SlideShare a Scribd company logo
1 of 32
ENCRYPTION
UNIT-IV
1/9/17 ABHISHEK SRIVASTAVA (CSE)
TABLE OF CONTENTS
• We will be talking about...
•
•
What is Encryption?
•
Why Do We Use Encryption?
•
How Does It Work? (x3)
•
Pros and Cons
•
Real Life Examples
1/9/17 ABHISHEK SRIVASTAVA (CSE)
WHAT IS ENCRYPTION?
• Encryption: The process of coding text
• Decryption: The process of decoding text
• Decryption is the opposite of encryption
•
• A security method used to protect data
• Files on computers
• Data being passed through the Internet
• ATM machines
• E-Commerce
• Facebook password.
1/9/17 ABHISHEK SRIVASTAVA (CSE)
WHY DO WE USE ENCRYPTION?
To secure important information e.g. :
• Health records
• Credit card information
• Student records
• Etc.
•
• Prevents information from getting stolen or read
•
• Without encryption, there is no reliable security
1/9/17 ABHISHEK SRIVASTAVA (CSE)
HOW DOES IT WORK?
●
Encryption allows the sender to transform data from plain
text into cipher text by using a key
• Cipher text: coded text
• Key: what is used to encrypt and decrypt text
•
Two different types of encryption:
• Asymmetric encryption (Public key encryption)
• Symmetric encryption
•
•
Adrianna wants to send Melissa a message...
1/9/17 ABHISHEK SRIVASTAVA (CSE)
REAL LIFE EXAMPLES
●
Used in the military and the government
●
●
Now used in everyday life:
• Online banking
• E-commerce
• Student records, health records, tax records etc.
• ATM machines
• Social networking (emails, texts, instant messengers)
• Businesses
1/9/17 ABHISHEK SRIVASTAVA (CSE)
DATA ENCRYPTION
1/9/17 ABHISHEK SRIVASTAVA (CSE)
CONTENT
• Data encryption definition.
• Types of data encryption.
• Difference between symmetric and asymmetric.
• Encryption Methods.
• Data Encryption Standard (DES).
• Public Key Cryptosystem
•
•
•
•
•
1/9/17 ABHISHEK SRIVASTAVA (CSE)
DATA ENCRYPTION
DEFINITION
Data encryption refers to mathematical calculations and
algorithmic schemes that transform plaintext into cypher text,
a form that is non-readable to unauthorized parties. The
recipient of an encrypted message uses a key which triggers
the algorithm mechanism to decrypt the data, transforming it
to the original plaintext version
1/9/17 ABHISHEK SRIVASTAVA (CSE)
DATA ENCRYPTION
1/9/17 ABHISHEK SRIVASTAVA (CSE)
A public key encryption scheme has six
ingredients
• Plaintext
•
• encryption algorithm
•
• public and private key
•
• cipher text
•
• decryption algorithm
1/9/17 ABHISHEK SRIVASTAVA (CSE)
TYPES OF DATA ENCRYPTION
• In symmetric (Single
key):
The encryption
and decryption keys
are the same.
•
1/9/17 ABHISHEK SRIVASTAVA (CSE)
A SYMMETRIC ENCRYPTION
SCHEME HAS FIVE INGREDIENTS
Plaintext
• Encryption Algorithm
• Secret key
• Cipher Text
• Decryption
1/9/17 ABHISHEK SRIVASTAVA (CSE)
.
• In asymmetric (two
keys):
• The
encryption
and
decryption
keys are
different.
•
1/9/17 ABHISHEK SRIVASTAVA (CSE)
.
1/9/17 ABHISHEK SRIVASTAVA (CSE)
DIFFERENCE B/W
ASYMMETRIC &
SYMMETRIC ENCRYPTION
• The symmetric one key is used for symmetric and a
symmetric but in asymmetric different keys are use for
encryption and description.
• In symmetric, sender and receiver must share the algorithm
and key but in a symmetric sender and receiver must have
one matched pair of keys.
• In symmetric key must be kept secret but in asymmetric
two keys must of kept secret.
1/9/17 ABHISHEK SRIVASTAVA (CSE)
PUBLIC KEY CRYPTOGRAPHY
• A form of cryptography in which the key used to encrypt a
message differs from the key used to decrypt it.
• In public key cryptography, a user has a pair of
cryptographic keys—a public key and a private key. The
private key is kept secret, while the public key may be
