SlideShare a Scribd company logo
Introduction to Crytographic Techniques
What is Cryptography?
- Cryptography is the science of keeping oral and written as well as other forms of
communications secret.
- Cryptography provides a means of authentication of communicating parties.
- Cryptography is the study of codes and ciphers for use in secret transmission of
messages from a sender to a recipient.
- Cryptology is composed of crytography - the art and science of keeping messages
secure.
- Cryptographic algorithms --> methods for transforming plaintext messages into
ciphertext.
- Secret key cryptography (or symmetrical)
- Public key cryptography (or asymmetrical)
By:Shehrevar DavierwalaBy:Shehrevar Davierwala
In cryptographics, a message in human readable form is
referred to plaintext or cleartext.
Encryption:Encryption refers to a process which disguises a
cleartext message to hide its substance and generates a
message, known as ciphertext.Plaintext is denoted by P,
whereas ciphertext is denoted by C.
The encryption function E operates on P to produce C based
on a key value K:
E k (P) = C
Encryption and Decryption
Encryption
Key
Plaintex
t
Ciphtex
t
By:Shehrevar DavierwalaBy:Shehrevar Davierwala
Encryption and Decryption
Decryption:
The reverse process of encryption is known as a decryption,
in which a cihhertext is converted back to its original cleartext form.
In the reverse process, the decryption function D operates on C to produce
P
based on a key value K:
D k (C) = P
Decryption
Key
Ciphertex
t
Plaintex
t
By:Shehrevar DavierwalaBy:Shehrevar Davierwala
Simple Encryption System
Encryption
Encryption
Key(s)
Ciphertex
tPlaintex
t
Decryption
Decryption
Key(s)
Plainrtex
t
Cryptography is both the lock and the combination (or keys) that helps us protect
our
communication data and transformation messages.
There are varieties of locks, there are varieties of crytographic methods and keys.
Two limits of Encryption:
- it cannot protect data on a computer
- it can no better than the weakest link.
By:Shehrevar DavierwalaBy:Shehrevar Davierwala
Different Types of Cryptography Methods
Transposition Ciphers:
In transposition ciphers, the letters of the message to be secretly transmitted are scrambled,
that is, rewritten in a pattern way, and is then sent in a different order from its original
form..
N O W - I S - T H E - T I M E
F O R - A L L - G O O D - M E
N - T O - C O M E - T O - T H
E - A I D - O F - T H E I R -
P A R T I E S - S T O P Z Z Z
would be transmitted as:
NFNEP OO - A WRTAR - OIT IA - DI SLC-E-LOOS T - ME - HE - S
EO - TT - OTHO TDOEP I - IZ MMTRZ EEH-Z
By:Shehrevar DavierwalaBy:Shehrevar Davierwala
Different Types of Cryptography Methods
Transposition Ciphers:
In transposition ciphers, the letters of the message to be secretly transmitted are scrambled,
that is, rewritten in a pattern way, and is then sent in a different order from its original
form..
Key word: C O M P U T E R
Letter order: 1 4 3 5 8 7 2 6
M E E T M E A T
T H E F R O N T
D O O R O F T H
H I L T O N H O
T E L A T 9 P M
would be transmitted as:
MTDHT ANTHP EEOLL EHOIE TFRTA TTHOM EOFN9 MROOT
By:Shehrevar DavierwalaBy:Shehrevar Davierwala
Different Types of Cryptography Methods
Substitution Ciphers:
Substitution ciphers are created by replacing one symbol, such as a letter of a
message,
with another symbol or letter in some patterned way.
Let’s assume that we have a replacement letter pattern as follows:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
D E F G H I J K L M N O P Q R S T U V W X Y X A B C
Plaintext: NOW IS THE TIME FOR ALL GOOD PEOPLE TO COME TO THE
Ciphertext: KLT FP QEB QFJB CLO XII DLLA MBLMIB QL ZLIB QL QEB
More complex symbol replancement pattern can be applied.
By:Shehrevar DavierwalaBy:Shehrevar Davierwala
Different Types of Cryptography Methods
Product Ciphers:
Product ciphers are created by using substitution and transposition together.
Current Data Encryption Standard (3DES) and Rijndael ( The Advanced Encryption
Standard. Winner) use multiple combinations of transposition and substitution to
achieve
superior cryptosecurity.
Although this approach become more complex and secure than the previous two,
they could be attacked using statistical methods.
Ideally, ciphertext could present itself as a random string of letters of bits or be data key-
stroked by a monkey.
Diffusion is defined as the dispersion or distribution of plaintext in a statistically
random
manner over the ciphertext.
The principle of confusion prevents the cryptanalyst from using the ciphertext to deduce
the secret key. It may take the form of a complex substitution method. Confusion hides
the relationship between ciphertext and the secret key.
By:Shehrevar DavierwalaBy:Shehrevar Davierwala
Symmetric Encryption
Symmetric encryption (secret-key encryption, or single-key encryption):
Secret-key encryption refers to the use of a shared key for both encryption
by
the transmitter and decryption by the receiver.
Work step:
- Sender sends a message after encryption with a secret-key.
- Receiver decrypt the message with the same secret key after receiving it.
Inter
net
Anne
sends a
message
Bob
receives
Anne’s
message
Encrypt
with a
secret key
Decrypt
with a
secret key
Encrypted
