cryptography
TRANSCRIPT
![Page 1: Cryptography](https://reader035.vdocuments.us/reader035/viewer/2022081403/554a3a93b4c905293a8b4a3e/html5/thumbnails/1.jpg)
CONTENTSo Introductiono Need of Cryptographyo Types of Attackso Techniques of Cryptographyo Encryption Algorithm
• Symmetric • Asymmetric
o Digital Signatureo Conclusion
![Page 2: Cryptography](https://reader035.vdocuments.us/reader035/viewer/2022081403/554a3a93b4c905293a8b4a3e/html5/thumbnails/2.jpg)
INTRODUCTION
What is Cryptography?“Hidden Writing”
Mainly used to protect Information.
Goal of Cryptography
Ensure security of communication over insecure medium
Communicate even with possibility of adversary
![Page 3: Cryptography](https://reader035.vdocuments.us/reader035/viewer/2022081403/554a3a93b4c905293a8b4a3e/html5/thumbnails/3.jpg)
NEED OF ENCRYPTION Confidentiality Integrity Authentication Nonrepudiation Access Control Availability
![Page 4: Cryptography](https://reader035.vdocuments.us/reader035/viewer/2022081403/554a3a93b4c905293a8b4a3e/html5/thumbnails/4.jpg)
TYPES OF ATTACKS A General View
A Technical View
A Practical Side of Attacks
Programs that Attack
![Page 5: Cryptography](https://reader035.vdocuments.us/reader035/viewer/2022081403/554a3a93b4c905293a8b4a3e/html5/thumbnails/5.jpg)
ENCRYPTION
DECRYPTION
PLAIN TEXT
PLAIN TEXT
SENDER
CIPHERTEXT
RECEIVER
BASIC BLOCK DIAGRAM
![Page 6: Cryptography](https://reader035.vdocuments.us/reader035/viewer/2022081403/554a3a93b4c905293a8b4a3e/html5/thumbnails/6.jpg)
BASIC TERMINOLOGIES
Encryption Encryption is the process of encoding a message so
that its meaning is not obvious
Decryption Decryption is the reverse process, transforming an
encrypted message back into its normal, original form
Cryptosystem A system for encryption and decryption is called a
cryptosystem.
![Page 7: Cryptography](https://reader035.vdocuments.us/reader035/viewer/2022081403/554a3a93b4c905293a8b4a3e/html5/thumbnails/7.jpg)
BASIC TERMINOLOGIES Plaintext Cipher text Key –
key refers to a sequence of symbols or a numerical value used by an algorithm to alter information & making that information secure
Encryption algorithm The cryptosystem involves a set of rules for how to
encrypt the plaintext and how to decrypt the cipher text.
Cryptanalysis Cryptanalysis is an attempt to break the cipher text.
![Page 8: Cryptography](https://reader035.vdocuments.us/reader035/viewer/2022081403/554a3a93b4c905293a8b4a3e/html5/thumbnails/8.jpg)
TECHNIQUES OF CRYPTOGRAPHY Substitution Technique
Caesar CipherMonoalphabetic CipherHomophonic CipherPolyalphabetic Cipher
Transposition Technique
Rail Fence TechniqueVernam Cipher(One -time Pads)Simple Columnar Cipher
![Page 9: Cryptography](https://reader035.vdocuments.us/reader035/viewer/2022081403/554a3a93b4c905293a8b4a3e/html5/thumbnails/9.jpg)
ENCRYPTION ALGORITHM
SymmetricSame key for encryption and decryption
Key distribution problem
AsymmetricKey pairs for encryption and decryption
Public and private keys
![Page 10: Cryptography](https://reader035.vdocuments.us/reader035/viewer/2022081403/554a3a93b4c905293a8b4a3e/html5/thumbnails/10.jpg)
SYMMETRIC ALGORITHM
It is also called as Secret Key Cryptography Single key used for both encrypt & decrypt Key must be known to both the parties
Encryption Decryption
Key
Plaintext CiphertextOriginalPlaintext
Symmetric Cryptosystem
