SlideShare a Scribd company logo
1 of 15
1
Fluency with Information Technology
Lawrence Snyder
Chapter 17 Privacy & Digital Security
Encryption
2
Encryption And Decryption
Encryption Terminology
 Encryption: Transform representation so it is no
longer understandable
 Cryptosystem: A combination of encryption and
decryption methods
 Cleartext or Plaintext: Information before encryption
 Cipher text: Information in encrypted form
 One-way cipher: Encryption system that cannot be easily reversed
(used for passwords)
 Decryption: Reversing encryption process
3
Encryption And Decryption
To ensure the privacy of messages sent over a network between a source and
destination, the text can be encrypted.
 Cryptography - study of methods to encrypt text.
 Cryptanalysis - study of how to decode an encypted text.
Conventional or single key encryption - a simple algorithm is used to
transform the text
 substitution cipher - each letter of the alphabet is substituted with a different
letter or symbol.
 Ceasar's method - replace every letter in the alphabet with the letter 3 away
A - > D
B - > E
C - > F
. . .
X - > A
Y - > B
Z - > C
4
Encryption And Decryption
 Other substitution ciphers assign random substitutions, so they are a
bit harder to crack.
 The sender uses the encryption to encrypt the message
 The sender transmits the message to the receiver
 The receiver decodes the message
 How does the receiver decode the message? The sender needs to
send the key to the receiver.
 How can this be done securely so that no one else can decode the
message?
 To secure e-commerce transactions on the Web, the buyer’s machine
must encrypt the data before it sends it over the Internet to the
merchant’s Web server
5
Encryption And Decryption
 Most encryption algorithms use mathematical formulas and an
encryption key to encode the data
 The encryption key is a very large number used to encrypt and
decrypt the data
 The length of the key (the number of digits it contains)
determines how secure the data will be – the longer the key the
more secure the message
 Most encryption algorithms use key length between 40 and 128
bit or more
 Most Web browsers support these length keys
6
Encryption And Decryption
Symmetric/ Private Key Encryption
 Uses a single number key to encode and decode the data. Both the sender
and receiver must know the key
 DES (Data Encryption Standard) is the most widely used standard for
symmetric encryption
 Because each sender and receiver would require a different key, this type
of encryption is basically used by government entities
 It is rarely used for e-commerce transactions over the Internet
 Requires a secure way to get the key to both parties
7
Encryption And Decryption
Asymmetric / Public Key Encryption
 Uses two numeric keys
 The public key is available to anyone wishing to communicate securely with the
key’s owner
 The private key is available only to the owner
 Both keys are able to encrypt and decrypt each other’s messages
 It is computationally infeasible to deduce the private key from the public
key. Anyone who has a public key can encrypt information but cannot
decrypt it. Only the person who has the corresponding private key can
decrypt the information.
 Example: encode by raising to 5th
power and moding result with 91
Decode by raising to 29th
power mod 91
325
= 2 (mod 91) and 229
=32 (mod 91)
8
Assymetric Encryption
 Choose two large prime numbers, p and q and compute
N = p * q and x = (p-1)*(q-1)
 Choose a number relatively prime to x and call it e. This means
that e is not a prime factor of x or a multiple of it.
 Find d such that e * d = 1 mod x.
To encrypt: Cipher = Plaintexte
(mod n)
To decrypt: Plaintext = Cipherd
(mod n)
 Choose p = 7 and q = 13
 We then calculate N = 7 13 = 91 and x=(∗ p−1)(q−1) = 72
 We next select ke relatively prime to 72 and< 72, yielding 5
 Finally,we calculate kd such that kekd mod 72 = 1, yielding 29
 public key (ke, N) = (5, 91) and private key (kd ,N) = (29, 91)
32 codes in 2: 325
= 2 (mod 91)
2 decodes into 32: 229
=32 (mod 91)
9
Encryption And Decryption
Asymmetric / Public Key Encryption
 The primary benefit of asymmetric cryptography is that it allows people who
have no preexisting security arrangement to exchange messages securely.
 The need for sender and receiver to share secret keys via some secure
channel is eliminated
 all communications involve only public keys, and no private key is ever
transmitted or shared.
 Some examples of public-key cryptosystems are
 Elgamal (named for its inventor, Taher Elgamal)
 RSA (named for its inventors, Ron Rivest, Adi Shamir, and Leonard Adleman)
 Diffie-Hellman (named, you guessed it, for its inventors)
 DSA, the Digital Signature Algorithm (invented by David Kravitz).
 PGP (Pretty Good Privacy) is fairly popular and inexpensive
 Because conventional cryptography was once the only available means for
relaying secret information, the expense of secure channels and key
distribution relegated its use only to those who could afford it, such as
governments and large banks
 Public key encryption is the technological revolution that provides strong
cryptography to the public
10
Digital Certificates
Digital Certificates
 Use assymetric encryption to create digital signatures
 Used on the Internet to authenticate both users and vendors
 A digital certificate is a unique identifier assigned to a user/vendor by a
certification authority to verify the identity of the user/vendor
 A certification authority (such as VeriSign) is a private company that
certifies the user or vendor is who s/he claims to be
 Work together with credit card verification companies or other
financial institutions in order to verify the identity of the certificate’s
requesters
 Digital signature is an encrypted attachment added to the electronic
message to verify the sender’s identity
 The digital certificate received by the user includes a copy of its public
key
 This digital certificate’s owner makes its public key available to
anyone wanting to send encryped documents to the certificate’s
owner
11
Digital Signatures
Instead of encrypting information using someone else's public
key, you encrypt it with your private key. If the information
can be decrypted with your public key, then it must have
originated with you.
12
VeriSign – certification authority
13
How PGP Works - Encryption
 PGP combines some of the best features of both conventional and
public key cryptography; it’s a hybrid cryptosystem.
 When a user encrypts plaintext with PGP, PGP first compresses the
plaintext.
 Data compression saves transmission time and disk space and, more
importantly, strengthens cryptographic security.
 Most cryptanalysis techniques exploit patterns found in the plaintext to
crack the cipher. Compression reduces these patterns in the plaintext,
thereby greatly enhancing resistance to cryptanalysis.
 PGP then creates a session key, which is a one-time-only secret key.
 This key is a random number generated from the random movements of
your mouse and the keystrokes you type.
 This session key works with a very secure, fast conventional encryption
algorithm to encrypt the plaintext; the result is ciphertext.
 Once the data is encrypted, the session key is then encrypted to the
recipient's public key. This public key-encrypted session key is
transmitted along with the ciphertext to the recipient.
14
How PGP Works - Encryption
15
How PGP works - decryption
Decryption works in the reverse. The recipient's copy of PGP the private key
to recover the temporary session key, which PGP then uses to decrypt the
conventionally-encrypted ciphertext.
The combination of the two encryption methods combines the convenience of
public key encryption with the speed of conventional encryption. Conventional
encryption is about 1, 000 times faster than public key encryption. Public key
encryption in turn provides a solution to key distribution and data transmission
issues. Used together, performance and key distribution are improved without
any sacrifice in security.

