SlideShare a Scribd company logo
1 of 27
Cryptography
An Introduction
"The art of writing and solving codes"
Internet provides essential communication between tens of millions of
people and is being increasingly used as a tool for commerce, security
becomes a tremendously important issue to deal with.
There are many aspects to security and many applications, ranging from
secure commerce and payments to private communications and protecting
passwords. One essential aspect for secure communications is that of
cryptography. But it is important to note that while cryptography is
necessary for secure communications, it is not by itself sufficient.
Antiquity
 The first documented use of cryptography in writing dates back to
Circa 1900 BC when an Egyptian scribe used non standard hieroglyphs
in an inscription. Some experts argue that cryptography appear
spontaneously sometimes after writing was invented with applications
ranging from diplomatic missives to war-time battle plans.
 Its real era started from World War II when Germany was about to
take over Great Britain, Germany used a device named "Enigma" to
send their messages secretly to their war zones. In reply GBR created
a device named "Turing Machine" by Alan Turing to decrypt or break
Enigma which resulted in saving GBR.
Greek Etymology
 Cryptography
- Crypto -----> "Kryptos" --------> Hidden
- Graphy -----> "Graphein" -------> To Write
Encryption: The translation of data into secret
code.
Decryption: The translation of secret code into
original data.
The Caesar Cipher!
Plaintext: THE QUICK BROWN FOX JUMPS OVER THE LAZY DOG
Ciphertext: WKH TXLFN EURZQ IRA MXPSV RYHU WKH ODCB GRJ
 Encryption:
E(x) = (x + n) mod 26
 Decryption:
D(x) = (x - n) mod 26
Hiding Password
Password
Encryption
Key: Shift 1
Key to right
,U[SDDEPTF
Decryption
Key: Read 1
Key to left
Splinter Cipher!
Exxegoexsrgi
Decryption Key:
Shift Gear 4
AttackAtOnce
Encryption Key:
Shift Gear 4
Splinter Vegenere Cipher!
B
• 1
Q
• 16
R
• 17
ATTACKATONCE OATMEALOATME OTMMGKLHDTIR
What in the world is OTP?
Prime Numbers!
How to find a Prime Number?
Immortal are Prime Numbers.
Prime Numbers and Cryptography.
New Prime Number??
Methods to find
Prime Numbers
A Multiplicative
Sieve
The Prime
Number Machine
The Sieve of
Erastothenes
The Sieve of Erastothenes
Let's consider a table of sequential numbers
start
2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21
,22,23,24,25,26,27,28,29,30,31,32....
The Sieve of Erastothenes
Cross out multiple of 2
2, 3, X, 5, X, 7, X, 9, X, 11, X, 13....
The Sieve of Erastothenes
The next non-overlined and non crossed out
number is three. Identify it as prime with an
overline, then cross out every third number
(every multiple of three).
2, 3, X, 5, XX, 7, X, X, X, 11, XX, 13 ...
The Sieve of Erastothenes
Continuing the process. Five is the next non-
overlined and non crossed out number. Overline
five and cross out every fifth number.
2, 3, X, 5, XX, 7, X, X, X, 11, XX, 13 ...
The Sieve of Erastothenes
The next prime number is then seven. Since
twice seven is greater than the largest visible
number in our list, all the remaining visible
numbers are prime.
2, 3, X, 5, XX, 7, X, XX, X, 11, XX, 13 ...
The Sieve of Erastothenes
Drawbacks
 The process is too slow
 Not efficient for finding huge primes.
Euclid’S Element
 The statement says that
“There are more than any finite number n of prime
numbers. Suppose that a1, a2, ..., an are prime numbers. Let
m be the product of all considered prime numbers. Consider
the number m + 1. If it's prime, then there are at least n + 1
primes.”
 So suppose m + 1 is not prime. Then, some prime g divides it.
But g cannot be any of the primes a1, a2, ..., an , since they
all divide m and do not divide m + 1. Therefore, there are at
least n + 1 primes.
 Thus, there are not a finite number of primes.
Euclid's Element
RSA
How to make sure that my data is save on the internet?
How to make sure that only an authorized person gets
my secret message?
The RSA model is the correct choice!
RSA Stands for Ron Rivest, Adi Shamir , Leonard
Adleman.
RSA
RSA is a consequence of Fermat's little theorem:
"If 'a' is not divisible by 'p' , where p is prime,
then a^(p-1) -1 is divisible by 'p'.
The Work Flow
 Generate two large random prime numbers p and q
 Find n = p*q
 Find phi = (p-1)*(q-1)
 Choose an integer e, 1 < e < phi such that GCD (e, phi) = 1
 Compute the secret exponent d, 1 < d < phi, such that e.d = 1
(mod phi)
 The public key is (n, e) and the private key is (d, p, q)
 All the values d, p, q and phi are kept secret.
The Work Flow
Select p
and q
n= p*q
phi= (p-1) *
(q-1)
e*d= 1
(mod phi)
C =
(msg)^e
mod n
Message =
(C)^d mod
n
Example
 P = 3 and Q = 11
 n = p*q = 33
 Phi = (p-1) * (q-1) = (3-1) * (11-1) = 20
 e = 7 and d =3 -------------> (3*7) mod 20 = 1
 Public Key (7, 33) and Private Key (3, 33)
 m = 13
 Encrypt: c = m^e mod n -------> c = 13^7 mod 33 = 7
 Decrypt: m = c^d mod n ---------> 7^8 mod 33 = 13
• How to break RSA?
• First we have to find p and q
• Solve the equation to find 'd'
Why is it difficult to get the decryption key?
Factoring the huge number to prime
number takes a lot of computation
Then there can be number of multiples of
N, so might be guessing on wrong number.
Presented By
Talha Saleem
Mohammad Owais

