SlideShare a Scribd company logo
Basic Cryptography
Assoc. Prof. Ts. Dr. Madihah Mohd Saudi
Faculty of Science & Technology, USIM
CONTENTS
ā€¢ Introduction
ā€¢ History of Cryptography
ā€¢ Objectives
ā€¢ Basic Terminology in Cryptography
ā€¢ Types of Cryptography
ā€¢ Symmetric
ā€¢ Asymmetric
ā€¢ Hash Function
Introduction
ā€¢ Cryptography:
ā€¢ the study of secure communications techniques that allow
only the sender & intended recipient of a message to view
its contents.
ā€¢ derived from the Greek word kryptos, which means hidden
Phil Zimmermann
ā€¢ Cryptography is the science of using mathematics to
encrypt & decrypt data.
Bruce Schneier
ā€¢ Cryptography is the art & science of keeping messages
secure.
History of Cryptography
ā€¢ The roots of cryptography are found in Egyptian & Roman
civilizations.
ā€¢ Hieroglyph ā€“ The Oldest Cryptographic Technique
ā€¢ Some 4000 years ago, Egyptians used to communicate by messages
written in hieroglyph.
ā€¢ This code was the secret known only to the scribes who used to transmit
messages on behalf of the kings.
ā€¢ Caesar Shift Cipher, relies on shifting the letters of a message by an agreed number (3
was a common choice), the recipient of this message would then shift the letters back by
the same number & obtain the original message.
ā€¢ The Caesar cipher is named after Julius Caesar , who used it with a shift of three to
protect messages of military significance.
Caesar Shift Cipher
ā€¢ Plaintext: basic cryptography
ā€¢ Ciphertext: edvlf fubswrjudskb
Authenticity ensures the
sender & recipient can
verify each otherā€™s
identities & the destination
of the message.
Objectives
Authenticity
Non-repudiation
Confidentiality
Integrity
Non-repudiation means the
sender of the message cannot
backtrack in the future & deny
their reasons for sending or
creating the message.
Confidentiality ensures
that only the intended
recipient can decrypt the
message & read its
contents.
Integrity focuses on the
ability to be certain that
the information contained
within the message
cannot be modified while
in storage or transit.
Basic Terminology in Cryptography
Plaintext
The original message
Ciphertext
The coded message
Enciphering or
encryption
Process of converting
from plaintext to
ciphertext
Deciphering or
decryption
Restoring the plaintext
from the ciphertext
Cryptography
Study of encryption
Cryptographic system or
cipher
Schemes used for
encryption
Cryptanalysis
Techniques used for
deciphering a message
without any knowledge
of the enciphering details
Cryptology
Areas of cryptography &
cryptanalysis together
Uses two different key to encrypt
& decrypt the message
The message is encrypted by
using a key & the same key is used
to decrypt the message
Types of Cryptography
Symmetric Key
Cryptography
Asymmetric Key
Cryptography
Symmetric Key Cryptography
Symmetric Key Cryptography
Simplest kind of encryption -
only one secret key to cipher
& decipher information.
It uses a secret key that can
either be a number, a word or
a string of random letters. It is
a blended with the plain text
of a message to change the
content in a particular way.
The sender & the recipient
should know the secret key
that is used to encrypt &
decrypt all the messages.
The main disadvantage : all
parties involved must
exchange the key used to
encrypt the data before they
can decrypt it.
Example:
Blowfish, AES( AES-128, AES-
192, & AES-256), RC4, DES,
RC5, & RC6
Symmetric Key
Cryptography
Classical
Cryptography
Transposition
Ciphers
Substitution
Cipher
Modern
Cryptography
Stream Cipher
Block Cipher
Classical Cryptography
ā€¢ Transposition Ciphers
ā€¢ method of encryption by
which the positions held by
units of plaintext (which are
commonly characters or
groups of characters) are
shifted according to a regular
system, so that the
ciphertext constitutes a
permutation of the plaintext
Classical Cryptography
ā€¢ Substitution Ciphers
ā€¢ Method of encryption by which units of plaintext are replaced with ciphertext,
according to a fixed system; the ā€œunitsā€ may be single letters (the most common),
