SlideShare a Scribd company logo
1 of 23
A
                                   Seminar
                                     on




                                                                Presented By:
                                                                Peeyush Sahu
                                                                      8th Sem


                 Department of Computer Science & Engineering
           Dr. C.V. Raman University Kota Bilaspur (C.G.)
4 October 2012                                                            1
4 October 2012   2
4 October 2012   3
Cryptography




                 Asymmetric                  Symmetric
                    Key                         Key




         Public Key      Private Key         Secret Key


4 October 2012                                            4
Sender                                                 Receiver
                                 Shared secret
                                     Key




 Plain Text                                                        Plain Text
                    Encryption                   Decryption
                                    Cipher
                                     Text




    In Symmetric Key Cryptography, the same key is used by the sender (for
        encryption) and the receiver (for decryption). The key is shared.


4 October 2012                                                                  5
To the Public

                                                                 Receiver’s Public Key



                                                                 Receiver’s Private Key


      Sender                                                   Receiver




Plain Text                                                          Plain Text
                   Encryption              Decryption
                                 Cipher
                                  Text
 In Asymmetric Key Cryptography, there are two keys: a private key and a
public key. The private key is kept by the receiver. The public is announced to
                                  the public.
4 October 2012                                                                     6
Ciphers



                                                                                 Modern
                    Traditional                       Modern
                                                                                 Round
                      Ciphers                         Ciphers
                                                                                 Ciphers



        Substitution        Transposition                       Rotation
                                            XOR Ciphers                    DES             AES
          Ciphers              Ciphers                          Ciphers



  Mono                Poly
Alphabetic         Alphabetic




  4 October 2012                                                                            7
Mono Alphabetic Substitution Cipher :
Plain Text : HELLO
Cipher Text : KHOOR

Poly Alphabetic Substitution Cipher :
Plain Text : HELLO
Cipher Text : ABNZF

Transposition Cipher :
A transposition cipher reorders (permutes) symbols in a block of Symbols. For example :
Plain Text : 2 4 1 3
Cipher Text : 1 2 3 4
Example :
Simple Message :     HELLO MY DEAR
Encrypted Message : ELHLMDOYAZER

XOR Cipher :
It uses the Exclusive-OR operation as defined. It needs two data inputs plaintext one is
key and another is message. The size of all are same.

Rotation Cipher :
In this cipher the I/P bits are rotated to the left or right. It can be keyed or keyless.

   4 October 2012                                                                           8
DES (Data Encryption Standard) :

The algorithm encrypts a 64-bits plaintext block using a 64-bit key .
 It has two transposition blocks (P-boxes) and 16 complex round ciphers.
 The heart of DES is DES Function. It applies a 48-bit key to the rightmost 32
bits Ri to produce a 32-bit O/P.
 It is made up of four operations: an XOR, an Expansion permutation, a group of
S-boxes and a straight permutation.


AES (Advanced Encryption Standard) :

 It was designed because DES’s key was too small.
 It is designed with three key sizes:
a. 128
b. 192
c. 256
 It is very complex round cipher.
 It has three different configurations with respect to the number of rounds and key
size.


   4 October 2012                                                                9
4 October 2012   10
4 October 2012   11
4 October 2012   12
4 October 2012   13
4 October 2012   14
4 October 2012   15
4 October 2012   16
4 October 2012   17
4 October 2012   18
4 October 2012   19
4 October 2012   20
4 October 2012   21
4 October 2012   22
4 October 2012   23

More Related Content

Viewers also liked

HPLC - High Performance Liquid Chromatography
HPLC - High Performance Liquid ChromatographyHPLC - High Performance Liquid Chromatography
HPLC - High Performance Liquid ChromatographyDivya Basuti
 
PCR and its types
PCR and  its typesPCR and  its types
PCR and its typessujathar23
 
Trademark ppt by-pooja gurwani
Trademark ppt by-pooja gurwaniTrademark ppt by-pooja gurwani
Trademark ppt by-pooja gurwaniPooja Gurwani
 