Message
Encrypted
Message
By:Shehrevar DavierwalaBy:Shehrevar Davierwala
Symmetric Encryption
Special features of symmetric encryption:
- Two communication parties use and share the same key.
- Encryption and decryption is carried out based on the same key.
- Both parties must agree on the secret key before communications.
Advantages:
- Useful in many cases which only involves two-party
communications.
Problems and limitations:
- Complex in key distribution (key generation, transmission, and storage).
- Not scalable.
- Impractical to support large group of communications in networks.
- Impossible to support exchanging messages with a large group of previously
unknown parties over a public open network.
Example: DES (the Data Encryption Standard)
By:Shehrevar DavierwalaBy:Shehrevar Davierwala
Asymmetric Encryption
Asymmetric encryption (public-key encryption):
Public-key encryption (asymmetric encryption) use a pair of keys for each party.
- One key is known as a “public key”, which is known to other parties.
- One key is known as a “private key” or a “secret key”, which must be confidential,
and is known only to its owner.
- The public key encrypts the message.
- The private key decrypts the message.
Inter
net
Anne
sends a
message
Bob
receives
Anne’s
message
Encrypt
with a
public key
PK(Bob)
Decrypt
with Bob’
private key
SK(Bob)
Scramble
d
Message
Scramble
d
Message
By:Shehrevar DavierwalaBy:Shehrevar Davierwala
Asymmetric Encryption
Special features of asymmetric encryption (public-key encryption):
SK(PK(M)) = M
Advantages:
- Easy to key distribution (key generation, maintain and storage)
- Scalable to support large group of users in an public network
- Easy to support unknown users since no previous consent is needed.
- Better protection than symmetric encryption.
Problems and limitations:
- Slow performance
Applications: E-commerce, snoop-proof email system.
Standards: the best known public-key encryption algorithm --> RSA
By:Shehrevar DavierwalaBy:Shehrevar Davierwala
, Sh
RSA Algorithm
The RSA algorithm was developed by Rivest, Shamir, and Adleman at MIT in 1978.
The basic algorithm is outlined below:
1: Choose two large distinct primes, p and q.
2: Compute the product (modulus) n = pq.
3: Randomly choose encryption key e, such that e and (p-1)(q-1) are relatively
prime.
4: Finally use Euclid’s algorithm to compute the decryption key, d such that
e . d = 1 (mod (p-1) . (q -1)).
Where, d and n are relatively prime. e and n are the public key. d is the secret key.
To encrypt a message M, e
C = M mod n
To decrypt C,
d
M = C mod n
By:Shehrevar DavierwalaBy:Shehrevar Davierwala
Comparing Symmetric Encryption and Asymmetric Encryption
Features Secret-Key Encryption Public-Key Encryption
No. of keys Single Key Public Key and Secret Key
Application Bulk data encryption Key exchange, digital signatures
Key Management Simple but difficult to Need digital certificates
manage and trusted third parties
Performance Fast Slower
Key exchange difficult and risk to Easy and less risky to deliver
transfer a secret key a public key.
Key Length 56-bit (old) 1024 bit (RSA)
126-bit (safe) Many used 2048 bits
Standards DES, Triple DES RSA, Diffie-Hellman
Rijndael DSA, Elliptic curves
By:Shehrevar DavierwalaBy:Shehrevar Davierwala
Comparing Symmetric Encryption and Asymmetric Encryption
Features Secret-Key Encryption Public-Key Encryption
Years in use over 1000 years less than 50 years
Types of keys Secret Key only One Public Key and
one Private Key
Confidentiality Yes Yes
Authentication Yes Yes
Message integrity Yes Yes
No-repudiation No Yes
Don’t need trustedDigital signatures:
third party need trusted third party
Attack Simple but difficult to Need digital certificates
manage and trusted third parties
By:Shehrevar DavierwalaBy:Shehrevar Davierwala
Digital Signatures
What is a digital signature?
- Digital signatures are implemented using public-key encryption.
- A digital signature is a cryptographic mechanism that performs a similar function
to a written signature.
- Created using PPK cryptograph and message digests.
Encryption allows a message
sender the ability to digitally sign messages, thus creating a digital signature for the
message. When a message digest is computed and then encrypted using the sender’s
private key, and later append to the message, the result is called the digital signature
of the message.
By:Shehrevar DavierwalaBy:Shehrevar Davierwala
Digital Signatures
Purposes:
Digital signatures are used to ensure the integrity and authentication.
-- To verify the origin and contents of a message.
-- Digital signatures are used for sender authentication.
Why digital signatures?
- Public-key algorithms are computation-intensive. With large messages they may be
too expensive or too slow for the application.
- Digital signatures based on digested message provide alternative solutions.
Application:
Digital signatures can be used to endorse an electronic document in a
way that can be later validated for authenticity.
By:Shehrevar DavierwalaBy:Shehrevar Davierwala
Generating A Digital Signature
Message
MessageSignature
Message Digest
Encrypt
Hashing
Algorithm
Sender’s
Private Key
(SK
sender)
To Receiver
By:Shehrevar DavierwalaBy:Shehrevar Davierwala