More Related Content

What's hot

Seminar on Encryption and Authenticity
Seminar on Encryption and AuthenticitySeminar on Encryption and Authenticity
Seminar on Encryption and AuthenticityHardik Manocha
 
Data encryption standard
Data encryption standardData encryption standard
Data encryption standardPrasad Prabhu
 
Data Encryption Standard
Data Encryption StandardData Encryption Standard
Data Encryption StandardAmirul Wiramuda
 
6. cryptography
6. cryptography6. cryptography
6. cryptography7wounders
 
A study of cryptography for satellite applications
A study of cryptography for satellite applicationsA study of cryptography for satellite applications
A study of cryptography for satellite applicationsRajesh Ishida
 
Intro to modern cryptography
Intro to modern cryptographyIntro to modern cryptography
Intro to modern cryptographyzahid-mian
 
Basic Cryptography unit 4 CSS
Basic Cryptography unit 4 CSSBasic Cryptography unit 4 CSS
Basic Cryptography unit 4 CSSSURBHI SAROHA
 
Encryption And Decryption
Encryption And DecryptionEncryption And Decryption
Encryption And DecryptionNA
 
Different types of Symmetric key Cryptography
Different types of Symmetric key CryptographyDifferent types of Symmetric key Cryptography
Different types of Symmetric key Cryptographysubhradeep mitra
 
Cryptography and applications
Cryptography and applicationsCryptography and applications
Cryptography and applicationsthai
 
