cryptography

22
CRYPTOGRAPHY

Upload: prasham95

Post on 21-Jul-2015

33 views

Category:

Engineering


1 download

TRANSCRIPT

Page 1: Cryptography

CRYPTOGRAPHY

Page 2: Cryptography

INTRODUCTION

Cryptography (from Greek kryptós, "hidden", + gráphein, "to write").

Cryptography is the practice and study of techniques for secure communication in the presence of third parties (called adversaries).

It is about constructing and analysing protocols that

overcome the influence of adversaries.

Page 3: Cryptography

Cipher: the algorithm that does the encryption.

Ciphertext: the encrypted (scrambled) version of the message. Message altered to be unreadable by anyone except the

intended recipients.

Cryptanalysis: the science of breaking cryptographic algorithms.

Cryptanalyst: a person who breaks cryptographic codes; also referred to as “the attacker”.

Page 4: Cryptography

Cryptosystem – The combination of algorithm, key, and key management functions used to perform cryptographic operations.

Decryption: the process of converting ciphertext back to the original plaintext.

Encryption: scrambling a message or data using a specialized cryptographic algorithm.

Initialization Vector – Random values used with ciphers to ensure no patterns are created during encryption.

Page 5: Cryptography

Key – Sequence that controls the operation and behavior of

the cryptographic algorithm.

Keyspace – Total number of possible values of keys in a crypto

algorithm.

Plaintext – A message in its natural format readable by an attacker.

Page 6: Cryptography

Authentication

ensures that whoever supplies or accesses sensitive data is an

authorized party.

Confidentiality

assures that only authorized parties are able to understand

the data.

Page 7: Cryptography

Integrity

ensures that when a message is sent over a network, the

message that arrives is the same as the message that was

originally sent.

Nonrepudiation

ensuring that the intended recipient actually received the

message & ensuring that the sender actually sent the

message.

Page 8: Cryptography

THERATES

Page 9: Cryptography

There are several size of encryption keys:

64 bit encryption

128 bit encryption

256 bit encryption

512 bit encryption

1024 bit encryption

Number indicates the size of the key used to encrypt the message.

Page 10: Cryptography

Symmetric

o Even if an attacker captures the data, the attacker will not be

able to manipulate it in any meaningful way.

o Symmetric algorithms use a single key shared by two

communicating parties.

o The same key is used for both encryption and decryption.

Asymmetric

o Mathematically related key pairs for encryption and

decryption.

o Public and private keys.

Hybrid

o Combines strengths of both methods.

o Asymmetric distributes symmetric key.

10

Page 11: Cryptography

Asymmetric Cryptography

Symmetric Cryptography

Page 12: Cryptography

SUBSTITUTION CIPHER

A Substitution technique is one in which the letters/numbers/symbols

of plaintext are replaced by other letters/numbers/symbols.

Ex. A D , T z

2 5, 3 6

Page 13: Cryptography

TRANSPOSITION CIPHER

In this transposition technique the position of letters/numbers/symbols is changed with one another.

Plain Text : MEET ME AFTER PARTY

Cipher Text : TEMEEMEFAPTRYRPT

Key Used:421635

1 2 3 4 5 6

M E E T M E

A F T E T P

A R T Y

4 2 1 6 3 5

T E M E E M

E F A P T R

Y R P T

Page 14: Cryptography

COMPARISON

SYMMETRIC CRYPTOGRAPHY

The same algorithm with the same

key is used for encryption and

decryption.

The Key must be kept secret.

It may be possible or at least

impractical to decipher a

message if no other information is

available.

ASYMMETRIC

CRYPTOGRAPHY

One algorithm is used for

encryption and decryption with a

pair of keys , one for encryption

and one for decryption.

One of the two keys must be kept

secret.

It may be possible or at least

impractical to decipher a

message if no other information is

available.

Page 15: Cryptography

Types of Symmetric Cryptography:

Stream-based Ciphers

Mixes plaintext with key stream.

Good for real-time services.

Block Ciphers

Substitution and transposition.

E.g.: DES, AES.

Page 16: Cryptography

Public Key Cryptography

In public-key cryptosystems, the public key may be

freely distributed, while its paired private key must

remain secret and is used for decryption.

Public-key cryptography can be used for

implementing digital signature schemes.

Page 17: Cryptography

Quantum cryptography describes the use of quantum

mechanical effects (in particular quantum

communication and quantum computation) to

perform cryptographic tasks or to break cryptographic

systems.

Page 18: Cryptography

The advantage of quantum cryptography is that it allows

the completion of various cryptographic tasks that are

proven or conjectured to be impossible using only

classical communication.

For example, quantum mechanics guarantees that

measuring quantum data disturbs that data. This can be

used to detect eavesdropping in quantum key

distribution.

Page 19: Cryptography

Digital signatures can be permanently tied to the content of the

message being signed. They cannot then be 'moved' from one

document to another, for any attempt will be detectable.

RSA and DSA are two of the most popular digital signature

schemes.

Page 20: Cryptography

In digital signature schemes, there are two

algorithms: one for signing, in which a secret key is

used to process the message and one for

verification, in which the matching public key is

used with the message to check the validity of the

signature.

Page 21: Cryptography

APPLICATION

Defense services

Secure data manipulation

E-commerce

Business Transaction

Internet payment system

User identification system

Access control

Data security

Page 22: Cryptography