SlideShare a Scribd company logo
1 of 11
Computer Security
Chapter 2
Encryption
2
Encryption
• Encryption is said to occur when data is passed through a series of mathematical
operations that generate an alternate form of that data; the sequence of these
operations is called an algorithm.
• To hide the meaning
Encryption Algorithms
Cipher
Text
Key
Plain
Text
3
Encryption
• The two forms of data:
plaintext- unencrypted data and the as
Ciphertext- encrypted data
• The security of encryption lies in the ability of an algorithm to generate
ciphertext that is not easily reverted to the original plaintext.
• Two fundamental approaches are in use:
conventional encryption(symmetric encryption) and
public-key encryption (asymmetric encryption).
Conventional encryption
• Symmetric encryption :
 single secret key is used for encryption and decryption
 the only type of encryption used prior to the development of a public key encryption.
 The most commonly used symmetric encryption algorithms are block ciphers.
Block encryption algorithms like DES, triple DES and AES are examples for
symmetric key encryption algorithms.
A block cipher process the plain text input in fixed-sized blocks and produces a
block of cipher text of equal size for each plaintext block.
Symmetric encryption principles:
A symmetric key encryption scheme has five ingredients
• Plaintext: This is the original message or data that is fed into the
algorithm as input.
• Encryption algorithm: The encryption algorithm performs various
substitutions and transformations on the plain text.
• Secret Key: The secret key is also input to the algorithm. The exact
number of substitutions and transformations performed by the
algorithm depend on the key.
• Cipher text: This is the scrambled message produced as output. It
depends on the plain text and secret key. For any given message two
different keys will produce two different cipher texts.
Symmetric encryption principles:
• Decryption algorithm: This is essentially the encryption algorithm run
in reverse. It takes cipher text and secret key as input and produces
original plain text.
Simplified model of symmetric encryption.
Continued..
There are two requirements for secure use of symmetric encryption:
1. The encryption algorithm must be strong enough.
2. Sender and receiver must have obtained copies of the secret key in secure fashion and must
keep the key secure.
Note: Security of symmetric encryption depends on the secrecy of the key, not the secrecy of
the algorithm.
Cryptography
o Cryptographic systems are generally classified based on the three independent dimensions:
1. The type of operation used for transforming plaintext to cipher text: All the
encryption algorithms are based on two general principles,
o Substitution: Here each element in the plain text is mapped into another element.
o Transposition: Here the elements in the plain text are rearranged.
o Most product systems involve multiple stages of substitutions and transpositions.
2. The number of keys used: Here user may use symmetric or asymmetric keys.
o Symmetric (single key): Both sender and receiver use the same key. E.g. DES,
AES
o Asymmetric (two-keys, or public-key encryption): Sender and receiver use a
different key. E.g. RSA(Rivest, Shamir, Adelson) and Diffie and Hellmann
3. The way in which plain text is processed: It can be in terms of block or stream.
o Block cipher: Encrypts/decrypts a block at a time.
o Stream cipher: Encrypts/decrypts one element a time or process the input elements
continuously.
Cryptanalysis
o The process of attempting to discover the plain text or key is known as cryptanalysis. The
strategy used by the cryptanalyst depends on the
o Nature of the encryption scheme and
o The information available to the cryptanalyst.
Data Encryption Standard (DES):
o The most widely used encryption scheme
o The algorithm is referred to the Data Encryption Algorithm (DEA)
o DES is a block cipher
o The plaintext is processed in 64-bit blocks
o The key is 56-bits in length
o The DES structure is a minor variation of the Feistal structure.
o There are sixteen rounds of processing. From original 56-bit key sixteen sub keys are
generated, one of which is used for each round.
Thank you!!!
11

More Related Content

Similar to Chapter 2 part 1.ppt

Network security Encryption
Network security EncryptionNetwork security Encryption
Network security EncryptionJoel Briza
 
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...ams1ams11
 
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4  CRYPTOGRAPHIC SYSTEMS.pptxUNIT 4  CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptxssuserd5e356
 
httpswww.youtube.comwatchtime_continue=8&v=rFV0aes0vYAN.docx
httpswww.youtube.comwatchtime_continue=8&v=rFV0aes0vYAN.docxhttpswww.youtube.comwatchtime_continue=8&v=rFV0aes0vYAN.docx
httpswww.youtube.comwatchtime_continue=8&v=rFV0aes0vYAN.docxpooleavelina
 
Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)Anas Rock
 
CNS Case study.pptx
CNS Case study.pptxCNS Case study.pptx
CNS Case study.pptxKannanN45
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network SecurityPa Van Tanku
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Saif Kassim
 
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESValerie Felton
 
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...editor1knowledgecuddle
 
Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmImplementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmeSAT Publishing House
 

Similar to Chapter 2 part 1.ppt (20)

Network security Encryption
Network security EncryptionNetwork security Encryption
Network security Encryption
 
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
 
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4  CRYPTOGRAPHIC SYSTEMS.pptxUNIT 4  CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
 
httpswww.youtube.comwatchtime_continue=8&v=rFV0aes0vYAN.docx
httpswww.youtube.comwatchtime_continue=8&v=rFV0aes0vYAN.docxhttpswww.youtube.comwatchtime_continue=8&v=rFV0aes0vYAN.docx
httpswww.youtube.comwatchtime_continue=8&v=rFV0aes0vYAN.docx
 
Unit 2
Unit 2Unit 2
Unit 2
 
Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)
 
Network security
Network securityNetwork security
Network security
 
CNS Case study.pptx
CNS Case study.pptxCNS Case study.pptx
CNS Case study.pptx
 
Cryptography.pptx
Cryptography.pptxCryptography.pptx
Cryptography.pptx
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
Unit-2-IS (1).pdf
Unit-2-IS (1).pdfUnit-2-IS (1).pdf
Unit-2-IS (1).pdf
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01
 
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
 
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
 
Encryption algorithms
Encryption algorithmsEncryption algorithms
Encryption algorithms
 
CISSP - Chapter 3 - Cryptography
CISSP - Chapter 3 - CryptographyCISSP - Chapter 3 - Cryptography
CISSP - Chapter 3 - Cryptography
 
Encryption
EncryptionEncryption
Encryption
 
Unit 1
Unit 1Unit 1
Unit 1
 
Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmImplementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithm
 
Cryptography cse,ru
Cryptography cse,ruCryptography cse,ru
Cryptography cse,ru
 

Recently uploaded

一比一原版查尔斯特大学毕业证如何办理
一比一原版查尔斯特大学毕业证如何办理一比一原版查尔斯特大学毕业证如何办理
一比一原版查尔斯特大学毕业证如何办理hwoudye
 
The Codex Alimentarius Commission (CAC).
The Codex Alimentarius Commission (CAC).The Codex Alimentarius Commission (CAC).
The Codex Alimentarius Commission (CAC).Ravikumar Vaniya
 
如何办理新加坡管理大学毕业证成绩单留信学历认证
如何办理新加坡管理大学毕业证成绩单留信学历认证如何办理新加坡管理大学毕业证成绩单留信学历认证
如何办理新加坡管理大学毕业证成绩单留信学历认证zg99vwgda
 
FSSAI.ppt Food safety standards act in RAFN
FSSAI.ppt Food safety standards act in RAFNFSSAI.ppt Food safety standards act in RAFN
FSSAI.ppt Food safety standards act in RAFNLokesh Kothari
 
NO1 Top Online Amil Baba in Rawalpindi Contact Number Amil in Rawalpindi Kala...
NO1 Top Online Amil Baba in Rawalpindi Contact Number Amil in Rawalpindi Kala...NO1 Top Online Amil Baba in Rawalpindi Contact Number Amil in Rawalpindi Kala...
NO1 Top Online Amil Baba in Rawalpindi Contact Number Amil in Rawalpindi Kala...Amil baba
 
Medical Foods final.ppt (Regulatory Aspects of Food & Nutraceiticals)
Medical Foods final.ppt (Regulatory Aspects of Food & Nutraceiticals)Medical Foods final.ppt (Regulatory Aspects of Food & Nutraceiticals)
Medical Foods final.ppt (Regulatory Aspects of Food & Nutraceiticals)Lokesh Kothari
 
一比一原版卡尔顿大学毕业证(carleton毕业证)学历认证靠谱办理
一比一原版卡尔顿大学毕业证(carleton毕业证)学历认证靠谱办理一比一原版卡尔顿大学毕业证(carleton毕业证)学历认证靠谱办理
一比一原版卡尔顿大学毕业证(carleton毕业证)学历认证靠谱办理hwoudye
 
