SlideShare a Scribd company logo
A STUDY ON CRYPTORAPHIC
TECHNIQUES
GROUP1
Introduction
ā€¢ All works related to banking, ATM card, credit card, marketing, E-
commerce etc. are being done with the aid of internet. So there must
be protection provided over the network.
ā€¢ Therefore, to secure communication several cryptography techniques
are used. We apply these cryptographic techniques to sensitive
information in order to provide protection from an unauthorized
access.
Definition
ā€¢ Cryptography is the art of secret coding. The basic service provided by
cryptography is the ability to send the information between
participants in a way that prevents others reading it.
ā€¢ The main purpose of the cryptography is used not only to provide
confidentiality, but also to provide solutions for other problems like:
data integrity, authentication, non-repudiation.
ā€¢ The cryptographic technique and various algorithms are used to
ensure the application has the necessary security. Cryptography is the
science of both encryption and decryption.
Cont.
ā€¢ Cryptography is the science of both encryption and decryption.
ā€¢ Cryptography is a technique that masks the data over the channel of communication.
ā€¢ Hiding the data to outsiders is an art. Several schemes are used for secure
communication.
ā€¢ The cryptographic technique and various algorithms are used to ensure the application
has the necessary security.
ā€¢ Application of these cryptographic techniques to sensitive information in order to
provide protection from an unauthorized access. In cryptosystem, data are protected
via encryption method for keeping communication is private.
GOAL OF CRYPTOGRAPHY
Non-repudiation: It is the process of preventing the sender from refusing the
message being sent.
Authentication: It is the process of ensuring the identity of the users
connected in the network. It responds to the question ā€œWho can send the
messageā€.
Integrity: It is the process of securing the message from changes while in
transmission.
Cont.
Confidentiality: It is the process of assuring the intended users that no
middleman can view the content of the message. It responds to the
question ā€œwho can see the messageā€.
Availability: It is process of confirming the presentence of data in the
storage for future references.
Access control: It has a list of users with their rights to access the file.
Key terms
ā€¢ Plain text: Original message is known as plain text.
ā€¢ Cipher text: Coded message is known as cipher text.
ā€¢ Encryption: The process of converting the plain text to cipher text is known
as encryption.
ā€¢ Decryption: The process of restoring the plain text from the cipher text is
known as decryption.
ā€¢ Key: A secret like a password used to encrypt and decrypt information.
There are a few different types of keys used in cryptography.
ā€¢ Steganography: It is actually the science of hiding information from people
who would snoop on you.
SUBSTITUTION AND TRANSPOSITION TECHNIQUE
ā€¢ Substitution technique and Transposition technique are the types of
operation used for converting plain text into cipher text.
ā€¢ A substitution technique is one in which plain text letters are replaced with
other letters, numbers or symbols whereas In Transposition Technique the
plaintext letters perform some kind of permutation.
CRYPTOGRAPHIC TECHNIQUES
ā€¢ There are two basic information encryption techniques:
ā€¢ Symmetric encryption, which is also called secret key encryption, and
asymmetric encryption, also called public key encryption.
A. Symmetric-key cryptography: refers to methods of encryption, in which
the sender and the receiver share the same key. Symmetric key ciphers are
either used as block ciphers, or as stream ciphers.
Cont.
ā€¢ A block cipher enciphers the input type used by a stream cipher, in
plaintext blocks as opposed to individual characters. Symmetric
cryptography is much faster than asymmetric.
Cont.
ā€¢ This is the simplest method of encryption, requiring only one secret
key for ciphering and deciphering information.
ā€¢ Examples of symmetric encryption include:
ā€¢ DES(Data Encryption Standard )
ā€¢ TDES(Triple Data Encryption Standard ),
ā€¢ AES(Advanced Encryption Standard),
