4. CONTENTS1. HISTORY
2. INTRODUCTION
2.1 TYPES OF CRYPTOGRAPHY
2.1.1 CODES AND CODE BOOKS
2.1.2 STEGANOGRAPHY
2.1.3 CIPHERS
2.2 COMPUTER CIPHERS AND ENCRYPTION
2.3 CRYPTANALYSIS
3. SECURITY MECHANISMS
3.1 ENCRYPTION
3.2 DIGITAL SIGNATURES
3.3 HASH ALGORITHMS
4. TYPES OF ENCRYPTION
5. SIZE OF ENCRYPTION KEY
6. DIFFERENCE BETWEEN CRYPTOGRAPHY AND STEGNOGRAPHY
7. CRYPTOGRAPHY IN DAILY LIFE
8. ADVANTAGES & DISADVANTAGES
9. PERSONAL COMPUTERS vs COMPUTER HACKERS
9.1 CHALLENGES
9.2 CONCLUSION
5. 1.HISTORY
⢠How it is used from 1800's to present year.
⢠Using of cryptography from sending secret messages
between two nations during wars to the modern network
security.
⢠There are three eras in the history of Cryptography:
â The Manual era
â The Mechanical era
â The Modern era
⢠Manual era refers to Pen and Paper Cryptography and
dates back to 2000 B.C.
⢠Mechanical era refers to the invention of cipher machines.
⢠The Modern era of cryptography refers to computers.
6. 2.INTRODUCTION
⢠CRYPTOGRAPHY:
âThe field of study related to encoded
information (comes from Greek word for
âsecret writingâ)â.
(or)
⢠Cryptography is the study of
Secret (crypto-) writing (- Graphy)
7. COMPONENTS
⢠The two main components of cryptography
are:
1.ENCRYTION
2.DECRYPTION
Encryption or Encipher or Encode
The process of converting plaintext into cipher text.
Decryption or Decipher or Decode
The process of converting cipher text into plaintext.
8.
9. BASIC CONCEPTS
ďPlaintext
The original intelligible message.
ďCipher text
The transformed message.
ďCipher
An algorithm for transforming an intelligible
message into unintelligible by transposition
and/or substitution
10. BASIC CONCEPTS
ďKey
Some critical information used by the cipher,
known only to the sender & receiver.
ď Encipher (encode)
The process of converting plaintext to cipher
text.
ďDecipher (decode)
The process of converting cipher text back into
plaintext.
12. 2.1.1 CODES AND CODEBOOKS
⢠A well-constructed code can represent phrases and
entire sentences with symbols, such as five-letter
groups, and is often used more for economy than for
secrecy.
⢠A properly constructed code can give a high degree of
security, but the difficulty of printing and distributing
codebooksâbooks of known codesâunder conditions
of absolute secrecy limits their use to places in which
the books can be effectively guarded.
⢠In addition, the more a codebook is used, the less
secure it becomes.
13. 2.1.2 STEGANOGRAPHY
⢠Steganography is a method of hiding the
existence of a message using tools such as
invisible ink, microscopic writing, or hiding
code words within sentences of a message
(such as making every fifth word in a text part
of the message).
⢠Cryptographers may apply steganography to
electronic communications.
⢠This application is called transmission security.
14. 2.1.3 CIPHERS
⢠Ciphers are the secret codes used to encrypt
plaintext messages.
⢠There are two general types of ciphers.
-Substitution ciphers require a cipher alphabet
to replace plaintext with other letters or
symbols.
-Transposition ciphers use the shuffling of
letters in a word to make the word
incomprehensible.
15. 2.2 COMPUTER CIPHERS &
ENCRYPTION
⢠As more and more information is transferred over computer
networks, computer scientists continue to develop more secure,
complex algorithms.
⢠In 1997 the NIST(National Institute of Standards and Technology)
began coordinating development of a replacement for DES
called Advanced Encryption Standard (AES).
⢠AES will use a more complex algorithm, based on a 128-bit
encryption standard instead of the 64-bit standard of DES.
⢠This 128-bit algorithm will make AES impossible to decrypt with
current technology.
⢠Another encryption system based on 128-bit segments is called
International Data Encryption Algorithm, or IDEA.
⢠The Swiss Federal Institute of Technology developed the IDEA
standard in the 1990s.
⢠Computer scientists have also proposed alternatives, which use
two types of keys, a public key and a private key.
16. 2.3 CRYPTANALYSIS
⢠Cryptanalysis: The study of encryption and
encrypted messages, with the goal of finding the
hidden meanings of the messages. (cryptanalyst)
⢠In other words, cryptanalysis is the opposite of
cryptography.
