SlideShare a Scribd company logo
NETWORK SECURITY
Jupriyadi, S.Kom. M.T.
jupriyadi@teknokrat.ac.id
Bandarlampung, Maret 2020
https://spada.teknokrat.ac.id
Chapter 4
• To be understand the basic concepts of cryptography
• The student will be able hide the message using cryptography
techniques
Steganography is the art and science of writing hidden
messages in such a way that no-one apart from the sender and
intended recipient even realizes there is a hidden message, a
form of security through obscurity
Cryptography
Symmetric
Key
Cryptography
Symmetric
Key
Cryptography
Hash
Function
Cryptography is the study of secure communications
techniques that allow only the sender and intended recipient of
a message to view its contents. The term is derived from the
Greek word kryptos, which means hidden. It is closely
associated to encryption, which is the act of scrambling
ordinary text into what's known as ciphertext and then back
again upon arrival
Cryptography is the science of using mathematics to encrypt
and decrypt data (Phil Zimmermann)
Cryptography is the art and science of keeping messages
secure (Bruce Schneier)
Basic Terminologies
A message is plaintext (sometimes called cleartext). The process of
disguising a message in such a way as to hide its substance is encryption.
An encrypted message is ciphertext. The process of turning ciphertext
back into plaintext is decryption.
A cipher (or cypher) is an algorithm for performing encryption or
decryption
Basic Terminologies (Cont’d)
A cryptosystem is an implementation of cryptographic techniques and
their accompanying infrastructure to provide information security
services. A cryptosystem is also referred to as a cipher system. The
various components of a basic cryptosystem are as follows −
 Plaintext
 Encryption Algorithm
 Ciphertext
 Decryption Algorithm
 Encryption Key
 Decryption Key
Basic Terminologies (Cont’d)
While cryptography is the science of securing data, cryptanalysis
is the science of analyzing and breaking secure communication.
Classical cryptanalysis involves an interesting combination of
analytical reasoning, application of mathematical tools, pattern
finding, patience, determination, and luck. Cryptanalysts are also
called attackers.
Cryptology embraces both cryptography and cryptanalysis.
Classical Cryptography
Hieroglyph
The first known evidence of cryptography can be traced to the use of
‘hieroglyph’. Some 4000 years ago, the Egyptians used to
communicate by messages written in hieroglyph.
Classical Cryptography (Cont’d)
Caesar Shift Cipher
Caesar Shift Cipher, relies on shifting the letters of a message by
an agreed number (three was a common choice), the recipient of
this message would then shift the letters back by the same
number and obtain the original message.
The Caesar cipher is named after Julius Caesar ,
who used it with a shift of three to protect
messages of military significance.
Caesar Shift Cipher
Caesar Shift Cipher Key = 3
PLAINTEXT : internet society ghana chapter
CYPHERTEXT : lqwhuqhw vrflhwb jkdqd fkdswhu
Goal and Service Cryptography
Goal: The primary goal of cryptography is to secure important data
on the hard disk or as it passes through a medium that may not be
secure itself. Usually, that medium is a computer network.
Services: Cryptography can provide the following services:
 Confidentiality (secrecy)
 Integrity (anti-tampering)
 Authentication
 Non-repudiation.
Service Cryptography
Confidentiality (secrecy)
 Ensuring that no one can read the message except the intended
receiver
 Data is kept secret from those without the proper credentials, even
if that data travels through an insecure medium
Integrity (anti-tampering)
 Assuring the receiver that the received message has not
been altered in any way from the original.
Service Cryptography
Authentication
 Cryptography can help establish identity for authentication
purposes. The process of proving one's identity. (The primary
forms of host-to-host authentication on the Internet today are
name-based or address-based, both of which are notoriously
weak.)
Non-repudiation
 A mechanism to prove that the sender
really sent this message
Types of Cryptography
 Symmetric Key Cryptography
 Asymmetric Key Cryptography
 Hash Functions
