SlideShare a Scribd company logo
1 of 22
Principles of Information Security,
Fifth Edition
Chapter 8
Cryptography
Lesson 1 – Foundations
of Cryptography
Learning Objectives
• Upon completion of this material, you should be
able to:
– Chronicle the most significant events and
discoveries in the history of cryptology
– Explain the basic principles of cryptography
– Describe the operating principles of the most popular
cryptographic tools
– List and explicate the major protocols used for
secure communications
Principles of Information Security, Fifth Edition 2
Introduction
• Cryptology: science of encryption; encompasses
cryptography and cryptanalysis
• Cryptography involves making and using codes to
secure messages.
• Cryptanalysis involves cracking or breaking
encrypted messages back into their unencrypted
origins.
Principles of Information Security, Fifth Edition 3
Foundations of Cryptology
• Cryptology has an extensive and multicultural
history.
• All popular Web browsers use built-in encryption
features for secure e-commerce applications.
• Restrictions on the export of cryptosystems began
after WWII.
Principles of Information Security, Fifth Edition 4
Terminology
• Must know the following:
– Algorithm
– Bit stream cipher
– Block cipher
– Cipher or cryptosystem
– Ciphertext/cryptogram
– Code
– Decipher
– Decrypt
– Encipher
Principles of Information Security, Fifth Edition 5
– Encrypt
– Key/Cryptovariable
– Keyspace
– Link encryption
– Plaintext/cleartext
– Steganography
– Work factor
Cipher Methods
• Plaintext can be encrypted through bit stream or
block cipher method.
• Bit stream: Each plaintext bit is transformed into
cipher bit one bit at a time.
• Block cipher: Message is divided into blocks (e.g.,
sets of 8- or 16-bit blocks), and each is transformed
into encrypted block of cipher bits using algorithm
and key.
Principles of Information Security, Fifth Edition 6
Substitution Cipher
• Exchanges one value for another
• Monoalphabetic substitution: uses only one
alphabet during encryption process
• Polyalphabetic substitution: more advanced; uses
two or more alphabets
• Vigenère cipher: advanced substitution cipher that
uses simple polyalphabetic code; made up of 26
distinct cipher alphabets
Principles of Information Security, Fifth Edition 7
Principles of Information Security, Fifth Edition 8
Transposition Cipher
• Simple to understand, but if properly used,
produces ciphertext that is difficult to decipher
• Rearranges values within a block to create
ciphertext
• Can be done at the bit level or at the byte
(character) level
• To make the encryption even stronger, the keys
and block sizes can be increased to 128 bits or
more.
– Uses block padding method to facilitate algorithm
Principles of Information Security, Fifth Edition 9
Exclusive OR (XOR)
• Function of Boolean algebra; two bits are
compared and binary result is generated.
– If two bits are identical, the result is binary 0.
– If two bits are not identical, the result is binary 1.
• Very simple to implement and simple to break;
should not be used by itself when organization is
transmitting/storing sensitive data
Principles of Information Security, Fifth Edition 10
Principles of Information Security, Fifth Edition 11
Vernam Cipher
• Developed at AT&T Bell Labs
• Uses a set of characters once per encryption process
• To perform:
– The pad values are added to numeric values that
represent the plaintext that needs to be encrypted.
– Each character of the plaintext is turned into a number
and a pad value for that position is added.
– The resulting sum for that character is then converted
back to a ciphertext letter for transmission.
– If the sum of the two values exceeds 26, then 26 is
subtracted from the total.
Principles of Information Security, Fifth Edition 12
Book-Based Ciphers
• Uses text in book as key to decrypt a message
• Book cipher: ciphertext consists of list of codes
representing page, line, and word numbers of
plaintext word.
• Running key cipher: uses a book for passing key to
cipher similar to Vigenère cipher; sender provides
encrypted message with sequence of numbers
from predetermined book to be used as an
indicator block.
• Template Cipher: involves use of hidden message
in book, letter, or other message; requires page
with specific number of holes cut into it
Principles of Information Security, Fifth Edition 13
Hash Functions
• Mathematical algorithms used to confirm specific
message identity and that no content has changed
• Hash algorithms: public functions that create hash
value
• Use of keys not required
– Message authentication code (MAC), however, may
be attached to a message.
• Used in password verification systems to confirm
the identity of the user
Principles of Information Security, Fifth Edition 14
Cryptographic Algorithms
• Often grouped into two broad categories,
symmetric and asymmetric
– Today’s popular cryptosystems use a combination of
both symmetric and asymmetric algorithms.
• Symmetric and asymmetric algorithms are
distinguished by the types of keys used for
encryption and decryption operations.
Principles of Information Security, Fifth Edition 15
Symmetric Encryption
• Requires same “secret key” to encipher and
decipher message; also known as private-key
encryption
– Can be programmed into fast computing algorithms
and executed quickly
– Both sender and receiver must possess secret key.
– If either copy of key is compromised, an intermediate
can decrypt and read messages without
sender/receiver knowledge.
Principles of Information Security, Fifth Edition 16
Principles of Information Security, Fifth Edition 17
Symmetric Encryption (cont’d)
• Data Encryption Standard (DES): one of the most
popular symmetric encryption cryptosystems
– 64-bit block size; 56-bit key
– Adopted by NIST in 1976 as federal standard for
encrypting non-classified information
• Triple DES (3DES): created to provide security far
beyond DES
• Advanced Encryption Standard (AES): developed
to replace both DES and 3DES
Principles of Information Security, Fifth Edition 18
Asymmetric Encryption
• Also known as public-key encryption
• Uses two different but related keys
– Either key can encrypt or decrypt a message
– If Key A encrypts message, only Key B can decrypt
– Greatest value when one key serves as private key
and the other serves as public key
• RSA algorithm was the first public-key encryption
algorithm developed/published for commercial use.
Principles of Information Security, Fifth Edition 19
Principles of Information Security, Fifth Edition 20
Encryption Key Size
• When deploying ciphers, the size of cryptovariable
or key is very important.
• The strength of many encryption applications and
cryptosystems is measured by key size.
• For cryptosystems, the security of encrypted data
is not dependent on keeping the encrypting
algorithm secret.
• Cryptosystem security depends on keeping some
or all of elements of cryptovariable(s) or key(s)
secret.
Principles of Information Security, Fifth Edition 21
Principles of Information Security, Fifth Edition 22

