SlideShare a Scribd company logo
1 of 14
ElGamal Encryption Algorithm
By →
Name :- Arvind Bishnoi
Roll no :- 19107
Branch :- CSE ( VIIth SEM )
Introduction of ElGamal Encryption Algo.
1. ElGamal encryption is a public-key cryptosystem
1. ElGamal Algo. uses asymmetric key encryption for
communicating between two parties and encrypting the
message.
1. This cryptosystem is based on the difficulty of finding
discrete logarithm in a cyclic group
1. It is based on the Diffie–Hellman key exchange And
It was described by Taher Elgamal in 1985.
Components of ElGamal Encryption Algo.
ElGamal encryption consists of three components
1. Key Generation
2. Encryption
3. Decryption
Step 1 : Key Generation
Receiver Generates public and private keys.
● Select Large Prime No. (P)
● Select Decryption key/ private Key (D)
gcd(D,P)=1
● Select Second part of Encryption key or public
key (E1) & gcd(E1,P)=1
● Third part of the encryption key or public key
(E2)
E2 = E1D mod P
● Public Key=(E1, E2, P) & Private key=D
Suppose :
1. P=11 , D=3, E1=2
2. Then E2= 23 mod 11=8
3. Public key=( 2, 8, 11) & Private key= 3.
Step 2 : Encryption
Sender Encrypts Data (PT) Using Receiver’s
Public Key
● Select Random Integer ( R )
● C1= E1R mod P
● C2 =(PT X E2R) mod P
● C. T. =(C1,C2)
Continuous :-
1. R=4, C1=24 mod 11=5, PT=7
2. C2=( 7 x 84) mod 11=6
3. C.T. = (5,6)
Step 3 : Decryption
Receiver End Decrypts the Message
● PT=[C2 X (C1D)-1] mod P
Continuous :-
● PT= (6 x ( 53 ) -1 ) mod 11
= 18 mod 11 = 7
Example of ElGamal Algo
Case Study :- Maersk Not petya Ransomware attack
Introduction
● In 2017 Maersk was impacted by Not-Petya ransomware attack
and their network was down for a whole 9 days.
● A total of 49,000 PCs and 7,000 servers were encrypted by Not-
petya. Other companies that were impacted by the same attack
are Merck, TNT express etc.
● The tools used in Notpetya were EternalBlue and Mimikatz and
hence the attack was very fast and devastating for victims.
● It was The Most Devastating Cyber attack in History that’s
How a single piece of code crashed the world.
How did it happened ?
● A.P. Miller-Maersk, a Danish shipping company, was hit by
NotPetya on June 27, 2017, in an attack carried out by
Kremlin-backed hackers.
● As part of a well-planned operation, attackers took control of
the software update mechanism of M.E.Doc, the de facto
standard accounting package for firms doing business in
Ukraine.
● The damage was mostly done within an hour, and Maersk's
network was destroyed completely within seven minutes.
● But, it took nine days to fully restore the Active Directory
system.
Not-Petya Ransomware And It’s components
● The most damaging vulnerability created for Russia's cyberwar against Ukraine to far, Not-
Petya, destroyed roughly 50,000 business PCs and turned its whole VoIP phone network
inaccessible.
● Not-Petya was propelled by two powerful penetration tools.
● First penetration tool known as EternalBlue:- It is takes advantage of a vulnerability in a
particular Windows protocol, allowing hackers free rein to remotely run their own code on any
unpatched machine.
● Second penetration tool known as Mimikatz :- In 2011 French security researcher Benjamin
Delpy developed it as a proof of concept. Delpy originally released Mimikatz to demonstrate
how Windows stored users' passwords in computer memory. Mimikatz could pull passwords
from RAM after hackers gained initial access to a computer and use them to hack into other
machines accessible with the same credentials. It could even allow an automated attack to
hopscotch from one machine to the next on networks with multi user computers.
Recovery of Systems
● An incident response team was assembled, and an
emergency recovery center was put together in Great
Britain to mitigate and recover from the NotPetya attack.
● The company quickly produced 2,000 laptops, while
WhatsApp groups became an essential communication
lifeline for them.
● All computer equipment was surrendered and new
computers were purchased and distributed to recovery
workers. Staff started from scratch rebuilding servers. This
effort, however, came to a halt when it was discovered that
there was no clean backup of the company's domain
controllers.
The Cost of NotPetya
● In 2017, the malware NotPetya spread from the servers of a small Ukrainian software
company to some of the world's largest corporations, paralysing their operations.
● Here is a list of the estimated damages reported by some of the worm's most prominent
victims.
Company Cost
Pharmaceutical company Merck $870,000,000
Delivery company FedEx (through European subsidiary TNT Express) $400,000,000
French construction company Saint-Gobain $384,000,000
Danish shipping company Maersk $300,000,000
Snack company Mondelēz (parent company of Nabisco and Cadbury) $188,000,000
British manufacturer Reckitt Benckiser $129,000,000
Total damages from Not-Petya, as estimated by the White House $10B
Thank You

