SlideShare a Scribd company logo
1 of 44
Information Security
Week 3
Ingredients of Symmetric Encryption:
• Plain Text : An original / intelligible message or data
• Cipher text: coded message
• Enciphering/Encryption: process of converting plain text to cipher
text
• Deciphering/ Decryption: restoring the plain text from the ciphertext
• Key: the secret material used for performing encryption
Introduction to Crypto-terminologies
• Cryptography is an important aspect when we deal with network
security. ‘Crypto’ means secret or hidden. Cryptography is the science
of secret writing with the intention of keeping the data secret.
Cryptanalysis, on the other hand, is the science or sometimes the art
of breaking cryptosystems. These both terms are a subset of what is
called as Cryptology.
Classification –
The flowchart depicts that
cryptology is only one of the
factors involved in securing
networks. Cryptology refers to
study of codes, which involves
both writing (cryptography)
and solving (cryptanalysis)
them. Below is a classification
of the crypto-terminologies
and their various types.
1. Cryptography – • Cryptography is classified into symmetric cryptography, asymmetric
cryptography and hashing. Below are the description of these types.
Symmetric key
cryptography
• It involves usage of one secret
key along with encryption and
decryption algorithms which help
in securing the contents of the
message. The strength of
symmetric key cryptography
depends upon the number of key
bits. It is relatively faster than
asymmetric key cryptography.
There arises a key distribution
problem as the key has to be
transferred from the sender to
receiver through a secure
channel.
Asymmetric key
cryptography
• It is also known as public key cryptography because it
involves usage of a public key along with secret key. It
solves the problem of key distribution as both parties
uses different keys for encryption/decryption. It is not
feasible to use for decrypting bulk messages as it is
very slow compared to symmetric key cryptography.
Hashing –
It involves taking the plain-text and converting it to a
hash value of fixed size by a hash function. This
process ensures integrity of the message as the hash
value on both, sender’s and receiver’s side should
match if the message is unaltered.
Steganography:
• “covered writing,” in contrast with cryptography, which means “secret
writing.” Eg: writing with soap in cloth will be visible when we make it
wet.
Types of Operation for Encryption:
• Substitution: Replacing one entity with other
• Transposition: Shuffling the entities
2. Cryptanalysis –
Classical attacks
It can be divided into
a)Mathematical analysis
b) Brute-force attacks.
Brute-force attacks runs the encryption algorithm for all possible cases
of the keys until a match is found. Encryption algorithm is treated as a
black box. Analytical attacks are those attacks which focuses on
breaking the cryptosystem by analysing the internal structure of the
encryption algorithm.
Social Engineering attack –
It is something which is dependent on the human factor. Tricking
someone to reveal their passwords to the attacker or allowing access to
the restricted area comes under this attack. People should be cautious
when revealing their passwords to any third party which is not trusted.
Implementation attacks –
Implementation attacks such as side-channel analysis can be used to
obtain a secret key. They are relevant in cases where the attacker can
obtain physical access to the cryptosystem.
Symmetric Cipher Model
Ciphertext
Input
Decryption
algorithm
Secret key
Decryption
Plaintext
output
Plaintext
Input
Encryption
algorithm
Secret key
Encryption
Ciphertext
output
Symmetric Cipher Model
Plaintext: The original intelligible message or data that is fed into the
algorithm as input
Encryption algorithm: The encryption algorithm performs various