More Related Content

What's hot

Chapter 2 Presentation
Chapter 2 PresentationChapter 2 Presentation
Chapter 2 PresentationAmy McMullin
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.pptUday Meena
 
Https presentation
Https presentationHttps presentation
Https presentationpatel jatin
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securitypatisa
 
information security management
information security managementinformation security management
information security managementGurpreetkaur838
 
Enumeration and system hacking
Enumeration and system hackingEnumeration and system hacking
Enumeration and system hackingbegmohsin
 
Chapter 6 Presentation
Chapter 6 PresentationChapter 6 Presentation
Chapter 6 PresentationAmy McMullin
 
Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Dr. Kapil Gupta
 
Pretty good privacy
Pretty good privacyPretty good privacy
Pretty good privacyPushkar Dutt
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYKathirvel Ayyaswamy
 
Network security policies
Network security policiesNetwork security policies
Network security policiesUsman Mukhtar
 
Public key cryptography and message authentication
Public key cryptography and message authenticationPublic key cryptography and message authentication
Public key cryptography and message authenticationCAS
 
CompTIA Security+ SY0-601 Domain 1
CompTIA Security+ SY0-601 Domain 1CompTIA Security+ SY0-601 Domain 1
CompTIA Security+ SY0-601 Domain 1ShivamSharma909
 
Chapter 1 Introduction to Security
Chapter 1 Introduction to SecurityChapter 1 Introduction to Security
Chapter 1 Introduction to SecurityDr. Ahmed Al Zaidy
 

What's hot (20)

Ch08 Authentication
Ch08 AuthenticationCh08 Authentication
Ch08 Authentication
 
Chapter 2 Presentation
Chapter 2 PresentationChapter 2 Presentation
Chapter 2 Presentation
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Https presentation
Https presentationHttps presentation
Https presentation
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
information security management
information security managementinformation security management
information security management
 
Enumeration and system hacking
Enumeration and system hackingEnumeration and system hacking
Enumeration and system hacking
 
Chapter 6 Presentation
Chapter 6 PresentationChapter 6 Presentation
Chapter 6 Presentation
 
Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security
 
Pretty good privacy
Pretty good privacyPretty good privacy
Pretty good privacy
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
Network security policies
Network security policiesNetwork security policies
Network security policies
 
MITRE ATT&CK Framework
MITRE ATT&CK FrameworkMITRE ATT&CK Framework
MITRE ATT&CK Framework
 
