SlideShare a Scribd company logo
1 of 21
CRYPTOGRAPHY
- CEASER CIPHER
- BY JULIUS CEASER
{100 B.C TO 44 B.C}
FUBSWRJUDSKB
(Convertion of the word Crypyography with ceaser cipher)
1
WHAT AND WHY ?
WHAT ?
CRYPT + GRAPHY = HIDDEN + WRITING.
{ i.e } ENCRYPTING & DECRYPTING THE MESSAGES.
WHY ?
AVOID INFORMATION BEING TRAPPED , INTERCEPTED , DIVERTED ,
MODIFIED & FABRICATIED BY INTRUDER.
2
CRYPTOGRAPHY PROCESS
SENDER RECEIVER
PLAIN TEXTPLAIN TEXT
ENCRYPT DECRYPT
CIPHER TEXT
3
CIPHER TEXT / CEASER CIPHER
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
D E F G H I J K L M N O P Q R S T U V W X Y Z A B C
Ci = E ( Pi ) = Pi + K
K is considered as 3 here
4
DISADVANTAGES OF CIPHER TEXT
The one who knows the value of K will be
easily able to identify the hidden value
inside the cipher text.
It is even more easy to know the K value
when 2 or more people share the same
system.
5
ENCRYPTION PRINCIPLES , TYPES AND PROCESS
PROCESS
TYPES
SYMMETRIC,
SHARED-KEY OR
CONVENTIONAL
ENCRYPTION
ASYMMETRIC,
TWO-KEY OR
PUBLIC KEY
ENCRYPTION
TRANSPOSITIO
N
PRINCIPLE
S
SUBSTITUTIO
N
STREAM
CIPHER
BLOCK CIPHER
6
CRYPT - ANALYSIS
SCIENCE OF RECOVERING PLAIN-TEXT OF THE MESSAGE WITHOUT HAVING ACCESS TO THE KEY
ATTEMPTING TO DISCOVER PLAIN TEXT OR KEY OR BOTH
IT IS A ART OF BREAKING CIPHERS
CRYPT – ANALYSIS HAVE COMPLETE KNOWLEDGE OF ALGORITHM AND ITS IMPLEMENTATION
ALL SECURITY SHOULD RESIDE IN THE KEY AND NOT IN THE SECRECY OF ALGORITHM
7
TYPES OF CRYPTO – ANALYSIS ATTACKS
CIPHER TEXT ONLY ATTACK
KNOWN PLAIN TEXT ATTACK
CHOSEN PLAIN TEXT ATTACK
CHOSEN CIPHER TEXT ATTACK
CHOSEN KEY ATTACK
8
FORMULA :
Ci = EK (Pi )
&
Pi = DK ( Ci )
CHIPER TEXT ONLY ATTACK
IT IS ALSO KNOWN AS KNOWN CIPHER TEXT
ATTACKER CAN HAVE ACCESS TO ONLY A SET OF CIPHER TEXT , KNOWLEDGE ON
WITH PLAIN TEXT & CAN BE GUESSED EASILY
THEY CANNOT HAVE ACCESS TO ANY CHANNEL PROVIDING ACCESS PRIOR TO
ENCRYPTION
IT IS ALMOST SUCCESSFUL
SYNTAX :
C1 = EK ( P1 ), C2 = EK ( P2 ), …… Ci = EK ( Pi ).
9
KNOWN PLAIN TEXT ATTACK
THE ATTACKER HAS ACCESS TO BOTH PLAIN TEXT AND CIPHER TEXT.
CIPHER TEXT & PLAIN TEXT OF THE CORRESPONSDING MESSAGES ARE
PAIRED UP TOGETHER WITH SECRET KEY.
THEY ARE COMPARED TO REVEAL FURTHER SECRET INFORMATION SUCH AS
SECRET KEY AND CODE.
SYNTAX :
P1 , C1 = EK ( P1 ) , P2 , C2 = EK ( P2 ) , ……. P1 , Ci = EK ( Pi ).
10
CHOSEN PLAIN TEXT ATTACK
THE ATTACKER CAN ENCRYPT PLAIN TEXT MESSAGES
COMPARE CIPHER TEXT WITH THE RESULT OF ANOTHER ENCRYPTION TO
POSSIBLY DISCOVER THE KEY BY MATCHING THE TWO
IT IS FEASIBLE.
SYNTAX :
P1 , C1 = EK ( P1 ) , P2 , C2 = EK ( P2 ) , ………. Pi , Ci = EK ( Pi ).
11
CHOSEN CIPHER TEXT ATTACK
