SlideShare a Scribd company logo
1 of 23
MR. Sourabh S. Badve
(CEH/ECSA)
Working as a freelancing Cyber Security Expert
•Information security means protecting information and information systems from
unauthorized access, use, disclosure, disruption, modification, or destruction
Cryptography (from Greek "hidden, secret") is the practice and study of hiding
information
•Information security is concerned with the confidentiality, integrity and availability
of data regardless of the form the data may take: electronic, print,    or other
forms.
•Cryptography is used in applications present in technologically advanced societies;
examples include the security of ATM cards, computer passwords,       and
electronic commerce, which all depend on cryptography.
•Information security uses cryptography to transform usable information
into a form that renders it unusable by anyone other than an authorized
user; this process is called encryption

•Encrypted information can be transformed back into its original form by an
authorized user, who possesses the cryptographic key, through the process
of decryption

•Cryptography is used in information security to protect information from
unauthorized users while the information is in transit and storage

•Cryptography provides information security with improved authentication
methods, message digests, digital signatures, and encrypted network
communications
Modern Information Security
• Computer Security
It mainly focuses on shared system, such as time-sharing system and
necessary to provide some tools to protect file and other information stored
on the computer

•   Network (Communication) Security
It mainly concerns distributed system, such as internet and its purpose is to
protect the information over the internet

It also focuses on measures to deter, prevent, detect and correct security
violations that involve the transmission of information.
• Confidentiality   : Information is accessible only for reading

• Authentication    : Information is correctly identified, with an assurance
                     that identity is not false

• Integrity         : Only authorized parties are able to modify computer
                     system assets and transmitted information

• Nonrepudiation    : Both the sender and receiver of message are unable
                      to deny the transmission.

• Access Control    : Requires that access to information resources may be
                     controlled by or for the target system..
INTERRUPTION              MODIFICATION



Source   Destination     Source    Destination


   INTERCEPTION             FABRICATION



Source     Destination   Source     Destination
Passive Attacks
                      Passive threats

                      Interception

Release of message contents          Traffic analysis


                      Active Attacks
                     Passive threats



Interruption            Modification                 Fabrication
(availability)           (integrity)                (authenticity)
Confidentiality




Integrity          Avaliability
The art or science encompassing the principles and methods of transforming
an intelligible message into unintelligibleone, and then retransforming that
message back to original form.


       Plaintext                  Encipher(encode)
       Ciphertext                 Decipher(decode)
       Cipher                     Cryptanalysis
       Key                        Cryptology
       code
World War II brought about many advancements in information security
and mark the beginning of the professional field of information security




              German Lorenz cipher machine
The development of digital computers and
electronics after WWII made possible
much more complex ciphers
Many computer ciphers can be charact-
erized by their operation on binary bit
sequences,unlike classical and
mechanical schemes
The Enigma machine, used, in several
variants, by the German military between
the late 1920s and the end of
World War II


                                           Enigma machine
Cryptography, then, not only protects data from theft or alteration, but can
also be used for user authentication. There are, in general, three types of
cryptographic schemes typically used to accomplish these goals


  •Secret key cryptography (or symmetric)
  •Public-key cryptography (or asymmetric)
  •Hash functions,
•In this form single key is used for both encryption and decryption
•The sender uses the key to encrypt the plaintext and sends the ciphertext
to the receiver. The receiver applies the same key to decrypt the message
and recover the plaintext
•Because a single key is used for both functions, secret key cryptography is
also called symmetric encryption
•Secret key cryptography schemes are generally categorized as being
     either stream ciphers or block ciphers.
•Stream ciphers operate on a single bit (byte or computer word) at a time
and implement some form of feedback mechanism so that the key is
constantly changing.
• A block cipher is so-called because the scheme encrypts one block of
data at a time using the same key on each block.
• In general, the same plaintext block will always encrypt to the same
ciphertext when using the same key in a block cipher whereas the same
plaintext will encrypt to different ciphertext in a stream cipher.
•PKC depends upon the existence of so-called one-way functions,that
are easy to computer whereas their inverse function is difficult to compute
•It employs two keys that are mathematically related although knowledge
of one key does not allow someone to easily determine the other key
•One key is used to encrypt the plaintext and the other key is used to
decrypt the ciphertext
Hash functions, also called message digests and one-way encryption, are
algorithms that, in some sense, use no key
A fixed-length hash value is computed based upon the plaintext that makes
it impossible for either the contents or length of the plaintext to be
recovered.
 Hash algorithms are typically used to provide a digital fingerprint of a file's
contents and are also commonly employed by many operating systems to
encrypt passwords and then, provide a measure of the integrity of a file
Combines all functions to form a secure transmission comprising digital signature and
digital envelope
•Nearly all modern network operating systems employ passwords at the
very least to protect and authenticate users accessing computer and
network resources
•But passwords are not typically kept on a host or server in plaintext, but
are generally encrypted using some sort of hash scheme
•As the passwords are not saved in plaintext on computer systems
precisely,they cannot be easily compromised.