![Page 11: Cryptography](https://reader035.vdocuments.us/reader035/viewer/2022081403/554a3a93b4c905293a8b4a3e/html5/thumbnails/11.jpg)
ASYMMETRIC ALGORITHM
Private keys are used for decrypting. Public keys are used for encrypting
encryptionplaintext ciphertext
public key
decryptionciphertext plaintext
private key
![Page 12: Cryptography](https://reader035.vdocuments.us/reader035/viewer/2022081403/554a3a93b4c905293a8b4a3e/html5/thumbnails/12.jpg)
COMPARISON
Secret Key (Symmetric) Public Key (Asymmetric)
Number of Key 1 2
Protection of Key Must be kept secret One key must be kept secret & other can be freely exposed
Best Uses secrecy and integrity of data
Key exchange, authentication
Key Distribution Problematic Safer
Speed Fast Slow; typically, 10,000 times slower than secret key
![Page 13: Cryptography](https://reader035.vdocuments.us/reader035/viewer/2022081403/554a3a93b4c905293a8b4a3e/html5/thumbnails/13.jpg)
SYMMETRIC ALGORITHM
Data Encryption Standard (DES): 56 bits key
Advance Encryption Standard (AES): 128, 192 or 256 bits key
International Data Encryption Algorithm(IDEA):
128 bits key
![Page 14: Cryptography](https://reader035.vdocuments.us/reader035/viewer/2022081403/554a3a93b4c905293a8b4a3e/html5/thumbnails/14.jpg)
DATA ENCRYPTION STANDARD Developed by IBM and it is known as the Data Encryption
Standard It is also known as Data Encryption Algorithm The DES algorithm is a careful and complex combination of
two fundamental building blocks of encryption: Substitution and Transposition
DES uses only standard arithmetic and logical operations on numbers up to 64 bits long
![Page 15: Cryptography](https://reader035.vdocuments.us/reader035/viewer/2022081403/554a3a93b4c905293a8b4a3e/html5/thumbnails/15.jpg)
Plain text (64 bits)
Initial Permutation (IP)
LPT RPT
16 rounds 16 rounds
Final Permutation
Cipher text (64 bits)
BROAD LEVEL STEPS IN DES
keykey
![Page 16: Cryptography](https://reader035.vdocuments.us/reader035/viewer/2022081403/554a3a93b4c905293a8b4a3e/html5/thumbnails/16.jpg)
DATA ENCRYPTION STANDARD
1st 64 bit plain text is handed over to initial permutation function.
IP is performed over the plain text. IP produces two halves of the permuted
blocks left plain text (LPT) & right plain text (RPT).
Now LPT & RPT goes 16 rounds of encryption process, each with its own key.
Now LPT & RPT are rejoined and FINAL PERMUTATION (FP) is performed on the combined block.
The result is 64 bit cipher text.
![Page 17: Cryptography](https://reader035.vdocuments.us/reader035/viewer/2022081403/554a3a93b4c905293a8b4a3e/html5/thumbnails/17.jpg)
DETAILS OF ONE ROUND IN DES
Key Transformation
Expansion Permutation
S- box Substitution
P- box Permutation
XOR and Swap
![Page 18: Cryptography](https://reader035.vdocuments.us/reader035/viewer/2022081403/554a3a93b4c905293a8b4a3e/html5/thumbnails/18.jpg)
o DES is also an ANSI and ISO standard - anybody can learn the details and implement it.
o Since DES was designed to run on hardware, it is fast in hardware.
o Hard to crack.
DISADVANTAGES OF DES:
o Hardware implementations of DES are very fast; DES was not designed for software and hence runs relatively slowly.
ADVANTAGES OF DES:
![Page 19: Cryptography](https://reader035.vdocuments.us/reader035/viewer/2022081403/554a3a93b4c905293a8b4a3e/html5/thumbnails/19.jpg)
ASYMMETRIC ALGORITHM
Rivest Shamir Adleman (RSA) Encryption:
Based on factoring the product of large prime numbers.