CAN CHOOSE DIFFERENT CIPHER TEXTS TO BE DECRYPTED WHICH
IS DONE IN VICTIM’S SYSTEM.
ACCESS TO DECRYPTED PLAIN TEXT
SYNTAX :
C1 , P1 = DK ( C1 ) , C2 , P2 = DK ( C2 ) , ….. Ci , Pi = DK ( Ci ).
12
CHOSEN TEXT ATTACK
THE ATTACKER CAN ENCRYPT PLAIN TEXT MESSAGES
COMPARE CIPHER TEXT WITH THE RESULT OF ANOTHER
ENCRYPTION AND ALSO COMPARED WITH DECRYPTED PLAIN
TEXT TO POSSIBLY DISCOVER THE KEY BY MATCHING THE TWO.
13
CONVENTIONAL ENCRYPTION MODEL
PLAIN
TEXT
INPUT
ENCRYPTION
ALGORITHM
DECRYPTION
ALGORITHM
PLAIN
TEXT
OUPUT
TRANSMITTE
D
CIPHER
TEXT
SHARED KEY
BY
SENDER & RECEIVER
SHARED KEY
BY
SENDER & RECEIVER
14
STEPSANDPROBLEMINTHIS
MODEL
STEPS :
• CONVERT P -> C BY K
C = EK ( P )
• CONVERT C -> P BY USING SAME
K
P = DK ( C )
=> IMPLIES : P = DK ( EK ( P ) )
SECRECY OF ENCRPTION
DEPENDENTS ON SECRECY OF KEY &
NOT ON SECRECY OF ALGORITHM.
PROBLEMS :
 LARGE NUMBER OF PEOPLE
CANNOT USE IT
 THERE IS NO SCOPE FOR QUALITY
CONTROL OR
STANDARDIZATION.
 NO GUARANTEE FOR EFFECTIVE 15
PUBLIC KEY CRYPTO-SYSTEMS
PLAIN
TEXT
INPUT
ENCRYPTION
ALGORITHM
DECRYPTION
ALGORITHM
PLAIN
TEXT
OUPUT
TRANSMITTE
D
CIPHER
TEXT
ENCRPTION KEY USED BY
SENDER
DECRYPTION KEY USED
BY RECEIVER
16
STEPS AND PROBLEM IN THIS MODEL
STEPS :
• CONVERT P -> C BY K1
C = EK1 ( P )
• CONVERT C -> P BY USING K2
P = DK2 ( C )
=> IMPLIES : P = DK2 ( EK1 ( P ) )
PROBLEMS :
 THEY ARE SLOWER.
 IT IS NOT SURE THAT THE DECRYPTED
IS ACTUAL TEXT FORWARDED BY THE
SENDER
17
APPLICATIONS OF CRYPTOGRAPHY
SECURE COMMUNICATIONS :
WEB ENCRYPTION
HTTP TO HTTPS
END–TO-ENCRYPTION :
EMAIL
STORING DATA :
HASH PROGRAMS
18
CRYPTOGRAPHY TECHNOLOGY
• DIGITAL SIGNATURE :
ASSURE THAT :
SIGNATORY HAS SIGNED THE INFORMATION &
INFORMATION IS NOT MODIFIED
STANDARDS USED :
FEDERAL INFORMATION PROCESSING STANDARD
DIGITAL SIGNATURE STANDARDS
USED ALGORITHMS TO GENERATE AND VERIFY :
DSA
RSA
ECDSA
WITH RESPECT TO APPROVED HASH FUNCTIONS SPECIFIED IN FIPS 180-4 , SECURE HASH FUNCTIONS OR FIPS 202
,
SHA-3 STANDARD : PERMUTATION- BASED HASH AND EXTENDABLE – OUTPUT FUNCTIONS.
TESTING DSS IMPLEMENTATIONS USING CAVP ( CRYPTOGRAPHIC ALGORITHMS VALIDATION PROGRAM )
19
AVAILED CRYPTOGRAPHIC ALGORITHMS
CONVENTIONAL ALGORITHMS :
DES - DATA ENCRPTION STANDARD
IDEA – INTERNATIONAL DATA
ENCRYPTION ALGORITHM
AES – ADVANCED ENCRYPTION
STANDARD
SOME OTHERS :
SMS4 , ADFGVX , BACON ,
STRADDLING CHECKBOARD , BLOW
FISH , AUTOKEY , RABBIT , TRIFID ,
ETC.
PUBLIC KEY ALGORITHMS :
RSA
MD5 – MESSAGE DIRECT ALGORITHM
SHA – SECURED HASH ALGORITHM
SOME OTHERS :
CRAMER – SHOUP CRYPTOSYSTEM ,
YAK , PAILLIER CRYPTOSYSTEMS ,
ELGAMAL , DSS , DIFFIE – HELLMAN
KEY EXCHANGE , NTRUENCRYPT ,
MCELIECE ENCYPTOSYSTEMS , ETC.
20
THANKYOU