More Related Content

What's hot

Cryptography
CryptographyCryptography
CryptographyEmaSushan
 
Presentation about RSA
Presentation about RSAPresentation about RSA
Presentation about RSASrilal Buddika
 
Idea(international data encryption algorithm)
Idea(international data encryption algorithm)Idea(international data encryption algorithm)
Idea(international data encryption algorithm)SAurabh PRajapati
 
RSA Algorithm - Public Key Cryptography
RSA Algorithm - Public Key CryptographyRSA Algorithm - Public Key Cryptography
RSA Algorithm - Public Key CryptographyMd. Shafiul Alam Sagor
 
El Gamal Cryptosystem
El Gamal CryptosystemEl Gamal Cryptosystem
El Gamal CryptosystemAdri Jovin
 
2. public key cryptography and RSA
2. public key cryptography and RSA2. public key cryptography and RSA
2. public key cryptography and RSADr.Florence Dayana
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithmsRashmi Burugupalli
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographyMd. Afif Al Mamun
 
Rsa algorithm key generation
Rsa algorithm key generation Rsa algorithm key generation
Rsa algorithm key generation swarnapatil
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniquesDr.Florence Dayana
 
Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)Soham Kansodaria
 
Message authentication
Message authenticationMessage authentication
Message authenticationCAS
 
Key Management and Distribution
Key Management and DistributionKey Management and Distribution
Key Management and DistributionSyed Bahadur Shah
 

What's hot (20)

Diffie-hellman algorithm
Diffie-hellman algorithmDiffie-hellman algorithm
Diffie-hellman algorithm
 
Cryptography
CryptographyCryptography
Cryptography
 
Diffiehellman
DiffiehellmanDiffiehellman
Diffiehellman
 
Hash Function
Hash FunctionHash Function
Hash Function
 
Presentation about RSA
Presentation about RSAPresentation about RSA
Presentation about RSA
 
Idea(international data encryption algorithm)
Idea(international data encryption algorithm)Idea(international data encryption algorithm)
Idea(international data encryption algorithm)
 
RSA Algorithm - Public Key Cryptography
RSA Algorithm - Public Key CryptographyRSA Algorithm - Public Key Cryptography
RSA Algorithm - Public Key Cryptography
 
El Gamal Cryptosystem
El Gamal CryptosystemEl Gamal Cryptosystem
El Gamal Cryptosystem
 
2. public key cryptography and RSA
2. public key cryptography and RSA2. public key cryptography and RSA
2. public key cryptography and RSA
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
 
Applied Cryptography
Applied CryptographyApplied Cryptography
Applied Cryptography
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Rsa algorithm key generation
Rsa algorithm key generation Rsa algorithm key generation
Rsa algorithm key generation
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
Electronic mail security
Electronic mail securityElectronic mail security
Electronic mail security
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
Message authentication
Message authenticationMessage authentication
Message authentication
 
Key Management and Distribution
Key Management and DistributionKey Management and Distribution
Key Management and Distribution
 

Similar to ElGamal Encryption Algoritham.pptx

IRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic EncryptionIRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic EncryptionIRJET Journal
 
Ransomware History and Monitoring Tips
Ransomware History and Monitoring TipsRansomware History and Monitoring Tips
Ransomware History and Monitoring TipsNetFort
 
Rooted2020 stefano maccaglia--_the_enemy_of_my_enemy
Rooted2020 stefano maccaglia--_the_enemy_of_my_enemyRooted2020 stefano maccaglia--_the_enemy_of_my_enemy
Rooted2020 stefano maccaglia--_the_enemy_of_my_enemyRootedCON
 
Dragonfly: Western energy sector targeted by sophisticated attack group
Dragonfly: Western energy sector targeted by sophisticated attack groupDragonfly: Western energy sector targeted by sophisticated attack group
Dragonfly: Western energy sector targeted by sophisticated attack groupSymantec Security Response
 
Security Issues related with cloud computing
Security Issues related with cloud computingSecurity Issues related with cloud computing
Security Issues related with cloud computingIJERA Editor
 
Cloud computing term paper
Cloud computing term paperCloud computing term paper
Cloud computing term paperHemanth
 
