SlideShare a Scribd company logo
Fundamentals of
Cryptography
Workshop
What is Cryptography ?
“KRYPTO” “GRAPHENE”
KRYPTO GRAPHENE
SECRET WRITING
Why do we need Cryptography?
ORGANISATIONHITMAN
KILL BELICOFF
Channel
UTTER FAILURE
HISTORY
• 50 B.C. Julius Caesar uses cryptographic
technique
• 1250 British monk Roger Bacon
describes simple ciphers
• 1466 Leon Alberti develops a cipher
disk
• 1861 Union forces use a cipher during
Civil War
HISTORY
• 1914 World War I – British, French, and
German forces use encryption
technology
• 1917 William Friedman, Father of U.S.
encryption efforts starts a school
for teaching cryptanalysis in
Illinois
• 1917 AT&T employee Gilbert Vernam
invents polyalphabetic cipher
• 1919 Germans develop the Enigma machine
for encryption
HISTORY
• 1937 Japanese design the Purple
machine for encryption
• 1942 Navajo windtalkers help with secure
communication during World War II
• 1948 Claude Shannon develops statistical
methods for encryption/decryption
• 1976 IBM develops DES
• 1976 Diffie – Hellman develop public key /
private key cryptography
• 1977 Rivest – Shamir – Adleman develop the
RSA algorithm for public key / private key
Where do we use Cryptography ?
Secure communication:
• web traffic: HTTPS
• wireless traffic: 802.11i WPA2 (and WEP), GSM, Bluetooth
Encrypting files on disk: EFS, TrueCrypt
Content protection (e.g. DVD, Blu-ray): CSS, AACS
User authentication
… and much much more
SECURE COMMUNICATION
no eavesdropping
no tampering
PLAIN TEXT
 Plaintext is a text , in natural readable form. It is the message or data
before it gets encrypted. In simple words it is the original message.
 It is sometimes called clear text . Plaintext is denoted by M (message)
or P (plaintext).
 It can be a stream of bits , a text file , a bitmap image, a stream of
digitized voice etc.
E.g.: ”Mission is a Go !!!”
CIPHER TEXT
 An encrypted message is called cipher text . It is denoted by C (cipher
text).
 Sometime it has the same size as the plaintext, sometimes larger than
the plaintext.
 It is the results obtained from the plaintext by applying the encryption
algorithm on the plaintext.
 Cipher text is unreadable by anyone except the intended recipients.
E.g. :“jhbaiudcbew564kjb”
ENCRYPTION
 The process of disguising a message in such a way to hide its
substance is called encryption.
 It is the process of scrambling a message using a specialized
cryptographic algorithm to make it unreadable by anyone except the
intended recipients.
 The encryption function E, operates on M to produce C. In
mathematical notation E(M)=C
Types of Encryption
• SYMMETRIC KEY ENCRYPTION
• PUBLIC KEY ENCRYPTION
SYMMETRIC KEY ENCRYPTION
• Symmetric encryption is the oldest and best-
known technique. A secret key, which can be a
number, a word, or just a string of random letters,
is applied to the text of a message to change the
content in a particular way. This might be as
simple as shifting each letter by a number of
places in the alphabet
ASYMMETRIC KEY ENCRYPTION
• Public-key encryption, in which a message is
encrypted with a recipient's public key. The
message cannot be decrypted by anyone who does
not possess the matching private key, who is thus
presumed to be the owner of that key and the
person associated with the public key. This is used
in an attempt to ensure confidentiality.
ASYMMETRIC KEY ENCRYPTION
ASYMMETRIC KEY ENCRYPTION
ASYMMETRIC KEY ENCRYPTION
CONCEPTS
• A private key cipher is composed of two algorithms
• encryption algorithm E
• decryption algorithm D
• The same key K is used for encryption & decryption
• K has to be distributed beforehand
NOTATIONS
• Encrypt a plaintext P using a key K & an encryption algorithm E
C = E(K,P)
• Decrypt a cipher text C using the same key K and the matching
decryption algorithm D
P = D(K,C)
• Note: P = D(K,C) = D(K, E(K,P))
CAESAR CIPHER
• The Caesar cipher is a substitution cipher,
named after Julius Caesar.
• Operation principle:
each letter is translated into the letter a fixed
number of positions after it in the alphabet
table.
• The fixed number of positions is a key both for
encryption and decryption.
CAESAR CIPHER
The action of a Caesar cipher is to replace each plaintext letter with a different one a fixed
number of places down the alphabet. The cipher illustrated here uses a shift of 3
An Example
• For a key K=3,
plaintext letter: ABCDEF...UVWXYZ
cipher text letter: DEF...UVWXYZABC
• Hence
TREATY IMPOSSIBLE
is translated into
WUHDWB LPSRVVLEOH
ATTACKS
• With the help of fast computers, 99.99%
ciphers used before 1976 are breakable
by using one of the 4 types of attacks
(described later).
• Modern cluster computers and future
quantum computers can break several
existing ciphers due to the power of
such computers.
ATTACKS ON CAESAR CIPHER
• By using statistics on letters
• frequency distributions of letters
letter percent
A 7.49%
B 1.29%
C 3.54%
D 3.62%
E 14.00%
..................................
• By Brute Force attacks.
SUMMARY
• What is cryptography ?
• Why do we need Cryptography ?
• Types of Encryption ?
• Notations
• Fundamental Terms
• Caesar Cipher
• Attack on Caesar Cipher
THE END
ANY QUERIES ?
Manojit Ballav
Email: manojitballav@outlook.com
Phone: 9352957266

