SlideShare a Scribd company logo
1 of 44
Cryptography
 Definition
 It is an ancient art and science of writing in secret message.
 Cryptography comes from Greek word “crypto “ means hiding
and “Graphy” means writing
 It is the art of achieving security by encoding messages to
make them non readable.
8/3/2016 jaya 2
Cryptography
 Terminologies
 Cryptanalysis
 Cryptanalysis (from the Greek kryptós, "hidden", and analýein,
"to loosen“ ) is the study of analyzing information system in
order to study the hidden aspects of the systems.
 breaking “secret codes”
 Cryptology
 Cryptology (from Greek kryptós, "hidden, secret“, and logia,
"study“) is the study of cryptography and cryptanalysis
 The art and science of making and breaking “secret codes”
8/3/2016 jaya 3
Cryptography
 Terminologies
 Encryption
 It is the process of transforming information so it is unintelligible to
anyone but the intended recipient.
 Decryption
 It is the process of transforming encrypted information so that it is
intelligible again.
 Plaintext
 the message to be transmitted or stored.
 Cipher text
 the disguised message or encrypted message
 Algorithm
 The mathematical formula used for encryption and decryption
 Cipher
 Algorithm used for encryption and decryption
 Key
 Value used by algorithm to encrypt and decrypt
8/3/2016 jaya 4
Cryptography
 Steps of cryptography
8/3/2016 jaya 5
Cryptography
 Purpose of Cryptography
 Authentication
 Privacy/confidentiality
 Integrity
 Non-repudiation
8/3/2016 jaya 6
Cryptography
 Application of Cryptography
 Secure communication:
 To prevent eavesdropping-war time communication and business
transactions.
 Identification & Authentication:
 Checking the integrity
 Secret sharing / data hiding:
 Hide something that has been written.
 E-commerce / E-payment:
 Certification:
 Certification is a scheme by which trusted agents such as
certifying authorities guarantee for unknown agents , such as
users.
8/3/2016 jaya 7
Cryptography
 Application of Cryptography
 Key recovery:
 It is a technology that allows a key to be revealed under certain
circumstances without the owner of the key revealing it.
 Remote access:
 Passwords gives a level of security for secure access.
 Cell phone:
 Prevent people from stealing cell phone nos. , access code or
eavesdropping.
 Access control:
 Regulate access to satellite and cable TV
8/3/2016 jaya 8
Cryptography
 Characteristics of Cryptographic System:
 The type of operations used for transforming plaintext
to cipher text.
 The number of keys used
 The way in which the plaintext is processed.
8/3/2016 jaya 9
Cryptography
 Types of Cryptography
 Secret –key Cryptography(Symmetric key cryptography)
 Single key is used for both encryption and decryption.
 Public key Cryptography(Asymmetric key cryptography)
 Uses one key for encryption and anther for decryption.
 Hash function
 It uses a mathematical transformation to irreversibly “encrypt”
information.
8/3/2016 jaya 10
Cryptography
 Classical encryption(symmetric key cryptography)
techniques
 Substitution
 Replacing an element of plain text by cipher text
 Transposition
 Rearranging the order of appearance of the elements of the
plaintext.
8/3/2016 jaya 11
Symmetric key Cryptography
 Substitution ciphers technique:
 Caesar’s cipher substitution technique.
 Monoalphabetic cipher substitution technique
 Polyalphabetic cipher substitution technique
 One time pad
 Playfair cipher
 Hill cipher
8/3/2016 jaya 12
Symmetric key Cryptography
 Caesar’s cipher substitution technique.
 The method is named after Julius Caesar, who used it to
communicate with his generals.
 It is also known as the shift cipher, Caesar’s code or
Caesar shift.
 It is one of the simplest and most widely known
encryption techniques.
 Letter in the plaintext is replaced by a letter some fixed
number of positions down the alphabet.
8/3/2016 jaya 13
Symmetric key Cryptography
 Caesar’s cipher substitution technique.
 Encryption of a letter x by a shift n can be described
mathematically as,
 En(x) = (x+n) mod 26
 Example:
 Encryption of a letter A by a shift 3 can be described
mathematically as,
 En(x) = (A+3) mod 26 = (0+3) mod 26 = 3 mod 26 =3
 Encrypted letter for A is D
8/3/2016 jaya 14
Symmetric key Cryptography
 Decryption of a letter x by a shift n can be described
