SlideShare una empresa de Scribd logo
1 de 38
Presented By:
Tahir Ilyas (BSEES01121005)
Iqra hamid (BSEES01121004)
Department of electronics
University of Lahore
GROUP MEMBERS
‘’ The Science of Secure writing ’’
• What is cryptography ?
• Why cryptography is important ?
Contents
• The purpose of cryptography
• Basic terms
• History of cryptography and cryptanalysis
• Modern cryptography(Types of Algorithms)
- Secret Key Cryptography
- Hash Functions
- Public Key Cryptography
- Methods of Cryptography
- The Significance of Passwords & Password Security
• Draw Backs of Cryptography
• Conclusion
 Science of writing in secret code
THE PURPOSE OF CRYPTOGRAPHY
 Computer communications Data transfer and telecommunicationSpecific security requirements for communication:
Authentication:
Privacy/confidentiality:
Non-repudiation:
Integrity:
THE PURPOSE OF CRYPTOGRAPHY
Authentication:
ensures that whoever supplies or accesses sensitive data is
an authorized party.
Privacy/confidentiality:
assures that only authorized parties are able to understand
the data.
THE PURPOSE OF CRYPTOGRAPHY
Integrity:
ensures that when a message is sent over a network, the
message that arrives is the same as the message that was
originally sent.
Non-repudiation:
ensuring that the intended recipient actually received the
message & ensuring that the sender actually sent the
message.
BASIC TERMS
Cipher:
The algorithm that does the encryption.
Ciphertext:
The encrypted version of the message. Message altered to
be unreadable by anyone except the intended recipients.
Crytanlysis:
The science of breaking cryptographic algorithms.
Cryptanalysts:
A person who breaks cryptographic codes; also referred to
as “the attacker”.
BASIC TERMS
Encryption:
Scrambling a message or data using a specialized
cryptographic algorithm.
Decryption:
The process of converting ciphertext back to the original
plaintext.
Key:
Sequence that controls the operation and behavior of the
cryptographic algorithm.
Plaintext:
A message in its natural format readable by an attacker.
The history of cryptography can be divided into two
parts:
(1) From ancient civilizations to the 19th century and the
first part of the 20th century,
(2) Use of encrypting electro-mechanical machines,
around the period of the WW II.
HISTORY OF CRYPTOGRAPHY
Cryptography:
Greek κρυπτός, kryptos,
"hidden, secret"
HISTORY OF CRYPTOGRAPHY
Cryptography was used in three kinds of contexts in
ancient times :
 Private communications
 Art and religion
 Military and diplomatic use
Here we have three types of algorithms that we can
talk about:
MODERN CRYPTOGHRAPHY
 Secret Key Cryptography
 Hash Functions
 Public Key Cryptography
MODERN CRYPTOGHRAPHY
 Secret Key(Symmetric) Cryptography uses a single
key for both encryption and decryption.
SECRET KEY CRYPTOGHRAPHY
 A single key is used
SECRET KEY CRYPTOGHRAPHY
 Sender uses the key to encrypt
 Receiver uses the same key to decrypt
 Key must be known to both the sender and the
receiver
 The difficulty is the distribution of the key
Secret key cryptography algorithms that are in use
today :
SECRET KEY CRYPTOGHRAPHY
 Data Encryption Standard (DES):
 Advanced Encryption Standard (AES):
 International Data Encryption Algorithm (IDEA):
SECRET KEY SUMMARY
 Hash functions(One-way cryptography) have no
key since plaintext cannot be recovered from the
ciphertext.
HASH FUNCTIONS
 Called message compiler and one-way encryption
HASH FUNCTIONS
 No key is used
 Digital fingerprint
 Provide the integrity
Hash algorithms that are in common use today:
HASH FUNCTIONS
 Message Digest (MD) algorithms:
 HAVAL (Hash of Variable Length):
 Tiger:
PUBLIC KEY CRYPTOGHRAPHY
 Public Key(Asymmetric) Cryptography. Two keys are
used. One for encryption, one for decryption.
PUBLIC KEY CRYPTOGHRAPHY
 Developed in the last 300-400 years.
 Martin Hellman and graduate student Whitfield
Diffie
 A two-key crypto system
 Mathematical functions
PUBLIC KEY CRYPTOGHRAPHY
Mathematical Functions :
 Multiplication vs. factorization:
 Exponentiation vs. logarithms:
PUBLIC KEY CRYPTOGHRAPHY
PUBLIC KEY SUMMARY
METHODS OF CRYPTOGRAPHY
Cryptography
Symmetric key Asymmetric key
cryptography cryptography
(Public key cryptography)
Classical Modern
cryptography cryptography
Transposition Substitution Stream Block
cipher cipher cipher cipher
TRANSPOSITION CIPHER
In classical cryptography, a transposition cipher changes
one character from the plaintext to another i.e. the order of
the characters is changed.
SUBSITITUTE CIPHER
Substitution cipher is a method of encryption by which
units of plaintext are substituted with ciphertext according to
a regular system.
STREAM CIPHER
A Stream Cipher is a symmetric or secret-key encryption
algorithm that encrypts a single bit at a time. With a Stream
Cipher, the same plaintext bit or byte will encrypt to a different
bit or byte every time it is encrypted.
e.g. :
Plain text: Pay 100
Binary of plain text: 010111101 (hypothetical)
Key: 100101011 ----- Perform XOR
____________________
Cipher text 110010110 ----- ZTU9^%D
To decrypt make the XOR operation of the cipher text
with the key .
BLOCK CIPHER
Block cipher technique involves encryption of one block of
text at a time .Decryption also takes one block of encrypted text
at a time. Length of the block is usually 64 or 128 bits.
e.g. :
Plain text: four and five
Four and five
Key Key Key
wvfa ast wvfa --- cipher text
 Every password can be decyrpted.
THE SIGNIFICANCE OF PASSWORDS
 In cryptography, size does matter.
How to create & use strong
Passwords
 Use lengthy passwords.
 Combine letters, numbers, and symbols.
How to create & use strong
Passwords
 Use words and phrases.
Draw Backs of Cryptography
Advantages
• The biggest advantage of public key cryptography is the secure
nature of the private key. In fact it never needs to be transmitted
or revealed to anyone.
• Another type of benefit of public key cryptography is that is
provides a method for employing digital signatures.
• It enables the use of digital certificates and digital timestamps,
which is a very secure technique of authorization .We will look
at digital timestamps and digital signatures in a moment.
Draw Backs of Cryptography
disAdvantages
• Transmission time for documents encrypted public
key cryptography are significantly larger than
symmetric cryptography. In fact transmission of very
large documents is prohibitive.
• The key sizes must be significantly larger than
symmetric cryptography to achieve the same level of
protection.
• Public key cryptography is susceptible to
impersonation attacks.
CONCLUSION
Cryptography, being an art of encrypting and
decrypting confidential information and private
messages, should be implemented in the network
security to prevent any leakage and threat.
It can be done by using any of these techniques
discussed above for fortifying the personal data
transmission as well as for secure transaction.
Cryptography, a science of secure writing