widely distributed.
• The two main branches of public key cryptography are:
1. Public key encryption
2. Digital signatures
1/9/17 ABHISHEK SRIVASTAVA (CSE)
PUBLIC KEY ENCRYPTION
A message encrypted with a recipient's public key cannot be decrypte
by anyone except the recipient possessing the corresponding private
key.
•
ContdContd..
Actual algorithms - two linked
keys:
1/9/17 ABHISHEK SRIVASTAVA (CSE)
KEY TERMS
Public and private keys:
This is a pair of keys that have been selected so that if one
is used for encryption, the other is used for decryption.
The exact transformations performed by the algorithm
depend on the public or private key that is provided as
input.
Cipher text:
This is the scrambled message produced as output. It
depends on the plaintext and the key. For a given message,
two different keys will produce two different cipher texts.
1/9/17 ABHISHEK SRIVASTAVA (CSE)
A GENERAL APPROACH
ContdContd..1/9/17 ABHISHEK SRIVASTAVA (CSE)
Step 1 : Each user generates a pair of keys to be used for the
encryption and decryption of messages.
Step 2 : Each user places public key in a public register or
other accessible file. As encryption figure suggests,
each user maintains a collection of public keys
obtained from others.
Step 3 : If user1 wishes to send a confidential message to
user2, user1 encrypts the message using user2's
public key.
Step 4 : When user1 receives the message, he decrypts it
using his private key. No other recipient can decrypt
the message because only user1 knows his private
key
1/9/17 ABHISHEK SRIVASTAVA (CSE)
Authentication & security:
• There is some source A that produces a message in plaintext,
X =[X1, X2,..., XM,]. The M elements of X are letters in
some finite alphabet. The message is intended for
destination B. B generates a related pair of keys: a public
key, PUb, and a private key, PRb. PRb is known only to B,
whereas PUb is publicly available.
•
• A generates another pair of keys: a public key, PUa, and a
private key, PRa. PRa is known only to A, whereas PUa is
publicly available.
Contd.Contd.1/9/17 ABHISHEK SRIVASTAVA (CSE)
SECRECY IN A PUBLIC KEY
ENCRYPTION :
Step 1:Step 1: A encrypt the massage using B’s public key PUb andA encrypt the massage using B’s public key PUb and
send it to B.send it to B.
With the message X and the encryption key PUb asWith the message X and the encryption key PUb as
input, A forms the cipher text Y = [Y1, Y2,..., YN]:input, A forms the cipher text Y = [Y1, Y2,..., YN]:
Step 2:Step 2: B decrypt the massage using it’s private key PRb.B decrypt the massage using it’s private key PRb.
Using it’s private key PRb and the cipher text Y itUsing it’s private key PRb and the cipher text Y it
obtain the original massage Xobtain the original massage X
1/9/17 ABHISHEK SRIVASTAVA (CSE)
Authentication In A Public
Key Encryption :
Step 1:Step 1: A prepares a message to B and encrypts it usingA prepares a message to B and encrypts it using
A's private key before transmitting it.A's private key before transmitting it.
Step 2:Step 2: B can decrypt the message using A's public key.B can decrypt the message using A's public key.
Because the message was encrypted using A'sBecause the message was encrypted using A's
private key, only A could have prepared theprivate key, only A could have prepared the
message.message.
1/9/17 ABHISHEK SRIVASTAVA (CSE)
Comparing Secrecy and
Authentication
• In authentication technique :It is impossible to alter the
message without access to A's private key, so the message
is authenticated both in terms of source and in terms of
data integrity. But secrecy doesn't provide this advantage.
•
•
• Thus the authentication is much more confidential and
