SlideShare a Scribd company logo
1 of 15
RESEARCH APPROACH IN
CRYPTOGRAPHY
Presented By:
Mostak Ahmed
Guided By:
Rupam Kr Sharma
INTRODUCTION
•A cryptographic algorithm, or cipher, is a
mathematical function used in the encryption and
decryption process.
•A cryptographic algorithm works in combination
with a key a word, number, or phrase to encrypt
the plaintext.
•The security of encrypted data is entirely
dependent on two things: the strength of the
cryptographic algorithm and the secrecy of the
key.
CRYPTOGRAPHY
OBJECTIVE
•The objective of the project is to do a analytical
study of the existing cryptographic systems ,their
response to the varying number of inputs and
comparative study of them(time complexity,
space complexity).
•Also to study and simulate the vulnerabilities of
the algorithm to different cryptanalytic attacks if
possible on them. The project is also taking care of
their comparative study.
CRYPTOGRAPHY
Common Attacks Against
Security Over Network
•Tapping the wire: To get access to clear text
data and passwords
•Impersonation: To get unauthorized access to
data or to create unauthorized e-mails, orders, etc.
•Denial-of-service: To render network resources
non-functional.
•Replay of messages: To get access to information
and change it in transit.
•Guessing of Keys Passwords: To get access to
encrypted data and passwords •Virus: To destroy
data.
CRYPTOGRAPHY
Solutions For Attacks Against
Security Over Networks
•Encryption: To protect data and passwords.
•Authentication: By using digital signatures and
certificates this will do verify who is sending data
over the network.
•Authorization: To prevent improper access of
data over the network.
•Integrity checking: To protect against improper
alteration of messages.
•Non-repudiation: To make sure that an action
cannot be denied by the person who performed it.
CRYPTOGRAPHY
ANALYSISCRYPTOGRAPHY
SPECIFICATION
•Hardware Requirements:
Ram: 1GB, Hard disk: 10GB
Processor: Pentium IV 3GHz
•Software Requirements:
Mat lab
Operating System: windows
CRYPTOGRAPHY
RSA ALGORITHM
Key generation:
•Step 1: Select random prime numbers p and q, and
check that p != q
•Step 2: Compute modulus n = pq
•Step 3: Compute phi,
•Step 4: ɸ= (p - 1)(q - 1)
•Step 5 : Select public exponent e, 1 < e <ɸ
•Step 6: such that gcd(e,ɸ) = 1
•Step 7: Compute private exponent d = e-1 mod ɸ
•Step 8: Public key is {n, e}, private key is d
•Step 9: Encryption: c = me mod n
•Step 10: Decryption: m = c dmod n
CRYPTOGRAPHY
RSA FLOWCHART
CRYPTOGRAPHY
CAESAR ALGORITHM
•Step 1: Open input file
•Step 2: find Unicode of the input file and put in y.
•Step 3: calculate y= y + 3
•Step 4: Encrypted form (z)of the file contents i.e.,
CHYPER TEXT
•Step 5: character of y.
•Step 6: w= Unicode of z
•Step 7: w= w-3
•Step 8: character of w
•Step 9: Decrypt the chyper text to get plain text
CRYPTOGRAPHY
CAESAR FLOWCHART
CRYPTOGRAPHY
OBSERVATION
•We are analysis some of the algorithm like DES, AES, RSA,
Ceaser, Playfair etc. And we Implemented RSA and Ceaser
using MATLAB we are testing with various types of input and
observed the respective output and their time complexity.
When we took a simple file input for
RSA we found the time of execution as 0.312 and in case of
Ceaser we getting the time complexity as 0.012s.
Now we are trying to implement
Playfair, DES which is going in process but not yet complete.
Once we complete the Analysis of the previous Algorithm if
time permits we are trying to implement our own Algorithm
where we are trying to take care of the time and space
complexity.
CRYPTOGRAPHY
GUI USER INTERFACE
•RSA
CRYPTOGRAPHY
CAESAR FLOWCHART
•CAESAR
CRYPTOGRAPHY
CRYPTOGRAPHY

More Related Content

What's hot

What's hot (20)

Cryptography and Information Security
Cryptography and Information SecurityCryptography and Information Security
Cryptography and Information Security
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Authentication
AuthenticationAuthentication
Authentication
 
Homomorphic encryption in cloud computing final
Homomorphic encryption  in cloud computing finalHomomorphic encryption  in cloud computing final
Homomorphic encryption in cloud computing final
 