substitutions and transformations on the plaintext
Secret key: The secret key is also an input to the encryption algorithm
Ciphertext: The scrambled unintelligible message produced as output
Decryption algorithm: It takes the ciphertext and the secret key to
produce the original plaintext
Symmetric Cipher Model
Security Mathematics
•Encryption Y = E(K, X)
•Decryption X = D(K, Y)
Chipertext Plaintext
Secrete
key
Encryption
algorithm
Decryption
algorithm
Security Requirements
Strong encryption algorithm
Secret key should be secret (sender/receiver)
Symmetric Cipher Model
 Cryptology
1- Cryptography (enciphering)
2- Cryptanalysis (deciphering)
 Cryptanalyst (Opponent-Adversary-
Hacker)
Cryptography
Encryption techniques
Substitution techniques
Transposition techniques
Secret keys
Symmetric (single-key)
Asymmetric (two-key)
Plaintext processing
Block cipher (processes one block of input elements at a time)
Stream cipher (processes one of input elements at a time)
Cryptanalysis and Brute-Force Attack
Cryptanalysis ( plaintext-ciphertext pairs-
algorithm nature)
Brute-force attack (try possible keys)
 Objective recover the key
Cryptanalysis and Brute-Force
Attack
Unconditionally secure
Computationally secure
 Cost of breaking cipher > value of encrypted information
 Time of breaking cipher > lifetime of information
Classical Cryptographic Techniques
• have two basic components of classical
ciphers: substitution and transposition
• in substitution ciphers letters are replaced by other letters
• in transposition ciphers the letters are arranged in a different order
• these ciphers may be:
• monoalphabetic - only one substitution/ transposition is used, or
• polyalphabetic - where several substitutions/ transpositions are used
• several such ciphers may be concatentated together to form
a product cipher
Caesar Cipher - a monoalphabetic cipher
• replace each letter of message by a letter a fixed distance away eg use
the 3rd letter on
• reputedly used by Julius Caesar
• eg.
• L FDPH L VDZ L FRQTXHUHG
• I CAME I SAW I CONQUERED
Caesar Cipher - a monoalphabetic cipher
• ie mapping is
• ABCDEFGHIJKLMNOPQRSTUVWXYZ
• DEFGHIJKLMNOPQRSTUVWXYZABC
• can describe this cipher as:
• Encryption E_(k) : i -> i + k mod 26
• Decryption D_(k) : i -> i - k mod 26
Cryptanalysis of the Caesar Cipher
only have 26 possible ciphers
could simply try each in turn - exhaustive key search
GDUCUGQFRMPCNJYACJCRRCPQ
HEVDVHRGSNQDOKZBDKDSSDQR
Plain - IFWEWISHTOREPLACELETTERS
JGXFXJTIUPSFQMBDFMFUUFST
KHYGYKUJVQTGRNCEGNGVVGTU
Cipher - LIZHZLVKWRUHSODFHOHWWHUV
MJAIAMWLXSVITPEGIPIXXIVW
Cryptanalysis of the Caesar Cipher
• also can use letter frequency analysis
• Single Letter Double Letter Triple Letter
• E TH THE
• T HE AND
• R IN TIO
• N ER ATI
• I RE FOR
• O ON THA
• A AN TER
• S EN RES
Caesar Cipher
Plaintext: meet me after the party
Ciphertext: PHHW PH DIWHU WKH SDUWB
a b c d e f g h i j k l m n o p q r s t u v w x y z
D E F G H I G K L M N O P Q R S T U V W X Y Z A B C
• Letter 3rd letter
Gaius Julius Caesar: Roman Dictator, 1st century BC
Caesar Cipher
C = E(K, P) = (P + K) mod 26
P = D(K, C) = (C - K) mod 26
a b c d e f g h i j k l m
0 1 2 3 4 5 6 7 8 9 10 11 12
n o p q r s t u v w x y z
13 14 15 16 17 18 19 20 21 22 23 24 25
Playfair Cipher
• In this scheme, pairs of letters are encrypted,
instead of single letters as in the case of simple
substitution cipher.
• In playfair cipher, initially a key table is created. The
key table is a 5×5 grid of alphabets that acts as the
key for encrypting the plaintext. Each of the 25
alphabets must be unique and one letter of the
alphabet (usually J) is omitted from the table as we
need only 25 alphabets instead of 26. If the
plaintext contains J, then it is replaced by I.
• The sender and the receiver deicide on a particular
key, say ‘tutorials’. In a key table, the first
