Slideshare uses cookies to improve functionality and performance, and to provide you with relevant advertising. If you continue browsing the site, you agree to the use of cookies on this website. See our User Agreement and Privacy Policy.

Slideshare uses cookies to improve functionality and performance, and to provide you with relevant advertising. If you continue browsing the site, you agree to the use of cookies on this website. See our Privacy Policy and User Agreement for details.

Like this presentation? Why not share!

No Downloads

Total views

797

On SlideShare

0

From Embeds

0

Number of Embeds

3

Shares

0

Downloads

244

Comments

0

Likes

1

No embeds

No notes for slide

- 1. CryptographyPresented To:- Presented By:-Mr. Anurag Sharma Rohan Jain , CS B ,1000210077
- 2. Overview• Cryptography………………..……….An introduction• Objectives………………………………….Brief Aspect• Terminology……………..…..To Make You Familiar• How………………….…………………….Demonstration• Methods………………………….......Public & Private• Implementation………………..Hashing Algorithm• Cryptography in Networking Security………....…• Applications……………………………Real Life Scope
- 3. Introduction The Word Cryptology is made up of “Kryptos", which means hidden and “Logos" which means word. In Laymen Words, it is an Art and science of protecting data. Technically, It involves logical transformation of information. The Principles of Cryptography are today applied to the encryption of fax ,television, and computer network communications and many other fields. Since the secure exchange of computer data is of great importance to banking, government, and commercial communications as well as for individuals.
- 4. Objectives1)Confidentiality :-The information cannot be understood byanyone for whom it was unintended.2) Integrity :-The information cannot be altered in storage ortransit between sender and intended receiver without thealteration being detected. (Data Is Not Corrupted).3)Non-repudiation :-The creator/sender of the informationcannot deny at a later stage his or her intentions in thecreation or transmission of the information.4) Authentication :-The sender and receiver can confirm eachother’s identity and the origin/destination of the information.(Source Of Data IS Genuine).
- 5. TerminologyR O H A N J A I N Plain Text(Can Be Variable Length) Encryption Using Key Using Algorithms (MD4,MD5,SHA-1,RSA) Cipher Text 00 B8 3c Ef G0 Xh 99 3d 2f Using Algorithm (Same As Decryption Using Same Used To Encrypt the Text) KeysR O H A N J A I N
- 6. HOW…??A Simple Demonstration:-Substitution CipherTo Encode:-> S E C R E TKey :-> Offset the 3rd letter so the alphabets begin with it. So starting with:- ABCDEFGHIJKLMNOPQRSTUVWXYZ and sliding everything by 3, we get:- DEFGHIJKLMNOPQRSTUVWXYZABC So D=A, E=B, F=C…..and so on.Encoded:-> V H F U H WTo Decode:-> Provide anyone the key i.e., =>Offset the 3rd letter so the alphabets begin with it.
- 7. Cryptography Methods : Modern Cryptographyo Symmetric-Key Cryptography.o Asymmetric-Key Cryptography.o Cryptanalysis.
- 8. Private(Symmetric) CryptographyIn symmetric-key encryption each end already has a secret key(code) that it can use to encrypt a packet of information before itis sent over the network to another computer.
- 9. Private Cryptography Methods:-DES (Data Encryption Standard) AES(Advanced Encryption Standard)Older NewerBreakable UnbreakableSmaller Key (56-bit Encryption). Bigger Key(128/192bit /256 bit Encryption).7*10^16 Key Combinations. 3*10^35 Key Combinations.Smaller Block Size (64 bits). Larger Block Size (128bits).For DES with 64 bits, the maximum amount For AES with 128 bits, the maximumof data that can be transferred with a single amount of data that can be transferredencryption key is 32GB. with a single encryption key is 256 EB.
- 10. Public/Asymmetric CryptographyAsymmetric/Public encryption uses two different keys at oncei.e., combination of a private key and a public key. The privatekey is known only to your computer while the public key isgiven by your computer to any computer that wants tocommunicate securely with it. To decode anencrypted Message acomputer must use thepublic key provided byoriginating computer,and its own private key
- 11. Cryptanalysis The Study of methods to break Cryptosystems. Often targeted at obtaining a key. Cryptanalysis Attacks:-o Brute force o Trying all key values in the keyspace.o Frequency Analysis o Guess values based on frequency of occurrence.o Dictionary Attack o Find plaintext based on common words.
- 12. Implementation of Encryption Keys :Hash FunctionA hash function is any algorithm or subroutine that maps largedata sets of variable length to smaller data sets of a fixedlength. For example, a persons name, having a variablelength, could be hashed to a single integer.Basic Idea:-Input Number 10,667Hashing Function Input# x 143Hash Value 1,525,381Public keys generally use more complex algorithms and verylarge hash values for encrypting, including 40-bit or even 128-bit numbers. A 128-bit number has a possible 2128.
- 13. • The values returned by a hash function are called hash values, hash codes, digest ,hash sums, checksums or simply hashes.• A Cryptographic hash function (specifically, SHA-1) at work. Note that even small changes in the source input (here in the word "over") drastically change the resulting output. V U
- 14. Cryptography in Networking Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), are cryptographic protocols that provide communication security over the Internet. Several versions of the protocols are in widespread use in applications such as web browsing, electronic mail, Internet faxing, instant messaging and voice-over-IP (VoIP). When youre accessing sensitive information, such as an online bank account or a payment transfer service like PayPal or Google Checkout.
- 15. The client request the SSL connection by sending the request.Server provides it’s secure certificate to client to show it’sauthenticity.Client validates the certificate and request a one time sessionwith server.Server completes the SSL handshake and the session begins.
- 16. Applications• ATM Cards• E-Commerce• Computer Passwords• Electronic Fund Transfer• Digital Signatures• Network Security• Storage Integrity
- 17. References http://en.wikipedia.org/wiki/Cryptographyhttp://en.wikipedia.org/wiki/Cryptographic_hash functionhttp://computer.howstuffworks.com/encryption.ht mhttp://en.wikipedia.org/wiki/Secure_Sockets_Layer
- 18. Queries ??

No public clipboards found for this slide

×
### Save the most important slides with Clipping

Clipping is a handy way to collect and organize the most important slides from a presentation. You can keep your great finds in clipboards organized around topics.

Be the first to comment