SlideShare a Scribd company logo
1 of 51
Welcome  to the World of Secret Communication
yhpargotpyrC es qbsuib qsbujn ebt lqwhuud vbvwhpv lqgld syw owg
Cryptography es qbsuib qsbujn ebt lqwhuud vbvwhpv lqgld syw owg  Transposition Cipher
Cryptography es qbsuib qsbujn ebt lqwhuud vbvwhpv lqgld syw owg  Transposition Cipher Jumbled Image
Cryptography dr partha pratim das lqwhuud vbvwhpv lqgld syw owg  Transposition Cipher Jumbled Image Substitution  Cipher (next letter)
Cryptography dr partha pratim das interra systems india pvt ltd  Transposition Cipher Jumbled Image Substitution  Cipher (next letter) Caesar Cipher = 3
Cryptography Dr Partha Pratim Das Interra Systems India Pvt Ltd   Title Case Restored
December 12, 2008 Cryptography – An Overview Madhubanti Dasgupta & Partha Pratim Das Interra Systems (India) Pvt. Ltd.
Vernacular Cryptography
Vernacular Cryptography
The Adventure of the Dancing Men AM HERE ABE SLANEY
The Adventure of the Dancing Men AM HERE ABE SLANEY A substitution cipher cracked by Holmes using frequency analysis
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cryptography – What & Why? Basic Notion
What is Cryptography? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is Cryptography? Secret  Writing Steganography (hidden) Cryptography (scrambled) Substitution Transposition Code (replace words) Cipher (replace letters)
Why Cryptography? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Basic Cryptography Notions, Terms,  Examples & Techniques
Cryptography – A Few Terms ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cryptography – A Few Terms ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Crypto Communicators ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Simple (Cipher) Cryptography ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Modern Cryptography Techniques, Standards and Applications
Issues in Modern Cryptography ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cryptography in Modern Living ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cryptography in Modern Living ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Core Cryptography Algorithms ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Core Cryptography Algorithms
Secret-Key Cryptography An Overview
Secret-Key Cryptography ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Secret-Key Cryptography ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Public-Key Cryptography An Overview
Public-Key Cryptography ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Public-Key Cryptography ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],In modern cryptosystem designs, both asymmetric (public key) and symmetric algorithms are used to take advantage of the virtues of both.
Key Generation: Public-Key
Encryption: Public-Key
Signature: Public-Key
Shared Secret: Public-Key
Public-Key Cryptography ,[object Object],[object Object],[object Object],[object Object],[object Object]
PKC: Multiplication vs Factorization ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],5 * 7 15 391 22523 19 * 29 107 * 229 Heart of RSA
PKC: Exponentiation vs Logarithm ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2 ^ 3 9 125 19487171 3 ^ 5 7 ^ 11 Heart of Diffie-Hellman
Inventors of Public-Key Cryptography ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Hash Function Cryptography An Overview
Message Digest / Hash Function ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Message Digest / Hash Function ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How do Credit Cards work? Impact of Cryptography on Civilization
Secure Electronic Transaction (SET)
Dual Signature ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
References: Books ,[object Object]
References: Papers / URL ,[object Object],[object Object],[object Object]
Thank You

More Related Content

What's hot

6. cryptography
6. cryptography6. cryptography
6. cryptography
7wounders
 

What's hot (20)

Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Network security and cryptography
Network security and cryptographyNetwork security and cryptography
Network security and cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
cryptography
cryptographycryptography
cryptography
 
Cryptography and Information Security
Cryptography and Information SecurityCryptography and Information Security
Cryptography and Information Security
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
Encryption algorithms
Encryption algorithmsEncryption algorithms
Encryption algorithms
 
Key Management and Distribution
Key Management and DistributionKey Management and Distribution
Key Management and Distribution
 
Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cryptography Intro
Cryptography IntroCryptography Intro
Cryptography Intro
 
Transposition Cipher
Transposition CipherTransposition Cipher
Transposition Cipher
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Message authentication
Message authenticationMessage authentication
Message authentication
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptanalysis 101
Cryptanalysis 101Cryptanalysis 101
Cryptanalysis 101
 

Viewers also liked

Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
patisa
 
Secret communication through image and audio for defense
Secret communication through image and audio for defenseSecret communication through image and audio for defense
Secret communication through image and audio for defense
Harish N Nayak
 