characters (going left to right) in the table is the
phrase, excluding the duplicate letters. The rest of
the table will be filled with the remaining letters of
the alphabet, in natural order. The key table works
out to be −
Playfair Cipher
• Process of Playfair Cipher
• First, a plaintext message is split into pairs of two letters (digraphs). If
there is an odd number of letters, a Z is added to the last letter. Let us
say we want to encrypt the message “hide money”. It will be written
as −
• HI DE MO NE YZ
• The rules of encryption are −
• If both the letters are in the same column, take the letter below each one
(going back to the top if at the bottom)
Rules for playfair cipher
T U O R I
‘H’ and ‘I’ are in
same column,
hence take letter
below them to
replace. HI → QC
A L S B C
D E F G H
K M N P Q
V W X Y Z
Rules for playfair cipher
• If both letters are in the same row, take the letter to the right of each
one (going back to the left if at the farthest right)
•T U O R I
‘D’ and ‘E’ are in
same row,
hence take
letter to the
right of them to
replace. DE →
EF
A L S B C
D E F G H
K M N P Q
V W X Y Z
Rules for playfair cipher
• If neither of the preceding two rules are true, form a rectangle with
the two letters and take the letters on the horizontal opposite corner
of the rectangle.
Hill Cipher
• Hill cipher is a polygraphic substitution cipher based on linear
algebra.Each letter is represented by a number modulo 26. Often the
simple scheme A = 0, B = 1, …, Z = 25 is used, but this is not an
essential feature of the cipher. To encrypt a message, each block of n
letters (considered as an n-component vector) is multiplied by an
invertible n × n matrix, against modulus 26. To decrypt the message,
each block is multiplied by the inverse of the matrix used for
encryption.
• The matrix used for encryption is the cipher key, and it should be
chosen randomly from the set of invertible n × n matrices (modulo
26).
Hill Cipher
• We have to encrypt the message ‘ACT’ (n=3).The key is ‘GYBNQKURP’
which can be written as the nxn matrix:
• The message ‘ACT’ is written as vector:
Hill Cipher
• The enciphered vector is given as:
• which corresponds to ciphertext of ‘POH’
Decryption
• To decrypt the message, we turn the ciphertext back into a vector,
then simply multiply by the inverse matrix of the key matrix
(IFKVIVVMI in letters).The inverse of the matrix used in the previous
example is:
Hill Cipher
• For the previous Ciphertext ‘POH’:
• which gives us back ‘ACT’.
Row Transposition cipher
• Given a plain-text message and a numeric key, cipher/de-cipher the
given text using Columnar Transposition Cipher
• The Columnar Transposition Cipher is a form of transposition cipher
just like Rail Fence Cipher. Columnar Transposition involves writing
the plaintext out in rows, and then reading the ciphertext off in
columns one by one.
Encryption
• In a transposition cipher, the order of the alphabets is re-arranged to obtain the cipher-
text.
• The message is written out in rows of a fixed length, and then read out again column by
column, and the columns are chosen in some scrambled order.
• Width of the rows and the permutation of the columns are usually defined by a keyword.
• For example, the word HACK is of length 4 (so the rows are of length 4), and the
permutation is defined by the alphabetical order of the letters in the keyword. In this
case, the order would be “3 1 2 4”.
• Any spare spaces are filled with nulls or left blank or placed by a character (Example: _).
• Finally, the message is read off in columns, in the order specified by the keyword.
•
Encryption
Decryption
• To decipher it, the recipient has to work out the column lengths by
dividing the message length by the key length.
• Then, write the message out in columns again, then re-order the
columns by reforming the key word.