More Related Content

What's hot

Topic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesTopic1 substitution transposition-techniques
Topic1 substitution transposition-techniques
MdFazleRabbi18
 
basic encryption and decryption
 basic encryption and decryption basic encryption and decryption
basic encryption and decryption
Rashmi Burugupalli
 
Basic cryptography
Basic cryptographyBasic cryptography
Basic cryptography
Perfect Training Center
 
Cryptography
CryptographyCryptography
Cryptography
Jens Patel
 
Cryptography
CryptographyCryptography
Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)
Anas Rock
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
Fabiha Shahzad
 
Internal & External Attacks in cloud computing Environment from confidentiali...
Internal & External Attacks in cloud computing Environment from confidentiali...Internal & External Attacks in cloud computing Environment from confidentiali...
Internal & External Attacks in cloud computing Environment from confidentiali...
iosrjce
 
What is AES? Advanced Encryption Standards
What is AES? Advanced Encryption StandardsWhat is AES? Advanced Encryption Standards
What is AES? Advanced Encryption Standards
Faisal Shahzad Khan
 
Ceh v5 module 05 system hacking
Ceh v5 module 05 system hackingCeh v5 module 05 system hacking
Ceh v5 module 05 system hacking
Vi Tính Hoàng Nam
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
 
Ch04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and AttacksCh04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and Attacks
Information Technology
 
Hash Function
Hash FunctionHash Function
Hash Function
Siddharth Srivastava
 
Cryptography - 101
Cryptography - 101Cryptography - 101
Applied Cryptography
Applied CryptographyApplied Cryptography
Applied Cryptography
Marcelo Martins
 
Cryptography
CryptographyCryptography
Cryptography
Dipti Sakpal
 
AES Abstract
AES AbstractAES Abstract
AES Abstract
SathrukaSinha
 
Cs8792 cns - unit i
Cs8792   cns - unit iCs8792   cns - unit i
Cs8792 cns - unit i
ArthyR3
 

