DISSERTATION ON CRYPTOGRAPHY.

Slides:



Advertisements
Similar presentations
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Advertisements

Computer Science CSC 474By Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.1 Introduction to Cryptography.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (4) Information Security.
Cryptography The science of writing in secret code.
Principles of Information Security, 2nd edition1 Cryptography.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Cryptographic Security Cryptographic Mechanisms 1Mesbah Islam– Operating Systems.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
Cryptography Week-6.
© Neeraj Suri EU-NSF ICT March 2006 DEWSNet Dependable Embedded Wired/Wireless Networks MUET Jamshoro Computer Security: Principles and Practice Slides.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
CHAPTER 6 Cryptography. An Overview It is origin from the Greek word kruptos which means hidden. The objective is to hide information so that only the.
Cryptography, Authentication and Digital Signatures
CSCE 201 Introduction to Information Security Fall 2010 Data Protection.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Lecture 2: Introduction to Cryptography
Intro to Cryptography Lesson Introduction
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
MM Clements Cryptography. Last Week Firewalls A firewall cannot protect against poor server, client or network configuration A firewall cannot.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Message Authentication Code
CS/ECE 578 Cyber-Security Dr. Attila Altay Yavuz
Web Applications Security Cryptography 1
Security Using Armstrong Numbers and Authentication using Colors
Basics of Cryptography
CS457 Introduction to Information Security Systems
ISA 400 Management of Information Security
Symmetric Cryptography
IT443 – Network Security Administration Instructor: Bo Sheng
USAGE OF CRYPTOGRAPHY IN NETWORK SECURITY
Lecture 2.3. ENCRYPTION OF MESSAGES
Privacy & Security.
ISA 330 Introduction to Proactive System Security
Cryptographic Hash Function
Public Key Encryption Systems
CSCE 715: Network Systems Security
HEY DOUG HOW ARE YOU? NKE JUAM NUC GXK EUA. HEY DOUG HOW ARE YOU? NKE JUAM NUC GXK EUA.
Outline Desirable characteristics of ciphers Uses of cryptography
Cryptography and Security Technologies
Encryption
Basic Network Encryption
Cryptography.
Outline Desirable characteristics of ciphers Uses of cryptography
Presented by: Dr. Munam Ali Shah
Cryptography Basics and Symmetric Cryptography
Security through Encryption
Chapter 11 – Message Authentication and Hash Functions
CS/ECE 478 Network Security Dr. Attila Altay Yavuz
Introduction to Symmetric-key and Public-key Cryptography
Best Digital Signature Service in Noida. Electronic Record 1.Very easy to make copies 2.Very fast distribution 3.Easy archiving and retrieval 4.Copies.
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
Introduction to Cryptography (1)
Chapter -5 PUBLIC-KEY CRYPTOGRAPHY AND RSA
Chapter 29 Cryptography and Network Security
Basic Network Encryption
Basic of Modern Cryptography
Hashing Hash are the auxiliary values that are used in cryptography.
Computer Security Chapter Two
Public Key Encryption Systems
CRYPTOGRAPHY & NETWORK SECURITY
Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

DISSERTATION ON CRYPTOGRAPHY

1 Introduction Derived from Greek kryptós "hidden," and the gráfo "write" The study of message secrecy central contributor to several fields: information security and related issues, authentication, and access control Primary purposes is hiding the meaning of messages Study of ways to convert information from its normal form into an unreadable without special knowledge Applications : the security of ATM cards, computer passwords, and electronic commerce Examples include digital signatures and digital cash, digital rights management for intellectual property protection, and securing electronic commerce

2 History of cryptography Before the modern era cryptography was concerned solely with message confidentiality In recent decades it has included techniques for authentication of message integrity or sender/receiver identity, digital signatures, interactive proofs, and secure computation The main classical cipher types are : Transposition ciphers (e.g. 'help me' becomes 'ehpl em' in a trivially simple rearrangement scheme) Substitution ciphers (e.g., 'fly at once' becomes 'gmz bu podf' by replacing each letter with the one following it in the alphabet)