More Related Content

What's hot

Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithmsAnamika Singh
 
AES effecitve software implementation
AES effecitve software implementationAES effecitve software implementation
AES effecitve software implementationRoman Oliynykov
 
CNIT 141: 6. Hash Functions
CNIT 141: 6. Hash FunctionsCNIT 141: 6. Hash Functions
CNIT 141: 6. Hash FunctionsSam Bowne
 
CNIT 141: 1. Encryption
CNIT 141: 1. EncryptionCNIT 141: 1. Encryption
CNIT 141: 1. EncryptionSam Bowne
 
Iaetsd an survey of efficient fpga implementation of advanced encryption
Iaetsd an survey of efficient fpga implementation of advanced encryptionIaetsd an survey of efficient fpga implementation of advanced encryption
Iaetsd an survey of efficient fpga implementation of advanced encryptionIaetsd Iaetsd
 
Implementation of Various Cryptosystem Using Chaos
Implementation of Various Cryptosystem Using ChaosImplementation of Various Cryptosystem Using Chaos
Implementation of Various Cryptosystem Using ChaosIOSR Journals
 
DConf 2016: Bitpacking Like a Madman by Amaury Sechet
DConf 2016: Bitpacking Like a Madman by Amaury SechetDConf 2016: Bitpacking Like a Madman by Amaury Sechet
DConf 2016: Bitpacking Like a Madman by Amaury SechetAndrei Alexandrescu
 
Huffman coding || Huffman Tree
Huffman coding || Huffman TreeHuffman coding || Huffman Tree
Huffman coding || Huffman TreeGurunadh Guru
 
LZ77 and LZ78 Compression Algorithms
LZ77 and LZ78 Compression AlgorithmsLZ77 and LZ78 Compression Algorithms
LZ77 and LZ78 Compression AlgorithmsMustafa GÖKÇE
 

What's hot (15)

694 lecture1aes
694 lecture1aes694 lecture1aes
694 lecture1aes
 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithms
 
AES effecitve software implementation
AES effecitve software implementationAES effecitve software implementation
AES effecitve software implementation
 
CNIT 141: 6. Hash Functions
CNIT 141: 6. Hash FunctionsCNIT 141: 6. Hash Functions
CNIT 141: 6. Hash Functions
 
CNIT 141: 1. Encryption
CNIT 141: 1. EncryptionCNIT 141: 1. Encryption
CNIT 141: 1. Encryption
 
Iaetsd an survey of efficient fpga implementation of advanced encryption
Iaetsd an survey of efficient fpga implementation of advanced encryptionIaetsd an survey of efficient fpga implementation of advanced encryption
Iaetsd an survey of efficient fpga implementation of advanced encryption
 
Implementation of Various Cryptosystem Using Chaos
Implementation of Various Cryptosystem Using ChaosImplementation of Various Cryptosystem Using Chaos
Implementation of Various Cryptosystem Using Chaos
 
DConf 2016: Bitpacking Like a Madman by Amaury Sechet
DConf 2016: Bitpacking Like a Madman by Amaury SechetDConf 2016: Bitpacking Like a Madman by Amaury Sechet
DConf 2016: Bitpacking Like a Madman by Amaury Sechet
 
Cyber security
Cyber securityCyber security
Cyber security
 
Topics:LZ77 & LZ78
Topics:LZ77 & LZ78Topics:LZ77 & LZ78
Topics:LZ77 & LZ78
 
Huffman coding || Huffman Tree
Huffman coding || Huffman TreeHuffman coding || Huffman Tree
Huffman coding || Huffman Tree
 
LZ77 and LZ78 Compression Algorithms
LZ77 and LZ78 Compression AlgorithmsLZ77 and LZ78 Compression Algorithms
LZ77 and LZ78 Compression Algorithms
 
Huffman Coding
Huffman CodingHuffman Coding
Huffman Coding
 
Loops in Python
Loops in PythonLoops in Python
Loops in Python
 
Demo learn python
Demo learn pythonDemo learn python
Demo learn python
 

Similar to Information security (Symmetric encryption, cryptography, crypto-analysis)

Information security powerpoint presentation
Information security powerpoint presentationInformation security powerpoint presentation
Information security powerpoint presentationMuneebZahid10
 
Symmetric Encryption Techniques
Symmetric Encryption Techniques Symmetric Encryption Techniques
Symmetric Encryption Techniques Dr. Kapil Gupta
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & SteganographyAnimesh Shaw
 
IS_Classical-Encryption-Techniques_5.pdf
IS_Classical-Encryption-Techniques_5.pdfIS_Classical-Encryption-Techniques_5.pdf
IS_Classical-Encryption-Techniques_5.pdfRameezRaja32147
 
Cryptography and network security Nit701
Cryptography and network security Nit701Cryptography and network security Nit701
Cryptography and network security Nit701Amit Pathak
 
EncryptionTechChap2.ppt
EncryptionTechChap2.pptEncryptionTechChap2.ppt
EncryptionTechChap2.pptrajirajesh8
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniquesJanani S
 
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere CipherCaesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere CipherMona Rajput
 
Cryptography and steganography lesson and discription.pptx
Cryptography and steganography lesson and discription.pptxCryptography and steganography lesson and discription.pptx
Cryptography and steganography lesson and discription.pptxRobertCarreonBula
 
Introduction to cryptography
Introduction to cryptographyIntroduction to cryptography
Introduction to cryptographymukesh prajapati
 