HPLC Principle,Instrumentation and Application
HPLC Principle,Instrumentation and ApplicationHPLC Principle,Instrumentation and Application
HPLC Principle,Instrumentation and ApplicationAlakesh Pradhan
 
Ultra violet (UV) spectroscopy, introduction,principle instrumentation,differ...
Ultra violet (UV) spectroscopy, introduction,principle instrumentation,differ...Ultra violet (UV) spectroscopy, introduction,principle instrumentation,differ...
Ultra violet (UV) spectroscopy, introduction,principle instrumentation,differ...mariomS7
 

Viewers also liked (7)

Intellectual Property Rights (IPR)
Intellectual Property Rights (IPR)Intellectual Property Rights (IPR)
Intellectual Property Rights (IPR)
 
HPLC - High Performance Liquid Chromatography
HPLC - High Performance Liquid ChromatographyHPLC - High Performance Liquid Chromatography
HPLC - High Performance Liquid Chromatography
 
UV visible spectroscopy
UV visible spectroscopyUV visible spectroscopy
UV visible spectroscopy
 
PCR and its types
PCR and  its typesPCR and  its types
PCR and its types
 
Trademark ppt by-pooja gurwani
Trademark ppt by-pooja gurwaniTrademark ppt by-pooja gurwani
Trademark ppt by-pooja gurwani
 
HPLC Principle,Instrumentation and Application
HPLC Principle,Instrumentation and ApplicationHPLC Principle,Instrumentation and Application
HPLC Principle,Instrumentation and Application
 
Ultra violet (UV) spectroscopy, introduction,principle instrumentation,differ...
Ultra violet (UV) spectroscopy, introduction,principle instrumentation,differ...Ultra violet (UV) spectroscopy, introduction,principle instrumentation,differ...
Ultra violet (UV) spectroscopy, introduction,principle instrumentation,differ...
 

More from Peeyush Sahu CAPM®

UX - User Experience Design and Principles
UX - User Experience Design and PrinciplesUX - User Experience Design and Principles
UX - User Experience Design and PrinciplesPeeyush Sahu CAPM®
 
OECS Guidlines for Corporate Governance
OECS Guidlines for Corporate GovernanceOECS Guidlines for Corporate Governance
OECS Guidlines for Corporate GovernancePeeyush Sahu CAPM®
 
The Good The Bad and The Ugly about Derivatives
The Good The Bad and The Ugly about DerivativesThe Good The Bad and The Ugly about Derivatives
The Good The Bad and The Ugly about DerivativesPeeyush Sahu CAPM®
 
Honda Siel Power Products Limited Research Report
Honda Siel Power Products Limited Research ReportHonda Siel Power Products Limited Research Report
Honda Siel Power Products Limited Research ReportPeeyush Sahu CAPM®
 
SREI Infrastructure Finance Research Report
SREI Infrastructure Finance Research ReportSREI Infrastructure Finance Research Report
SREI Infrastructure Finance Research ReportPeeyush Sahu CAPM®
 
PGPSM Placements 2014-15 Brochure
PGPSM Placements 2014-15 BrochurePGPSM Placements 2014-15 Brochure
PGPSM Placements 2014-15 BrochurePeeyush Sahu CAPM®
 
An Introduction to Robotics and Embedded System
An Introduction to Robotics and Embedded SystemAn Introduction to Robotics and Embedded System
An Introduction to Robotics and Embedded SystemPeeyush Sahu CAPM®
 

More from Peeyush Sahu CAPM® (13)

UX - User Experience Design and Principles
UX - User Experience Design and PrinciplesUX - User Experience Design and Principles
UX - User Experience Design and Principles
 
OECS Guidlines for Corporate Governance
OECS Guidlines for Corporate GovernanceOECS Guidlines for Corporate Governance
OECS Guidlines for Corporate Governance
 
External Debt Management
External Debt ManagementExternal Debt Management
External Debt Management
 
Auto Sector in India
Auto Sector in IndiaAuto Sector in India
Auto Sector in India
 
