Cryptography Data communications and networks Momina Tariq: 07030619-021 Ambreen Sohail: 07030619-007 1 Data Communications and Networks.

Slides:



Advertisements
Similar presentations
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Advertisements

Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Computer Science CSC 474By Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.1 Introduction to Cryptography.
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 29 Cryptography and Network.
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
1 Day 04- Cryptography Acknowledgements to Dr. Ola Flygt of Växjö University, Sweden for providing the original slides.
CYPHER INDEX n Introduction n Background n Demo INTRODUCTION n Cypher is a software toolkit designed to aid in the decryption of standard (historical)
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Encryption Methods By: Michael A. Scott
Chapter 2 – Classical Encryption Techniques
SYMPATRIC ENCRYPTION L.Tahani Al jehani. Introduction  Definition  Cryptography, a word with Greek origins, means “secret writing”.  It refers to the.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
3.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Traditional Symmetric-Key Ciphers.
3.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Traditional Symmetric-Key Ciphers.
3.1 SERVICES AND MECHANISMS SERVICES AND MECHANISMS The International Telecommunication Union- Telecommunication Standardization Section (ITU-T) provides.
Asymmetric-Key Cryptography Also known as public-key cryptography, performs encryption and decryption with two different algorithms. Each node announces.
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
CSCE 201 Introduction to Information Security Fall 2010 Data Protection.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
Midterm Review Cryptography & Network Security
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
Bit Cipher 1. Example of bit Cipher 2 Practical Stream Cipher 3.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Symmetric-Key Cryptography
Lecture 3 Page 1 Advanced Network Security Review of Cryptography Advanced Network Security Peter Reiher August, 2014.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
Traditional Symmetric-Key Ciphers
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
CS 4244: Internet Programming Security 1.0. Introduction Client identification and cookies Basic Authentication Digest Authentication Secure HTTP.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
Introduction to Cryptography Lecture 8. Polyalphabetic Substitutions Definition: Let be different substitution ciphers. Then to encrypt the message apply.
Cryptology aka Cryptography Tim Cahill Ryan Church.
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
Introduction to Cryptology Fall Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.
Computer Security (CS4800)
Encryption. LEARNING OBJECTIVES: BY THE END OF THE LESSON YOU SHOULD KNOW. What encryption is and why it is important The basics of encryption techniques.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Information Security CPIT 425 Instructor: Bashair Alrashed LAB1.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 4. Traditional and Modern.
3.1 Chapter 3 Traditional Symmetric-Key Ciphers Part2.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Columnar Transposition
Computer and Data Security 4th Class
CS4780 Cryptography and Information Security
Information and Computer Security CPIS 312 Lab 2
Topics discussed in this section: 30-2 SYMMETRIC-KEY CRYPTOGRAPHY Symmetric-key cryptography started thousands of years ago when people needed.
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Outline Some Basic Terminology Symmetric Encryption
Chapter 3:Cryptography (16M)
PART VII Security.
Cryptography and Network Security
Digital Communications
Computer Security Chapter Two
Symmetric Encryption or conventional / private-key / single-key
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Cryptography Data communications and networks Momina Tariq: Ambreen Sohail: Data Communications and Networks

2 T OPICS Cryptography Components Types of cryptography Symmetric-key cryptography Asymmetric-key cryptography Traditional ciphers Substitution cipher Transposition cipher

Data Communications and Networks 3 C RYPTOGRAPHY Cryptography is the practice and study of hiding information. A field of mathematics and computer science concerned with information security and related issues, particularly encryption and authentication.

Data Communications and Networks 4 C OMPONENTS INVOLVED IN C RYPTOGRAPHY Plaintext - Text message to which an algorithm is applied Cipher text - Encrypted or scrambled message produced by applying the algorithm to the plaintext message using the secret key Cipher - A message written in a secret code Key - A key is a number or set of numbers that the cipher, as an algorithm, operates on

Data Communications and Networks 5 C OMPONENTS INVOLVED IN C RYPTOGRAPHY ( CONT.) Encryption: Creating cipher text from plaintext with a specific encryption algorithm and an encryption key Decryption: Covering plaintext from cipher text using a specific encryption algorithm and a decryption key

Data Communications and Networks 6 T YPES OF C RYPTOGRAPHY Symmetric-key cryptography / Secret-key cryptography Asymmetric-key cryptography / Public-key cryptography

Data Communications and Networks 7 S YMMETRIC - KEY CRYPTOGRAPHY An encryption system in which the sender and receiver of a message share a single, common key that is used to encrypt and decrypt the message Symmetric-key cryptography is sometimes called secret-key cryptography