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Cryptography
CryptographyCryptography
Cryptography
 
Crytography
CrytographyCrytography
Crytography
 
Cryptography and E-Commerce
Cryptography and E-CommerceCryptography and E-Commerce
Cryptography and E-Commerce
 
Cryptographic tools
Cryptographic toolsCryptographic tools
Cryptographic tools
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
cryptography ppt free download
cryptography ppt free downloadcryptography ppt free download
cryptography ppt free download
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography Presentation
Cryptography PresentationCryptography Presentation
Cryptography Presentation
 
Applied Cryptography
Applied CryptographyApplied Cryptography
Applied Cryptography
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementation
 
Cryptography
Cryptography Cryptography
Cryptography
 
Cryptography ppt ,computer system security. PPT
Cryptography ppt ,computer system security. PPTCryptography ppt ,computer system security. PPT
Cryptography ppt ,computer system security. PPT
 
Cryptography
CryptographyCryptography
Cryptography
 
Crytography
CrytographyCrytography
Crytography
 
Cryptography
CryptographyCryptography
Cryptography
 
What is Cryptography?
What is Cryptography?What is Cryptography?
What is Cryptography?
 
Cryptography full report
Cryptography full reportCryptography full report
Cryptography full report
 
Cryptography
CryptographyCryptography
Cryptography
 

Similar a Cryptography, a science of secure writing

Cryptography : The Art of Secured Messaging
Cryptography : The Art of Secured MessagingCryptography : The Art of Secured Messaging
Cryptography : The Art of Secured MessagingSumit Satam
 
Evolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniquesEvolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniquesMona Rajput
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPrabhatMishraAbvp
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptvinitajain703
 
Presentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHYPresentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHYBARATH800940
 
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.pptCRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.pptPayalChopra9
 
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.pptPresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.pptso6281019
 
CSE CRYPTOGRAPHY ppt - Copy.pptx
CSE CRYPTOGRAPHY ppt - Copy.pptxCSE CRYPTOGRAPHY ppt - Copy.pptx
CSE CRYPTOGRAPHY ppt - Copy.pptxKuntalSasmal1
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarDurlove Kumbhakar
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptographyVaibhav Khanna
 
cryptography.ppt - Copy.ppt
cryptography.ppt - Copy.pptcryptography.ppt - Copy.ppt
cryptography.ppt - Copy.pptSudhanshuKarna
 
