SlideShare a Scribd company logo
1 of 37
Download to read offline
Information Security
Mamoona Jabbar
Information Security
Topic: Cryptology
Origins of Cryptography
Inherent needs as human being:
a. To communicate and share information and
b. To communicate selectively
These two needs gave rise to the art of coding the messages in such
a way that only the intended people could have access to the
information. Unauthorized people could not extract any information,
even if the scrambled messages fell in their hand.
The art and science of concealing the messages to introduce secrecy
in information security is recognized as cryptography.
Origins of Cryptography
The word ‘cryptography’ was coined by combining two Greek
words, ‘Krypto’ meaning hidden and ‘graphene’ meaning
writing.
History of Cryptography
The art of cryptography is considered to be born along with the
art of writing. As civilizations evolved, human beings got
organized in tribes, groups, and kingdoms. This led to the
emergence of ideas such as power, battles, supremacy, and
politics. These ideas further fueled the natural need of people to
communicate secretly with selective recipient which in turn
ensured the continuous evolution of cryptography as well.
The roots of cryptography are found in Roman and Egyptian
civilizations.
Cryptographic Technique
Cryptographic Technique
1. Hieroglyph
2. Symmetric Encryption
3. Asymmetric Encryption
4. Steganography
5. Hashing
Hieroglyph
4000 years ago, the Egyptians used to communicate by messages
written in hieroglyph. This code was the secret known only to the
scribes who used to transmit messages on behalf of the kings.
One such hieroglyph is shown below.
Hieroglyph
Later, using simple mono-alphabetic substitution ciphers during
500 to 600 BC. This involved replacing alphabets of message
with other alphabets with some secret rule.
This rule became a key to retrieve the message back from the
garbled message. The earlier Roman method of cryptography,
popularly known as the Caesar Shift Cipher, relies on shifting
the letters of a message by an agreed number (three was a
common choice), the recipient of this message would then shift
the letters back by the same number and obtain the original
message.
Symmetric Encryption
• Symmetrical encryption is a type of encryption that is used for
the encryption and decryption of electronic data by just one
secret key. Substitution ciphers are symmetrical encryption
techniques, but modern symmetric encryption can be much more
complicated.
• Data are converted to a method that cannot be understood by
anyone without a secret key to decrypt it using symmetrical
encryption algorithms.
• Symmetric encryption is an old algorithm but it is faster and
efficient than asymmetric encryption. Because of great
performance and fast speed of symmetric as compare to
asymmetric encryption.
Symmetric Encryption
• Whereas Symmetric key cryptography involves the usage of
the same key for encryption and decryption. While
Asymmetric key cryptography involves the usage of one key
for encryption and another different key for decryption.
• Symmetric encryption is typical for big quantities of
information, e.g. for database encryption, in bulk encryption.
In the case of a database, the secret key can only be encrypted
or decrypted by the database itself.
Symmetric Encryption
Two kinds of symmetrical encryption algorithms are available:
1. Block Algorithm
2. Stream Algorithm
Block Algorithm:
The set of bits is encoded with a specific secret key in electronic
data blocks. The system keeps the data in its memory while it
waiting to get complete blocks when the data are encrypted.
Some important Block cipher algorithms are DES, Triple DES,
AES, etc.
Symmetric Encryption
Stream Cipher Algorithm:
In this, Plain text numbers or characters are combined with
pseudorandom cipher digit stream. Some important Stream cipher
algorithms are RC4, A5, BLOWFISH, etc. In symmetric key
encryption, The encryption code can be cracked if someone finds
out the symmetric key. But this problem can be overcome with the
Diffie-Hellman algorithm. In the Diffie-Hellman key exchange or
agreement algorithm, the sender and receiver must agree on a
symmetric key using this technique. This key can then be used for
an encryption or decryption purpose.
Asymmetric Encryption
• Asymmetric encryption is also called public-key
cryptography. Asymmetric key encryption helps to resolve a
key exchange problem of symmetric key Cryptography. In
Asymmetric encryption, Two keys are used to encrypt plain
text in asymmetrical encryption. Through the internet or big
network, the secret keys are exchanged. It is necessary to
notice that anyone with a secret key can decrypt the message,
so asymmetric encryption is using two corresponding keys to
increase safety.
Asymmetric Encryption
• Anyone who wishes to send you a message will have a public
key freely accessible but the second private key is held the
secret for you to understand you only. A message encrypted
with a public key can be decoded with a private key. A
message encrypted with a private key can also be decrypted
with a public key.
Steganography
• Steganography is a technique that facilitates the hiring of a
message that is to be kept secret inside other messages. Earlier,
people used methods to hide messages such as invisible ink,
minute variations, etc.
• But in an age of technology, Steganography is a technique to
conceal data that can be the file, message, image, etc inside
other files, message or images.
Steganography
• Example: Invisible watermarking
• In steganography, an unintended recipient or an intruder is
unaware of the fact that observed data contains hidden
information. In cryptography, an intruder is normally aware that
data is being communicated, because they can see the
coded/scrambled message.
Hashing
• Hashing is the cryptographic technique that converts data which
can be any form into a unique string. Regardless of size or type,
any data can be hashed using a hashing algorithm. It takes data
of random length and converts it into fixed hashed value.