一比一原版(LMU毕业证书)英国伦敦都市大学毕业证学位证可查学历认证
一比一原版(LMU毕业证书)英国伦敦都市大学毕业证学位证可查学历认证一比一原版(LMU毕业证书)英国伦敦都市大学毕业证学位证可查学历认证
一比一原版(LMU毕业证书)英国伦敦都市大学毕业证学位证可查学历认证funaxa
 
原版1:1定制(IC大学毕业证)帝国理工学院大学毕业证国外文凭复刻成绩单#电子版制作#留信入库#多年经营绝对保证质量
原版1:1定制(IC大学毕业证)帝国理工学院大学毕业证国外文凭复刻成绩单#电子版制作#留信入库#多年经营绝对保证质量原版1:1定制(IC大学毕业证)帝国理工学院大学毕业证国外文凭复刻成绩单#电子版制作#留信入库#多年经营绝对保证质量
原版1:1定制(IC大学毕业证)帝国理工学院大学毕业证国外文凭复刻成绩单#电子版制作#留信入库#多年经营绝对保证质量funaxa
 
HYDROPONICS cratky method 1234567890qwew
HYDROPONICS  cratky  method 1234567890qwewHYDROPONICS  cratky  method 1234567890qwew
HYDROPONICS cratky method 1234567890qwewRolan Ben Lorono
 
一比一原版(uOttawa毕业证书)加拿大渥太华大学毕业证如何办理
一比一原版(uOttawa毕业证书)加拿大渥太华大学毕业证如何办理一比一原版(uOttawa毕业证书)加拿大渥太华大学毕业证如何办理
一比一原版(uOttawa毕业证书)加拿大渥太华大学毕业证如何办理hwoudye
 
Food Preservatives Market by Product Type, Distribution Channel, End User 202...
Food Preservatives Market by Product Type, Distribution Channel, End User 202...Food Preservatives Market by Product Type, Distribution Channel, End User 202...
Food Preservatives Market by Product Type, Distribution Channel, End User 202...IMARC Group
 
CLASSIFICATION AND PROPERTIES OF FATS AND THEIR FUNCTIONS
CLASSIFICATION AND PROPERTIES OF FATS AND THEIR FUNCTIONSCLASSIFICATION AND PROPERTIES OF FATS AND THEIR FUNCTIONS
CLASSIFICATION AND PROPERTIES OF FATS AND THEIR FUNCTIONSDr. TATHAGAT KHOBRAGADE
 
PRESTAIR MANUFACTURER OF DISPLAY COUNTER
PRESTAIR MANUFACTURER OF DISPLAY COUNTERPRESTAIR MANUFACTURER OF DISPLAY COUNTER
PRESTAIR MANUFACTURER OF DISPLAY COUNTERPRESTAIR SYSTEMS LLP
 
LESSON 1 PREPARE AND COOKING MEAT GRADE 10
LESSON 1 PREPARE AND COOKING MEAT GRADE 10LESSON 1 PREPARE AND COOKING MEAT GRADE 10
LESSON 1 PREPARE AND COOKING MEAT GRADE 10manwithoutapfp
 
Abortion pills in Jeddah +966572737505 <> buy cytotec <> unwanted kit Saudi A...
Abortion pills in Jeddah +966572737505 <> buy cytotec <> unwanted kit Saudi A...Abortion pills in Jeddah +966572737505 <> buy cytotec <> unwanted kit Saudi A...
Abortion pills in Jeddah +966572737505 <> buy cytotec <> unwanted kit Saudi A...samsungultra782445
 

Recently uploaded (17)

一比一原版查尔斯特大学毕业证如何办理
一比一原版查尔斯特大学毕业证如何办理一比一原版查尔斯特大学毕业证如何办理
一比一原版查尔斯特大学毕业证如何办理
 
The Codex Alimentarius Commission (CAC).
The Codex Alimentarius Commission (CAC).The Codex Alimentarius Commission (CAC).
The Codex Alimentarius Commission (CAC).
 
