and RSA algorithmSaifil Momin
 
Security Attacks on RSA
Security Attacks on RSASecurity Attacks on RSA
Security Attacks on RSAPratik Poddar
 
Cryptography & Network Security By, Er. Swapnil Kaware
Cryptography & Network Security By, Er. Swapnil KawareCryptography & Network Security By, Er. Swapnil Kaware
Cryptography & Network Security By, Er. Swapnil KawareProf. Swapnil V. Kaware
 
EULER AND FERMAT THEOREM
EULER AND FERMAT THEOREMEULER AND FERMAT THEOREM
EULER AND FERMAT THEOREMankita pandey
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securityNagendra Um
 
Basic Computer Organization and Design
Basic Computer Organization and DesignBasic Computer Organization and Design
Basic Computer Organization and Designmekind
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securitypatisa
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and CryptographyAdam Reagan
 

Destacado (16)

How to Backdoor Diffie-Hellman
How to Backdoor Diffie-HellmanHow to Backdoor Diffie-Hellman
How to Backdoor Diffie-Hellman
 
rsa-1
rsa-1rsa-1
rsa-1
 
Cryptography and RSA algorithm
Cryptography and RSA algorithmCryptography and RSA algorithm
Cryptography and RSA algorithm
 
Ch13
Ch13Ch13
Ch13
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
Security Attacks on RSA
Security Attacks on RSASecurity Attacks on RSA
Security Attacks on RSA
 
Cryptography & Network Security By, Er. Swapnil Kaware
Cryptography & Network Security By, Er. Swapnil KawareCryptography & Network Security By, Er. Swapnil Kaware
Cryptography & Network Security By, Er. Swapnil Kaware
 
EULER AND FERMAT THEOREM
EULER AND FERMAT THEOREMEULER AND FERMAT THEOREM
EULER AND FERMAT THEOREM
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
Attack lecture #2 ppt
Attack lecture #2 pptAttack lecture #2 ppt
Attack lecture #2 ppt
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
Basic Computer Organization and Design
Basic Computer Organization and DesignBasic Computer Organization and Design
Basic Computer Organization and Design
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Network security
Network securityNetwork security
Network security
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 

Similar a Cryptoghraphy

Lightweight secure scheme for detecting provenance forgery and packet drop at...
Lightweight secure scheme for detecting provenance forgery and packet drop at...Lightweight secure scheme for detecting provenance forgery and packet drop at...
Lightweight secure scheme for detecting provenance forgery and packet drop at...Pvrtechnologies Nellore
 
015 spins
015 spins015 spins
015 spinsSam Ram
 
Multiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisMultiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisIJCERT
 
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...IOSR Journals
 
A study of cryptography for satellite applications
A study of cryptography for satellite applicationsA study of cryptography for satellite applications
A study of cryptography for satellite applicationsRajesh Ishida
 
Public key cryptography
Public key cryptography Public key cryptography
Public key cryptography rinnocente
 
Circuit ciphertext policy attribute-based hybrid encryption with verifiable
Circuit ciphertext policy attribute-based hybrid encryption with verifiableCircuit ciphertext policy attribute-based hybrid encryption with verifiable
Circuit ciphertext policy attribute-based hybrid encryption with verifiablePvrtechnologies Nellore
 
Lecture3a symmetric encryption
Lecture3a symmetric encryptionLecture3a symmetric encryption
Lecture3a symmetric encryptionrajakhurram
 
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...Editor IJCATR
 
Criptography approach using magnets
Criptography approach using magnetsCriptography approach using magnets
Criptography approach using magnetssnv09
 
Crypto 101: Encryption, Codebreaking, SSL and Bitcoin
Crypto 101: Encryption, Codebreaking, SSL and BitcoinCrypto 101: Encryption, Codebreaking, SSL and Bitcoin
Crypto 101: Encryption, Codebreaking, SSL and BitcoinPriyanka Aash
 
Presentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_PaperPresentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_PaperNithin Cv
 
Cryptography and network security Nit701
Cryptography and network security Nit701Cryptography and network security Nit701
Cryptography and network security Nit701Amit Pathak
 
ch09_rsa_nemo.ppt
ch09_rsa_nemo.pptch09_rsa_nemo.ppt
ch09_rsa_nemo.pptChandraB15
 

Similar a Cryptoghraphy (20)

Lightweight secure scheme for detecting provenance forgery and packet drop at...
Lightweight secure scheme for detecting provenance forgery and packet drop at...Lightweight secure scheme for detecting provenance forgery and packet drop at...
Lightweight secure scheme for detecting provenance forgery and packet drop at...
 