secure in terms of alteration of the massage.
1/9/17 ABHISHEK SRIVASTAVA (CSE)
Authentication & Security:
Contd.Contd.1/9/17 ABHISHEK SRIVASTAVA (CSE)
DIGITAL SIGNATURE
• An authentication mechanism that enables the creator of a
message to attach a code that acts as a signature.
• In situations where there is not complete trust between sender
and receiver, something more than authentication is needed.
• 1. It must verify the author and the date and time of the
signature.
• 2. It must to authenticate the contents at the time of the
signature.
• 3. It must be verifiable by third parties, to resolve disputes.
• Thus, the digital signature function includes the authentication
function.
• A variety of approaches has been proposed for the digital
signature function. These approaches fall into two
categories: direct and arbitrated
1/9/17 ABHISHEK SRIVASTAVA (CSE)
Direct Digital Signature :
The direct digital signature
involves only the communicating parties (source,
destination). It is assumed that the destination knows the
public key of the source. A digital signature may be
formed by encrypting the entire message with the sender's
private key or by encrypting a hash code of the message
with the sender's private key.
1/9/17 ABHISHEK SRIVASTAVA (CSE)
Arbitrated Digital Signature :
• The problems associated with direct digital signatures can
be addressed by using an arbiter.
• As with direct signature schemes, there is a variety of
arbitrated signature schemes. In general terms, they all
operate as follows. Every signed message from a sender X
to a receiver Y goes first to an arbiter A, which check it’s
origin and context and then sent to Y.
•
1/9/17 ABHISHEK SRIVASTAVA (CSE)
Applications For Public-key
Cryptosystems
Public key cryptosystem used in many systems such as:
1.Decision support system
2. RSA Algorithm
3. Elliptic Curve
4. Diffie-Hellman key exchange
1/9/17 ABHISHEK SRIVASTAVA (CSE)
COMPUTATIONAL COST
• It is computationally easy for a party B to generate a pair
(public key PUb, private key PRb).
• It is computationally easy for a sender A, knowing the
public key and the message to be encrypted, M, to
generate the corresponding cipher text:
• C = E(PUb, M)
• It is computationally easy for the receiver B to decrypt
the resulting cipher text using the private key to
recover the original message:
• M = D(PRb, C) = D[PRb, E(PUb, M)]
• It is computationally infeasible for an adversary,
knowing the public key, PUb, to determine the
private key, PRb.
•
1/9/17 ABHISHEK SRIVASTAVA (CSE)
WEAKNESSES
ComputatioComputatio
nal costnal cost
Keys in public-key cryptography, due to theirKeys in public-key cryptography, due to their
unique nature, are more computationally costlyunique nature, are more computationally costly
than their counterparts in secret-keythan their counterparts in secret-key
cryptography.cryptography.
VulnerableVulnerable
to bruteto brute
forceforce
attacksattacks
Keys in asymmetric cryptography are moreKeys in asymmetric cryptography are more
vulnerable to brute force attacks than in secret-vulnerable to brute force attacks than in secret-
key cryptography.key cryptography.
VulnerableVulnerable
to the manto the man
in thein the
middlemiddle
attackattack
Public-key cryptography also has vulnerabilitiesPublic-key cryptography also has vulnerabilities
to attacks such as the man in the middle attack.to attacks such as the man in the middle attack.
In this situation, a malicious third partyIn this situation, a malicious third party
intercepts a public key on its way to one of theintercepts a public key on its way to one of the
parties involvedparties involved
1/9/17 ABHISHEK SRIVASTAVA (CSE)