Introduction to cryptography part1-final
Introduction to cryptography  part1-finalIntroduction to cryptography  part1-final
Introduction to cryptography part1-finalTaymoor Nazmy
 

Similar a Cryptography, a science of secure writing (20)

Cryptography : The Art of Secured Messaging
Cryptography : The Art of Secured MessagingCryptography : The Art of Secured Messaging
Cryptography : The Art of Secured Messaging
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Evolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniquesEvolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniques
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
 
Presentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHYPresentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHY
 
Cryptography
CryptographyCryptography
Cryptography
 
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.pptCRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
 
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.pptPresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Analysis of Cryptography Techniques
Analysis of Cryptography TechniquesAnalysis of Cryptography Techniques
Analysis of Cryptography Techniques
 
Ccn presentation
Ccn presentationCcn presentation
Ccn presentation
 
Cryptography
Cryptography Cryptography
Cryptography
 
CSE CRYPTOGRAPHY ppt - Copy.pptx
CSE CRYPTOGRAPHY ppt - Copy.pptxCSE CRYPTOGRAPHY ppt - Copy.pptx
CSE CRYPTOGRAPHY ppt - Copy.pptx
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab Kumbhakar
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptography
 
cryptography.ppt.ppt
cryptography.ppt.pptcryptography.ppt.ppt
cryptography.ppt.ppt
 
cryptography.ppt - Copy.ppt
cryptography.ppt - Copy.pptcryptography.ppt - Copy.ppt
cryptography.ppt - Copy.ppt
 
Introduction to cryptography part1-final
Introduction to cryptography  part1-finalIntroduction to cryptography  part1-final
Introduction to cryptography part1-final
 

Último

Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityMorshed Ahmed Rahath
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdfKamal Acharya
 
Rums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfRums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfsmsksolar
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"mphochane1998
 
Bridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptxBridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptxnuruddin69
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwaitjaanualu31
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...HenryBriggs2
 
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...Health
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxmaisarahman1
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projectssmsksolar
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdfKamal Acharya
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdfKamal Acharya
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086anil_gaur
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 

Último (20)

Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Rums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfRums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdf
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Bridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptxBridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptx
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 