015 spins
015 spins015 spins
015 spins
 
Network security
Network securityNetwork security
Network security
 
spins
spinsspins
spins
 
Cryptography and Network security # Lecture 5
Cryptography and Network security # Lecture 5Cryptography and Network security # Lecture 5
Cryptography and Network security # Lecture 5
 
Multiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisMultiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity Analysis
 
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
 
A study of cryptography for satellite applications
A study of cryptography for satellite applicationsA study of cryptography for satellite applications
A study of cryptography for satellite applications
 
Public key cryptography
Public key cryptography Public key cryptography
Public key cryptography
 
Ch9
Ch9Ch9
Ch9
 
Introduction to cryptography
Introduction to cryptographyIntroduction to cryptography
Introduction to cryptography
 
Circuit ciphertext policy attribute-based hybrid encryption with verifiable
Circuit ciphertext policy attribute-based hybrid encryption with verifiableCircuit ciphertext policy attribute-based hybrid encryption with verifiable
Circuit ciphertext policy attribute-based hybrid encryption with verifiable
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Lecture3a symmetric encryption
Lecture3a symmetric encryptionLecture3a symmetric encryption
Lecture3a symmetric encryption
 
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
 
Criptography approach using magnets
Criptography approach using magnetsCriptography approach using magnets
Criptography approach using magnets
 
Crypto 101: Encryption, Codebreaking, SSL and Bitcoin
Crypto 101: Encryption, Codebreaking, SSL and BitcoinCrypto 101: Encryption, Codebreaking, SSL and Bitcoin
Crypto 101: Encryption, Codebreaking, SSL and Bitcoin
 
Presentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_PaperPresentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_Paper
 
Cryptography and network security Nit701
Cryptography and network security Nit701Cryptography and network security Nit701
Cryptography and network security Nit701
 
ch09_rsa_nemo.ppt
ch09_rsa_nemo.pptch09_rsa_nemo.ppt
ch09_rsa_nemo.ppt
 

Más de Hitesh Wagle

48695528 the-sulphur-system
48695528 the-sulphur-system48695528 the-sulphur-system
48695528 the-sulphur-systemHitesh Wagle
 
Fundamentals of data structures ellis horowitz & sartaj sahni
Fundamentals of data structures   ellis horowitz & sartaj sahniFundamentals of data structures   ellis horowitz & sartaj sahni
Fundamentals of data structures ellis horowitz & sartaj sahniHitesh Wagle
 
Applicationof datastructures
Applicationof datastructuresApplicationof datastructures
Applicationof datastructuresHitesh Wagle
 
Google search tips
Google search tipsGoogle search tips
Google search tipsHitesh Wagle
 
Applicationof datastructures
Applicationof datastructuresApplicationof datastructures
Applicationof datastructuresHitesh Wagle
 
Lecture notes on infinite sequences and series
Lecture notes on infinite sequences and seriesLecture notes on infinite sequences and series
Lecture notes on infinite sequences and seriesHitesh Wagle
 
Switkes01200543268
Switkes01200543268Switkes01200543268
Switkes01200543268Hitesh Wagle
 
Quote i2 cns_cnr_25064966
Quote i2 cns_cnr_25064966Quote i2 cns_cnr_25064966
Quote i2 cns_cnr_25064966Hitesh Wagle
 

Más de Hitesh Wagle (20)

Zinkprinter
ZinkprinterZinkprinter
Zinkprinter
 
48695528 the-sulphur-system
48695528 the-sulphur-system48695528 the-sulphur-system
48695528 the-sulphur-system
 
Fundamentals of data structures ellis horowitz & sartaj sahni
Fundamentals of data structures   ellis horowitz & sartaj sahniFundamentals of data structures   ellis horowitz & sartaj sahni
Fundamentals of data structures ellis horowitz & sartaj sahni
 
Diode logic crkts
Diode logic crktsDiode logic crkts
Diode logic crkts
 
Applicationof datastructures
Applicationof datastructuresApplicationof datastructures
Applicationof datastructures
 