Jackpot! sbancare un atm con ploutus.d
Jackpot! sbancare un atm con ploutus.dJackpot! sbancare un atm con ploutus.d
Jackpot! sbancare un atm con ploutus.dAntonio Parata
 
Encrytpion information security last stand
Encrytpion information security last standEncrytpion information security last stand
Encrytpion information security last standGeorge Delikouras
 
The EternalBlue Exploit: how it works and affects systems
The EternalBlue Exploit: how it works and affects systemsThe EternalBlue Exploit: how it works and affects systems
The EternalBlue Exploit: how it works and affects systemsAndrea Bissoli
 
Internet of Things (IoT) Security using stream cipher.ppt
Internet of Things (IoT)  Security using stream cipher.pptInternet of Things (IoT)  Security using stream cipher.ppt
Internet of Things (IoT) Security using stream cipher.pptAliSalman110
 
Implementation of AES Algorithm in MicroController Using PIC18F452
Implementation of AES Algorithm in MicroController Using PIC18F452Implementation of AES Algorithm in MicroController Using PIC18F452
Implementation of AES Algorithm in MicroController Using PIC18F452IOSR Journals
 
Network Security
Network SecurityNetwork Security
Network SecurityMAJU
 
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...IRJET Journal
 

Similar to ElGamal Encryption Algoritham.pptx (20)

CPS - Week 1.pptx
CPS - Week 1.pptxCPS - Week 1.pptx
CPS - Week 1.pptx
 
Ransomware ly
Ransomware lyRansomware ly
Ransomware ly
 
IRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic EncryptionIRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
 
Ransomware History and Monitoring Tips
Ransomware History and Monitoring TipsRansomware History and Monitoring Tips
Ransomware History and Monitoring Tips
 
Rooted2020 stefano maccaglia--_the_enemy_of_my_enemy
Rooted2020 stefano maccaglia--_the_enemy_of_my_enemyRooted2020 stefano maccaglia--_the_enemy_of_my_enemy
Rooted2020 stefano maccaglia--_the_enemy_of_my_enemy
 
Dragonfly: Western energy sector targeted by sophisticated attack group
Dragonfly: Western energy sector targeted by sophisticated attack groupDragonfly: Western energy sector targeted by sophisticated attack group
Dragonfly: Western energy sector targeted by sophisticated attack group
 
Security Issues related with cloud computing
Security Issues related with cloud computingSecurity Issues related with cloud computing
Security Issues related with cloud computing
 
NotPetya Report
NotPetya ReportNotPetya Report
NotPetya Report
 
Full report final for NotPetya
Full report final for NotPetyaFull report final for NotPetya
Full report final for NotPetya
 
Cloud computing term paper
Cloud computing term paperCloud computing term paper
Cloud computing term paper
 
Jackpot! sbancare un atm con ploutus.d
Jackpot! sbancare un atm con ploutus.dJackpot! sbancare un atm con ploutus.d
Jackpot! sbancare un atm con ploutus.d
 
Encrytpion information security last stand
Encrytpion information security last standEncrytpion information security last stand
Encrytpion information security last stand
 
Eng12
Eng12Eng12
Eng12
 
The EternalBlue Exploit: how it works and affects systems
The EternalBlue Exploit: how it works and affects systemsThe EternalBlue Exploit: how it works and affects systems
The EternalBlue Exploit: how it works and affects systems
 
Internet of Things (IoT) Security using stream cipher.ppt
Internet of Things (IoT)  Security using stream cipher.pptInternet of Things (IoT)  Security using stream cipher.ppt
Internet of Things (IoT) Security using stream cipher.ppt
 
Implementation of AES Algorithm in MicroController Using PIC18F452
Implementation of AES Algorithm in MicroController Using PIC18F452Implementation of AES Algorithm in MicroController Using PIC18F452
Implementation of AES Algorithm in MicroController Using PIC18F452
 
OS-Anatomy-Article
OS-Anatomy-ArticleOS-Anatomy-Article
OS-Anatomy-Article
 
Network Security
Network SecurityNetwork Security
Network Security
 
Regin
ReginRegin
Regin
 
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
 

Recently uploaded

Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...Call Girls in Nagpur High Profile
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 

Recently uploaded (20)

Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 

ElGamal Encryption Algoritham.pptx

  • 1. ElGamal Encryption Algorithm By → Name :- Arvind Bishnoi Roll no :- 19107 Branch :- CSE ( VIIth SEM )
  • 2. Introduction of ElGamal Encryption Algo. 1. ElGamal encryption is a public-key cryptosystem 1. ElGamal Algo. uses asymmetric key encryption for communicating between two parties and encrypting the message. 1. This cryptosystem is based on the difficulty of finding discrete logarithm in a cyclic group 1. It is based on the Diffie–Hellman key exchange And It was described by Taher Elgamal in 1985.
  • 3. Components of ElGamal Encryption Algo. ElGamal encryption consists of three components 1. Key Generation 2. Encryption 3. Decryption
  • 4. Step 1 : Key Generation Receiver Generates public and private keys. ● Select Large Prime No. (P) ● Select Decryption key/ private Key (D) gcd(D,P)=1 ● Select Second part of Encryption key or public key (E1) & gcd(E1,P)=1 ● Third part of the encryption key or public key (E2) E2 = E1D mod P ● Public Key=(E1, E2, P) & Private key=D Suppose : 1. P=11 , D=3, E1=2 2. Then E2= 23 mod 11=8 3. Public key=( 2, 8, 11) & Private key= 3.
  • 5. Step 2 : Encryption Sender Encrypts Data (PT) Using Receiver’s Public Key ● Select Random Integer ( R ) ● C1= E1R mod P ● C2 =(PT X E2R) mod P ● C. T. =(C1,C2) Continuous :- 1. R=4, C1=24 mod 11=5, PT=7 2. C2=( 7 x 84) mod 11=6 3. C.T. = (5,6)
  • 6. Step 3 : Decryption Receiver End Decrypts the Message ● PT=[C2 X (C1D)-1] mod P Continuous :- ● PT= (6 x ( 53 ) -1 ) mod 11 = 18 mod 11 = 7
  • 8. Case Study :- Maersk Not petya Ransomware attack
  • 9. Introduction ● In 2017 Maersk was impacted by Not-Petya ransomware attack and their network was down for a whole 9 days. ● A total of 49,000 PCs and 7,000 servers were encrypted by Not- petya. Other companies that were impacted by the same attack are Merck, TNT express etc. ● The tools used in Notpetya were EternalBlue and Mimikatz and hence the attack was very fast and devastating for victims. ● It was The Most Devastating Cyber attack in History that’s How a single piece of code crashed the world.
  • 10. How did it happened ? ● A.P. Miller-Maersk, a Danish shipping company, was hit by NotPetya on June 27, 2017, in an attack carried out by Kremlin-backed hackers. ● As part of a well-planned operation, attackers took control of the software update mechanism of M.E.Doc, the de facto standard accounting package for firms doing business in Ukraine. ● The damage was mostly done within an hour, and Maersk's network was destroyed completely within seven minutes. ● But, it took nine days to fully restore the Active Directory system.
  • 11. Not-Petya Ransomware And It’s components ● The most damaging vulnerability created for Russia's cyberwar against Ukraine to far, Not- Petya, destroyed roughly 50,000 business PCs and turned its whole VoIP phone network inaccessible. ● Not-Petya was propelled by two powerful penetration tools. ● First penetration tool known as EternalBlue:- It is takes advantage of a vulnerability in a particular Windows protocol, allowing hackers free rein to remotely run their own code on any unpatched machine. ● Second penetration tool known as Mimikatz :- In 2011 French security researcher Benjamin Delpy developed it as a proof of concept. Delpy originally released Mimikatz to demonstrate how Windows stored users' passwords in computer memory. Mimikatz could pull passwords from RAM after hackers gained initial access to a computer and use them to hack into other machines accessible with the same credentials. It could even allow an automated attack to hopscotch from one machine to the next on networks with multi user computers.
  • 12. Recovery of Systems ● An incident response team was assembled, and an emergency recovery center was put together in Great Britain to mitigate and recover from the NotPetya attack. ● The company quickly produced 2,000 laptops, while WhatsApp groups became an essential communication lifeline for them. ● All computer equipment was surrendered and new computers were purchased and distributed to recovery workers. Staff started from scratch rebuilding servers. This effort, however, came to a halt when it was discovered that there was no clean backup of the company's domain controllers.
  • 13. The Cost of NotPetya ● In 2017, the malware NotPetya spread from the servers of a small Ukrainian software company to some of the world's largest corporations, paralysing their operations. ● Here is a list of the estimated damages reported by some of the worm's most prominent victims. Company Cost Pharmaceutical company Merck $870,000,000 Delivery company FedEx (through European subsidiary TNT Express) $400,000,000 French construction company Saint-Gobain $384,000,000 Danish shipping company Maersk $300,000,000 Snack company Mondelēz (parent company of Nabisco and Cadbury) $188,000,000 British manufacturer Reckitt Benckiser $129,000,000 Total damages from Not-Petya, as estimated by the White House $10B