The presentation describes basics of cryptography and information security. It covers goals of cryptography, history of cipher symmetric and public key cryptography
Introduction to Public key Cryptosystems with block diagrams
Reference : Cryptography and Network Security Principles and Practice , Sixth Edition , William Stalling
Cryptography is the science of using mathematics to encrypt and decrypt data.
Cryptography enables you to store sensitive information or transmit it across insecure networks so that it cannot be read by anyone except the intended recipient.
Introduction to Public key Cryptosystems with block diagrams
Reference : Cryptography and Network Security Principles and Practice , Sixth Edition , William Stalling
Cryptography is the science of using mathematics to encrypt and decrypt data.
Cryptography enables you to store sensitive information or transmit it across insecure networks so that it cannot be read by anyone except the intended recipient.
USER AUTHENTICATION
MEANS OF USER AUTHENTICATION
PASSWORD AUTHENTICATION
PASSWORD VULNERABILITIES
USE OF HASHED PASSWORDS – IN UNIX
PASSWORD CRACKING TECHNIQUES
USING BETTER PASSWORDS
TOKEN AUTHENTICATION
BIO-METRIC AUTHENTICATION
Key management: Introduction, How public key distribution done, Diffie Hellman Key Exchage Algorithm,Digital Certificate. Key Management using Digital certificate is done etc. wireshark screenshot showing digital cetificate.
In cryptography, a block cipher is a deterministic algorithm operating on ... Systems as a means to effectively improve security by combining simple operations such as .... Finally, the cipher should be easily cryptanalyzable, such that it can be ...
The presentation include:
-Diffie hellman key exchange algorithm
-Primitive roots
-Discrete logarithm and discrete logarithm problem
-Attacks on diffie hellman and their possible solution
-Key distribution center
This presentation contains the contents pertaining to the undergraduate course on Cryptography and Network Security (UITC203) at Sri Ramakrishna Institute of Technology. This covers the ElGamal Cryptosystem.
A brief discussion of network security and an introduction to cryptography. We end the presentation with a discussion of the RSA algorithm, and show how it works with a basic example.
USER AUTHENTICATION
MEANS OF USER AUTHENTICATION
PASSWORD AUTHENTICATION
PASSWORD VULNERABILITIES
USE OF HASHED PASSWORDS – IN UNIX
PASSWORD CRACKING TECHNIQUES
USING BETTER PASSWORDS
TOKEN AUTHENTICATION
BIO-METRIC AUTHENTICATION
Key management: Introduction, How public key distribution done, Diffie Hellman Key Exchage Algorithm,Digital Certificate. Key Management using Digital certificate is done etc. wireshark screenshot showing digital cetificate.
In cryptography, a block cipher is a deterministic algorithm operating on ... Systems as a means to effectively improve security by combining simple operations such as .... Finally, the cipher should be easily cryptanalyzable, such that it can be ...
The presentation include:
-Diffie hellman key exchange algorithm
-Primitive roots
-Discrete logarithm and discrete logarithm problem
-Attacks on diffie hellman and their possible solution
-Key distribution center
This presentation contains the contents pertaining to the undergraduate course on Cryptography and Network Security (UITC203) at Sri Ramakrishna Institute of Technology. This covers the ElGamal Cryptosystem.
A brief discussion of network security and an introduction to cryptography. We end the presentation with a discussion of the RSA algorithm, and show how it works with a basic example.
2015 - 2016 IEEE Project Titles and abstracts in Dotnet Papitha Velumani
To get more details about projects contact us at
Contact: PAPITHA VELUMANI.
Mobile: (0)9095395333
No 165, 5th Street Cross cut Road,
Gandhipuram, Coimbatore – 641 012
Web: www.lansainformatics.com | Blog: www.lansastudentscdc.blogspot.com
Email: lansa.projects@gmail.com
Gives a basic idea of Finite field theory and its uses in Elliptic cure cryptography. ECDLP and Diffie Helman key exchange and Elgamal Encryption with ECC.