ā€¢ Blowfish, etc.
Cont.
ā€¢ Advanced Encryption Standard (AES)
ā€¢ AES is a variable bit block cipher that uses the 128, 192 and 256-bit
variable key range. If both the length of the block and the length of
the key are 128 bits, AES will do 10 rounds of processing.
ā€¢ If the block and key are 256-bit long then 14 processing rounds are
performed.
ā€¢ AES is a symmetrical block cipher capable of blocking size128bit,
128,192 and 256-bit cipher keys.
Cont.
ā€¢ DES(Data Encryption Standard )
ā€¢ This was the most commonly used standard worldwide.
ā€¢ It is a block cipher that encrypts a plaintext of 64 bits at a time and
uses 56 bit key. This was based on symmetric key algorithm which
means that both encryption and decryption will use the same key.
ā€¢ DES has 16 rounds, meaning that cipher text is generated using a total
of 16 processing steps on the plaintext input.
Cont.
ā€¢ First, 64 bit data is passed through the initial permutation phase and
then 16 processing rounds are performed
ā€¢ Finally the final permutation step is performed on the plain text input
which results in 64 bit cipher text.
ā€¢ The drawback of this algorithm is that by adding all possible
combinations it can be easily vulnerable to Brute Force Attack in
which the hacker tries to crack the key.
Cont.
ā€¢ Triple Des (TDES)
ā€¢ TDES uses DES encryption in three rounds and has a key length of 168
bits (56*3).
ā€¢ The Encrypt Decrypt-Encrypt (EDE) series uses either two or three 56
bit keys.
ā€¢ The drawback of this algorithm is that it consumes too much time
Cont.
Blowfish
ā€¢ Blowfish algorithm is the important form of symmetric key encryption
which has a block size of 64 bit and a key length variable of 32 bits to
448 bits in general.
ā€¢ It is based on a network of 16 round fiestel cipher, using the large key
size. The key size is bigger, as the code in the blowfish algorithm is
hard to break.
ā€¢ However, apart from the low main class attack, it is exposed to all of
the attacks.
Cont.
B. Asymmetric Encryption
ā€¢ Asymmetric key cryptography refers to methods of encryption, in which the
sender and the recipient share the same key.
ā€¢ Asymmetric Encryption is a relatively new and complex Encryption style.
Complex, because it uses two cryptographic keys for data security
implementation.
ā€¢ Asymmetric encryption is also known as public key cryptography, opposed to
symmetric encryption, which is a relatively new technique. For asymmetric
encryption, two keys are used to encrypt a plain text. Examples include RSA
and DH
RIVEST-SHAMIR-ADLEMANAND DH( DIFFIE-
HELLMAN) (RSA)
ā€¢ RSA is one of the first functional cryptosystems with a public key and is
commonly used for securedata transmission The encryption key is available in
such a cryptosystem, which varies from the decryption key that is kept secret.
ā€¢ Diffie-Hellman key exchange, also known as exponential key exchange, is a
digital encryption system that uses numbers raised to specific powers to
generate decryption keys based on components that are never transmitted
directly, thereby mathematically overcoming the task of a would-be code
breaker.
Conclusion
ā€¢ Cryptography is a very interesting field in computer science area
because the amount of work done is only kept secret.
ā€¢ There are various techniques and algorithm studied and different
types of research have been done.
ā€¢ The best algorithms are those which are well documented and well
known because the algorithms are well tested and well-studied.
References
ā€¢ International Journal of Scientific Research in Computer Science,
Engineering and Information Technology
ā€¢ ISSN : 2456-3307 (www.ijsrcseit.com) doi :
https://doi.org/10.32628/CSEIT206453
ā€¢ CSEIT172150 | Received: 20 Feb 2017 | Accepted: 28 Feb 2017 | January-
February-2017 [(2)1: 249-252] International Journal of Scientific Research
in Computer Science, Engineering and Information Technology Ā© 2017
IJSRCSEIT | Volume 2 | Issue 1 | ISSN : 2456-3307
ā€¢ https://www.academia.edu/33111881/Study_on_Cryptography_and_Tech
niques
ā€¢ International Journal of Innovative Research in Science,
Engineering and Technology(An ISO 3297: 2007 Certified Organization)Vol.
5, Issue 3, March 2016