More Related Content

What's hot

Cryptography
CryptographyCryptography
Cryptography
Kushagro Dhar
 
Substitution techniques
Substitution techniquesSubstitution techniques
Substitution techniques
vinitha96
 
History of cryptography
History of cryptographyHistory of cryptography
History of cryptography
Farah Shaikh
 
Cryptography & network security
Cryptography & network securityCryptography & network security
Cryptography & network securitysathu30
 
Final ss2-digital-signature-group5
Final ss2-digital-signature-group5Final ss2-digital-signature-group5
Final ss2-digital-signature-group5
Phan Minh
 
Crypto theory to practice
Crypto theory to practiceCrypto theory to practice
Crypto theory to practice
Harry Potter
 
Ccn presentation
Ccn presentationCcn presentation
Ccn presentation
Faraz Qureshi
 
Data encryption, Description, DES
Data encryption, Description, DESData encryption, Description, DES
Data encryption, Description, DES
Huawei Technologies
 
Cryptography Intro
Cryptography IntroCryptography Intro
Cryptography Intro
Christopher Martin
 
Code and cipher
Code and cipherCode and cipher
Code and cipher
Timbal Mayank
 
My cryptography
My cryptographyMy cryptography
My cryptography
NAVYA RAO
 
Cryptography
CryptographyCryptography
Cryptography
AnandKaGe
 
Data Encryption Standard
Data Encryption StandardData Encryption Standard
Data Encryption Standard
Adri Jovin
 
Cryptography
CryptographyCryptography
Cryptography
milanmath
 

What's hot (15)

Cryptography
CryptographyCryptography
Cryptography
 
Substitution techniques
Substitution techniquesSubstitution techniques
Substitution techniques
 
History of cryptography
History of cryptographyHistory of cryptography
History of cryptography
 
Cryptography & network security
Cryptography & network securityCryptography & network security
Cryptography & network security
 
Final ss2-digital-signature-group5
Final ss2-digital-signature-group5Final ss2-digital-signature-group5
Final ss2-digital-signature-group5
 
Crypto theory to practice
Crypto theory to practiceCrypto theory to practice
Crypto theory to practice
 
Ccn presentation
Ccn presentationCcn presentation
Ccn presentation
 
Data encryption, Description, DES
Data encryption, Description, DESData encryption, Description, DES
Data encryption, Description, DES
 
Cryptography Intro
Cryptography IntroCryptography Intro
Cryptography Intro
 
Code and cipher
Code and cipherCode and cipher
Code and cipher
 
My cryptography
My cryptographyMy cryptography
My cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Data Encryption Standard
Data Encryption StandardData Encryption Standard
Data Encryption Standard
 
Symmetric and asymmetric key
Symmetric and asymmetric keySymmetric and asymmetric key
Symmetric and asymmetric key
 
Cryptography
CryptographyCryptography
Cryptography
 

Similar to Fundamentals of cryptography workshop

Cryptography
CryptographyCryptography
Cryptography
Jens Patel
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & Steganography
Animesh Shaw
 
Cns 13f-lec03- Classical Encryption Techniques
Cns 13f-lec03- Classical Encryption TechniquesCns 13f-lec03- Classical Encryption Techniques
Cns 13f-lec03- Classical Encryption Techniques
babak danyal
 
Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network SecurityClassical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Security
babak danyal
 
Cryptography and steganography lesson and discription.pptx
Cryptography and steganography lesson and discription.pptxCryptography and steganography lesson and discription.pptx
Cryptography and steganography lesson and discription.pptx
RobertCarreonBula
 