Symmetric Key Cryptography
Also known as Secret Key Cryptography or Conventional
Cryptography, Symmetric Key Cryptography is an encryption system
in which the sender and receiver of a message share a single,
common key that is used to encrypt and decrypt the message.
The Algorithm use is also known as a secret key algorithm or
sometimes called a symmetric algorithm
A key is a piece of information (a parameter)
that determines the functional output of a
cryptographic algorithm or cipher.
The key for encrypting and decrypting the file had to be known to all the recipients. Else,
the message could not be decrypted by conventional means.
Symmetric Key Cryptography - Examples
 Permutation Cipher
 substitution cipher,
 Hill Cipher,
 Rijndael (AES),
 Blowfish,
 DES
 3DES
 IDEA
 etc ....
Problem Symmetric Key Cryptography
Key Management
Symmetric-key systems are simpler and faster; their main drawback
is that the two parties must somehow exchange the key in a secure
way and keep it secure after that.
Key Management caused nightmare for the parties using the
symmetric key cryptography. They were worried about how to get the
keys safely and securely across to all users so that the decryption of
the message would be possible. This gave the chance for third
parties to intercept the keys in transit to decode the top-secret
messages. Thus, if the key was compromised, the entire coding
system was compromised and a “Secret” would no longer remain a
“Secret”.
This is why the “Public Key Cryptography” came into existence.
Asymmetric Key Cryptography
Asymmetric cryptography , also known as Public-key cryptography,
refers to a cryptographic algorithm which requires two separate keys,
one of which is private and one of which is public. The public key is
used to encrypt the message and the private one is used to decrypt
the message.
Asymmetric Key Cryptography (cont’d)
Asymmetric Key Cryptography - Examples
 Digital Signature Standard (DSS)
 Rivest, Shamir and Adleman (RSA)
 ElGamal
 Elliptic Curve cryptography
 etc ...
HASH Function
A cryptographic hash function is a
hash function that takes an arbitrary
block of data and returns a fixed-size
bit string, the cryptographic hash
value, such that any (accidental or
intentional) change to the data will
(with very high probability) change the
hash value.
The data to be encoded are often
called the message, and the hash
value is sometimes called the
message digest or simply digest.
What is a HASH Function
The ideal cryptographic hash function has four main properties:
 it is easy to compute the hash value for any given message
 it is infeasible to generate a message that has a given hash
 it is infeasible to modify a message without changing the hash
 it is infeasible to find two different messages with the same hash.
HASH Function Algorithm - Examples
 Message Digest (MD)
 MD2, MD4, MD5, MD6
 Secure Hash Function (SHA)
 SHA-0, SHA-1, SHA-2, and SHA-3
 RACE Integrity Primitives Evaluation Message Digest (RIPEMD)
 RIPEMD-128, and RIPEMD-160. There also exist 256, and 320-bit versions
of this algorithm.
HASH Function Algorithm - Examples
 Message Digest (MD)
 MD2, MD4, MD5, MD6
 Secure Hash Function (SHA)
 SHA-0, SHA-1, SHA-2, and SHA-3
 RACE Integrity Primitives Evaluation
Message Digest (RIPEMD)
 RIPEMD-128, and RIPEMD-160. There
also exist 256, and 320-bit versions of
this algorithm.
Applications of Hash Functions
 Password Storage
 Hash functions provide protection to password storage.
 Instead of storing password in clear, mostly all logon
processes store the hash values of passwords in the file.
 The Password file consists of a table of pairs which are in the
form (user id, h(P))
 Data Integrity Check
 Data integrity check is a most common application of the
hash functions. It is used to generate the checksums on data
files. This application provides assurance to the user about
correctness of the data.
Applications of Hash Functions - Examples
Checking
$ md5sum file1.dat
MD5 Sum = a4c0d35c95a63a805915367dcfe6b751
$ md5sum file2.dat
MD5 Sum = a4c0d35c95a63a805915367dcfe6b751
$ sha512sum Yellow.jpg
SHA256 Sum =
ee9d1963eb1481f6a8e9c80aa02d33772aa40fbfd9797df4f5333
a7a90bb902b5c143be3db9c1c7b2800274b163515af9315f40b4
d10e3cfce023c885d784e4d
What's Next ?
30

