Cryptology Past-Present -future

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
22C:19 Discrete Math Integers and Modular Arithmetic Fall 2010 Sukumar Ghosh.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
Public Key Model 8. Cryptography part 2.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
Cryptography, Authentication and Digital Signatures
National Institute of Science & Technology Cryptology and Its Applications Akshat Mathur [1] Cryptology and Its Applications Presented By AKSHAT MATHUR.
Encryption.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
Multimedia Security. “Everything” is digital these days - a copy of a digital media element is identical to the original. How can an owner protect their.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 14. Digital signature.
Cryptography Introduction. Definition Origin Objectives Terminologies References Agenda.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Cryptography By: Nick Belhumeur. Overview What is Cryptography? What is Cryptography? 2 types of cryptosystems 2 types of cryptosystems Example of Encryption.
Secret Key Cryptography
(Principles of Informatioan security)
Overview of Cryptography
Security Using Armstrong Numbers and Authentication using Colors
Basics of Cryptography
Attacks on Public Key Encryption Algorithms
Asymmetric-Key Cryptography
Cryptography Dr. X.
Crypto in information security
Data Security B. R. Chandavarkar Asst. Prof., CSE Dept., NITK, Surathkal. brc.nitk.ac.in.
Cryptography Why Cryptography Symmetric Encryption
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Encryption. Encryption Basics • Plaintext - the original message ABCDEFG • Ciphertext - the coded message DFDFSDFSD • Cipher - algorithm for.
Public Key Encryption and Digital Signatures
Network Security.
Chapters 14,15 Security.
Cryptography and Security Technologies
Chapter-2 Classical Encryption Techniques.
Taehyung Kim HPC Lab. POSTECH
Encryption
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Vernam Cipher Group Members: Muhammad Awais Muhammad Hasnain khan
Cryptography.
CSCI-235 Micro-Computer Applications
Topic 1: Data, information, knowledge and processing
Presented by: Dr. Munam Ali Shah
M3: Encryption r By Andrew Stringer.
Cryptography Survey.
Chapter 7 STRENGTH OF ENCRYPTION & Public Key Infrastructure
Chapter 3:Cryptography (16M)
PART VII Security.
أبو إبراهيم هارون بن ساجد الرحمان
Security.
Cryptography: Basics (2)
Cryptography Survey.
ADVANCED ENCRYPTION STANDARDADVANCED ENCRYPTION STANDARD
A. For the midterm you must be familiar with: All 28th Arabic letters and their sound. B. How to connect one and 2 way connectors. C. Number in Arabic.
Network Security.
Cryptography a Presentation Prepared by Vytautas Kondratas.
Chapters 14,15 Security.
DISSERTATION ON CRYPTOGRAPHY.
Digital Communications
Unit 2: Cryptography & Cryptographic Algorithm
Basic of Modern Cryptography
Computer Security Chapter Two
Fluency with Information Technology Lawrence Snyder
Introduction to Encryption Technology
Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Cryptology Past-Present -future

Cryptology Past-Present -future Saeed seyedaghaBanihashemi School of intrenational relations of Ministry of forigen affairs of Iran Embassador of I.R.Iran in Hungary –Budapest embiran@nextra.hu www.ircypt.com

Introduction: To ability to communicate has always been a key aspect in the acquisition of knowledge and the evolution of the humanity. The need to convey a massage in a secure way a probably as old as communication itself. Historically it was during conflicts between nations That this was the most necessary. In our modern world where many communication media are used routinely the need for privacy is more of an issue then ever in a great variety of applications

A cipher system or cryptosystem is a technique used Software companies wishes to protect their products against piracy ,banks wants to ensure secure transactions and almost every one whishes to keep their personal information private. The need for secure communication gave rise to a science referred to as cryptology. Cryptology A cipher system or cryptosystem is a technique used to hide massage from unit intended recipients.Cryptology is the science that creates those cryptosystems.

Crypto analysis is art of unraveling or breaking such system ,that is reading them even if one is not the intended recipient. The cryptology is used to encompass both cryptology and crypto analysis.

Creation of Science cryptology Egypt civilization Greece civilization Indian civilization Islamic civilization European civilization The original massage which is to be sent is called the plane text. The encrypted massage is called cipher text. Encryption is the process of transforming the plaintext into cipher text , typically by using an algorithm and a key.