Cryptography (Revised Edition)
Cryptography (Revised Edition)Cryptography (Revised Edition)
Cryptography (Revised Edition)Somaditya Basak
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniquesDr.Florence Dayana
 
Secret key cryptography
Secret key cryptographySecret key cryptography
Secret key cryptographyPrabhat Goel
 
Cns 13f-lec03- Classical Encryption Techniques
Cns 13f-lec03- Classical Encryption TechniquesCns 13f-lec03- Classical Encryption Techniques
Cns 13f-lec03- Classical Encryption Techniquesbabak danyal
 
Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network SecurityClassical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Securitybabak danyal
 

Similar to Information security (Symmetric encryption, cryptography, crypto-analysis) (20)

Network security CS2
Network security CS2Network security CS2
Network security CS2
 
Information security powerpoint presentation
Information security powerpoint presentationInformation security powerpoint presentation
Information security powerpoint presentation
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
Module-1.pptx
Module-1.pptxModule-1.pptx
Module-1.pptx
 
Cns 1
Cns 1Cns 1
Cns 1
 
Symmetric Encryption Techniques
Symmetric Encryption Techniques Symmetric Encryption Techniques
Symmetric Encryption Techniques
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & Steganography
 
IS_Classical-Encryption-Techniques_5.pdf
IS_Classical-Encryption-Techniques_5.pdfIS_Classical-Encryption-Techniques_5.pdf
IS_Classical-Encryption-Techniques_5.pdf
 
Cryptography and network security Nit701
Cryptography and network security Nit701Cryptography and network security Nit701
Cryptography and network security Nit701
 
EncryptionTechChap2.ppt
EncryptionTechChap2.pptEncryptionTechChap2.ppt
EncryptionTechChap2.ppt
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere CipherCaesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
 
Cryptography and steganography lesson and discription.pptx
Cryptography and steganography lesson and discription.pptxCryptography and steganography lesson and discription.pptx
Cryptography and steganography lesson and discription.pptx
 
Introduction to cryptography
Introduction to cryptographyIntroduction to cryptography
Introduction to cryptography
 
Cryptography (Revised Edition)
Cryptography (Revised Edition)Cryptography (Revised Edition)
Cryptography (Revised Edition)
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
Secret key cryptography
Secret key cryptographySecret key cryptography
Secret key cryptography
 
Cns 13f-lec03- Classical Encryption Techniques
Cns 13f-lec03- Classical Encryption TechniquesCns 13f-lec03- Classical Encryption Techniques
Cns 13f-lec03- Classical Encryption Techniques
 
Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network SecurityClassical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Security
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 

More from Zara Nawaz

Translation Look Aside buffer
Translation Look Aside buffer Translation Look Aside buffer
Translation Look Aside buffer Zara Nawaz
 
information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)Zara Nawaz
 
information security(Public key encryption its characteristics and weakness, ...
information security(Public key encryption its characteristics and weakness, ...information security(Public key encryption its characteristics and weakness, ...
information security(Public key encryption its characteristics and weakness, ...Zara Nawaz
 
information security(authentication application, Authentication and Access Co...
information security(authentication application, Authentication and Access Co...information security(authentication application, Authentication and Access Co...
information security(authentication application, Authentication and Access Co...Zara Nawaz
 
information security (Audit mechanism, intrusion detection, password manageme...
information security (Audit mechanism, intrusion detection, password manageme...information security (Audit mechanism, intrusion detection, password manageme...
information security (Audit mechanism, intrusion detection, password manageme...Zara Nawaz
 
Information Security (Malicious Software)
Information Security (Malicious Software)Information Security (Malicious Software)
Information Security (Malicious Software)Zara Nawaz
 
Information Security (Firewall)
Information Security (Firewall)Information Security (Firewall)
Information Security (Firewall)Zara Nawaz
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lectureZara Nawaz
 
Lecture01 algorithm analysis
Lecture01 algorithm analysisLecture01 algorithm analysis
Lecture01 algorithm analysisZara Nawaz
 
Information Security (Digital Signatures)
Information Security (Digital Signatures)Information Security (Digital Signatures)
Information Security (Digital Signatures)Zara Nawaz
 

