SlideShare a Scribd company logo
1 of 3
CRYPTOGRAPHY
Cryptography referred almost exclusively to encryption, which is the process of
converting ordinary information (called plaintext) into unintelligible text (called
cipher text). Decryption is the reverse, in other words, moving from the
unintelligible cipher text back to plaintext. A cipher (or cypher) is a pair of
algorithms that create the encryption and the reversing decryption. The detailed
operation of a cipher is controlled both by the algorithm and in each instance by a
"key". The key is a secret (ideally known only to the communicants), usually a
short string of characters, which is needed to decrypt the cipher text. Formally, a
“cryptosystem" is the ordered list of elements of finite possible plaintexts.
HISTORY
Before the modern era, cryptography focused on message confidentiality (i.e.,
encryption)—conversion of messages from a comprehensible form into an
incomprehensible one and back again at the other end.
It attempted to ensure secrecy in communications, such as those of spies,
military leaders, and diplomats. In recent decades, the field has expanded
beyond confidentiality concerns to include techniques for message integrity
checking, sender/receiver identity authentication, digital signatures, interactive
proofs and secure computation, among others.
In India, the 2000-year-old Kamasutra of Vātsyāyana speaks of two different
kinds of ciphers called Kautiliyam and Mulavediya. In the Kautiliyam, the cipher
letter substitutions are based on phonetic relations, such as vowels becoming
consonants. In the Mulavediya, the cipher alphabet consists of pairing letters and
using the reciprocal ones.
In Sassanid Persia, there were two secret scripts, according to the Muslim author
Ibn al-Nadim: the šāh-dabīrīya (literally "King's script") which was used for official
correspondence, and the rāz-saharīya which was used to communicate secret
messages with other countries.
MODERN CRYPTOGRAPHY
The modern field of cryptography can be divided into several areas of study. The
chief ones are discussed here:
A. Symmetric-key cryptography
Symmetric-key cryptography, where a single key is used for encryption and
decryption
Symmetric-key cryptography refers to encryption methods in which both the
sender and receiver share the same key (or, less commonly, in which their keys
are different, but related in an easily computable way).
Symmetric key ciphers are implemented as either block ciphers or stream
ciphers. A block cipher enciphers input in blocks of plaintext as opposed to
individual characters, the input form used by a stream cipher.
Block ciphers: Examples: DES (Data Encryption Standard) & AES (Advanced
Encryption Standard)
DES is used in ATM encryption & AES is used in Secure Remote Acess.
Stream ciphers are combined with the plaintext bit-by-bit or character-by-
character. In a stream cipher, the output stream is created based on a hidden
internal state that changes as the cipher operates.
Cryptographic hash functions are a third type of cryptographic algorithm. They
take a message of any length as input, and output a short, fixed length hash,
which can be used in (for example) a digital signature.
B. Public-key cryptography
Public-key cryptography, where different keys are used for encryption and
decryption.
In public-key cryptosystems, the public key may be freely distributed, while its
paired private key must remain secret. In a public-key encryption system, the
public key is used for encryption, while the private or secret key is used for
decryption.
Public-key cryptography can also be used for implementing digital signature
schemes.
In digital signature schemes, there are two algorithms: one for signing, in which a
secret key is used to process the message (or a hash of the message, or both),
and one for verification, in which the matching public key is used with the
message to check the validity of the signature.
C. Cryptanalysis
The goal of cryptanalysis is to find some weakness or insecurity in a
cryptographic scheme.
Attacker: A person who decrypt the encryption.
(a) Side Channel Attack: attacks on cryptosystems are based on actual use of
the algorithms in real devices, and are called Side Channel Attack.
(b) Time Attack: This is used for the amount of time the device took to encrypt a
number of plaintexts or report an error in a password or PIN character, to
break a cipher that is otherwise resistant to analysis.
LEGAL ISSUES
A. Prohibitions: Belarus, Kazakhstan, Mongolia, Pakistan, Singapore,
Tunisia, Vietnam, France & China (Domestic Use: Illegal).In USA,
cryptography is legal for domestic use.
B. Export controls: In 1996, thirty-nine countries signed theWassenaar
Arrangement, an arms control treaty that deals with the export of arms and
"dual-use" technologies such as cryptography. The treaty stipulated that
the use of cryptography with short key-lengths (56-bit for symmetric
encryption, 512-bit for RSA).
In 2000 no longer very many restrictions on key sizes in US-exported
mass-market software.
C. NSA Involvement: The NSA was involved with the design of DES during
its development at IBM. IBM discovered differential cryptanalysis, but kept the
technique secret at the NSA's request.
D. Digital Rights Managements: Cryptography is central to digital rights
management (DRM), a group of techniques for technologically controlling use
of copyrighted material, being widely implemented and deployed at the
behest of some copyright holders.
E. Forced disclosure of encryption keys: In the United Kingdom, the
Regulation of Investigatory Powers Act gives UK police the powers to force
suspects to decrypt files or hand over passwords that protect encryption keys.
‘All Writs Act’ is liberal than ‘RIP Act’ of UK but have same motto.