mathematically as,
 Decryption is performed similarly,
 Dn(x) =(x-n) mod 26
 Example:
 Decryption of a letter D by a shift 3 can be described
mathematically as,
 Dn(x) = (D-3) mod 26 = (3 -3) mod 26 = 0 mod 26 =0
 Decrypted letter for D is A
8/3/2016 jaya 15
Symmetric key Cryptography
 Example for Caesar cipher
 Key=3
 Plain text is =“WELCOME”
 Cipher text is =“ZHOFRPH”
Plain text
A B C D E F G H I J K L M
Cipher text
D E F G H I J K L M N O P
Plain text
N O P Q R S T U V W X Y Z
Cipher text
Q R S T U V W X Y Z A B C
8/3/2016 jaya 16
Symmetric key Cryptography
 Mono-Alphabetic cipher substitution technique
 It uses fixed substitution over the entire message
 Uses random substitution
 Requires permutation or combination of 26 alphabets.
 Hard to crack
 Example
 Plain text is =“WELCOME”
 Cipher text is =“GXDLRPX”
Plain
text A B C D E F G H I J K L M
Cipher
text Y N L K X B S H M I W D P
Plain
text N O P Q R S T U V W X Y Z
Cipher
text J R O Q V F E A U G T Z C
8/3/2016 jaya 17
Symmetric key Cryptography
 Homophonic substitution technique
 A plain text alphabet can map to more than one cipher
text alphabet.
 Example
 A can be replaced by [D,H,P,R] and B can be replaced by
[E,I,Q,S]
8/3/2016 jaya 18
Symmetric key Cryptography
 Polygram substitution technique
 A block of plain text alphabet is replaced by block of
cipher text alphabet.
 Example
 Hello can be replaced by YUQQW
8/3/2016 jaya 19
Symmetric key Cryptography
 Poly-Alphabetic cipher substitution technique:
 Leon Battista invented this technique in 1568
 It is made up of multiple simple substitution cipher.
 This method uses multiple one character keys.
 Each key encrypts one plain text character.
 Examples:
 Vigenere Cipher
 Beaufort Cipher
8/3/2016 jaya 20
STEGANOGRAPHY
 Steganography is the science of hiding information by
embedding the hidden(secret) message within a cover
media.
 It works by replacing bits of useless or unused data in
regular computer files with bits of different, invisible
information.
 It used sometime when encryption is not permitted.
 Steganographic process
Stego medium = cover media + hidden data + stego key
8/3/2016 jaya 21
STEGANOGRAPHY
 Different techniques of Steganography:
 Character marking
 Invisible ink
 Pin punctures
 Typewriter correction ribbon
8/3/2016 jaya 22
STEGANOGRAPHY
 Advantages of Steganography:
 used to transfer sensitive data
 We can hide secrete message with graphic images.
 Provides high security
8/3/2016 jaya 23
STEGANOGRAPHY
 Disadvantages of Steganography:
 It requires lot of overhead to hide a relatively few bits of
information
 Once the system is discovered, it becomes virtually
worthless.
8/3/2016 jaya 24
STEGANOGRAPHY
 Applications of Steganography:
 Digital watermarking
 Used in conjunction with encryption for extra security.
8/3/2016 jaya 25
CRYPTOGRAPHY
 Symmetric cipher /secrete key cryptography
 Sender and recipient share a same key for encryption
and decryption
 The encryption algorithm is divided into two types
 Block Cipher
 Stream Cipher
8/3/2016 jaya 26
CRYPTOGRAPHY
 Advantages of Symmetric cipher /secrete key
cryptography
 It is faster
 While transmission the chances of data being decrypted
is null
 Uses password authentication to prove the receivers
identity
8/3/2016 jaya 27
CRYPTOGRAPHY
 Disadvantages of Symmetric cipher /secrete key
cryptography
 Issue of key transportation
 It cannot provide digital signature that cannot be
repudiated.
8/3/2016 jaya 28
CRYPTOGRAPHY
 Asymmetric cipher /secrete key cryptography
 A pair of key is used to encrypt and decrypt.
 With asymmetric cryptography, the sender encrypts data
with one key, and the recipient uses a different key to
decrypt cipher text.
 Encrypt data using public key and decrypt data using
private key.
8/3/2016 jaya 29
CRYPTOGRAPHY
 Advantages Asymmetric cipher /secrete key
cryptography
 Eliminating the key distribution problem
 Increased security
 It can provide digital signatures that can be repudiated.
 Advantages Asymmetric cipher /secrete key
cryptography
 Faster methods are available.
8/3/2016 jaya 30
DIGITAL SIGNATURE
 A digital signature is an electronic signature that can be
used to authenticate the identity of the sender of a
message.
 It is a mathematical scheme for demonstrating the