More Related Content

What's hot

Secure Encyrption Systems Chapter 2
Secure Encyrption Systems Chapter 2Secure Encyrption Systems Chapter 2
Secure Encyrption Systems Chapter 2
AfiqEfendy Zaen
 
Cipher techniques
Cipher techniquesCipher techniques
Cipher techniques
Mohd Arif
 
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere CipherCaesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Mona Rajput
 
Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2
AfiqEfendy Zaen
 
Proving Properties of Security Protocols by Induction
Proving Properties of Security Protocols by InductionProving Properties of Security Protocols by Induction
Proving Properties of Security Protocols by Induction
Lawrence Paulson
 

What's hot (20)

Computer Security Lecture 2: Classical Encryption Techniques 1
Computer Security Lecture 2: Classical Encryption Techniques 1Computer Security Lecture 2: Classical Encryption Techniques 1
Computer Security Lecture 2: Classical Encryption Techniques 1
 
Cryptography (Revised Edition)
Cryptography (Revised Edition)Cryptography (Revised Edition)
Cryptography (Revised Edition)
 
Cryptography
Cryptography Cryptography
Cryptography
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
Crypto theory to practice
Crypto theory to practiceCrypto theory to practice
Crypto theory to practice
 
Cryptography
CryptographyCryptography
Cryptography
 
Cipher techniques
Cipher techniquesCipher techniques
Cipher techniques
 
Ch02
Ch02Ch02
Ch02
 
Cryptography seminar 2017
Cryptography seminar 2017Cryptography seminar 2017
Cryptography seminar 2017
 
Secure Encyrption Systems Chapter 2
Secure Encyrption Systems Chapter 2Secure Encyrption Systems Chapter 2
Secure Encyrption Systems Chapter 2
 
Caesar cipher
Caesar cipherCaesar cipher
Caesar cipher
 
keeloq-final
keeloq-finalkeeloq-final
keeloq-final
 
Cipher techniques
Cipher techniquesCipher techniques
Cipher techniques
 
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere CipherCaesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
 
Caesar cipher
Caesar cipherCaesar cipher
Caesar cipher
 
Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2
 
Cryptography with caesar Cipher
Cryptography with caesar CipherCryptography with caesar Cipher
Cryptography with caesar Cipher
 