More from Zara Nawaz (10)

Translation Look Aside buffer
Translation Look Aside buffer Translation Look Aside buffer
Translation Look Aside buffer
 
information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)
 
information security(Public key encryption its characteristics and weakness, ...
information security(Public key encryption its characteristics and weakness, ...information security(Public key encryption its characteristics and weakness, ...
information security(Public key encryption its characteristics and weakness, ...
 
information security(authentication application, Authentication and Access Co...
information security(authentication application, Authentication and Access Co...information security(authentication application, Authentication and Access Co...
information security(authentication application, Authentication and Access Co...
 
information security (Audit mechanism, intrusion detection, password manageme...
information security (Audit mechanism, intrusion detection, password manageme...information security (Audit mechanism, intrusion detection, password manageme...
information security (Audit mechanism, intrusion detection, password manageme...
 
Information Security (Malicious Software)
Information Security (Malicious Software)Information Security (Malicious Software)
Information Security (Malicious Software)
 
Information Security (Firewall)
Information Security (Firewall)Information Security (Firewall)
Information Security (Firewall)
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lecture
 
Lecture01 algorithm analysis
Lecture01 algorithm analysisLecture01 algorithm analysis
Lecture01 algorithm analysis
 
Information Security (Digital Signatures)
Information Security (Digital Signatures)Information Security (Digital Signatures)
Information Security (Digital Signatures)
 

Recently uploaded

Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 

Recently uploaded (20)

Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 

Information security (Symmetric encryption, cryptography, crypto-analysis)

