CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

CLASSICAL ENCRYPTION TECHNIQUES
Cryptography encryption authentication digital signatures
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Topic 7: Using cryptography in mobile computing. Cryptography basics: symmetric, public-key, hash function and digital signature Cryptography, describing.
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
Intro 1 Introduction Intro 2 Good Guys and Bad Guys  Alice and Bob are the good guys  Trudy is the bad guy  Trudy is our generic “intruder”
Management Information Systems Lection 05 Coding and encryption CLARK UNIVERSITY College of Professional and Continuing Education (COPACE)
A Presentation by: ~Ksenia Potapov ~Amariah Condon ~Janette Fong ~Janice Lau CRYPTOGRAPHY.
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Encryption Methods By: Michael A. Scott
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Cryptography Week-6.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
1st Class Discrete Structures الهياكل المتقطعة أستاذة المادة: م. م
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
T TT The Cryptography Istituto Tecnico Industriale “E.Divini” San Severino Marche.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (1) Information Security.
GROUP 11 Dhita Puspita Larasati Topan Firmansyah Dimas Kurnia Ayatullah Galih Purwanti Rahma Aprilia Handayani
Cryptography, Authentication and Digital Signatures
CSCE 201 Introduction to Information Security Fall 2010 Data Protection.
Based on Applied Cryptography by Schneier Chapter 1: Foundations Dulal C. Kar.
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Dr. Susan Al Naqshbandi The word “Cryptography” is derived from Greek words κρυπτός kryptós meaning “hidden” and γράφω gráfo meaning.
Chapter 20 Symmetric Encryption and Message Confidentiality.
National Institute of Science & Technology Cryptology and Its Applications Akshat Mathur [1] Cryptology and Its Applications Presented By AKSHAT MATHUR.
Network Security Lecture 10 Presented by: Dr. Munam Ali Shah.
Cryptography Lynn Ackler Southern Oregon University.
Classical Crypto By: Luong-Sorin VA, IMIT Dith Nimol, IMIT.
1 Information Security Practice I Lab 5. 2 Cryptography and security Cryptography is the science of using mathematics to encrypt and decrypt data.
 Cryptography is the science of using mathematics to encrypt and decrypt data.  Cryptography enables you to store sensitive.
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Lecture 23 Symmetric Encryption
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Intro to Cryptography Lesson Introduction
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
BZUPAGES.COM Cryptography Cryptography is the technique of converting a message into unintelligible or non-understandable form such that even if some unauthorized.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
Lecture 3 Page 1 CS 236 Online Introduction to Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
INCS 741: Cryptography Overview and Basic Concepts.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Introduction (Pendahuluan)  Information Security  Criptography.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Introduction Of System Security
Chapter-2 Classical Encryption Techniques.
Cryptography.
Chapter 3:Cryptography (16M)
مروري برالگوريتمهاي رمز متقارن(كليد پنهان)
Security through Encryption
Security.
DISSERTATION ON CRYPTOGRAPHY.
Computer Security Chapter Two
Cryptanalysis Network Security.
Symmetric Encryption or conventional / private-key / single-key
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1

OVERVIEW  Cryptography  Vocabulary  Encryption and Decryption  Transmission Technique  Symmetric Cryptography  Asymmetric Cryptography  Conclusion 2

What is Cryptography ?  Cryptography is the science of using mathematics to encrypt and decrypt data. Benefit ? Cryptography enables you to store sensitive information or transmit it across insecure networks so that it cannot be read by anyone except the intended recipient. 3

VOCABULARY  Plaintext: Data that can be read and understood without any special measures.  Encryption: The method of disguising plaintext in such a way as to hide its substance is called encryption.  Cipher text: Encrypting plaintext results in unreadable gibberish called cipher text.  Decryption: The process of reverting cipher text to its original plaintext is called decryption.  Key: some secret piece of information that customizes how the cipher text is 4

…continued  Cryptanalysis: The art of breaking ciphers, i.e. retrieving the plaintext without knowing the proper key.  Cryptographers: People who do cryptography  Cryptanalysts: Practitioners of cryptanalysis.  Cryptology: The branch of mathematics that studies the mathematical foundations of cryptographic methods.  Cipher: The Encoder 5