pairs of letters, triplets of letters, mixtures of the above, and so forth.
Modern Cryptography
ā€¢ Stream Cipher
ā€¢ Symmetric or secret-key
encryption algorithm
that encrypts a single bit
at a time. With a Stream
Cipher, the same
plaintext bit or byte will
encrypt to a different bit
or byte every time it is
encrypted.
Modern Cryptography
ā€¢ Block Cipher
ā€¢ An encryption method
that applies a
deterministic algorithm
along with a symmetric
key to encrypt a block of
text, rather than
encrypting one bit at a
time as in stream
ciphers Example: A common block cipher, AES, encrypts 128-bit blocks with a key of
predetermined length: 128, 192, or 256 bits. Block ciphers are pseudorandom
permutation (PRP) families that operate on the fixed size block of bits. PRPs are
functions that cannot be differentiated from completely random permutations and
thus, are considered reliable until proven unreliable.
Advanced Encryption Standard (AES)
ā€¢ The features of AES are :
ā€¢ Symmetric key symmetric block
cipher
ā€¢ 128-bit data, 128/192/256-bit
keys
ā€¢ Stronger and faster than Triple-
DES
ā€¢ Provide full specification and
design details
ā€¢ Software implementable in C and
Java
Asymmetric Key Cryptography
Asymmetric Key Cryptography
ā€¢ Also known as public key cryptography
ā€¢ Asymmetric encryption uses two keys to encrypt a plain text. Secret keys are
exchanged over the Internet or a large network. It ensures that malicious persons
do not misuse the keys.
ā€¢ It is important to note that anyone with a secret key can decrypt the message &
therefore asymmetric encryption uses two related keys to boosting security. A
public key is made freely available to anyone who might want to send you a
message. The second private key is kept a secret so that you can only know.
ā€¢ Asymmetric encryption is mostly used in day-to-day communication channels,
especially over the Internet. Popular asymmetric key encryption algorithm :
EIGamal, RSA, DSA, Elliptic curve techniques, PKCS.
RSA Algorithm
ā€¢ Most widely used
form of public key
encryption
ā€¢ RSA stands for
Rivest, Shamir, and
Adelman, inventors
of this technique
ā€¢ Both public and
private key are
interchangeable
ā€¢ Variable Key Size
(512, 1024, or 2048
bits)
Differences Between Symmetric & Asymmetric Encryption
Key Differences Symmetric Encryption Asymmetric Encryption
Size of cipher text Smaller cipher text compares to original plain text file. Larger cipher text compares to original plain text file.
Data size Used to transmit big data. Used to transmit small data.
Resource Utilization Works on low usage of resources. Requires high consumption of resources.
Key Lengths 128 or 256-bit key size. RSA 2048-bit or higher key size.
Security Less secured due to use a single key for encryption. Much safer as two keys are involved in encryption & decryption.
Number of keys Uses a single key for encryption & decryption. Uses two keys for encryption & decryption
Techniques It is an old technique. It is a modern encryption technique.
Confidentiality
A single key for encryption & decryption has chances of key
compromised.
Two keys separately made for encryption & decryption that
removes the need to share a key.
Speed Symmetric encryption is fast technique Asymmetric encryption is slower in terms of speed.
Algorithms RC4, AES, DES, 3DES, & QUAD. RSA, Diffie-Hellman, ECC algorithms.
Hash Function
ā€¢ A cryptographic hash function
ā€¢ is a hash function that takes an
arbitrary block of data & returns a
fixed-size bit string, the cryptographic
hash value, such that any (accidental or
intentional) change to the data will
(with very high probability) change the
hash value.
ā€¢ The data to be encoded are often called the
message, & the hash value is sometimes
called the message digest or simply digest.
ā€¢ Popular Hash Functions: Message Digest
(MD) & Secure Hash Function (SHA)
Popular Hash Functions
Message
Digest
(MD)
comprises of hash functions MD2, MD4, MD5
and MD6
MD5 digests have been widely used in the
