Download presentation
Presentation is loading. Please wait.
Published byElijah Barton Modified over 8 years ago
1
Cryptography Presented By: Yogita Dey Amardeep Kahali Dipanjan Devnagar Minhaajuddin Ahmad Khan ECE4, NIT Securing the Information Age
2
Background Information Security requirements have changed in recent times Traditionally provided by physical and administrative mechanisms Computer use requires automated tools to protect files and other stored information Use of networks and communications links requires measures to protect data during transmission
3
Need for Information Security Defending against external/internal hackers Defending against industrial espionage Securing E-commerce Securing bank accounts/electronic transfers Securing intellectual property Avoiding liability
4
Threats to Information Security Pervasiveness of email/networks Online storage of sensitive information Insecure technologies (e.g. wireless) Trend towards paperless society Weak legal protection of email privacy
5
Essential Terms Cryptography Encryption (code) Plain text Cipher text Decryption (decode) Cipher text Plain text Cryptanalysis Cryptology
6
Cryptographic Algorithms Symmetric Key or secret key: Involves use of one key. Asymmetric key or public key: Involves use of two keys viz. public and private. Message Digest. Hash Functions.
7
Symmetric Key Cryptography Same secret key is used by both sender and receiver, which is shared between them. Sender uses the key and an encryption algorithm for encryption. Receiver uses the same key and the corresponding decryption algorithm for decryption.
8
Traditional Ciphers Substitution Mono alphabetic e.g. Caesar cipher Poly alphabetic e.g. Vigenère cipher, Hill cipher Transposition Scytale Reverse Rail Fence Geometric Row/Column
9
Modern Ciphers Simple Modern Ciphers XOR Cipher Rotation Cipher S-box (Substitution) P-box (Permutation) Modern Round Ciphers DES (Data Encryption Standard) and derivatives: double DES and triple DES IDEA (International Data Encryption Algorithm) Blowfish CAST-128 RC5 (Rivest Cipher #5) AES (Advanced Encryption Standard)
10
Two types of symmetric ciphers Stream ciphers – Encrypt one bit at time Block ciphers – Break plaintext message in equal-size blocks – Encrypt each block as a unit
11
Stream Ciphers Combine each bit of keystream with bit of plaintext to get bit of ciphertext m(i) = i th bit of message k s (i) = i th bit of keystream c(i) = i th bit of ciphertext c(i) = k s (i) m(i) m(i) = k s (i) c(i)
12
RC5 Stream Cipher Feistel like network Variable block size (32,63 or 128 bits) Key size (0 to 2040 bits) Use of data dependent rotations Really simple 12-round RC5 (with 64-bit blocks) is susceptible to a differential attack using 244 chosen plaintexts
13
Block Ciphers Message to be encrypted is processed in blocks of k bits (e.g., 64-bit blocks). 1-to-1 mapping is used to map k-bit block of plaintext to k-bit block of ciphertext Example with k=3 input output 000 110 001 111 010 101 011 100 input output 100 011 101 010 110 000 111 001
14
Data Encryption Standard (DES) US encryption standard designed by IBM [NIST 1993] 56-bit symmetric key, 64-bit plaintext input Block cipher with cipher block chaining 56-bit-key-encrypted phrase decrypted (brute force) in less than a day No known good analytic attack
15
Data Encryption Standard (DES) initial permutation 16 identical “rounds” of function application, each using different 48 bits of key final permutation DES operation
16
Advanced Encryption Standard (AES) New (Nov. 2001) symmetric-key NIST standard, replacing DES Based on Rijndael Algorithm Processes data in 128 bit blocks 128, 192, or 256 bit keys Brute force decryption taking 1 sec on DES, takes 149 trillion years for AES
17
Asymmetric Key Cryptography Here sender and receiver do not share keys. There are two different keys: a private key which is kept by the receiver and a public key that is known to all. Sender uses public key to encrypt and receiver uses the private key to decrypt the message.
18
RSA (Rivest, Shamir, Adelman) DH (Diffie-Hellman Key Agreement Algorithm) ECDH (Elliptic Curve Diffie-Hellman Key Agreement Algorithm) RPK (Raike Public Key) Public Key Crypto Algorithms
19
Choose two distinct prime numbers p and q. Compute n = pq Compute φ (n) = (p – 1)(q – 1) Choose an integer e such that 1 < e < φ (n) and e and φ (n) are coprime Determine d = e -1 mod φ (n) e is released as the public key exponent and d is kept as the private key exponent RSA Algorithm
20
RSA Algorithm (contd.)
21
A hybrid encryption technology Message is encrypted using a private key algorithm (IDEA) Key is then encrypted using a public key algorithm (RSA) For file encryption, only IDEA algorithm is used PGP is free for home use Pretty Good Privacy (PGP)
22
Digital Signatures Made by encrypting a message digest (cryptographic checksum) with the sender’s private key Receiver decrypts with the sender’s public key (roles of private and public keys are flipped) Prevents Impostor attacks Content tampering Timing modification
23
Currently Available Technologies MD4 and MD5 (Message Digest) SHA-1 (Secure Hash Algorithm version 1) DSA (The Digital Signature Algorithm) ECDSA (Elliptic Curve DSA) Kerberos OPS (Open Profiling Standard) VeriSign Digital IDs
24
Benefits of Cryptographic Technologies Data secrecy Data integrity Authentication of message originator Electronic certification and digital signature Non-repudiation
25
Potential Problems False sense of security if badly implemented Government regulation of cryptographic technologies/export restrictions Encryption prohibited in some countries All public key schemes are susceptible to brute force attacks…only the work factor varies With decreasing cost of computer power and mathematical discoveries, work factor is decreasing
26
Remarks Encryption does not guarantee security! Many ways to beat a crypto system NOT dependent on cryptanalysis, such as: Viruses, worms, hackers, etc. TEMPEST attacks Unauthorized physical access to secret keys Cryptography is only one element of comprehensive computer security
27
Thank You
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.