SlideShare a Scribd company logo
1 of 14
By:- Sandip Kumar
BCA VIth
Roll- 17659
CRYPTOGRAPHY
• A word with Greek origins, means “ secret writing ”.
• The term to refer to the science and art of transforming
messages to make them secure and immune to attacks .
• Applications of cryptography includes ATM cards, computer
passwords, and electronic commerce .
CRYPTOGRAPHY ISSUES
•
•
•
•
•
Confidentiality: Only sender, intended receiver should “understand”
message contents.
End-Point Authentication : Sender and receiver want to confirm
identity of each other.
Message Integrity : Sender and receiver want to ensure message not
altered (in transit, or afterwards) without detection.
Message Nonrepudiation : Message nonrepudiation means that a
sender must not be able to deny sending a message that he or she,
in fact, did send.
Entity Authentication : In entity authentication (or user identification)
the entity or user is verified prior to access to the system resources
PLAINTEXT AND CIPHERTEXT
• The original message , before being transformed, is called
plaintext .
• After the message is transformed , it is called ciphertext .
• An encryption algorithm transforms the plaintext into
ciphertext; a decryption algorithm transforms the ciphertext
back into plaintext.
• Example:
• Plaintext: HELLO
• Ciphertext: KHOOR
CIPHER
• Encryption and Decryption algorithms are referred as ciphers.
• Also used to refer to different categories of algorithms in
cryptography.
• Example ( Traditional Substitution Ciphers ):
• Monoalphabetic cipher
• Polyalphabetic cipher
• Plaintext: HELLO
• Ciphertext: ABNZF
KEY
• A key is a number (or a set of numbers) that the cipher
operates on , as an algorithm.
• To encrypt a message, we need an encryption algorithm, an
encryption key, and the plaintext.
• To decrypt a message, we need a decryption algorithm, a
decryption key, and the ciphertext. These reveal the original
plaintext.
• Types:
• Shared key, Public key and Private key .
CRYPTOGRAPHY CATEGORIES
• We can divide all the cryptography algorithms (ciphers) into two
groups :
• Symmetric key (also called secret-key) cryptography
algorithms and
• Asymmetric key (also called public-key) cryptography
algorithms .
SYMMETRIC KEY
CRYPTOGRAPHY
• The same key encrypts and
decrypts the plaintext.
• The shared key is kept secret
between Alice and Bob.
• Examples of Symmetric
algorithms:
• DES, 3DES, AES, IDEA,
BLOWFISH, TWOFISH, RC4, RC5,
SAFER etc.
ASYMMETRIC KEY
CRYPTOGRAPHY
• Only 1 shared key is involved. • Here 2 keys : a private and a
public key are involved.
• The Public key encrypts the
plaintext while the private
key decrypts it.
• The private key is just kept
secret by the Bob while the
public key is made public .
• Examples of Asymmetric
algorithms:
• Diffie-Hellman, RSA, El Gamal,
MODERN ROUND CIPHERS
•
•
•
•
The ciphers of today are called round ciphers because they involve
multiple rounds , where each round is a complex cipher made up of
the simple ciphers.
The key used in each round is a subset or variation of the general key
called the round key .
If the cipher has N rounds, a key generator produces N keys, K1,
K2,...., KN, where K1 is used in round 1, K2 in round 2, and so on.
Modem symmetric-key ciphers: DES and AES are referred to as block
ciphers because they divide the plaintext into blocks and use the
same key to encrypt and decrypt the blocks.
DES - DATA ENCRYPTION STANDARD
• The algorithm encrypts a 64-bit plaintex t block using a 64-bit
key .
• DES has two transposition blocks (P-boxes) and 16 complex
round ciphers (they are repeated).
• Although the 16 iteration round ciphers are conceptually the
same, each uses a different key derived from the original key.
• The initial and final permutations are keyless straight
permutations that are the inverse of each other. The
permutation takes a 64-bit input and permutes them according
RSA ALGORITHM
• It uses two numbers, e and d, having a special relationship to
each other, as the public and private keys.
• Selecting Keys
Bob use the following steps to select the private and public keys:
1. Bob chooses two very large prime numbers p and q .
2. Bob multiplies the above two primes to find n, the modulus for
encryption and decryption. In other words, n = p X q .
3. Bob calculates another number φ = (p -1) X (q - 1) .
4. Bob chooses a random integer e . He then calculates d so that d x e = 1
mod φ .
5. Bob announces e and n to the public ; he keeps φ and d secret .
RSA ALGORITHM
• Encryption
•
•
•
•
Anyone who needs to send a message to Bob can use n and e .
For example, if Alice needs to send a message to Bob, she can change
the message , usually a short one, to an integer . This is the plaintext.
She then calculates the ciphertext , using e and n, as c = p e (mod n) .
Alice sends C, the ciphertext, to Bob.
• Decryption
• When Bob receives the ciphertext, he uses his private key d to decrypt
the message:
p = Data c d Communications (mod n)
CONCLUSION
• By using of encryption techniques a fair unit of confidentiality,
authentication, integrity, access control and availability of data
is maintained.
• Using cryptography Electronic Mail Security, Mail Security, IP
Security, Web security can be achieved.
THANK YOU