software world to provide assurance about
integrity of transferred file.
For example, file servers often provide a pre-
computed MD5 checksum for the files, so that
a user can compare the checksum of the
downloaded file to it.
In 2004, collisions were found in MD5.. This
collision attack resulted in compromised MD5
and hence it is no longer recommended for
use.
Secure
Hash
Function
(SHA)
comprise of four SHA algorithms; SHA-0, SHA-1, SHA-
2, and SHA-3
The original version is SHA-0, a 160-bit hash function,
SHA-1 is the most widely used of the existing SHA hash
functions. It is employed in several widely used
applications and protocols including Secure Socket
Layer (SSL) security.
SHA-2 is a strong hash function. Though significantly
different, its basic design is still follows design of SHA-
1
In Oct 2012, the NIST chose the Keccak algorithm as
the new SHA-3 standard. Keccak offers many benefits,
such as efficient performance and good resistance for
attacks.
Quantum Computing
-Quantum theory: focuses on phenomenon of energy & quantum level.
-Quantum computing:
ā€¢ uses the principles of quantum theory to develop computer technologies.
ā€¢ encompasses quantum cryptography & quantum communication.
ā€¢ enormous power-> the capability to be in multiple states at the same time
and perform tasks using all possible permutations simultaneously.
-Applications of Quantum Computing:
ā€¢ Improving Cancer Treatment
ā€¢ Optimizing Traffic Flow
ā€¢ Portfolio Optimization
ā€¢ Simulate Molecules
ā€¢ Make AI More Human-like
ā€¢ Forecasting Weather
ā€¢ Customized Advertising
Improving Cancer
Treatment
ā€¢ 2015: the researchers at the Roswell Park Cancer Institute proposed a new way to
optimize the radiation beams that uses quantum annealing computers.
ā€¢ 2017: Volkswagen tried to address the issue of traffic by tackling the traffic itself.
ā€¢ QUBO-Quadratic Unconstraint Binary Optimization technique along with the
quantum annealing computers -> to find the optimal route for a certain number of
cars in addition to all the possible routes in consideration.
ā€¢ Tested about 10000 taxis in Beijing-> to prove how this method optimizes traffic
faster > classical computers.
Optimizing Traffic Flow
Portfolio
Optimization
ā€¢ Deals with selecting the best asset to invest in, which balances the risk with the
expected returns.
ā€¢ Quantum annealing -> help answer these in a jiffy.
ā€¢ Quantum computers->simulate small molecules like beryllium hydride (BeH2).
ā€¢ Even if this looks small now, the fact that a 7-qubit chip simulated this molecule
holds significance as had there been more qubits at our disposal, it wouldā€™ve been
possible to simulate bigger molecules.
ā€¢ The processing capabilities of a quantum computer increase with an increase in the
number of qubits
Simulate Molecules
Make AI More
Human-like
ā€¢ Quantum computing -> matrices are used to determine the states of the qubits.
ā€¢ Essentially, any computational process performed on the neural networks-> similar to applying
transformational quantum gates on qubits (a quantum gate is a basic circuit operating on a small
number of qubits).
ā€¢ This makes quantum computers a perfect fit to implement AI.
ā€¢ 2017, a researcher from Russia-> proposing the possibility of quantum computers predicting the
weather more accurately as compared to classical computers.
ā€¢ A major issue with predicting the weather correctly is the involvement of a large amount of data.
ā€¢ With the help of the Dynamic Quantum Clustering (DQC) methodology, quantum computers are
expected to speed up the data processing to give us more accurate weather forecasts.
Forecasting Weather
Customized
Advertising
ā€¢ Recruit Communications:
ā€¢ relevancy of ads.
ā€¢ explained how companies-> use
quantum annealing to reach their
audience with relevant ads so as to
increase the CTR (Click Through
Rate).
ā€¢ Improved mobile data coverage
ā€¢ More human-like AI, such as
Google AI, which is developing
quantum algorithms to drastically
improve machine learning
Basic Cryptography.pdf

