cryptographyvsstegnography

Post on 20-May-2015

338 Views

Category:

Education

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

What is meant by cryptography ? • Its Greek word

• Crypto means “ Secret”

• Graphie means “ Writing “

Why Cryptography ? • To convert the plain text to unreadable text

What is need of Cryptography ?

To secure the Sensitive Information

• Username – Password

• Credit Card Number etc..

CRYPTOGRAPHY COMPONENT

Cryptanalysisbasic component of cryptography is a cryptosystem

Cryptanalyst • Person working for unauthorized interceptor

Cryptographer

• Person working for legitimate sender or receiver

Cryptology

• encryption and decryption

Cryptosystem A cryptosystem is a 5-tuple ( , D , M , K , C)

• M is the collection of plaintexts

• K is the set of keys

• C is the set of cipher texts

o = K → C is the set of encipher (encryption)o D = C K → M is the set of deciphering (decryption)

How it works ?

Note • Plaintext M : collection of original messages

• Cipher text C : set of messages in encrypted form

Cryptosystem

Encryption Decryption

• Process of encoding (enciphering / encryption ) a message

• Process of decoding (deciphering or decryption) an encrypted message to its original form.

securesender

securereceiver

channel data, control messages

data data

Alisa Kishan

Trudy

CRYPTOGRAPHY

CRYPTOGRAPHY

SYMMETRIC-KEY

CRYPTOGRAPHY

ASYMMETRIC-KEY

CRYPTOGRAPHY

Types of Cryptosystems Symmetric Key Cryptosystems

• Also called single-key cryptosystems

• M = D ( K , E ( K , M ) )

• The encryption key and decryption key are the same

Symmetric Cryptosystems Basic techniques for classical ciphers (Encryption)

Substitution

Transposition

Mono-alphabetic

Poly-alphabetic

Stream

• One letter is exchanged for another

• The order of the letters is rearranged Classical ciphers

• Letters of the plaintext alphabet are mapped into other unique letters

• Letters of the plaintext alphabet are mapped into letters of the cipher text space depending on their positions in the text

• Key stream is generated and used to encrypt the plaintext (Symmetric Key Algorithms)

Transposition

Example :-

T 5 T RH 3 H C E EE 1 I E T GK 4 S S M AE 2 I A E SY 6 S S

TRHCEEIETGSSMAIAEASSCipher-Text :-

Refer (by key): IETGIAESHCEESSMATRSS

Columnar

• IEEIRSHSMESCSTATGSEA

T H E K E Y5 3 1 4 2 6

T H I S I SA S E C R ET M E S S AG E

Types of Cryptosystems Asymmetric cryptosystem

• M = D (Kd , E (Ke , M ) )

• The encryption key and decryption key are not the same• Kd ≠ Ke

Asymmetric Key Cryptosystem (Public Key Cryptosystem)

Uses public and private keys

• Public key for encryption• Private key for decryption

Examples

• RSA

• Trapdoor one-way function

• Elliptical curve cryptography

RSA Principle Developed by Ron Rivets , Adi Shamir, and Leonard Adleman. (MIT, 1977)

C = me mod (pq)

• P , q : any two large prime numbers (more than 512 bits)

• e: public key

• d: private key

• Knowing C and e, it is “infeasible” to calculate m without knowing d , p and q

• Knowing d, p and q, it is easy to find the original plaintext message m = Cd mod (pq)

RSA Principle

{m, e, p, q; C= me mod(pq)}

{C, e, p, q; m=Cd mod(pq)}

Sender

Intruder

Receiver

{C, e}

What is Steganography?What is Steganography?

• STEGANOS – “Covered”• GRAPHIE – “Writing”

Its Greek Words:

Steganography is about Hiding messages Digital Applications of Steganography

• Can be hidden in digital data - MS Word (doc)

- Web pages (html) - Sound files (mp3, wav, cda)- Video files (mpeg, avi)

- Digital images (bmp, gif, jpg) Today, steganography is used primarily

to protect digital rights

• “watermarking” copyright notices

• “fingerprinting” a serial ID

History of History of SteganographySteganography Chinese silk balls

Invisible ink-jet technology

Microdots Easter eggs

Hiding a message within a text Shift some words by one point/pixel

- Shifted words (or their first letters) make the sentence Use different fonts

- Letter by letter or word by word

A Real ExampleA Real Example During WW2 the following cipher

message was actually sent by a German spy “Apparently, neutral’s protest is

thoroughly discounted and ignored. Isman hard hit. Blockade issue affect pretext for embargo on by products, ejecting suets and vegetable oils.”

Hidden Message

• “ Pershing sails from NY June 1”

ModernModern Steganography Steganography

Hiding one message within another (“container”)

Most containers are rich media

• Images , audio, video ,mp3 etc.

Copyright notices embedded in digital art

• Prove ownership

Digital cameras EXIF tags

• Not secretive, but hidden from the eyez• Embed info such as camera type, date, shutter

speed , focal length,..

Similarly , possible to embed messages in invisible parts of html pages

Steganography Steganography SystemSystem

ComparisonComparisonCryptography

C = Ek (P) Plain text

P = Dk (C)

Key

Steganography

secret message

cover image

f Stego message

f Ciphertext

Hiding a Message in an ImageHiding a Message in an ImageOriginal Picture Embedded picture

top related