authenticity of a digital message or document.
 Each signatory has their own paired public and private key
8/3/2016 jaya 31
DIGITAL SIGNATURE
 It consists three algorithms:
 A digital signature generation algorithm:
 It consists of a (mathematical) digital signature generation
algorithm
 Randomly produces a key pair( public and private)
 A signing algorithm:
 Produces a signature
 A digital signature verification algorithm
 It consists of a verification algorithm, along with a method for
recovering data from the message.
8/3/2016 jaya 32
DIGITAL SIGNATURE
Message Message digest
Hash function
Digital Signature
Senders private key
Concept of digital signature
8/3/2016 jaya 33
DIGITAL SIGNATURE
 Working of digital signature
8/3/2016 jaya 34
DIGITAL SIGNATURE
 Advantages of Digital Signature
 Imposter prevention
 Message integrity
 Legal requirement
 Disadvantages of Digital Signature:
 Digital signature involves the primary avenue for any
business is money
8/3/2016 jaya 35
Authentication Protocols
 Kerberos:
 Developed by MIT( massachusetts Institute of Technology)
 It is a computer network authentication protocol works on
tickets.
 Designed for c-s network
 Mutual authentication
 Builds on symmetric key cryptography
 Requires a trusted third party
 Protected against eavesdropping and replay attacks
 Provides secure authentication for unix
8/3/2016 jaya 36
Authentication Protocols
 SSL(secure sockets layers)
 Establishes an encrypted link between a server and a client .
 Uses combination of symmetric and asymmetric encryption
 Supported by web servers and web browsers
 Operates at lower layer
 Based on digital certification
 Allows sensitive information to be transmitted securely
8/3/2016 jaya 37
Authentication Protocols
 Microsoft NTLM( NT Lan Manager)
 Used by windows NT server to authenticate clients to an NT
domain
 It is a challenge-Response authentication protocol uses three
messages to authenticate a client
 Users credentials do not get transferred across the nw when
resources are accessed, which increases security .
client
server
NEGOTIATE_MESSAGE CHALLENGE_MESSAGE
AUTHENTICATE_MESSAGE
8/3/2016 jaya 38
Authentication Protocols
 PAP(Password Authentication Protocol)
 Two way handshake protocol designed for PPP
 Authenticate a user over a remote access control
 It sends user passwords across the nw to the authenticating
server in plain text.
 Poses a significant security risk.
 Advantage is it is compatible with many server types running in
different OS.
8/3/2016 jaya 39
Authentication Protocols
 SPAP(Shiva Password Authentication Protocol)
 Used by shiva remote access server
 It is an improvement over PAP in terms of the security level
 Client sends encrypted password to remote server and server
decrypts the password
 Based on login info server sends ACK or NACK.
 Advantage is it is compatible with many server types running in
different OS.
8/3/2016 jaya 40
Authentication Protocols
 CHAP(Challenge Handshake Authentication Protocol)
 Used for remote access security
 It is an internet standard uses MD5
 Password does not go across the nw and can’t be captured
 No reverse engineering.
 Vulnerable to remote server impersonation.
8/3/2016 jaya 41
Authentication Protocols
 MCHAP(Microsoft version of CHAP)
 Uses 2-way authentication to verify identity of client and server
 Protects against impersonation
 Uses separate cryptographic keys for transmitted and received data
8/3/2016 jaya 42
Authentication Protocols
 EAP(Extensible authentication protocol )
 used to determine what authentication protocol will be used
 Used in wireless nw and PPP
 Used in devices such as smart card readers and finger print readers.
 S/KEY
 One time password system developed for UNIX
 OTP allows to logon only once
 List of password is given and maintained by hardware device.
8/3/2016 jaya 43
Authentication Protocols
 RADIUS( Remote Authentication Dial-In User service
Protocol)
 Client server protocol
 Provides centralized authentication, authorization and accounting
management for network users
 TACACS( Terminal Access Controller Access Control System)
 Older authentication protocol used in UNIX
 Client pass login information to server to gain access
 Encryption protocol so less expensive
8/3/2016 jaya 44