ENCRYPTION & DECRYPTION encryption plaintext decryption ciphertext plaintext 6

Why Cryptography ?  For “secret writing”  To establish a shared secret when other people (eavesdroppers) are listening.  Types of Cryptography 1. Symmetric key cryptography 2. Asymmetric key cryptography 7

Transmission Technique Sender Plaintext in Encoder Ciphertext out Eavesdropper Ciphertext in Decoder Plaintext in Receiver 8

CLASSIFICATION Cryptography Symmetric Key Cryptography Asymmetric Key Cryptograph 9

Symmetric Key Cryptography Classical Approach Modern Approach Classical Approach Transposition Cipher Substitution Cipher Modern Approach Stream CipherBlock Cipher 10

SYMMETRIC KEY CRYPTOGRPHY Symmetric Key Cryptography are algorithms for that use the same key for both encryption of plaintext and decryption of ciphertext. They may be identical or there may be a simple transformation to go between the two. Plaintext Encryption Key “ X “ Ciphertext Decryption Key “ X ” Plaintext 11

TRANSPOSITION CIPHER In classical cryptography, a transposition cipher changes one character from the plaintext to another i.e. the order of the characters is changed e.g Plaintext : T O P S E C R E T Ciphertext : O T S P E R C T E 12

SUBSTITUTION CIPHER Substitution cipher is a method of encryption by which units of plaintext are substituted with ciphertext according to a regular system. e.g. Plaintext : A B C D X Y Z Ciphertext : A B C D E F X Y Z 13

STREAM CIPHER A Stream Cipher is a symmetric or secret-key encryption algorithm that encrypts a single bit at a time. With a Stream Cipher, the same plaintext bit or byte will encrypt to a different bit or byte every time it is encrypted. e.g. : Plain text: Pay 100 Binary of plain text : (hypothetical) Key : Perform XOR Cipher text :

BLOCK CIPHER Block cipher technique involves encryption of one block of text at a time. Decryption also takes one block of encrypted text at a time. Length of the block is usually 64 or 128 bits. e.g. : Plain text : four and five Four and five Key Key Key wvfa ast wvfe Ciphertext : wvfa ast wvfe 15

ASYMMETRIC KEY CRYPTOGRAPHY Asymmetric Key Cryptography is an asymmetric scheme that uses a Pair of keys for encryption: a Public key, which encrypts data, and a corresponding Private key (secret key). Plaintext Encryption : Public Key Ciphertext Decryption : Private key Plaintext 16

CRYPTANALYSIS  Cryptanalysis refers to the study of ciphers, cipher text, or cryptosystems (that is, to secret code systems) with a view to finding weaknesses in them that will permit retrieval of the plain text from the cipher text, without necessarily knowing the key or the algorithm. This is known as breaking the cipher, cipher text, or cryptosystem.  Unlike cryptography which is a clearly defined science, Cryptanalysis is as much an art as it is a science. 17

Cryptanalysis Techniques  Known - plain text analysis  Chosen – plain text analysis (Differential cryptanalysis)  Cipher text - only analysis  Man – in – the - middle attack 18

ACOUSTIC CRYPTANALYSIS  It is a side channel attack which exploits sounds emitted by computers or machines.  Modern acoustic cryptanalysis mostly focuses on sounds emitted by computer keyboards and internal computer components  Historically it has also been applied to impact printers and electromechanical cipher machines. 19

CONCLUSION  Cryptography, being an art of encrypting and decrypting confidential information and private messages, should be implemented in the network security to prevent any leakage and threat.  It can be done by using any of these techniques discussed above for fortifying the personal data transmission as well as for secure transaction.  Acoustic cryptanalysis, being an art of decrypting or leaking confidential information from the sound generated from the CPU, Keyboard, printers, etc may be used in both constructive as well as destructive 20

REFERENCE  Yang, Sarah (14 September 2005), "Researchers recover typed text using audio recording of keystrokes", UC Berkeley News.  Adi Shamir & Eran Tromer. "Acoustic cryptanalysis". Blavatnik School of Computer Science, Tel Aviv University. Retrieved 1 November   21

THANK YOU… 22

Q & A 23