SlideShare a Scribd company logo
1 of 27
CRYPTOGRAPHY
Mrinalini Sharma
M.Tech (ECE), 1st Sem.
00516414216
THREATS
SECURITY GOALS
CRYPTOGRAPHY
 CRYPTOGRAPHY plays major roles in fulfilling this demand.
 Greek word meaning “Secret Writing”.
 Science & art of transforming messages to make them secure &
immune to attacks.
COMPONENTS OF CRYPTOGRAPHY
• Plaintext – Original message (message in its natural format readable by an
attacker).
• Ciphertext – Message altered to be unreadable by anyone.
[ CIPHER refers to the encryption & decryption algorithms.]
• Key – Sequence that controls the operation and behavior of the
cryptographic algorithm.
• Keyspace – Total number of possible values of keys in a crypto algorithm.
CRYPTOGRAPHY TYPES
1. SYMMETRIC-KEY
 Also known as SECRET-KEY Cryptography.
 Same key is used for encryption and decryption i.e. shared
key.
 Main types –
SYMMETRIC-KEY CRYPTOGRAPHY
SUBSTITUTION CIPHERS
• In this, letters/number/symbols of plaintext are replaced by
other letters/numbers/symbols.
e.g. A D, T Z
2 5, 3 6
TRANSPOSITION CIPHERS
• In the transposition technique the positions of
letters/numbers/symbols in plaintext is changed with one
another.
Plain text: MEET ME AFTER PARTY
Cipher text: TEMEEMEFAPTRYRAT
Key Usec: 421635
Data Encryption Standard (DES)
• Developed by IBM.
• Plaintext is processed in 64-bit blocks.
• The DES algorithm is a careful and complex combination of two fundamental
building blocks of encryption:
– Substitution
– Transposition
• DES uses only standard arithmetic and logical operations on numbers up to
64 bits long.
– Transforms 64-bit input in a series of steps into a 64-bit output
– The same steps are used to decrypt messages
– Sender and receiver share the same key (Symmetric)
• Now considered to be insecure
– Key size is 56 bits, considered to be too small
Data Encryption Standard (DES)
• 1st 64 bit plain text is handed over to initial permutation
function.
• IP is performed over the plain text.
• IP produces two halves of the permuted blocks left
plain text (LPT) & right plain text (RPT).
• Now LPT & RPT goes 16 rounds of encryption process,
each with its own key.
• Now LPT & RPT are rejoined and FINAL PERMUTATION
(FP) is performed on the combined block.
• The result is 64 bit cipher text.
ADVANTAGES
• DES is also an ANSI and ISO standard - anybody can
learn the details and implement it.
• Hard to crack.
DISADVANTAGES
• Software implementations of DES are slow.
TDES & AES
• TDES
– Triple DES – Use algorithm 3 times
– 3 different keys (56-bits each)
– 168 bits total (192 if parity bits are included)
– Superceded by AES
• AES
– Advanced Encryption Standard
– Fixed block size of 128 bits
– Key size can be 128, 192, or 256 bits
2. ASYMMETRIC-KEY
 Also knowns as PUBLIC-KEY Cryptography.
 Sender & receiver use different keys for encryption &
decryption namely PUBLIC & PRIVATE respectively.
 Main algorithms –
 RSA (Rivest, Shamir & Adleman)
 Diffie - Hellman
ASYMMETRIC-KEY CRYPTOGRAPHY
THE RSA ALGORITHM
• Published by Ron Rivest, Adi Shamir, and Len Adleman in
1978.
• Best known and widely used public-key scheme.
• Block cipher in which plaintext and ciphertext are integers
between 0 and n – 1 for some n.
RSA KEY GENERATION
1) Select to prime numbers: p, q
– Private, chosen
2) Calculate n = pq
– Public, calculated
3) Calculate Φ(n) = (p-1)(q-1)
4) Select an integer e such that:
– gcd(Φ(n), e) = 1 and 1 < e < Φ(n)
– Public, chosen
5) Calculate d where d = e-1modΦ(n)
– ed = 1 mod Φ(n)
– Private, calculated
RSA ENCRYPTION/DECRYPTION
• To encrypt a message M the sender:
– Obtains public key of recipient KU={e,n}
– Computes: C = Me mod n
• Where 0≤M<n
• To decrypt the ciphertext C the owner:
– Uses their private key KR={d,n}
– Computes: M = Cd mod n
EXAMPLE
1) Let p = 7 and q = 17
2) n = pq = 7 x 17 = 119
3) Φ(n) = (p-1)(q-1) = 6 X 16 = 96
4) Let e = 5
– gcd(Φ(n), e) = gcd(96,5) = 1
– 1 < 5 < 96
5) d = e-1 mod Φ(n)
– Therefore, de = 1 mod 96
– d = 77
• 77 x 5 = 385 = 4 x 96 + 1
KEY GENERATION :
The two resulting keys are as follows:
– Public Key: KU = {e,n} = {5, 119}
– Private Key: KR = {d,n} = {77, 119}
ENCRYPTION
• To encrypt a message M, where M = 19:
– C = Me mod n
– 195 mod 119 = 2476099 mod 119
– 2476099 / 119 = 20807 with a remainder of 66
– Therefore, C = 66
DECRYPTION
• M = Cd mod n
• 6677mod 119 = (1.27 x 10140) mod 119
• (1.27 x 10140) / 119 = (1.06 x 10138) with a remainder of 19
• Therefore, M = 19
APPLICATIONS
• Defense services
• Secure data manipulation
• E–commerce
• Business transactions
• Internet payment systems
• User identification systems
• Access control
• Data security
CONCLUSION
By using of encryption techniques a fair unit of confidentiality,
authentication, integrity, access control and availability of
data is maintained.
THANK-YOU !!!