More Related Content

What's hot (20)

Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
cryptography ppt free download
cryptography ppt free downloadcryptography ppt free download
cryptography ppt free download
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
 
Cryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipherCryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipher
 
Hash Function
Hash FunctionHash Function
Hash Function
 
Cryptography
CryptographyCryptography
Cryptography
 
2. public key cryptography and RSA
2. public key cryptography and RSA2. public key cryptography and RSA
2. public key cryptography and RSA
 
Cryptography
CryptographyCryptography
Cryptography
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
Asymmetric Cryptography
Asymmetric CryptographyAsymmetric Cryptography
Asymmetric Cryptography
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Cryptography and Information Security
Cryptography and Information SecurityCryptography and Information Security
Cryptography and Information Security
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
Diffie hellman key exchange algorithm
Diffie hellman key exchange algorithmDiffie hellman key exchange algorithm
Diffie hellman key exchange algorithm
 
Email security
Email securityEmail security
Email security
 

Viewers also liked

History of cryptography
History of cryptographyHistory of cryptography
History of cryptographyFarah Shaikh
 
Block Cipher vs. Stream Cipher
Block Cipher vs. Stream CipherBlock Cipher vs. Stream Cipher
Block Cipher vs. Stream CipherAmirul Wiramuda
 
Introduction To Digital Signatures
Introduction To Digital SignaturesIntroduction To Digital Signatures
Introduction To Digital SignaturesRobert Talbert
 
Digital signature introduction
Digital signature introductionDigital signature introduction
Digital signature introductionAsim Neupane
 
block ciphers
block ciphersblock ciphers
block ciphersAsad Ali
 
Digital signatures
Digital signaturesDigital signatures
Digital signaturesIshwar Dayal
 
Seminar ppt on digital signature
Seminar ppt on digital signatureSeminar ppt on digital signature
Seminar ppt on digital signaturejolly9293
 
Digital Signature
Digital SignatureDigital Signature
Digital Signaturesaurav5884
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signaturesRohit Bhat
 

Viewers also liked (12)

Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
 
History of cryptography
History of cryptographyHistory of cryptography
History of cryptography
 
Classical Encryption
Classical EncryptionClassical Encryption
Classical Encryption
 
Block Cipher vs. Stream Cipher
Block Cipher vs. Stream CipherBlock Cipher vs. Stream Cipher
Block Cipher vs. Stream Cipher
 
Introduction To Digital Signatures
Introduction To Digital SignaturesIntroduction To Digital Signatures
Introduction To Digital Signatures
 
Digital signature introduction
Digital signature introductionDigital signature introduction
Digital signature introduction
 
block ciphers
block ciphersblock ciphers
block ciphers
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Seminar ppt on digital signature
Seminar ppt on digital signatureSeminar ppt on digital signature
Seminar ppt on digital signature
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signatures
 

Similar to Cryptography

Cryptography
CryptographyCryptography
Cryptographyprasham95
 
Computer Cryptography and Encryption [by: Magoiga].pptx
Computer Cryptography and Encryption [by: Magoiga].pptxComputer Cryptography and Encryption [by: Magoiga].pptx
Computer Cryptography and Encryption [by: Magoiga].pptxmagoigamtatiro1
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarDurlove Kumbhakar
 
Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)newbie2019
 
Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)newbie2019
 
Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overviewppd1961
 
Multiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisMultiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisIJCERT
 
