SlideShare a Scribd company logo
1 of 22
CRYPTOGRAPHY
INTRODUCTION
 Cryptography (from Greek kryptós, "hidden", + gráphein, "to write").
 Cryptography is the practice and study of techniques for secure
communication in the presence of third parties (called adversaries).
 It is about constructing and analysing protocols that
overcome the influence of adversaries.
 Cipher: the algorithm that does the encryption.
 Ciphertext: the encrypted (scrambled) version of the message.
Message altered to be unreadable by anyone except the
intended recipients.
 Cryptanalysis: the science of breaking cryptographic algorithms.
 Cryptanalyst: a person who breaks cryptographic codes; also
referred to as “the attacker”.
 Cryptosystem – The combination of algorithm, key, and key
management functions used to perform cryptographic
operations.
 Decryption: the process of converting ciphertext back to the
original plaintext.
 Encryption: scrambling a message or data using a specialized
cryptographic algorithm.
 Initialization Vector – Random values used with ciphers to ensure
no patterns are created during encryption.
 Key – Sequence that controls the operation and behavior of
the cryptographic algorithm.
 Keyspace – Total number of possible values of keys in a crypto
algorithm.
 Plaintext – A message in its natural format readable by an
attacker.
Authentication
 ensures that whoever supplies or accesses sensitive data is an
authorized party.
Confidentiality
 assures that only authorized parties are able to understand
the data.
Integrity
 ensures that when a message is sent over a network, the
message that arrives is the same as the message that was
originally sent.
Nonrepudiation
 ensuring that the intended recipient actually received the
message & ensuring that the sender actually sent the
message.
THERATES
 There are several size of encryption keys:
 64 bit encryption
 128 bit encryption
 256 bit encryption
 512 bit encryption
 1024 bit encryption
 Number indicates the size of the key used to encrypt the message.
Symmetric
o Even if an attacker captures the data, the attacker will not be
able to manipulate it in any meaningful way.
o Symmetric algorithms use a single key shared by two
communicating parties.
o The same key is used for both encryption and decryption.
Asymmetric
o Mathematically related key pairs for encryption and
decryption.
o Public and private keys.
Hybrid
o Combines strengths of both methods.
o Asymmetric distributes symmetric key.
10
Asymmetric Cryptography
Symmetric Cryptography
SUBSTITUTION CIPHER
 A Substitution technique is one in which the letters/numbers/symbols
of plaintext are replaced by other letters/numbers/symbols.
Ex. A D , T z
2 5, 3 6
TRANSPOSITION CIPHER
 In this transposition technique the position of
letters/numbers/symbols is changed with one another.
 Plain Text : MEET ME AFTER PARTY
 Cipher Text : TEMEEMEFAPTRYRPT
 Key Used:421635
1 2 3 4 5 6
M E E T M E
A F T E T P
A R T Y
4 2 1 6 3 5
T E M E E M
E F A P T R
Y R P T
COMPARISON
SYMMETRIC CRYPTOGRAPHY
 The same algorithm with the same
key is used for encryption and
decryption.
 The Key must be kept secret.
 It may be possible or at least
impractical to decipher a
message if no other information is
available.
ASYMMETRIC
CRYPTOGRAPHY
 One algorithm is used for
encryption and decryption with a
pair of keys , one for encryption
and one for decryption.
 One of the two keys must be kept
secret.
 It may be possible or at least
impractical to decipher a
message if no other information is
available.
Types of Symmetric Cryptography:
Stream-based Ciphers
 Mixes plaintext with key stream.
 Good for real-time services.
Block Ciphers
 Substitution and transposition.
 E.g.: DES, AES.
Public Key Cryptography
 In public-key cryptosystems, the public key may be
freely distributed, while its paired private key must
remain secret and is used for decryption.
 Public-key cryptography can be used for
implementing digital signature schemes.
 Quantum cryptography describes the use of quantum
mechanical effects (in particular quantum
communication and quantum computation) to
perform cryptographic tasks or to break cryptographic
systems.
 The advantage of quantum cryptography is that it allows
the completion of various cryptographic tasks that are
proven or conjectured to be impossible using only
classical communication.
 For example, quantum mechanics guarantees that
measuring quantum data disturbs that data. This can be
used to detect eavesdropping in quantum key
distribution.
 Digital signatures can be permanently tied to the content of the
message being signed. They cannot then be 'moved' from one
document to another, for any attempt will be detectable.
 RSA and DSA are two of the most popular digital signature
schemes.
 In digital signature schemes, there are two
algorithms: one for signing, in which a secret key is
used to process the message and one for
verification, in which the matching public key is
used with the message to check the validity of the
signature.
APPLICATION
 Defense services
 Secure data manipulation
 E-commerce
 Business Transaction
 Internet payment system
 User identification system
 Access control
 Data security
Cryptography