⢠It is the breaking of ciphers.
⢠Todayâs cryptanalysis is measured by the number
and speed of computers available to the code
breaker.
18. 3.1 ENCRYPTION
⢠Even if an attacker captures the data , the attacker will
not be able to manipulate it in any meaningful way.
⢠Roughly speaking, there are two different broad types of
encryption that are used on computers today
â Symmetric encryption relies on keeping keys totally
secret
â Asymmetric encryption actually publicizes one key,
but keeps some information private also
⢠Neither is really âbetterâ - they just use different
principles.
⢠In reality, both are vulnerable to attacks.
19. Symmetric or private key cryptography
⢠Symmetric algorithms use a single key shared by
two communicating parties.
⢠The same key is used for both encryption and
decryption
⢠Most common type is called a block cipher
â Processes the plaintext in fixed sizes blocks
⢠Examples include DES, 3DES, AES,IDEA
⢠All require a secret key which is known by both
parties in the communication
⢠Main issue here: need to securely swap the key.
21. DES: Data Encryption Standard
⢠Adopted in 1977 by National Bureau of Standards (now
NIST)
⢠Divides message into blocks of 64 bits, and uses a key of 56
bits
⢠Key idea for this: XOR the data with the key
â (Remember XOR? How did it work?)
⢠In July 1998, DES was officially cracked by a machine built
by the Electronic Frontier Foundation (EFF)
â Total cost: under $250,000
â Total time: 6-8 months
⢠They then published the details of their approach, which
essentially was a brute force attack(Trying all key values in
the key space)
⢠Note: 56 bits means 256 keys to try
⢠Also, not as easy as just trying.
22. 3DES
⢠Effort to salvage DES
⢠Main algorithm: repeat DES 3 times with
different keys (so key size is now 168 bits)
⢠Still very secure - brute force attacks would
take too long, and that is the only way to
attack this algorithm
⢠Main problem: SLOW
23. Advanced Encryption Standard (AES)
⢠In 1997 the NIST began coordinating development of a
replacement for DES called Advanced Encryption Standard
(AES).
⢠AES will use a more complex algorithm, based on a 128-bit
encryption standard instead of the 64-bit standard of DES.
⢠This 128-bit algorithm will make AES impossible to decrypt
with current technology.
⢠Designed in response to a call by NIST in 1998, and officially
adopted in 2001
⢠Block length is 128 bits, and keys can be 128, 192, or 256 bits.
⢠Essentially, proceeds in 4 rounds (which are repeated):
â Substitute bytes
â Permute
â Mix columns
â Add round key
24. Stage 1: substitute bytes
⢠AES computes a matrix which maps every 8-
bit value to a different 8-bit value
⢠Computed using properties of finite fields (go
take some math classes to learn more about
this)
25. Stage 2: permute
⢠AES then shifts each row, where each row is
shifted a different amount
26. Stage 3: Mix columns
⢠Here, the 4 bytes in each column are
combined using a linear transformation
⢠Essentially, the output of any byte depends on
all the input bytes, so this âmixesâ them
together
27. Stage 4: Add round key
⢠Use XOR to combine the key with the message
28. IDEA
⢠Another encryption system based on 128-bit segments is
called International Data Encryption Algorithm, or IDEA.
⢠In cryptography, the International Data Encryption
Algorithm (IDEA), originally called Improved Proposed
Encryption Standard (IPES).
⢠IDEA operates on 64-bit blocks using a 128-bit key.
⢠IDEA derives much of its security by interleaving operations
from different groups â modular addition and multiplication,
and bitwise eXclusive OR (XOR) â which are algebraically
"incompatible" in some sense.
⢠Bitwise eXclusive OR (denoted with a blue circled plus â).
⢠Addition modulo 216 (denoted with a green boxed plus â).
⢠Multiplication modulo 216+1 (denoted by a red circled dot â).
29. ASSYMETRIC OR
PUBLIC-KEY CRYPTOGRAPHY
⢠Public-key cryptography, also known
as asymmetric cryptography, which requires two
separate keys, one of which is secret (or private)
and one of which is public.
⢠Mathematically related key pairs for encryption
and decryption.
⢠Public and private keys.
⢠The public key is used to encrypt plaintext or to
verify a digital signature; whereas the private key
is used to decrypt cipher text or to create a digital
signature.
30. ASSYMETRIC OR
PUBLIC-KEY CRYPTOGRAPHY
⢠Asymmetric encryption means there will be two
keys for every user, one is Public key and another
one is Private key.