Knapsack Algorithm:
If M1,M2…., Mn are given values & S is the sum, S=b1M1+b2M2….+bnMn where, bi can be 0 or 1
![Page 20: Cryptography](https://reader035.vdocuments.us/reader035/viewer/2022081403/554a3a93b4c905293a8b4a3e/html5/thumbnails/20.jpg)
RSA
It is named after its three inventors Rivest Shamir and Adleman
This algorithm was introduced in 1978 and to date remains secure.
RSA has been the subject of extensive cryptanalysis, and no serious flaws have yet been found.
The encryption algorithm is based on the underlying problem of factoring large numbers.
![Page 21: Cryptography](https://reader035.vdocuments.us/reader035/viewer/2022081403/554a3a93b4c905293a8b4a3e/html5/thumbnails/21.jpg)
RSA
p and q are two large prime numbers
n = p . q
m = (p-1)(q-1)
a is such that 1 < a < m and gcd (m , a) = 1.
b is such that ( a. b) mod m = 1
![Page 22: Cryptography](https://reader035.vdocuments.us/reader035/viewer/2022081403/554a3a93b4c905293a8b4a3e/html5/thumbnails/22.jpg)
RSA ENCRYPTION & DECRYPTION
Message M < n. Encryption key = (a , n). Decryption key = (b , n). Encrypt => E = Ma mod n. Decrypt => M = Eb mod n.
![Page 23: Cryptography](https://reader035.vdocuments.us/reader035/viewer/2022081403/554a3a93b4c905293a8b4a3e/html5/thumbnails/23.jpg)
Advantage
Individuals can post their public key on their Web site.
The number of the keys is only twice of the number of user.
Disadvantage
It is slower than symmetric algorithms.The cipher text may be larger than plain text.
![Page 24: Cryptography](https://reader035.vdocuments.us/reader035/viewer/2022081403/554a3a93b4c905293a8b4a3e/html5/thumbnails/24.jpg)
DIGITAL SIGNATURE
When an author signs a document, it cannot be changed.
When you send a document electronically, you can also sign it.
Digital signature can be done in two ways:
You can sign the whole document
You can sign a digest of the document
![Page 25: Cryptography](https://reader035.vdocuments.us/reader035/viewer/2022081403/554a3a93b4c905293a8b4a3e/html5/thumbnails/25.jpg)
Signing the whole document
You can not provide these aspects of security using the secret key.
The method provides authentication & non-repudiation.
![Page 26: Cryptography](https://reader035.vdocuments.us/reader035/viewer/2022081403/554a3a93b4c905293a8b4a3e/html5/thumbnails/26.jpg)
Signing the digest
The two most common hash functions are:Message digest 5 (MD5)Secure hash algorithm (SHA-1)
The properties of hash functionOne-way: the digest can only be created from
the message, but not vice versaOne-to-one: be very difficult to find two
messages that create the same digest.
![Page 27: Cryptography](https://reader035.vdocuments.us/reader035/viewer/2022081403/554a3a93b4c905293a8b4a3e/html5/thumbnails/27.jpg)
Sender site
![Page 28: Cryptography](https://reader035.vdocuments.us/reader035/viewer/2022081403/554a3a93b4c905293a8b4a3e/html5/thumbnails/28.jpg)
Receiver site
![Page 29: Cryptography](https://reader035.vdocuments.us/reader035/viewer/2022081403/554a3a93b4c905293a8b4a3e/html5/thumbnails/29.jpg)
APPLICATIONS OF ENCRYPTION Cryptographic Hash Function
Digital Signature
Certificate
Secure electronic transactions
Office equipment
![Page 30: Cryptography](https://reader035.vdocuments.us/reader035/viewer/2022081403/554a3a93b4c905293a8b4a3e/html5/thumbnails/30.jpg)
CONCLUSION RSA finds its strongest application when
parties who have no prior relationship want to share sensitive data with each other.
Thus , even though slower as compared to symmetric algorithms it is & will be widely used as it can be used in digital signature for long haul transmission.
![Page 31: Cryptography](https://reader035.vdocuments.us/reader035/viewer/2022081403/554a3a93b4c905293a8b4a3e/html5/thumbnails/31.jpg)
THANK YOU