SlideShare a Scribd company logo
1 of 9
BY
M.LAVANYA,M.Sc(cs)
NADAR SARASWATHI COLLEGE OF ARTS
&SCIENCE THENI
CRYPTOGRAPHY
Cryptography is a method of protecting information
and communications through the use of codes so that
only those for whom the information is intended can
read and process it. The pre-fix "crypt" means
"hidden" or "vault" and the suffix "graph" stands for
"writing."
CRYPTOGRAPHY TECHNIQUES
Cryptography techniques
 Cryptography is closely related to the disciplines
of cryptology and cryptanalysis. It includes techniques
such as microdots, merging words with images, and other
ways to hide information in storage or transit. However, in
today's computer-centric world, cryptography is most often
associated with scrambling plaintext (ordinary text,
sometimes referred to as clear text) into cipher text (a
process called encryption), then back again (known as
decryption). Individuals who practice this field are known
as cryptographers.
MODERN CRYPTOGRAPHY
Modern cryptography concerns itself with the following four
objectives:
 Confidentiality: the information cannot be understood by
anyone for whom it was unintended
 Integrity: the information cannot be altered in storage or
transit between sender and intended receiver without the
alteration being detected
 Non-repudiation: the creator/sender of the information
cannot deny at a later stage his or her intentions in the
creation or transmission of the information
 Authentication: the sender and receiver can confirm each
other's identity and the origin/destination of the
information
BASIC CONCEPTS
 Cryptosystem, plaintext, cipher text, key
 Examples of simple cryptosystems
 To publish or not to publish?
 Secret and open research in cryptology
 Software vs. hardware implementations of
cryptography
 Evolution of cryptography and cryptanalysis.
 Consider two parties Alice and Bob. Now, Alice wants to
send a message m to Bob over a secure channel.
So, what happens is as follows.
The sender’s message or sometimes called the Plaintext, is
converted into an unreadable form using a Key k. The
resultant text obtained is called the Cipher text. This
process is known as Encryption. At the time of receival, the
Cipher text is converted back into the plaintext using the
same Key k, so that it can be read by the receiver. This
process is known as Decryption.
 Alice (Sender) Bob (Receiver) C = E (m, k) ----> m = D (C,
k)
IMPLEMENTATION OF SECURITY
SERVICES
 Classical (symmetric) vs. public key (asymmetric)
cryptosystems
 Trapdoor one-way functions - main components of public
key cryptosystems
 Features required from today's ciphers
 Implementing security services using cryptographic
transformations
 Block vs. stream ciphers
 Measures of the cipher strength
KEY MANAGEMENT
 Session keys and key encrypting keys
 Exchange of keys using Key Distribution Center
 The Diffie-Hellman key exchange protocol
 Exchange of symmetric keys using public key
cryptosystems
 Generation and registration of the public key pair
 Concept of a public key certificate
 Formats of certificates
 Hierarchy of Certification Authorities - Public Key
Infrastructure
 Certificate revocation
SECURE INTERNET PROTOCOL
 Secure electronic mail
 S/MIME
 Open PGP
 Secure WWW
 SSL
 Secure payment card protocols
 Secure virtual private networks
 IPSec

More Related Content

What's hot (20)

Crytography
CrytographyCrytography
Crytography
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Overview of cryptography
Overview of cryptographyOverview of cryptography
Overview of cryptography
 
Criptography
CriptographyCriptography
Criptography
 
Cryptography and E-Commerce
Cryptography and E-CommerceCryptography and E-Commerce
Cryptography and E-Commerce
 
Cryptography Presentation
Cryptography PresentationCryptography Presentation
Cryptography Presentation
 
Cryptography Intro
Cryptography IntroCryptography Intro
Cryptography Intro
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
Cryptography Cryptography
Cryptography
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementation
 
Software for encrypting and decrypting text file powerpointpresentation
Software for encrypting and decrypting text file powerpointpresentationSoftware for encrypting and decrypting text file powerpointpresentation
Software for encrypting and decrypting text file powerpointpresentation
 