Seminar report on symmetric key
Seminar report on symmetric keySeminar report on symmetric key
Seminar report on symmetric keyRajat Tripathi
 
cryptography and network security
cryptography and network security cryptography and network security
cryptography and network security nitishV3
 
Paper id 27201444
Paper id 27201444Paper id 27201444
Paper id 27201444IJRAT
 
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEYMETHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEYIJNSA Journal
 
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Jayanth Dwijesh H P
 
Cryptography Lecture by Sam Bowne
Cryptography Lecture by Sam BowneCryptography Lecture by Sam Bowne
Cryptography Lecture by Sam BowneSecurityTube.Net
 
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...IJCSIS Research Publications
 

Similar to Cryptography (20)

Cryptography
CryptographyCryptography
Cryptography
 
Computer Cryptography and Encryption [by: Magoiga].pptx
Computer Cryptography and Encryption [by: Magoiga].pptxComputer Cryptography and Encryption [by: Magoiga].pptx
Computer Cryptography and Encryption [by: Magoiga].pptx
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab Kumbhakar
 
Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)
 
Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)
 
Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overview
 
Multiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisMultiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity Analysis
 
Cn ppt
Cn pptCn ppt
Cn ppt
 
Seminar report on symmetric key
Seminar report on symmetric keySeminar report on symmetric key
Seminar report on symmetric key
 
Elementry Cryptography
Elementry CryptographyElementry Cryptography
Elementry Cryptography
 
cryptography and network security
cryptography and network security cryptography and network security
cryptography and network security
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Unit-2-IS (1).pdf
Unit-2-IS (1).pdfUnit-2-IS (1).pdf
Unit-2-IS (1).pdf
 
Ch34508510
Ch34508510Ch34508510
Ch34508510
 
Paper id 27201444
Paper id 27201444Paper id 27201444
Paper id 27201444
 
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEYMETHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY
 
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..
 
Cns 1
Cns 1Cns 1
Cns 1
 
Cryptography Lecture by Sam Bowne
Cryptography Lecture by Sam BowneCryptography Lecture by Sam Bowne
Cryptography Lecture by Sam Bowne
 
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
 

More from jayashri kolekar

More from jayashri kolekar (13)

FILE MANAGEMENT.pptx
FILE MANAGEMENT.pptxFILE MANAGEMENT.pptx
FILE MANAGEMENT.pptx
 
Architectural modeling chapter 5 of omd
Architectural modeling chapter 5 of omdArchitectural modeling chapter 5 of omd
Architectural modeling chapter 5 of omd
 
Advanced behavioral modeling chapter 4 of omd
Advanced behavioral modeling chapter 4 of omdAdvanced behavioral modeling chapter 4 of omd
Advanced behavioral modeling chapter 4 of omd
 
Basic behavioral modeling chapter 3 of OMD
Basic behavioral modeling chapter 3 of OMDBasic behavioral modeling chapter 3 of OMD
Basic behavioral modeling chapter 3 of OMD
 
Object oriented modeling and design
Object oriented modeling and designObject oriented modeling and design
Object oriented modeling and design
 
OMD chapter 2 Class modelling
 OMD  chapter 2 Class modelling OMD  chapter 2 Class modelling
OMD chapter 2 Class modelling
 
Macro
MacroMacro
Macro
 
Parsing
ParsingParsing
Parsing
 
Loader
LoaderLoader
Loader
 
Assembler1
Assembler1Assembler1
Assembler1
 
System programming
System programmingSystem programming
System programming
 
Compilers
CompilersCompilers
Compilers
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 

Recently uploaded

Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayMakMakNepo
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxsqpmdrvczh
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........LeaCamillePacle
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 

Recently uploaded (20)

Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up Friday
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 