Cryptography for the mere mortals - for phpXperts Seminar 2011 by Hasin and Tonu
Cryptography for the mere mortals - for phpXperts Seminar 2011 by Hasin and TonuCryptography for the mere mortals - for phpXperts Seminar 2011 by Hasin and Tonu
Cryptography for the mere mortals - for phpXperts Seminar 2011 by Hasin and Tonu
Hasin Hayder
 
Cryptography Lecture by Sam Bowne
Cryptography Lecture by Sam BowneCryptography Lecture by Sam Bowne
Cryptography Lecture by Sam Bowne
SecurityTube.Net
 
Cryptography and encryption
Cryptography and  encryptionCryptography and  encryption
Cryptography and encryption
Ancy Mariam Babu
 

Viewers also liked (20)

Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Finalmarch4 th
Finalmarch4 thFinalmarch4 th
Finalmarch4 th
 
Secret communication through image and audio for defense
Secret communication through image and audio for defenseSecret communication through image and audio for defense
Secret communication through image and audio for defense
 
Getting up & running with zend framework
Getting up & running with zend frameworkGetting up & running with zend framework
Getting up & running with zend framework
 
Cryptography for the mere mortals - for phpXperts Seminar 2011 by Hasin and Tonu
Cryptography for the mere mortals - for phpXperts Seminar 2011 by Hasin and TonuCryptography for the mere mortals - for phpXperts Seminar 2011 by Hasin and Tonu
Cryptography for the mere mortals - for phpXperts Seminar 2011 by Hasin and Tonu
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography Lecture by Sam Bowne
Cryptography Lecture by Sam BowneCryptography Lecture by Sam Bowne
Cryptography Lecture by Sam Bowne
 
Secret language and language games
Secret language and language gamesSecret language and language games
Secret language and language games
 
Developer's Guide to JavaScript and Web Cryptography
Developer's Guide to JavaScript and Web CryptographyDeveloper's Guide to JavaScript and Web Cryptography
Developer's Guide to JavaScript and Web Cryptography
 
Cryptography and encryption
Cryptography and  encryptionCryptography and  encryption
Cryptography and encryption
 
Ch10
Ch10Ch10
Ch10
 
5 Cryptography Part2
5 Cryptography Part25 Cryptography Part2
5 Cryptography Part2
 
Ch07
Ch07Ch07
Ch07
 
Ch11
Ch11Ch11
Ch11
 
Ch06
Ch06Ch06
Ch06
 
Use of statistics in civil engineering
Use of statistics in civil engineeringUse of statistics in civil engineering
Use of statistics in civil engineering
 
Ch15
Ch15Ch15
Ch15
 
Rsa
RsaRsa
Rsa
 

Similar to Cryptography - An Overview

Ch12 Encryption
Ch12 EncryptionCh12 Encryption
Ch12 Encryption
phanleson
 

Similar to Cryptography - An Overview (20)

Elementry Cryptography
Elementry CryptographyElementry Cryptography
Elementry Cryptography
 
Introduction To PKI Technology
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI Technology
 
Cryptography- "A Black Art"
Cryptography- "A Black Art"Cryptography- "A Black Art"
Cryptography- "A Black Art"
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab Kumbhakar
 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
 
Data encryption
Data encryptionData encryption
Data encryption
 
Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)
 
Cryptography : The Art of Secured Messaging
Cryptography : The Art of Secured MessagingCryptography : The Art of Secured Messaging
Cryptography : The Art of Secured Messaging
 
Crypt
CryptCrypt
Crypt
 
Data encryption
Data encryptionData encryption
Data encryption
 
Cns 1
Cns 1Cns 1
Cns 1
 
Cryptography
CryptographyCryptography
Cryptography
 
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.pptCRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
 
Ch12 Encryption
Ch12 EncryptionCh12 Encryption
Ch12 Encryption
 
Is case study
Is   case studyIs   case study
Is case study
 

More from ppd1961

Science & Culture Article with Editorial & Cover
Science & Culture Article with Editorial & CoverScience & Culture Article with Editorial & Cover
Science & Culture Article with Editorial & Cover
ppd1961
 