More Related Content

What's hot (20)

Encryption
EncryptionEncryption
Encryption
 
DES
DESDES
DES
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
Cryptography Fundamentals
Cryptography FundamentalsCryptography Fundamentals
Cryptography Fundamentals
 
Diffie Hellman Key Exchange
Diffie Hellman Key ExchangeDiffie Hellman Key Exchange
Diffie Hellman Key Exchange
 
RSA Algorithm - Public Key Cryptography
RSA Algorithm - Public Key CryptographyRSA Algorithm - Public Key Cryptography
RSA Algorithm - Public Key Cryptography
 
Rsa
RsaRsa
Rsa
 
Crypto graphy
Crypto graphyCrypto graphy
Crypto graphy
 
Diffiehellman
DiffiehellmanDiffiehellman
Diffiehellman
 
Information and network security 28 blowfish
Information and network security 28 blowfishInformation and network security 28 blowfish
Information and network security 28 blowfish
 
Applied Cryptography
Applied CryptographyApplied Cryptography
Applied Cryptography
 
Ch02...1
Ch02...1Ch02...1
Ch02...1
 
Block Ciphers Modes of Operation
Block Ciphers Modes of OperationBlock Ciphers Modes of Operation
Block Ciphers Modes of Operation
 
RSA algorithm
RSA algorithmRSA algorithm
RSA algorithm
 
Public Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithmPublic Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithm
 
Computer Security Lecture 7: RSA
Computer Security Lecture 7: RSAComputer Security Lecture 7: RSA
Computer Security Lecture 7: RSA
 
Cryptography - 101
Cryptography - 101Cryptography - 101
Cryptography - 101
 
Ch01
Ch01Ch01
Ch01
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
Transposition cipher
Transposition cipherTransposition cipher
Transposition cipher
 

Viewers also liked

Viewers also liked (20)

03102012450
0310201245003102012450
03102012450
 
Presentation1
Presentation1Presentation1
Presentation1
 
Greve geral – 1988 e 2010
Greve geral – 1988 e 2010Greve geral – 1988 e 2010
Greve geral – 1988 e 2010
 
Simulador..
Simulador..Simulador..
Simulador..
 
La tarara de natali rasouli
La tarara de natali rasouliLa tarara de natali rasouli
La tarara de natali rasouli
 
Módulo-padrão 6ºD
Módulo-padrão 6ºDMódulo-padrão 6ºD
Módulo-padrão 6ºD
 
Poliedros e arte
Poliedros e artePoliedros e arte
Poliedros e arte
 
Sharq ID- Romany
Sharq ID- RomanySharq ID- Romany
Sharq ID- Romany
 
Saúde
SaúdeSaúde
Saúde
 
Criação x..
Criação x..Criação x..
Criação x..
 