A key is a component which shared secretly by the both the sender and recipient and may vary from one massage to another. Decryption is process of transformation the cipher text. This reverse process is typically derived from the knowledge of the encryption algorithm and the key. Example: Plane text =521 key =122 algorithm =+(addition ) Algorithm(+) 521 521+122 643 key122

System of Cryptography a)A key b)Symmetric c) Asymmetric Goal of cryptography system a)Confidentiality b)Integrity c)Authenticity Application a)Secure communication b) Data base and file security c)Data e-transmit d)e- commerce e) e-cash f)Contract signing g) e-mail ………..

A system of cryptography

Logical Model of a General Stream Cipher XOR 01101011 Plain text 11001110 Cipher text 1001 10100101 Key generator Uniform Secret Key Key stream 12

In design a general Stream Cipher, A Simple Example Vernum Cipher is a stream cipher . A binary message m[1],m[2],…,m[t] is operated by a binary key stream k[1],k[2],…,k[t] of the same length to produce cipher text c[1],c[2],…,c[t] Where for each i=1,2,…t c[i]=k[i] m[i] Cipher text 110……. 010 .. 100……. Plaintext K Encryption Decryption In design a general Stream Cipher, usually we consider a One Time Pad which uses a short uniform secret key.

Classical Cryptography E:set of function key Decipher: The function must be one- to- one Definition : We call it convergent if:

Transformation Cryptography CEASAR FDHVDU For deciphering alkandi method used

Alkandi one of the galaxy of the Islamic mathematician which for first time made a cryptography Academy (15th A.D) His book is sobh alahsa. We can see his manuscript about Attacking the transfotamtion cipher.

Second example is document belong to Vatican diplomat serving in polish 1573.

(608) GIUDICANDO CHE CON NESSUNA COSA SI POSSA RESTITUIRE PIU SANTA A QUESTEO REGNOCHE CON MANDRA A LA GUERRA RICUPERATION DE BENI REGII MOSCO PER SMALTIRE INQUESO MODO I MALI UMORI CHE TURBANO LA RELIGION CATTOLICA ET INANZ (I) LA SUA PARTITA HA DATO MOLTO INDRIZZO A QUESTO CONSIGLIO ET NE HA LASSATO A ME PARTICOLAR ORDINE ET BENCHE LI HEREETICI TEMANO MOLTO CHE IL RE ABBIA DA DARE IN QUSTED SUA SANTITA ET LO DANNANO NONDIMENO CAMMINA MOLTO BENE ET CON SECRETEZZA SECOND CHE BISOGNA ET SI VA OGNI GIORNO GUADAGNANDO QUALCUNO CON QUESTI GIRORNI IL CASTELLANO DI SENDOOMIRIA CHE E,PERSONA DI LINGUA ET D,AUTOITA,FRA LI HERETICI HA SOTTOSCRITTO A QUESTO PARERE IN GASA DE ? DOPO AVERCI FATTO MOLTO RESISTENZA 508 HA MOSTATO MOLTO TRVAGLIO CHE IL RE ABBIA RIMESSO LE COSE SUE A LA DIETA ET IO HO VEDUTO UNA LETTERA DEL BASINO SECRETARIO DEL RE CHRI STIANISSIMO CHE VENENDO DI 308 HA PARLATO IN 108 CON ESSA 508 CHE SCRIVE CHE PRE MOLTO CHE ABBIA FATTO NON LI..E PARSO DI LASSAR PUNTO AQUETATO LANIMO SUO.

الف ب پ ت ج چ ح خ دذ رز ژ س ش ص ض ط ظ ع غ ف ق ك گ ل م ن و ه ي . . . . . . . . . . . .

Hill cipher : K=mxn matrix on Z 26 such that detK is invertible i.e. F G H I J K L M N O P Q R S T U V W X Y Z 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Note: Det must be prime w.r.t n and B det K=1 (mod n )

Example : If We want to encrypt word DAVE We have So we have encryption DAVE FCFO

As you see If In the real number Now in the Z26 inverse of numbers 3 5 7 9 11 15 17 19 21 23 25 is as follow 1 9 21 15 3 19 7 23 11 5 17 25

RSA Cryptosystem If A=00,B=01 ,………………………………….Z=25 dived massage to block 6.Let each Let each block be Receiver take the massage as

SEND GOODS CHARGE AC CT ETC We make the massage as block of three Example :we want to send the massage SEND GOODS CHARGE AC CT ETC We make the massage as block of three 0se nd0 goo ds0 cha rge ac0 ct0 etc The massage in digit will be as 261804 130326 061414 031826 020700 170604 260200 021926 041902

Two points a)How to find power? b)How to secure more? For breaking cipher we need two a)Uler theorem b)Algorithm of Uglodosean Definition : If How to find factor of n?

We must find e,d which t satisfies

Example :

Thanks