Group 6
Group 6Group 6
Group 6
 
Cryptography
CryptographyCryptography
Cryptography
 
Presentation on Cryptography
Presentation on CryptographyPresentation on Cryptography
Presentation on Cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Encryption
EncryptionEncryption
Encryption
 
Information Security Cryptography ( L01- introduction )
Information Security Cryptography ( L01- introduction )Information Security Cryptography ( L01- introduction )
Information Security Cryptography ( L01- introduction )
 

Similar to Computer network

crypto-105058445051058480051448005540405
crypto-105058445051058480051448005540405crypto-105058445051058480051448005540405
crypto-105058445051058480051448005540405ukd789555
 
Cryptography, a science of secure writing
Cryptography, a science of secure writingCryptography, a science of secure writing
Cryptography, a science of secure writingtahirilyas92
 
Computer Security Chapter III.pdf
Computer Security Chapter III.pdfComputer Security Chapter III.pdf
Computer Security Chapter III.pdfHarrisentertainment
 
Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)newbie2019
 
Cryptography-Known plain text attack
Cryptography-Known plain text attack Cryptography-Known plain text attack
Cryptography-Known plain text attack amiteshg
 
Network security and cryptography
Network security and cryptographyNetwork security and cryptography
Network security and cryptographyPavithra renu
 
Evolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniquesEvolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniquesMona Rajput
 

Similar to Computer network (20)

Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
1111111111.pptx
1111111111.pptx1111111111.pptx
1111111111.pptx
 
crypto-105058445051058480051448005540405
crypto-105058445051058480051448005540405crypto-105058445051058480051448005540405
crypto-105058445051058480051448005540405
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryp Essay
Cryp EssayCryp Essay
Cryp Essay
 
Pavan
PavanPavan
Pavan
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
cryptography
cryptographycryptography
cryptography
 
Cryptography, a science of secure writing
Cryptography, a science of secure writingCryptography, a science of secure writing
Cryptography, a science of secure writing
 
Cryptography
Cryptography Cryptography
Cryptography
 
Computer Security Chapter III.pdf
Computer Security Chapter III.pdfComputer Security Chapter III.pdf
Computer Security Chapter III.pdf
 
Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)
 
Cryptography-Known plain text attack
Cryptography-Known plain text attack Cryptography-Known plain text attack
Cryptography-Known plain text attack
 
Network security and cryptography
Network security and cryptographyNetwork security and cryptography
Network security and cryptography
 
Is case study
Is   case studyIs   case study
Is case study
 
Crypt
CryptCrypt
Crypt
 
Evolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniquesEvolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniques
 

More from snegacmr

Process improvement
Process improvementProcess improvement
Process improvementsnegacmr
 
Rest based xml web services
Rest based xml web servicesRest based xml web services
Rest based xml web servicessnegacmr
 
Business intelligence
Business intelligenceBusiness intelligence
Business intelligencesnegacmr
 
Basic concepts of parallelization
Basic concepts of parallelizationBasic concepts of parallelization
Basic concepts of parallelizationsnegacmr
 
Deepi rdbms
Deepi rdbmsDeepi rdbms
Deepi rdbmssnegacmr
 
Dm powerpoint
Dm powerpointDm powerpoint
Dm powerpointsnegacmr
 
Data mining
Data miningData mining
Data miningsnegacmr
 
Query optimization
Query optimizationQuery optimization
Query optimizationsnegacmr
 
Network security
Network securityNetwork security
Network securitysnegacmr
 
Discretization and concept hierarchy(os)
Discretization and concept hierarchy(os)Discretization and concept hierarchy(os)
Discretization and concept hierarchy(os)snegacmr
 
System components (os)
System components (os)System components (os)
System components (os)snegacmr
 

More from snegacmr (14)

Process improvement
Process improvementProcess improvement
Process improvement
 
Rest based xml web services
Rest based xml web servicesRest based xml web services
Rest based xml web services
 