Hidden Dangers Lurking in E-Commerce and Reducing Fraud with the Right SSL Ce...CheapSSLsecurity
Learn in detail about the dangers which are lurking in an E-commerce website and how to reduce the risk of such lurks by selecting the right SSL certificate for that E-commerce Business.
Elliptic Curve Cryptography for those who are afraid of mathsMartijn Grooten
A low level introduction into elliptic curve cryptography, as presented at BSides San Francisco 2016.
NB don't be put off by the 100 slides; every transition is on its own slide.
Elliptic Curve Cryptography and Zero Knowledge ProofArunanand Ta
Elliptic Curve Cryptography and Zero Knowledge Proof
Presentation by Nimish Joseph, at College of Engineering Cherthala, Kerala, India, during Faculty Development Program, on 06-Nov-2013
Privacy Preserving Public Auditing for Data Storage Security in Cloud.pptGirish Chandra
Introducing TPA(Third Party Auditor) to the cloud.It sends the information about the data stored in the cloud.It informs the user when any unauthorized user tries to steal his data from the cloud.
Each grain must hold a charge
When their volume becomes too little, they will no longer be stable & will be influenced by ambient thermal energy
With current technology, this will happen around 130 Gb/in2
This PPT explains about the term "Cryptography - Encryption & Decryption". This PPT is for beginners and for intermediate developers who want to learn about Cryptography. I have also explained about the various classes which .Net provides for encryption and decryption and some other terms like "AES" and "DES".
Tutorial on Privacy Preserving Speech Processing prepared by Gérard CHOLLET, Jean-Jacques QUISQUATER and Bhiksha RAJ for IEEE-ICASSP and given on March 5th 2017 in New Orleans
How to hack cryptographic protocols with Formal MethodsOfer Rivlin, CISSP
Presented at OWASP AppSec-IL conference, 2018
Video at: https://youtu.be/3G5U8HhfJlI
https://appsecisrael2018.sched.com/event/Fvqr/how-to-hack-cryptographic-protocols-with-formal-methods
The design of even the smallest security protocols is prone to vulnerabilities. For example, the security protocols of federation & connected cars networks are extremely complex. I explore the use of formal methods for automating validation and hacking cryptographic protocols
Securing Text Messages Application Using MEDZatulNadia
Implementing hybrid security algorithm in securing data.
-Introduction
-Problem statement
-Objective
-Process model
-Public key cryptosystem
-Data model
-Proposed model
-Encryption and decryption process
-Proof of concept
* netbeans 8.1 *xampp *database
*java programming language
-Expected results
*performance for key generation, encryption and decryption
*graph
-References
This session is sponsored by Fortinet.
Chair: Frances Burton, security services group manager, Jisc.
Cybersecurity has long been an area of activity for those responsible for providing, protecting and supporting digital services in research and education, but recent events have focused public and media attention on the scale of the threat.
Our security thread at this year’s conference is picking up on some of these themes and we have sessions covering a number of cybersecurity areas. There will be presentations on organisation experiences of email phishing and the results of our RPZ trial. Accreditation of services is being requested more often by project funders and will have a case study presentation on experience of obtaining ISO27001.
Running order of talks:
11:30-11:55 - RPZ trial
Speaker: Peter Dorey, Spamhaus
11:55-12:20 - Addressing the skills shortage in cybersecurity
Speaker: Debbie Tunstall, Cyber Security Challenge.
12:20-12:45 - Institutional issues with Bitcoin
Speaker: Jethro Perkins, London School of Economics and Political Science (LSE).
The presentation covers asynchronous sequential circuit analysis; Map, transition table, flow table. It also covers asynchronous circuit design process and race conditions
synchronous Sequential circuit counters and registersDr Naim R Kidwai
The presentation covers, synchronous sequential circuits; registers and counters. design of registers, shift registers are explained. Design of counter, synchronous and ripple counter is demostrated.
The presentation covers clocked sequential circuit analysis and design process demonstrated with example. State reduction and state assignment is design is also described.