  • 2. Ingredients of Symmetric Encryption: • Plain Text : An original / intelligible message or data • Cipher text: coded message • Enciphering/Encryption: process of converting plain text to cipher text • Deciphering/ Decryption: restoring the plain text from the ciphertext • Key: the secret material used for performing encryption
  • 3. Introduction to Crypto-terminologies • Cryptography is an important aspect when we deal with network security. ‘Crypto’ means secret or hidden. Cryptography is the science of secret writing with the intention of keeping the data secret. Cryptanalysis, on the other hand, is the science or sometimes the art of breaking cryptosystems. These both terms are a subset of what is called as Cryptology.
  • 4. Classification – The flowchart depicts that cryptology is only one of the factors involved in securing networks. Cryptology refers to study of codes, which involves both writing (cryptography) and solving (cryptanalysis) them. Below is a classification of the crypto-terminologies and their various types.
  • 5. 1. Cryptography – • Cryptography is classified into symmetric cryptography, asymmetric cryptography and hashing. Below are the description of these types.
  • 6. Symmetric key cryptography • It involves usage of one secret key along with encryption and decryption algorithms which help in securing the contents of the message. The strength of symmetric key cryptography depends upon the number of key bits. It is relatively faster than asymmetric key cryptography. There arises a key distribution problem as the key has to be transferred from the sender to receiver through a secure channel.
  • 7. Asymmetric key cryptography • It is also known as public key cryptography because it involves usage of a public key along with secret key. It solves the problem of key distribution as both parties uses different keys for encryption/decryption. It is not feasible to use for decrypting bulk messages as it is very slow compared to symmetric key cryptography.
  • 8. Hashing – It involves taking the plain-text and converting it to a hash value of fixed size by a hash function. This process ensures integrity of the message as the hash value on both, sender’s and receiver’s side should match if the message is unaltered.
  • 9. Steganography: • “covered writing,” in contrast with cryptography, which means “secret writing.” Eg: writing with soap in cloth will be visible when we make it wet.
  • 10. Types of Operation for Encryption: • Substitution: Replacing one entity with other • Transposition: Shuffling the entities
  • 12. Classical attacks It can be divided into a)Mathematical analysis b) Brute-force attacks. Brute-force attacks runs the encryption algorithm for all possible cases of the keys until a match is found. Encryption algorithm is treated as a black box. Analytical attacks are those attacks which focuses on breaking the cryptosystem by analysing the internal structure of the encryption algorithm.
  • 13. Social Engineering attack – It is something which is dependent on the human factor. Tricking someone to reveal their passwords to the attacker or allowing access to the restricted area comes under this attack. People should be cautious when revealing their passwords to any third party which is not trusted.
  • 14. Implementation attacks – Implementation attacks such as side-channel analysis can be used to obtain a secret key. They are relevant in cases where the attacker can obtain physical access to the cryptosystem.
  • 15. Symmetric Cipher Model Ciphertext Input Decryption algorithm Secret key Decryption Plaintext output Plaintext Input Encryption algorithm Secret key Encryption Ciphertext output
  • 16. Symmetric Cipher Model Plaintext: The original intelligible message or data that is fed into the algorithm as input Encryption algorithm: The encryption algorithm performs various substitutions and transformations on the plaintext Secret key: The secret key is also an input to the encryption algorithm Ciphertext: The scrambled unintelligible message produced as output Decryption algorithm: It takes the ciphertext and the secret key to produce the original plaintext
  • 18. Security Mathematics •Encryption Y = E(K, X) •Decryption X = D(K, Y) Chipertext Plaintext Secrete key Encryption algorithm Decryption algorithm
  • 19. Security Requirements Strong encryption algorithm Secret key should be secret (sender/receiver)
  • 20. Symmetric Cipher Model  Cryptology 1- Cryptography (enciphering) 2- Cryptanalysis (deciphering)  Cryptanalyst (Opponent-Adversary- Hacker)
  • 21. Cryptography Encryption techniques Substitution techniques Transposition techniques Secret keys Symmetric (single-key) Asymmetric (two-key) Plaintext processing Block cipher (processes one block of input elements at a time) Stream cipher (processes one of input elements at a time)
  • 22. Cryptanalysis and Brute-Force Attack Cryptanalysis ( plaintext-ciphertext pairs- algorithm nature) Brute-force attack (try possible keys)  Objective recover the key
  • 23. Cryptanalysis and Brute-Force Attack Unconditionally secure Computationally secure  Cost of breaking cipher > value of encrypted information  Time of breaking cipher > lifetime of information
  • 24. Classical Cryptographic Techniques • have two basic components of classical ciphers: substitution and transposition • in substitution ciphers letters are replaced by other letters • in transposition ciphers the letters are arranged in a different order • these ciphers may be: • monoalphabetic - only one substitution/ transposition is used, or • polyalphabetic - where several substitutions/ transpositions are used • several such ciphers may be concatentated together to form a product cipher
  • 25. Caesar Cipher - a monoalphabetic cipher • replace each letter of message by a letter a fixed distance away eg use the 3rd letter on • reputedly used by Julius Caesar • eg. • L FDPH L VDZ L FRQTXHUHG • I CAME I SAW I CONQUERED