More Related Content

What's hot (20)

Cryptography
CryptographyCryptography
Cryptography
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
Cryptography
CryptographyCryptography
Cryptography
 
RSA Algorithm - Public Key Cryptography
RSA Algorithm - Public Key CryptographyRSA Algorithm - Public Key Cryptography
RSA Algorithm - Public Key Cryptography
 
Cryptanalysis
CryptanalysisCryptanalysis
Cryptanalysis
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementation
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography Intro
Cryptography IntroCryptography Intro
Cryptography Intro
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography Fundamentals
Cryptography FundamentalsCryptography Fundamentals
Cryptography Fundamentals
 
13 asymmetric key cryptography
13   asymmetric key cryptography13   asymmetric key cryptography
13 asymmetric key cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
cryptography ppt free download
cryptography ppt free downloadcryptography ppt free download
cryptography ppt free download
 
Cryptography
CryptographyCryptography
Cryptography
 
Overview of cryptography
Overview of cryptographyOverview of cryptography
Overview of cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 

Similar to Cryptography

Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & SteganographyAnimesh Shaw
 
Cryptography and steganography lesson and discription.pptx
Cryptography and steganography lesson and discription.pptxCryptography and steganography lesson and discription.pptx
Cryptography and steganography lesson and discription.pptxRobertCarreonBula
 
Cryptography and network security Nit701
Cryptography and network security Nit701Cryptography and network security Nit701
Cryptography and network security Nit701Amit Pathak
 
Classical Cryptography and Digital Encryption
Classical Cryptography and Digital EncryptionClassical Cryptography and Digital Encryption
Classical Cryptography and Digital EncryptionDamaineFranklinMScBE
 
Fundamentals of Information Encryption
Fundamentals of Information EncryptionFundamentals of Information Encryption
Fundamentals of Information EncryptionAmna Magzoub
 
Jaimin chp-8 - network security-new -use this - 2011 batch
Jaimin   chp-8 - network security-new -use this -  2011 batchJaimin   chp-8 - network security-new -use this -  2011 batch
Jaimin chp-8 - network security-new -use this - 2011 batchJaimin Jani
 
Public-Key Cryptography.pptx
Public-Key Cryptography.pptxPublic-Key Cryptography.pptx
Public-Key Cryptography.pptxAbdulRehman970300
 
Cryptography 1
Cryptography 1Cryptography 1
Cryptography 1bhanu7161
 
7-cryptography.ppt
7-cryptography.ppt7-cryptography.ppt
7-cryptography.pptGhamdan5
 
the art of the fking dum crypto_basic.ppt
the art of the fking dum crypto_basic.pptthe art of the fking dum crypto_basic.ppt
the art of the fking dum crypto_basic.pptjamkhan10
 
This is the presentation ofcryptography.ppt
This is the presentation ofcryptography.pptThis is the presentation ofcryptography.ppt
This is the presentation ofcryptography.pptvimalguptaofficial
 
Crytography CertCourse Module 1 & 2.ppt
Crytography CertCourse Module 1 & 2.pptCrytography CertCourse Module 1 & 2.ppt
Crytography CertCourse Module 1 & 2.pptMuhammadShajid1
 

Similar to Cryptography (20)

Cryptography
CryptographyCryptography
Cryptography
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & Steganography
 
Cryptography and steganography lesson and discription.pptx
Cryptography and steganography lesson and discription.pptxCryptography and steganography lesson and discription.pptx
Cryptography and steganography lesson and discription.pptx
 
Cryptography and network security Nit701
Cryptography and network security Nit701Cryptography and network security Nit701
Cryptography and network security Nit701
 