The presentation covers synchronous sequential circuit elements; latch and Flip flops, SR Flip flop, JK Flip flop, T flip flop, D Flip flop, race around condition, Edge triggered flip flop
The presentation covers sampling theorem, ideal sampling, flat top sampling, natural sampling, reconstruction of signals from samples, aliasing effect, zero order hold, upsampling, downsampling, and discrete time processing of continuous time signals.
The presentation covers financial feasibility of projects, payback analysis, NPV analysis or discounted cash flow analysis, IRR analysis, Benefit to cost ratio analysis, B/C pitfalls, ROI
The presentation covers infrastructure project financing, typical configurations, key project parties, project contracts, It explains financing of a power project, security mechanism, SPV payment hierarchy and risk mitigation mechanism
The presentation covers project financing, capital structure, key factors in determining debt equity ratio, menu of financing, sources of capital, internal accruals, equity capital, preference capital, debenture or bonds, methods of offering, term loan, working capital advances, project financing structures,
The presentation covers project constraints: project dependence, capital rationing, project invisibility. It covers comparing project under constraints: methods of ranking, ranking conflicts,
Nec 602 unit ii Random Variables and Random processDr Naim R Kidwai
The presentation explains concept of Probability, random variable, statistical averages, correlation, sum of random Variables, Central Limit Theorem,
random process, classification of random processes, power spectral density, multiple random processes.
The presentation describes Measures of Information, entropy, source coding, source coding theorem, huffman coding, shanon fano coding, channel capacity theorem, capacity of a discrete and continuous memoryless channel, Error Free Communication over a Noisy Channel
Rec101 unit ii (part 2) bjt biasing and re modelDr Naim R Kidwai
The presentation covers BJT Biasing: Operating Point or Q point, Fixed-Bias, Emitter Bias, Voltage-Divider Bias, Collector Feedback bias, Emitter-Follower bias, common base bias, bias Stabilization and re model of CB/ CE/ CC configuration
The presentation covers, Field Effect Transistor: Construction and Characteristic of JFETs, dc biasing of CS, ac analysis of CS amplifier, MOSFET (Depletion and Enhancement)Type, Transfer Characteristic
The presentation covers Bipolar Junction Transistor: Construction, Operation, Transistor configurations and input / output characteristics; Common Base, Common Emitter, and Common Collector
The presentation explains elements of communication system, need of the modulation, types of modulation, basic signals, fundamentals of amplitude modulation/ demodulation, envelope detector, DSB_SC, SSB, VSB and comparison of modulation techniques
The presentation covers digital Voltmeter, RAMP Techniques, digital Multi-meters. It also covers Oscilloscope; Introduction and Basic Principle, CRT, Measurement of voltage, current, phase and frequency using CRO, Introduction of Digital Storage Oscilloscope and its comparison over analogue CRO
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Vaccine management system project report documentation..pdfKamal Acharya
The Division of Vaccine and Immunization is facing increasing difficulty monitoring vaccines and other commodities distribution once they have been distributed from the national stores. With the introduction of new vaccines, more challenges have been anticipated with this additions posing serious threat to the already over strained vaccine supply chain system in Kenya.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
1. Cryptography & Information Security
A presentation in ‘knowledge session’
for 10+2 students
25 Oct 16
25 October 2016
Dr. Naim R Kidwai, Professor & Dean,
JIT Jahangirabad
1
2. Cryptography
In this information era
• Information is related to money & need to be
protected. Ex bank password, transaction
• Information is encoded into bit stream (data) and
transmitted on wireless networks/ Intranet /Internet
• During transmission information is vulnerable to attack
Solution : Cryptography
25 October 2016
Dr. Naim R Kidwai, Professor & Dean,
JIT Jahangirabad
2
3. Cryptography
Solution : Encryption/ Decryption
Cryptography = Crypto + Graphy
Greek word Crypto Hidden secret
Greek word Graphy writing
Cryptography art of hidden secret writing
25 October 2016
Dr. Naim R Kidwai, Professor & Dean,
JIT Jahangirabad
3
4. Basic Terms in Cryptography
• Encryption/Decryption: scrambling a message or data using a
cryptographic algorithm or vice versa.
• Plaintext: the message or data
• Cipher text: the encrypted (scrambled) version of the message.