• Hashing is different from other encryption methods because, in
hashing, encryption cannot be reversed that is cannot be
decrypted using keys. MD5, SHA1, SHA 256 are the widely
used hashing algorithms.
Evolution of Cryptography
Evolution of Cryptography
• Improved coding techniques such as Vigenere Coding came
into existence in the 15th century, which offered moving letters
in the message with a number of variable places instead of
moving them the same number of places.
• Only after the 19th century, cryptography evolved from the ad
hoc approaches to encryption to the more sophisticated art and
science of information security.
Evolution of Cryptography
• In the early 20th century, the invention of mechanical and
electromechanical machines, such as the Enigma rotor
machine, provided more advanced and efficient means of
coding the information.
• During the period of World War II, both cryptography and
cryptanalysis became excessively mathematical.
Modern Cryptography
Modern Cryptography
• Modern cryptography is the cornerstone of computer and
communications security. Its foundation is based on various
concepts of mathematics such as number theory, computational-
complexity theory, and probability theory.
Characteristics of Modern Cryptography
Classic Cryptography Modern Cryptography
It manipulates traditional characters, i.e.,
letters and digits directly.
It operates on binary bit sequences.
It is mainly based on ‘security through
obscurity’. The techniques employed for
coding were kept secret and only the
parties involved in communication knew
about them.
It relies on publicly known mathematical
algorithms for coding the information.
Secrecy is obtained through a secrete key
which is used as the seed for the algorithm.
The computational difficulty of algorithms,
absence of secret key, etc., make it
impossible for an attacker to obtain the
original information even if he knows the
algorithm used for coding.
It requires the entire cryptosystem for
communicating confidentially.
Modern cryptography requires parties
interested in secure communication to
possess the secret key only.
Context of Cryptography
Cryptology, the study of cryptosystems, can be subdivided into two
branches −
• Cryptography
Cryptography is the art and science of making a cryptosystem
that is capable of providing information security.
• Cryptanalysis
The art and science of breaking the cipher text is known as
cryptanalysis.
Cryptanalysis is the sister branch of cryptography and they both co-
exist. The cryptographic process results in the cipher text for
transmission or storage. It involves the study of cryptographic
mechanism with the intention to break them. Cryptanalysis is also
used during the design of the new cryptographic techniques to test
their security strengths.
Context of Cryptography
Note:
Cryptography concerns with the design of
cryptosystems, while cryptanalysis studies the
breaking of cryptosystems.
Security Services of Cryptography
The primary objective of using cryptography is to provide the
following four fundamental information security services. Let us
now see the possible goals intended to be fulfilled by cryptography.
1. Confidentially
It is a security service that keeps the information from an
unauthorized person. It is sometimes referred to as privacy or
secrecy.
Security Services of Cryptography
2. Data integrity
It is security service that deals with identifying any
alteration to the data. The data may get modified by an unauthorized
entity intentionally or accidently. Integrity service confirms that
whether data is intact or not since it was last created, transmitted, or
stored by an authorized user.
Data integrity cannot prevent the alteration of data, but
provides a means for detecting whether data has been manipulated in
an unauthorized manner.
Security Services of Cryptography
3. Authentication
Authentication provides the identification of the originator. It
confirms to the receiver that the data received has been sent only by
an identified and verified sender.
Authentication service has two variants −
• Message authentication identifies the originator of the
message without any regard router or system that has sent the
message.
• Entity authentication is assurance that data has been
received from a specific entity, say a particular website
Security Services of Cryptography
4. Non-repudiation
It is a security service that ensures that an entity cannot refuse
the ownership of a previous commitment or an action. It is an
assurance that the original creator of the data cannot deny the
creation or transmission of the said data to a recipient or third
party.
Example: Once an order is placed electronically, a purchaser
cannot deny the purchase order, if non-repudiation service was
enabled in this transaction.
Cryptography Primitives
Cryptography primitives are nothing but the tools and techniques in
Cryptography that can be selectively used to provide a set of
desired security services:
• Encryption
• Hash functions
• Message Authentication codes (MAC)
• Digital Signatures
Cryptography Primitives
The following table shows the primitives that can achieve a
particular security service on their own.
Note − Cryptographic primitives are intricately related and they are
often combined to achieve a set of desired security services from a
cryptosystem
Cryptosystem
A cryptosystem is an implementation of cryptographic techniques
and their accompanying infrastructure to provide information
security services. A cryptosystem is also referred to as a cipher
system.
Model of a cryptosystem
Components of Cryptosystem
• Plaintext
• Encryption Algorithm
• Cipher text
• Decryption Algorithm
• Encryption Key
• Decryption Key
Types of Cryptosystem
1. Symmetric key Encryption
2. Asymmetric key Encryption
Types of Cryptosystem
1. Symmetric key Encryption
The encryption process where same keys are used for
encrypting and decrypting the information is known as
Symmetric Key Encryption.
Types of Cryptosystem
2. Asymmetric key Encryption
The encryption process where different keys are used for
encrypting and decrypting the information is known as
Asymmetric Key Encryption.