Hybrid Cryptography with examples in Ruby and Go
Hybrid Cryptography with examples in Ruby and GoHybrid Cryptography with examples in Ruby and Go
Hybrid Cryptography with examples in Ruby and GoEleanor McHugh
 
Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Hardik Manocha
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptographyVaibhav Khanna
 

What's hot (20)

Cryptography
CryptographyCryptography
Cryptography
 
Seminar on Encryption and Authenticity
Seminar on Encryption and AuthenticitySeminar on Encryption and Authenticity
Seminar on Encryption and Authenticity
 
Data encryption standard
Data encryption standardData encryption standard
Data encryption standard
 
Data Encryption Standard
Data Encryption StandardData Encryption Standard
Data Encryption Standard
 
Encryption
EncryptionEncryption
Encryption
 
Cryptography
CryptographyCryptography
Cryptography
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
A study of cryptography for satellite applications
A study of cryptography for satellite applicationsA study of cryptography for satellite applications
A study of cryptography for satellite applications
 
Cryptography
CryptographyCryptography
Cryptography
 
Intro to modern cryptography
Intro to modern cryptographyIntro to modern cryptography
Intro to modern cryptography
 
Cryptography - 101
Cryptography - 101Cryptography - 101
Cryptography - 101
 
Basic Cryptography unit 4 CSS
Basic Cryptography unit 4 CSSBasic Cryptography unit 4 CSS
Basic Cryptography unit 4 CSS
 
Encryption And Decryption
Encryption And DecryptionEncryption And Decryption
Encryption And Decryption
 
Different types of Symmetric key Cryptography
Different types of Symmetric key CryptographyDifferent types of Symmetric key Cryptography
Different types of Symmetric key Cryptography
 
Cryptography and applications
Cryptography and applicationsCryptography and applications
Cryptography and applications
 
Hybrid Cryptography with examples in Ruby and Go
Hybrid Cryptography with examples in Ruby and GoHybrid Cryptography with examples in Ruby and Go
Hybrid Cryptography with examples in Ruby and Go
 
Itt project
Itt projectItt project
Itt project
 
Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES)
 
Encryption
EncryptionEncryption
Encryption
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptography
 

Similar to Encryption

An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfAn Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfKailasS9
 
Computer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU LucknowComputer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU LucknowBrijesh Vishwakarma
 
Ch12 Encryption
Ch12 EncryptionCh12 Encryption
Ch12 Encryptionphanleson
 
PUBLIC KEY & RSA.ppt
PUBLIC KEY & RSA.pptPUBLIC KEY & RSA.ppt
PUBLIC KEY & RSA.pptRizwanBasha12
 
Encryption technology
Encryption technologyEncryption technology
Encryption technologyNeha Bhambu
 
Key distribution code.ppt
Key distribution code.pptKey distribution code.ppt
Key distribution code.pptPrabhat Kumar
 
White Paper on Cryptography
White Paper on Cryptography White Paper on Cryptography
White Paper on Cryptography Durgesh Malviya
 
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESValerie Felton
 
Email Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on AndroidEmail Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on AndroidIRJET Journal
 

Similar to Encryption (20)

An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfAn Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
 
Unit 7 : Network Security
Unit 7 : Network SecurityUnit 7 : Network Security
Unit 7 : Network Security
 
Computer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU LucknowComputer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU Lucknow
 
Introduction to cryptography
Introduction to cryptographyIntroduction to cryptography
Introduction to cryptography
 
Ch12 Encryption
Ch12 EncryptionCh12 Encryption
Ch12 Encryption
 
Encryption in Cryptography
Encryption in CryptographyEncryption in Cryptography
Encryption in Cryptography
 
PUBLIC KEY & RSA.ppt
PUBLIC KEY & RSA.pptPUBLIC KEY & RSA.ppt
PUBLIC KEY & RSA.ppt
 
Encryption technology
Encryption technologyEncryption technology
Encryption technology
 
Cryptography
CryptographyCryptography
Cryptography
 
IS-cryptograpy algorithms.pptx
IS-cryptograpy algorithms.pptxIS-cryptograpy algorithms.pptx
IS-cryptograpy algorithms.pptx
 
Key distribution code.ppt
Key distribution code.pptKey distribution code.ppt
Key distribution code.ppt
 
Rsa Crptosystem
Rsa CrptosystemRsa Crptosystem
Rsa Crptosystem
 
Java Crypto
Java CryptoJava Crypto
Java Crypto
 
White Paper on Cryptography
White Paper on Cryptography White Paper on Cryptography
White Paper on Cryptography
 