More Related Content

What's hot

Modular arithmetic
Modular arithmeticModular arithmetic
Modular arithmeticJanani S
 
Application of mathematics in CSE
Application of mathematics in CSEApplication of mathematics in CSE
Application of mathematics in CSETareque Rahman
 
Predicate Logic
Predicate LogicPredicate Logic
Predicate Logicgiki67
 
Application of matrices in real life and matrix
Application of matrices in real life and matrixApplication of matrices in real life and matrix
Application of matrices in real life and matrixDarshDobariya
 
Number theory
Number theory Number theory
Number theory tes31
 
Number Theory In Cryptography
Number Theory In CryptographyNumber Theory In Cryptography
Number Theory In CryptographyAadya Vatsa
 
Application of discrete mathematics in IT
Application of discrete mathematics in ITApplication of discrete mathematics in IT
Application of discrete mathematics in ITShahidAbbas52
 
Number theory and cryptography
Number theory and cryptographyNumber theory and cryptography
Number theory and cryptographyYasser Ali
 
Application of linear algebra in cse
Application of linear algebra in cseApplication of linear algebra in cse
Application of linear algebra in cseArnob Khan
 
Linear Algebra Applications
Linear Algebra ApplicationsLinear Algebra Applications
Linear Algebra ApplicationsRamesh Shashank
 
cryptography Application of linear algebra
cryptography Application of linear algebra cryptography Application of linear algebra
cryptography Application of linear algebra Sami Ullah
 
Applications of mathematics in real life
Applications of mathematics in real lifeApplications of mathematics in real life
Applications of mathematics in real lifeThasneemRazia
 
Application of Matrices in real life | Matrices application | The Matrices
Application of Matrices in real life | Matrices application | The MatricesApplication of Matrices in real life | Matrices application | The Matrices
Application of Matrices in real life | Matrices application | The MatricesSahilJhajharia
 

What's hot (20)

Modular arithmetic
Modular arithmeticModular arithmetic
Modular arithmetic
 
Mathematics:Cryptography
Mathematics:CryptographyMathematics:Cryptography
Mathematics:Cryptography
 