What's hot (20)

Topic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesTopic1 substitution transposition-techniques
Topic1 substitution transposition-techniques
 
Ch07
Ch07Ch07
Ch07
 
basic encryption and decryption
 basic encryption and decryption basic encryption and decryption
basic encryption and decryption
 
Basic cryptography
Basic cryptographyBasic cryptography
Basic cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)
 
DES
DESDES
DES
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Internal & External Attacks in cloud computing Environment from confidentiali...
Internal & External Attacks in cloud computing Environment from confidentiali...Internal & External Attacks in cloud computing Environment from confidentiali...
Internal & External Attacks in cloud computing Environment from confidentiali...
 
What is AES? Advanced Encryption Standards
What is AES? Advanced Encryption StandardsWhat is AES? Advanced Encryption Standards
What is AES? Advanced Encryption Standards
 
Ceh v5 module 05 system hacking
Ceh v5 module 05 system hackingCeh v5 module 05 system hacking
Ceh v5 module 05 system hacking
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
Ch04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and AttacksCh04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and Attacks
 
Hash Function
Hash FunctionHash Function
Hash Function
 
Cryptography - 101
Cryptography - 101Cryptography - 101
Cryptography - 101
 
Applied Cryptography
Applied CryptographyApplied Cryptography
Applied Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
AES Abstract
AES AbstractAES Abstract
AES Abstract
 
Cs8792 cns - unit i
Cs8792   cns - unit iCs8792   cns - unit i
Cs8792 cns - unit i
 

Viewers also liked

numbers system
numbers systemnumbers system
numbers system
Shehrevar Davierwala
 
Tech talk php_cms
Tech talk php_cmsTech talk php_cms
Tech talk php_cms
Shehrevar Davierwala
 
Tech talk webtech
Tech talk webtechTech talk webtech
Tech talk webtech
Shehrevar Davierwala
 

Viewers also liked (9)

C# chap 4
C# chap 4C# chap 4
C# chap 4
 
C# chap 2
C# chap 2C# chap 2
C# chap 2
 
C# programs
C# programsC# programs
C# programs
 
What is this
What is thisWhat is this
What is this
 
Wireless lan
Wireless lanWireless lan
Wireless lan
 
numbers system
numbers systemnumbers system
numbers system
 
Jstreams
JstreamsJstreams
Jstreams
 
Tech talk php_cms
Tech talk php_cmsTech talk php_cms
Tech talk php_cms
 
Tech talk webtech
Tech talk webtechTech talk webtech
Tech talk webtech
 

Similar to Is case study

Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overview
ppd1961
 
Encryption
EncryptionEncryption
Encryption
Naiyan Noor
 
Ch12 Encryption
Ch12 EncryptionCh12 Encryption
Ch12 Encryptionphanleson
 
Cryptography
CryptographyCryptography
Cryptography
subodh pawar
 
Cryptography
CryptographyCryptography
Cryptography
Vicky Kamboj
 
security system by desu star chapter 2 (1).pptx
security system by desu star chapter 2 (1).pptxsecurity system by desu star chapter 2 (1).pptx
security system by desu star chapter 2 (1).pptx
desalewminale
 
cryptography
cryptographycryptography
cryptography
swatihans
 
Cryptography
CryptographyCryptography
CryptographyRohan04
 
Cryptography - Overview
Cryptography - OverviewCryptography - Overview
Cryptography - Overview
Mohammed Adam
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01
Saif Kassim
 
Introduction To PKI Technology
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI Technology
Sylvain Maret
 
Caesar cipher
Caesar cipherCaesar cipher
Caesar cipher
Technical Hub
 
Network security and cryptography
Network security and cryptographyNetwork security and cryptography
Network security and cryptography
Pavithra renu
 
Cryptography
CryptographyCryptography
Cryptography
Sandip kumar
 
Cryptography
CryptographyCryptography
Cryptography
Shivshankar Prajapati
 
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.pptCRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
PayalChopra9
 

Similar to Is case study (20)