•An even stronger authentication method uses the password to modify a
shared secret between the client and server, but never allows the
password in any form to go across the network.
•PGP can be used to sign or encrypt e-mail messages with the mere
click of the mouse
•Depending upon the version of PGP, the software uses SHA or MD5
for calculating the message hash; CAST, Triple-DES, or IDEA for
encryption; and RSA or DSS/Diffie-Hellman for key exchange and digital
signatures.
•PGP is available as a plug-in for many e-mail clients, such as Claris
Emailer, Microsoft Outlook and Qualcomm Eudora
•Pretty Good Privacy (PGP) is one of today's most widely used public key
cryptography programs, developed by Philip Zimmermann in the early
1990s
•In typical applications workstation are attached to LAN. The user can
reach other hosts, workstations and servers in the same LAN that are
interconnected via bridges and routers.

•Transmissions from station to station is visible on the LAN to all
station. Data is transmitted in the form of packets which contain
source/destination Ids, and other information.

•On this basis, an eavesdropper can monitor and capture traffic
packets. Eavesdropper needs not be a local LAN user; it could be
anyone to whom the LAN offers a dial-up capacity.

•Eavesdropping may also occur in any of the communication links
which provide connectivity to the system
Link Encryption
Each vulnerable communication link is equipped on both end with an
encryption devices

End-to-End Encryption
Data is encrypted only at the source node and decrypted at the destination
node

Problem
Data consists of packets have a header portion and content portion. we can’t
encrypt the header. So the data is secure and the traffic pattern is not
Solution
Use a combination of above two approaches.
Cryptography

More Related Content

What's hot (19)

Cryptography
CryptographyCryptography
Cryptography
 
Security
SecuritySecurity
Security
 
Networksecurity1 1
Networksecurity1 1 Networksecurity1 1
Networksecurity1 1
 
CRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITYCRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITY
 
Sw2 b12
Sw2 b12Sw2 b12
Sw2 b12
 
A+ Update Endpoint Encryption
A+ Update Endpoint EncryptionA+ Update Endpoint Encryption
A+ Update Endpoint Encryption
 
Cryptography, a science of secure writing
Cryptography, a science of secure writingCryptography, a science of secure writing
Cryptography, a science of secure writing
 
Hybrid cryptographic technique using rsa algorithm and scheduling concepts
Hybrid cryptographic technique using rsa algorithm and scheduling conceptsHybrid cryptographic technique using rsa algorithm and scheduling concepts
Hybrid cryptographic technique using rsa algorithm and scheduling concepts
 
Encryption techniques
Encryption techniquesEncryption techniques
Encryption techniques
 
Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...
 
Cryptography and Encryptions,Network Security,Caesar Cipher
Cryptography and Encryptions,Network Security,Caesar CipherCryptography and Encryptions,Network Security,Caesar Cipher
Cryptography and Encryptions,Network Security,Caesar Cipher
 
Ijtra150171
Ijtra150171Ijtra150171
Ijtra150171
 
Frsa
FrsaFrsa
Frsa
 
Crytography
CrytographyCrytography
Crytography
 
Cryptography
CryptographyCryptography
Cryptography
 
04 authentication
04 authentication04 authentication
04 authentication
 
Unit 1 Introducation
Unit 1 IntroducationUnit 1 Introducation
Unit 1 Introducation
 
Encrytion ppt
Encrytion pptEncrytion ppt
Encrytion ppt
 
Overview of cryptography
Overview of cryptographyOverview of cryptography
Overview of cryptography
 

Similar to Cryptography

information technology cryptography Msc chapter 1-4.pdf
information technology  cryptography Msc chapter 1-4.pdfinformation technology  cryptography Msc chapter 1-4.pdf
information technology cryptography Msc chapter 1-4.pdfwondimagegndesta
 
Cryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptxCryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptxSamiDan3
 
Cryptography
CryptographyCryptography
CryptographyJasim Jas
 
A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfYasmine Anino
 
cryptography introduction.pptx
cryptography introduction.pptxcryptography introduction.pptx
cryptography introduction.pptxBisharSuleiman
 
Cryptography and Network Lecture Notes
Cryptography and Network Lecture NotesCryptography and Network Lecture Notes
Cryptography and Network Lecture NotesFellowBuddy.com
 
Types of Cryptosystem and Cryptographic Attack
Types of Cryptosystem and Cryptographic AttackTypes of Cryptosystem and Cryptographic Attack
Types of Cryptosystem and Cryptographic AttackMona Rajput
 