Application of mathematics in CSE
Application of mathematics in CSEApplication of mathematics in CSE
Application of mathematics in CSE
 
Predicate Logic
Predicate LogicPredicate Logic
Predicate Logic
 
Number theory
Number theoryNumber theory
Number theory
 
Number theory
Number theoryNumber theory
Number theory
 
Application of matrices in real life and matrix
Application of matrices in real life and matrixApplication of matrices in real life and matrix
Application of matrices in real life and matrix
 
Number theory
Number theory Number theory
Number theory
 
Number Theory In Cryptography
Number Theory In CryptographyNumber Theory In Cryptography
Number Theory In Cryptography
 
Application of discrete mathematics in IT
Application of discrete mathematics in ITApplication of discrete mathematics in IT
Application of discrete mathematics in IT
 
Number theory and cryptography
Number theory and cryptographyNumber theory and cryptography
Number theory and cryptography
 
Application of linear algebra in cse
Application of linear algebra in cseApplication of linear algebra in cse
Application of linear algebra in cse
 
Linear Algebra Applications
Linear Algebra ApplicationsLinear Algebra Applications
Linear Algebra Applications
 
cryptography Application of linear algebra
cryptography Application of linear algebra cryptography Application of linear algebra
cryptography Application of linear algebra
 
Applications of linear algebra in field of it
Applications of linear algebra in field of itApplications of linear algebra in field of it
Applications of linear algebra in field of it
 
Applications of mathematics in real life
Applications of mathematics in real lifeApplications of mathematics in real life
Applications of mathematics in real life
 
Maths in Our Daily Life
Maths in Our Daily LifeMaths in Our Daily Life
Maths in Our Daily Life
 
Tree (Data Structure & Discrete Mathematics)
Tree (Data Structure & Discrete Mathematics)Tree (Data Structure & Discrete Mathematics)
Tree (Data Structure & Discrete Mathematics)
 
Cryptography
CryptographyCryptography
Cryptography
 
Application of Matrices in real life | Matrices application | The Matrices
Application of Matrices in real life | Matrices application | The MatricesApplication of Matrices in real life | Matrices application | The Matrices
Application of Matrices in real life | Matrices application | The Matrices
 

Similar to Cryptography: An Introduction to the Fundamentals of Encryption and Decryption

11 Applied_Mathemathics HANDBOOK.pdf
11 Applied_Mathemathics HANDBOOK.pdf11 Applied_Mathemathics HANDBOOK.pdf
11 Applied_Mathemathics HANDBOOK.pdfVipinNegi38
 
Senior Research Final Draft3
Senior Research Final Draft3Senior Research Final Draft3
Senior Research Final Draft3Coleman Gorham
 
Number Theory In Cryptography
Number Theory In CryptographyNumber Theory In Cryptography
Number Theory In CryptographyAbhishek Nand
 
Mathematics Towards Elliptic Curve Cryptography-by Dr. R.Srinivasan
Mathematics Towards Elliptic Curve Cryptography-by Dr. R.SrinivasanMathematics Towards Elliptic Curve Cryptography-by Dr. R.Srinivasan
Mathematics Towards Elliptic Curve Cryptography-by Dr. R.Srinivasanmunicsaa
 
Homomorphic Encryption
Homomorphic EncryptionHomomorphic Encryption
Homomorphic EncryptionGöktuğ Serez
 
Primes: a quick tour to spplications and challenges!
Primes: a quick tour to spplications and challenges!Primes: a quick tour to spplications and challenges!
Primes: a quick tour to spplications and challenges!Ashutosh Tripathi
 
introduction to cryptography (basics of it)
introduction to cryptography (basics of it)introduction to cryptography (basics of it)
introduction to cryptography (basics of it)neonaveen
 

Similar to Cryptography: An Introduction to the Fundamentals of Encryption and Decryption (20)