More Related Content

Similar to groupWork.pptx

Lecture 5 - Cryptography.pptx
Lecture 5 - Cryptography.pptxLecture 5 - Cryptography.pptx
Lecture 5 - Cryptography.pptx
mustafaenayat
Ā 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
Pa Van Tanku
Ā 
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
Valerie Felton
Ā 
A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdf
Yasmine Anino
Ā 
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4  CRYPTOGRAPHIC SYSTEMS.pptxUNIT 4  CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
ssuserd5e356
Ā 
Overview on Symmetric Key Encryption Algorithms
Overview on Symmetric Key Encryption AlgorithmsOverview on Symmetric Key Encryption Algorithms
Overview on Symmetric Key Encryption Algorithms
IJERA Editor
Ā 
information technology cryptography Msc chapter 1-4.pdf
information technology  cryptography Msc chapter 1-4.pdfinformation technology  cryptography Msc chapter 1-4.pdf
information technology cryptography Msc chapter 1-4.pdf
wondimagegndesta
Ā 
chapter 1-4.pdf
chapter 1-4.pdfchapter 1-4.pdf
chapter 1-4.pdf
zerihunnana
Ā 
Chapter 2 part 1.ppt
Chapter 2 part 1.pptChapter 2 part 1.ppt
Chapter 2 part 1.ppt
MikiAbera
Ā 
Introduction to cryptography part1-final
Introduction to cryptography  part1-finalIntroduction to cryptography  part1-final
Introduction to cryptography part1-final
Taymoor Nazmy
Ā 
Cryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding informationCryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding information
Bitcoin Association of Australia
Ā 
Evolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniquesEvolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniques
Mona Rajput
Ā 
Cryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptxCryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptx
SamiDan3
Ā 
Enhancing lan using cryptography and other modules
Enhancing lan using cryptography and other modulesEnhancing lan using cryptography and other modules
Enhancing lan using cryptography and other modules
Murali Krishna
Ā 
Seminar on Encryption and Authenticity
Seminar on Encryption and AuthenticitySeminar on Encryption and Authenticity
Seminar on Encryption and Authenticity
Hardik Manocha
Ā 
Cryptography
CryptographyCryptography
Cryptography
Sourabh Badve
Ā 
Cryptography by manisha jha
Cryptography by manisha jhaCryptography by manisha jha
Cryptography by manisha jha
ManishaJha43
Ā 
Symmetric ciphermodel
Symmetric ciphermodelSymmetric ciphermodel
Symmetric ciphermodel
priyapavi96
Ā 
Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmImplementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithm
eSAT Publishing House
Ā 

Similar to groupWork.pptx (20)

Lecture 5 - Cryptography.pptx
Lecture 5 - Cryptography.pptxLecture 5 - Cryptography.pptx
Lecture 5 - Cryptography.pptx
Ā 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
Ā 
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
Ā 
A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdf
Ā 
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4  CRYPTOGRAPHIC SYSTEMS.pptxUNIT 4  CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
Ā 
Overview on Symmetric Key Encryption Algorithms
Overview on Symmetric Key Encryption AlgorithmsOverview on Symmetric Key Encryption Algorithms
Overview on Symmetric Key Encryption Algorithms
Ā 
information technology cryptography Msc chapter 1-4.pdf
information technology  cryptography Msc chapter 1-4.pdfinformation technology  cryptography Msc chapter 1-4.pdf
information technology cryptography Msc chapter 1-4.pdf
Ā 
chapter 1-4.pdf
chapter 1-4.pdfchapter 1-4.pdf
chapter 1-4.pdf
Ā 
Chapter 2 part 1.ppt
Chapter 2 part 1.pptChapter 2 part 1.ppt
Chapter 2 part 1.ppt
Ā 
Introduction to cryptography part1-final
Introduction to cryptography  part1-finalIntroduction to cryptography  part1-final
Introduction to cryptography part1-final
Ā 
Cryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding informationCryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding information
Ā 
Evolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniquesEvolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniques
Ā 
Cryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptxCryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptx
Ā 
Security
SecuritySecurity
Security
Ā 
Enhancing lan using cryptography and other modules
Enhancing lan using cryptography and other modulesEnhancing lan using cryptography and other modules
Enhancing lan using cryptography and other modules
Ā 
Seminar on Encryption and Authenticity
Seminar on Encryption and AuthenticitySeminar on Encryption and Authenticity
Seminar on Encryption and Authenticity
Ā 
Cryptography
CryptographyCryptography
Cryptography
Ā 
Cryptography by manisha jha
Cryptography by manisha jhaCryptography by manisha jha
Cryptography by manisha jha
Ā 
Symmetric ciphermodel
Symmetric ciphermodelSymmetric ciphermodel
Symmetric ciphermodel
Ā 
Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmImplementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithm
Ā 