⢠Public key is know to any one and private key is
only known to you.
⢠If you want to send a message to any other you
should encrypt the message with public key of
that person, so that, that person only decrypt the
cipher text he received using private key.
⢠Asymmetric key algorithm is used in face book.
33. 3.2 DIGITAL SIGNATURES
⢠A digital signature (not to be confused with a digital certificate)
is an electronic (it easy to add your e-signature)
⢠Used to authenticate the identity of the sender of a message
or the signer of a document, and possibly to ensure that the
original content of the message or document that has been
sent is unchanged.
⢠Digital signatures can be automatically time-
stamped(declaring time when the folder is created).
⢠The ability to ensure that the original signed message arrived
means that the sender cannot easily repudiate(reject) it later.
USE: These days, no one is going to stand at a fax machine to
wait for approvals. Being able to electronically sign a PDF.
36. 3.3 HASH FUNCTIONS
⢠A cryptographic hash function is a hash function which is
considered practically impossible to invert, that is, to recreate
the input data from its hash value alone.
⢠The input data is often called the message, and the hash value
is often called the message digest or simply the digest.
⢠The ideal cryptographic hash function has four main
properties:
1.It is easy to compute the hash value for any given message
2.It is infeasible to generate a message that has a given hash
3.It is infeasible to modify a message without changing the
hash
4.It is infeasible to find two different messages with the
same hash.
37. HASH FUNCTIONS
⢠Cryptographic hash functions have many information
security applications, notably in digital
signatures, message authentication codes (MACs), and
other forms of authentication( authentication is the
process of actually confirming that identity).
⢠Indeed, in information security contexts, cryptographic
hash values are sometimes called (digital) fingerprints,
or just hash values, even though all these terms stand
for more general functions with rather different
properties and purposes.
38. HASH FUNCTIONS
Note that even small changes in the source input (here in the word "over")
drastically change the resulting output, by the so-called avalanche effect.
42. SUBSTITUTION CIPHERS
⢠A cipher that substitutes one character with
another.
⢠These can be as simple as swapping a list, or
can be based on more complex rules.
⢠These are NOT secure anymore, but they used
to be quite common.
43. Caesar Cipher
ď 2000 years ago Julius Caesar used a simple substitution cipher,
now known as the Caesar cipher.
ď Replace each letter of message by a letter a
fixed distance away (use the 3rd letter on)
ď Reputedly used by Julius Caesar
ď Example:
L FDPH L VDZ
I CAME I SAW
D O L H W
A L I E T
ďź The mapping is
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
D E F G H I J K L M N O P Q R S T U V W X Y Z A B C
44. Transposition CipherT O D A Y
+ I S + M
O N D A Y
â˘Write the letters in a row of five, using '+' as a blank. Encrypt by starting
spiraling inward from the top left moving counter clockwise.
â˘Encrypt(TODAY IS MONDAY) gives T+ONDAYMYADOIS+
â˘Decrypt by recreating the grid and reading the letters across the row.
â˘The key are the dimension of the grid and the route used to encrypt the
data.
⢠The Rail Fence cipher is a form of transposition cipher .
â˘In the rail fence cipher, the plaintext is written downwards on successive
"rails" of an imaginary fence, then moving up when we get to the bottom.
The message is then read off in rows. For example, using three "rails" and a
message of 'WE ARE DISCOVERED. FLEE AT ONCE', the cipherer writes out:
⢠W . . . . . E . . . .C . . . . . . R . . . L . . . . . .T . . . . . E
. E . R . D . .S . O . . E . . E . F . E . . A . O . . C .
. . A . . . I . . . . . V . . . . . D . . . . E . . . . N . .
Then reads off:
⢠WECRL TEERD SOEEF EAOCA IVDEN
45. 5.SIZE OF ENCRYPTION KEY
⢠There are several size of encryption keys:
â 64 bit encryption â java, c#, php(Hypertext Processor )
â 128 bit encryption-internet explorer, java, c#, Firefox, android, oracle,
virtualbasic (vb) vb.net, ASP.net
⢠Active Server Pages ASP.NET is an open source server-side Web
application.
â 256 bit encryption-java, c#, Internet explorer8, php, vb.net
â 512 bit encryption-php, c#
â 1024 bit encryption-c#
⢠C# is a programming language that is derived from C programming
language andC++ programming language.
⢠C# is uniquely designed to be used in .NET platform.
⢠Number indicates the size of the key used to encrypt the
message.
⢠MD5(message digest) hashed key algorithm is used in
WhatsApp.