11 Applied_Mathemathics HANDBOOK.pdf
11 Applied_Mathemathics HANDBOOK.pdf11 Applied_Mathemathics HANDBOOK.pdf
11 Applied_Mathemathics HANDBOOK.pdf
 
Senior Research Final Draft3
Senior Research Final Draft3Senior Research Final Draft3
Senior Research Final Draft3
 
Number Theory In Cryptography
Number Theory In CryptographyNumber Theory In Cryptography
Number Theory In Cryptography
 
Rsa
RsaRsa
Rsa
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Mathematics Towards Elliptic Curve Cryptography-by Dr. R.Srinivasan
Mathematics Towards Elliptic Curve Cryptography-by Dr. R.SrinivasanMathematics Towards Elliptic Curve Cryptography-by Dr. R.Srinivasan
Mathematics Towards Elliptic Curve Cryptography-by Dr. R.Srinivasan
 
Homomorphic Encryption
Homomorphic EncryptionHomomorphic Encryption
Homomorphic Encryption
 
Primes: a quick tour to spplications and challenges!
Primes: a quick tour to spplications and challenges!Primes: a quick tour to spplications and challenges!
Primes: a quick tour to spplications and challenges!
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
crypto1.ppt
crypto1.pptcrypto1.ppt
crypto1.ppt
 
introduction to cryptography (basics of it)
introduction to cryptography (basics of it)introduction to cryptography (basics of it)
introduction to cryptography (basics of it)
 
crypto.ppt
crypto.pptcrypto.ppt
crypto.ppt
 
needed.ppt
needed.pptneeded.ppt
needed.ppt
 

Recently uploaded

Analytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptxAnalytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptxSwapnil Therkar
 
Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )aarthirajkumar25
 
Analytical Profile of Coleus Forskohlii | Forskolin .pdf
Analytical Profile of Coleus Forskohlii | Forskolin .pdfAnalytical Profile of Coleus Forskohlii | Forskolin .pdf
Analytical Profile of Coleus Forskohlii | Forskolin .pdfSwapnil Therkar
 
Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Patrick Diehl
 
VIRUSES structure and classification ppt by Dr.Prince C P
VIRUSES structure and classification ppt by Dr.Prince C PVIRUSES structure and classification ppt by Dr.Prince C P
VIRUSES structure and classification ppt by Dr.Prince C PPRINCE C P
 
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Biological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfBiological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfmuntazimhurra
 
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfBehavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfSELF-EXPLANATORY
 
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCESTERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCEPRINCE C P
 
Orientation, design and principles of polyhouse
Orientation, design and principles of polyhouseOrientation, design and principles of polyhouse
Orientation, design and principles of polyhousejana861314
 
Isotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on IoIsotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on IoSérgio Sacani
 
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.aasikanpl
 
Grafana in space: Monitoring Japan's SLIM moon lander in real time
Grafana in space: Monitoring Japan's SLIM moon lander  in real timeGrafana in space: Monitoring Japan's SLIM moon lander  in real time
Grafana in space: Monitoring Japan's SLIM moon lander in real timeSatoshi NAKAHIRA
 
Cultivation of KODO MILLET . made by Ghanshyam pptx
Cultivation of KODO MILLET . made by Ghanshyam pptxCultivation of KODO MILLET . made by Ghanshyam pptx
Cultivation of KODO MILLET . made by Ghanshyam pptxpradhanghanshyam7136
 
Disentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTDisentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTSérgio Sacani
 
zoogeography of pakistan.pptx fauna of Pakistan
zoogeography of pakistan.pptx fauna of Pakistanzoogeography of pakistan.pptx fauna of Pakistan
zoogeography of pakistan.pptx fauna of Pakistanzohaibmir069
 
Animal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptxAnimal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptxUmerFayaz5
 
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Sérgio Sacani
 

Recently uploaded (20)

Analytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptxAnalytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptx
 
