SlideShare a Scribd company logo
Guided by            VIBJAN
KOLAPATI
Mrs. SHEENA MATHEW    CS-B,ROLL
NO:97
   INTRODUCTION
   SECURITY
   APPLICATIONS
   CHALLENGES
   CONCLUSION
   REFERENCES
Cryptography is
  Art & Science of preparing coded or protected
   Communication intelligible only to the authorized
   person.
Cryptography jargon:
           ciphertext, plaintext, keys,symmetric
   &asymmetric algorithms.
History : from World War-I
Cryptology
Cryptanalysis
Cryptography:
 Codes and Code books

 Ciphers



Cryptanalysis:
  Art of analyzing ciphertext to extract the
   plaintext or the key.
Steganography:
SECURITY REQUIREMENTS:
      Confidentiality
      Integrity
      Authentication
SECURITY THREATS:
     Information disclosure
     Integrity violation
     Generic threat : trojan horses
     Authentication threats
   SECURITY MECHANISMS:
    Encryption:
                 The method of disguising plaintext
    in such a way as to hide its substance is called
    encryption.
    Decryption:
               The process of reverting ciphertext to
    its original plaintext is called decryption.
Digital Signatures:
                           Digital signatures enable the recipient of
 information to verify the authenticity of the information’s origin,
 and also verify that the information is intact. Thus, public key
 digital signatures provide authentication and data integrity.
Hash Algorithms:
                             A one-way hash function takes variable-
 length input, in this case, a message of any length, even thousands
 or millions of bits—and produces a fixed-length output; say, 160-
 bits. The hash function ensures that, if the information is changed
 in any way—even by just one bit—an entirely different output
 value is produced.
I.     Protecting ATM transactions

II.    Smart Card

III.   Cryptography Application Block

IV.    Watermarking
Advantages of ATM :
        >Easy to access
        >would not require human intervention
        >economical


Customer authentication:
        > customer’s signature
        > customer’s voiceprint
        > customer’s fingerprint
        > a password assigned to the customer
User_ID      PAN         PIN
Janu          17894567       8974
Sonu          76654321       7860




             Q2=f(Q1);
   Q2=f(Q1)=1,000,000,000 – Q1
Q2(Janu)=1,000,000,000 – 17,894,567
        =999,982,105,433
   The solution – encipherment!

                           Q2= EK{Q1}.
   If the cryptographic algorithm EK{ --- } is sufficiently strong, then knowledge of
    the pair (Q1,Q2) or even a large number of pairs ({Q1(i), Q2(i)):1< i < N} might
    not permit a customer easily to deduce the secret key K.
   A solution to permit the user to select a U-PIN((User_ID)).
    The PIN(User_ID), PINOffset(User_ID), and U-PIN(User_ID) in
    the IBM 3624 system are related by
U - PIN(User ID)= Left16[EK{PAN(User ID)}]+ PINOffset(User ID).
Standard Decimalization Table:

    0   1   2   3   4    5   6   7   8    9   A   B   C    D E     F
    0   1   2   3   4    5   6   7   8    9   0   1    2   3   4   5
   Smart card is pocket-sized card with embedded integrated circuits which
    can process data.
   The smart card will provide proof of identity when a user is
    communicating with a remote server. Secure transactions involving a
    smart card will require cryptography.

   If the identification process is based on public-key cryptography, then
   . The key will need to be stored in the EEPROM,
   . The smart card will need to read-protect the key, and
   . The owner of the card will need to use a PIN to prove identity to the
    card.
A secure cryptoprocessor is a dedicated computer or
microprocessor for carrying out cryptograpic operations,
embedded in a packaging with multiple physical security
measures, which give it a degree of tamper resistance.