More Related Content

Similar to Basic Cryptography.pdf

Network security
Network securityNetwork security
Network security
ABHISHEK KUMAR
Ā 
Encryption
EncryptionEncryption
Encryption
Savyasachi14
Ā 
Cryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding informationCryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding information
Bitcoin Association of Australia
Ā 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
Pa Van Tanku
Ā 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
Gayathridevi120
Ā 
Encryption pres
Encryption presEncryption pres
Encryption pres
MereySovet
Ā 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
ukd789555
Ā 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
Seema Goel
Ā 
Cryptography.pptx
Cryptography.pptxCryptography.pptx
Cryptography.pptx
AnmolBansal66
Ā 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
jibonjibon5
Ā 
Encrytion ppt
Encrytion pptEncrytion ppt
Encrytion ppt
Raj Sampat
Ā 
Lec # 7 Symmetric and asymmetric cryptography.pptx
Lec # 7 Symmetric and asymmetric cryptography.pptxLec # 7 Symmetric and asymmetric cryptography.pptx
Lec # 7 Symmetric and asymmetric cryptography.pptx
skknowledge
Ā 
Seminar on Encryption and Authenticity
Seminar on Encryption and AuthenticitySeminar on Encryption and Authenticity
Seminar on Encryption and Authenticity
Hardik Manocha
Ā 
Lecture 5 - Cryptography.pptx
Lecture 5 - Cryptography.pptxLecture 5 - Cryptography.pptx
Lecture 5 - Cryptography.pptx
mustafaenayat
Ā 
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
Valerie Felton
Ā 
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfAn Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
KailasS9
Ā 
6. cryptography
6. cryptography6. cryptography
6. cryptography7wounders
Ā 
IS-cryptograpy algorithms.pptx
IS-cryptograpy algorithms.pptxIS-cryptograpy algorithms.pptx
IS-cryptograpy algorithms.pptx
V.V.Vanniaperumal College for Women
Ā 

Similar to Basic Cryptography.pdf (20)

Network security
Network securityNetwork security
Network security
Ā 
Encryption
EncryptionEncryption
Encryption
Ā 
Cryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding informationCryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding information
Ā 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
Ā 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
Ā 
Encryption pres
Encryption presEncryption pres
Encryption pres
Ā 
Security
SecuritySecurity
Security
Ā 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Ā 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
Ā 
Cryptography.pptx
Cryptography.pptxCryptography.pptx
Cryptography.pptx
Ā 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Ā 
Encrytion ppt
Encrytion pptEncrytion ppt
Encrytion ppt
Ā 
Lec # 7 Symmetric and asymmetric cryptography.pptx
Lec # 7 Symmetric and asymmetric cryptography.pptxLec # 7 Symmetric and asymmetric cryptography.pptx
Lec # 7 Symmetric and asymmetric cryptography.pptx
Ā 
Seminar on Encryption and Authenticity
Seminar on Encryption and AuthenticitySeminar on Encryption and Authenticity
Seminar on Encryption and Authenticity
Ā 
Lecture 5 - Cryptography.pptx
Lecture 5 - Cryptography.pptxLecture 5 - Cryptography.pptx
Lecture 5 - Cryptography.pptx
Ā 
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
Ā 
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfAn Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
Ā 
6. cryptography
6. cryptography6. cryptography
6. cryptography
Ā 
IS-cryptograpy algorithms.pptx
IS-cryptograpy algorithms.pptxIS-cryptograpy algorithms.pptx
IS-cryptograpy algorithms.pptx
Ā 
Asif
AsifAsif
Asif
Ā 