Hash Function
Hash FunctionHash Function
Hash Function
 
Public key cryptography and message authentication
Public key cryptography and message authenticationPublic key cryptography and message authentication
Public key cryptography and message authentication
 
CompTIA Security+ SY0-601 Domain 1
CompTIA Security+ SY0-601 Domain 1CompTIA Security+ SY0-601 Domain 1
CompTIA Security+ SY0-601 Domain 1
 
Chapter 1 Introduction to Security
Chapter 1 Introduction to SecurityChapter 1 Introduction to Security
Chapter 1 Introduction to Security
 
Secure Hash Algorithm
Secure Hash AlgorithmSecure Hash Algorithm
Secure Hash Algorithm
 
Security policies
Security policiesSecurity policies
Security policies
 

Similar to Foundations of Cryptography Lesson

UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4  CRYPTOGRAPHIC SYSTEMS.pptxUNIT 4  CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptxssuserd5e356
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network SecurityPa Van Tanku
 
IS413 Topic 5.pptx
IS413 Topic 5.pptxIS413 Topic 5.pptx
IS413 Topic 5.pptxWarrenPhiri4
 
Basic Cryptography.pdf
Basic Cryptography.pdfBasic Cryptography.pdf
Basic Cryptography.pdfSetiya Nugroho
 
Introduction to cryptography part1-final
Introduction to cryptography  part1-finalIntroduction to cryptography  part1-final
Introduction to cryptography part1-finalTaymoor Nazmy
 
Chapter 5 Presentation
Chapter 5 PresentationChapter 5 Presentation
Chapter 5 PresentationAmy McMullin
 
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...editor1knowledgecuddle
 
Protecting Sensitive Data (and be PCI Compliant too!)
Protecting Sensitive Data (and be PCI Compliant too!)Protecting Sensitive Data (and be PCI Compliant too!)
Protecting Sensitive Data (and be PCI Compliant too!)Security Innovation
 
Encryption pres
Encryption presEncryption pres
Encryption presMereySovet
 
Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmImplementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmeSAT Publishing House
 
httpswww.youtube.comwatchtime_continue=8&v=rFV0aes0vYAN.docx
httpswww.youtube.comwatchtime_continue=8&v=rFV0aes0vYAN.docxhttpswww.youtube.comwatchtime_continue=8&v=rFV0aes0vYAN.docx
httpswww.youtube.comwatchtime_continue=8&v=rFV0aes0vYAN.docxpooleavelina
 

Similar to Foundations of Cryptography Lesson (20)

Lesson 1- Foundation of Cryptology
Lesson 1- Foundation of CryptologyLesson 1- Foundation of Cryptology
Lesson 1- Foundation of Cryptology
 
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4  CRYPTOGRAPHIC SYSTEMS.pptxUNIT 4  CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
Cryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding informationCryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding information
 
Encryption algorithms
Encryption algorithmsEncryption algorithms
Encryption algorithms
 
IS413 Topic 5.pptx
IS413 Topic 5.pptxIS413 Topic 5.pptx
IS413 Topic 5.pptx
 
Basic Cryptography.pdf
Basic Cryptography.pdfBasic Cryptography.pdf
Basic Cryptography.pdf
 
Introduction to cryptography part1-final
Introduction to cryptography  part1-finalIntroduction to cryptography  part1-final
Introduction to cryptography part1-final
 
Slidecast - Workshop
Slidecast - WorkshopSlidecast - Workshop
Slidecast - Workshop
 
Chapter 5 Presentation
Chapter 5 PresentationChapter 5 Presentation
Chapter 5 Presentation
 
Data encryption
Data encryptionData encryption
Data encryption
 
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
 
Pgp1
Pgp1Pgp1
Pgp1
 
Protecting Sensitive Data (and be PCI Compliant too!)
Protecting Sensitive Data (and be PCI Compliant too!)Protecting Sensitive Data (and be PCI Compliant too!)
Protecting Sensitive Data (and be PCI Compliant too!)
 