More Related Content

What's hot

COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMP...
COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMP...COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMP...
COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMP...
Neelabja Manna
 
Cryptography 130919084510-phpapp02
Cryptography 130919084510-phpapp02Cryptography 130919084510-phpapp02
Cryptography 130919084510-phpapp02
Ravi Kashyap
 
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETYCRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
ijcisjournal
 

What's hot (20)

Cryptology - Antônio Lacerda
Cryptology - Antônio LacerdaCryptology - Antônio Lacerda
Cryptology - Antônio Lacerda
 
Cryptography
CryptographyCryptography
Cryptography
 
COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMP...
COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMP...COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMP...
COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMP...
 
Cryptography by manisha jha
Cryptography by manisha jhaCryptography by manisha jha
Cryptography by manisha jha
 
Cryptography
CryptographyCryptography
Cryptography
 
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEYMETHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY
 
Elementry Cryptography
Elementry CryptographyElementry Cryptography
Elementry Cryptography
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Cryptography 130919084510-phpapp02
Cryptography 130919084510-phpapp02Cryptography 130919084510-phpapp02
Cryptography 130919084510-phpapp02
 
Ccn presentation
Ccn presentationCcn presentation
Ccn presentation
 
cryptography and network security
cryptography and network security cryptography and network security
cryptography and network security
 
Data encryption
Data encryptionData encryption
Data encryption
 
Singapore Korea IT Symposium 2018 - SovereignWallet Network
Singapore Korea IT Symposium 2018 - SovereignWallet NetworkSingapore Korea IT Symposium 2018 - SovereignWallet Network
Singapore Korea IT Symposium 2018 - SovereignWallet Network
 
Cryptography Overview
Cryptography OverviewCryptography Overview
Cryptography Overview
 
Crpto ppt
Crpto pptCrpto ppt
Crpto ppt
 
Encryption
EncryptionEncryption
Encryption
 
Encryption technology
Encryption technologyEncryption technology
Encryption technology
 
Data Encryption : A Powerful and an Approachable Technology!
Data Encryption : A Powerful and an Approachable Technology! Data Encryption : A Powerful and an Approachable Technology!
Data Encryption : A Powerful and an Approachable Technology!
 
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETYCRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
 
Software for encrypting and decrypting text file powerpointpresentation
Software for encrypting and decrypting text file powerpointpresentationSoftware for encrypting and decrypting text file powerpointpresentation
Software for encrypting and decrypting text file powerpointpresentation
 

Similar to Cryptography saurabh

Similar to Cryptography saurabh (20)

CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
Cryptography
CryptographyCryptography
Cryptography
 
cryptography
cryptographycryptography
cryptography
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
crypto-105058445051058480051448005540405
crypto-105058445051058480051448005540405crypto-105058445051058480051448005540405
crypto-105058445051058480051448005540405
 
Evolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniquesEvolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniques
 
Cryptography
CryptographyCryptography
Cryptography
 
Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)
 
Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)
 
Overview Of Cryptography
Overview Of CryptographyOverview Of Cryptography
Overview Of Cryptography
 
A Study of Different Partitioning Clustering Technique
A Study of Different Partitioning Clustering TechniqueA Study of Different Partitioning Clustering Technique
A Study of Different Partitioning Clustering Technique
 
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHICA NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
 
Cryptography
CryptographyCryptography
Cryptography
 
Paper id 27201444
Paper id 27201444Paper id 27201444
Paper id 27201444
 
Ijcta2011020338
Ijcta2011020338Ijcta2011020338
Ijcta2011020338
 
Analysis of Cryptography Techniques
Analysis of Cryptography TechniquesAnalysis of Cryptography Techniques
Analysis of Cryptography Techniques
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Cryptographic Algorithms For Secure Data Communication
Cryptographic Algorithms For Secure Data CommunicationCryptographic Algorithms For Secure Data Communication
Cryptographic Algorithms For Secure Data Communication
 
Cryptography, a science of secure writing
Cryptography, a science of secure writingCryptography, a science of secure writing
Cryptography, a science of secure writing
 