Cryptography
Cryptography Cryptography
Cryptography
 
Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overview
 
Encryption
EncryptionEncryption
Encryption
 
Ch12 Encryption
Ch12 EncryptionCh12 Encryption
Ch12 Encryption
 
Crypt
CryptCrypt
Crypt
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
security system by desu star chapter 2 (1).pptx
security system by desu star chapter 2 (1).pptxsecurity system by desu star chapter 2 (1).pptx
security system by desu star chapter 2 (1).pptx
 
cryptography
cryptographycryptography
cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography - Overview
Cryptography - OverviewCryptography - Overview
Cryptography - Overview
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01
 
Introduction To PKI Technology
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI Technology
 
Caesar cipher
Caesar cipherCaesar cipher
Caesar cipher
 
Cryptography
CryptographyCryptography
Cryptography
 
Network security and cryptography
Network security and cryptographyNetwork security and cryptography
Network security and cryptography
 
What is Encryption
What is EncryptionWhat is Encryption
What is Encryption
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.pptCRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
 

More from Shehrevar Davierwala

Introduction_Swift
Introduction_SwiftIntroduction_Swift
Introduction_Swift
Shehrevar Davierwala
 
PsudoCode.pptx
PsudoCode.pptxPsudoCode.pptx
PsudoCode.pptx
Shehrevar Davierwala
 
Number System.pptx
Number System.pptxNumber System.pptx
Number System.pptx
Shehrevar Davierwala
 
Java Script (Module 1).pptx
Java Script (Module 1).pptxJava Script (Module 1).pptx
Java Script (Module 1).pptx
Shehrevar Davierwala
 
Website in Clicks Day 2
Website in Clicks Day 2Website in Clicks Day 2
Website in Clicks Day 2
Shehrevar Davierwala
 
Develop Website in Clicks
Develop Website in ClicksDevelop Website in Clicks
Develop Website in Clicks
Shehrevar Davierwala
 
Build Virtual Assistant Using AI
Build Virtual Assistant Using AI Build Virtual Assistant Using AI
Build Virtual Assistant Using AI
Shehrevar Davierwala
 
Build brand reputation using facebook
Build brand reputation using facebookBuild brand reputation using facebook
Build brand reputation using facebook
Shehrevar Davierwala
 
Digital Marketing Session 2
Digital Marketing Session 2Digital Marketing Session 2
Digital Marketing Session 2
Shehrevar Davierwala
 
Learn Digital Marketing : 0 to Hero Day 1
Learn Digital Marketing :  0 to Hero Day 1 Learn Digital Marketing :  0 to Hero Day 1
Learn Digital Marketing : 0 to Hero Day 1
Shehrevar Davierwala
 
Standard template
Standard templateStandard template
Standard template
Shehrevar Davierwala
 
Digital Marketing for Sustainable Business - Afghan Perspective
Digital Marketing for Sustainable Business - Afghan Perspective  Digital Marketing for Sustainable Business - Afghan Perspective
Digital Marketing for Sustainable Business - Afghan Perspective
Shehrevar Davierwala
 
Developing stunning website in clicks - 2
Developing stunning website in clicks - 2Developing stunning website in clicks - 2
Developing stunning website in clicks - 2
Shehrevar Davierwala
 
Developing stunning website in clicks
Developing stunning website in clicksDeveloping stunning website in clicks
Developing stunning website in clicks
Shehrevar Davierwala
 
Google forms for data analysis
Google forms for data analysisGoogle forms for data analysis
Google forms for data analysis
Shehrevar Davierwala
 
Webdesign session1
Webdesign session1Webdesign session1
Webdesign session1
Shehrevar Davierwala
 
Ph pbasics
Ph pbasicsPh pbasics
Php mysql
Php mysqlPhp mysql
Java operators
Java operatorsJava operators
Java operators
Shehrevar Davierwala
 
Basic
BasicBasic

More from Shehrevar Davierwala (20)

Introduction_Swift
Introduction_SwiftIntroduction_Swift
Introduction_Swift
 
PsudoCode.pptx
PsudoCode.pptxPsudoCode.pptx
PsudoCode.pptx
 
Number System.pptx
Number System.pptxNumber System.pptx
Number System.pptx
 
Java Script (Module 1).pptx
Java Script (Module 1).pptxJava Script (Module 1).pptx
Java Script (Module 1).pptx
 