• Key: info used in cipher known only to sender/ receiver
• Cipher: the algorithm that does the encryption.
25 October 2016
Dr. Naim R Kidwai, Professor & Dean,
JIT Jahangirabad
4
5. Goals of Cryptography (Cipher)
• Authentication
• Data Confidentiality
• Data Integrity
• Non-Repudiation
25 October 2016
Dr. Naim R Kidwai, Professor & Dean,
JIT Jahangirabad
5
6. Confidentiality
• Confidentiality means that only authorized parties are able to
understand the data
• It is okay if unauthorized parties know that there is data, or even
if they copy the data, so long as they cannot understand it.
Solution : Encryption
25 October 2016
Dr. Naim R Kidwai, Professor & Dean,
JIT Jahangirabad
6
A B
C could view the secret message by
eavesdropping on the communication
Loss of privacy/confidentiality
C
M
7. Authentication
25 October 2016
Dr. Naim R Kidwai, Professor & Dean,
JIT Jahangirabad
7
Two solutions are:
–Passwords
–Digital signatures
A B
C
M
C could send a massage to B pretending to be A. If B cannot verify
the source of the information then we lack authentication
8. Data Integrity
25 October 2016
Dr. Naim R Kidwai, Professor & Dean,
JIT Jahangirabad
8
A B
C could alter/corrupt the message, or the message could
change while in transit. If B does not detect this, then we have
Loss of Integrity
C
M
Technical solutions include:
•Encryption
•Hashing algorithms
9. Non-repudiation
Ensuring that
• That the intended recipient actually got the message.
• That the alleged sender actually sent the message.
This is a difficult problem.
25 October 2016
Dr. Naim R Kidwai, Professor & Dean,
JIT Jahangirabad
9
A BM
A might repudiate having sent m to B
solution:
–Digital signatures
10. “Attacks” on information
• passive attacks –
eavesdropping on, or monitoring of, transmissions to:
– obtain message contents, or
– monitor traffic flows
• active attacks –
modification of data stream to:
– masquerade of one entity as some other
– replay previous messages
– modify messages in transit
– denial of service
25 October 2016
Dr. Naim R Kidwai, Professor & Dean,
JIT Jahangirabad
10
11. Caesar Cipher
• Earliest known substitution cipher by Julius Caesar used in
military affairs
• replaces each letter by 3rd letter onwards
• example: MEET ME AFTER THE TEA PARTY
PHHW PH DIWHU WKH WHD SDUWB
• only have 26 possible ciphers A maps to A,B,..Z
• could simply try each in turn (brute force search)
eg. break cipher text "GCUA VQ DTGCM“
plaintext “EASY TO BREAK”
25 October 2016
Dr. Naim R Kidwai, Professor & Dean,
JIT Jahangirabad
11
12. Scytale: by the Spartans in ~700 B.C.
25 October 2016
Dr. Naim R Kidwai, Professor & Dean,
JIT Jahangirabad
12
- transposes the characters of the message
- key diameter of the baton
- practical size of the key space is small
13. One-Time Pad
• Invented by Major Joseph Mauborgne & Benam in 1917
• if a truly random key as long as the message is used, the cipher
will be secure
• called a One-Time pad
• is unbreakable since ciphertext bears no statistical relationship to
the plaintext
• since for any plaintext & any ciphertext there exists a key
mapping one to other
• can only use the key once though
• have problem of safe distribution of key
25 October 2016
Dr. Naim R Kidwai, Professor & Dean,
JIT Jahangirabad
13
14. Enigma : first electro-mechanical
ciphering machine
25 October 2016
Dr. Naim R Kidwai, Professor & Dean,
JIT Jahangirabad
14
- patented by Arthur Scherbius in 1918
- introduced in the German Army in 1926
Three main parts:
– keyboard – for typing in plaintexts and ciphertexts
– display panel – for displaying plaintexts and ciphertexts