More Related Content

What's hot

Cryptography on cloud
Cryptography on cloudCryptography on cloud
Cryptography on cloud
krprashant94
 
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHM
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHMPROJECT REPORT ON CRYPTOGRAPHIC ALGORITHM
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHM
saniacorreya
 
Cryptography
CryptographyCryptography
Cryptography
Vicky Kamboj
 
Topic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesTopic1 substitution transposition-techniques
Topic1 substitution transposition-techniques
MdFazleRabbi18
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01
Saif Kassim
 
Cryptography
CryptographyCryptography
Cryptography
jayashri kolekar
 
Cryptography
CryptographyCryptography
Cryptography
rabinaneumon
 
6. cryptography
6. cryptography6. cryptography
6. cryptography7wounders
 
Evolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniquesEvolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniques
Mona Rajput
 
A Study of Different Partitioning Clustering Technique
A Study of Different Partitioning Clustering TechniqueA Study of Different Partitioning Clustering Technique
A Study of Different Partitioning Clustering Technique
ijsrd.com
 
Cryptography-Known plain text attack
Cryptography-Known plain text attack Cryptography-Known plain text attack
Cryptography-Known plain text attack
amiteshg
 
Basic cryptography
Basic cryptographyBasic cryptography
Basic cryptography
Perfect Training Center
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
kusum sharma
 
Encryption And Decryption
Encryption And DecryptionEncryption And Decryption
Encryption And DecryptionNA
 
Cryptography
CryptographyCryptography
Cryptography
Vishalya Dulam
 
Data encryption
Data encryptionData encryption
Data encryption
Deepam Goyal
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation finaladrigee12
 
Cryptography ppt
Cryptography pptCryptography ppt
Criptography
CriptographyCriptography
Criptography
Sajan Sahu
 

What's hot (20)

Cryptography on cloud
Cryptography on cloudCryptography on cloud
Cryptography on cloud
 
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHM
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHMPROJECT REPORT ON CRYPTOGRAPHIC ALGORITHM
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHM
 
Cryptography
CryptographyCryptography
Cryptography
 
Topic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesTopic1 substitution transposition-techniques
Topic1 substitution transposition-techniques
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
Evolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniquesEvolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniques
 
A Study of Different Partitioning Clustering Technique
A Study of Different Partitioning Clustering TechniqueA Study of Different Partitioning Clustering Technique
A Study of Different Partitioning Clustering Technique
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography-Known plain text attack
Cryptography-Known plain text attack Cryptography-Known plain text attack
Cryptography-Known plain text attack
 
Basic cryptography
Basic cryptographyBasic cryptography
Basic cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Encryption And Decryption
Encryption And DecryptionEncryption And Decryption
Encryption And Decryption
 
Cryptography
CryptographyCryptography
Cryptography
 
Data encryption
Data encryptionData encryption
Data encryption
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation final
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Criptography
CriptographyCriptography
Criptography
 

Similar to Pertemuan 4 information hiding (cryptography)

Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)
newbie2019
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
Hossain Md Shakhawat
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab Kumbhakar
Durlove Kumbhakar
 
Overview Of Cryptography
Overview Of CryptographyOverview Of Cryptography
Overview Of Cryptography
Manjarul Hoque
 
White Paper on Cryptography
White Paper on Cryptography White Paper on Cryptography
White Paper on Cryptography
Durgesh Malviya
 
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHICA NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
ijsrd.com
 
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEYMETHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY
IJNSA Journal
 
Cryptography
CryptographyCryptography
Cryptography
Jasim Jas
 
Cryptography
CryptographyCryptography
Unit-2-IS (1).pdf
Unit-2-IS (1).pdfUnit-2-IS (1).pdf
Unit-2-IS (1).pdf
ShaikSameena24
 
cryptography and network security
cryptography and network security cryptography and network security
cryptography and network security
nitishV3
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
Seema Goel
 
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.pptPresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
so6281019
 
Introduction To PKI Technology
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI Technology
Sylvain Maret
 
Cryptography Intro
Cryptography IntroCryptography Intro
Cryptography Intro
Christopher Martin
 
Cryptography
CryptographyCryptography
Cryptography
prasham95
 
Data encryption
Data encryptionData encryption
Data encryption
Balvant Biradar
 
Paper id 27201444
Paper id 27201444Paper id 27201444
Paper id 27201444
IJRAT
 

Similar to Pertemuan 4 information hiding (cryptography) (20)

Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab Kumbhakar
 
Overview Of Cryptography
Overview Of CryptographyOverview Of Cryptography
Overview Of Cryptography
 
White Paper on Cryptography
White Paper on Cryptography White Paper on Cryptography
White Paper on Cryptography
 
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHICA NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
 