NDL @ YOJANA
NDL @ YOJANANDL @ YOJANA
NDL @ YOJANA
ppd1961
 
Reconfigurable Computing
Reconfigurable ComputingReconfigurable Computing
Reconfigurable Computing
ppd1961
 

More from ppd1961 (20)

Land of Pyramids, Petra, and Prayers - Egypt, Jordan, and Israel Tour
Land of Pyramids, Petra, and Prayers - Egypt, Jordan, and Israel TourLand of Pyramids, Petra, and Prayers - Egypt, Jordan, and Israel Tour
Land of Pyramids, Petra, and Prayers - Egypt, Jordan, and Israel Tour
 
Science & Culture Article with Editorial & Cover
Science & Culture Article with Editorial & CoverScience & Culture Article with Editorial & Cover
Science & Culture Article with Editorial & Cover
 
NDL @ YOJANA
NDL @ YOJANANDL @ YOJANA
NDL @ YOJANA
 
Unified Modeling Language (UML)
Unified Modeling Language (UML)Unified Modeling Language (UML)
Unified Modeling Language (UML)
 
OOP in C++
OOP in C++OOP in C++
OOP in C++
 
Digital geometry - An introduction
Digital geometry  - An introductionDigital geometry  - An introduction
Digital geometry - An introduction
 
Innovation in technology
Innovation in technologyInnovation in technology
Innovation in technology
 
Kinectic vision looking deep into depth
Kinectic vision   looking deep into depthKinectic vision   looking deep into depth
Kinectic vision looking deep into depth
 
C++11
C++11C++11
C++11
 
Function Call Optimization
Function Call OptimizationFunction Call Optimization
Function Call Optimization
 
How To Define An Integer Constant In C
How To Define An Integer Constant In CHow To Define An Integer Constant In C
How To Define An Integer Constant In C
 
Stl Containers
Stl ContainersStl Containers
Stl Containers
 
Object Lifetime In C C++
Object Lifetime In C C++Object Lifetime In C C++
Object Lifetime In C C++
 
Technical Documentation By Techies
Technical Documentation By TechiesTechnical Documentation By Techies
Technical Documentation By Techies
 
Vlsi Education In India
Vlsi Education In IndiaVlsi Education In India
Vlsi Education In India
 
Reconfigurable Computing
Reconfigurable ComputingReconfigurable Computing
Reconfigurable Computing
 
Women In Engineering Panel Discussion
Women In Engineering   Panel DiscussionWomen In Engineering   Panel Discussion
Women In Engineering Panel Discussion
 
Handling Exceptions In C & C++ [Part B] Ver 2
Handling Exceptions In C & C++ [Part B] Ver 2Handling Exceptions In C & C++ [Part B] Ver 2
Handling Exceptions In C & C++ [Part B] Ver 2
 
Handling Exceptions In C & C++[Part A]
Handling Exceptions In C & C++[Part A]Handling Exceptions In C & C++[Part A]
Handling Exceptions In C & C++[Part A]
 
Dimensions of Offshore Technology Services
Dimensions of Offshore Technology ServicesDimensions of Offshore Technology Services
Dimensions of Offshore Technology Services
 