Banking in India
Banking in IndiaBanking in India
Banking in India
 
The Good The Bad and The Ugly about Derivatives
The Good The Bad and The Ugly about DerivativesThe Good The Bad and The Ugly about Derivatives
The Good The Bad and The Ugly about Derivatives
 
Myanmar Socio Political Report
Myanmar Socio Political ReportMyanmar Socio Political Report
Myanmar Socio Political Report
 
Honda Siel Power Products Limited Research Report
Honda Siel Power Products Limited Research ReportHonda Siel Power Products Limited Research Report
Honda Siel Power Products Limited Research Report
 
AMTEK Research Report
AMTEK Research ReportAMTEK Research Report
AMTEK Research Report
 
Navneet Education Ltd
Navneet Education LtdNavneet Education Ltd
Navneet Education Ltd
 
SREI Infrastructure Finance Research Report
SREI Infrastructure Finance Research ReportSREI Infrastructure Finance Research Report
SREI Infrastructure Finance Research Report
 
PGPSM Placements 2014-15 Brochure
PGPSM Placements 2014-15 BrochurePGPSM Placements 2014-15 Brochure
PGPSM Placements 2014-15 Brochure
 
An Introduction to Robotics and Embedded System
An Introduction to Robotics and Embedded SystemAn Introduction to Robotics and Embedded System
An Introduction to Robotics and Embedded System
 

Recently uploaded

“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 

Recently uploaded (20)

“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 

An Introduction to Cryptology

  • 1. A Seminar on Presented By: Peeyush Sahu 8th Sem Department of Computer Science & Engineering Dr. C.V. Raman University Kota Bilaspur (C.G.) 4 October 2012 1
  • 4. Cryptography Asymmetric Symmetric Key Key Public Key Private Key Secret Key 4 October 2012 4
  • 5. Sender Receiver Shared secret Key Plain Text Plain Text Encryption Decryption Cipher Text In Symmetric Key Cryptography, the same key is used by the sender (for encryption) and the receiver (for decryption). The key is shared. 4 October 2012 5
  • 6. To the Public Receiver’s Public Key Receiver’s Private Key Sender Receiver Plain Text Plain Text Encryption Decryption Cipher Text In Asymmetric Key Cryptography, there are two keys: a private key and a public key. The private key is kept by the receiver. The public is announced to the public. 4 October 2012 6
  • 7. Ciphers Modern Traditional Modern Round Ciphers Ciphers Ciphers Substitution Transposition Rotation XOR Ciphers DES AES Ciphers Ciphers Ciphers Mono Poly Alphabetic Alphabetic 4 October 2012 7
  • 8. Mono Alphabetic Substitution Cipher : Plain Text : HELLO Cipher Text : KHOOR Poly Alphabetic Substitution Cipher : Plain Text : HELLO Cipher Text : ABNZF Transposition Cipher : A transposition cipher reorders (permutes) symbols in a block of Symbols. For example : Plain Text : 2 4 1 3 Cipher Text : 1 2 3 4 Example : Simple Message : HELLO MY DEAR Encrypted Message : ELHLMDOYAZER XOR Cipher : It uses the Exclusive-OR operation as defined. It needs two data inputs plaintext one is key and another is message. The size of all are same. Rotation Cipher : In this cipher the I/P bits are rotated to the left or right. It can be keyed or keyless. 4 October 2012 8
  • 9. DES (Data Encryption Standard) : The algorithm encrypts a 64-bits plaintext block using a 64-bit key .  It has two transposition blocks (P-boxes) and 16 complex round ciphers.  The heart of DES is DES Function. It applies a 48-bit key to the rightmost 32 bits Ri to produce a 32-bit O/P.  It is made up of four operations: an XOR, an Expansion permutation, a group of S-boxes and a straight permutation. AES (Advanced Encryption Standard) :  It was designed because DES’s key was too small.  It is designed with three key sizes: a. 128 b. 192 c. 256  It is very complex round cipher.  It has three different configurations with respect to the number of rounds and key size. 4 October 2012 9