9953056974 Young Call Girls In Mahavir enclave Indian Quality Escort service
9953056974 Young Call Girls In Mahavir enclave Indian Quality Escort service9953056974 Young Call Girls In Mahavir enclave Indian Quality Escort service
9953056974 Young Call Girls In Mahavir enclave Indian Quality Escort service
 
Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )
 
Analytical Profile of Coleus Forskohlii | Forskolin .pdf
Analytical Profile of Coleus Forskohlii | Forskolin .pdfAnalytical Profile of Coleus Forskohlii | Forskolin .pdf
Analytical Profile of Coleus Forskohlii | Forskolin .pdf
 
The Philosophy of Science
The Philosophy of ScienceThe Philosophy of Science
The Philosophy of Science
 
Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?
 
VIRUSES structure and classification ppt by Dr.Prince C P
VIRUSES structure and classification ppt by Dr.Prince C PVIRUSES structure and classification ppt by Dr.Prince C P
VIRUSES structure and classification ppt by Dr.Prince C P
 
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
 
Biological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfBiological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdf
 
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfBehavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
 
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCESTERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
 
Orientation, design and principles of polyhouse
Orientation, design and principles of polyhouseOrientation, design and principles of polyhouse
Orientation, design and principles of polyhouse
 
Isotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on IoIsotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on Io
 
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
 
Grafana in space: Monitoring Japan's SLIM moon lander in real time
Grafana in space: Monitoring Japan's SLIM moon lander  in real timeGrafana in space: Monitoring Japan's SLIM moon lander  in real time
Grafana in space: Monitoring Japan's SLIM moon lander in real time
 
Cultivation of KODO MILLET . made by Ghanshyam pptx
Cultivation of KODO MILLET . made by Ghanshyam pptxCultivation of KODO MILLET . made by Ghanshyam pptx
Cultivation of KODO MILLET . made by Ghanshyam pptx
 
Disentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTDisentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOST
 
zoogeography of pakistan.pptx fauna of Pakistan
zoogeography of pakistan.pptx fauna of Pakistanzoogeography of pakistan.pptx fauna of Pakistan
zoogeography of pakistan.pptx fauna of Pakistan
 
Animal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptxAnimal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptx
 