Oops index
Oops indexOops index
Oops index
 
Google search tips
Google search tipsGoogle search tips
Google search tips
 
Diode logic crkts
Diode logic crktsDiode logic crkts
Diode logic crkts
 
Computer
ComputerComputer
Computer
 
Applicationof datastructures
Applicationof datastructuresApplicationof datastructures
Applicationof datastructures
 
Green chem 2
Green chem 2Green chem 2
Green chem 2
 
Convergence tests
Convergence testsConvergence tests
Convergence tests
 
Lecture notes on infinite sequences and series
Lecture notes on infinite sequences and seriesLecture notes on infinite sequences and series
Lecture notes on infinite sequences and series
 
Switkes01200543268
Switkes01200543268Switkes01200543268
Switkes01200543268
 
Quote i2 cns_cnr_25064966
Quote i2 cns_cnr_25064966Quote i2 cns_cnr_25064966
Quote i2 cns_cnr_25064966
 
Pointers
PointersPointers
Pointers
 
P1
P1P1
P1
 
Notes
NotesNotes
Notes
 
Inheritance
InheritanceInheritance
Inheritance
 
Function notes 2
Function notes 2Function notes 2
Function notes 2
 

Último

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Último (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Cryptoghraphy

  • 1. Cryptography and Network Security Bhaskaran Raman Department of CSE, IIT Kanpur Reference: Whitfield Diffie and Martin E. Hellman, “ Privacy and Authentication: An Introduction to Cryptography” , in Proc. IEEE, vol. 67, no.3, pp. 397 - 427, 1979 Fundamentals of Wired and Wireless Networks, Kameswari Chebrolu and Bhaskaran Raman, 09­13 May 2005
  • 2. Cryptography Fundamentals ● Privacy versus Authentication: – Privacy: preventing third party from snooping – Authentication: preventing impostering ● Two kinds of authentication: – Guarantee that no third party has modified data – Receiver can prove that only the sender originated the data ● Digital Signature ● E.g., for electronic transactions Fundamentals of Wired and Wireless Networks, Kameswari Chebrolu and Bhaskaran Raman, 09­13 May 2005
  • 3. Cryptographic Privacy Eavesdropper P C P Sender Encryption Decryption Receiver C = SK(P) Network C = S­1K(P) Key: K ● Encrypt before sending, decrypt on receiving – Terms: plain text and cipher text ● Two components: key, and the algorithm – Should algorithm be secret? ● Yes, for military systems; no, for commercial systems ● Key distribution must be secure Fundamentals of Wired and Wireless Networks, Kameswari Chebrolu and Bhaskaran Raman, 09­13 May 2005
  • 4. Cryptographic Authentication Eavesdropper C' P P' Sender Encryption Decryption Receiver C = SK(P) Network C' = S­1K(P') Key: K ● The same system can also be used for authentication Fundamentals of Wired and Wireless Networks, Kameswari Chebrolu and Bhaskaran Raman, 09­13 May 2005
  • 5. Cryptanalysis ● Cryptanalysis: attacker tries to break the system – E.g., by guessing the plain text for a given cipher text – Or, by guessing the cipher text for some plain text ● Possible attacks: – Cipher-text only attack – Known plain-text attack – Chosen plain-text attack – Chosen text attack Fundamentals of Wired and Wireless Networks, Kameswari Chebrolu and Bhaskaran Raman, 09­13 May 2005
  • 6. Security Guarantees ● Two possibilities: – Unconditional – Computational security ● Unconditional security: an example – One-time tape ● Most systems have computational security – How much security to have? – Depends on cost-benefit analysis for attacker Fundamentals of Wired and Wireless Networks, Kameswari Chebrolu and Bhaskaran Raman, 09­13 May 2005
  • 7. Public-Key Systems ● Shared-key ==> difficulties in key distribution – C(n,2) = O(n^2) keys ● Public key system – Public component and a private component – Two kinds: ● Public key distribution: establish shared key first ● Public key cryptography: use public/private keys in encryption/decryption – Public key cryptography can also be used for digital signatures Fundamentals of Wired and Wireless Networks, Kameswari Chebrolu and Bhaskaran Raman, 09­13 May 2005