More from Setiya Nugroho

Modul 02 CRUD CI 3.pdf
Modul 02 CRUD CI 3.pdfModul 02 CRUD CI 3.pdf
Modul 02 CRUD CI 3.pdf
Setiya Nugroho
Ā 
Modul 02 CRUD CI 3.pdf
Modul 02 CRUD CI 3.pdfModul 02 CRUD CI 3.pdf
Modul 02 CRUD CI 3.pdf
Setiya Nugroho
Ā 
Web-based culinary tourism recommendation system
Web-based culinary tourism recommendation systemWeb-based culinary tourism recommendation system
Web-based culinary tourism recommendation system
Setiya Nugroho
Ā 
Network Automation.pdf
Network Automation.pdfNetwork Automation.pdf
Network Automation.pdf
Setiya Nugroho
Ā 
RPS 2022-Pemrograman Web 2.pdf
RPS 2022-Pemrograman Web 2.pdfRPS 2022-Pemrograman Web 2.pdf
RPS 2022-Pemrograman Web 2.pdf
Setiya Nugroho
Ā 
10. Data Security.pdf
10. Data Security.pdf10. Data Security.pdf
10. Data Security.pdf
Setiya Nugroho
Ā 
3. Basic Pentesting 1 Walkthrough.pdf
3. Basic Pentesting 1 Walkthrough.pdf3. Basic Pentesting 1 Walkthrough.pdf
3. Basic Pentesting 1 Walkthrough.pdf
Setiya Nugroho
Ā 
Web Programming Form
Web Programming FormWeb Programming Form
Web Programming Form
Setiya Nugroho
Ā 
Access Control Fundamentals
Access Control FundamentalsAccess Control Fundamentals
Access Control Fundamentals
Setiya Nugroho
Ā 
case study1 web defacement answer.pdf
case study1 web defacement answer.pdfcase study1 web defacement answer.pdf
case study1 web defacement answer.pdf
Setiya Nugroho
Ā 
WEEK5 Mobile Device Security 31032022.pdf
WEEK5 Mobile Device Security 31032022.pdfWEEK5 Mobile Device Security 31032022.pdf
WEEK5 Mobile Device Security 31032022.pdf
Setiya Nugroho
Ā 
Modul 05 Framework CodeIgniter.pdf
Modul 05 Framework CodeIgniter.pdfModul 05 Framework CodeIgniter.pdf
Modul 05 Framework CodeIgniter.pdf
Setiya Nugroho
Ā 
Malware
MalwareMalware
Malware
Setiya Nugroho
Ā 
Modul 4 Web Programming HTML Form & Hyperlink.pdf
Modul 4 Web Programming HTML Form & Hyperlink.pdfModul 4 Web Programming HTML Form & Hyperlink.pdf
Modul 4 Web Programming HTML Form & Hyperlink.pdf
Setiya Nugroho
Ā 

More from Setiya Nugroho (14)

Modul 02 CRUD CI 3.pdf
Modul 02 CRUD CI 3.pdfModul 02 CRUD CI 3.pdf
Modul 02 CRUD CI 3.pdf
Ā 
Modul 02 CRUD CI 3.pdf
Modul 02 CRUD CI 3.pdfModul 02 CRUD CI 3.pdf
Modul 02 CRUD CI 3.pdf
Ā 
Web-based culinary tourism recommendation system
Web-based culinary tourism recommendation systemWeb-based culinary tourism recommendation system
Web-based culinary tourism recommendation system
Ā 
Network Automation.pdf
Network Automation.pdfNetwork Automation.pdf
Network Automation.pdf
Ā 
RPS 2022-Pemrograman Web 2.pdf
RPS 2022-Pemrograman Web 2.pdfRPS 2022-Pemrograman Web 2.pdf
RPS 2022-Pemrograman Web 2.pdf
Ā 
10. Data Security.pdf
10. Data Security.pdf10. Data Security.pdf
10. Data Security.pdf
Ā 
3. Basic Pentesting 1 Walkthrough.pdf
3. Basic Pentesting 1 Walkthrough.pdf3. Basic Pentesting 1 Walkthrough.pdf
3. Basic Pentesting 1 Walkthrough.pdf
Ā 
Web Programming Form
Web Programming FormWeb Programming Form
Web Programming Form
Ā 
Access Control Fundamentals
Access Control FundamentalsAccess Control Fundamentals
Access Control Fundamentals
Ā 
case study1 web defacement answer.pdf
case study1 web defacement answer.pdfcase study1 web defacement answer.pdf
case study1 web defacement answer.pdf
Ā 
WEEK5 Mobile Device Security 31032022.pdf
WEEK5 Mobile Device Security 31032022.pdfWEEK5 Mobile Device Security 31032022.pdf
WEEK5 Mobile Device Security 31032022.pdf
Ā 
Modul 05 Framework CodeIgniter.pdf
Modul 05 Framework CodeIgniter.pdfModul 05 Framework CodeIgniter.pdf
Modul 05 Framework CodeIgniter.pdf
Ā 
Malware
MalwareMalware
Malware
Ā 
Modul 4 Web Programming HTML Form & Hyperlink.pdf
Modul 4 Web Programming HTML Form & Hyperlink.pdfModul 4 Web Programming HTML Form & Hyperlink.pdf
Modul 4 Web Programming HTML Form & Hyperlink.pdf
Ā 