Elementry Cryptography
Elementry CryptographyElementry Cryptography
Elementry Cryptography
 
Public key algorithm
Public key algorithmPublic key algorithm
Public key algorithm
 
Rsa
RsaRsa
Rsa
 
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
 
Pooguzhali
PooguzhaliPooguzhali
Pooguzhali
 
Email Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on AndroidEmail Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on Android
 

More from Naiyan Noor

Diploma in Computer Science and ICT.pdf
Diploma in Computer Science and ICT.pdfDiploma in Computer Science and ICT.pdf
Diploma in Computer Science and ICT.pdfNaiyan Noor
 
Advanced Learning Algorithms.pdf
Advanced Learning Algorithms.pdfAdvanced Learning Algorithms.pdf
Advanced Learning Algorithms.pdfNaiyan Noor
 
HTML and CSS in depth.pdf
HTML and CSS in depth.pdfHTML and CSS in depth.pdf
HTML and CSS in depth.pdfNaiyan Noor
 
Skills Development for Mobile Game and Application Project..Naiyan noor
Skills Development for Mobile Game and Application Project..Naiyan noorSkills Development for Mobile Game and Application Project..Naiyan noor
Skills Development for Mobile Game and Application Project..Naiyan noorNaiyan Noor
 
English for Career Development Naiyan Noor.pdf
English for Career Development Naiyan Noor.pdfEnglish for Career Development Naiyan Noor.pdf
English for Career Development Naiyan Noor.pdfNaiyan Noor
 
Data Visualization with Python.....Naiyan Noor.pdf
Data Visualization with Python.....Naiyan Noor.pdfData Visualization with Python.....Naiyan Noor.pdf
Data Visualization with Python.....Naiyan Noor.pdfNaiyan Noor
 
Databases and SQL for Data Science with Python...Naiyan Noor.pdf
Databases and SQL for Data Science with Python...Naiyan Noor.pdfDatabases and SQL for Data Science with Python...Naiyan Noor.pdf
Databases and SQL for Data Science with Python...Naiyan Noor.pdfNaiyan Noor
 
Data Science Methodology...Naiyan Noor.pdf
Data Science Methodology...Naiyan Noor.pdfData Science Methodology...Naiyan Noor.pdf
Data Science Methodology...Naiyan Noor.pdfNaiyan Noor
 
Tools for Data Science ...Naiyan Noor.pdf
Tools for Data Science ...Naiyan Noor.pdfTools for Data Science ...Naiyan Noor.pdf
Tools for Data Science ...Naiyan Noor.pdfNaiyan Noor
 
What is Data Science? ... Naiyan Noor.pdf
What is Data Science? ... Naiyan Noor.pdfWhat is Data Science? ... Naiyan Noor.pdf
What is Data Science? ... Naiyan Noor.pdfNaiyan Noor
 
Programming for Everybody (Getting Started with Python)...Naiyan Noor.pdf
Programming for Everybody (Getting Started with Python)...Naiyan Noor.pdfProgramming for Everybody (Getting Started with Python)...Naiyan Noor.pdf
Programming for Everybody (Getting Started with Python)...Naiyan Noor.pdfNaiyan Noor
 
HTML, CSS, and Javascript for Web Developers ...Naiyan Noor.pdf
HTML, CSS, and Javascript for Web Developers ...Naiyan Noor.pdfHTML, CSS, and Javascript for Web Developers ...Naiyan Noor.pdf
HTML, CSS, and Javascript for Web Developers ...Naiyan Noor.pdfNaiyan Noor
 
Introduction to Data Science Naiyan Noor.pdf
Introduction to Data Science Naiyan Noor.pdfIntroduction to Data Science Naiyan Noor.pdf
Introduction to Data Science Naiyan Noor.pdfNaiyan Noor
 
Coursera Programming Foundations with JavaScript, HTML and CSS ....Naiyan Noo...
Coursera Programming Foundations with JavaScript, HTML and CSS ....Naiyan Noo...Coursera Programming Foundations with JavaScript, HTML and CSS ....Naiyan Noo...
Coursera Programming Foundations with JavaScript, HTML and CSS ....Naiyan Noo...Naiyan Noor
 