Website in Clicks Day 2
Website in Clicks Day 2Website in Clicks Day 2
Website in Clicks Day 2
 
Develop Website in Clicks
Develop Website in ClicksDevelop Website in Clicks
Develop Website in Clicks
 
Build Virtual Assistant Using AI
Build Virtual Assistant Using AI Build Virtual Assistant Using AI
Build Virtual Assistant Using AI
 
Build brand reputation using facebook
Build brand reputation using facebookBuild brand reputation using facebook
Build brand reputation using facebook
 
Digital Marketing Session 2
Digital Marketing Session 2Digital Marketing Session 2
Digital Marketing Session 2
 
Learn Digital Marketing : 0 to Hero Day 1
Learn Digital Marketing :  0 to Hero Day 1 Learn Digital Marketing :  0 to Hero Day 1
Learn Digital Marketing : 0 to Hero Day 1
 
Standard template
Standard templateStandard template
Standard template
 
Digital Marketing for Sustainable Business - Afghan Perspective
Digital Marketing for Sustainable Business - Afghan Perspective  Digital Marketing for Sustainable Business - Afghan Perspective
Digital Marketing for Sustainable Business - Afghan Perspective
 
Developing stunning website in clicks - 2
Developing stunning website in clicks - 2Developing stunning website in clicks - 2
Developing stunning website in clicks - 2
 
Developing stunning website in clicks
Developing stunning website in clicksDeveloping stunning website in clicks
Developing stunning website in clicks
 
Google forms for data analysis
Google forms for data analysisGoogle forms for data analysis
Google forms for data analysis
 
Webdesign session1
Webdesign session1Webdesign session1
Webdesign session1
 
Ph pbasics
Ph pbasicsPh pbasics
Ph pbasics
 
Php mysql
Php mysqlPhp mysql
Php mysql
 
Java operators
Java operatorsJava operators
Java operators
 
Basic
BasicBasic
Basic
 

Recently uploaded

Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
Nguyen Thanh Tu Collection
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
PedroFerreira53928
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
PedroFerreira53928
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
Excellence Foundation for South Sudan
 

Recently uploaded (20)

Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 

Is case study

  • 1. Introduction to Crytographic Techniques What is Cryptography? - Cryptography is the science of keeping oral and written as well as other forms of communications secret. - Cryptography provides a means of authentication of communicating parties. - Cryptography is the study of codes and ciphers for use in secret transmission of messages from a sender to a recipient. - Cryptology is composed of crytography - the art and science of keeping messages secure. - Cryptographic algorithms --> methods for transforming plaintext messages into ciphertext. - Secret key cryptography (or symmetrical) - Public key cryptography (or asymmetrical) By:Shehrevar DavierwalaBy:Shehrevar Davierwala
  • 2. In cryptographics, a message in human readable form is referred to plaintext or cleartext. Encryption:Encryption refers to a process which disguises a cleartext message to hide its substance and generates a message, known as ciphertext.Plaintext is denoted by P, whereas ciphertext is denoted by C. The encryption function E operates on P to produce C based on a key value K: E k (P) = C Encryption and Decryption Encryption Key Plaintex t Ciphtex t By:Shehrevar DavierwalaBy:Shehrevar Davierwala
  • 3. Encryption and Decryption Decryption: The reverse process of encryption is known as a decryption, in which a cihhertext is converted back to its original cleartext form. In the reverse process, the decryption function D operates on C to produce P based on a key value K: D k (C) = P Decryption Key Ciphertex t Plaintex t By:Shehrevar DavierwalaBy:Shehrevar Davierwala
  • 4. Simple Encryption System Encryption Encryption Key(s) Ciphertex tPlaintex t Decryption Decryption Key(s) Plainrtex t Cryptography is both the lock and the combination (or keys) that helps us protect our communication data and transformation messages. There are varieties of locks, there are varieties of crytographic methods and keys. Two limits of Encryption: - it cannot protect data on a computer - it can no better than the weakest link. By:Shehrevar DavierwalaBy:Shehrevar Davierwala
  • 5. Different Types of Cryptography Methods Transposition Ciphers: In transposition ciphers, the letters of the message to be secretly transmitted are scrambled, that is, rewritten in a pattern way, and is then sent in a different order from its original form.. N O W - I S - T H E - T I M E F O R - A L L - G O O D - M E N - T O - C O M E - T O - T H E - A I D - O F - T H E I R - P A R T I E S - S T O P Z Z Z would be transmitted as: NFNEP OO - A WRTAR - OIT IA - DI SLC-E-LOOS T - ME - HE - S EO - TT - OTHO TDOEP I - IZ MMTRZ EEH-Z By:Shehrevar DavierwalaBy:Shehrevar Davierwala
  • 6. Different Types of Cryptography Methods Transposition Ciphers: In transposition ciphers, the letters of the message to be secretly transmitted are scrambled, that is, rewritten in a pattern way, and is then sent in a different order from its original form.. Key word: C O M P U T E R Letter order: 1 4 3 5 8 7 2 6 M E E T M E A T T H E F R O N T D O O R O F T H H I L T O N H O T E L A T 9 P M would be transmitted as: MTDHT ANTHP EEOLL EHOIE TFRTA TTHOM EOFN9 MROOT By:Shehrevar DavierwalaBy:Shehrevar Davierwala
  • 7. Different Types of Cryptography Methods Substitution Ciphers: Substitution ciphers are created by replacing one symbol, such as a letter of a message, with another symbol or letter in some patterned way. Let’s assume that we have a replacement letter pattern as follows: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z D E F G H I J K L M N O P Q R S T U V W X Y X A B C Plaintext: NOW IS THE TIME FOR ALL GOOD PEOPLE TO COME TO THE Ciphertext: KLT FP QEB QFJB CLO XII DLLA MBLMIB QL ZLIB QL QEB More complex symbol replancement pattern can be applied. By:Shehrevar DavierwalaBy:Shehrevar Davierwala
  • 8. Different Types of Cryptography Methods Product Ciphers: Product ciphers are created by using substitution and transposition together. Current Data Encryption Standard (3DES) and Rijndael ( The Advanced Encryption Standard. Winner) use multiple combinations of transposition and substitution to achieve superior cryptosecurity. Although this approach become more complex and secure than the previous two, they could be attacked using statistical methods. Ideally, ciphertext could present itself as a random string of letters of bits or be data key- stroked by a monkey. Diffusion is defined as the dispersion or distribution of plaintext in a statistically random manner over the ciphertext. The principle of confusion prevents the cryptanalyst from using the ciphertext to deduce the secret key. It may take the form of a complex substitution method. Confusion hides the relationship between ciphertext and the secret key. By:Shehrevar DavierwalaBy:Shehrevar Davierwala
  • 9. Symmetric Encryption Symmetric encryption (secret-key encryption, or single-key encryption): Secret-key encryption refers to the use of a shared key for both encryption by the transmitter and decryption by the receiver. Work step: - Sender sends a message after encryption with a secret-key. - Receiver decrypt the message with the same secret key after receiving it. Inter net Anne sends a message Bob receives Anne’s message Encrypt with a secret key Decrypt with a secret key Encrypted Message Encrypted Message By:Shehrevar DavierwalaBy:Shehrevar Davierwala