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEYMETHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Unit-2-IS (1).pdf
Unit-2-IS (1).pdfUnit-2-IS (1).pdf
Unit-2-IS (1).pdf
 
cryptography and network security
cryptography and network security cryptography and network security
cryptography and network security
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.pptPresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
 
Introduction To PKI Technology
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI Technology
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography Intro
Cryptography IntroCryptography Intro
Cryptography Intro
 
Cryptography
CryptographyCryptography
Cryptography
 
Asif
AsifAsif
Asif
 
Data encryption
Data encryptionData encryption
Data encryption
 
Paper id 27201444
Paper id 27201444Paper id 27201444
Paper id 27201444
 

More from newbie2019

Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedure
newbie2019
 
Fundamental digital forensik
Fundamental digital forensikFundamental digital forensik
Fundamental digital forensik
newbie2019
 
Pendahuluan it forensik
Pendahuluan it forensikPendahuluan it forensik
Pendahuluan it forensik
newbie2019
 
Chapter 15 incident handling
Chapter 15 incident handlingChapter 15 incident handling
Chapter 15 incident handling
newbie2019
 
Chapter 14 sql injection
Chapter 14 sql injectionChapter 14 sql injection
Chapter 14 sql injection
newbie2019
 
Chapter 13 web security
Chapter 13 web securityChapter 13 web security
Chapter 13 web security
newbie2019
 
NIST Framework for Information System
NIST Framework for Information SystemNIST Framework for Information System
NIST Framework for Information System
newbie2019
 
Nist.sp.800 37r2
Nist.sp.800 37r2Nist.sp.800 37r2
Nist.sp.800 37r2
newbie2019
 
Iso iec 27000_2018
Iso iec 27000_2018Iso iec 27000_2018
Iso iec 27000_2018
newbie2019
 
Chapter 12 iso 27001 awareness
Chapter 12 iso 27001 awarenessChapter 12 iso 27001 awareness
Chapter 12 iso 27001 awareness
newbie2019
 
Chapter 10 security standart
Chapter 10 security standartChapter 10 security standart
Chapter 10 security standart
newbie2019
 
Chapter 8 cryptography lanjutan
Chapter 8 cryptography lanjutanChapter 8 cryptography lanjutan
Chapter 8 cryptography lanjutan
newbie2019
 
Pertemuan 7 cryptography
Pertemuan 7  cryptographyPertemuan 7  cryptography
Pertemuan 7 cryptography
newbie2019
 
Chapter 6 information hiding (steganography)
Chapter 6 information hiding (steganography)Chapter 6 information hiding (steganography)
Chapter 6 information hiding (steganography)
newbie2019
 
Vulnerability threat and attack
Vulnerability threat and attackVulnerability threat and attack
Vulnerability threat and attack
newbie2019
 
Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack
newbie2019
 
Chapter 3 security principals
Chapter 3 security principalsChapter 3 security principals
Chapter 3 security principals
newbie2019
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
newbie2019
 
Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1
newbie2019
 

More from newbie2019 (20)

Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedure
 
Fundamental digital forensik
Fundamental digital forensikFundamental digital forensik
Fundamental digital forensik
 
Pendahuluan it forensik
Pendahuluan it forensikPendahuluan it forensik
Pendahuluan it forensik
 
Chapter 15 incident handling
Chapter 15 incident handlingChapter 15 incident handling
Chapter 15 incident handling
 
Chapter 14 sql injection
Chapter 14 sql injectionChapter 14 sql injection
Chapter 14 sql injection
 
Chapter 13 web security
Chapter 13 web securityChapter 13 web security
Chapter 13 web security
 
NIST Framework for Information System
NIST Framework for Information SystemNIST Framework for Information System
NIST Framework for Information System
 
Nist.sp.800 37r2
Nist.sp.800 37r2Nist.sp.800 37r2
Nist.sp.800 37r2
 
Iso iec 27000_2018
Iso iec 27000_2018Iso iec 27000_2018
Iso iec 27000_2018
 
Chapter 12 iso 27001 awareness
Chapter 12 iso 27001 awarenessChapter 12 iso 27001 awareness
Chapter 12 iso 27001 awareness
 
Chapter 10 security standart
Chapter 10 security standartChapter 10 security standart
Chapter 10 security standart
 
Chapter 8 cryptography lanjutan
Chapter 8 cryptography lanjutanChapter 8 cryptography lanjutan
Chapter 8 cryptography lanjutan
 
