National Institute of Science & Technology Cryptology and Its Applications Akshat Mathur [1] Cryptology and Its Applications Presented By AKSHAT MATHUR.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

CLASSICAL ENCRYPTION TECHNIQUES
Cryptography encryption authentication digital signatures
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Topic 7: Using cryptography in mobile computing. Cryptography basics: symmetric, public-key, hash function and digital signature Cryptography, describing.
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
BY : Darshana Chaturvedi.  INTRODUCTION  RSA ALGORITHM  EXAMPLES  RSA IS EFFECTIVE  FERMAT’S LITTLE THEOREM  EUCLID’S ALGORITHM  REFERENCES.
Public Key Encryption Algorithm
Network Security Hwajung Lee. What is Computer Networks? A collection of autonomous computers interconnected by a single technology –Interconnected via:
Public-key Cryptography Montclair State University CMPT 109 J.W. Benham Spring, 1998.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
Introduction to Symmetric Block Cipher Jing Deng Based on Prof. Rick Han’s Lecture Slides Dr. Andreas Steffen’s Security Tutorial.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Computer Science Lecture 22, page 1 Security in Distributed Systems Introduction Cryptography Authentication Key exchange Readings: Tannenbaum, chapter.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Public Key Model 8. Cryptography part 2.
Andreas Steffen, , 4-PublicKey.pptx 1 Internet Security 1 (IntSi1) Prof. Dr. Andreas Steffen Institute for Internet Technologies and Applications.
Chapter 12 Cryptography (slides edited by Erin Chambers)
Cryptography Week-6.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
A Cryptography Education Tool Anna Yu Department of Computer Science College of Engineering North Carolina A&T State University June 18, 2009.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Dr. Khalid A. Kaabneh Amman Arab University
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
T TT The Cryptography Istituto Tecnico Industriale “E.Divini” San Severino Marche.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
Cryptology By Greg Buss Pat Shields Barry Burke. What is Cryptology? Cryptology is the study of “secret writing.” Modern cryptology combines the studies.
Cryptography, Authentication and Digital Signatures
Based on Applied Cryptography by Schneier Chapter 1: Foundations Dulal C. Kar.
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
Improving Encryption Algorithms Betty Huang Computer Systems Lab
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Introduction to cryptography by konrad. Introduction to cryptography Cryptography is the process of encrypting/decrypting data streams using some E(M)/D(M)
Network Security Lecture 10 Presented by: Dr. Munam Ali Shah.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
1 Public-Key Cryptography and Message Authentication.
Cryptography Lynn Ackler Southern Oregon University.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
15-499Page :Algorithms and Applications Cryptography I – Introduction – Terminology – Some primitives – Some protocols.
NEW DIRECTIONS IN CRYPTOGRAPHY Made Harta Dwijaksara, Yi Jae Park.
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 Principles Applications Requirements RSA Algorithm Description.
Encryption CS110: Computer Science and the Internet.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
Computer Security Lecture 5 Ch.9 Public-Key Cryptography And RSA Prepared by Dr. Lamiaa Elshenawy.
DIGITAL SIGNATURE IMPLEMENTATION
Discrete Mathematical Structures: Theory and Applications 1 Cryptography (advanced extra curricular topic)  Cryptography (from the Greek words Kryptos,
1 Cryptography Troy Latchman Byungchil Kim. 2 Fundamentals We know that the medium we use to transmit data is insecure, e.g. can be sniffed. We know that.
Lecture 3 (Chapter 9) Public-Key Cryptography and RSA Prepared by Dr. Lamiaa M. Elshenawy 1.
CSCI 391: Practical Cryptology Introduction. Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to.
INCS 741: Cryptography Overview and Basic Concepts.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Network Security  introduction  cryptography  authentication  key exchange  required reading: text section 7.1.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
PART VII Security.
Introduction to Cryptography
Security in Distributed Systems
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

National Institute of Science & Technology Cryptology and Its Applications Akshat Mathur [1] Cryptology and Its Applications Presented By AKSHAT MATHUR Roll # EC Under the guidance of Dr. Parth S. Mallick

National Institute of Science & Technology Cryptology and Its Applications Akshat Mathur [2] Introduction The science of cryptology is the science of secure communications, formed from the Greek words kryptós, "hidden", and logos, "word". Useful Terminology CIPHERTEXT CODE CRYPTANALYSIS CRYPTOGRAPHY CRYPTOSYSTEM DECRYPTION ENCRYPTION