Cryptography and network security Nit701
Cryptography and network security Nit701Cryptography and network security Nit701
Cryptography and network security Nit701
Amit Pathak
 
Cryptography
CryptographyCryptography
Cryptography
Sandip kumar
 
security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.
security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.
security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.
nagwaAboElenein
 
Cryptography
CryptographyCryptography
Cryptography
Deepak Kumar
 
4.Cryptography handout 2.pptx
4.Cryptography  handout 2.pptx4.Cryptography  handout 2.pptx
4.Cryptography handout 2.pptx
MikiAbera
 
Symmetric Encryption Techniques
Symmetric Encryption Techniques Symmetric Encryption Techniques
Symmetric Encryption Techniques
Dr. Kapil Gupta
 
CryptographyVsStegnoGraphy
CryptographyVsStegnoGraphy CryptographyVsStegnoGraphy
CryptographyVsStegnoGraphy pthakker92
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
bcanawakadalcollege
 
module 1 (part A).pdf
module 1 (part A).pdfmodule 1 (part A).pdf
module 1 (part A).pdf
ChethanKrishna14
 
cryptography symmentric.pptx
cryptography symmentric.pptxcryptography symmentric.pptx
cryptography symmentric.pptx
ChethanKrishna14
 
Cs166 mynote
Cs166 mynoteCs166 mynote
Cs166 mynote
Kaya Ota
 
basic encryption and decryption
 basic encryption and decryption basic encryption and decryption
basic encryption and decryption
Rashmi Burugupalli
 
Spring12_topic01.ppt
Spring12_topic01.pptSpring12_topic01.ppt
Spring12_topic01.ppt
DakshPrajapati23
 

Similar to Fundamentals of cryptography workshop (20)

Cryptography
CryptographyCryptography
Cryptography
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & Steganography
 
Cns 13f-lec03- Classical Encryption Techniques
Cns 13f-lec03- Classical Encryption TechniquesCns 13f-lec03- Classical Encryption Techniques
Cns 13f-lec03- Classical Encryption Techniques
 
Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network SecurityClassical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Security
 
Unit – III.pptx
Unit – III.pptxUnit – III.pptx
Unit – III.pptx
 
Cryptography and steganography lesson and discription.pptx
Cryptography and steganography lesson and discription.pptxCryptography and steganography lesson and discription.pptx
Cryptography and steganography lesson and discription.pptx
 
Cryptography and network security Nit701
Cryptography and network security Nit701Cryptography and network security Nit701
Cryptography and network security Nit701
 
Cryptography
CryptographyCryptography
Cryptography
 
security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.
security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.
security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.
 
Cryptography
CryptographyCryptography
Cryptography
 
4.Cryptography handout 2.pptx
4.Cryptography  handout 2.pptx4.Cryptography  handout 2.pptx
4.Cryptography handout 2.pptx
 
Symmetric Encryption Techniques
Symmetric Encryption Techniques Symmetric Encryption Techniques
Symmetric Encryption Techniques
 
Crypt
CryptCrypt
Crypt
 
CryptographyVsStegnoGraphy
CryptographyVsStegnoGraphy CryptographyVsStegnoGraphy
CryptographyVsStegnoGraphy
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
module 1 (part A).pdf
module 1 (part A).pdfmodule 1 (part A).pdf
module 1 (part A).pdf
 
cryptography symmentric.pptx
cryptography symmentric.pptxcryptography symmentric.pptx
cryptography symmentric.pptx
 
Cs166 mynote
Cs166 mynoteCs166 mynote
Cs166 mynote
 
basic encryption and decryption
 basic encryption and decryption basic encryption and decryption
basic encryption and decryption
 
Spring12_topic01.ppt
Spring12_topic01.pptSpring12_topic01.ppt
Spring12_topic01.ppt
 

Recently uploaded

急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
ShahulHameed54211
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
Himani415946
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
TristanJasperRamos
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 

Recently uploaded (16)