Recently uploaded

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 

Cryptography saurabh

  • 1. CRYPTOGRAPHY Cryptography referred almost exclusively to encryption, which is the process of converting ordinary information (called plaintext) into unintelligible text (called cipher text). Decryption is the reverse, in other words, moving from the unintelligible cipher text back to plaintext. A cipher (or cypher) is a pair of algorithms that create the encryption and the reversing decryption. The detailed operation of a cipher is controlled both by the algorithm and in each instance by a "key". The key is a secret (ideally known only to the communicants), usually a short string of characters, which is needed to decrypt the cipher text. Formally, a “cryptosystem" is the ordered list of elements of finite possible plaintexts. HISTORY Before the modern era, cryptography focused on message confidentiality (i.e., encryption)—conversion of messages from a comprehensible form into an incomprehensible one and back again at the other end. It attempted to ensure secrecy in communications, such as those of spies, military leaders, and diplomats. In recent decades, the field has expanded beyond confidentiality concerns to include techniques for message integrity checking, sender/receiver identity authentication, digital signatures, interactive proofs and secure computation, among others. In India, the 2000-year-old Kamasutra of Vātsyāyana speaks of two different kinds of ciphers called Kautiliyam and Mulavediya. In the Kautiliyam, the cipher letter substitutions are based on phonetic relations, such as vowels becoming consonants. In the Mulavediya, the cipher alphabet consists of pairing letters and using the reciprocal ones. In Sassanid Persia, there were two secret scripts, according to the Muslim author Ibn al-Nadim: the šāh-dabīrīya (literally "King's script") which was used for official correspondence, and the rāz-saharīya which was used to communicate secret messages with other countries. MODERN CRYPTOGRAPHY The modern field of cryptography can be divided into several areas of study. The chief ones are discussed here: A. Symmetric-key cryptography Symmetric-key cryptography, where a single key is used for encryption and decryption
  • 2. Symmetric-key cryptography refers to encryption methods in which both the sender and receiver share the same key (or, less commonly, in which their keys are different, but related in an easily computable way). Symmetric key ciphers are implemented as either block ciphers or stream ciphers. A block cipher enciphers input in blocks of plaintext as opposed to individual characters, the input form used by a stream cipher. Block ciphers: Examples: DES (Data Encryption Standard) & AES (Advanced Encryption Standard) DES is used in ATM encryption & AES is used in Secure Remote Acess. Stream ciphers are combined with the plaintext bit-by-bit or character-by- character. In a stream cipher, the output stream is created based on a hidden internal state that changes as the cipher operates. Cryptographic hash functions are a third type of cryptographic algorithm. They take a message of any length as input, and output a short, fixed length hash, which can be used in (for example) a digital signature. B. Public-key cryptography Public-key cryptography, where different keys are used for encryption and decryption. In public-key cryptosystems, the public key may be freely distributed, while its paired private key must remain secret. In a public-key encryption system, the public key is used for encryption, while the private or secret key is used for decryption. Public-key cryptography can also be used for implementing digital signature schemes. In digital signature schemes, there are two algorithms: one for signing, in which a secret key is used to process the message (or a hash of the message, or both), and one for verification, in which the matching public key is used with the message to check the validity of the signature. C. Cryptanalysis The goal of cryptanalysis is to find some weakness or insecurity in a cryptographic scheme. Attacker: A person who decrypt the encryption. (a) Side Channel Attack: attacks on cryptosystems are based on actual use of the algorithms in real devices, and are called Side Channel Attack.
  • 3. (b) Time Attack: This is used for the amount of time the device took to encrypt a number of plaintexts or report an error in a password or PIN character, to break a cipher that is otherwise resistant to analysis. LEGAL ISSUES A. Prohibitions: Belarus, Kazakhstan, Mongolia, Pakistan, Singapore, Tunisia, Vietnam, France & China (Domestic Use: Illegal).In USA, cryptography is legal for domestic use. B. Export controls: In 1996, thirty-nine countries signed theWassenaar Arrangement, an arms control treaty that deals with the export of arms and "dual-use" technologies such as cryptography. The treaty stipulated that the use of cryptography with short key-lengths (56-bit for symmetric encryption, 512-bit for RSA). In 2000 no longer very many restrictions on key sizes in US-exported mass-market software. C. NSA Involvement: The NSA was involved with the design of DES during its development at IBM. IBM discovered differential cryptanalysis, but kept the technique secret at the NSA's request. D. Digital Rights Managements: Cryptography is central to digital rights management (DRM), a group of techniques for technologically controlling use of copyrighted material, being widely implemented and deployed at the behest of some copyright holders. E. Forced disclosure of encryption keys: In the United Kingdom, the Regulation of Investigatory Powers Act gives UK police the powers to force suspects to decrypt files or hand over passwords that protect encryption keys. ‘All Writs Act’ is liberal than ‘RIP Act’ of UK but have same motto.