More Related Content

What's hot

6. cryptography
6. cryptography6. cryptography
6. cryptography7wounders
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYKathirvel Ayyaswamy
 
Cryptography Fundamentals
Cryptography FundamentalsCryptography Fundamentals
Cryptography FundamentalsDuy Do Phan
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYKathirvel Ayyaswamy
 
Ch01
Ch01Ch01
Ch01n C
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryptionAashish R
 
Principles of public key cryptography and its Uses
Principles of  public key cryptography and its UsesPrinciples of  public key cryptography and its Uses
Principles of public key cryptography and its UsesMohsin Ali
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.pptUday Meena
 
Digital signature schemes
Digital signature schemesDigital signature schemes
Digital signature schemesravik09783
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationsarhadisoftengg
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographySeema Goel
 
Symmetric & Asymmetric Cryptography
Symmetric & Asymmetric CryptographySymmetric & Asymmetric Cryptography
Symmetric & Asymmetric Cryptographychauhankapil
 

What's hot (20)

Cryptography
CryptographyCryptography
Cryptography
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
Cryptography Fundamentals
Cryptography FundamentalsCryptography Fundamentals
Cryptography Fundamentals
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
Rsa
RsaRsa
Rsa
 
Ch01
Ch01Ch01
Ch01
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryption
 
Principles of public key cryptography and its Uses
Principles of  public key cryptography and its UsesPrinciples of  public key cryptography and its Uses
Principles of public key cryptography and its Uses
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
Cryptography
CryptographyCryptography
Cryptography
 
Symmetric encryption
Symmetric encryptionSymmetric encryption
Symmetric encryption
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Digital signature schemes
Digital signature schemesDigital signature schemes
Digital signature schemes
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Kerberos
KerberosKerberos
Kerberos
 
Symmetric & Asymmetric Cryptography
Symmetric & Asymmetric CryptographySymmetric & Asymmetric Cryptography
Symmetric & Asymmetric Cryptography
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
Des
DesDes
Des
 

Similar to Evolution of Cryptography and Cryptographic techniques

Cryptography & Network Security.pptx
Cryptography & Network Security.pptxCryptography & Network Security.pptx
Cryptography & Network Security.pptxsunil sharma
 
Cryptography : The Art of Secured Messaging
Cryptography : The Art of Secured MessagingCryptography : The Art of Secured Messaging
Cryptography : The Art of Secured MessagingSumit Satam
 