  • 26. Caesar Cipher - a monoalphabetic cipher • ie mapping is • ABCDEFGHIJKLMNOPQRSTUVWXYZ • DEFGHIJKLMNOPQRSTUVWXYZABC • can describe this cipher as: • Encryption E_(k) : i -> i + k mod 26 • Decryption D_(k) : i -> i - k mod 26
  • 27. Cryptanalysis of the Caesar Cipher only have 26 possible ciphers could simply try each in turn - exhaustive key search GDUCUGQFRMPCNJYACJCRRCPQ HEVDVHRGSNQDOKZBDKDSSDQR Plain - IFWEWISHTOREPLACELETTERS JGXFXJTIUPSFQMBDFMFUUFST KHYGYKUJVQTGRNCEGNGVVGTU Cipher - LIZHZLVKWRUHSODFHOHWWHUV MJAIAMWLXSVITPEGIPIXXIVW
  • 28. Cryptanalysis of the Caesar Cipher • also can use letter frequency analysis • Single Letter Double Letter Triple Letter • E TH THE • T HE AND • R IN TIO • N ER ATI • I RE FOR • O ON THA • A AN TER • S EN RES
  • 29. Caesar Cipher Plaintext: meet me after the party Ciphertext: PHHW PH DIWHU WKH SDUWB a b c d e f g h i j k l m n o p q r s t u v w x y z D E F G H I G K L M N O P Q R S T U V W X Y Z A B C • Letter 3rd letter Gaius Julius Caesar: Roman Dictator, 1st century BC
  • 30. Caesar Cipher C = E(K, P) = (P + K) mod 26 P = D(K, C) = (C - K) mod 26 a b c d e f g h i j k l m 0 1 2 3 4 5 6 7 8 9 10 11 12 n o p q r s t u v w x y z 13 14 15 16 17 18 19 20 21 22 23 24 25
  • 31. Playfair Cipher • In this scheme, pairs of letters are encrypted, instead of single letters as in the case of simple substitution cipher. • In playfair cipher, initially a key table is created. The key table is a 5×5 grid of alphabets that acts as the key for encrypting the plaintext. Each of the 25 alphabets must be unique and one letter of the alphabet (usually J) is omitted from the table as we need only 25 alphabets instead of 26. If the plaintext contains J, then it is replaced by I. • The sender and the receiver deicide on a particular key, say ‘tutorials’. In a key table, the first characters (going left to right) in the table is the phrase, excluding the duplicate letters. The rest of the table will be filled with the remaining letters of the alphabet, in natural order. The key table works out to be −
  • 32. Playfair Cipher • Process of Playfair Cipher • First, a plaintext message is split into pairs of two letters (digraphs). If there is an odd number of letters, a Z is added to the last letter. Let us say we want to encrypt the message “hide money”. It will be written as − • HI DE MO NE YZ • The rules of encryption are − • If both the letters are in the same column, take the letter below each one (going back to the top if at the bottom)
  • 33. Rules for playfair cipher T U O R I ‘H’ and ‘I’ are in same column, hence take letter below them to replace. HI → QC A L S B C D E F G H K M N P Q V W X Y Z
  • 34. Rules for playfair cipher • If both letters are in the same row, take the letter to the right of each one (going back to the left if at the farthest right) •T U O R I ‘D’ and ‘E’ are in same row, hence take letter to the right of them to replace. DE → EF A L S B C D E F G H K M N P Q V W X Y Z
  • 35. Rules for playfair cipher • If neither of the preceding two rules are true, form a rectangle with the two letters and take the letters on the horizontal opposite corner of the rectangle.
  • 36. Hill Cipher • Hill cipher is a polygraphic substitution cipher based on linear algebra.Each letter is represented by a number modulo 26. Often the simple scheme A = 0, B = 1, …, Z = 25 is used, but this is not an essential feature of the cipher. To encrypt a message, each block of n letters (considered as an n-component vector) is multiplied by an invertible n × n matrix, against modulus 26. To decrypt the message, each block is multiplied by the inverse of the matrix used for encryption. • The matrix used for encryption is the cipher key, and it should be chosen randomly from the set of invertible n × n matrices (modulo 26).
  • 37. Hill Cipher • We have to encrypt the message ‘ACT’ (n=3).The key is ‘GYBNQKURP’ which can be written as the nxn matrix: • The message ‘ACT’ is written as vector:
  • 38. Hill Cipher • The enciphered vector is given as: • which corresponds to ciphertext of ‘POH’
  • 39. Decryption • To decrypt the message, we turn the ciphertext back into a vector, then simply multiply by the inverse matrix of the key matrix (IFKVIVVMI in letters).The inverse of the matrix used in the previous example is:
  • 40. Hill Cipher • For the previous Ciphertext ‘POH’: • which gives us back ‘ACT’.
  • 41. Row Transposition cipher • Given a plain-text message and a numeric key, cipher/de-cipher the given text using Columnar Transposition Cipher • The Columnar Transposition Cipher is a form of transposition cipher just like Rail Fence Cipher. Columnar Transposition involves writing the plaintext out in rows, and then reading the ciphertext off in columns one by one.
  • 42. Encryption • In a transposition cipher, the order of the alphabets is re-arranged to obtain the cipher- text. • The message is written out in rows of a fixed length, and then read out again column by column, and the columns are chosen in some scrambled order. • Width of the rows and the permutation of the columns are usually defined by a keyword. • For example, the word HACK is of length 4 (so the rows are of length 4), and the permutation is defined by the alphabetical order of the letters in the keyword. In this case, the order would be “3 1 2 4”. • Any spare spaces are filled with nulls or left blank or placed by a character (Example: _). • Finally, the message is read off in columns, in the order specified by the keyword. •
  • 44. Decryption • To decipher it, the recipient has to work out the column lengths by dividing the message length by the key length. • Then, write the message out in columns again, then re-order the columns by reforming the key word.