CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Cryptography Ch-1 prepared by: Diwan.
Cryptography encryption authentication digital signatures
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Topic 7: Using cryptography in mobile computing. Cryptography basics: symmetric, public-key, hash function and digital signature Cryptography, describing.
Lecture 2.1: Private Key Cryptography -- I CS 436/636/736 Spring 2013 Nitesh Saxena.
A Presentation by: ~Ksenia Potapov ~Amariah Condon ~Janette Fong ~Janice Lau CRYPTOGRAPHY.
Cryptography The science of writing in secret code.
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
Block Ciphers: Workhorses of Cryptography COMP 1721 A Winter 2004.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 29 Cryptography and Network.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Ref: STAL03More Concepts of Cryptography and Cryptanalysis 1 Reference –William Stallings, Cryptography and Network Security, 3rd Edition, Prentice Hall.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Network Security Chapter
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Cryptography Week-6.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
CIS 5371 Cryptography Introduction.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (1) Information Security.
Cryptography, Authentication and Digital Signatures
CSCE 201 Introduction to Information Security Fall 2010 Data Protection.
Based on Applied Cryptography by Schneier Chapter 1: Foundations Dulal C. Kar.
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
Network Security Lecture 10 Presented by: Dr. Munam Ali Shah.
Cryptography Lynn Ackler Southern Oregon University.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
What is Digital Signature Building confidentiality and trust into networked transactions. Kishankant Yadav
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Intro to Cryptography Lesson Introduction
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
BZUPAGES.COM Cryptography Cryptography is the technique of converting a message into unintelligible or non-understandable form such that even if some unauthorized.
Symmetric Cipher Model Plaintext input 1- encryption algorithm 2- secret key Encryption Cipher text output Cipher text input 1- Decryption algorithm 2-
CSI-09 COMMUNICATION TECHNOLOGY SECURITY MECHANISMS IN A NETWORK AUTHOR - V. V. SUBRAHMANYAM.
Introduction to Cryptology Fall Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.
EE 122: Lecture 24 (Security) Ion Stoica December 4, 2001.
Computer Security (CS4800)
CSCI 391: Practical Cryptology Introduction. Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Introduction (Pendahuluan)  Information Security  Criptography.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Cryptography Introduction. Definition Origin Objectives Terminologies References Agenda.
Chapter-2 Classical Encryption Techniques.
Chapter 3:Cryptography (16M)
Chapter 29 Cryptography and Network Security
Unit 2: Cryptography & Cryptographic Algorithm
Computer Security Chapter Two
Basics Of Symmetric Encryption
Symmetric Encryption or conventional / private-key / single-key
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

CRYPTOGRAPHY

TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public key cryptosystem Application Bibliography

DEFINATION OF CRYPTOGRAPHY Cryptography is the study of mathematical techniques related to the aspects of information security, such as confidentially, data integrity and entity authentication. Cryptography is not only means of providing information, but rather one set of techniques.

Related Terms Plain text :-Original Message Cipher text:-Coded Message. Encryption:-The process of converting plain text into cipher text. Decryption:-Restoring plain text from cipher text.

Cryptography:-The science or area of Encryption & Decryption Cryptanalysis:-The science of analysis or breaking of secure communication Cryptology :- The area of cryptography and cryptanalysis together

Categories OF CRYPTOGRAPHY There are two types of cryptographic algorithm Symmetric key Asymmetric key

GOALS OF CRYPTOGRAPHY Confidentially Data Integrity Authentication Non-repudiation

ASPECTS OF SECURITY Security Service Security Mechanism Security Attacks Passive Attacks Active Attacks

MODEL OF NETWORK SECURITY

There are four basic tasks in designing a particular security services. Design an algorithm Generate a secret information Develop methods for distribution and sharing Specify the protocol

SUBSTITUTION TECHNIQUES CAESAR CIPHER To Encrypt using Caesar's key value of 3,we offset the alphabet so that the 3rd letter down (D) begins the alphabet. ABCDEFGHIJKLMNOPQRSTUVWXYZ and sliding everything up by 3, you get DEFGHIJKLMNOPQRSTUVWXYZABC where D=A, E=B, F=C, and so on. "SECRET" encrypts as "VHFUHW."

TRANSPOSITION TECHNIQUES Plain text = “meet me after this party” Key = 2 m e m a t r h s a t e t e f e t i p r y Cipher text =“mematrshsatetefetipry”

A more complex scheme is Key plaintext: a t t a c k p o s t p o n e d u n t I l t Ciphertext: TTNAPTTSUAODCOLKNLPET

DES ALGORITHM

Public Key Cryptosystem: Secrecy Encryption Algorithm Source A Source Destination Decryption Algorithm Key pair source Cryptanalyst Destination B B’s public keyB’s private key

Public Key Cryptosystem: Authentication Encryption Algorithm Source A Source Destination Decryption Algorithm Key pair source Cryptanalyst Destination B A’s private key A’s public key

Public Key Cryptosystem: Secrecy & Authentication Encry. Algori- them Encry. Algori- them Decry. Algori- them Decry. Algori- them Sourc e Dest. Key Pair Source Key Pair Source B’s private key B’s public key A’s public key Source A Destination B A’s private key

APPLICATION Secure Communication Identification & Authentication Secret Sharing

BIBLIOGRAPHY Cryptography & Network Security By William Stallings Computer Network By Andrew S. Tanenbaum

THANK YOU