Difference Between Search & Browse Methods in Odoo 17
Cryptography
1. KALYANI GOVERNMENT ENGINEERING COLLEGE
CRYPTOGRAPHY : OVERVIEW &
TECHNIQUES
Presented by
NILANJANA SAHA &
SHINJINI GHOSH
INFORMATION TECHNOLOGY DEPARTMENT
1ST YEAR
SESSION: EVEN SEMESTER ,2021
2. CONTENTS
WHAT IS CRYPTOGRAPHY ?
HISTORY OF CRYPTOGRAPHY
BASIC TERMS
CLASSIFICATION OF CRYPTOGRAPHY
COMPARISON
CIPHERS
CRYPTOGRAPHY TECHNIQUES
ADVANTAGES & DISADVANTAGES
APPLICATIONS
CONCLUSION
REFERENCES
3. WHAT IS CRYPTOGRAPHY ?
Cryptography is the art and science of achieving security by
encoding message to make them nonreadable.
4. HISTORY OF CRYPTOGRAPHY
The art of cryptography is considered to be born along with the art of writing. As civilizations
evolved, human beings got organized in tribes, groups, and kingdoms. This led to the emergence of
ideas such as power, battles, supremacy, and politics. These ideas further fuelled the natural need of
people to communicate secretly with selective recipient which in turn ensured the continuous
evolution of cryptography as well.
The first known evidence of cryptography can be traced to the use of ‘hieroglyph’. Some 4000 years
ago, the Egyptians used to communicate by messages written in hieroglyph.
7. SYMMETRIC KEY CRYPTOGRAPHY ASYMMETRIC KEY CRYPTOGRAPHY
The same algorithm with the
same key is used for the
encryption and decryption.
The key must be kept secret.
This technique is faster.
Usage : Confidentiality
One algorithm is used for encryption
and decryption with the pair of keys
one for encryption and one for
decryption.
One of the two key must be kept
secret.
This technique is comparatively
slower.
Usage : Confidentiality, Digital
signature etc.
COMPARISON
8. TRANSPOSITION CIPHER
In cryptography, a transposition cipher is a method of encryption by which the positions
held by units of plaintext (which are commonly characters or groups of characters) are
shifted according to a regular system, so that the ciphertext constitutes a permutation of the
plaintext.
The Rail Fence cipher is a form of transposition cipher that gets its name from the way in
which it is encoded. In the rail fence cipher, the plaintext is written downwards and
diagonally on successive "rails" of an imaginary fence, then moving up when we get to the
bottom. The message is then read off in rows. For example, using three "rails" and a
message of 'WE ARE DISCOVERED FLEE AT ONCE', the cipherer writes out:
Then reads off:
9. SUBSTITUTION CIPHER
In cryptography, a substitution cipher is a method of encrypting in which units
of plaintext are replaced with the ciphertext, in a defined manner, with the help of a key;
the "units" may be single letters (the most common), pairs of letters, triplets of letters,
mixtures of the above, and so forth.
ROT13 is a Caesar cipher, a type of substitution cipher. In ROT13, the alphabet is rotated
13 steps.
10. BLOCK CIPHER
In cryptography, a block cipher is a deterministic algorithm operating on fixed-length
groups of bits, called blocks. It uses an unvarying transformation, that is, it uses
a symmetric key. They are specified elementary components in the design of
many cryptographic protocols and are widely used to implement the encryption of large
amounts of data, including data exchange protocols.
Many block ciphers, such as DES and Blowfish utilize structures known as Feistel ciphers.
11. STREAM CIPHER
A stream cipher is a symmetric key cipher where plaintext digits are combined with
a pseudorandom cipher digit stream (keystream). In a stream cipher, each plaintext digit is
encrypted one at a time with the corresponding digit of the keystream, to give a digit of
the ciphertext stream. Since encryption of each digit is dependent on the current state of the
cipher, it is also known as state cipher. In practice, a digit is typically a bit and the
combining operation is an exclusive-or (XOR).
RC4 is one of the most widely used stream cipher designs.
17. ADVANTAGES
Confidentiality − Encryption technique can guard the information and
communication from unauthorized revelation and access of information.
Authentication − The cryptographic techniques such as MAC and digital
signatures can protect information against spoofing and forgeries.
Data Integrity − The cryptographic hash functions are playing vital role in
assuring the users about the data integrity.
Non-repudiation − The digital signature provides the non-repudiation service
to guard against the dispute that may arise due to denial of passing message by
the sender.
18. DISADVANTAGES
A strongly encrypted, authentic, and digitally signed information can be difficult to
access even for a legitimate user at a crucial time of decision-making. The network or
the computer system can be attacked and rendered non-functional by an intruder.
High availability, one of the fundamental aspects of information security, cannot be
ensured through the use of cryptography. Other methods are needed to guard against the
threats such as denial of service or complete breakdown of information system.
Another fundamental need of information security of selective access control also cannot
be realized through the use of cryptography. Administrative controls and procedures are
required to be exercised for the same.
Cryptography does not guard against the vulnerabilities and threats that emerge from
the poor design of systems, protocols, and procedures. These need to be fixed through
proper design and setting up of a defensive infrastructure.
The security of cryptographic technique is based on the computational difficulty of
mathematical problems. Any breakthrough in solving such mathematical problems or
increasing the computing power can render a cryptographic technique vulnerable.
19. Defence service
E – commerce
Business transactions
Internet payment system
User identification system
Access control
Data Security
Applications
20. Cryptography, being an art of encrypting and decrypting
confidential information and private messages, should be
implemented in the network security to prevent any leakage and
threat.
It can be done by using any of these techniques discussed above
for fortifying the personal data transmission as well as for secure
transaction.
conclusion
21. Yang, Sarah (14 September 2005), "Researchers recover typed
text using audio recording of keystrokes", UC Berkeley News.
Adi Shamir & Eran Tromer. "Acoustic cryptanalysis". Blavatnik
School of Computer Science, Tel Aviv University. Retrieved 1
November 2011.
http://en.wikipedia.org/wiki/Cryptography
https://www.coursera.org/course/cryptography
https://www.educba.com/cryptography-techniques
https://www.tutorialspoint.com/cryptography/origin_of_crypt
ography.htm
https://www.tutorialspoint.com/cryptography/benefitsanddra
wbacks.htm
References