Crypt
CryptCrypt
Crypt
 
Classical Cryptography and Digital Encryption
Classical Cryptography and Digital EncryptionClassical Cryptography and Digital Encryption
Classical Cryptography and Digital Encryption
 
CNS - Unit - 4 - Public Key Cryptosystem
CNS - Unit - 4 - Public Key Cryptosystem CNS - Unit - 4 - Public Key Cryptosystem
CNS - Unit - 4 - Public Key Cryptosystem
 
Fundamentals of Information Encryption
Fundamentals of Information EncryptionFundamentals of Information Encryption
Fundamentals of Information Encryption
 
Jaimin chp-8 - network security-new -use this - 2011 batch
Jaimin   chp-8 - network security-new -use this -  2011 batchJaimin   chp-8 - network security-new -use this -  2011 batch
Jaimin chp-8 - network security-new -use this - 2011 batch
 
Public-Key Cryptography.pptx
Public-Key Cryptography.pptxPublic-Key Cryptography.pptx
Public-Key Cryptography.pptx
 
Security - ch3.pptx
Security - ch3.pptxSecurity - ch3.pptx
Security - ch3.pptx
 
Cns 1
Cns 1Cns 1
Cns 1
 
Cryptography 1
Cryptography 1Cryptography 1
Cryptography 1
 
Security - ch3.pptx
Security - ch3.pptxSecurity - ch3.pptx
Security - ch3.pptx
 
7-cryptography.ppt
7-cryptography.ppt7-cryptography.ppt
7-cryptography.ppt
 
7-cryptography.ppt
7-cryptography.ppt7-cryptography.ppt
7-cryptography.ppt
 
7-cryptography.ppt
7-cryptography.ppt7-cryptography.ppt
7-cryptography.ppt
 
the art of the fking dum crypto_basic.ppt
the art of the fking dum crypto_basic.pptthe art of the fking dum crypto_basic.ppt
the art of the fking dum crypto_basic.ppt
 
This is the presentation ofcryptography.ppt
This is the presentation ofcryptography.pptThis is the presentation ofcryptography.ppt
This is the presentation ofcryptography.ppt
 
Crytography CertCourse Module 1 & 2.ppt
Crytography CertCourse Module 1 & 2.pptCrytography CertCourse Module 1 & 2.ppt
Crytography CertCourse Module 1 & 2.ppt
 

Recently uploaded

Amazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptx
Amazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptxAmazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptx
Amazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptxAbdelrhman abooda
 
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改yuu sss
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptSonatrach
 
RadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdfRadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdfgstagge
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubaihf8803863
 
9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home Service9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home ServiceSapana Sha
 
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Jack DiGiovanna
 
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)jennyeacort
 
ASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel CanterASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel Cantervoginip
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...soniya singh
 
科罗拉多大学波尔得分校毕业证学位证成绩单-可办理
科罗拉多大学波尔得分校毕业证学位证成绩单-可办理科罗拉多大学波尔得分校毕业证学位证成绩单-可办理
科罗拉多大学波尔得分校毕业证学位证成绩单-可办理e4aez8ss
 
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...dajasot375
 
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一fhwihughh
 
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsappssapnasaifi408
 
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一F La
 
Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024Colleen Farrelly
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxStephen266013
 
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfLars Albertsson
 
DBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdfDBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdfJohn Sterrett
 

Recently uploaded (20)

Amazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptx
Amazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptxAmazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptx
Amazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptx
 
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
 
RadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdfRadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdf
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
 
9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home Service9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home Service
 
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
 
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
 
ASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel CanterASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel Canter
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
 
科罗拉多大学波尔得分校毕业证学位证成绩单-可办理
科罗拉多大学波尔得分校毕业证学位证成绩单-可办理科罗拉多大学波尔得分校毕业证学位证成绩单-可办理
科罗拉多大学波尔得分校毕业证学位证成绩单-可办理
 
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
 
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
 
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
 
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
 
Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docx
 
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdf
 
DBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdfDBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdf
 