Cryptography

  • 1.
  • 2. Cryptography  Definition  It is an ancient art and science of writing in secret message.  Cryptography comes from Greek word “crypto “ means hiding and “Graphy” means writing  It is the art of achieving security by encoding messages to make them non readable. 8/3/2016 jaya 2
  • 3. Cryptography  Terminologies  Cryptanalysis  Cryptanalysis (from the Greek kryptós, "hidden", and analýein, "to loosen“ ) is the study of analyzing information system in order to study the hidden aspects of the systems.  breaking “secret codes”  Cryptology  Cryptology (from Greek kryptós, "hidden, secret“, and logia, "study“) is the study of cryptography and cryptanalysis  The art and science of making and breaking “secret codes” 8/3/2016 jaya 3
  • 4. Cryptography  Terminologies  Encryption  It is the process of transforming information so it is unintelligible to anyone but the intended recipient.  Decryption  It is the process of transforming encrypted information so that it is intelligible again.  Plaintext  the message to be transmitted or stored.  Cipher text  the disguised message or encrypted message  Algorithm  The mathematical formula used for encryption and decryption  Cipher  Algorithm used for encryption and decryption  Key  Value used by algorithm to encrypt and decrypt 8/3/2016 jaya 4
  • 5. Cryptography  Steps of cryptography 8/3/2016 jaya 5
  • 6. Cryptography  Purpose of Cryptography  Authentication  Privacy/confidentiality  Integrity  Non-repudiation 8/3/2016 jaya 6
  • 7. Cryptography  Application of Cryptography  Secure communication:  To prevent eavesdropping-war time communication and business transactions.  Identification & Authentication:  Checking the integrity  Secret sharing / data hiding:  Hide something that has been written.  E-commerce / E-payment:  Certification:  Certification is a scheme by which trusted agents such as certifying authorities guarantee for unknown agents , such as users. 8/3/2016 jaya 7
  • 8. Cryptography  Application of Cryptography  Key recovery:  It is a technology that allows a key to be revealed under certain circumstances without the owner of the key revealing it.  Remote access:  Passwords gives a level of security for secure access.  Cell phone:  Prevent people from stealing cell phone nos. , access code or eavesdropping.  Access control:  Regulate access to satellite and cable TV 8/3/2016 jaya 8
  • 9. Cryptography  Characteristics of Cryptographic System:  The type of operations used for transforming plaintext to cipher text.  The number of keys used  The way in which the plaintext is processed. 8/3/2016 jaya 9
  • 10. Cryptography  Types of Cryptography  Secret –key Cryptography(Symmetric key cryptography)  Single key is used for both encryption and decryption.  Public key Cryptography(Asymmetric key cryptography)  Uses one key for encryption and anther for decryption.  Hash function  It uses a mathematical transformation to irreversibly “encrypt” information. 8/3/2016 jaya 10
  • 11. Cryptography  Classical encryption(symmetric key cryptography) techniques  Substitution  Replacing an element of plain text by cipher text  Transposition  Rearranging the order of appearance of the elements of the plaintext. 8/3/2016 jaya 11
  • 12. Symmetric key Cryptography  Substitution ciphers technique:  Caesar’s cipher substitution technique.  Monoalphabetic cipher substitution technique  Polyalphabetic cipher substitution technique  One time pad  Playfair cipher  Hill cipher 8/3/2016 jaya 12
  • 13. Symmetric key Cryptography  Caesar’s cipher substitution technique.  The method is named after Julius Caesar, who used it to communicate with his generals.  It is also known as the shift cipher, Caesar’s code or Caesar shift.  It is one of the simplest and most widely known encryption techniques.  Letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet. 8/3/2016 jaya 13
  • 14. Symmetric key Cryptography  Caesar’s cipher substitution technique.  Encryption of a letter x by a shift n can be described mathematically as,  En(x) = (x+n) mod 26  Example:  Encryption of a letter A by a shift 3 can be described mathematically as,  En(x) = (A+3) mod 26 = (0+3) mod 26 = 3 mod 26 =3  Encrypted letter for A is D 8/3/2016 jaya 14