Cryptography : The Art of Secured Messaging
Cryptography : The Art of Secured MessagingCryptography : The Art of Secured Messaging
Cryptography : The Art of Secured MessagingSumit Satam
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptographyKiran Patil
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptographypinkutinku26
 
Cryptography full report
Cryptography full reportCryptography full report
Cryptography full reportharpoo123143
 
E-commerce- Security & Encryption
E-commerce- Security & EncryptionE-commerce- Security & Encryption
E-commerce- Security & EncryptionBiroja
 
PresentationonCRYPTOGRAPHYppt.pdf
PresentationonCRYPTOGRAPHYppt.pdfPresentationonCRYPTOGRAPHYppt.pdf
PresentationonCRYPTOGRAPHYppt.pdfVAIBHAVCHAKRAWARTI
 

Similar to Cryptography (20)

chapter 1-4.pdf
chapter 1-4.pdfchapter 1-4.pdf
chapter 1-4.pdf
 
information technology cryptography Msc chapter 1-4.pdf
information technology  cryptography Msc chapter 1-4.pdfinformation technology  cryptography Msc chapter 1-4.pdf
information technology cryptography Msc chapter 1-4.pdf
 
Cryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptxCryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptx
 
Cryptography
CryptographyCryptography
Cryptography
 
A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdf
 
Network security
Network securityNetwork security
Network security
 
cryptography introduction.pptx
cryptography introduction.pptxcryptography introduction.pptx
cryptography introduction.pptx
 
lecture 7.pptx
lecture 7.pptxlecture 7.pptx
lecture 7.pptx
 
Cryptography and Network Lecture Notes
Cryptography and Network Lecture NotesCryptography and Network Lecture Notes
Cryptography and Network Lecture Notes
 
groupWork.pptx
groupWork.pptxgroupWork.pptx
groupWork.pptx
 
Types of Cryptosystem and Cryptographic Attack
Types of Cryptosystem and Cryptographic AttackTypes of Cryptosystem and Cryptographic Attack
Types of Cryptosystem and Cryptographic Attack
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Cryptography : The Art of Secured Messaging
Cryptography : The Art of Secured MessagingCryptography : The Art of Secured Messaging
Cryptography : The Art of Secured Messaging
 
Sw2
Sw2Sw2
Sw2
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptography
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptography
 
Cryptography full report
Cryptography full reportCryptography full report
Cryptography full report
 
E-commerce- Security & Encryption
E-commerce- Security & EncryptionE-commerce- Security & Encryption
E-commerce- Security & Encryption
 
PresentationonCRYPTOGRAPHYppt.pdf
PresentationonCRYPTOGRAPHYppt.pdfPresentationonCRYPTOGRAPHYppt.pdf
PresentationonCRYPTOGRAPHYppt.pdf
 

More from Sourabh Badve

More from Sourabh Badve (8)

Ipsec 2
Ipsec 2Ipsec 2
Ipsec 2
 
Ip routing
Ip routingIp routing
Ip routing
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Basic ip traffic management with access control lists
Basic ip traffic management with access control listsBasic ip traffic management with access control lists
Basic ip traffic management with access control lists
 
Basic router configuration
Basic router configurationBasic router configuration
Basic router configuration
 
Corporate security
Corporate securityCorporate security
Corporate security
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 