Ch02...1
Ch02...1Ch02...1
Ch02...1
 
Ph d final_report
Ph d final_reportPh d final_report
Ph d final_report
 
Proving Properties of Security Protocols by Induction
Proving Properties of Security Protocols by InductionProving Properties of Security Protocols by Induction
Proving Properties of Security Protocols by Induction
 

Similar to Cryptography (1)

Cyptography and network security
Cyptography and network securityCyptography and network security
Cyptography and network security
Priyanka Karancy
 
Encryptolog y-1216310707267721-9
Encryptolog y-1216310707267721-9Encryptolog y-1216310707267721-9
Encryptolog y-1216310707267721-9
Shan Raja
 
Presentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_PaperPresentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_Paper
Nithin Cv
 
Crypto theory practice
Crypto theory practiceCrypto theory practice
Crypto theory practice
Fraboni Ec
 
Crypto theory to practice
Crypto theory to practiceCrypto theory to practice
Crypto theory to practice
Luis Goldster
 
Crypto theory practice
Crypto theory practiceCrypto theory practice
Crypto theory practice
James Wong
 
Crypto theory to practice
Crypto theory to practiceCrypto theory to practice
Crypto theory to practice
Tony Nguyen
 
Crypto theory to practice
Crypto theory to practiceCrypto theory to practice
Crypto theory to practice
David Hoen
 

Similar to Cryptography (1) (20)

Data Protection Techniques and Cryptography
Data Protection Techniques and CryptographyData Protection Techniques and Cryptography
Data Protection Techniques and Cryptography
 
Cryptography
Cryptography Cryptography
Cryptography
 
Cyptography and network security
Cyptography and network securityCyptography and network security
Cyptography and network security
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Encryptolog y-1216310707267721-9
Encryptolog y-1216310707267721-9Encryptolog y-1216310707267721-9
Encryptolog y-1216310707267721-9
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Detailed cryptographic analysis of contact tracing protocols
Detailed cryptographic analysis of contact tracing protocolsDetailed cryptographic analysis of contact tracing protocols
Detailed cryptographic analysis of contact tracing protocols
 
Cryptography and applications
Cryptography and applicationsCryptography and applications
Cryptography and applications
 
Presentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_PaperPresentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_Paper
 
Network security
Network securityNetwork security
Network security
 
Cryptography
CryptographyCryptography
Cryptography
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Crypto theory practice
Crypto theory practiceCrypto theory practice
Crypto theory practice
 
Crypto theory to practice
Crypto theory to practiceCrypto theory to practice
Crypto theory to practice
 
Crypto theory practice
Crypto theory practiceCrypto theory practice
Crypto theory practice
 
Crypto theory to practice
Crypto theory to practiceCrypto theory to practice
Crypto theory to practice
 
Crypto theory to practice
Crypto theory to practiceCrypto theory to practice
Crypto theory to practice
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Recently uploaded (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 

Cryptography (1)