Recently uploaded

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
Ā 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
Ā 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
Ā 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
Ā 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
Ā 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
Ā 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
Ā 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
Ā 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
Ā 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
Ā 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
Ā 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
Ā 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
Ā 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
Ā 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
Ā 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
Ā 
Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
UiPathCommunity
Ā 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
Ā 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
Ā 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
Ā 

Recently uploaded (20)

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Ā 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
Ā 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Ā 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
Ā 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Ā 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
Ā 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Ā 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
Ā 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Ā 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
Ā 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Ā 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Ā 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Ā 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Ā 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Ā 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Ā 
Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
Ā 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
Ā 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Ā 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Ā 

groupWork.pptx

  • 1. A STUDY ON CRYPTORAPHIC TECHNIQUES GROUP1
  • 2. Introduction ā€¢ All works related to banking, ATM card, credit card, marketing, E- commerce etc. are being done with the aid of internet. So there must be protection provided over the network. ā€¢ Therefore, to secure communication several cryptography techniques are used. We apply these cryptographic techniques to sensitive information in order to provide protection from an unauthorized access.
  • 3. Definition ā€¢ Cryptography is the art of secret coding. The basic service provided by cryptography is the ability to send the information between participants in a way that prevents others reading it. ā€¢ The main purpose of the cryptography is used not only to provide confidentiality, but also to provide solutions for other problems like: data integrity, authentication, non-repudiation. ā€¢ The cryptographic technique and various algorithms are used to ensure the application has the necessary security. Cryptography is the science of both encryption and decryption.
  • 4. Cont. ā€¢ Cryptography is the science of both encryption and decryption. ā€¢ Cryptography is a technique that masks the data over the channel of communication. ā€¢ Hiding the data to outsiders is an art. Several schemes are used for secure communication. ā€¢ The cryptographic technique and various algorithms are used to ensure the application has the necessary security. ā€¢ Application of these cryptographic techniques to sensitive information in order to provide protection from an unauthorized access. In cryptosystem, data are protected via encryption method for keeping communication is private.
  • 5. GOAL OF CRYPTOGRAPHY Non-repudiation: It is the process of preventing the sender from refusing the message being sent. Authentication: It is the process of ensuring the identity of the users connected in the network. It responds to the question ā€œWho can send the messageā€. Integrity: It is the process of securing the message from changes while in transmission.
  • 6. Cont. Confidentiality: It is the process of assuring the intended users that no middleman can view the content of the message. It responds to the question ā€œwho can see the messageā€. Availability: It is process of confirming the presentence of data in the storage for future references. Access control: It has a list of users with their rights to access the file.
  • 7. Key terms ā€¢ Plain text: Original message is known as plain text. ā€¢ Cipher text: Coded message is known as cipher text. ā€¢ Encryption: The process of converting the plain text to cipher text is known as encryption. ā€¢ Decryption: The process of restoring the plain text from the cipher text is known as decryption. ā€¢ Key: A secret like a password used to encrypt and decrypt information. There are a few different types of keys used in cryptography. ā€¢ Steganography: It is actually the science of hiding information from people who would snoop on you.