Estudos de Forma e Cor
Estudos de Forma e CorEstudos de Forma e Cor
Estudos de Forma e Cor
 
Mundial de brasil 2014
Mundial de brasil 2014Mundial de brasil 2014
Mundial de brasil 2014
 
Espectro Autista
Espectro Autista Espectro Autista
Espectro Autista
 
Pc
PcPc
Pc
 
Reporte de pelicula
Reporte de peliculaReporte de pelicula
Reporte de pelicula
 
Helmer las tic 11 (1)
Helmer las tic 11 (1)Helmer las tic 11 (1)
Helmer las tic 11 (1)
 
Appriciation mail from client -AA
Appriciation mail from client -AAAppriciation mail from client -AA
Appriciation mail from client -AA
 
2012: Tutorial sobre Sistemas de Recomendação para E-commerce
2012: Tutorial sobre Sistemas de Recomendação para E-commerce2012: Tutorial sobre Sistemas de Recomendação para E-commerce
2012: Tutorial sobre Sistemas de Recomendação para E-commerce
 
Políticas de informação
Políticas de informaçãoPolíticas de informação
Políticas de informação
 
Editorial
EditorialEditorial
Editorial
 

Similar to Cryptography (20)

3 pkc+rsa
3 pkc+rsa3 pkc+rsa
3 pkc+rsa
 
PUBLIC KEY & RSA.ppt
PUBLIC KEY & RSA.pptPUBLIC KEY & RSA.ppt
PUBLIC KEY & RSA.ppt
 
Introduction to cryptography
Introduction to cryptographyIntroduction to cryptography
Introduction to cryptography
 
Unit-III_3R-CRYPTO_2021-22_VSM.pptx
Unit-III_3R-CRYPTO_2021-22_VSM.pptxUnit-III_3R-CRYPTO_2021-22_VSM.pptx
Unit-III_3R-CRYPTO_2021-22_VSM.pptx
 
CNS.ppt
CNS.pptCNS.ppt
CNS.ppt
 
Unit --3.ppt
Unit --3.pptUnit --3.ppt
Unit --3.ppt
 
Rsa
RsaRsa
Rsa
 
RSA & MD5 algorithm
RSA & MD5 algorithmRSA & MD5 algorithm
RSA & MD5 algorithm
 
PKC&RSA
PKC&RSAPKC&RSA
PKC&RSA
 
Ch09
Ch09Ch09
Ch09
 
RSA
RSARSA
RSA
 
The rsa algorithm
The rsa algorithmThe rsa algorithm
The rsa algorithm
 
The rsa algorithm
The rsa algorithmThe rsa algorithm
The rsa algorithm
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
The rsa algorithm
The rsa algorithmThe rsa algorithm
The rsa algorithm
 
Pooguzhali
PooguzhaliPooguzhali
Pooguzhali
 
The rsa algorithm JooSeok Song
The rsa algorithm JooSeok SongThe rsa algorithm JooSeok Song
The rsa algorithm JooSeok Song
 
ch09_rsa_nemo.ppt
ch09_rsa_nemo.pptch09_rsa_nemo.ppt
ch09_rsa_nemo.ppt
 
RSA Algm.pptx
RSA Algm.pptxRSA Algm.pptx
RSA Algm.pptx
 
OS ppt Modified.pptx
OS ppt Modified.pptxOS ppt Modified.pptx
OS ppt Modified.pptx
 

Recently uploaded

Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIkoyaldeepu123
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixingviprabot1
 

Recently uploaded (20)

Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixing
 

Cryptography

  • 4. CRYPTOGRAPHY  CRYPTOGRAPHY plays major roles in fulfilling this demand.  Greek word meaning “Secret Writing”.  Science & art of transforming messages to make them secure & immune to attacks.
  • 5. COMPONENTS OF CRYPTOGRAPHY • Plaintext – Original message (message in its natural format readable by an attacker). • Ciphertext – Message altered to be unreadable by anyone. [ CIPHER refers to the encryption & decryption algorithms.] • Key – Sequence that controls the operation and behavior of the cryptographic algorithm. • Keyspace – Total number of possible values of keys in a crypto algorithm.
  • 6.
  • 8. 1. SYMMETRIC-KEY  Also known as SECRET-KEY Cryptography.  Same key is used for encryption and decryption i.e. shared key.  Main types –
  • 10. SUBSTITUTION CIPHERS • In this, letters/number/symbols of plaintext are replaced by other letters/numbers/symbols. e.g. A D, T Z 2 5, 3 6
  • 11. TRANSPOSITION CIPHERS • In the transposition technique the positions of letters/numbers/symbols in plaintext is changed with one another. Plain text: MEET ME AFTER PARTY Cipher text: TEMEEMEFAPTRYRAT Key Usec: 421635
  • 12. Data Encryption Standard (DES) • Developed by IBM. • Plaintext is processed in 64-bit blocks. • The DES algorithm is a careful and complex combination of two fundamental building blocks of encryption: – Substitution – Transposition • DES uses only standard arithmetic and logical operations on numbers up to 64 bits long. – Transforms 64-bit input in a series of steps into a 64-bit output – The same steps are used to decrypt messages – Sender and receiver share the same key (Symmetric) • Now considered to be insecure – Key size is 56 bits, considered to be too small
  • 13.
  • 14. Data Encryption Standard (DES) • 1st 64 bit plain text is handed over to initial permutation function. • IP is performed over the plain text. • IP produces two halves of the permuted blocks left plain text (LPT) & right plain text (RPT). • Now LPT & RPT goes 16 rounds of encryption process, each with its own key. • Now LPT & RPT are rejoined and FINAL PERMUTATION (FP) is performed on the combined block. • The result is 64 bit cipher text.
  • 15.
  • 16. ADVANTAGES • DES is also an ANSI and ISO standard - anybody can learn the details and implement it. • Hard to crack. DISADVANTAGES • Software implementations of DES are slow.
  • 17. TDES & AES • TDES – Triple DES – Use algorithm 3 times – 3 different keys (56-bits each) – 168 bits total (192 if parity bits are included) – Superceded by AES • AES – Advanced Encryption Standard – Fixed block size of 128 bits – Key size can be 128, 192, or 256 bits
  • 18. 2. ASYMMETRIC-KEY  Also knowns as PUBLIC-KEY Cryptography.  Sender & receiver use different keys for encryption & decryption namely PUBLIC & PRIVATE respectively.  Main algorithms –  RSA (Rivest, Shamir & Adleman)  Diffie - Hellman
  • 20. THE RSA ALGORITHM • Published by Ron Rivest, Adi Shamir, and Len Adleman in 1978. • Best known and widely used public-key scheme. • Block cipher in which plaintext and ciphertext are integers between 0 and n – 1 for some n.
  • 21. RSA KEY GENERATION 1) Select to prime numbers: p, q – Private, chosen 2) Calculate n = pq – Public, calculated 3) Calculate Φ(n) = (p-1)(q-1) 4) Select an integer e such that: – gcd(Φ(n), e) = 1 and 1 < e < Φ(n) – Public, chosen 5) Calculate d where d = e-1modΦ(n) – ed = 1 mod Φ(n) – Private, calculated
  • 22. RSA ENCRYPTION/DECRYPTION • To encrypt a message M the sender: – Obtains public key of recipient KU={e,n} – Computes: C = Me mod n • Where 0≤M<n • To decrypt the ciphertext C the owner: – Uses their private key KR={d,n} – Computes: M = Cd mod n
  • 23. EXAMPLE 1) Let p = 7 and q = 17 2) n = pq = 7 x 17 = 119 3) Φ(n) = (p-1)(q-1) = 6 X 16 = 96 4) Let e = 5 – gcd(Φ(n), e) = gcd(96,5) = 1 – 1 < 5 < 96 5) d = e-1 mod Φ(n) – Therefore, de = 1 mod 96 – d = 77 • 77 x 5 = 385 = 4 x 96 + 1 KEY GENERATION : The two resulting keys are as follows: – Public Key: KU = {e,n} = {5, 119} – Private Key: KR = {d,n} = {77, 119}
  • 24. ENCRYPTION • To encrypt a message M, where M = 19: – C = Me mod n – 195 mod 119 = 2476099 mod 119 – 2476099 / 119 = 20807 with a remainder of 66 – Therefore, C = 66 DECRYPTION • M = Cd mod n • 6677mod 119 = (1.27 x 10140) mod 119 • (1.27 x 10140) / 119 = (1.06 x 10138) with a remainder of 19 • Therefore, M = 19
  • 25. APPLICATIONS • Defense services • Secure data manipulation • E–commerce • Business transactions • Internet payment systems • User identification systems • Access control • Data security
  • 26. CONCLUSION By using of encryption techniques a fair unit of confidentiality, authentication, integrity, access control and availability of data is maintained.