Cryptography
CryptographyCryptography
Cryptography
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Cryptanalysis 101
Cryptanalysis 101Cryptanalysis 101
Cryptanalysis 101
 
Password cracking and brute force
Password cracking and brute forcePassword cracking and brute force
Password cracking and brute force
 
cryptography
cryptographycryptography
cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Email security
Email securityEmail security
Email security
 
Overview of cryptography
Overview of cryptographyOverview of cryptography
Overview of cryptography
 
Cryptography Presentation
Cryptography PresentationCryptography Presentation
Cryptography Presentation
 
What is Asymmetric Encryption? Understand with Simple Examples
What is Asymmetric Encryption? Understand with Simple ExamplesWhat is Asymmetric Encryption? Understand with Simple Examples
What is Asymmetric Encryption? Understand with Simple Examples
 

Viewers also liked

Viewers also liked (16)

The Caesar Cipher
The Caesar Cipher The Caesar Cipher
The Caesar Cipher
 
Caesar Cipher
Caesar CipherCaesar Cipher
Caesar Cipher
 
Cryptography
Cryptography Cryptography
Cryptography
 
Ch02...1
Ch02...1Ch02...1
Ch02...1
 
Caesar cipher
Caesar cipherCaesar cipher
Caesar cipher
 
Caesar cipher
Caesar cipherCaesar cipher
Caesar cipher
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
Cipher techniques
Cipher techniquesCipher techniques
Cipher techniques
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Networking
NetworkingNetworking
Networking
 
Basic concepts of computer Networking
Basic concepts of computer NetworkingBasic concepts of computer Networking
Basic concepts of computer Networking
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devices
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 

Similar to Research Crypto Algorithms

Number Theory 5 Sem.pptx
Number Theory 5 Sem.pptxNumber Theory 5 Sem.pptx
Number Theory 5 Sem.pptxssuser0cd7c9
 
Securing Text Messages Application Using MED
Securing Text Messages Application Using MEDSecuring Text Messages Application Using MED
Securing Text Messages Application Using MEDZatulNadia
 
Basic techniques in cryptography
Basic techniques in cryptographyBasic techniques in cryptography
Basic techniques in cryptographyShraddha Gupta
 
OS ppt Modified.pptx
OS ppt Modified.pptxOS ppt Modified.pptx
OS ppt Modified.pptxStudyvAbhi
 
Introduction to cryptography part1-final
Introduction to cryptography  part1-finalIntroduction to cryptography  part1-final
Introduction to cryptography part1-finalTaymoor Nazmy
 
Intro to Cryptography
Intro to CryptographyIntro to Cryptography
Intro to CryptographyGalin Dinkov
 
Encryption techniques
Encryption techniquesEncryption techniques
Encryption techniquesMohitManna
 
Public Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithmPublic Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithmIndra97065
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesIRJET Journal
 
Cryptography using rsa cryptosystem
Cryptography using rsa cryptosystemCryptography using rsa cryptosystem
Cryptography using rsa cryptosystemSamdish Arora
 

Similar to Research Crypto Algorithms (20)

Number Theory 5 Sem.pptx
Number Theory 5 Sem.pptxNumber Theory 5 Sem.pptx
Number Theory 5 Sem.pptx
 
Securing Text Messages Application Using MED
Securing Text Messages Application Using MEDSecuring Text Messages Application Using MED
Securing Text Messages Application Using MED
 
Basic techniques in cryptography
Basic techniques in cryptographyBasic techniques in cryptography
Basic techniques in cryptography
 
Ch9
Ch9Ch9
Ch9
 
Cryptography cse,ru
Cryptography cse,ruCryptography cse,ru
Cryptography cse,ru
 
Rsa
RsaRsa
Rsa
 
Security - ch3.pptx
Security - ch3.pptxSecurity - ch3.pptx
Security - ch3.pptx
 
OS ppt Modified.pptx
OS ppt Modified.pptxOS ppt Modified.pptx
OS ppt Modified.pptx
 
Introduction to cryptography part1-final
Introduction to cryptography  part1-finalIntroduction to cryptography  part1-final
Introduction to cryptography part1-final
 
Security - ch3.pptx
Security - ch3.pptxSecurity - ch3.pptx
Security - ch3.pptx
 
Cryptography
CryptographyCryptography
Cryptography
 
Network security
Network securityNetwork security
Network security
 
Intro to Cryptography
Intro to CryptographyIntro to Cryptography
Intro to Cryptography
 