Cryptoprocessors input program instructions in encrypted
form, decrypt the instructions to plain instructions which are
then executed within the same cryptoprocessor chip where the
decrypted instructions are inaccessibly stored. By never
revealing   the   decrypted     program     instructions,  the
cryptoprocessor prevents tampering of programs by technicians
who may have legitimate access to the sub-system data bus.
   Cryptography Application Block simplifies how developers incorporate
    cryptographic functionality in their applications. Applications can use the
    application block for a variety of tasks, such as encrypting information,
    creating a hash from data, and comparing hash values to verify that data
    has not been altered.
   The Cryptography Application Block was designed to achieve the
    following goals:
             Encapsulate the logic that is used to perform the most common
    application cryptography tasks.
         Present a standard consistent model for common cryptography tasks.
           Make sure minimal or negligible performance impact compared to
    manually written cryptography code that accomplishes the same
    functionality.
            Provide a key protection model that can be customized to satisfy
    your organization's security requirements.
   Watermarking is a method in computer security by which
    identifiers of sources or copyright owners of digital or analog
    signals are embedded into the respective signals themselves in
    order to keep track of where a signal comes from or who the
    copyright owners are.
   The characteristic security requirements on digital watermarking
    schemes, also called electronic copyright marking schemes (ECMS),
    are as follows:
              >unobstrusiveness: Watermarks should not degrade the
    quality of the cover-signal.
                >robustness:Watermarks should be embedded into the
    content, in such a way that any signal transform of reasonable
    strength cannot remove the watermark.
Plays role in business
         economics, e-commerce,banking etc.,
Plays role in web security
         SSL protocol
Plays role in military agencies
          National Security Agency(NSA).
Plays role in System Security
          Unix passwords, SIM cards etc.,
   In the future, as telephone networks become digital, even the actual
    conversations may be recorded and stored. All of this amounts to a great
    potential loss of privacy. Cryptography is one tool that will be able to
    ensure more privacy. The ability to encrypt data, communications, and
    other information gives individuals the power to restore personal
    privacy.

   Cryptography is important for more than just privacy, however.
    Cryptography protects the world’s banking systems as well. Many banks
    and other financial institutions conduct their business over open
    networks, such as the Internet.
   1.Microsoft Encarta Encyclopedia
   2.Cryptography Encyclopedia
   3.Cryptography and Data security by Dorothy Elizabeth,Amazon.com
   4.Computer-security and Cryptography by Alan konheim,ACM portal.
   5.Cryptography & Data security by Denning,Amazon.com
   6. Bloom, Jefrey A., Ingemar J. Cox, Ton Kalker, Jean-Paul M.G. Linnartz,
    Matthew L. Miller, C., andBrendan S. Traw (1999). “Copy protection for
    DVDvideo.” Proceedings of the IEEE,87 (7), 1267–1276.
   7.Applied Cryptography and Data security by Prof. Christof Paar
   8.www.msdn.microsft.com

More Related Content

What's hot

Security
SecuritySecurity
Summer report crypto
Summer report cryptoSummer report crypto
Summer report crypto
Gaurav Shukla
 
Cryptography
CryptographyCryptography
Cryptography
TanviGogri
 
CNS Solution
CNS SolutionCNS Solution
CNS Solution
Nitin Kanzariya
 
C08 crypto-digital signature13
C08 crypto-digital signature13C08 crypto-digital signature13
C08 crypto-digital signature13
ravik09783
 
E-commerce- Security & Encryption
E-commerce- Security & EncryptionE-commerce- Security & Encryption
E-commerce- Security & EncryptionBiroja
 
Skyriver Communications – Fixed Wireless Security
Skyriver Communications – Fixed Wireless SecuritySkyriver Communications – Fixed Wireless Security
Skyriver Communications – Fixed Wireless Security
Skyriver04
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signaturesRohit Bhat
 
Prevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital EnvelopePrevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital Envelope
iosrjce
 
Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...
eSAT Publishing House
 
A novel approach to information security using safe exchange of encrypted dat...
A novel approach to information security using safe exchange of encrypted dat...A novel approach to information security using safe exchange of encrypted dat...
A novel approach to information security using safe exchange of encrypted dat...
eSAT Journals
 
E voting authentication with qr-codes
E voting authentication with qr-codesE voting authentication with qr-codes
E voting authentication with qr-codesMd. Hasibur Rashid
 
A novel approach to information security using safe
A novel approach to information security using safeA novel approach to information security using safe
A novel approach to information security using safe
eSAT Publishing House
 
digital signature for SMS security
digital signature for SMS securitydigital signature for SMS security
digital signature for SMS securityNilu Desai
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
Evion Technologies
 
Cryptography and Encryptions,Network Security,Caesar Cipher
Cryptography and Encryptions,Network Security,Caesar CipherCryptography and Encryptions,Network Security,Caesar Cipher
Cryptography and Encryptions,Network Security,Caesar Cipher
Gopal Sakarkar
 
Qr code based secure otp distribution scheme for Online banking
Qr code based secure otp distribution scheme for Online bankingQr code based secure otp distribution scheme for Online banking
Qr code based secure otp distribution scheme for Online banking
Snehith
 

What's hot (18)

