3. HISTORY
The conceptual foundation of cryptography was laid out around
3000 years ago in India and china. Since the early days of writing,
heads of state and military commanders understood that it was
necessary to provide some mechanism to protect the
confidentiality of written correspondence and to have some means
of detecting tampering. . World war ii brought about much
advancement in information security and marked the beginning of
the professional field of information security
4. CRYPTOGRAPHY
• The word cryptography is derived from Greek words “KRYPTOS” means hidden /
secret and “GRAPHEIN” means “to study or write”
DEFINITION :
Cryptography is the practice and study of techniques for securing communication and
data/ information in the presence of adversaries.
It is the study of using mathematics to encrypt and decrypt data.
To establish a shared secret when other people (eavesdroppers) are listening.
5. BASIC TERMS IN CRYPTOGRAPHY
ENCRYPTION OR DECRYPTION: Scrambling a message or data using cryptographic
techniques.
PLAINTEXT : the message or data.
CIPHER TEXT : the scrambled (encrypted) version of message .
KEY : Information used in cipher known only to sender/ receiver.
9. HASH FUNCTION
The main purpose of this function is to make sure that the original
information is not tampered with.
Hash function is one way encryption.
It provides digital fingerprints
It also helps for password encryption.
10. RSA ALGORITHM
PUBLISHED IN 1978 BY MIT ,US.
The main function of this algorithm is to providing approach to
public key cryptography and encryption.
In this the cipher text are all the integers between 0 to n-1
12. INFORMATION SECURITY
In this information era :
• Information is encoded into bit stream and transmitted on wireless
networks / internet.
• During transmission information it is vulnerable to attack.
• SOLUTION : CRYPTOGRAPHY IN INFORMATION SECURITY.
13. OBJECTIVES OF SECURITY
To avoid data threats.
To avoid denial of services.
To secure information / data from Masquerades.
To safeguard information from traffic analyzer.
To not to make the message for third person.
14. DATA INTEGRITY
C could alter the message or the message could change
while in transit . If B does not detect this , then we have
LOSS OF INTEGRITY.
SOLUTION : ENCRYPTION
A B
C
M
15. AUTHENTICATION
C could send a message to B pretending to be A, if B can not be verify the source
of the information then we have LACK AUTHENTICATION.
SOLUTION : PASSWORDS AND DIGITAL SIGNATURES
A B
C
M
16. CONFIDENTIALITY
C could view the secret message by eavesdropping on the communication.
SOLUTION : ENCRYPTION
A B
C
M
18. DIGITAL SIGNATURE
A protocol that produces the same effect as a real signature.
A mark that only the sender can make.
A digital signature is a mathematical scheme for demonstrating
the authenticity of a digital message or document.
19. PASSWORD AUDITING
Should not be in upper case.
At least 8 characters.
Must include alphabets , numeric keys and special characters.
It should not be the dictionary word or user name.
Must be updated at least once a month.
20. LITERATURE REVIEW
S# AURHOR NAME AND YEAR STATEMENTS OF AUTHORS
1 2019 , Laura Savu Cryptography is used in information security to
protect information from unauthorized or accidental
disclosure.[3].
2 2019 , June ,nurhayat varol ,
abdalbasit .
Has an important role role which requires privacy to
be protected when data is sent .[4].
3 2015 , August , Sanket A. Ubhad,
prof. Nilesh Chaubey , prof. Shyam
P.
Text should be send in additionally converted into
computer codes.[5].
4 2016 , April , Marukh- Juhaani
O.Saarinen , Elizzbeth O’Sullivan
Implementations must be able to create public and
private keys for lattice based digital signatures.[6].
5 2016 , August , Neal Koblitz
,Palash Sarkar.
A tight information security reduction is often very
useful in establishing confidence in protocole.[7].
6 2015 , Saritaa kumara. To secure data , compression should use for security
21. ADVANTAGES
Cryptography is an essential information security tool.
Encryption can protect communications from unauthorized
parties.
Cryptographic technique can protect against spoofing and
message forgeries.
22. DRAWBACKS
Provides a means for tax evasion, money laundering ‘ contract
killings, and implementation of data havens for storing and
marketing illegal or controversial material.
Electronic information can be bought and sold on "black
networks“. With complete secrecy.
23. APPLICATIONS
Credit card information.
Private correspondence.
Social security numbers.
Personal details.
Sensitive company information.
24. CONCLUSION(1)
From a technical point of view, cryptography is the solution to many
of the security challenges that are present in the internet. The
technology exists to solve most of the problems. However, there are
several issues that have obstructed the widespread use of
cryptography in the internet. First of all, cryptography, as a science,
faces a difficult problem for example, terrorists could communicate
information over the internet using encryption that law enforcement
agencies could not decrypt.
25. CONCLUSION(2)
Thus information security measures are needed to protect data from
hackers, when it is transmitted between terminal user and computer
and between computer and computer and it is also necessary to
protect the computer system when there is an attack of virus. The
capability of security enabled components still lags behind the
claims. Everyone has a different idea of what “security” is, and what
levels of risk are acceptable. It’s important to build systems and
networks in such a way that the user is not constantly reminded of
the security system around him.
26. REFERENCE(1)
[1]. 1. TIM MAY, "CRYPTO ANARCHY AND VIRTUAL COMMUNITIES," INTERNET
SECURITY, APRIL 2015, PP. 4-12.
[2] .KARLS, M. A, CODES, CIPHERS, AND CRYPTOGRAPHY-AN HONORS
COLLOQUIUM, 2011.
[3]. LAURA SAVU , CRYPTO AND INFORMATION SECURITY , 2019. BACHMAN, D. J.;
BROWN, E. A.;
[4]. NORTON, A.H, CHOCOLATE KEY CRYPTOGRAPHY, MATHEMATICS TEACHER,
104(2),2010.
[5]. PRIMUS, 20 (1),2010, P21-38.
27. REFERENCE(2)
[6]. DIFFIE, W. HELLMAN, M., NEW DIRECTIONS IN CRYPTOGRAPHY, IEEE TRANSACTIONS ON
INFORMATION THEORY, NOV 1976, VOLUME: 22, ISSUE: 6, 644- 654.
[7]. BUTLER W. LAMPSON, COMPUTER SECURITY IN THE REAL WORLD, COMPUTER, VOL. 37,
NO. 6, PP. 37-46, JUN., 2004.
[8]. ANDERSON, J., COMPUTER SECURITY TECHNOLOGY PLANNING STUDY, U.S. AIR FORCE
ELECT. SYS. DIV. TECH. RPT. 73-51, OCT 1972;
[9]. JOANNA LYN GRAMA, “LEGAL ISSUES IN INFORMATION SECURITY”, PUBLISHER: JONES &
BARTLETT LEARNING .
[10]. GENÇOĞLU, M.T, EMBEDDED IMAGE CODING USING LAPLACE TRANSFORM FOR TURKISH
LETTERS, MULTIMEDIA TOOLS AND APPLICATIONS, 67(3),2019,PP 1-14