More Related Content

What's hot

What's hot (20)

CNS - Unit - 4 - Public Key Cryptosystem
CNS - Unit - 4 - Public Key Cryptosystem CNS - Unit - 4 - Public Key Cryptosystem
CNS - Unit - 4 - Public Key Cryptosystem
 
Cryptography and Network security # Lecture 5
Cryptography and Network security # Lecture 5Cryptography and Network security # Lecture 5
Cryptography and Network security # Lecture 5
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography and Network security # Lecture 4
Cryptography and Network security # Lecture 4Cryptography and Network security # Lecture 4
Cryptography and Network security # Lecture 4
 
Is case study
Is   case studyIs   case study
Is case study
 
Cryptography
CryptographyCryptography
Cryptography
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
 
Cryptography and Network security # Lecture 7
Cryptography and Network security # Lecture 7Cryptography and Network security # Lecture 7
Cryptography and Network security # Lecture 7
 
Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)
 
Unit 1
Unit 1Unit 1
Unit 1
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography and Information Security
Cryptography and Information SecurityCryptography and Information Security
Cryptography and Information Security
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Authentication: keys, MAC
Authentication: keys, MACAuthentication: keys, MAC
Authentication: keys, MAC
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Encryption
EncryptionEncryption
Encryption
 
Cryptography and network security Nit701
Cryptography and network security Nit701Cryptography and network security Nit701
Cryptography and network security Nit701
 
Cryptography cse,ru
Cryptography cse,ruCryptography cse,ru
Cryptography cse,ru
 
Different types of Symmetric key Cryptography
Different types of Symmetric key CryptographyDifferent types of Symmetric key Cryptography
Different types of Symmetric key Cryptography
 

Similar to Unit 4

Applying Security Algorithms Using openSSL crypto library
Applying Security Algorithms Using openSSL crypto libraryApplying Security Algorithms Using openSSL crypto library
Applying Security Algorithms Using openSSL crypto libraryPriyank Kapadia
 
Public-Key Cryptography.pptx
Public-Key Cryptography.pptxPublic-Key Cryptography.pptx
Public-Key Cryptography.pptxAbdulRehman970300
 
Unit-III_3R-CRYPTO_2021-22_VSM.pptx
Unit-III_3R-CRYPTO_2021-22_VSM.pptxUnit-III_3R-CRYPTO_2021-22_VSM.pptx
Unit-III_3R-CRYPTO_2021-22_VSM.pptxVishwanathMahalle
 
2. public key cryptography and RSA
2. public key cryptography and RSA2. public key cryptography and RSA
2. public key cryptography and RSADr.Florence Dayana
 
What is digital signature or DSC
What is digital signature or DSCWhat is digital signature or DSC
What is digital signature or DSCAdv Prashant Mali
 
information security(Public key encryption its characteristics and weakness, ...
information security(Public key encryption its characteristics and weakness, ...information security(Public key encryption its characteristics and weakness, ...
information security(Public key encryption its characteristics and weakness, ...Zara Nawaz
 
computer-security-and-cryptography-a-simple-presentation
computer-security-and-cryptography-a-simple-presentationcomputer-security-and-cryptography-a-simple-presentation
computer-security-and-cryptography-a-simple-presentationAlex Punnen
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Saif Kassim
 
Lesson 04 - Symmetric and Asymmetric Key Encryptions (1).pptx
Lesson 04 - Symmetric and Asymmetric Key Encryptions (1).pptxLesson 04 - Symmetric and Asymmetric Key Encryptions (1).pptx
Lesson 04 - Symmetric and Asymmetric Key Encryptions (1).pptxMohamedNowfeek1
 
Improved authentication & key agreement protocol using elliptic curve cryptog...
Improved authentication & key agreement protocol using elliptic curve cryptog...Improved authentication & key agreement protocol using elliptic curve cryptog...
Improved authentication & key agreement protocol using elliptic curve cryptog...CAS
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptographyVaibhav Khanna
 
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESValerie Felton
 

Similar to Unit 4 (20)

Applying Security Algorithms Using openSSL crypto library
Applying Security Algorithms Using openSSL crypto libraryApplying Security Algorithms Using openSSL crypto library
Applying Security Algorithms Using openSSL crypto library
 
Data encryption
Data encryptionData encryption
Data encryption
 
Public-Key Cryptography.pptx
Public-Key Cryptography.pptxPublic-Key Cryptography.pptx
Public-Key Cryptography.pptx
 