Security
SecuritySecurity
Security
 
Summer report crypto
Summer report cryptoSummer report crypto
Summer report crypto
 
Cryptography
CryptographyCryptography
Cryptography
 
CNS Solution
CNS SolutionCNS Solution
CNS Solution
 
C08 crypto-digital signature13
C08 crypto-digital signature13C08 crypto-digital signature13
C08 crypto-digital signature13
 
E-commerce- Security & Encryption
E-commerce- Security & EncryptionE-commerce- Security & Encryption
E-commerce- Security & Encryption
 
Skyriver Communications – Fixed Wireless Security
Skyriver Communications – Fixed Wireless SecuritySkyriver Communications – Fixed Wireless Security
Skyriver Communications – Fixed Wireless Security
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signatures
 
Prevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital EnvelopePrevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital Envelope
 
Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...
 
A novel approach to information security using safe exchange of encrypted dat...
A novel approach to information security using safe exchange of encrypted dat...A novel approach to information security using safe exchange of encrypted dat...
A novel approach to information security using safe exchange of encrypted dat...
 
E voting authentication with qr-codes
E voting authentication with qr-codesE voting authentication with qr-codes
E voting authentication with qr-codes
 
A novel approach to information security using safe
A novel approach to information security using safeA novel approach to information security using safe
A novel approach to information security using safe
 
digital signature for SMS security
digital signature for SMS securitydigital signature for SMS security
digital signature for SMS security
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Cryptography and Encryptions,Network Security,Caesar Cipher
Cryptography and Encryptions,Network Security,Caesar CipherCryptography and Encryptions,Network Security,Caesar Cipher
Cryptography and Encryptions,Network Security,Caesar Cipher
 
Qr code based secure otp distribution scheme for Online banking
Qr code based secure otp distribution scheme for Online bankingQr code based secure otp distribution scheme for Online banking
Qr code based secure otp distribution scheme for Online banking
 

Viewers also liked

Citrix Xen Server 5 5
Citrix Xen Server 5 5Citrix Xen Server 5 5
Citrix Xen Server 5 5anterope
 
5G Mobile Technology-By TAHMID RONGON
5G Mobile Technology-By TAHMID RONGON5G Mobile Technology-By TAHMID RONGON
5G Mobile Technology-By TAHMID RONGON
Tahmid Rongon
 
Virtualization basics
Virtualization basics Virtualization basics
Virtualization basics
Chandrani Ray Chowdhury
 
Virtualization presentation
Virtualization presentationVirtualization presentation
Virtualization presentationMangesh Gunjal
 
5G MOBILE TECHNOLOGY PPT
5G MOBILE TECHNOLOGY PPT5G MOBILE TECHNOLOGY PPT
5G MOBILE TECHNOLOGY PPTpriyanka reddy
 

Viewers also liked (7)

Ts terminal server
Ts terminal serverTs terminal server
Ts terminal server
 
Citrix Xen Server 5 5
Citrix Xen Server 5 5Citrix Xen Server 5 5
Citrix Xen Server 5 5
 
5G Mobile Technology-By TAHMID RONGON
5G Mobile Technology-By TAHMID RONGON5G Mobile Technology-By TAHMID RONGON
5G Mobile Technology-By TAHMID RONGON
 
Virtualization basics
Virtualization basics Virtualization basics
Virtualization basics
 
Virtualization presentation
Virtualization presentationVirtualization presentation
Virtualization presentation
 
5G MOBILE TECHNOLOGY PPT
5G MOBILE TECHNOLOGY PPT5G MOBILE TECHNOLOGY PPT
5G MOBILE TECHNOLOGY PPT
 
Introduction to virtualization
Introduction to virtualizationIntroduction to virtualization
Introduction to virtualization
 

Similar to Cryptographysecurity 1222867498937700-9

Cryptography&Security
Cryptography&SecurityCryptography&Security
Cryptography&Security
Sanjeev Kumar Jaiswal
 
Encryption in Cryptography
Encryption in CryptographyEncryption in Cryptography
Encryption in Cryptography
Uttara University
 
SIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATURE
SIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATURESIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATURE
SIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATURE
ijp2p
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
Janet Robinson
 
CN GP 4 Cryptogaraphy.pptx
CN GP 4 Cryptogaraphy.pptxCN GP 4 Cryptogaraphy.pptx
CN GP 4 Cryptogaraphy.pptx
GarimaJain745610
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvan
itrraincity
 