Types of cryptography 1.Classical cryptography 2. Medieval Cryptography 3. World War II cryptography

Types of Cryptographic Algorithms

Symmetric-key cryptography Public-key cryptography Hash Functions

Symmetric-key cryptography This was the only kind of encryption publicly known until 1976 both the sender and receiver share the same key (or, less commonly, in which their keys are different, but related in an easily computable way) Symmetric-key algorithms can be divided into stream ciphers and block ciphers Stream ciphers encrypt the bits of the message one at a time block ciphers take a number of bits and encrypt them as a single unit

Stream cipher a stream cipher is a symmetric cipher in which the plaintext digits are encrypted one at a time And the transformation of successive digits varies during the encryption An alternative name is a state cipher, as the encryption of each digit is dependent on the current state Stream ciphers typically execute at a higher speed than block ciphers and have lower hardware complexity However, stream ciphers can be susceptible to serious security problems if used incorrectly

Block cipher A block cipher is a symmetric key cipher which operates on fixed-length groups of bits with an unvarying transformation The exact transformation is controlled using a second input — the secret key An early and highly influential block cipher design was the Data Encryption Standard A successor to DES, the Advanced Encryption Standard (AES)

Data Encryption Standard A method for encrypting information Selected as an official Federal Information Processing Standard (FIPS) for the United States in 1976 DES is now considered to be insecure for many applications This is due to the 56-bit key size being too small; DES keys have been broken in less than 24 hours 56-bit key is divided into eight 7-bit blocks and an 8th odd parity bit is added to each block (i.e., a "0" or "1" is added to the block so that there are an odd number of 1 bits in each 8-bit block) In recent years, the cipher has been superseded by the Advanced Encryption Standard (AES). Data Encryption Standard

Advanced Encryption Standard is a block cipher adopted as an encryption standard by the U.S. government It became effective as a standard on May 26, 2002 As of 2006, AES is one of the most popular algorithms used in symmetric key cryptography

Speed Symmetric-key algorithms are generally much less computationally intensive than asymmetric key algorithms This means that a quality asymmetric key algorithm is hundreds or thousands of times slower than a quality symmetric key algorithm

Limitations The requirement of a shared secret key, with one copy at each end They need to be changed often and kept secure during distribution and in service The consequent requirement to choose, distribute and store keys without error and without loss, known as key management, is difficult to reliably achieve The symmetric-key algorithms can't be used for authentication or non-repudiation purposes

Public Key Cryptography Also known as asymmetric cryptography Is a form of cryptography in which a user has a pair of cryptographic keys - a public key and a private key The private key is kept secret, while the public key may be widely distributed A message encrypted with the public key can only be decrypted with the corresponding private key

The two main branches of public key cryptography Public key encryption Digital Signature

Public key encryption A message encrypted with a user's public key cannot be decrypted by anyone except the user possessing the corresponding private key Anyone can encrypt using the public key, but only the holder of the private key can decrypt. Secrecy depends on the secrecy of the private key

Digital Signature Digital signature is used to mean a cryptographically based signature assurance scheme An analogy for digital signatures is the sealing of an envelope with a personal wax seal The message can be opened by anyone, but the presence of the seal authenticates the sender There are several digital signature schemes; most establish two complementary algorithms, one for signing and the other for checking the signature at some later time

Hash Functions A cryptographic hash function is a hash function with certain additional security properties It makes it suitable for use as a primitive in various information security applications, such as authentication and message integrity A hash function takes a long string (or 'message') of any length as input and produces a fixed length string as output

SUMMARY & CONCLUSIONS The history of cryptography dates back thousands of years There are several ways of classifying cryptographic algorithms: Secret Key Cryptography (SKC): Uses a single key for both encryption and decryption Public Key Cryptography (PKC): Uses one key for encryption and another for decryption Hash Functions: Uses a mathematical transformation to irreversibly "encrypt" information