46. 6.DIFFERENCE BETWEEN
CRYPTOGRAPHY AND STEGNOGRAPHY
⢠Cryptography is the study of hiding information, while
Stegnography deals with composing hidden messages so that
only the sender and the receiver know that the message even
exists.
⢠In Stegnography, only the sender and the receiver know the
existence of the message, whereas in cryptography the
existence of the encrypted message is visible to the world.
⢠Due to this, Stegnography removes the unwanted attention
coming to the hidden message.
⢠Cryptographic methods try to protect the content of a
message, while Steganography uses methods that would hide
both the message as well as the content.
⢠By combining Stegnography and Cryptography one can
achieve better security.
47. 7.CRYPTOGRAPHY IN DAILY LIFE
⢠A very simple example arises from family lives.
⢠A family can be considered like a small community
consisting of 2-10 members, depending on what you
call âfamilyâ. You go somewhere with your family.
⢠You need to ask your father when you are going to your
cabana(a small hut built) which stands in a very
beautiful place, and you donât want others to find out
youâre going there.
⢠You just ask your old man: âWhen do we go there?â
And thatâs it. You just used cryptography! Why? Only
because others who heard what youâve just said donât
know what youâre talking about.
48. ď Emails :
We live in a modern world. We must deliver emails, either for
business, to friends, companies, famous people whose
address we have.
⢠People deliver around 210 billion emails daily ! When you
deliver an email, it has to get trough the internet - a giant
network consisting of a lot of computers most of which are
unprotected and attackable.
⢠A lot of people like to steal data from others, sometimes only
for fun, but danger comes when itâs about something else.
⢠How do emails get protected while they are being sent?
That is done by using data encryption. Generally there would
be two methods for this security.
ď PGP (Pretty Good Privacy)-name of a computer program
and the protocol(data transmission between computers)
ď MIME Security.
49.
50. What is MIME?
⢠Multipurpose Internet Mail Extensions, a
specification for formatting non-ASCII messages
so that they can be sent over the Internet.
⢠Many e-mail clients now support MIME, which
enables them to send and receive graphics, audio
and video files via the internet mail system.
⢠In addition, MIME supports messages in
character sets other than ASCII.
⢠Examples: GIF graphic files.
51. 7.CRYPTOGRAPHY IN DAILY LIFE
⢠The other solution worked for big distances too.
Assume it was night time, and a ship was sailing
on the sea or on the ocean, fighting a huge storm.
⢠So if there were people on the ground, 1-2
kilometers away from the ship location, they
could have used a flashlight to guide the ship
safely to the shore.
⢠The strong point of the flashlight Morse coding
was that it worked even during daytime.
52.
53. 8.ADVANTAGES &
DISADVANTAGES
ďAdvantages of Cryptography are :-
⢠It hides the message and your privacy is safe.
⢠No one would be able to know what it says unless
there's a key to the code.
⢠You can write what ever you want and how ever
you want (any theme any symbol for the code) to
keep your code a secret.
⢠You are able to use Cryptography during lessons
without the teacher knowing. (BUT WILL TAKE
LONG TO MAKE THE CODE, TO FIGURE IT OUT
AND TO MAKE THE KEY)
54. ADVANTAGES &
DISADVANTAGES
ďDisadvantages of Cryptography are:-
⢠Takes a long time to figure out the code.
⢠It takes long to create the code.
⢠If you were to send a code to another person
in the past, it will take long to get to that
person.
⢠OVERALL CRYPTOGRAPHY IT'S A LONG
PROCESS.
55. 9.PERSONAL COMPUTER vs
COMPUTER HACKERS
⢠For personal computer users, cryptography
software can perform a lot of different tasks.
-For example, e-mail encryption programs.
⢠Computer hackers often employ cryptography
software to gain access to other computers. For
example, some programs can uncover passwords
to various networks.
-Hackers can also use software, such as file
shredders(File Shredder is powerful application
to remove unwanted files from your computer
beyond recovery).
57. 9.1 CHALLENGES
⢠There are two kinds of cryptography in this
world:
ď cryptography that will stop your kid sister
from reading your files.
ď cryptography that will stop major
governments from reading your files.
58. 9.2 CONCLUSION
⢠Weâve seen a lot of different areas of where
cryptography is used in our days or in the past.
⢠As a common man, you can easily observe
cryptography everywhere around yourself!
⢠Itâs so amazing how far science got, and it keeps going
and going, getting a lot of new knowledge every day.
⢠Emails and Internet are used by more and more people
every day.
⢠We just canât imagine our lives without it. And all of
these work and get secured based on cryptography.