Pertemuan 7 cryptography
Pertemuan 7  cryptographyPertemuan 7  cryptography
Pertemuan 7 cryptography
 
Chapter 6 information hiding (steganography)
Chapter 6 information hiding (steganography)Chapter 6 information hiding (steganography)
Chapter 6 information hiding (steganography)
 
Vulnerability threat and attack
Vulnerability threat and attackVulnerability threat and attack
Vulnerability threat and attack
 
Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack
 
C02
C02C02
C02
 
Chapter 3 security principals
Chapter 3 security principalsChapter 3 security principals
Chapter 3 security principals
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1
 

Recently uploaded

PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
PedroFerreira53928
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
bennyroshan06
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
Vivekanand Anglo Vedic Academy
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 

Recently uploaded (20)

PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 

Pertemuan 4 information hiding (cryptography)

  • 1. NETWORK SECURITY Jupriyadi, S.Kom. M.T. jupriyadi@teknokrat.ac.id Bandarlampung, Maret 2020 https://spada.teknokrat.ac.id Chapter 4
  • 2. • To be understand the basic concepts of cryptography • The student will be able hide the message using cryptography techniques
  • 3. Steganography is the art and science of writing hidden messages in such a way that no-one apart from the sender and intended recipient even realizes there is a hidden message, a form of security through obscurity
  • 5. Cryptography is the study of secure communications techniques that allow only the sender and intended recipient of a message to view its contents. The term is derived from the Greek word kryptos, which means hidden. It is closely associated to encryption, which is the act of scrambling ordinary text into what's known as ciphertext and then back again upon arrival
  • 6. Cryptography is the science of using mathematics to encrypt and decrypt data (Phil Zimmermann) Cryptography is the art and science of keeping messages secure (Bruce Schneier)
  • 7. Basic Terminologies A message is plaintext (sometimes called cleartext). The process of disguising a message in such a way as to hide its substance is encryption. An encrypted message is ciphertext. The process of turning ciphertext back into plaintext is decryption. A cipher (or cypher) is an algorithm for performing encryption or decryption
  • 8. Basic Terminologies (Cont’d) A cryptosystem is an implementation of cryptographic techniques and their accompanying infrastructure to provide information security services. A cryptosystem is also referred to as a cipher system. The various components of a basic cryptosystem are as follows −  Plaintext  Encryption Algorithm  Ciphertext  Decryption Algorithm  Encryption Key  Decryption Key
  • 9. Basic Terminologies (Cont’d) While cryptography is the science of securing data, cryptanalysis is the science of analyzing and breaking secure communication. Classical cryptanalysis involves an interesting combination of analytical reasoning, application of mathematical tools, pattern finding, patience, determination, and luck. Cryptanalysts are also called attackers. Cryptology embraces both cryptography and cryptanalysis.
  • 10. Classical Cryptography Hieroglyph The first known evidence of cryptography can be traced to the use of ‘hieroglyph’. Some 4000 years ago, the Egyptians used to communicate by messages written in hieroglyph.
  • 11. Classical Cryptography (Cont’d) Caesar Shift Cipher Caesar Shift Cipher, relies on shifting the letters of a message by an agreed number (three was a common choice), the recipient of this message would then shift the letters back by the same number and obtain the original message. The Caesar cipher is named after Julius Caesar , who used it with a shift of three to protect messages of military significance.
  • 12. Caesar Shift Cipher Caesar Shift Cipher Key = 3 PLAINTEXT : internet society ghana chapter CYPHERTEXT : lqwhuqhw vrflhwb jkdqd fkdswhu
  • 13. Goal and Service Cryptography Goal: The primary goal of cryptography is to secure important data on the hard disk or as it passes through a medium that may not be secure itself. Usually, that medium is a computer network. Services: Cryptography can provide the following services:  Confidentiality (secrecy)  Integrity (anti-tampering)  Authentication  Non-repudiation.
  • 14. Service Cryptography Confidentiality (secrecy)  Ensuring that no one can read the message except the intended receiver  Data is kept secret from those without the proper credentials, even if that data travels through an insecure medium Integrity (anti-tampering)  Assuring the receiver that the received message has not been altered in any way from the original.