Data Communications and Networks 8 S YMMETRIC - KEY CRYPTOGRAPHY

9 T RADITIONAL C IPHERS Two sub types of traditional ciphers: Substitution ciphers Transposition ciphers

Data Communications and Networks 10 S UBSTITUTION CIPHERS “ A substitution cipher substitutes one symbol with another. If the symbols in the plaintext are alphabetic characters, we replace one character with another.” Types of substitution ciphers Monoalphabetic cipher Polyalphabetic cipher

Data Communications and Networks 11 M ONOALPHABETIC S UBSTITUTION “In a monoalphabetic cipher, a character (or symbol) in the plaintext is always changed to the same character(or symbol) in the ciphertext regardless of its position in the text. It simply means one-to-one relationship”

Data Communications and Networks 12 M ONOALPHABETIC S UBSTITUTION

Data Communications and Networks 13 P OLYALPHABETIC C IPHERS A cipher that uses multiple substitution alphabets is called a polyalphabetic substitution cipher. The Vigenere Cipher and Hill Cipher are examples of alphabetic ciphers

Data Communications and Networks 14 T HE V IGENÈRE C IPHER The Vigenère Cipher makes use of a keyword of length m. So, First step: determine the key length=m, Second step: determine the key (word) itself After that encryption/decryption of the message is easy.

T HE V IGENÈRE C IPHER ( EXAMPLE ) Pthiscryptosy K CVPXZGIAXIVWP PstemisnotsecuRe K CUBTTMJPWIZITWZT 15 Data Communications and Networks Suppose key length (m)=6 Key word (K) = C I P H E R = (2,8,15,7,4,17) Plaintext (P) = thiscryptosystemisnotsecure Ciphertext (C) = VPXZGIAXIVWPUBTTMJPWIZITWZI

Data Communications and Networks 16 T HE V IGENÈRE T ABLE A B C D E F G H I J K L M N O P Q R S T U V W X Y Z  B C D E F G H I J K L M N O P Q R S T U V W X Y Z A  C D E F G H I J K L M N O P Q R S T U V W X Y Z A B  D E F G H I J K L M N O P Q R S T U V W X Y Z A B C  E F G H I J K L M N O P Q R S T U V W X Y Z A B C D  F G H I J K L M N O P Q R S T U V W X Y Z A B C D E  G H I J K L M N O P Q R S T U V W X Y Z A B C D E F  H I J K L M N O P Q R S T U V W X Y Z A B C D E F G  I J K L M N O P Q R S T U V W X Y Z A B C D E F G H  J K L M N O P Q R S T U V W X Y Z A B C D E F G H I  K L M N O P Q R S T U V W X Y Z A B C D E F G H I J  L M N O P Q R S T U V W X Y Z A B C D E F G H I J K  M N O P Q R S T U V W X Y Z A B C D E F G H I J K L  N O P Q R S T U V W X Y Z A B C D E F G H I J K L M  O P Q R S T U V W X Y Z A B C D E F G H I J K L M N  P Q R S T U V W X Y Z A B C D E F G H I J K L M N O  Q R S T U V W X Y Z A B C D E F G H I J K L M N O P  R S T U V W X Y Z A B C D E F G H I J K L M N O P Q  S T U V W X Y Z A B C D E F G H I J K L M N O P Q R  T U V W X Y Z A B C D E F G H I J K L M N O P Q R S  U V W X Y Z A B C D E F G H I J K L M N O P Q R S T  V W X Y Z A B C D E F G H I J K L M N O P Q R S T U  W X Y Z A B C D E F G H I J K L M N O P Q R S T U V  X Y Z A B C D E F G H I J K L M N O P Q R S T U V W  Y Z A B C D E F G H I J K L M N O P Q R S T U V W X  Z A B C D E F G H I J K L M N O P Q R S T U V W X Y

Data Communications and Networks 17 T RANSPOSITION C IPHER Methods of encryption by which the positions held by units of plaintext are shifted according to a regular system For example: Plaintext: V O Y A G E R Ciphertext: O V A Y E G R where every two letters are switched with each other

Data Communications and Networks 18 A SYMMETRIC -K EY C RYPTOGRAPHY A pair of keys is used. The sender uses the public key; the receiver uses the private key. Asymmetric-key cryptography is sometimes called Public-key cryptography

Data Communications and Networks 19 A SYMMETRIC - KEY C RYPTOGRAPHY

Data Communications and Networks 20 ANY QUESTIONS ? ? ?