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
 

Cryptography: An Introduction to the Fundamentals of Encryption and Decryption

  • 2. An Introduction "The art of writing and solving codes" Internet provides essential communication between tens of millions of people and is being increasingly used as a tool for commerce, security becomes a tremendously important issue to deal with. There are many aspects to security and many applications, ranging from secure commerce and payments to private communications and protecting passwords. One essential aspect for secure communications is that of cryptography. But it is important to note that while cryptography is necessary for secure communications, it is not by itself sufficient.
  • 3. Antiquity  The first documented use of cryptography in writing dates back to Circa 1900 BC when an Egyptian scribe used non standard hieroglyphs in an inscription. Some experts argue that cryptography appear spontaneously sometimes after writing was invented with applications ranging from diplomatic missives to war-time battle plans.  Its real era started from World War II when Germany was about to take over Great Britain, Germany used a device named "Enigma" to send their messages secretly to their war zones. In reply GBR created a device named "Turing Machine" by Alan Turing to decrypt or break Enigma which resulted in saving GBR.
  • 4. Greek Etymology  Cryptography - Crypto -----> "Kryptos" --------> Hidden - Graphy -----> "Graphein" -------> To Write Encryption: The translation of data into secret code. Decryption: The translation of secret code into original data.
  • 5. The Caesar Cipher! Plaintext: THE QUICK BROWN FOX JUMPS OVER THE LAZY DOG Ciphertext: WKH TXLFN EURZQ IRA MXPSV RYHU WKH ODCB GRJ  Encryption: E(x) = (x + n) mod 26  Decryption: D(x) = (x - n) mod 26
  • 6. Hiding Password Password Encryption Key: Shift 1 Key to right ,U[SDDEPTF Decryption Key: Read 1 Key to left
  • 7. Splinter Cipher! Exxegoexsrgi Decryption Key: Shift Gear 4 AttackAtOnce Encryption Key: Shift Gear 4
  • 8. Splinter Vegenere Cipher! B • 1 Q • 16 R • 17 ATTACKATONCE OATMEALOATME OTMMGKLHDTIR
  • 9. What in the world is OTP?
  • 10. Prime Numbers! How to find a Prime Number? Immortal are Prime Numbers. Prime Numbers and Cryptography. New Prime Number??
  • 11. Methods to find Prime Numbers A Multiplicative Sieve The Prime Number Machine The Sieve of Erastothenes
  • 12. The Sieve of Erastothenes Let's consider a table of sequential numbers start 2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21 ,22,23,24,25,26,27,28,29,30,31,32....
  • 13. The Sieve of Erastothenes Cross out multiple of 2 2, 3, X, 5, X, 7, X, 9, X, 11, X, 13....
  • 14. The Sieve of Erastothenes The next non-overlined and non crossed out number is three. Identify it as prime with an overline, then cross out every third number (every multiple of three). 2, 3, X, 5, XX, 7, X, X, X, 11, XX, 13 ...
  • 15. The Sieve of Erastothenes Continuing the process. Five is the next non- overlined and non crossed out number. Overline five and cross out every fifth number. 2, 3, X, 5, XX, 7, X, X, X, 11, XX, 13 ...
  • 16. The Sieve of Erastothenes The next prime number is then seven. Since twice seven is greater than the largest visible number in our list, all the remaining visible numbers are prime. 2, 3, X, 5, XX, 7, X, XX, X, 11, XX, 13 ...
  • 17. The Sieve of Erastothenes Drawbacks  The process is too slow  Not efficient for finding huge primes.
  • 18. Euclid’S Element  The statement says that “There are more than any finite number n of prime numbers. Suppose that a1, a2, ..., an are prime numbers. Let m be the product of all considered prime numbers. Consider the number m + 1. If it's prime, then there are at least n + 1 primes.”  So suppose m + 1 is not prime. Then, some prime g divides it. But g cannot be any of the primes a1, a2, ..., an , since they all divide m and do not divide m + 1. Therefore, there are at least n + 1 primes.  Thus, there are not a finite number of primes.
  • 20. RSA How to make sure that my data is save on the internet? How to make sure that only an authorized person gets my secret message? The RSA model is the correct choice! RSA Stands for Ron Rivest, Adi Shamir , Leonard Adleman.
  • 21. RSA RSA is a consequence of Fermat's little theorem: "If 'a' is not divisible by 'p' , where p is prime, then a^(p-1) -1 is divisible by 'p'.
  • 22. The Work Flow  Generate two large random prime numbers p and q  Find n = p*q  Find phi = (p-1)*(q-1)  Choose an integer e, 1 < e < phi such that GCD (e, phi) = 1  Compute the secret exponent d, 1 < d < phi, such that e.d = 1 (mod phi)  The public key is (n, e) and the private key is (d, p, q)  All the values d, p, q and phi are kept secret.
  • 23. The Work Flow Select p and q n= p*q phi= (p-1) * (q-1) e*d= 1 (mod phi) C = (msg)^e mod n Message = (C)^d mod n
  • 24. Example  P = 3 and Q = 11  n = p*q = 33  Phi = (p-1) * (q-1) = (3-1) * (11-1) = 20  e = 7 and d =3 -------------> (3*7) mod 20 = 1  Public Key (7, 33) and Private Key (3, 33)  m = 13  Encrypt: c = m^e mod n -------> c = 13^7 mod 33 = 7  Decrypt: m = c^d mod n ---------> 7^8 mod 33 = 13
  • 25. • How to break RSA? • First we have to find p and q • Solve the equation to find 'd'
  • 26. Why is it difficult to get the decryption key? Factoring the huge number to prime number takes a lot of computation Then there can be number of multiples of N, so might be guessing on wrong number.