More Related Content

What's hot (20)

Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Cryptography
Cryptography Cryptography
Cryptography
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Encryption
EncryptionEncryption
Encryption
 
Cryptography
CryptographyCryptography
Cryptography
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementation
 
Cryptography Fundamentals
Cryptography FundamentalsCryptography Fundamentals
Cryptography Fundamentals
 
Cryptography
CryptographyCryptography
Cryptography
 
Ch02...1
Ch02...1Ch02...1
Ch02...1
 
Overview of cryptography
Overview of cryptographyOverview of cryptography
Overview of cryptography
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & Cryptography
 
Encryption technology
Encryption technologyEncryption technology
Encryption technology
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 

Similar to Cryptography

Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarDurlove Kumbhakar
 
Cryptography : The Art of Secured Messaging
Cryptography : The Art of Secured MessagingCryptography : The Art of Secured Messaging
Cryptography : The Art of Secured MessagingSumit Satam
 
Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)newbie2019
 
Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)newbie2019
 
Paper id 27201444
Paper id 27201444Paper id 27201444
Paper id 27201444IJRAT
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Saif Kassim
 
cryptography and network security
cryptography and network security cryptography and network security
cryptography and network security nitishV3
 
Introduction to Cryptography Week4 Part1-ISrevisionSu.docx
Introduction to Cryptography  Week4 Part1-ISrevisionSu.docxIntroduction to Cryptography  Week4 Part1-ISrevisionSu.docx
Introduction to Cryptography Week4 Part1-ISrevisionSu.docxmariuse18nolet
 
crypto-105058445051058480051448005540405
crypto-105058445051058480051448005540405crypto-105058445051058480051448005540405
crypto-105058445051058480051448005540405ukd789555
 
Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overviewppd1961
 
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.pptPresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.pptso6281019
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPrabhatMishraAbvp
 

Similar to Cryptography (20)

Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab Kumbhakar
 
Unit-2-IS (1).pdf
Unit-2-IS (1).pdfUnit-2-IS (1).pdf
Unit-2-IS (1).pdf
 
Cns 1
Cns 1Cns 1
Cns 1
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Elementry Cryptography
Elementry CryptographyElementry Cryptography
Elementry Cryptography
 
Cryptography : The Art of Secured Messaging
Cryptography : The Art of Secured MessagingCryptography : The Art of Secured Messaging
Cryptography : The Art of Secured Messaging
 
Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)
 
Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)
 
Paper id 27201444
Paper id 27201444Paper id 27201444
Paper id 27201444
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01
 
cryptography and network security
cryptography and network security cryptography and network security
cryptography and network security
 
Introduction to Cryptography Week4 Part1-ISrevisionSu.docx
Introduction to Cryptography  Week4 Part1-ISrevisionSu.docxIntroduction to Cryptography  Week4 Part1-ISrevisionSu.docx
Introduction to Cryptography Week4 Part1-ISrevisionSu.docx
 
crypto-105058445051058480051448005540405
crypto-105058445051058480051448005540405crypto-105058445051058480051448005540405
crypto-105058445051058480051448005540405
 
Pavan
PavanPavan
Pavan
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overview
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.pptPresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
 

Recently uploaded

💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...vershagrag
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsvanyagupta248
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptAfnanAhmad53
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfsumitt6_25730773
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...jabtakhaidam7
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationBhangaleSonal
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Call Girls Mumbai
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdfAldoGarca30
 
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptxrouholahahmadi9876
 
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...gragchanchal546
 
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...ppkakm
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesChandrakantDivate1
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityMorshed Ahmed Rahath
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...drmkjayanthikannan
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Ramkumar k
 

Recently uploaded (20)

💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .ppt
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdf
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
 
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
 
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To Curves
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 