National Institute of Science & Technology Cryptology and Its Applications Akshat Mathur [3] Cryptography PRODUCT CIPHERS ADFGBX ASUBJEC DTADFGH FIKLMNO GPQRVWX VYZ0123 X MERCHANTTAYLORS FGFG AVAV GFGF AXAX DXDXD FVFV DADA DADAD VAVAF FXFX GFGFA

National Institute of Science & Technology Cryptology and Its Applications Akshat Mathur [4] Cryptography Block Ciphers It is a type of symmetric-key encryption algorithm that changes a fixed length of block text into same length of Cipher text. Encryption works by means of key and Decryption is the reverse of encryption process using the same key. Stream Ciphers The encryption method is based on simple XOR of binary bits. It encrypts one bit at a time. The key sequence is generated on highly complex mathematical algorithms. LFSR based on primitive polynomials and combination of several LFSR using linear and nonlinear logic provides a very high level of complexity.

National Institute of Science & Technology Cryptology and Its Applications Akshat Mathur [5] Cryptography Public Key Cryptography –RSA Algorithm In this system a user chooses a pair of prime numbers so large that factorizing the product is beyond all computing capabilities. Stages of sending the message by this method. –The receiver, M, distributes his public key pair. –The sender, F, composes a plain text message, m, and then uses Ms public key to encrypt the message and from cipher text, c. c is the remainder left when m is raised to the power of e and divided by the modulus n.

National Institute of Science & Technology Cryptology and Its Applications Akshat Mathur [6] Cryptography –c = me mod n (where e and n are Ms public key pair). –F sends the ciphertext, c, to M. –The receiver, M, decrypts the ciphertext and retrieves the plaintext message, m. m is the remainder obtained when c is raised to the power of d and divided by n. –m = cd mod n –As you can see, this process requires d, which only M knows. Another person, I, who intercepts the message, can not decrypt it. –Example: »Let p = 5, q = 11, n = pq = 55 »The least common multiple of (p-1)(q-1) is 20 = 22 ´ 5.

National Institute of Science & Technology Cryptology and Its Applications Akshat Mathur [7] Cryptography »Therefore, in this case, any key, e, not divisible by 2 or 5 will have a matching key, d (e must be relatively prime to (p-1)(q-1) for it to be the key). »Let e = 7 »(ed -1) mod (p-1)(q-1) = 0 \ d = 3 »Let the plaintext message, m = b = 2 »\ The ciphertext, c = me mod n = 27 mod 55 = 18 »To decrypt this information it is necessary to know d. »m’ = cd mod n = 183 mod 55 = 2 \ The message has been successfully decrypted.

National Institute of Science & Technology Cryptology and Its Applications Akshat Mathur [8] Cryptography in the "Real World" Applications of Cryptography –military and diplomatic services –protecting confidential company information, telephone calls –Internet Business –lottery tickets

National Institute of Science & Technology Cryptology and Its Applications Akshat Mathur [9] Cryptanalysis Unlike cryptography which is a clearly defined science, cryptanalysis is as much an art as it is a science. Types of Cryptanalysis: The type used depends on the type of cipher and how much information the cryptanalyst has. –Types Of Cryptanalytic Attacks A brute force attack Dictionary attack Ciphertext only attack Chosen plaintext An adaptive chosen plaintext

National Institute of Science & Technology Cryptology and Its Applications Akshat Mathur [10] Cryptanalysis A Triumph of Cryptanalysis – Enigma –What Was Enigma? The Enigma machine consisted of a 26 letter keyboard for input. The output was read off 26 lamps which each corresponded to a letter. The encipherment was performed by a device called a "scrambler" that was made of three rotating wheels on a common spindle and a plug board known as a "Steckerboard" that added an additional level of security.

National Institute of Science & Technology Cryptology and Its Applications Akshat Mathur [11] Cryptanalysis –What Made It Possible? With the level of sophistication of the Enigma machines it should have been unbreakable. However, the Germans had a number of procedural flaws which allowed the British and Polish to break the cipher.

National Institute of Science & Technology Cryptology and Its Applications Akshat Mathur [12] CONCLUSION Military cryptography for encryption may still remain mainly symmetric key based for obvious reasons. Public key cryptography would develop more in near future particularly in the context of key exchange and digital signatures. Simultaneously, the challenging area of the cryptanalysis, being the other side of the development exercise will gain the importance in the view of the plethora of applications demanding assured security.

National Institute of Science & Technology Cryptology and Its Applications Akshat Mathur [13] THANK YOU !!!

National Institute of Science & Technology Cryptology and Its Applications Akshat Mathur [14]