Business intelligence
Business intelligenceBusiness intelligence
Business intelligence
 
Basic concepts of parallelization
Basic concepts of parallelizationBasic concepts of parallelization
Basic concepts of parallelization
 
Deepi rdbms
Deepi rdbmsDeepi rdbms
Deepi rdbms
 
Os
OsOs
Os
 
Dm powerpoint
Dm powerpointDm powerpoint
Dm powerpoint
 
Sql
SqlSql
Sql
 
Data mining
Data miningData mining
Data mining
 
Cn
CnCn
Cn
 
Query optimization
Query optimizationQuery optimization
Query optimization
 
Network security
Network securityNetwork security
Network security
 
Discretization and concept hierarchy(os)
Discretization and concept hierarchy(os)Discretization and concept hierarchy(os)
Discretization and concept hierarchy(os)
 
System components (os)
System components (os)System components (os)
System components (os)
 

Recently uploaded

MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 

Recently uploaded (20)

MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 

Computer network

  • 2. CRYPTOGRAPHY Cryptography is a method of protecting information and communications through the use of codes so that only those for whom the information is intended can read and process it. The pre-fix "crypt" means "hidden" or "vault" and the suffix "graph" stands for "writing."
  • 3. CRYPTOGRAPHY TECHNIQUES Cryptography techniques  Cryptography is closely related to the disciplines of cryptology and cryptanalysis. It includes techniques such as microdots, merging words with images, and other ways to hide information in storage or transit. However, in today's computer-centric world, cryptography is most often associated with scrambling plaintext (ordinary text, sometimes referred to as clear text) into cipher text (a process called encryption), then back again (known as decryption). Individuals who practice this field are known as cryptographers.
  • 4. MODERN CRYPTOGRAPHY Modern cryptography concerns itself with the following four objectives:  Confidentiality: the information cannot be understood by anyone for whom it was unintended  Integrity: the information cannot be altered in storage or transit between sender and intended receiver without the alteration being detected  Non-repudiation: the creator/sender of the information cannot deny at a later stage his or her intentions in the creation or transmission of the information  Authentication: the sender and receiver can confirm each other's identity and the origin/destination of the information
  • 5. BASIC CONCEPTS  Cryptosystem, plaintext, cipher text, key  Examples of simple cryptosystems  To publish or not to publish?  Secret and open research in cryptology  Software vs. hardware implementations of cryptography  Evolution of cryptography and cryptanalysis.
  • 6.  Consider two parties Alice and Bob. Now, Alice wants to send a message m to Bob over a secure channel. So, what happens is as follows. The sender’s message or sometimes called the Plaintext, is converted into an unreadable form using a Key k. The resultant text obtained is called the Cipher text. This process is known as Encryption. At the time of receival, the Cipher text is converted back into the plaintext using the same Key k, so that it can be read by the receiver. This process is known as Decryption.  Alice (Sender) Bob (Receiver) C = E (m, k) ----> m = D (C, k)
  • 7. IMPLEMENTATION OF SECURITY SERVICES  Classical (symmetric) vs. public key (asymmetric) cryptosystems  Trapdoor one-way functions - main components of public key cryptosystems  Features required from today's ciphers  Implementing security services using cryptographic transformations  Block vs. stream ciphers  Measures of the cipher strength
  • 8. KEY MANAGEMENT  Session keys and key encrypting keys  Exchange of keys using Key Distribution Center  The Diffie-Hellman key exchange protocol  Exchange of symmetric keys using public key cryptosystems  Generation and registration of the public key pair  Concept of a public key certificate  Formats of certificates  Hierarchy of Certification Authorities - Public Key Infrastructure  Certificate revocation
  • 9. SECURE INTERNET PROTOCOL  Secure electronic mail  S/MIME  Open PGP  Secure WWW  SSL  Secure payment card protocols  Secure virtual private networks  IPSec