急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 

Fundamentals of cryptography workshop

  • 2. What is Cryptography ? “KRYPTO” “GRAPHENE” KRYPTO GRAPHENE SECRET WRITING
  • 3. Why do we need Cryptography? ORGANISATIONHITMAN KILL BELICOFF Channel
  • 5. HISTORY • 50 B.C. Julius Caesar uses cryptographic technique • 1250 British monk Roger Bacon describes simple ciphers • 1466 Leon Alberti develops a cipher disk • 1861 Union forces use a cipher during Civil War
  • 6. HISTORY • 1914 World War I – British, French, and German forces use encryption technology • 1917 William Friedman, Father of U.S. encryption efforts starts a school for teaching cryptanalysis in Illinois • 1917 AT&T employee Gilbert Vernam invents polyalphabetic cipher • 1919 Germans develop the Enigma machine for encryption
  • 7. HISTORY • 1937 Japanese design the Purple machine for encryption • 1942 Navajo windtalkers help with secure communication during World War II • 1948 Claude Shannon develops statistical methods for encryption/decryption • 1976 IBM develops DES • 1976 Diffie – Hellman develop public key / private key cryptography • 1977 Rivest – Shamir – Adleman develop the RSA algorithm for public key / private key
  • 8. Where do we use Cryptography ? Secure communication: • web traffic: HTTPS • wireless traffic: 802.11i WPA2 (and WEP), GSM, Bluetooth Encrypting files on disk: EFS, TrueCrypt Content protection (e.g. DVD, Blu-ray): CSS, AACS User authentication … and much much more
  • 10. PLAIN TEXT  Plaintext is a text , in natural readable form. It is the message or data before it gets encrypted. In simple words it is the original message.  It is sometimes called clear text . Plaintext is denoted by M (message) or P (plaintext).  It can be a stream of bits , a text file , a bitmap image, a stream of digitized voice etc. E.g.: ”Mission is a Go !!!”
  • 11. CIPHER TEXT  An encrypted message is called cipher text . It is denoted by C (cipher text).  Sometime it has the same size as the plaintext, sometimes larger than the plaintext.  It is the results obtained from the plaintext by applying the encryption algorithm on the plaintext.  Cipher text is unreadable by anyone except the intended recipients. E.g. :“jhbaiudcbew564kjb”
  • 12. ENCRYPTION  The process of disguising a message in such a way to hide its substance is called encryption.  It is the process of scrambling a message using a specialized cryptographic algorithm to make it unreadable by anyone except the intended recipients.  The encryption function E, operates on M to produce C. In mathematical notation E(M)=C
  • 13. Types of Encryption • SYMMETRIC KEY ENCRYPTION • PUBLIC KEY ENCRYPTION
  • 14. SYMMETRIC KEY ENCRYPTION • Symmetric encryption is the oldest and best- known technique. A secret key, which can be a number, a word, or just a string of random letters, is applied to the text of a message to change the content in a particular way. This might be as simple as shifting each letter by a number of places in the alphabet
  • 15. ASYMMETRIC KEY ENCRYPTION • Public-key encryption, in which a message is encrypted with a recipient's public key. The message cannot be decrypted by anyone who does not possess the matching private key, who is thus presumed to be the owner of that key and the person associated with the public key. This is used in an attempt to ensure confidentiality.
  • 19. CONCEPTS • A private key cipher is composed of two algorithms • encryption algorithm E • decryption algorithm D • The same key K is used for encryption & decryption • K has to be distributed beforehand
  • 20. NOTATIONS • Encrypt a plaintext P using a key K & an encryption algorithm E C = E(K,P) • Decrypt a cipher text C using the same key K and the matching decryption algorithm D P = D(K,C) • Note: P = D(K,C) = D(K, E(K,P))
  • 21. CAESAR CIPHER • The Caesar cipher is a substitution cipher, named after Julius Caesar. • Operation principle: each letter is translated into the letter a fixed number of positions after it in the alphabet table. • The fixed number of positions is a key both for encryption and decryption.
  • 22. CAESAR CIPHER The action of a Caesar cipher is to replace each plaintext letter with a different one a fixed number of places down the alphabet. The cipher illustrated here uses a shift of 3
  • 23. An Example • For a key K=3, plaintext letter: ABCDEF...UVWXYZ cipher text letter: DEF...UVWXYZABC • Hence TREATY IMPOSSIBLE is translated into WUHDWB LPSRVVLEOH
  • 24. ATTACKS • With the help of fast computers, 99.99% ciphers used before 1976 are breakable by using one of the 4 types of attacks (described later). • Modern cluster computers and future quantum computers can break several existing ciphers due to the power of such computers.
  • 25. ATTACKS ON CAESAR CIPHER • By using statistics on letters • frequency distributions of letters letter percent A 7.49% B 1.29% C 3.54% D 3.62% E 14.00% .................................. • By Brute Force attacks.
  • 26. SUMMARY • What is cryptography ? • Why do we need Cryptography ? • Types of Encryption ? • Notations • Fundamental Terms • Caesar Cipher • Attack on Caesar Cipher
  • 27. THE END ANY QUERIES ? Manojit Ballav Email: manojitballav@outlook.com Phone: 9352957266