Unit-III_3R-CRYPTO_2021-22_VSM.pptx
Unit-III_3R-CRYPTO_2021-22_VSM.pptxUnit-III_3R-CRYPTO_2021-22_VSM.pptx
Unit-III_3R-CRYPTO_2021-22_VSM.pptx
 
2. public key cryptography and RSA
2. public key cryptography and RSA2. public key cryptography and RSA
2. public key cryptography and RSA
 
5967073.ppt
5967073.ppt5967073.ppt
5967073.ppt
 
What is digital signature or DSC
What is digital signature or DSCWhat is digital signature or DSC
What is digital signature or DSC
 
information security(Public key encryption its characteristics and weakness, ...
information security(Public key encryption its characteristics and weakness, ...information security(Public key encryption its characteristics and weakness, ...
information security(Public key encryption its characteristics and weakness, ...
 
Cryptography
CryptographyCryptography
Cryptography
 
computer-security-and-cryptography-a-simple-presentation
computer-security-and-cryptography-a-simple-presentationcomputer-security-and-cryptography-a-simple-presentation
computer-security-and-cryptography-a-simple-presentation
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01
 
Analysis of Cryptography Techniques
Analysis of Cryptography TechniquesAnalysis of Cryptography Techniques
Analysis of Cryptography Techniques
 
Lesson 04 - Symmetric and Asymmetric Key Encryptions (1).pptx
Lesson 04 - Symmetric and Asymmetric Key Encryptions (1).pptxLesson 04 - Symmetric and Asymmetric Key Encryptions (1).pptx
Lesson 04 - Symmetric and Asymmetric Key Encryptions (1).pptx
 
Improved authentication & key agreement protocol using elliptic curve cryptog...
Improved authentication & key agreement protocol using elliptic curve cryptog...Improved authentication & key agreement protocol using elliptic curve cryptog...
Improved authentication & key agreement protocol using elliptic curve cryptog...
 
Security - ch3.pptx
Security - ch3.pptxSecurity - ch3.pptx
Security - ch3.pptx
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptography
 
Module2.pptx
Module2.pptxModule2.pptx
Module2.pptx
 
Crypography in c#
Crypography in c#Crypography in c#
Crypography in c#
 
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
 
Network security
Network securityNetwork security
Network security
 

More from abhishek srivastav (6)

Abhishek srivastava ppt_web_tech
Abhishek srivastava ppt_web_techAbhishek srivastava ppt_web_tech
Abhishek srivastava ppt_web_tech
 
Unit 5
Unit 5Unit 5
Unit 5
 
Unit 3
Unit 3Unit 3
Unit 3
 
Unit 2
Unit 2Unit 2
Unit 2
 
Unit1
Unit1Unit1
Unit1
 
Abhishek Srivastava (1)original (1)
Abhishek Srivastava (1)original (1)Abhishek Srivastava (1)original (1)
Abhishek Srivastava (1)original (1)
 

Recently uploaded

chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 

Recently uploaded (20)

chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 

Unit 4

  • 2. TABLE OF CONTENTS • We will be talking about... • • What is Encryption? • Why Do We Use Encryption? • How Does It Work? (x3) • Pros and Cons • Real Life Examples 1/9/17 ABHISHEK SRIVASTAVA (CSE)
  • 3. WHAT IS ENCRYPTION? • Encryption: The process of coding text • Decryption: The process of decoding text • Decryption is the opposite of encryption • • A security method used to protect data • Files on computers • Data being passed through the Internet • ATM machines • E-Commerce • Facebook password. 1/9/17 ABHISHEK SRIVASTAVA (CSE)
  • 4. WHY DO WE USE ENCRYPTION? To secure important information e.g. : • Health records • Credit card information • Student records • Etc. • • Prevents information from getting stolen or read • • Without encryption, there is no reliable security 1/9/17 ABHISHEK SRIVASTAVA (CSE)
  • 5. HOW DOES IT WORK? ● Encryption allows the sender to transform data from plain text into cipher text by using a key • Cipher text: coded text • Key: what is used to encrypt and decrypt text • Two different types of encryption: • Asymmetric encryption (Public key encryption) • Symmetric encryption • • Adrianna wants to send Melissa a message... 1/9/17 ABHISHEK SRIVASTAVA (CSE)
  • 6. REAL LIFE EXAMPLES ● Used in the military and the government ● ● Now used in everyday life: • Online banking • E-commerce • Student records, health records, tax records etc. • ATM machines • Social networking (emails, texts, instant messengers) • Businesses 1/9/17 ABHISHEK SRIVASTAVA (CSE)
  • 8. CONTENT • Data encryption definition. • Types of data encryption. • Difference between symmetric and asymmetric. • Encryption Methods. • Data Encryption Standard (DES). • Public Key Cryptosystem • • • • • 1/9/17 ABHISHEK SRIVASTAVA (CSE)
  • 9. DATA ENCRYPTION DEFINITION Data encryption refers to mathematical calculations and algorithmic schemes that transform plaintext into cypher text, a form that is non-readable to unauthorized parties. The recipient of an encrypted message uses a key which triggers the algorithm mechanism to decrypt the data, transforming it to the original plaintext version 1/9/17 ABHISHEK SRIVASTAVA (CSE)
  • 11. A public key encryption scheme has six ingredients • Plaintext • • encryption algorithm • • public and private key • • cipher text • • decryption algorithm 1/9/17 ABHISHEK SRIVASTAVA (CSE)
  • 12. TYPES OF DATA ENCRYPTION • In symmetric (Single key): The encryption and decryption keys are the same. • 1/9/17 ABHISHEK SRIVASTAVA (CSE)
  • 13. A SYMMETRIC ENCRYPTION SCHEME HAS FIVE INGREDIENTS Plaintext • Encryption Algorithm • Secret key • Cipher Text • Decryption 1/9/17 ABHISHEK SRIVASTAVA (CSE)
  • 14. . • In asymmetric (two keys): • The encryption and decryption keys are different. • 1/9/17 ABHISHEK SRIVASTAVA (CSE)
  • 16. DIFFERENCE B/W ASYMMETRIC & SYMMETRIC ENCRYPTION • The symmetric one key is used for symmetric and a symmetric but in asymmetric different keys are use for encryption and description. • In symmetric, sender and receiver must share the algorithm and key but in a symmetric sender and receiver must have one matched pair of keys. • In symmetric key must be kept secret but in asymmetric two keys must of kept secret. 1/9/17 ABHISHEK SRIVASTAVA (CSE)
  • 17. PUBLIC KEY CRYPTOGRAPHY • A form of cryptography in which the key used to encrypt a message differs from the key used to decrypt it. • In public key cryptography, a user has a pair of cryptographic keys—a public key and a private key. The private key is kept secret, while the public key may be widely distributed. • The two main branches of public key cryptography are: 1. Public key encryption 2. Digital signatures 1/9/17 ABHISHEK SRIVASTAVA (CSE)
  • 18. PUBLIC KEY ENCRYPTION A message encrypted with a recipient's public key cannot be decrypte by anyone except the recipient possessing the corresponding private key. • ContdContd.. Actual algorithms - two linked keys: 1/9/17 ABHISHEK SRIVASTAVA (CSE)
  • 19. KEY TERMS Public and private keys: This is a pair of keys that have been selected so that if one is used for encryption, the other is used for decryption. The exact transformations performed by the algorithm depend on the public or private key that is provided as input. Cipher text: This is the scrambled message produced as output. It depends on the plaintext and the key. For a given message, two different keys will produce two different cipher texts. 1/9/17 ABHISHEK SRIVASTAVA (CSE)
  • 20. A GENERAL APPROACH ContdContd..1/9/17 ABHISHEK SRIVASTAVA (CSE)
  • 21. Step 1 : Each user generates a pair of keys to be used for the encryption and decryption of messages. Step 2 : Each user places public key in a public register or other accessible file. As encryption figure suggests, each user maintains a collection of public keys obtained from others. Step 3 : If user1 wishes to send a confidential message to user2, user1 encrypts the message using user2's public key. Step 4 : When user1 receives the message, he decrypts it using his private key. No other recipient can decrypt the message because only user1 knows his private key 1/9/17 ABHISHEK SRIVASTAVA (CSE)
  • 22. Authentication & security: • There is some source A that produces a message in plaintext, X =[X1, X2,..., XM,]. The M elements of X are letters in some finite alphabet. The message is intended for destination B. B generates a related pair of keys: a public key, PUb, and a private key, PRb. PRb is known only to B, whereas PUb is publicly available. • • A generates another pair of keys: a public key, PUa, and a private key, PRa. PRa is known only to A, whereas PUa is publicly available. Contd.Contd.1/9/17 ABHISHEK SRIVASTAVA (CSE)