Cryptography - An Overview

Editor's Notes

  1. NOTE: Cryptography does not hide the existence of messages. Steganography hides even the existence of a message. Herodotus concealed a message - a tattoo on a slave's shaved head – by re-grown hair.
  2. The term is often used to refer to the field as a whole, as is cryptology ("the study of secrets"). The study of how to circumvent the confidentiality sought by using encryption is called cryptanalysis or, more loosely, "codebreaking." The field is a rich source of jargon , some of it humorous. Until modern times, cryptography referred almost exclusively to encryption , the process of converting ordinary information ( plaintext ) into something unintelligible; this is a ciphertext . Decryption is the reverse, moving from unintelligible ciphertext to plaintext . A cipher (or cypher ) is a pair of algorithms which perform this encryption and the reversing decryption. The detailed operation of a cipher is controlled both by the algorithm and, in each instance, by a key . This is a secret parameter (known only to the communicants) for the cipher algorithm. Keys are important as ciphers without variable keys are trivially breakable and so rather less than useful. Historically, ciphers were often used directly for encryption or decryption without additional procedures. In colloquial use, the term " code " is often used to mean any method of encryption or concealment of meaning. However, within cryptography, code has a more specific meaning; it means the replacement of a unit of plaintext (i.e., a meaningful word or phrase) with a code word (for example, apple pie replaces attack at dawn). Codes are no longer used in serious cryptography—except incidentally for such things as unit designations (eg, 'Bronco Flight')—since properly chosen ciphers are both more practical and more secure than even the best codes, and better adapted to computers as well. Some use the English terms cryptography and cryptology interchangeably, while others use cryptography to refer to the use and practice of cryptographic techniques, and cryptology to refer to the subject as a field of study. In this respect, English usage is more tolerant of overlapping meanings than are several European languages.
  3. The term is often used to refer to the field as a whole, as is cryptology ("the study of secrets"). The study of how to circumvent the confidentiality sought by using encryption is called cryptanalysis or, more loosely, "codebreaking." The field is a rich source of jargon , some of it humorous. Until modern times, cryptography referred almost exclusively to encryption , the process of converting ordinary information ( plaintext ) into something unintelligible; this is a ciphertext . Decryption is the reverse, moving from unintelligible ciphertext to plaintext . A cipher (or cypher ) is a pair of algorithms which perform this encryption and the reversing decryption. The detailed operation of a cipher is controlled both by the algorithm and, in each instance, by a key . This is a secret parameter (known only to the communicants) for the cipher algorithm. Keys are important as ciphers without variable keys are trivially breakable and so rather less than useful. Historically, ciphers were often used directly for encryption or decryption without additional procedures. In colloquial use, the term " code " is often used to mean any method of encryption or concealment of meaning. However, within cryptography, code has a more specific meaning; it means the replacement of a unit of plaintext (i.e., a meaningful word or phrase) with a code word (for example, apple pie replaces attack at dawn). Codes are no longer used in serious cryptography—except incidentally for such things as unit designations (eg, 'Bronco Flight')—since properly chosen ciphers are both more practical and more secure than even the best codes, and better adapted to computers as well. Some use the English terms cryptography and cryptology interchangeably, while others use cryptography to refer to the use and practice of cryptographic techniques, and cryptology to refer to the subject as a field of study. In this respect, English usage is more tolerant of overlapping meanings than are several European languages.
  4. In many of the descriptions below, two communicating parties will be referred to as Alice and Bob; this is the common nomenclature in the crypto field and literature to make it easier to identify the communicating parties. If there is a third or fourth party to the communication, they will be referred to as Carol and Dave. Mallory is a malicious party, Eve is an eavesdropper, and Trent is a trusted third party.
  5. The earliest forms of secret writing required little more than pen and paper. The main classical cipher types are transposition ciphers , which rearrange the order of letters in a message (e.g. 'help me' becomes 'ehpl em' in a trivially simple rearrangement scheme); and substitution ciphers , which systematically replace letters or groups of letters with other letters or groups of letters (e.g., 'fly at once' becomes 'gmz bu podf' by replacing each letter with the one following it in the alphabet). Simple versions of either offered little confidentiality, and still don't. An early substitution cipher was the Caesar cipher , in which each letter in the plaintext was replaced by a letter some fixed number of positions further down the alphabet. It was named after Julius Caesar who is reported to have used it, with a shift of 3, to communicate with his generals during his military campaigns.
  6. Secret Sharing Another application of cryptography, called secret sharing, allows the trust of a secret to be distributed among a group of people. For example, in a ( k , n )-threshold scheme, information about a secret is distributed in such a way that any k out of the n people ( k £ n ) have enough information to determine the secret, but any set of k -1 people do not. In any secret sharing scheme, there are designated sets of people whose cumulative information suffices to determine the secret. In some implementations of secret sharing schemes, each participant receives the secret after it has been generated. In other implementations, the actual secret is never made visible to the participants, although the purpose for which they sought the secret (for example, access to a building or permission to execute a process) is allowed. See Question 2.1.9 for more information on secret sharing.
  7. A big random number is used to make a public-key pair.
  8. Anyone can encrypt using the public key, but only the private key can decrypt. Secrecy depends on the security of the private key.
  9. Using a private key to encrypt (thus signing) a message; anyone can check the signature using the public key. Validity depends on private key security.
  10. By combining your own private key with the other users public key you can calculate a shared secret that only the two of you know. The shared secret can be used as the key for a symmetric cipher .