  • 15. Symmetric key Cryptography  Decryption of a letter x by a shift n can be described mathematically as,  Decryption is performed similarly,  Dn(x) =(x-n) mod 26  Example:  Decryption of a letter D by a shift 3 can be described mathematically as,  Dn(x) = (D-3) mod 26 = (3 -3) mod 26 = 0 mod 26 =0  Decrypted letter for D is A 8/3/2016 jaya 15
  • 16. Symmetric key Cryptography  Example for Caesar cipher  Key=3  Plain text is =“WELCOME”  Cipher text is =“ZHOFRPH” Plain text A B C D E F G H I J K L M Cipher text D E F G H I J K L M N O P Plain text N O P Q R S T U V W X Y Z Cipher text Q R S T U V W X Y Z A B C 8/3/2016 jaya 16
  • 17. Symmetric key Cryptography  Mono-Alphabetic cipher substitution technique  It uses fixed substitution over the entire message  Uses random substitution  Requires permutation or combination of 26 alphabets.  Hard to crack  Example  Plain text is =“WELCOME”  Cipher text is =“GXDLRPX” Plain text A B C D E F G H I J K L M Cipher text Y N L K X B S H M I W D P Plain text N O P Q R S T U V W X Y Z Cipher text J R O Q V F E A U G T Z C 8/3/2016 jaya 17
  • 18. Symmetric key Cryptography  Homophonic substitution technique  A plain text alphabet can map to more than one cipher text alphabet.  Example  A can be replaced by [D,H,P,R] and B can be replaced by [E,I,Q,S] 8/3/2016 jaya 18
  • 19. Symmetric key Cryptography  Polygram substitution technique  A block of plain text alphabet is replaced by block of cipher text alphabet.  Example  Hello can be replaced by YUQQW 8/3/2016 jaya 19
  • 20. Symmetric key Cryptography  Poly-Alphabetic cipher substitution technique:  Leon Battista invented this technique in 1568  It is made up of multiple simple substitution cipher.  This method uses multiple one character keys.  Each key encrypts one plain text character.  Examples:  Vigenere Cipher  Beaufort Cipher 8/3/2016 jaya 20
  • 21. STEGANOGRAPHY  Steganography is the science of hiding information by embedding the hidden(secret) message within a cover media.  It works by replacing bits of useless or unused data in regular computer files with bits of different, invisible information.  It used sometime when encryption is not permitted.  Steganographic process Stego medium = cover media + hidden data + stego key 8/3/2016 jaya 21
  • 22. STEGANOGRAPHY  Different techniques of Steganography:  Character marking  Invisible ink  Pin punctures  Typewriter correction ribbon 8/3/2016 jaya 22
  • 23. STEGANOGRAPHY  Advantages of Steganography:  used to transfer sensitive data  We can hide secrete message with graphic images.  Provides high security 8/3/2016 jaya 23
  • 24. STEGANOGRAPHY  Disadvantages of Steganography:  It requires lot of overhead to hide a relatively few bits of information  Once the system is discovered, it becomes virtually worthless. 8/3/2016 jaya 24
  • 25. STEGANOGRAPHY  Applications of Steganography:  Digital watermarking  Used in conjunction with encryption for extra security. 8/3/2016 jaya 25
  • 26. CRYPTOGRAPHY  Symmetric cipher /secrete key cryptography  Sender and recipient share a same key for encryption and decryption  The encryption algorithm is divided into two types  Block Cipher  Stream Cipher 8/3/2016 jaya 26
  • 27. CRYPTOGRAPHY  Advantages of Symmetric cipher /secrete key cryptography  It is faster  While transmission the chances of data being decrypted is null  Uses password authentication to prove the receivers identity 8/3/2016 jaya 27
  • 28. CRYPTOGRAPHY  Disadvantages of Symmetric cipher /secrete key cryptography  Issue of key transportation  It cannot provide digital signature that cannot be repudiated. 8/3/2016 jaya 28
  • 29. CRYPTOGRAPHY  Asymmetric cipher /secrete key cryptography  A pair of key is used to encrypt and decrypt.  With asymmetric cryptography, the sender encrypts data with one key, and the recipient uses a different key to decrypt cipher text.  Encrypt data using public key and decrypt data using private key. 8/3/2016 jaya 29
  • 30. CRYPTOGRAPHY  Advantages Asymmetric cipher /secrete key cryptography  Eliminating the key distribution problem  Increased security  It can provide digital signatures that can be repudiated.  Advantages Asymmetric cipher /secrete key cryptography  Faster methods are available. 8/3/2016 jaya 30
  • 31. DIGITAL SIGNATURE  A digital signature is an electronic signature that can be used to authenticate the identity of the sender of a message.  It is a mathematical scheme for demonstrating the authenticity of a digital message or document.  Each signatory has their own paired public and private key 8/3/2016 jaya 31