Recently uploaded

Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
UiPathCommunity
Ā 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
Ā 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
Ā 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
Ā 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
Ā 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
Ā 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
Ā 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
Ā 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
Ā 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
Ā 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
Ā 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
Ā 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
Ā 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
Ā 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
Ā 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
Ā 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
Ā 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
Ā 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
Ā 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
Ā 

Recently uploaded (20)

Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
Ā 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Ā 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Ā 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Ā 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Ā 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Ā 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Ā 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ā 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Ā 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Ā 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Ā 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
Ā 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Ā 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Ā 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
Ā 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Ā 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
Ā 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Ā 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Ā 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Ā 

Basic Cryptography.pdf

  • 1. Basic Cryptography Assoc. Prof. Ts. Dr. Madihah Mohd Saudi Faculty of Science & Technology, USIM
  • 2. CONTENTS ā€¢ Introduction ā€¢ History of Cryptography ā€¢ Objectives ā€¢ Basic Terminology in Cryptography ā€¢ Types of Cryptography ā€¢ Symmetric ā€¢ Asymmetric ā€¢ Hash Function
  • 3. Introduction ā€¢ Cryptography: ā€¢ the study of secure communications techniques that allow only the sender & intended recipient of a message to view its contents. ā€¢ derived from the Greek word kryptos, which means hidden Phil Zimmermann ā€¢ Cryptography is the science of using mathematics to encrypt & decrypt data. Bruce Schneier ā€¢ Cryptography is the art & science of keeping messages secure.
  • 4. History of Cryptography ā€¢ The roots of cryptography are found in Egyptian & Roman civilizations. ā€¢ Hieroglyph ā€“ The Oldest Cryptographic Technique ā€¢ Some 4000 years ago, Egyptians used to communicate by messages written in hieroglyph. ā€¢ This code was the secret known only to the scribes who used to transmit messages on behalf of the kings. ā€¢ Caesar Shift Cipher, relies on shifting the letters of a message by an agreed number (3 was a common choice), the recipient of this message would then shift the letters back by the same number & obtain the original message. ā€¢ The Caesar cipher is named after Julius Caesar , who used it with a shift of three to protect messages of military significance.
  • 5. Caesar Shift Cipher ā€¢ Plaintext: basic cryptography ā€¢ Ciphertext: edvlf fubswrjudskb
  • 6. Authenticity ensures the sender & recipient can verify each otherā€™s identities & the destination of the message. Objectives Authenticity Non-repudiation Confidentiality Integrity Non-repudiation means the sender of the message cannot backtrack in the future & deny their reasons for sending or creating the message. Confidentiality ensures that only the intended recipient can decrypt the message & read its contents. Integrity focuses on the ability to be certain that the information contained within the message cannot be modified while in storage or transit.
  • 7. Basic Terminology in Cryptography Plaintext The original message Ciphertext The coded message Enciphering or encryption Process of converting from plaintext to ciphertext Deciphering or decryption Restoring the plaintext from the ciphertext Cryptography Study of encryption Cryptographic system or cipher Schemes used for encryption Cryptanalysis Techniques used for deciphering a message without any knowledge of the enciphering details Cryptology Areas of cryptography & cryptanalysis together