Social Media Marketing powered by HP....Naiyan Noor.pdf
Social Media Marketing powered by HP....Naiyan Noor.pdfSocial Media Marketing powered by HP....Naiyan Noor.pdf
Social Media Marketing powered by HP....Naiyan Noor.pdfNaiyan Noor
 
Motor Driving Training with Basic Maintenance. SEIP ..Naiyan Noor.pdf
Motor Driving Training with Basic Maintenance. SEIP  ..Naiyan Noor.pdfMotor Driving Training with Basic Maintenance. SEIP  ..Naiyan Noor.pdf
Motor Driving Training with Basic Maintenance. SEIP ..Naiyan Noor.pdfNaiyan Noor
 
Web Application Development using PHP and Laravel -Naiyan Noor .pdf
Web Application Development using PHP and Laravel -Naiyan Noor .pdfWeb Application Development using PHP and Laravel -Naiyan Noor .pdf
Web Application Development using PHP and Laravel -Naiyan Noor .pdfNaiyan Noor
 
Python Course Basic
Python Course BasicPython Course Basic
Python Course BasicNaiyan Noor
 
Linux Presentation
Linux PresentationLinux Presentation
Linux PresentationNaiyan Noor
 
UQx ieltsx certificate | edX
UQx ieltsx certificate | edXUQx ieltsx certificate | edX
UQx ieltsx certificate | edXNaiyan Noor
 

More from Naiyan Noor (20)

Diploma in Computer Science and ICT.pdf
Diploma in Computer Science and ICT.pdfDiploma in Computer Science and ICT.pdf
Diploma in Computer Science and ICT.pdf
 
Advanced Learning Algorithms.pdf
Advanced Learning Algorithms.pdfAdvanced Learning Algorithms.pdf
Advanced Learning Algorithms.pdf
 
HTML and CSS in depth.pdf
HTML and CSS in depth.pdfHTML and CSS in depth.pdf
HTML and CSS in depth.pdf
 
Skills Development for Mobile Game and Application Project..Naiyan noor
Skills Development for Mobile Game and Application Project..Naiyan noorSkills Development for Mobile Game and Application Project..Naiyan noor
Skills Development for Mobile Game and Application Project..Naiyan noor
 
English for Career Development Naiyan Noor.pdf
English for Career Development Naiyan Noor.pdfEnglish for Career Development Naiyan Noor.pdf
English for Career Development Naiyan Noor.pdf
 
Data Visualization with Python.....Naiyan Noor.pdf
Data Visualization with Python.....Naiyan Noor.pdfData Visualization with Python.....Naiyan Noor.pdf
Data Visualization with Python.....Naiyan Noor.pdf
 
Databases and SQL for Data Science with Python...Naiyan Noor.pdf
Databases and SQL for Data Science with Python...Naiyan Noor.pdfDatabases and SQL for Data Science with Python...Naiyan Noor.pdf
Databases and SQL for Data Science with Python...Naiyan Noor.pdf
 
Data Science Methodology...Naiyan Noor.pdf
Data Science Methodology...Naiyan Noor.pdfData Science Methodology...Naiyan Noor.pdf
Data Science Methodology...Naiyan Noor.pdf
 
Tools for Data Science ...Naiyan Noor.pdf
Tools for Data Science ...Naiyan Noor.pdfTools for Data Science ...Naiyan Noor.pdf
Tools for Data Science ...Naiyan Noor.pdf
 
What is Data Science? ... Naiyan Noor.pdf
What is Data Science? ... Naiyan Noor.pdfWhat is Data Science? ... Naiyan Noor.pdf
What is Data Science? ... Naiyan Noor.pdf
 
Programming for Everybody (Getting Started with Python)...Naiyan Noor.pdf
Programming for Everybody (Getting Started with Python)...Naiyan Noor.pdfProgramming for Everybody (Getting Started with Python)...Naiyan Noor.pdf
Programming for Everybody (Getting Started with Python)...Naiyan Noor.pdf
 
HTML, CSS, and Javascript for Web Developers ...Naiyan Noor.pdf
HTML, CSS, and Javascript for Web Developers ...Naiyan Noor.pdfHTML, CSS, and Javascript for Web Developers ...Naiyan Noor.pdf
HTML, CSS, and Javascript for Web Developers ...Naiyan Noor.pdf
 
Introduction to Data Science Naiyan Noor.pdf
Introduction to Data Science Naiyan Noor.pdfIntroduction to Data Science Naiyan Noor.pdf
Introduction to Data Science Naiyan Noor.pdf
 
Coursera Programming Foundations with JavaScript, HTML and CSS ....Naiyan Noo...
Coursera Programming Foundations with JavaScript, HTML and CSS ....Naiyan Noo...Coursera Programming Foundations with JavaScript, HTML and CSS ....Naiyan Noo...
Coursera Programming Foundations with JavaScript, HTML and CSS ....Naiyan Noo...
 