– mixing unit – to produce ciphertext from plaintext and vice versa
(the soul of Enigma is the rotor)
15. Confusion and Diffusion
According to Shannon (1949), confusion and diffusion are two
properties of the operation of a secure cipher
• diffusion – dissipates statistical structure of plaintext over bulk of
ciphertext
• confusion – makes relationship between ciphertext and key as
complex as possible
• In other words cipher needs to completely change statistical
properties of original message
a one-time pad does this perfectly
25 October 2016
Dr. Naim R Kidwai, Professor & Dean,
JIT Jahangirabad
15
16. Symmetric Cipher Model
25 October 2016
Dr. Naim R Kidwai, Professor & Dean,
JIT Jahangirabad
16
Ciphertext C
“Eorz xs wkh
Eulgjh ehiruh
sodwrrq uhdfkhv”
Plaintext M
“Blow up the
Bridge before
platoon reaches”
Key K
Encryption
Algorithm
Key K
Decryption
Algorithm
Plaintext
“Blow up the
Bridge before
platoon reaches”
•Also known as conventional/ private-key/ single-key Cipher
•was only type prior to invention of public-key in 1976
17. Symmetric Cipher Model
25 October 2016
Dr. Naim R Kidwai, Professor & Dean,
JIT Jahangirabad
17
•A simple example Key K = Alphabet + x
•Increased level of security
Alternate letters Alphabet + x
Alphabet – x
•Key based system encrypts blocks of data of same length as key
Example : 4 bit Key 1011 (to be X-OR ed with 4 bit data)
Message M (numbers) 6 2 9 7
M (binary form) 6 2 9 7 0110 0010 1001 0111
Key 1011 1011 1011 1011
C 13 9 2 12 1101 1001 0010 1100
Decrypted Message 0110 0010 1001 0111
18. Symmetric Cipher Model
25 October 2016
Dr. Naim R Kidwai, Professor & Dean,
JIT Jahangirabad
18
•Strength does not lie in the Algorithm as it is public
• Strength lies in the Key
• Key has to be random & periodically changed
• Key may be A value, An Image, Typing speed …………
• Key needs to be transmitted to receiver (either manually or on a
secured channel).
A severe problem on shared networks, wireless networks, internet
19. Asymmetric (Public) key Cipher Model
25 October 2016
Dr. Naim R Kidwai, Professor & Dean,
JIT Jahangirabad
19
Ciphertext C”
Plaintext M
Sender A
Public Key of B
Encryption
Algorithm
Receiver B
Private Key of B
Decryption
Algorithm
Plaintext”
•Also known as conventional/ private-key/ single-key Cipher
•was only type prior to invention of public-key in 1976
20. Asymmetric (Public Key) Cryptography Ex.
25 October 2016
Dr. Naim R Kidwai, Professor & Dean,
JIT Jahangirabad
20
Private Key d
e*d=1 mod[(p-1)*(q-1)]
7d=1mod(12*18)
7d=1mod(216)
d=31
Public Key
N=247
e=7
Encryption
Plaintext : 4
Encryption C=Me mod[N]
C=47mod(247)
C = 16384 mod(247)
Ciphertext =82
Let N=p x q, N=247, p=13, q=19 a prime number
Pick another prime number e=7
Decryption
Ciphertext: 82
M=Cd mod[N]
M=8231mod(247)
M=4
21. Security of Cipher : Size of Key
• Security of Cipher lies in the key.
• The large size key, more secure is the Cipher
• Most security experts believe that 256-bit keys are good for
the lifetime of the universe (many billions of years).
25 October 2016
Dr. Naim R Kidwai, Professor & Dean,
JIT Jahangirabad
21
Those who claim to have unbreakable cipher simply
because they can not break , are either genius or fools;
unfortunately there are more of later
22. Size of Key
25 October 2016
Dr. Naim R Kidwai, Professor & Dean,
JIT Jahangirabad
22
Time required to break cipher by brute force approach (assuming all
key has to be tried, assuming trying each key takes 1 machine cycle in
decryption
23. Size of Key
25 October 2016
Dr. Naim R Kidwai, Professor & Dean,
JIT Jahangirabad
23
24. Thank You
25 October 2016
Dr. Naim R Kidwai, Professor & Dean,
JIT Jahangirabad
24