如何办理新加坡管理大学毕业证成绩单留信学历认证
如何办理新加坡管理大学毕业证成绩单留信学历认证如何办理新加坡管理大学毕业证成绩单留信学历认证
如何办理新加坡管理大学毕业证成绩单留信学历认证
 
FSSAI.ppt Food safety standards act in RAFN
FSSAI.ppt Food safety standards act in RAFNFSSAI.ppt Food safety standards act in RAFN
FSSAI.ppt Food safety standards act in RAFN
 
NO1 Top Online Amil Baba in Rawalpindi Contact Number Amil in Rawalpindi Kala...
NO1 Top Online Amil Baba in Rawalpindi Contact Number Amil in Rawalpindi Kala...NO1 Top Online Amil Baba in Rawalpindi Contact Number Amil in Rawalpindi Kala...
NO1 Top Online Amil Baba in Rawalpindi Contact Number Amil in Rawalpindi Kala...
 
Medical Foods final.ppt (Regulatory Aspects of Food & Nutraceiticals)
Medical Foods final.ppt (Regulatory Aspects of Food & Nutraceiticals)Medical Foods final.ppt (Regulatory Aspects of Food & Nutraceiticals)
Medical Foods final.ppt (Regulatory Aspects of Food & Nutraceiticals)
 
一比一原版卡尔顿大学毕业证(carleton毕业证)学历认证靠谱办理
一比一原版卡尔顿大学毕业证(carleton毕业证)学历认证靠谱办理一比一原版卡尔顿大学毕业证(carleton毕业证)学历认证靠谱办理
一比一原版卡尔顿大学毕业证(carleton毕业证)学历认证靠谱办理
 
一比一原版(LMU毕业证书)英国伦敦都市大学毕业证学位证可查学历认证
一比一原版(LMU毕业证书)英国伦敦都市大学毕业证学位证可查学历认证一比一原版(LMU毕业证书)英国伦敦都市大学毕业证学位证可查学历认证
一比一原版(LMU毕业证书)英国伦敦都市大学毕业证学位证可查学历认证
 
原版1:1定制(IC大学毕业证)帝国理工学院大学毕业证国外文凭复刻成绩单#电子版制作#留信入库#多年经营绝对保证质量
原版1:1定制(IC大学毕业证)帝国理工学院大学毕业证国外文凭复刻成绩单#电子版制作#留信入库#多年经营绝对保证质量原版1:1定制(IC大学毕业证)帝国理工学院大学毕业证国外文凭复刻成绩单#电子版制作#留信入库#多年经营绝对保证质量
原版1:1定制(IC大学毕业证)帝国理工学院大学毕业证国外文凭复刻成绩单#电子版制作#留信入库#多年经营绝对保证质量
 
HYDROPONICS cratky method 1234567890qwew
HYDROPONICS  cratky  method 1234567890qwewHYDROPONICS  cratky  method 1234567890qwew
HYDROPONICS cratky method 1234567890qwew
 
Jual Obat Aborsi Sorong, Wa : 0822/2310/9953 Apotik Jual Obat Cytotec Di Sorong
Jual Obat Aborsi Sorong, Wa : 0822/2310/9953 Apotik Jual Obat Cytotec Di SorongJual Obat Aborsi Sorong, Wa : 0822/2310/9953 Apotik Jual Obat Cytotec Di Sorong
Jual Obat Aborsi Sorong, Wa : 0822/2310/9953 Apotik Jual Obat Cytotec Di Sorong
 
一比一原版(uOttawa毕业证书)加拿大渥太华大学毕业证如何办理
一比一原版(uOttawa毕业证书)加拿大渥太华大学毕业证如何办理一比一原版(uOttawa毕业证书)加拿大渥太华大学毕业证如何办理
一比一原版(uOttawa毕业证书)加拿大渥太华大学毕业证如何办理
 
Food Preservatives Market by Product Type, Distribution Channel, End User 202...
Food Preservatives Market by Product Type, Distribution Channel, End User 202...Food Preservatives Market by Product Type, Distribution Channel, End User 202...
Food Preservatives Market by Product Type, Distribution Channel, End User 202...
 