  • 23. SECRECY IN A PUBLIC KEY ENCRYPTION : Step 1:Step 1: A encrypt the massage using B’s public key PUb andA encrypt the massage using B’s public key PUb and send it to B.send it to B. With the message X and the encryption key PUb asWith the message X and the encryption key PUb as input, A forms the cipher text Y = [Y1, Y2,..., YN]:input, A forms the cipher text Y = [Y1, Y2,..., YN]: Step 2:Step 2: B decrypt the massage using it’s private key PRb.B decrypt the massage using it’s private key PRb. Using it’s private key PRb and the cipher text Y itUsing it’s private key PRb and the cipher text Y it obtain the original massage Xobtain the original massage X 1/9/17 ABHISHEK SRIVASTAVA (CSE)
  • 24. Authentication In A Public Key Encryption : Step 1:Step 1: A prepares a message to B and encrypts it usingA prepares a message to B and encrypts it using A's private key before transmitting it.A's private key before transmitting it. Step 2:Step 2: B can decrypt the message using A's public key.B can decrypt the message using A's public key. Because the message was encrypted using A'sBecause the message was encrypted using A's private key, only A could have prepared theprivate key, only A could have prepared the message.message. 1/9/17 ABHISHEK SRIVASTAVA (CSE)
  • 25. Comparing Secrecy and Authentication • In authentication technique :It is impossible to alter the message without access to A's private key, so the message is authenticated both in terms of source and in terms of data integrity. But secrecy doesn't provide this advantage. • • • Thus the authentication is much more confidential and secure in terms of alteration of the massage. 1/9/17 ABHISHEK SRIVASTAVA (CSE)
  • 27. DIGITAL SIGNATURE • An authentication mechanism that enables the creator of a message to attach a code that acts as a signature. • In situations where there is not complete trust between sender and receiver, something more than authentication is needed. • 1. It must verify the author and the date and time of the signature. • 2. It must to authenticate the contents at the time of the signature. • 3. It must be verifiable by third parties, to resolve disputes. • Thus, the digital signature function includes the authentication function. • A variety of approaches has been proposed for the digital signature function. These approaches fall into two categories: direct and arbitrated 1/9/17 ABHISHEK SRIVASTAVA (CSE)
  • 28. Direct Digital Signature : The direct digital signature involves only the communicating parties (source, destination). It is assumed that the destination knows the public key of the source. A digital signature may be formed by encrypting the entire message with the sender's private key or by encrypting a hash code of the message with the sender's private key. 1/9/17 ABHISHEK SRIVASTAVA (CSE)
  • 29. Arbitrated Digital Signature : • The problems associated with direct digital signatures can be addressed by using an arbiter. • As with direct signature schemes, there is a variety of arbitrated signature schemes. In general terms, they all operate as follows. Every signed message from a sender X to a receiver Y goes first to an arbiter A, which check it’s origin and context and then sent to Y. • 1/9/17 ABHISHEK SRIVASTAVA (CSE)
  • 30. Applications For Public-key Cryptosystems Public key cryptosystem used in many systems such as: 1.Decision support system 2. RSA Algorithm 3. Elliptic Curve 4. Diffie-Hellman key exchange 1/9/17 ABHISHEK SRIVASTAVA (CSE)
  • 31. COMPUTATIONAL COST • It is computationally easy for a party B to generate a pair (public key PUb, private key PRb). • It is computationally easy for a sender A, knowing the public key and the message to be encrypted, M, to generate the corresponding cipher text: • C = E(PUb, M) • It is computationally easy for the receiver B to decrypt the resulting cipher text using the private key to recover the original message: • M = D(PRb, C) = D[PRb, E(PUb, M)] • It is computationally infeasible for an adversary, knowing the public key, PUb, to determine the private key, PRb. • 1/9/17 ABHISHEK SRIVASTAVA (CSE)
  • 32. WEAKNESSES ComputatioComputatio nal costnal cost Keys in public-key cryptography, due to theirKeys in public-key cryptography, due to their unique nature, are more computationally costlyunique nature, are more computationally costly than their counterparts in secret-keythan their counterparts in secret-key cryptography.cryptography. VulnerableVulnerable to bruteto brute forceforce attacksattacks Keys in asymmetric cryptography are moreKeys in asymmetric cryptography are more vulnerable to brute force attacks than in secret-vulnerable to brute force attacks than in secret- key cryptography.key cryptography. VulnerableVulnerable to the manto the man in thein the middlemiddle attackattack Public-key cryptography also has vulnerabilitiesPublic-key cryptography also has vulnerabilities to attacks such as the man in the middle attack.to attacks such as the man in the middle attack. In this situation, a malicious third partyIn this situation, a malicious third party intercepts a public key on its way to one of theintercepts a public key on its way to one of the parties involvedparties involved 1/9/17 ABHISHEK SRIVASTAVA (CSE)