Encryption pres
Encryption presEncryption pres
Encryption pres
 
network security
network securitynetwork security
network security
 
Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmImplementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithm
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
httpswww.youtube.comwatchtime_continue=8&v=rFV0aes0vYAN.docx
httpswww.youtube.comwatchtime_continue=8&v=rFV0aes0vYAN.docxhttpswww.youtube.comwatchtime_continue=8&v=rFV0aes0vYAN.docx
httpswww.youtube.comwatchtime_continue=8&v=rFV0aes0vYAN.docx
 
Unit 2
Unit 2Unit 2
Unit 2
 

More from MLG College of Learning, Inc (20)

PC111.Lesson2
PC111.Lesson2PC111.Lesson2
PC111.Lesson2
 
PC111.Lesson1
PC111.Lesson1PC111.Lesson1
PC111.Lesson1
 
PC111-lesson1.pptx
PC111-lesson1.pptxPC111-lesson1.pptx
PC111-lesson1.pptx
 
PC LEESOON 6.pptx
PC LEESOON 6.pptxPC LEESOON 6.pptx
PC LEESOON 6.pptx
 
PC 106 PPT-09.pptx
PC 106 PPT-09.pptxPC 106 PPT-09.pptx
PC 106 PPT-09.pptx
 
PC 106 PPT-07
PC 106 PPT-07PC 106 PPT-07
PC 106 PPT-07
 
PC 106 PPT-01
PC 106 PPT-01PC 106 PPT-01
PC 106 PPT-01
 
PC 106 PPT-06
PC 106 PPT-06PC 106 PPT-06
PC 106 PPT-06
 
PC 106 PPT-05
PC 106 PPT-05PC 106 PPT-05
PC 106 PPT-05
 
PC 106 Slide 04
PC 106 Slide 04PC 106 Slide 04
PC 106 Slide 04
 
PC 106 Slide no.02
PC 106 Slide no.02PC 106 Slide no.02
PC 106 Slide no.02
 
pc-106-slide-3
pc-106-slide-3pc-106-slide-3
pc-106-slide-3
 
PC 106 Slide 2
PC 106 Slide 2PC 106 Slide 2
PC 106 Slide 2
 
PC 106 Slide 1.pptx
PC 106 Slide 1.pptxPC 106 Slide 1.pptx
PC 106 Slide 1.pptx
 
Db2 characteristics of db ms
Db2 characteristics of db msDb2 characteristics of db ms
Db2 characteristics of db ms
 
Db1 introduction
Db1 introductionDb1 introduction
Db1 introduction
 
Lesson 3.2
Lesson 3.2Lesson 3.2
Lesson 3.2
 
Lesson 3.1
Lesson 3.1Lesson 3.1
Lesson 3.1
 
Lesson 1.6
Lesson 1.6Lesson 1.6
Lesson 1.6
 
Lesson 3.2
Lesson 3.2Lesson 3.2
Lesson 3.2
 

Recently uploaded

What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 

Recently uploaded (20)

YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 

Foundations of Cryptography Lesson

  • 1. Principles of Information Security, Fifth Edition Chapter 8 Cryptography Lesson 1 – Foundations of Cryptography
  • 2. Learning Objectives • Upon completion of this material, you should be able to: – Chronicle the most significant events and discoveries in the history of cryptology – Explain the basic principles of cryptography – Describe the operating principles of the most popular cryptographic tools – List and explicate the major protocols used for secure communications Principles of Information Security, Fifth Edition 2
  • 3. Introduction • Cryptology: science of encryption; encompasses cryptography and cryptanalysis • Cryptography involves making and using codes to secure messages. • Cryptanalysis involves cracking or breaking encrypted messages back into their unencrypted origins. Principles of Information Security, Fifth Edition 3
  • 4. Foundations of Cryptology • Cryptology has an extensive and multicultural history. • All popular Web browsers use built-in encryption features for secure e-commerce applications. • Restrictions on the export of cryptosystems began after WWII. Principles of Information Security, Fifth Edition 4
  • 5. Terminology • Must know the following: – Algorithm – Bit stream cipher – Block cipher – Cipher or cryptosystem – Ciphertext/cryptogram – Code – Decipher – Decrypt – Encipher Principles of Information Security, Fifth Edition 5 – Encrypt – Key/Cryptovariable – Keyspace – Link encryption – Plaintext/cleartext – Steganography – Work factor
  • 6. Cipher Methods • Plaintext can be encrypted through bit stream or block cipher method. • Bit stream: Each plaintext bit is transformed into cipher bit one bit at a time. • Block cipher: Message is divided into blocks (e.g., sets of 8- or 16-bit blocks), and each is transformed into encrypted block of cipher bits using algorithm and key. Principles of Information Security, Fifth Edition 6
  • 7. Substitution Cipher • Exchanges one value for another • Monoalphabetic substitution: uses only one alphabet during encryption process • Polyalphabetic substitution: more advanced; uses two or more alphabets • Vigenère cipher: advanced substitution cipher that uses simple polyalphabetic code; made up of 26 distinct cipher alphabets Principles of Information Security, Fifth Edition 7
  • 8. Principles of Information Security, Fifth Edition 8
  • 9. Transposition Cipher • Simple to understand, but if properly used, produces ciphertext that is difficult to decipher • Rearranges values within a block to create ciphertext • Can be done at the bit level or at the byte (character) level • To make the encryption even stronger, the keys and block sizes can be increased to 128 bits or more. – Uses block padding method to facilitate algorithm Principles of Information Security, Fifth Edition 9
  • 10. Exclusive OR (XOR) • Function of Boolean algebra; two bits are compared and binary result is generated. – If two bits are identical, the result is binary 0. – If two bits are not identical, the result is binary 1. • Very simple to implement and simple to break; should not be used by itself when organization is transmitting/storing sensitive data Principles of Information Security, Fifth Edition 10
  • 11. Principles of Information Security, Fifth Edition 11
  • 12. Vernam Cipher • Developed at AT&T Bell Labs • Uses a set of characters once per encryption process • To perform: – The pad values are added to numeric values that represent the plaintext that needs to be encrypted. – Each character of the plaintext is turned into a number and a pad value for that position is added. – The resulting sum for that character is then converted back to a ciphertext letter for transmission. – If the sum of the two values exceeds 26, then 26 is subtracted from the total. Principles of Information Security, Fifth Edition 12
  • 13. Book-Based Ciphers • Uses text in book as key to decrypt a message • Book cipher: ciphertext consists of list of codes representing page, line, and word numbers of plaintext word. • Running key cipher: uses a book for passing key to cipher similar to Vigenère cipher; sender provides encrypted message with sequence of numbers from predetermined book to be used as an indicator block. • Template Cipher: involves use of hidden message in book, letter, or other message; requires page with specific number of holes cut into it Principles of Information Security, Fifth Edition 13
  • 14. Hash Functions • Mathematical algorithms used to confirm specific message identity and that no content has changed • Hash algorithms: public functions that create hash value • Use of keys not required – Message authentication code (MAC), however, may be attached to a message. • Used in password verification systems to confirm the identity of the user Principles of Information Security, Fifth Edition 14
  • 15. Cryptographic Algorithms • Often grouped into two broad categories, symmetric and asymmetric – Today’s popular cryptosystems use a combination of both symmetric and asymmetric algorithms. • Symmetric and asymmetric algorithms are distinguished by the types of keys used for encryption and decryption operations. Principles of Information Security, Fifth Edition 15
  • 16. Symmetric Encryption • Requires same “secret key” to encipher and decipher message; also known as private-key encryption – Can be programmed into fast computing algorithms and executed quickly – Both sender and receiver must possess secret key. – If either copy of key is compromised, an intermediate can decrypt and read messages without sender/receiver knowledge. Principles of Information Security, Fifth Edition 16
  • 17. Principles of Information Security, Fifth Edition 17
  • 18. Symmetric Encryption (cont’d) • Data Encryption Standard (DES): one of the most popular symmetric encryption cryptosystems – 64-bit block size; 56-bit key – Adopted by NIST in 1976 as federal standard for encrypting non-classified information • Triple DES (3DES): created to provide security far beyond DES • Advanced Encryption Standard (AES): developed to replace both DES and 3DES Principles of Information Security, Fifth Edition 18
  • 19. Asymmetric Encryption • Also known as public-key encryption • Uses two different but related keys – Either key can encrypt or decrypt a message – If Key A encrypts message, only Key B can decrypt – Greatest value when one key serves as private key and the other serves as public key • RSA algorithm was the first public-key encryption algorithm developed/published for commercial use. Principles of Information Security, Fifth Edition 19
  • 20. Principles of Information Security, Fifth Edition 20
  • 21. Encryption Key Size • When deploying ciphers, the size of cryptovariable or key is very important. • The strength of many encryption applications and cryptosystems is measured by key size. • For cryptosystems, the security of encrypted data is not dependent on keeping the encrypting algorithm secret. • Cryptosystem security depends on keeping some or all of elements of cryptovariable(s) or key(s) secret. Principles of Information Security, Fifth Edition 21
  • 22. Principles of Information Security, Fifth Edition 22