  • 32. DIGITAL SIGNATURE  It consists three algorithms:  A digital signature generation algorithm:  It consists of a (mathematical) digital signature generation algorithm  Randomly produces a key pair( public and private)  A signing algorithm:  Produces a signature  A digital signature verification algorithm  It consists of a verification algorithm, along with a method for recovering data from the message. 8/3/2016 jaya 32
  • 33. DIGITAL SIGNATURE Message Message digest Hash function Digital Signature Senders private key Concept of digital signature 8/3/2016 jaya 33
  • 34. DIGITAL SIGNATURE  Working of digital signature 8/3/2016 jaya 34
  • 35. DIGITAL SIGNATURE  Advantages of Digital Signature  Imposter prevention  Message integrity  Legal requirement  Disadvantages of Digital Signature:  Digital signature involves the primary avenue for any business is money 8/3/2016 jaya 35
  • 36. Authentication Protocols  Kerberos:  Developed by MIT( massachusetts Institute of Technology)  It is a computer network authentication protocol works on tickets.  Designed for c-s network  Mutual authentication  Builds on symmetric key cryptography  Requires a trusted third party  Protected against eavesdropping and replay attacks  Provides secure authentication for unix 8/3/2016 jaya 36
  • 37. Authentication Protocols  SSL(secure sockets layers)  Establishes an encrypted link between a server and a client .  Uses combination of symmetric and asymmetric encryption  Supported by web servers and web browsers  Operates at lower layer  Based on digital certification  Allows sensitive information to be transmitted securely 8/3/2016 jaya 37
  • 38. Authentication Protocols  Microsoft NTLM( NT Lan Manager)  Used by windows NT server to authenticate clients to an NT domain  It is a challenge-Response authentication protocol uses three messages to authenticate a client  Users credentials do not get transferred across the nw when resources are accessed, which increases security . client server NEGOTIATE_MESSAGE CHALLENGE_MESSAGE AUTHENTICATE_MESSAGE 8/3/2016 jaya 38
  • 39. Authentication Protocols  PAP(Password Authentication Protocol)  Two way handshake protocol designed for PPP  Authenticate a user over a remote access control  It sends user passwords across the nw to the authenticating server in plain text.  Poses a significant security risk.  Advantage is it is compatible with many server types running in different OS. 8/3/2016 jaya 39
  • 40. Authentication Protocols  SPAP(Shiva Password Authentication Protocol)  Used by shiva remote access server  It is an improvement over PAP in terms of the security level  Client sends encrypted password to remote server and server decrypts the password  Based on login info server sends ACK or NACK.  Advantage is it is compatible with many server types running in different OS. 8/3/2016 jaya 40
  • 41. Authentication Protocols  CHAP(Challenge Handshake Authentication Protocol)  Used for remote access security  It is an internet standard uses MD5  Password does not go across the nw and can’t be captured  No reverse engineering.  Vulnerable to remote server impersonation. 8/3/2016 jaya 41
  • 42. Authentication Protocols  MCHAP(Microsoft version of CHAP)  Uses 2-way authentication to verify identity of client and server  Protects against impersonation  Uses separate cryptographic keys for transmitted and received data 8/3/2016 jaya 42
  • 43. Authentication Protocols  EAP(Extensible authentication protocol )  used to determine what authentication protocol will be used  Used in wireless nw and PPP  Used in devices such as smart card readers and finger print readers.  S/KEY  One time password system developed for UNIX  OTP allows to logon only once  List of password is given and maintained by hardware device. 8/3/2016 jaya 43
  • 44. Authentication Protocols  RADIUS( Remote Authentication Dial-In User service Protocol)  Client server protocol  Provides centralized authentication, authorization and accounting management for network users  TACACS( Terminal Access Controller Access Control System)  Older authentication protocol used in UNIX  Client pass login information to server to gain access  Encryption protocol so less expensive 8/3/2016 jaya 44