  • 8. Some Example Systems ● Permuted alphabet (common puzzle) – Can be attacked using frequency analysis, patterns, digrams, trigrams – Attack becomes difficult if alphabet size is large ● Transposition ● Poly-alphabetic: periodic or running key ● Codes versus ciphering – Codes are stronger, and also achieve data compression Fundamentals of Wired and Wireless Networks, Kameswari Chebrolu and Bhaskaran Raman, 09­13 May 2005
  • 9. Some Popular Systems ● Private key systems: – DES, 3DES ● Public key systems: – RSA: based on difficulty of factoring – Galois-Field (GF) system: based on difficulty of finding logarithm – Based on knapsack problem Fundamentals of Wired and Wireless Networks, Kameswari Chebrolu and Bhaskaran Raman, 09­13 May 2005
  • 10. Digital Encryption Standard (DES) 64 bits + 64 bits 64 bits Plain­text Key Cipher­text P R1 R2 R16 P­1 Permutation, 16 rounds of identical operation, inverse permutation Li­1 Ri­1 Each round uses a  different 48­bit key  F Ki Ki (from K) and a  + combiner function F Li­1 Ri­1 Fundamentals of Wired and Wireless Networks, Kameswari Chebrolu and Bhaskaran Raman, 09­13 May 2005
  • 11. Triple-DES (3DES) ● DES can be broken with 2^55 tries: – 4500 years on an Alpha workstation – But only 6 months with 9000 Alphas ● Triple-DES: – Use DES thrice, with 3 separate keys, or with two keys (K1 first, then K2, then K1 again) Fundamentals of Wired and Wireless Networks, Kameswari Chebrolu and Bhaskaran Raman, 09­13 May 2005
  • 12. Rivest, Shamir, Adleman (RSA) Public-Key Crypto-System ● Based on the fact that finding large (e.g. 100 digit) prime numbers is easy, but factoring the product of two such numbers appears computationally infeasible ● Choose very large prime numbers P and Q – N=PxQ – N is public; P, Q are secret ● Euler totient: Phi(N) = (P-1)(Q-1) = Number of integers less than N & relatively prime to N Fundamentals of Wired and Wireless Networks, Kameswari Chebrolu and Bhaskaran Raman, 09­13 May 2005
  • 13. RSA (continued) ● Next, choose E in [2, Phi(N)-1], E is public ● A message is represented as a sequence M1, M2, M3..., where each M in [0, N-1] ● Encryption: C = ME mod N ● Using the secret Phi(N), A can compute D such that ED = 1 mod Phi(N) ● ED = k x Phi(N) + 1 ● Then, for any X < N, Xk x Phi(N)+1 = X mod N Fundamentals of Wired and Wireless Networks, Kameswari Chebrolu and Bhaskaran Raman, 09­13 May 2005
  • 14. RSA (Continued) ● Decryption: CD = MED = Mk x Phi(N)+1 = M mod N ● Example: Choose P = 17, Q = 31 – N = 527, Phi(N) = 480 – Choose E = 7, then D = 343 – If M = 2, Encryption: C = 128 – Decryption: D = CD mod N = 128343 mod 527 = 2 Fundamentals of Wired and Wireless Networks, Kameswari Chebrolu and Bhaskaran Raman, 09­13 May 2005
  • 15. Taxonomy of Ciphers ● Block ciphers: divide plain text into blocks and encrypt each independently ● Properties required: – No bit of plain text should appear directly in cipher text – Changing even one bit in plain text should result in huge (50%) change in cipher text – Exact opposite of properties required for systematic error correction codes ● Stream cipher: encryption depends on current state Fundamentals of Wired and Wireless Networks, Kameswari Chebrolu and Bhaskaran Raman, 09­13 May 2005
  • 16. Key Management ● Keys need to be generated periodically – New users – Some keys may be compromised ● Addressing the O(n^2) problem with key distribution – Link encryption – Key Distribution Centre (KDC): all eggs in one basket – Multiple KDCs: better security ● Key management easier in public key cryptography Fundamentals of Wired and Wireless Networks, Kameswari Chebrolu and Bhaskaran Raman, 09­13 May 2005
  • 17. Some Non-Crypto Attacks ● Man-in-the-middle attack: play a trick by being in the middle ● Traffic analysis: – Can learn information by just looking at presence/absence of traffic, or its volume – Can be countered using data padding ● Playback or replay attacks: – To counter: need to verify timeliness of message from sender while authenticating – Beware of issues of time synchronization Fundamentals of Wired and Wireless Networks, Kameswari Chebrolu and Bhaskaran Raman, 09­13 May 2005