Cryptography

  • 2. INTRODUCTION  Cryptography (from Greek kryptós, "hidden", + gráphein, "to write").  Cryptography is the practice and study of techniques for secure communication in the presence of third parties (called adversaries).  It is about constructing and analysing protocols that overcome the influence of adversaries.
  • 3.  Cipher: the algorithm that does the encryption.  Ciphertext: the encrypted (scrambled) version of the message. Message altered to be unreadable by anyone except the intended recipients.  Cryptanalysis: the science of breaking cryptographic algorithms.  Cryptanalyst: a person who breaks cryptographic codes; also referred to as “the attacker”.
  • 4.  Cryptosystem – The combination of algorithm, key, and key management functions used to perform cryptographic operations.  Decryption: the process of converting ciphertext back to the original plaintext.  Encryption: scrambling a message or data using a specialized cryptographic algorithm.  Initialization Vector – Random values used with ciphers to ensure no patterns are created during encryption.
  • 5.  Key – Sequence that controls the operation and behavior of the cryptographic algorithm.  Keyspace – Total number of possible values of keys in a crypto algorithm.  Plaintext – A message in its natural format readable by an attacker.
  • 6. Authentication  ensures that whoever supplies or accesses sensitive data is an authorized party. Confidentiality  assures that only authorized parties are able to understand the data.
  • 7. Integrity  ensures that when a message is sent over a network, the message that arrives is the same as the message that was originally sent. Nonrepudiation  ensuring that the intended recipient actually received the message & ensuring that the sender actually sent the message.
  • 9.  There are several size of encryption keys:  64 bit encryption  128 bit encryption  256 bit encryption  512 bit encryption  1024 bit encryption  Number indicates the size of the key used to encrypt the message.
  • 10. Symmetric o Even if an attacker captures the data, the attacker will not be able to manipulate it in any meaningful way. o Symmetric algorithms use a single key shared by two communicating parties. o The same key is used for both encryption and decryption. Asymmetric o Mathematically related key pairs for encryption and decryption. o Public and private keys. Hybrid o Combines strengths of both methods. o Asymmetric distributes symmetric key. 10
  • 12. SUBSTITUTION CIPHER  A Substitution technique is one in which the letters/numbers/symbols of plaintext are replaced by other letters/numbers/symbols. Ex. A D , T z 2 5, 3 6
  • 13. TRANSPOSITION CIPHER  In this transposition technique the position of letters/numbers/symbols is changed with one another.  Plain Text : MEET ME AFTER PARTY  Cipher Text : TEMEEMEFAPTRYRPT  Key Used:421635 1 2 3 4 5 6 M E E T M E A F T E T P A R T Y 4 2 1 6 3 5 T E M E E M E F A P T R Y R P T
  • 14. COMPARISON SYMMETRIC CRYPTOGRAPHY  The same algorithm with the same key is used for encryption and decryption.  The Key must be kept secret.  It may be possible or at least impractical to decipher a message if no other information is available. ASYMMETRIC CRYPTOGRAPHY  One algorithm is used for encryption and decryption with a pair of keys , one for encryption and one for decryption.  One of the two keys must be kept secret.  It may be possible or at least impractical to decipher a message if no other information is available.
  • 15. Types of Symmetric Cryptography: Stream-based Ciphers  Mixes plaintext with key stream.  Good for real-time services. Block Ciphers  Substitution and transposition.  E.g.: DES, AES.
  • 16. Public Key Cryptography  In public-key cryptosystems, the public key may be freely distributed, while its paired private key must remain secret and is used for decryption.  Public-key cryptography can be used for implementing digital signature schemes.
  • 17.  Quantum cryptography describes the use of quantum mechanical effects (in particular quantum communication and quantum computation) to perform cryptographic tasks or to break cryptographic systems.
  • 18.  The advantage of quantum cryptography is that it allows the completion of various cryptographic tasks that are proven or conjectured to be impossible using only classical communication.  For example, quantum mechanics guarantees that measuring quantum data disturbs that data. This can be used to detect eavesdropping in quantum key distribution.
  • 19.  Digital signatures can be permanently tied to the content of the message being signed. They cannot then be 'moved' from one document to another, for any attempt will be detectable.  RSA and DSA are two of the most popular digital signature schemes.
  • 20.  In digital signature schemes, there are two algorithms: one for signing, in which a secret key is used to process the message and one for verification, in which the matching public key is used with the message to check the validity of the signature.
  • 21. APPLICATION  Defense services  Secure data manipulation  E-commerce  Business Transaction  Internet payment system  User identification system  Access control  Data security

Editor's Notes

  1. Just like with many technical topics, Cryptography has its own lingo. Learning and using these terms and their definitions are the key to speaking like a crypto geek.
  2. Just like with many technical topics, Cryptography has its own lingo. Learning and using these terms and their definitions are the key to speaking like a crypto geek.
  3. Cryptographic Algorithms generally fall into one of two different categories, or are a combination of both. Symmetric Fast Only provide confidentiality Need secure channel for key distribution Key management headaches from large number of key pairs to maintain N(N-1)/2 That’s over 6.3 million key pairs to let all 3556 Purdue A/P staff members exchange encrypted messages To do the same for all students would require over half a billion key pairs! Examples: DES, AES, Blowfish, RC4, RC5 Asymmetric Large mathematical operations make it slower than symmetric algorithms No need for out of band key distribution (public keys are public!) Scales better since only a single key pair needed per individual Can provide authentication and nonrepudiation Examples: RSA, El Gamal, ECC, Diffie-Hellman
  4. Stream Ciphers are fast and easy to implement in hardware. Block ciphers are stronger, but slower and often implemented in hardware.