Social Media Marketing powered by HP....Naiyan Noor.pdf
Social Media Marketing powered by HP....Naiyan Noor.pdfSocial Media Marketing powered by HP....Naiyan Noor.pdf
Social Media Marketing powered by HP....Naiyan Noor.pdf
 
Motor Driving Training with Basic Maintenance. SEIP ..Naiyan Noor.pdf
Motor Driving Training with Basic Maintenance. SEIP  ..Naiyan Noor.pdfMotor Driving Training with Basic Maintenance. SEIP  ..Naiyan Noor.pdf
Motor Driving Training with Basic Maintenance. SEIP ..Naiyan Noor.pdf
 
Web Application Development using PHP and Laravel -Naiyan Noor .pdf
Web Application Development using PHP and Laravel -Naiyan Noor .pdfWeb Application Development using PHP and Laravel -Naiyan Noor .pdf
Web Application Development using PHP and Laravel -Naiyan Noor .pdf
 
Python Course Basic
Python Course BasicPython Course Basic
Python Course Basic
 
Linux Presentation
Linux PresentationLinux Presentation
Linux Presentation
 
UQx ieltsx certificate | edX
UQx ieltsx certificate | edXUQx ieltsx certificate | edX
UQx ieltsx certificate | edX
 

Recently uploaded

Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixingviprabot1
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIkoyaldeepu123
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 

Recently uploaded (20)

Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixing
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 