Editor's Notes

  1. Encryption: The process of coding text into a secret code which is made up of a jumble of letters, numbers, and symbols that no one can read. Decryption: The process of decoding text from a secret code into regular readable text. A security method used to protect a computer from getting hacked by a third party. Encryption can protect: -Files on computers -Data being passed through the internet such as: ATM machines (because a PIN is passing through one machine to another, if it was not encrypted someone could extract it), E-Commerce (because when credit card information is given to the company that's making business, a hacker could easily steal the credit card number so they can steal money if the number isn't encrypted) In the diagram, it shows a Facebook password getting encrypted into coded text, and then decrypted into the regular readable text.
  2. Because the majority of people these days use the Internet to communicate, purchase products etc. They want to protect their information from being viewed by an unwanted third party. No one wants their credit card information being revealed to others. Encryption prevents this personal information from getting stolen or read. If a hacker came across the information, he/she wouldn't understand the encrypted data. Without encryption, you have really no security. It's like writing a secret on a postcard to a friend. While it is being delivered, any mailman could just read it and know what you wrote.
  3. Encryption allows the sender of the data to transform the data from plain text into ciphertext by using a key Ciphertext: it is the result of your text after it is encrypted. It is coded text made up of a mix of letters, numbers and symbols. Key: an encryption key is used to encrypt and decrypt text. It's like locking and unlocking a door. There are two different types of encryption: Asymmetric encryption (public key encryption): It uses two different keys, public and private to encrypt and decrypt data. Symmetric encryption: it uses two of the same keys, or a pair of keys to encrypt and decrypt data. We will talk about these two types of encryption throughout the next couple of slides. Both of these examples of encryption will be associated if Adrianna wants to send a message to me (Melissa)...
  4. Used in the military and the government to protect secrets from intruders. In the military when they deliver a message, they encrypt it so the enemy won't find out what their plans are. Used in everyday life for: -online banking: to protect your credit card numbers/debit numbers etc. -E-commerce: to protect any personal information (i.e. Any payment numbers, addresses, postal codes, phone numbers, emails etc.) -student records: to protect your student information from being tampered with. -ATM machines: Protect PIN's from being stolen -Social networking: protect conversations and passwords from being stolen. -Businesses: Keeping information secret from rival companies