L017136269
L017136269L017136269
L017136269
IOSR Journals
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...
IOSR Journals
 
Iaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security withIaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security with
Iaetsd Iaetsd
 
Computer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU LucknowComputer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU Lucknow
Brijesh Vishwakarma
 
ROLE OF MULTIPLE ENCRYPTION IN SECURE ELECTRONIC TRANSACTION
ROLE OF MULTIPLE ENCRYPTION IN SECURE ELECTRONIC TRANSACTIONROLE OF MULTIPLE ENCRYPTION IN SECURE ELECTRONIC TRANSACTION
ROLE OF MULTIPLE ENCRYPTION IN SECURE ELECTRONIC TRANSACTION
IJNSA Journal
 
Coding And Decoding
Coding And DecodingCoding And Decoding
Coding And Decoding
Hemanth Rajendran
 
Cyber security
Cyber securityCyber security
Cyber security
Aman Pradhan
 
J017667582
J017667582J017667582
J017667582
IOSR Journals
 
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationPairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
IJTET Journal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...
IOSR Journals
 
CNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdfCNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdf
AdiseshaK
 

Similar to Cryptographysecurity 1222867498937700-9 (20)

Cryptography&Security
Cryptography&SecurityCryptography&Security
Cryptography&Security
 
Encryption in Cryptography
Encryption in CryptographyEncryption in Cryptography
Encryption in Cryptography
 
SIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATURE
SIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATURESIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATURE
SIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATURE
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
 
CN GP 4 Cryptogaraphy.pptx
CN GP 4 Cryptogaraphy.pptxCN GP 4 Cryptogaraphy.pptx
CN GP 4 Cryptogaraphy.pptx
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvan
 
L017136269
L017136269L017136269
L017136269
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...
 
Iaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security withIaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security with
 
PKI.pptx
PKI.pptxPKI.pptx
PKI.pptx
 
Computer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU LucknowComputer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU Lucknow
 
ROLE OF MULTIPLE ENCRYPTION IN SECURE ELECTRONIC TRANSACTION
ROLE OF MULTIPLE ENCRYPTION IN SECURE ELECTRONIC TRANSACTIONROLE OF MULTIPLE ENCRYPTION IN SECURE ELECTRONIC TRANSACTION
ROLE OF MULTIPLE ENCRYPTION IN SECURE ELECTRONIC TRANSACTION
 
Coding And Decoding
Coding And DecodingCoding And Decoding
Coding And Decoding
 
Cyber security
Cyber securityCyber security
Cyber security
 
J017667582
J017667582J017667582
J017667582
 
Fu3111411144
Fu3111411144Fu3111411144
Fu3111411144
 
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationPairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...
 
CNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdfCNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdf
 

Recently uploaded

GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 

Recently uploaded (20)

GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 

Cryptographysecurity 1222867498937700-9

  • 1. Guided by VIBJAN KOLAPATI Mrs. SHEENA MATHEW CS-B,ROLL NO:97
  • 2. INTRODUCTION  SECURITY  APPLICATIONS  CHALLENGES  CONCLUSION  REFERENCES
  • 3. Cryptography is Art & Science of preparing coded or protected Communication intelligible only to the authorized person. Cryptography jargon: ciphertext, plaintext, keys,symmetric &asymmetric algorithms. History : from World War-I Cryptology Cryptanalysis
  • 4. Cryptography:  Codes and Code books  Ciphers Cryptanalysis: Art of analyzing ciphertext to extract the plaintext or the key. Steganography:
  • 5.
  • 6. SECURITY REQUIREMENTS: Confidentiality Integrity Authentication SECURITY THREATS: Information disclosure Integrity violation Generic threat : trojan horses Authentication threats
  • 7. SECURITY MECHANISMS: Encryption: The method of disguising plaintext in such a way as to hide its substance is called encryption. Decryption: The process of reverting ciphertext to its original plaintext is called decryption.
  • 8. Digital Signatures: Digital signatures enable the recipient of information to verify the authenticity of the information’s origin, and also verify that the information is intact. Thus, public key digital signatures provide authentication and data integrity. Hash Algorithms: A one-way hash function takes variable- length input, in this case, a message of any length, even thousands or millions of bits—and produces a fixed-length output; say, 160- bits. The hash function ensures that, if the information is changed in any way—even by just one bit—an entirely different output value is produced.
  • 9. I. Protecting ATM transactions II. Smart Card III. Cryptography Application Block IV. Watermarking
  • 10. Advantages of ATM : >Easy to access >would not require human intervention >economical Customer authentication: > customer’s signature > customer’s voiceprint > customer’s fingerprint > a password assigned to the customer
  • 11. User_ID PAN PIN Janu 17894567 8974 Sonu 76654321 7860 Q2=f(Q1); Q2=f(Q1)=1,000,000,000 – Q1 Q2(Janu)=1,000,000,000 – 17,894,567 =999,982,105,433
  • 12. The solution – encipherment! Q2= EK{Q1}.  If the cryptographic algorithm EK{ --- } is sufficiently strong, then knowledge of the pair (Q1,Q2) or even a large number of pairs ({Q1(i), Q2(i)):1< i < N} might not permit a customer easily to deduce the secret key K.  A solution to permit the user to select a U-PIN((User_ID)). The PIN(User_ID), PINOffset(User_ID), and U-PIN(User_ID) in the IBM 3624 system are related by U - PIN(User ID)= Left16[EK{PAN(User ID)}]+ PINOffset(User ID). Standard Decimalization Table: 0 1 2 3 4 5 6 7 8 9 A B C D E F 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
  • 13. Smart card is pocket-sized card with embedded integrated circuits which can process data.  The smart card will provide proof of identity when a user is communicating with a remote server. Secure transactions involving a smart card will require cryptography.  If the identification process is based on public-key cryptography, then  . The key will need to be stored in the EEPROM,  . The smart card will need to read-protect the key, and  . The owner of the card will need to use a PIN to prove identity to the card.
  • 14.
  • 15. A secure cryptoprocessor is a dedicated computer or microprocessor for carrying out cryptograpic operations, embedded in a packaging with multiple physical security measures, which give it a degree of tamper resistance. Cryptoprocessors input program instructions in encrypted form, decrypt the instructions to plain instructions which are then executed within the same cryptoprocessor chip where the decrypted instructions are inaccessibly stored. By never revealing the decrypted program instructions, the cryptoprocessor prevents tampering of programs by technicians who may have legitimate access to the sub-system data bus.
  • 16. Cryptography Application Block simplifies how developers incorporate cryptographic functionality in their applications. Applications can use the application block for a variety of tasks, such as encrypting information, creating a hash from data, and comparing hash values to verify that data has not been altered.  The Cryptography Application Block was designed to achieve the following goals: Encapsulate the logic that is used to perform the most common application cryptography tasks. Present a standard consistent model for common cryptography tasks. Make sure minimal or negligible performance impact compared to manually written cryptography code that accomplishes the same functionality. Provide a key protection model that can be customized to satisfy your organization's security requirements.
  • 17.
  • 18. Watermarking is a method in computer security by which identifiers of sources or copyright owners of digital or analog signals are embedded into the respective signals themselves in order to keep track of where a signal comes from or who the copyright owners are.  The characteristic security requirements on digital watermarking schemes, also called electronic copyright marking schemes (ECMS), are as follows: >unobstrusiveness: Watermarks should not degrade the quality of the cover-signal. >robustness:Watermarks should be embedded into the content, in such a way that any signal transform of reasonable strength cannot remove the watermark.
  • 19. Plays role in business economics, e-commerce,banking etc., Plays role in web security SSL protocol Plays role in military agencies National Security Agency(NSA). Plays role in System Security Unix passwords, SIM cards etc.,
  • 20. In the future, as telephone networks become digital, even the actual conversations may be recorded and stored. All of this amounts to a great potential loss of privacy. Cryptography is one tool that will be able to ensure more privacy. The ability to encrypt data, communications, and other information gives individuals the power to restore personal privacy.  Cryptography is important for more than just privacy, however. Cryptography protects the world’s banking systems as well. Many banks and other financial institutions conduct their business over open networks, such as the Internet.
  • 21. 1.Microsoft Encarta Encyclopedia  2.Cryptography Encyclopedia  3.Cryptography and Data security by Dorothy Elizabeth,Amazon.com  4.Computer-security and Cryptography by Alan konheim,ACM portal.  5.Cryptography & Data security by Denning,Amazon.com  6. Bloom, Jefrey A., Ingemar J. Cox, Ton Kalker, Jean-Paul M.G. Linnartz, Matthew L. Miller, C., andBrendan S. Traw (1999). “Copy protection for DVDvideo.” Proceedings of the IEEE,87 (7), 1267–1276.  7.Applied Cryptography and Data security by Prof. Christof Paar  8.www.msdn.microsft.com