  • 1. CRYPTOGRAPHY - CEASER CIPHER - BY JULIUS CEASER {100 B.C TO 44 B.C} FUBSWRJUDSKB (Convertion of the word Crypyography with ceaser cipher) 1
  • 2. WHAT AND WHY ? WHAT ? CRYPT + GRAPHY = HIDDEN + WRITING. { i.e } ENCRYPTING & DECRYPTING THE MESSAGES. WHY ? AVOID INFORMATION BEING TRAPPED , INTERCEPTED , DIVERTED , MODIFIED & FABRICATIED BY INTRUDER. 2
  • 3. CRYPTOGRAPHY PROCESS SENDER RECEIVER PLAIN TEXTPLAIN TEXT ENCRYPT DECRYPT CIPHER TEXT 3
  • 4. CIPHER TEXT / CEASER CIPHER A B C D E F G H I J K L M N O P Q R S T U V W X Y Z D E F G H I J K L M N O P Q R S T U V W X Y Z A B C Ci = E ( Pi ) = Pi + K K is considered as 3 here 4
  • 5. DISADVANTAGES OF CIPHER TEXT The one who knows the value of K will be easily able to identify the hidden value inside the cipher text. It is even more easy to know the K value when 2 or more people share the same system. 5
  • 6. ENCRYPTION PRINCIPLES , TYPES AND PROCESS PROCESS TYPES SYMMETRIC, SHARED-KEY OR CONVENTIONAL ENCRYPTION ASYMMETRIC, TWO-KEY OR PUBLIC KEY ENCRYPTION TRANSPOSITIO N PRINCIPLE S SUBSTITUTIO N STREAM CIPHER BLOCK CIPHER 6
  • 7. CRYPT - ANALYSIS SCIENCE OF RECOVERING PLAIN-TEXT OF THE MESSAGE WITHOUT HAVING ACCESS TO THE KEY ATTEMPTING TO DISCOVER PLAIN TEXT OR KEY OR BOTH IT IS A ART OF BREAKING CIPHERS CRYPT – ANALYSIS HAVE COMPLETE KNOWLEDGE OF ALGORITHM AND ITS IMPLEMENTATION ALL SECURITY SHOULD RESIDE IN THE KEY AND NOT IN THE SECRECY OF ALGORITHM 7
  • 8. TYPES OF CRYPTO – ANALYSIS ATTACKS CIPHER TEXT ONLY ATTACK KNOWN PLAIN TEXT ATTACK CHOSEN PLAIN TEXT ATTACK CHOSEN CIPHER TEXT ATTACK CHOSEN KEY ATTACK 8 FORMULA : Ci = EK (Pi ) & Pi = DK ( Ci )
  • 9. CHIPER TEXT ONLY ATTACK IT IS ALSO KNOWN AS KNOWN CIPHER TEXT ATTACKER CAN HAVE ACCESS TO ONLY A SET OF CIPHER TEXT , KNOWLEDGE ON WITH PLAIN TEXT & CAN BE GUESSED EASILY THEY CANNOT HAVE ACCESS TO ANY CHANNEL PROVIDING ACCESS PRIOR TO ENCRYPTION IT IS ALMOST SUCCESSFUL SYNTAX : C1 = EK ( P1 ), C2 = EK ( P2 ), …… Ci = EK ( Pi ). 9
  • 10. KNOWN PLAIN TEXT ATTACK THE ATTACKER HAS ACCESS TO BOTH PLAIN TEXT AND CIPHER TEXT. CIPHER TEXT & PLAIN TEXT OF THE CORRESPONSDING MESSAGES ARE PAIRED UP TOGETHER WITH SECRET KEY. THEY ARE COMPARED TO REVEAL FURTHER SECRET INFORMATION SUCH AS SECRET KEY AND CODE. SYNTAX : P1 , C1 = EK ( P1 ) , P2 , C2 = EK ( P2 ) , ……. P1 , Ci = EK ( Pi ). 10
  • 11. CHOSEN PLAIN TEXT ATTACK THE ATTACKER CAN ENCRYPT PLAIN TEXT MESSAGES COMPARE CIPHER TEXT WITH THE RESULT OF ANOTHER ENCRYPTION TO POSSIBLY DISCOVER THE KEY BY MATCHING THE TWO IT IS FEASIBLE. SYNTAX : P1 , C1 = EK ( P1 ) , P2 , C2 = EK ( P2 ) , ………. Pi , Ci = EK ( Pi ). 11