Cryptography, a science of secure writing

  • 1.
  • 2. Presented By: Tahir Ilyas (BSEES01121005) Iqra hamid (BSEES01121004) Department of electronics University of Lahore GROUP MEMBERS
  • 3. ‘’ The Science of Secure writing ’’
  • 4. • What is cryptography ? • Why cryptography is important ?
  • 5. Contents • The purpose of cryptography • Basic terms • History of cryptography and cryptanalysis • Modern cryptography(Types of Algorithms) - Secret Key Cryptography - Hash Functions - Public Key Cryptography - Methods of Cryptography - The Significance of Passwords & Password Security • Draw Backs of Cryptography • Conclusion
  • 6.  Science of writing in secret code THE PURPOSE OF CRYPTOGRAPHY  Computer communications Data transfer and telecommunicationSpecific security requirements for communication: Authentication: Privacy/confidentiality: Non-repudiation: Integrity:
  • 7. THE PURPOSE OF CRYPTOGRAPHY Authentication: ensures that whoever supplies or accesses sensitive data is an authorized party. Privacy/confidentiality: assures that only authorized parties are able to understand the data.
  • 8. THE PURPOSE OF CRYPTOGRAPHY Integrity: ensures that when a message is sent over a network, the message that arrives is the same as the message that was originally sent. Non-repudiation: ensuring that the intended recipient actually received the message & ensuring that the sender actually sent the message.
  • 9. BASIC TERMS Cipher: The algorithm that does the encryption. Ciphertext: The encrypted version of the message. Message altered to be unreadable by anyone except the intended recipients. Crytanlysis: The science of breaking cryptographic algorithms. Cryptanalysts: A person who breaks cryptographic codes; also referred to as “the attacker”.
  • 10. BASIC TERMS Encryption: Scrambling a message or data using a specialized cryptographic algorithm. Decryption: The process of converting ciphertext back to the original plaintext. Key: Sequence that controls the operation and behavior of the cryptographic algorithm. Plaintext: A message in its natural format readable by an attacker.
  • 11. The history of cryptography can be divided into two parts: (1) From ancient civilizations to the 19th century and the first part of the 20th century, (2) Use of encrypting electro-mechanical machines, around the period of the WW II. HISTORY OF CRYPTOGRAPHY
  • 12. Cryptography: Greek κρυπτός, kryptos, "hidden, secret" HISTORY OF CRYPTOGRAPHY Cryptography was used in three kinds of contexts in ancient times :  Private communications  Art and religion  Military and diplomatic use
  • 13. Here we have three types of algorithms that we can talk about: MODERN CRYPTOGHRAPHY  Secret Key Cryptography  Hash Functions  Public Key Cryptography
  • 15.  Secret Key(Symmetric) Cryptography uses a single key for both encryption and decryption. SECRET KEY CRYPTOGHRAPHY
  • 16.  A single key is used SECRET KEY CRYPTOGHRAPHY  Sender uses the key to encrypt  Receiver uses the same key to decrypt  Key must be known to both the sender and the receiver  The difficulty is the distribution of the key
  • 17. Secret key cryptography algorithms that are in use today : SECRET KEY CRYPTOGHRAPHY  Data Encryption Standard (DES):  Advanced Encryption Standard (AES):  International Data Encryption Algorithm (IDEA):
  • 19.  Hash functions(One-way cryptography) have no key since plaintext cannot be recovered from the ciphertext. HASH FUNCTIONS
  • 20.  Called message compiler and one-way encryption HASH FUNCTIONS  No key is used  Digital fingerprint  Provide the integrity
  • 21. Hash algorithms that are in common use today: HASH FUNCTIONS  Message Digest (MD) algorithms:  HAVAL (Hash of Variable Length):  Tiger:
  • 22. PUBLIC KEY CRYPTOGHRAPHY  Public Key(Asymmetric) Cryptography. Two keys are used. One for encryption, one for decryption.
  • 23. PUBLIC KEY CRYPTOGHRAPHY  Developed in the last 300-400 years.  Martin Hellman and graduate student Whitfield Diffie  A two-key crypto system  Mathematical functions
  • 24. PUBLIC KEY CRYPTOGHRAPHY Mathematical Functions :  Multiplication vs. factorization:  Exponentiation vs. logarithms:
  • 27. METHODS OF CRYPTOGRAPHY Cryptography Symmetric key Asymmetric key cryptography cryptography (Public key cryptography) Classical Modern cryptography cryptography Transposition Substitution Stream Block cipher cipher cipher cipher
  • 28. TRANSPOSITION CIPHER In classical cryptography, a transposition cipher changes one character from the plaintext to another i.e. the order of the characters is changed.
  • 29. SUBSITITUTE CIPHER Substitution cipher is a method of encryption by which units of plaintext are substituted with ciphertext according to a regular system.
  • 30. STREAM CIPHER A Stream Cipher is a symmetric or secret-key encryption algorithm that encrypts a single bit at a time. With a Stream Cipher, the same plaintext bit or byte will encrypt to a different bit or byte every time it is encrypted. e.g. : Plain text: Pay 100 Binary of plain text: 010111101 (hypothetical) Key: 100101011 ----- Perform XOR ____________________ Cipher text 110010110 ----- ZTU9^%D To decrypt make the XOR operation of the cipher text with the key .
  • 31. BLOCK CIPHER Block cipher technique involves encryption of one block of text at a time .Decryption also takes one block of encrypted text at a time. Length of the block is usually 64 or 128 bits. e.g. : Plain text: four and five Four and five Key Key Key wvfa ast wvfa --- cipher text
  • 32.  Every password can be decyrpted. THE SIGNIFICANCE OF PASSWORDS  In cryptography, size does matter.
  • 33. How to create & use strong Passwords
  • 34.  Use lengthy passwords.  Combine letters, numbers, and symbols. How to create & use strong Passwords  Use words and phrases.
  • 35. Draw Backs of Cryptography Advantages • The biggest advantage of public key cryptography is the secure nature of the private key. In fact it never needs to be transmitted or revealed to anyone. • Another type of benefit of public key cryptography is that is provides a method for employing digital signatures. • It enables the use of digital certificates and digital timestamps, which is a very secure technique of authorization .We will look at digital timestamps and digital signatures in a moment.
  • 36. Draw Backs of Cryptography disAdvantages • Transmission time for documents encrypted public key cryptography are significantly larger than symmetric cryptography. In fact transmission of very large documents is prohibitive. • The key sizes must be significantly larger than symmetric cryptography to achieve the same level of protection. • Public key cryptography is susceptible to impersonation attacks.
  • 37. CONCLUSION Cryptography, being an art of encrypting and decrypting confidential information and private messages, should be implemented in the network security to prevent any leakage and threat. It can be done by using any of these techniques discussed above for fortifying the personal data transmission as well as for secure transaction.