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...Petar Radanliev
 
Cryptography, a science of secure writing
Cryptography, a science of secure writingCryptography, a science of secure writing
Cryptography, a science of secure writingtahirilyas92
 
Making Sense Of Cryptography
Making Sense Of CryptographyMaking Sense Of Cryptography
Making Sense Of Cryptographymarkjhouse
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Saif Kassim
 
Cryptography
CryptographyCryptography
CryptographyJasim Jas
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographyMd. Afif Al Mamun
 
A Study of Different Partitioning Clustering Technique
A Study of Different Partitioning Clustering TechniqueA Study of Different Partitioning Clustering Technique
A Study of Different Partitioning Clustering Techniqueijsrd.com
 
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHICA NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHICijsrd.com
 
A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfYasmine Anino
 
Cryptography- "A Black Art"
Cryptography- "A Black Art"Cryptography- "A Black Art"
Cryptography- "A Black Art"Aditya Raina
 

Similar to Evolution of Cryptography and Cryptographic techniques (20)

Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Cryptography & Network Security.pptx
Cryptography & Network Security.pptxCryptography & Network Security.pptx
Cryptography & Network Security.pptx
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Cryptography : The Art of Secured Messaging
Cryptography : The Art of Secured MessagingCryptography : The Art of Secured Messaging
Cryptography : The Art of Secured Messaging
 
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
 
Cryptography, a science of secure writing
Cryptography, a science of secure writingCryptography, a science of secure writing
Cryptography, a science of secure writing
 
Cryptography
CryptographyCryptography
Cryptography
 
Making Sense Of Cryptography
Making Sense Of CryptographyMaking Sense Of Cryptography
Making Sense Of Cryptography
 
groupWork.pptx
groupWork.pptxgroupWork.pptx
groupWork.pptx
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01
 
Cryptography
CryptographyCryptography
Cryptography
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Analysis of Cryptography Techniques
Analysis of Cryptography TechniquesAnalysis of Cryptography Techniques
Analysis of Cryptography Techniques
 
A Study of Different Partitioning Clustering Technique
A Study of Different Partitioning Clustering TechniqueA Study of Different Partitioning Clustering Technique
A Study of Different Partitioning Clustering Technique
 
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHICA NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
 
A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdf
 
F16 cs61 cryptography
F16 cs61   cryptographyF16 cs61   cryptography
F16 cs61 cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Crytography
CrytographyCrytography
Crytography
 
Cryptography- "A Black Art"
Cryptography- "A Black Art"Cryptography- "A Black Art"
Cryptography- "A Black Art"
 

Recently uploaded

Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 

Recently uploaded (20)

Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 

Evolution of Cryptography and Cryptographic techniques

  • 3. Origins of Cryptography Inherent needs as human being: a. To communicate and share information and b. To communicate selectively These two needs gave rise to the art of coding the messages in such a way that only the intended people could have access to the information. Unauthorized people could not extract any information, even if the scrambled messages fell in their hand. The art and science of concealing the messages to introduce secrecy in information security is recognized as cryptography.
  • 4. Origins of Cryptography The word ‘cryptography’ was coined by combining two Greek words, ‘Krypto’ meaning hidden and ‘graphene’ meaning writing.
  • 5. History of Cryptography The art of cryptography is considered to be born along with the art of writing. As civilizations evolved, human beings got organized in tribes, groups, and kingdoms. This led to the emergence of ideas such as power, battles, supremacy, and politics. These ideas further fueled the natural need of people to communicate secretly with selective recipient which in turn ensured the continuous evolution of cryptography as well. The roots of cryptography are found in Roman and Egyptian civilizations.
  • 7. Cryptographic Technique 1. Hieroglyph 2. Symmetric Encryption 3. Asymmetric Encryption 4. Steganography 5. Hashing
  • 8. Hieroglyph 4000 years ago, the Egyptians used to communicate by messages written in hieroglyph. This code was the secret known only to the scribes who used to transmit messages on behalf of the kings. One such hieroglyph is shown below.
  • 9. Hieroglyph Later, using simple mono-alphabetic substitution ciphers during 500 to 600 BC. This involved replacing alphabets of message with other alphabets with some secret rule. This rule became a key to retrieve the message back from the garbled message. The earlier Roman method of cryptography, popularly known as the Caesar Shift Cipher, relies on shifting the letters of a message by an agreed number (three was a common choice), the recipient of this message would then shift the letters back by the same number and obtain the original message.
  • 10. Symmetric Encryption • Symmetrical encryption is a type of encryption that is used for the encryption and decryption of electronic data by just one secret key. Substitution ciphers are symmetrical encryption techniques, but modern symmetric encryption can be much more complicated. • Data are converted to a method that cannot be understood by anyone without a secret key to decrypt it using symmetrical encryption algorithms. • Symmetric encryption is an old algorithm but it is faster and efficient than asymmetric encryption. Because of great performance and fast speed of symmetric as compare to asymmetric encryption.
  • 11. Symmetric Encryption • Whereas Symmetric key cryptography involves the usage of the same key for encryption and decryption. While Asymmetric key cryptography involves the usage of one key for encryption and another different key for decryption. • Symmetric encryption is typical for big quantities of information, e.g. for database encryption, in bulk encryption. In the case of a database, the secret key can only be encrypted or decrypted by the database itself.
  • 12. Symmetric Encryption Two kinds of symmetrical encryption algorithms are available: 1. Block Algorithm 2. Stream Algorithm Block Algorithm: The set of bits is encoded with a specific secret key in electronic data blocks. The system keeps the data in its memory while it waiting to get complete blocks when the data are encrypted. Some important Block cipher algorithms are DES, Triple DES, AES, etc.
  • 13. Symmetric Encryption Stream Cipher Algorithm: In this, Plain text numbers or characters are combined with pseudorandom cipher digit stream. Some important Stream cipher algorithms are RC4, A5, BLOWFISH, etc. In symmetric key encryption, The encryption code can be cracked if someone finds out the symmetric key. But this problem can be overcome with the Diffie-Hellman algorithm. In the Diffie-Hellman key exchange or agreement algorithm, the sender and receiver must agree on a symmetric key using this technique. This key can then be used for an encryption or decryption purpose.
  • 14. Asymmetric Encryption • Asymmetric encryption is also called public-key cryptography. Asymmetric key encryption helps to resolve a key exchange problem of symmetric key Cryptography. In Asymmetric encryption, Two keys are used to encrypt plain text in asymmetrical encryption. Through the internet or big network, the secret keys are exchanged. It is necessary to notice that anyone with a secret key can decrypt the message, so asymmetric encryption is using two corresponding keys to increase safety.
  • 15. Asymmetric Encryption • Anyone who wishes to send you a message will have a public key freely accessible but the second private key is held the secret for you to understand you only. A message encrypted with a public key can be decoded with a private key. A message encrypted with a private key can also be decrypted with a public key.
  • 16. Steganography • Steganography is a technique that facilitates the hiring of a message that is to be kept secret inside other messages. Earlier, people used methods to hide messages such as invisible ink, minute variations, etc. • But in an age of technology, Steganography is a technique to conceal data that can be the file, message, image, etc inside other files, message or images.
  • 17. Steganography • Example: Invisible watermarking • In steganography, an unintended recipient or an intruder is unaware of the fact that observed data contains hidden information. In cryptography, an intruder is normally aware that data is being communicated, because they can see the coded/scrambled message.
  • 18. Hashing • Hashing is the cryptographic technique that converts data which can be any form into a unique string. Regardless of size or type, any data can be hashed using a hashing algorithm. It takes data of random length and converts it into fixed hashed value. • Hashing is different from other encryption methods because, in hashing, encryption cannot be reversed that is cannot be decrypted using keys. MD5, SHA1, SHA 256 are the widely used hashing algorithms.