CLASSIFICATION AND PROPERTIES OF FATS AND THEIR FUNCTIONS
CLASSIFICATION AND PROPERTIES OF FATS AND THEIR FUNCTIONSCLASSIFICATION AND PROPERTIES OF FATS AND THEIR FUNCTIONS
CLASSIFICATION AND PROPERTIES OF FATS AND THEIR FUNCTIONS
 
PRESTAIR MANUFACTURER OF DISPLAY COUNTER
PRESTAIR MANUFACTURER OF DISPLAY COUNTERPRESTAIR MANUFACTURER OF DISPLAY COUNTER
PRESTAIR MANUFACTURER OF DISPLAY COUNTER
 
LESSON 1 PREPARE AND COOKING MEAT GRADE 10
LESSON 1 PREPARE AND COOKING MEAT GRADE 10LESSON 1 PREPARE AND COOKING MEAT GRADE 10
LESSON 1 PREPARE AND COOKING MEAT GRADE 10
 
Abortion pills in Jeddah +966572737505 <> buy cytotec <> unwanted kit Saudi A...
Abortion pills in Jeddah +966572737505 <> buy cytotec <> unwanted kit Saudi A...Abortion pills in Jeddah +966572737505 <> buy cytotec <> unwanted kit Saudi A...
Abortion pills in Jeddah +966572737505 <> buy cytotec <> unwanted kit Saudi A...
 

Chapter 2 part 1.ppt

  • 2. 2 Encryption • Encryption is said to occur when data is passed through a series of mathematical operations that generate an alternate form of that data; the sequence of these operations is called an algorithm. • To hide the meaning Encryption Algorithms Cipher Text Key Plain Text
  • 3. 3 Encryption • The two forms of data: plaintext- unencrypted data and the as Ciphertext- encrypted data • The security of encryption lies in the ability of an algorithm to generate ciphertext that is not easily reverted to the original plaintext. • Two fundamental approaches are in use: conventional encryption(symmetric encryption) and public-key encryption (asymmetric encryption).
  • 4. Conventional encryption • Symmetric encryption :  single secret key is used for encryption and decryption  the only type of encryption used prior to the development of a public key encryption.  The most commonly used symmetric encryption algorithms are block ciphers. Block encryption algorithms like DES, triple DES and AES are examples for symmetric key encryption algorithms. A block cipher process the plain text input in fixed-sized blocks and produces a block of cipher text of equal size for each plaintext block.
  • 5. Symmetric encryption principles: A symmetric key encryption scheme has five ingredients • Plaintext: This is the original message or data that is fed into the algorithm as input. • Encryption algorithm: The encryption algorithm performs various substitutions and transformations on the plain text. • Secret Key: The secret key is also input to the algorithm. The exact number of substitutions and transformations performed by the algorithm depend on the key. • Cipher text: This is the scrambled message produced as output. It depends on the plain text and secret key. For any given message two different keys will produce two different cipher texts.
  • 6. Symmetric encryption principles: • Decryption algorithm: This is essentially the encryption algorithm run in reverse. It takes cipher text and secret key as input and produces original plain text. Simplified model of symmetric encryption.
  • 7. Continued.. There are two requirements for secure use of symmetric encryption: 1. The encryption algorithm must be strong enough. 2. Sender and receiver must have obtained copies of the secret key in secure fashion and must keep the key secure. Note: Security of symmetric encryption depends on the secrecy of the key, not the secrecy of the algorithm.
  • 8. Cryptography o Cryptographic systems are generally classified based on the three independent dimensions: 1. The type of operation used for transforming plaintext to cipher text: All the encryption algorithms are based on two general principles, o Substitution: Here each element in the plain text is mapped into another element. o Transposition: Here the elements in the plain text are rearranged. o Most product systems involve multiple stages of substitutions and transpositions. 2. The number of keys used: Here user may use symmetric or asymmetric keys. o Symmetric (single key): Both sender and receiver use the same key. E.g. DES, AES o Asymmetric (two-keys, or public-key encryption): Sender and receiver use a different key. E.g. RSA(Rivest, Shamir, Adelson) and Diffie and Hellmann 3. The way in which plain text is processed: It can be in terms of block or stream. o Block cipher: Encrypts/decrypts a block at a time. o Stream cipher: Encrypts/decrypts one element a time or process the input elements continuously.
  • 9. Cryptanalysis o The process of attempting to discover the plain text or key is known as cryptanalysis. The strategy used by the cryptanalyst depends on the o Nature of the encryption scheme and o The information available to the cryptanalyst.
  • 10. Data Encryption Standard (DES): o The most widely used encryption scheme o The algorithm is referred to the Data Encryption Algorithm (DEA) o DES is a block cipher o The plaintext is processed in 64-bit blocks o The key is 56-bits in length o The DES structure is a minor variation of the Feistal structure. o There are sixteen rounds of processing. From original 56-bit key sixteen sub keys are generated, one of which is used for each round.