  • 15. Service Cryptography Authentication  Cryptography can help establish identity for authentication purposes. The process of proving one's identity. (The primary forms of host-to-host authentication on the Internet today are name-based or address-based, both of which are notoriously weak.) Non-repudiation  A mechanism to prove that the sender really sent this message
  • 16. Types of Cryptography  Symmetric Key Cryptography  Asymmetric Key Cryptography  Hash Functions
  • 17. Symmetric Key Cryptography Also known as Secret Key Cryptography or Conventional Cryptography, Symmetric Key Cryptography is an encryption system in which the sender and receiver of a message share a single, common key that is used to encrypt and decrypt the message. The Algorithm use is also known as a secret key algorithm or sometimes called a symmetric algorithm A key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm or cipher. The key for encrypting and decrypting the file had to be known to all the recipients. Else, the message could not be decrypted by conventional means.
  • 18. Symmetric Key Cryptography - Examples  Permutation Cipher  substitution cipher,  Hill Cipher,  Rijndael (AES),  Blowfish,  DES  3DES  IDEA  etc ....
  • 19. Problem Symmetric Key Cryptography Key Management Symmetric-key systems are simpler and faster; their main drawback is that the two parties must somehow exchange the key in a secure way and keep it secure after that. Key Management caused nightmare for the parties using the symmetric key cryptography. They were worried about how to get the keys safely and securely across to all users so that the decryption of the message would be possible. This gave the chance for third parties to intercept the keys in transit to decode the top-secret messages. Thus, if the key was compromised, the entire coding system was compromised and a “Secret” would no longer remain a “Secret”. This is why the “Public Key Cryptography” came into existence.
  • 20. Asymmetric Key Cryptography Asymmetric cryptography , also known as Public-key cryptography, refers to a cryptographic algorithm which requires two separate keys, one of which is private and one of which is public. The public key is used to encrypt the message and the private one is used to decrypt the message.
  • 22. Asymmetric Key Cryptography - Examples  Digital Signature Standard (DSS)  Rivest, Shamir and Adleman (RSA)  ElGamal  Elliptic Curve cryptography  etc ...
  • 23. HASH Function A cryptographic hash function is a hash function that takes an arbitrary block of data and returns a fixed-size bit string, the cryptographic hash value, such that any (accidental or intentional) change to the data will (with very high probability) change the hash value. The data to be encoded are often called the message, and the hash value is sometimes called the message digest or simply digest.
  • 24. What is a HASH Function The ideal cryptographic hash function has four main properties:  it is easy to compute the hash value for any given message  it is infeasible to generate a message that has a given hash  it is infeasible to modify a message without changing the hash  it is infeasible to find two different messages with the same hash.
  • 25. HASH Function Algorithm - Examples  Message Digest (MD)  MD2, MD4, MD5, MD6  Secure Hash Function (SHA)  SHA-0, SHA-1, SHA-2, and SHA-3  RACE Integrity Primitives Evaluation Message Digest (RIPEMD)  RIPEMD-128, and RIPEMD-160. There also exist 256, and 320-bit versions of this algorithm.
  • 26. HASH Function Algorithm - Examples  Message Digest (MD)  MD2, MD4, MD5, MD6  Secure Hash Function (SHA)  SHA-0, SHA-1, SHA-2, and SHA-3  RACE Integrity Primitives Evaluation Message Digest (RIPEMD)  RIPEMD-128, and RIPEMD-160. There also exist 256, and 320-bit versions of this algorithm.
  • 27. Applications of Hash Functions  Password Storage  Hash functions provide protection to password storage.  Instead of storing password in clear, mostly all logon processes store the hash values of passwords in the file.  The Password file consists of a table of pairs which are in the form (user id, h(P))  Data Integrity Check  Data integrity check is a most common application of the hash functions. It is used to generate the checksums on data files. This application provides assurance to the user about correctness of the data.
  • 28. Applications of Hash Functions - Examples Checking $ md5sum file1.dat MD5 Sum = a4c0d35c95a63a805915367dcfe6b751 $ md5sum file2.dat MD5 Sum = a4c0d35c95a63a805915367dcfe6b751 $ sha512sum Yellow.jpg SHA256 Sum = ee9d1963eb1481f6a8e9c80aa02d33772aa40fbfd9797df4f5333 a7a90bb902b5c143be3db9c1c7b2800274b163515af9315f40b4 d10e3cfce023c885d784e4d
  • 30. 30