  • 8. Uses two different key to encrypt & decrypt the message The message is encrypted by using a key & the same key is used to decrypt the message Types of Cryptography Symmetric Key Cryptography Asymmetric Key Cryptography
  • 10. Symmetric Key Cryptography Simplest kind of encryption - only one secret key to cipher & decipher information. It uses a secret key that can either be a number, a word or a string of random letters. It is a blended with the plain text of a message to change the content in a particular way. The sender & the recipient should know the secret key that is used to encrypt & decrypt all the messages. The main disadvantage : all parties involved must exchange the key used to encrypt the data before they can decrypt it. Example: Blowfish, AES( AES-128, AES- 192, & AES-256), RC4, DES, RC5, & RC6
  • 12. Classical Cryptography ā€¢ Transposition Ciphers ā€¢ method of encryption by which the positions held by units of plaintext (which are commonly characters or groups of characters) are shifted according to a regular system, so that the ciphertext constitutes a permutation of the plaintext
  • 13. Classical Cryptography ā€¢ Substitution Ciphers ā€¢ Method of encryption by which units of plaintext are replaced with ciphertext, according to a fixed system; the ā€œunitsā€ may be single letters (the most common), pairs of letters, triplets of letters, mixtures of the above, and so forth.
  • 14. Modern Cryptography ā€¢ Stream Cipher ā€¢ Symmetric or secret-key encryption algorithm that encrypts a single bit at a time. With a Stream Cipher, the same plaintext bit or byte will encrypt to a different bit or byte every time it is encrypted.
  • 15. Modern Cryptography ā€¢ Block Cipher ā€¢ An encryption method that applies a deterministic algorithm along with a symmetric key to encrypt a block of text, rather than encrypting one bit at a time as in stream ciphers Example: A common block cipher, AES, encrypts 128-bit blocks with a key of predetermined length: 128, 192, or 256 bits. Block ciphers are pseudorandom permutation (PRP) families that operate on the fixed size block of bits. PRPs are functions that cannot be differentiated from completely random permutations and thus, are considered reliable until proven unreliable.
  • 16. Advanced Encryption Standard (AES) ā€¢ The features of AES are : ā€¢ Symmetric key symmetric block cipher ā€¢ 128-bit data, 128/192/256-bit keys ā€¢ Stronger and faster than Triple- DES ā€¢ Provide full specification and design details ā€¢ Software implementable in C and Java
  • 18. Asymmetric Key Cryptography ā€¢ Also known as public key cryptography ā€¢ Asymmetric encryption uses two keys to encrypt a plain text. Secret keys are exchanged over the Internet or a large network. It ensures that malicious persons do not misuse the keys. ā€¢ It is important to note that anyone with a secret key can decrypt the message & therefore asymmetric encryption uses two related keys to boosting security. A public key is made freely available to anyone who might want to send you a message. The second private key is kept a secret so that you can only know. ā€¢ Asymmetric encryption is mostly used in day-to-day communication channels, especially over the Internet. Popular asymmetric key encryption algorithm : EIGamal, RSA, DSA, Elliptic curve techniques, PKCS.
  • 19. RSA Algorithm ā€¢ Most widely used form of public key encryption ā€¢ RSA stands for Rivest, Shamir, and Adelman, inventors of this technique ā€¢ Both public and private key are interchangeable ā€¢ Variable Key Size (512, 1024, or 2048 bits)
  • 20. Differences Between Symmetric & Asymmetric Encryption Key Differences Symmetric Encryption Asymmetric Encryption Size of cipher text Smaller cipher text compares to original plain text file. Larger cipher text compares to original plain text file. Data size Used to transmit big data. Used to transmit small data. Resource Utilization Works on low usage of resources. Requires high consumption of resources. Key Lengths 128 or 256-bit key size. RSA 2048-bit or higher key size. Security Less secured due to use a single key for encryption. Much safer as two keys are involved in encryption & decryption. Number of keys Uses a single key for encryption & decryption. Uses two keys for encryption & decryption Techniques It is an old technique. It is a modern encryption technique. Confidentiality A single key for encryption & decryption has chances of key compromised. Two keys separately made for encryption & decryption that removes the need to share a key. Speed Symmetric encryption is fast technique Asymmetric encryption is slower in terms of speed. Algorithms RC4, AES, DES, 3DES, & QUAD. RSA, Diffie-Hellman, ECC algorithms.