  • 10. Symmetric Encryption Special features of symmetric encryption: - Two communication parties use and share the same key. - Encryption and decryption is carried out based on the same key. - Both parties must agree on the secret key before communications. Advantages: - Useful in many cases which only involves two-party communications. Problems and limitations: - Complex in key distribution (key generation, transmission, and storage). - Not scalable. - Impractical to support large group of communications in networks. - Impossible to support exchanging messages with a large group of previously unknown parties over a public open network. Example: DES (the Data Encryption Standard) By:Shehrevar DavierwalaBy:Shehrevar Davierwala
  • 11. Asymmetric Encryption Asymmetric encryption (public-key encryption): Public-key encryption (asymmetric encryption) use a pair of keys for each party. - One key is known as a “public key”, which is known to other parties. - One key is known as a “private key” or a “secret key”, which must be confidential, and is known only to its owner. - The public key encrypts the message. - The private key decrypts the message. Inter net Anne sends a message Bob receives Anne’s message Encrypt with a public key PK(Bob) Decrypt with Bob’ private key SK(Bob) Scramble d Message Scramble d Message By:Shehrevar DavierwalaBy:Shehrevar Davierwala
  • 12. Asymmetric Encryption Special features of asymmetric encryption (public-key encryption): SK(PK(M)) = M Advantages: - Easy to key distribution (key generation, maintain and storage) - Scalable to support large group of users in an public network - Easy to support unknown users since no previous consent is needed. - Better protection than symmetric encryption. Problems and limitations: - Slow performance Applications: E-commerce, snoop-proof email system. Standards: the best known public-key encryption algorithm --> RSA By:Shehrevar DavierwalaBy:Shehrevar Davierwala
  • 13. , Sh RSA Algorithm The RSA algorithm was developed by Rivest, Shamir, and Adleman at MIT in 1978. The basic algorithm is outlined below: 1: Choose two large distinct primes, p and q. 2: Compute the product (modulus) n = pq. 3: Randomly choose encryption key e, such that e and (p-1)(q-1) are relatively prime. 4: Finally use Euclid’s algorithm to compute the decryption key, d such that e . d = 1 (mod (p-1) . (q -1)). Where, d and n are relatively prime. e and n are the public key. d is the secret key. To encrypt a message M, e C = M mod n To decrypt C, d M = C mod n By:Shehrevar DavierwalaBy:Shehrevar Davierwala
  • 14. Comparing Symmetric Encryption and Asymmetric Encryption Features Secret-Key Encryption Public-Key Encryption No. of keys Single Key Public Key and Secret Key Application Bulk data encryption Key exchange, digital signatures Key Management Simple but difficult to Need digital certificates manage and trusted third parties Performance Fast Slower Key exchange difficult and risk to Easy and less risky to deliver transfer a secret key a public key. Key Length 56-bit (old) 1024 bit (RSA) 126-bit (safe) Many used 2048 bits Standards DES, Triple DES RSA, Diffie-Hellman Rijndael DSA, Elliptic curves By:Shehrevar DavierwalaBy:Shehrevar Davierwala
  • 15. Comparing Symmetric Encryption and Asymmetric Encryption Features Secret-Key Encryption Public-Key Encryption Years in use over 1000 years less than 50 years Types of keys Secret Key only One Public Key and one Private Key Confidentiality Yes Yes Authentication Yes Yes Message integrity Yes Yes No-repudiation No Yes Don’t need trustedDigital signatures: third party need trusted third party Attack Simple but difficult to Need digital certificates manage and trusted third parties By:Shehrevar DavierwalaBy:Shehrevar Davierwala
  • 16. Digital Signatures What is a digital signature? - Digital signatures are implemented using public-key encryption. - A digital signature is a cryptographic mechanism that performs a similar function to a written signature. - Created using PPK cryptograph and message digests. Encryption allows a message sender the ability to digitally sign messages, thus creating a digital signature for the message. When a message digest is computed and then encrypted using the sender’s private key, and later append to the message, the result is called the digital signature of the message. By:Shehrevar DavierwalaBy:Shehrevar Davierwala
  • 17. Digital Signatures Purposes: Digital signatures are used to ensure the integrity and authentication. -- To verify the origin and contents of a message. -- Digital signatures are used for sender authentication. Why digital signatures? - Public-key algorithms are computation-intensive. With large messages they may be too expensive or too slow for the application. - Digital signatures based on digested message provide alternative solutions. Application: Digital signatures can be used to endorse an electronic document in a way that can be later validated for authenticity. By:Shehrevar DavierwalaBy:Shehrevar Davierwala
  • 18. Generating A Digital Signature Message MessageSignature Message Digest Encrypt Hashing Algorithm Sender’s Private Key (SK sender) To Receiver By:Shehrevar DavierwalaBy:Shehrevar Davierwala