Cryptography

  • 1. By:- Sandip Kumar BCA VIth Roll- 17659
  • 2. CRYPTOGRAPHY • A word with Greek origins, means “ secret writing ”. • The term to refer to the science and art of transforming messages to make them secure and immune to attacks . • Applications of cryptography includes ATM cards, computer passwords, and electronic commerce .
  • 3. CRYPTOGRAPHY ISSUES • • • • • Confidentiality: Only sender, intended receiver should “understand” message contents. End-Point Authentication : Sender and receiver want to confirm identity of each other. Message Integrity : Sender and receiver want to ensure message not altered (in transit, or afterwards) without detection. Message Nonrepudiation : Message nonrepudiation means that a sender must not be able to deny sending a message that he or she, in fact, did send. Entity Authentication : In entity authentication (or user identification) the entity or user is verified prior to access to the system resources
  • 4. PLAINTEXT AND CIPHERTEXT • The original message , before being transformed, is called plaintext . • After the message is transformed , it is called ciphertext . • An encryption algorithm transforms the plaintext into ciphertext; a decryption algorithm transforms the ciphertext back into plaintext. • Example: • Plaintext: HELLO • Ciphertext: KHOOR
  • 5. CIPHER • Encryption and Decryption algorithms are referred as ciphers. • Also used to refer to different categories of algorithms in cryptography. • Example ( Traditional Substitution Ciphers ): • Monoalphabetic cipher • Polyalphabetic cipher • Plaintext: HELLO • Ciphertext: ABNZF
  • 6. KEY • A key is a number (or a set of numbers) that the cipher operates on , as an algorithm. • To encrypt a message, we need an encryption algorithm, an encryption key, and the plaintext. • To decrypt a message, we need a decryption algorithm, a decryption key, and the ciphertext. These reveal the original plaintext. • Types: • Shared key, Public key and Private key .
  • 7. CRYPTOGRAPHY CATEGORIES • We can divide all the cryptography algorithms (ciphers) into two groups : • Symmetric key (also called secret-key) cryptography algorithms and • Asymmetric key (also called public-key) cryptography algorithms .
  • 8. SYMMETRIC KEY CRYPTOGRAPHY • The same key encrypts and decrypts the plaintext. • The shared key is kept secret between Alice and Bob. • Examples of Symmetric algorithms: • DES, 3DES, AES, IDEA, BLOWFISH, TWOFISH, RC4, RC5, SAFER etc. ASYMMETRIC KEY CRYPTOGRAPHY • Only 1 shared key is involved. • Here 2 keys : a private and a public key are involved. • The Public key encrypts the plaintext while the private key decrypts it. • The private key is just kept secret by the Bob while the public key is made public . • Examples of Asymmetric algorithms: • Diffie-Hellman, RSA, El Gamal,
  • 9. MODERN ROUND CIPHERS • • • • The ciphers of today are called round ciphers because they involve multiple rounds , where each round is a complex cipher made up of the simple ciphers. The key used in each round is a subset or variation of the general key called the round key . If the cipher has N rounds, a key generator produces N keys, K1, K2,...., KN, where K1 is used in round 1, K2 in round 2, and so on. Modem symmetric-key ciphers: DES and AES are referred to as block ciphers because they divide the plaintext into blocks and use the same key to encrypt and decrypt the blocks.
  • 10. DES - DATA ENCRYPTION STANDARD • The algorithm encrypts a 64-bit plaintex t block using a 64-bit key . • DES has two transposition blocks (P-boxes) and 16 complex round ciphers (they are repeated). • Although the 16 iteration round ciphers are conceptually the same, each uses a different key derived from the original key. • The initial and final permutations are keyless straight permutations that are the inverse of each other. The permutation takes a 64-bit input and permutes them according
  • 11. RSA ALGORITHM • It uses two numbers, e and d, having a special relationship to each other, as the public and private keys. • Selecting Keys Bob use the following steps to select the private and public keys: 1. Bob chooses two very large prime numbers p and q . 2. Bob multiplies the above two primes to find n, the modulus for encryption and decryption. In other words, n = p X q . 3. Bob calculates another number φ = (p -1) X (q - 1) . 4. Bob chooses a random integer e . He then calculates d so that d x e = 1 mod φ . 5. Bob announces e and n to the public ; he keeps φ and d secret .
  • 12. RSA ALGORITHM • Encryption • • • • Anyone who needs to send a message to Bob can use n and e . For example, if Alice needs to send a message to Bob, she can change the message , usually a short one, to an integer . This is the plaintext. She then calculates the ciphertext , using e and n, as c = p e (mod n) . Alice sends C, the ciphertext, to Bob. • Decryption • When Bob receives the ciphertext, he uses his private key d to decrypt the message: p = Data c d Communications (mod n)
  • 13. CONCLUSION • By using of encryption techniques a fair unit of confidentiality, authentication, integrity, access control and availability of data is maintained. • Using cryptography Electronic Mail Security, Mail Security, IP Security, Web security can be achieved.