  • 21. Hash Function ā€¢ A cryptographic hash function ā€¢ is a hash function that takes an arbitrary block of data & returns a fixed-size bit string, the cryptographic hash value, such that any (accidental or intentional) change to the data will (with very high probability) change the hash value. ā€¢ The data to be encoded are often called the message, & the hash value is sometimes called the message digest or simply digest. ā€¢ Popular Hash Functions: Message Digest (MD) & Secure Hash Function (SHA)
  • 22. Popular Hash Functions Message Digest (MD) comprises of hash functions MD2, MD4, MD5 and MD6 MD5 digests have been widely used in the software world to provide assurance about integrity of transferred file. For example, file servers often provide a pre- computed MD5 checksum for the files, so that a user can compare the checksum of the downloaded file to it. In 2004, collisions were found in MD5.. This collision attack resulted in compromised MD5 and hence it is no longer recommended for use. Secure Hash Function (SHA) comprise of four SHA algorithms; SHA-0, SHA-1, SHA- 2, and SHA-3 The original version is SHA-0, a 160-bit hash function, SHA-1 is the most widely used of the existing SHA hash functions. It is employed in several widely used applications and protocols including Secure Socket Layer (SSL) security. SHA-2 is a strong hash function. Though significantly different, its basic design is still follows design of SHA- 1 In Oct 2012, the NIST chose the Keccak algorithm as the new SHA-3 standard. Keccak offers many benefits, such as efficient performance and good resistance for attacks.
  • 24. -Quantum theory: focuses on phenomenon of energy & quantum level. -Quantum computing: ā€¢ uses the principles of quantum theory to develop computer technologies. ā€¢ encompasses quantum cryptography & quantum communication. ā€¢ enormous power-> the capability to be in multiple states at the same time and perform tasks using all possible permutations simultaneously. -Applications of Quantum Computing: ā€¢ Improving Cancer Treatment ā€¢ Optimizing Traffic Flow ā€¢ Portfolio Optimization ā€¢ Simulate Molecules ā€¢ Make AI More Human-like ā€¢ Forecasting Weather ā€¢ Customized Advertising
  • 25. Improving Cancer Treatment ā€¢ 2015: the researchers at the Roswell Park Cancer Institute proposed a new way to optimize the radiation beams that uses quantum annealing computers. ā€¢ 2017: Volkswagen tried to address the issue of traffic by tackling the traffic itself. ā€¢ QUBO-Quadratic Unconstraint Binary Optimization technique along with the quantum annealing computers -> to find the optimal route for a certain number of cars in addition to all the possible routes in consideration. ā€¢ Tested about 10000 taxis in Beijing-> to prove how this method optimizes traffic faster > classical computers. Optimizing Traffic Flow
  • 26. Portfolio Optimization ā€¢ Deals with selecting the best asset to invest in, which balances the risk with the expected returns. ā€¢ Quantum annealing -> help answer these in a jiffy. ā€¢ Quantum computers->simulate small molecules like beryllium hydride (BeH2). ā€¢ Even if this looks small now, the fact that a 7-qubit chip simulated this molecule holds significance as had there been more qubits at our disposal, it wouldā€™ve been possible to simulate bigger molecules. ā€¢ The processing capabilities of a quantum computer increase with an increase in the number of qubits Simulate Molecules
  • 27. Make AI More Human-like ā€¢ Quantum computing -> matrices are used to determine the states of the qubits. ā€¢ Essentially, any computational process performed on the neural networks-> similar to applying transformational quantum gates on qubits (a quantum gate is a basic circuit operating on a small number of qubits). ā€¢ This makes quantum computers a perfect fit to implement AI. ā€¢ 2017, a researcher from Russia-> proposing the possibility of quantum computers predicting the weather more accurately as compared to classical computers. ā€¢ A major issue with predicting the weather correctly is the involvement of a large amount of data. ā€¢ With the help of the Dynamic Quantum Clustering (DQC) methodology, quantum computers are expected to speed up the data processing to give us more accurate weather forecasts. Forecasting Weather
  • 28. Customized Advertising ā€¢ Recruit Communications: ā€¢ relevancy of ads. ā€¢ explained how companies-> use quantum annealing to reach their audience with relevant ads so as to increase the CTR (Click Through Rate). ā€¢ Improved mobile data coverage ā€¢ More human-like AI, such as Google AI, which is developing quantum algorithms to drastically improve machine learning