Cryptography

  • 1.
  • 2. MR. Sourabh S. Badve (CEH/ECSA) Working as a freelancing Cyber Security Expert
  • 3. •Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction Cryptography (from Greek "hidden, secret") is the practice and study of hiding information •Information security is concerned with the confidentiality, integrity and availability of data regardless of the form the data may take: electronic, print, or other forms. •Cryptography is used in applications present in technologically advanced societies; examples include the security of ATM cards, computer passwords, and electronic commerce, which all depend on cryptography.
  • 4. •Information security uses cryptography to transform usable information into a form that renders it unusable by anyone other than an authorized user; this process is called encryption •Encrypted information can be transformed back into its original form by an authorized user, who possesses the cryptographic key, through the process of decryption •Cryptography is used in information security to protect information from unauthorized users while the information is in transit and storage •Cryptography provides information security with improved authentication methods, message digests, digital signatures, and encrypted network communications
  • 5. Modern Information Security • Computer Security It mainly focuses on shared system, such as time-sharing system and necessary to provide some tools to protect file and other information stored on the computer • Network (Communication) Security It mainly concerns distributed system, such as internet and its purpose is to protect the information over the internet It also focuses on measures to deter, prevent, detect and correct security violations that involve the transmission of information.
  • 6. • Confidentiality : Information is accessible only for reading • Authentication : Information is correctly identified, with an assurance that identity is not false • Integrity : Only authorized parties are able to modify computer system assets and transmitted information • Nonrepudiation : Both the sender and receiver of message are unable to deny the transmission. • Access Control : Requires that access to information resources may be controlled by or for the target system..
  • 7. INTERRUPTION MODIFICATION Source Destination Source Destination INTERCEPTION FABRICATION Source Destination Source Destination
  • 8. Passive Attacks Passive threats Interception Release of message contents Traffic analysis Active Attacks Passive threats Interruption Modification Fabrication (availability) (integrity) (authenticity)
  • 10. The art or science encompassing the principles and methods of transforming an intelligible message into unintelligibleone, and then retransforming that message back to original form. Plaintext Encipher(encode) Ciphertext Decipher(decode) Cipher Cryptanalysis Key Cryptology code
  • 11. World War II brought about many advancements in information security and mark the beginning of the professional field of information security German Lorenz cipher machine
  • 12. The development of digital computers and electronics after WWII made possible much more complex ciphers Many computer ciphers can be charact- erized by their operation on binary bit sequences,unlike classical and mechanical schemes The Enigma machine, used, in several variants, by the German military between the late 1920s and the end of World War II Enigma machine
  • 13. Cryptography, then, not only protects data from theft or alteration, but can also be used for user authentication. There are, in general, three types of cryptographic schemes typically used to accomplish these goals •Secret key cryptography (or symmetric) •Public-key cryptography (or asymmetric) •Hash functions,
  • 14. •In this form single key is used for both encryption and decryption •The sender uses the key to encrypt the plaintext and sends the ciphertext to the receiver. The receiver applies the same key to decrypt the message and recover the plaintext •Because a single key is used for both functions, secret key cryptography is also called symmetric encryption
  • 15. •Secret key cryptography schemes are generally categorized as being either stream ciphers or block ciphers. •Stream ciphers operate on a single bit (byte or computer word) at a time and implement some form of feedback mechanism so that the key is constantly changing. • A block cipher is so-called because the scheme encrypts one block of data at a time using the same key on each block. • In general, the same plaintext block will always encrypt to the same ciphertext when using the same key in a block cipher whereas the same plaintext will encrypt to different ciphertext in a stream cipher.
  • 16. •PKC depends upon the existence of so-called one-way functions,that are easy to computer whereas their inverse function is difficult to compute •It employs two keys that are mathematically related although knowledge of one key does not allow someone to easily determine the other key •One key is used to encrypt the plaintext and the other key is used to decrypt the ciphertext
  • 17. Hash functions, also called message digests and one-way encryption, are algorithms that, in some sense, use no key A fixed-length hash value is computed based upon the plaintext that makes it impossible for either the contents or length of the plaintext to be recovered. Hash algorithms are typically used to provide a digital fingerprint of a file's contents and are also commonly employed by many operating systems to encrypt passwords and then, provide a measure of the integrity of a file
  • 18. Combines all functions to form a secure transmission comprising digital signature and digital envelope
  • 19. •Nearly all modern network operating systems employ passwords at the very least to protect and authenticate users accessing computer and network resources •But passwords are not typically kept on a host or server in plaintext, but are generally encrypted using some sort of hash scheme •As the passwords are not saved in plaintext on computer systems precisely,they cannot be easily compromised. •An even stronger authentication method uses the password to modify a shared secret between the client and server, but never allows the password in any form to go across the network.
  • 20. •PGP can be used to sign or encrypt e-mail messages with the mere click of the mouse •Depending upon the version of PGP, the software uses SHA or MD5 for calculating the message hash; CAST, Triple-DES, or IDEA for encryption; and RSA or DSS/Diffie-Hellman for key exchange and digital signatures. •PGP is available as a plug-in for many e-mail clients, such as Claris Emailer, Microsoft Outlook and Qualcomm Eudora •Pretty Good Privacy (PGP) is one of today's most widely used public key cryptography programs, developed by Philip Zimmermann in the early 1990s
  • 21. •In typical applications workstation are attached to LAN. The user can reach other hosts, workstations and servers in the same LAN that are interconnected via bridges and routers. •Transmissions from station to station is visible on the LAN to all station. Data is transmitted in the form of packets which contain source/destination Ids, and other information. •On this basis, an eavesdropper can monitor and capture traffic packets. Eavesdropper needs not be a local LAN user; it could be anyone to whom the LAN offers a dial-up capacity. •Eavesdropping may also occur in any of the communication links which provide connectivity to the system
  • 22. Link Encryption Each vulnerable communication link is equipped on both end with an encryption devices End-to-End Encryption Data is encrypted only at the source node and decrypted at the destination node Problem Data consists of packets have a header portion and content portion. we can’t encrypt the header. So the data is secure and the traffic pattern is not Solution Use a combination of above two approaches.