cryptography

Post on 21-Jul-2015

34 Views

Category:

Engineering

1 Downloads

Preview:

Click to see full reader

TRANSCRIPT

CRYPTOGRAPHY

INTRODUCTION

Cryptography (from Greek kryptós, "hidden", + gráphein, "to write").

Cryptography is the practice and study of techniques for secure communication in the presence of third parties (called adversaries).

It is about constructing and analysing protocols that

overcome the influence of adversaries.

Cipher: the algorithm that does the encryption.

Ciphertext: the encrypted (scrambled) version of the message. Message altered to be unreadable by anyone except the

intended recipients.

Cryptanalysis: the science of breaking cryptographic algorithms.

Cryptanalyst: a person who breaks cryptographic codes; also referred to as “the attacker”.

Cryptosystem – The combination of algorithm, key, and key management functions used to perform cryptographic operations.

Decryption: the process of converting ciphertext back to the original plaintext.

Encryption: scrambling a message or data using a specialized cryptographic algorithm.

Initialization Vector – Random values used with ciphers to ensure no patterns are created during encryption.

Key – Sequence that controls the operation and behavior of

the cryptographic algorithm.

Keyspace – Total number of possible values of keys in a crypto

algorithm.

Plaintext – A message in its natural format readable by an attacker.

Authentication

ensures that whoever supplies or accesses sensitive data is an

authorized party.

Confidentiality

assures that only authorized parties are able to understand

the data.

Integrity

ensures that when a message is sent over a network, the

message that arrives is the same as the message that was

originally sent.

Nonrepudiation

ensuring that the intended recipient actually received the

message & ensuring that the sender actually sent the

message.

THERATES

There are several size of encryption keys:

64 bit encryption

128 bit encryption

256 bit encryption

512 bit encryption

1024 bit encryption

Number indicates the size of the key used to encrypt the message.

Symmetric

o Even if an attacker captures the data, the attacker will not be

able to manipulate it in any meaningful way.

o Symmetric algorithms use a single key shared by two

communicating parties.

o The same key is used for both encryption and decryption.

Asymmetric

o Mathematically related key pairs for encryption and

decryption.

o Public and private keys.

Hybrid

o Combines strengths of both methods.

o Asymmetric distributes symmetric key.

10

Asymmetric Cryptography

Symmetric Cryptography

SUBSTITUTION CIPHER

A Substitution technique is one in which the letters/numbers/symbols

of plaintext are replaced by other letters/numbers/symbols.

Ex. A D , T z

2 5, 3 6

TRANSPOSITION CIPHER

In this transposition technique the position of letters/numbers/symbols is changed with one another.

Plain Text : MEET ME AFTER PARTY

Cipher Text : TEMEEMEFAPTRYRPT

Key Used:421635

1 2 3 4 5 6

M E E T M E

A F T E T P

A R T Y

4 2 1 6 3 5

T E M E E M

E F A P T R

Y R P T

COMPARISON

SYMMETRIC CRYPTOGRAPHY

The same algorithm with the same

key is used for encryption and

decryption.

The Key must be kept secret.

It may be possible or at least

impractical to decipher a

message if no other information is

available.

ASYMMETRIC

CRYPTOGRAPHY

One algorithm is used for

encryption and decryption with a

pair of keys , one for encryption

and one for decryption.

One of the two keys must be kept

secret.

It may be possible or at least

impractical to decipher a

message if no other information is

available.

Types of Symmetric Cryptography:

Stream-based Ciphers

Mixes plaintext with key stream.

Good for real-time services.

Block Ciphers

Substitution and transposition.

E.g.: DES, AES.

Public Key Cryptography

In public-key cryptosystems, the public key may be

freely distributed, while its paired private key must

remain secret and is used for decryption.

Public-key cryptography can be used for

implementing digital signature schemes.

Quantum cryptography describes the use of quantum

mechanical effects (in particular quantum

communication and quantum computation) to

perform cryptographic tasks or to break cryptographic

systems.

The advantage of quantum cryptography is that it allows

the completion of various cryptographic tasks that are

proven or conjectured to be impossible using only

classical communication.

For example, quantum mechanics guarantees that

measuring quantum data disturbs that data. This can be

used to detect eavesdropping in quantum key

distribution.

Digital signatures can be permanently tied to the content of the

message being signed. They cannot then be 'moved' from one

document to another, for any attempt will be detectable.

RSA and DSA are two of the most popular digital signature

schemes.

In digital signature schemes, there are two

algorithms: one for signing, in which a secret key is

used to process the message and one for

verification, in which the matching public key is

used with the message to check the validity of the

signature.

APPLICATION

Defense services

Secure data manipulation

E-commerce

Business Transaction

Internet payment system

User identification system

Access control

Data security

top related