  • 12. CHOSEN CIPHER TEXT ATTACK CAN CHOOSE DIFFERENT CIPHER TEXTS TO BE DECRYPTED WHICH IS DONE IN VICTIM’S SYSTEM. ACCESS TO DECRYPTED PLAIN TEXT SYNTAX : C1 , P1 = DK ( C1 ) , C2 , P2 = DK ( C2 ) , ….. Ci , Pi = DK ( Ci ). 12
  • 13. CHOSEN TEXT ATTACK THE ATTACKER CAN ENCRYPT PLAIN TEXT MESSAGES COMPARE CIPHER TEXT WITH THE RESULT OF ANOTHER ENCRYPTION AND ALSO COMPARED WITH DECRYPTED PLAIN TEXT TO POSSIBLY DISCOVER THE KEY BY MATCHING THE TWO. 13
  • 15. STEPSANDPROBLEMINTHIS MODEL STEPS : • CONVERT P -> C BY K C = EK ( P ) • CONVERT C -> P BY USING SAME K P = DK ( C ) => IMPLIES : P = DK ( EK ( P ) ) SECRECY OF ENCRPTION DEPENDENTS ON SECRECY OF KEY & NOT ON SECRECY OF ALGORITHM. PROBLEMS :  LARGE NUMBER OF PEOPLE CANNOT USE IT  THERE IS NO SCOPE FOR QUALITY CONTROL OR STANDARDIZATION.  NO GUARANTEE FOR EFFECTIVE 15
  • 17. STEPS AND PROBLEM IN THIS MODEL STEPS : • CONVERT P -> C BY K1 C = EK1 ( P ) • CONVERT C -> P BY USING K2 P = DK2 ( C ) => IMPLIES : P = DK2 ( EK1 ( P ) ) PROBLEMS :  THEY ARE SLOWER.  IT IS NOT SURE THAT THE DECRYPTED IS ACTUAL TEXT FORWARDED BY THE SENDER 17
  • 18. APPLICATIONS OF CRYPTOGRAPHY SECURE COMMUNICATIONS : WEB ENCRYPTION HTTP TO HTTPS END–TO-ENCRYPTION : EMAIL STORING DATA : HASH PROGRAMS 18
  • 19. CRYPTOGRAPHY TECHNOLOGY • DIGITAL SIGNATURE : ASSURE THAT : SIGNATORY HAS SIGNED THE INFORMATION & INFORMATION IS NOT MODIFIED STANDARDS USED : FEDERAL INFORMATION PROCESSING STANDARD DIGITAL SIGNATURE STANDARDS USED ALGORITHMS TO GENERATE AND VERIFY : DSA RSA ECDSA WITH RESPECT TO APPROVED HASH FUNCTIONS SPECIFIED IN FIPS 180-4 , SECURE HASH FUNCTIONS OR FIPS 202 , SHA-3 STANDARD : PERMUTATION- BASED HASH AND EXTENDABLE – OUTPUT FUNCTIONS. TESTING DSS IMPLEMENTATIONS USING CAVP ( CRYPTOGRAPHIC ALGORITHMS VALIDATION PROGRAM ) 19
  • 20. AVAILED CRYPTOGRAPHIC ALGORITHMS CONVENTIONAL ALGORITHMS : DES - DATA ENCRPTION STANDARD IDEA – INTERNATIONAL DATA ENCRYPTION ALGORITHM AES – ADVANCED ENCRYPTION STANDARD SOME OTHERS : SMS4 , ADFGVX , BACON , STRADDLING CHECKBOARD , BLOW FISH , AUTOKEY , RABBIT , TRIFID , ETC. PUBLIC KEY ALGORITHMS : RSA MD5 – MESSAGE DIRECT ALGORITHM SHA – SECURED HASH ALGORITHM SOME OTHERS : CRAMER – SHOUP CRYPTOSYSTEM , YAK , PAILLIER CRYPTOSYSTEMS , ELGAMAL , DSS , DIFFIE – HELLMAN KEY EXCHANGE , NTRUENCRYPT , MCELIECE ENCYPTOSYSTEMS , ETC. 20

Editor's Notes

  1. INTERCEPTED – INTERRUPTED. DIVERTED – CHANGE THE COURSE OF ACTION. INTRUDER – WHO ENTERS WITHOUT PERMISSION.
  2. CIPHER TEXT OF MANY MESSAGES, ENCRYPTED WITH SAME KEY.