Encryption

  • 1. 1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption
  • 2. 2 Encryption And Decryption Encryption Terminology  Encryption: Transform representation so it is no longer understandable  Cryptosystem: A combination of encryption and decryption methods  Cleartext or Plaintext: Information before encryption  Cipher text: Information in encrypted form  One-way cipher: Encryption system that cannot be easily reversed (used for passwords)  Decryption: Reversing encryption process
  • 3. 3 Encryption And Decryption To ensure the privacy of messages sent over a network between a source and destination, the text can be encrypted.  Cryptography - study of methods to encrypt text.  Cryptanalysis - study of how to decode an encypted text. Conventional or single key encryption - a simple algorithm is used to transform the text  substitution cipher - each letter of the alphabet is substituted with a different letter or symbol.  Ceasar's method - replace every letter in the alphabet with the letter 3 away A - > D B - > E C - > F . . . X - > A Y - > B Z - > C
  • 4. 4 Encryption And Decryption  Other substitution ciphers assign random substitutions, so they are a bit harder to crack.  The sender uses the encryption to encrypt the message  The sender transmits the message to the receiver  The receiver decodes the message  How does the receiver decode the message? The sender needs to send the key to the receiver.  How can this be done securely so that no one else can decode the message?  To secure e-commerce transactions on the Web, the buyer’s machine must encrypt the data before it sends it over the Internet to the merchant’s Web server
  • 5. 5 Encryption And Decryption  Most encryption algorithms use mathematical formulas and an encryption key to encode the data  The encryption key is a very large number used to encrypt and decrypt the data  The length of the key (the number of digits it contains) determines how secure the data will be – the longer the key the more secure the message  Most encryption algorithms use key length between 40 and 128 bit or more  Most Web browsers support these length keys
  • 6. 6 Encryption And Decryption Symmetric/ Private Key Encryption  Uses a single number key to encode and decode the data. Both the sender and receiver must know the key  DES (Data Encryption Standard) is the most widely used standard for symmetric encryption  Because each sender and receiver would require a different key, this type of encryption is basically used by government entities  It is rarely used for e-commerce transactions over the Internet  Requires a secure way to get the key to both parties
  • 7. 7 Encryption And Decryption Asymmetric / Public Key Encryption  Uses two numeric keys  The public key is available to anyone wishing to communicate securely with the key’s owner  The private key is available only to the owner  Both keys are able to encrypt and decrypt each other’s messages  It is computationally infeasible to deduce the private key from the public key. Anyone who has a public key can encrypt information but cannot decrypt it. Only the person who has the corresponding private key can decrypt the information.  Example: encode by raising to 5th power and moding result with 91 Decode by raising to 29th power mod 91 325 = 2 (mod 91) and 229 =32 (mod 91)
  • 8. 8 Assymetric Encryption  Choose two large prime numbers, p and q and compute N = p * q and x = (p-1)*(q-1)  Choose a number relatively prime to x and call it e. This means that e is not a prime factor of x or a multiple of it.  Find d such that e * d = 1 mod x. To encrypt: Cipher = Plaintexte (mod n) To decrypt: Plaintext = Cipherd (mod n)  Choose p = 7 and q = 13  We then calculate N = 7 13 = 91 and x=(∗ p−1)(q−1) = 72  We next select ke relatively prime to 72 and< 72, yielding 5  Finally,we calculate kd such that kekd mod 72 = 1, yielding 29  public key (ke, N) = (5, 91) and private key (kd ,N) = (29, 91) 32 codes in 2: 325 = 2 (mod 91) 2 decodes into 32: 229 =32 (mod 91)
  • 9. 9 Encryption And Decryption Asymmetric / Public Key Encryption  The primary benefit of asymmetric cryptography is that it allows people who have no preexisting security arrangement to exchange messages securely.  The need for sender and receiver to share secret keys via some secure channel is eliminated  all communications involve only public keys, and no private key is ever transmitted or shared.  Some examples of public-key cryptosystems are  Elgamal (named for its inventor, Taher Elgamal)  RSA (named for its inventors, Ron Rivest, Adi Shamir, and Leonard Adleman)  Diffie-Hellman (named, you guessed it, for its inventors)  DSA, the Digital Signature Algorithm (invented by David Kravitz).  PGP (Pretty Good Privacy) is fairly popular and inexpensive  Because conventional cryptography was once the only available means for relaying secret information, the expense of secure channels and key distribution relegated its use only to those who could afford it, such as governments and large banks  Public key encryption is the technological revolution that provides strong cryptography to the public
  • 10. 10 Digital Certificates Digital Certificates  Use assymetric encryption to create digital signatures  Used on the Internet to authenticate both users and vendors  A digital certificate is a unique identifier assigned to a user/vendor by a certification authority to verify the identity of the user/vendor  A certification authority (such as VeriSign) is a private company that certifies the user or vendor is who s/he claims to be  Work together with credit card verification companies or other financial institutions in order to verify the identity of the certificate’s requesters  Digital signature is an encrypted attachment added to the electronic message to verify the sender’s identity  The digital certificate received by the user includes a copy of its public key  This digital certificate’s owner makes its public key available to anyone wanting to send encryped documents to the certificate’s owner
  • 11. 11 Digital Signatures Instead of encrypting information using someone else's public key, you encrypt it with your private key. If the information can be decrypted with your public key, then it must have originated with you.
  • 13. 13 How PGP Works - Encryption  PGP combines some of the best features of both conventional and public key cryptography; it’s a hybrid cryptosystem.  When a user encrypts plaintext with PGP, PGP first compresses the plaintext.  Data compression saves transmission time and disk space and, more importantly, strengthens cryptographic security.  Most cryptanalysis techniques exploit patterns found in the plaintext to crack the cipher. Compression reduces these patterns in the plaintext, thereby greatly enhancing resistance to cryptanalysis.  PGP then creates a session key, which is a one-time-only secret key.  This key is a random number generated from the random movements of your mouse and the keystrokes you type.  This session key works with a very secure, fast conventional encryption algorithm to encrypt the plaintext; the result is ciphertext.  Once the data is encrypted, the session key is then encrypted to the recipient's public key. This public key-encrypted session key is transmitted along with the ciphertext to the recipient.
  • 14. 14 How PGP Works - Encryption
  • 15. 15 How PGP works - decryption Decryption works in the reverse. The recipient's copy of PGP the private key to recover the temporary session key, which PGP then uses to decrypt the conventionally-encrypted ciphertext. The combination of the two encryption methods combines the convenience of public key encryption with the speed of conventional encryption. Conventional encryption is about 1, 000 times faster than public key encryption. Public key encryption in turn provides a solution to key distribution and data transmission issues. Used together, performance and key distribution are improved without any sacrifice in security.