  • 20. Evolution of Cryptography • Improved coding techniques such as Vigenere Coding came into existence in the 15th century, which offered moving letters in the message with a number of variable places instead of moving them the same number of places. • Only after the 19th century, cryptography evolved from the ad hoc approaches to encryption to the more sophisticated art and science of information security.
  • 21. Evolution of Cryptography • In the early 20th century, the invention of mechanical and electromechanical machines, such as the Enigma rotor machine, provided more advanced and efficient means of coding the information. • During the period of World War II, both cryptography and cryptanalysis became excessively mathematical.
  • 23. Modern Cryptography • Modern cryptography is the cornerstone of computer and communications security. Its foundation is based on various concepts of mathematics such as number theory, computational- complexity theory, and probability theory.
  • 24. Characteristics of Modern Cryptography Classic Cryptography Modern Cryptography It manipulates traditional characters, i.e., letters and digits directly. It operates on binary bit sequences. It is mainly based on ‘security through obscurity’. The techniques employed for coding were kept secret and only the parties involved in communication knew about them. It relies on publicly known mathematical algorithms for coding the information. Secrecy is obtained through a secrete key which is used as the seed for the algorithm. The computational difficulty of algorithms, absence of secret key, etc., make it impossible for an attacker to obtain the original information even if he knows the algorithm used for coding. It requires the entire cryptosystem for communicating confidentially. Modern cryptography requires parties interested in secure communication to possess the secret key only.
  • 25. Context of Cryptography Cryptology, the study of cryptosystems, can be subdivided into two branches − • Cryptography Cryptography is the art and science of making a cryptosystem that is capable of providing information security. • Cryptanalysis The art and science of breaking the cipher text is known as cryptanalysis. Cryptanalysis is the sister branch of cryptography and they both co- exist. The cryptographic process results in the cipher text for transmission or storage. It involves the study of cryptographic mechanism with the intention to break them. Cryptanalysis is also used during the design of the new cryptographic techniques to test their security strengths.
  • 26. Context of Cryptography Note: Cryptography concerns with the design of cryptosystems, while cryptanalysis studies the breaking of cryptosystems.
  • 27. Security Services of Cryptography The primary objective of using cryptography is to provide the following four fundamental information security services. Let us now see the possible goals intended to be fulfilled by cryptography. 1. Confidentially It is a security service that keeps the information from an unauthorized person. It is sometimes referred to as privacy or secrecy.
  • 28. Security Services of Cryptography 2. Data integrity It is security service that deals with identifying any alteration to the data. The data may get modified by an unauthorized entity intentionally or accidently. Integrity service confirms that whether data is intact or not since it was last created, transmitted, or stored by an authorized user. Data integrity cannot prevent the alteration of data, but provides a means for detecting whether data has been manipulated in an unauthorized manner.
  • 29. Security Services of Cryptography 3. Authentication Authentication provides the identification of the originator. It confirms to the receiver that the data received has been sent only by an identified and verified sender. Authentication service has two variants − • Message authentication identifies the originator of the message without any regard router or system that has sent the message. • Entity authentication is assurance that data has been received from a specific entity, say a particular website
  • 30. Security Services of Cryptography 4. Non-repudiation It is a security service that ensures that an entity cannot refuse the ownership of a previous commitment or an action. It is an assurance that the original creator of the data cannot deny the creation or transmission of the said data to a recipient or third party. Example: Once an order is placed electronically, a purchaser cannot deny the purchase order, if non-repudiation service was enabled in this transaction.
  • 31. Cryptography Primitives Cryptography primitives are nothing but the tools and techniques in Cryptography that can be selectively used to provide a set of desired security services: • Encryption • Hash functions • Message Authentication codes (MAC) • Digital Signatures
  • 32. Cryptography Primitives The following table shows the primitives that can achieve a particular security service on their own. Note − Cryptographic primitives are intricately related and they are often combined to achieve a set of desired security services from a cryptosystem
  • 33. Cryptosystem A cryptosystem is an implementation of cryptographic techniques and their accompanying infrastructure to provide information security services. A cryptosystem is also referred to as a cipher system. Model of a cryptosystem
  • 34. Components of Cryptosystem • Plaintext • Encryption Algorithm • Cipher text • Decryption Algorithm • Encryption Key • Decryption Key
  • 35. Types of Cryptosystem 1. Symmetric key Encryption 2. Asymmetric key Encryption
  • 36. Types of Cryptosystem 1. Symmetric key Encryption The encryption process where same keys are used for encrypting and decrypting the information is known as Symmetric Key Encryption.
  • 37. Types of Cryptosystem 2. Asymmetric key Encryption The encryption process where different keys are used for encrypting and decrypting the information is known as Asymmetric Key Encryption.