  • 8. SUBSTITUTION AND TRANSPOSITION TECHNIQUE ā€¢ Substitution technique and Transposition technique are the types of operation used for converting plain text into cipher text. ā€¢ A substitution technique is one in which plain text letters are replaced with other letters, numbers or symbols whereas In Transposition Technique the plaintext letters perform some kind of permutation.
  • 9. CRYPTOGRAPHIC TECHNIQUES ā€¢ There are two basic information encryption techniques: ā€¢ Symmetric encryption, which is also called secret key encryption, and asymmetric encryption, also called public key encryption. A. Symmetric-key cryptography: refers to methods of encryption, in which the sender and the receiver share the same key. Symmetric key ciphers are either used as block ciphers, or as stream ciphers.
  • 10. Cont. ā€¢ A block cipher enciphers the input type used by a stream cipher, in plaintext blocks as opposed to individual characters. Symmetric cryptography is much faster than asymmetric.
  • 11. Cont. ā€¢ This is the simplest method of encryption, requiring only one secret key for ciphering and deciphering information. ā€¢ Examples of symmetric encryption include: ā€¢ DES(Data Encryption Standard ) ā€¢ TDES(Triple Data Encryption Standard ), ā€¢ AES(Advanced Encryption Standard), ā€¢ Blowfish, etc.
  • 12. Cont. ā€¢ Advanced Encryption Standard (AES) ā€¢ AES is a variable bit block cipher that uses the 128, 192 and 256-bit variable key range. If both the length of the block and the length of the key are 128 bits, AES will do 10 rounds of processing. ā€¢ If the block and key are 256-bit long then 14 processing rounds are performed. ā€¢ AES is a symmetrical block cipher capable of blocking size128bit, 128,192 and 256-bit cipher keys.
  • 13. Cont. ā€¢ DES(Data Encryption Standard ) ā€¢ This was the most commonly used standard worldwide. ā€¢ It is a block cipher that encrypts a plaintext of 64 bits at a time and uses 56 bit key. This was based on symmetric key algorithm which means that both encryption and decryption will use the same key. ā€¢ DES has 16 rounds, meaning that cipher text is generated using a total of 16 processing steps on the plaintext input.
  • 14. Cont. ā€¢ First, 64 bit data is passed through the initial permutation phase and then 16 processing rounds are performed ā€¢ Finally the final permutation step is performed on the plain text input which results in 64 bit cipher text. ā€¢ The drawback of this algorithm is that by adding all possible combinations it can be easily vulnerable to Brute Force Attack in which the hacker tries to crack the key.
  • 15. Cont. ā€¢ Triple Des (TDES) ā€¢ TDES uses DES encryption in three rounds and has a key length of 168 bits (56*3). ā€¢ The Encrypt Decrypt-Encrypt (EDE) series uses either two or three 56 bit keys. ā€¢ The drawback of this algorithm is that it consumes too much time
  • 16. Cont. Blowfish ā€¢ Blowfish algorithm is the important form of symmetric key encryption which has a block size of 64 bit and a key length variable of 32 bits to 448 bits in general. ā€¢ It is based on a network of 16 round fiestel cipher, using the large key size. The key size is bigger, as the code in the blowfish algorithm is hard to break. ā€¢ However, apart from the low main class attack, it is exposed to all of the attacks.
  • 17. Cont. B. Asymmetric Encryption ā€¢ Asymmetric key cryptography refers to methods of encryption, in which the sender and the recipient share the same key. ā€¢ Asymmetric Encryption is a relatively new and complex Encryption style. Complex, because it uses two cryptographic keys for data security implementation. ā€¢ Asymmetric encryption is also known as public key cryptography, opposed to symmetric encryption, which is a relatively new technique. For asymmetric encryption, two keys are used to encrypt a plain text. Examples include RSA and DH
  • 18. RIVEST-SHAMIR-ADLEMANAND DH( DIFFIE- HELLMAN) (RSA) ā€¢ RSA is one of the first functional cryptosystems with a public key and is commonly used for securedata transmission The encryption key is available in such a cryptosystem, which varies from the decryption key that is kept secret. ā€¢ Diffie-Hellman key exchange, also known as exponential key exchange, is a digital encryption system that uses numbers raised to specific powers to generate decryption keys based on components that are never transmitted directly, thereby mathematically overcoming the task of a would-be code breaker.
  • 19. Conclusion ā€¢ Cryptography is a very interesting field in computer science area because the amount of work done is only kept secret. ā€¢ There are various techniques and algorithm studied and different types of research have been done. ā€¢ The best algorithms are those which are well documented and well known because the algorithms are well tested and well-studied.
  • 20. References ā€¢ International Journal of Scientific Research in Computer Science, Engineering and Information Technology ā€¢ ISSN : 2456-3307 (www.ijsrcseit.com) doi : https://doi.org/10.32628/CSEIT206453 ā€¢ CSEIT172150 | Received: 20 Feb 2017 | Accepted: 28 Feb 2017 | January- February-2017 [(2)1: 249-252] International Journal of Scientific Research in Computer Science, Engineering and Information Technology Ā© 2017 IJSRCSEIT | Volume 2 | Issue 1 | ISSN : 2456-3307 ā€¢ https://www.academia.edu/33111881/Study_on_Cryptography_and_Tech niques ā€¢ International Journal of Innovative Research in Science, Engineering and Technology(An ISO 3297: 2007 Certified Organization)Vol. 5, Issue 3, March 2016