3 pkc+rsa
3 pkc+rsa3 pkc+rsa
3 pkc+rsa
 
Cryptography
CryptographyCryptography
Cryptography
 
Encryption techniques
Encryption techniquesEncryption techniques
Encryption techniques
 
Image Security
Image SecurityImage Security
Image Security
 
Public Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithmPublic Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithm
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
 
Cryptography using rsa cryptosystem
Cryptography using rsa cryptosystemCryptography using rsa cryptosystem
Cryptography using rsa cryptosystem
 

Recently uploaded

Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Dust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEDust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEaurabinda banchhor
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationdeepaannamalai16
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 

Recently uploaded (20)

INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Dust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEDust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSE
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentation
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 

Research Crypto Algorithms

  • 1. RESEARCH APPROACH IN CRYPTOGRAPHY Presented By: Mostak Ahmed Guided By: Rupam Kr Sharma
  • 2. INTRODUCTION •A cryptographic algorithm, or cipher, is a mathematical function used in the encryption and decryption process. •A cryptographic algorithm works in combination with a key a word, number, or phrase to encrypt the plaintext. •The security of encrypted data is entirely dependent on two things: the strength of the cryptographic algorithm and the secrecy of the key. CRYPTOGRAPHY
  • 3. OBJECTIVE •The objective of the project is to do a analytical study of the existing cryptographic systems ,their response to the varying number of inputs and comparative study of them(time complexity, space complexity). •Also to study and simulate the vulnerabilities of the algorithm to different cryptanalytic attacks if possible on them. The project is also taking care of their comparative study. CRYPTOGRAPHY
  • 4. Common Attacks Against Security Over Network •Tapping the wire: To get access to clear text data and passwords •Impersonation: To get unauthorized access to data or to create unauthorized e-mails, orders, etc. •Denial-of-service: To render network resources non-functional. •Replay of messages: To get access to information and change it in transit. •Guessing of Keys Passwords: To get access to encrypted data and passwords •Virus: To destroy data. CRYPTOGRAPHY
  • 5. Solutions For Attacks Against Security Over Networks •Encryption: To protect data and passwords. •Authentication: By using digital signatures and certificates this will do verify who is sending data over the network. •Authorization: To prevent improper access of data over the network. •Integrity checking: To protect against improper alteration of messages. •Non-repudiation: To make sure that an action cannot be denied by the person who performed it. CRYPTOGRAPHY
  • 7. SPECIFICATION •Hardware Requirements: Ram: 1GB, Hard disk: 10GB Processor: Pentium IV 3GHz •Software Requirements: Mat lab Operating System: windows CRYPTOGRAPHY
  • 8. RSA ALGORITHM Key generation: •Step 1: Select random prime numbers p and q, and check that p != q •Step 2: Compute modulus n = pq •Step 3: Compute phi, •Step 4: ɸ= (p - 1)(q - 1) •Step 5 : Select public exponent e, 1 < e <ɸ •Step 6: such that gcd(e,ɸ) = 1 •Step 7: Compute private exponent d = e-1 mod ɸ •Step 8: Public key is {n, e}, private key is d •Step 9: Encryption: c = me mod n •Step 10: Decryption: m = c dmod n CRYPTOGRAPHY
  • 10. CAESAR ALGORITHM •Step 1: Open input file •Step 2: find Unicode of the input file and put in y. •Step 3: calculate y= y + 3 •Step 4: Encrypted form (z)of the file contents i.e., CHYPER TEXT •Step 5: character of y. •Step 6: w= Unicode of z •Step 7: w= w-3 •Step 8: character of w •Step 9: Decrypt the chyper text to get plain text CRYPTOGRAPHY
  • 12. OBSERVATION •We are analysis some of the algorithm like DES, AES, RSA, Ceaser, Playfair etc. And we Implemented RSA and Ceaser using MATLAB we are testing with various types of input and observed the respective output and their time complexity. When we took a simple file input for RSA we found the time of execution as 0.312 and in case of Ceaser we getting the time complexity as 0.012s. Now we are trying to implement Playfair, DES which is going in process but not yet complete. Once we complete the Analysis of the previous Algorithm if time permits we are trying to implement our own Algorithm where we are trying to take care of the time and space complexity. CRYPTOGRAPHY