Unit 2: Cryptography & Cryptographic Algorithm

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Cryptography Ch-1 prepared by: Diwan.
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
Computer Science CSC 474By Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.1 Introduction to Cryptography.
Intro 1 Introduction Intro 2 Good Guys and Bad Guys  Alice and Bob are the good guys  Trudy is the bad guy  Trudy is our generic “intruder”
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Cryptography Week-6.
Cis 4930 Introduction to cryptography
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (1) Information Security.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography.
Agenda Definitions Why cryptography is important? Available technologies Benefits & problems.
NUMBER THEORY Chapter 5: Cryptology. Era of Electronic Electronic communication Electronic Banking.
Bit Cipher 1. Example of bit Cipher 2 Practical Stream Cipher 3.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Intro to Cryptography Lesson Introduction
BZUPAGES.COM Cryptography Cryptography is the technique of converting a message into unintelligible or non-understandable form such that even if some unauthorized.
Symmetric Cipher Model Plaintext input 1- encryption algorithm 2- secret key Encryption Cipher text output Cipher text input 1- Decryption algorithm 2-
Mekanisme security & Crytography. Cryptography ≠Security Cryptography may be a component of a secure system Adding cryptography may not make.
Computer Security (CS4800)
CSCI 391: Practical Cryptology Introduction. Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Introduction (Pendahuluan)  Information Security  Criptography.
1 Introduction to Cryptography Chapter-4. Definitions  Cryptography = the science (art) of encryption  Cryptanalysis = the science (art) of breaking.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Network security 1. Security taxonomy Physical security Resource exhaustion - DDoS system/network vulnerabilities Key-based security.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Cryptography By: Nick Belhumeur. Overview What is Cryptography? What is Cryptography? 2 types of cryptosystems 2 types of cryptosystems Example of Encryption.
Secret Key Cryptography
(Principles of Informatioan security)
CS/ECE 578 Cyber-Security Dr. Attila Altay Yavuz
ISA 400 Management of Information Security
Symmetric Cryptography
Crypto in information security
Data Security B. R. Chandavarkar Asst. Prof., CSE Dept., NITK, Surathkal. brc.nitk.ac.in.
ISA 330 Introduction to Proactive System Security
Public-Key Cryptography and RSA
Chapter 8 Network Security.
Introduction Of System Security
Chapter-2 Classical Encryption Techniques.
Taehyung Kim HPC Lab. POSTECH
Encryption
Cryptography.
- Stream Cipher and Block Cipher - Confusion & Diffusion
Cryptography Basics and Symmetric Cryptography
Chapter 3:Cryptography (16M)
مروري برالگوريتمهاي رمز متقارن(كليد پنهان)
Security through Encryption
PART VII Security.
CS/ECE 478 Network Security Dr. Attila Altay Yavuz
By: Arash Habibi Lashkari
Cryptography: Basics (2)
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
Cryptography : Introduction
Cryptography and Cryptanalysis
Digital Communications
Chapter 29 Cryptography and Network Security
Basic of Modern Cryptography
Computer Security Chapter Two
Types of Cryptanalysis attacks
Basics Of Symmetric Encryption
Symmetric Encryption or conventional / private-key / single-key
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Unit 2: Cryptography & Cryptographic Algorithm -For BIM (5th Sem, CSCL)

Cryptography: Introduction Greek word: Hidden Secret Study differs now and past past : encryption and decryption now: past + digital signature + authentication + key mgmt + cryptanalysis The art or science encompassing the principles and methods of transforming an intelligible message into one that is unintelligible, and then retransforming that message back to its original form

Some terms Plain text Cypher text: Key Encryption Decryption Cypher Cryptoanalysis Attack

Cryptography: Formal Definition - is a 5-tuple (E, D, M, K, C) Encryption: E:M X KC AKA enciphering function Decryption: D:C X K  P AKA deciphering function

Attack Process to reveal cipher text with key (or even reveal key) Types: Cipher Text Only Known Plain text Chosen Plain text Good Cryptosystem protects against all these attacks

Types: Symmetric Vs Asymetric Stream Vs Block Private key vs Public key Transposition vs Substitution

Some Classical cryptosystem Substitution Cipher Transpostion Cipher Caesar Cipher Vigenere Cipher Vernam Cipher One Pad

Modern Crypto-system DES RSA Message Digest Hash Function MAC