SlideShare uma empresa Scribd logo
1 de 20
Cryptography
A way of Texting Secretly
2
Cryptography
Cryptography
The field of study related to encoded information
(comes from Greek word for "secret writing")
Encryption
The process of converting plaintext into ciphertext
Decryption
The process of converting ciphertext into plaintext
3
Cryptography
plaintext
message
ciphertext
message
Encryption
Decryption
Encrypted(Information) cannot be read
Decrypted(Encrypted(Information)) can be
4
Cryptography
Cipher
An algorithm used to encrypt and decrypt text
Key
The set of parameters that guide a cipher
Neither is any good without the other
5
Encryption / Decryption
• Encryption: A process of encoding a message,
so that its meaning is not obvious. (=
encoding, enciphering)
• Decryption: A process of decoding an
encrypted message back into its original form.
(= decoding, deciphering)
• A cryptosystem is a system for encryption and
decryption.
6
Plaintext / ciphertext
• P: plaintext
• C: ciphertext
• E: encryption
• D: decryption
• C = E (P)
• P = D (C)
• P = D ( E(P) )
7
Terminology
• Cryptography: The practice of using
encryption to conceal text. (cryptographer)
• Cryptanalysis: The study of encryption and
encrypted messages, with the goal of
finding the hidden meanings of the
messages. (cryptanalyst)
• Cryptology = cryptography + cryptanalysis
csci5233 computer security & integrity 8
Two forms of encryption
• Substitutions
One letter is exchanged for another
Examples: monoalphabetic substitution ciphers,
polyalphabetic substitution ciphers
• Transpositions (= permutations)
The order of the letters is rearranged
Examples: columnar transpositions
9
Cryptanalysis
• The process of decrypting a message without
knowing the cipher or the key used to encrypt it
• A cryptanalyst may work with various data
(intercepted messages, data items known or
suspected to be in a cipher-text message),
known encryption algorithms, mathematical or
statistical tools and techniques, properties of
languages, computers, and plenty of ingenuity
and luck.
1. Attempt to break a single message
2. Attempt to recognize patterns in encrypted messages
3. Attempt to find general weakness in an encryption
algorithm
Substitution Ciphers
• A cipher that substitutes one character with
another.
• These can be as simple as swapping a list, or
can be based on more complex rules.
• These are NOT secure anymore, but they used
to be quite common.
11
Caesar ciphers
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
D E F G H I J K L M N O P Q R S T U V W X Y Z A B C
Substitute the letters in the second row for the letters in the top
row to encrypt a message
Encrypt(COMPUTER) gives FRPSXWHU
Substitute the letters in the first row for the letters in the second
row to decrypt a message
Decrypt(Encrypt(COMPUTER))
= Decrypt(FRPSXWHU) = COMPUTER
12
Transposition Cipher
T O D A Y
+ I S + M
O N D A Y
Write the letters in a row of five, using '+' as a blank. Encrypt by starting
spiraling inward from the top left moving counter clockwise
Encrypt(TODAY IS MONDAY) gives T+ONDAYMYADOIS+
Decrypt by recreating the grid and reading the letters across the row
The key are the dimension of the grid and the route used to encrypt the data
13
Cryptosystems
• Symmetric encryption:
P = D (Key, E(Key,P) )
• Asymmetric encryption:
P = D (KeyD, E(KeyE,P) )
• Symmetric cryptosystem: A cryptosystem
that uses symmetric encryption.
• Asymmetric cryptosystem: A cryptosystem
that uses Asymmetric encryption.
Encryption on computers
• Roughly speaking, there are two different broad
types of encryption that are used on computers
today
– Symmetric encryption relies on keeping keys totally secret
– Asymmetric encryption actually publicizes one key, but
keeps some information private also
• Neither is really “better” - they just use different
principles.
• In reality, both are vulnerable to attacks.
Secret Key Encryption
• Secret-key ciphers generally fall into one of
two categories:
– Stream Ciphers: A stream cipher applies the key
and algorithm one bit at a time.
– Block Ciphers: A block cipher applies a private key
and algorithm to a block of data simultaneously.
Symmetric Cryptography
• In cryptography, a private key (secret key) is a
variable that is used with an algorithm to
encrypt and decrypt code.
• It is also known as private key encryption, uses
the same private key for both encryption and
decryption. The risk in this system is that if
either party loses the key or the key is
intercepted, the system is broken and
messages cannot be exchanged securely.
Asymmetric Cryptography
• It is also known as public key encryption, uses
two different but mathematically linked keys.
The complexity and length of the private key
determine how feasible it is for an interloper
to carry out a brute force attack and try out
different keys until the right one is found. The
challenge for this system is that significant
computing resources are required to create
long, strong private keys.
Secret Key Algorithm
• A secret key algorithm (sometimes called
a symmetric algorithm) is a cryptographic
algorithm that uses the same key to encrypt
and decrypt data. The best known algorithm is
the U.S. Department of Defense's Data
Encryption Standard (DES). DES, which was
developed at IBM in 1977, was thought to be
so difficult to break that the U.S. government
restricted its exportation.
RSA
• In 1977, Rivest, Shamir, and Adleman came up
with another way to use public key
cryptography
• Rather than secure key exchanges, this one
actually lets you encrypt whole messages
• Today, this is the most commonly used public
key cryptosystem on the market
Query Session
Wirtu Drddopm

Mais conteúdo relacionado

Mais procurados

Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)Anas Rock
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographyMd. Afif Al Mamun
 
Cryptography
CryptographyCryptography
CryptographyAnandKaGe
 
cryptography ppt free download
cryptography ppt free downloadcryptography ppt free download
cryptography ppt free downloadTwinkal Harsora
 
Cryptography and network security Nit701
Cryptography and network security Nit701Cryptography and network security Nit701
Cryptography and network security Nit701Amit Pathak
 
Cryptography
CryptographyCryptography
CryptographyPPT4U
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographySeema Goel
 
Cryptography - A Brief History
Cryptography - A Brief HistoryCryptography - A Brief History
Cryptography - A Brief Historyprasenjeetd
 
Different types of Symmetric key Cryptography
Different types of Symmetric key CryptographyDifferent types of Symmetric key Cryptography
Different types of Symmetric key Cryptographysubhradeep mitra
 
Intro to modern cryptography
Intro to modern cryptographyIntro to modern cryptography
Intro to modern cryptographyzahid-mian
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network SecurityRamki M
 

Mais procurados (20)

Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
cryptography ppt free download
cryptography ppt free downloadcryptography ppt free download
cryptography ppt free download
 
Cryptography Intro
Cryptography IntroCryptography Intro
Cryptography Intro
 
Basic cryptography
Basic cryptographyBasic cryptography
Basic cryptography
 
Cryptography and network security Nit701
Cryptography and network security Nit701Cryptography and network security Nit701
Cryptography and network security Nit701
 
Cryptography cse,ru
Cryptography cse,ruCryptography cse,ru
Cryptography cse,ru
 
Cryptography
CryptographyCryptography
Cryptography
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Cryptography - A Brief History
Cryptography - A Brief HistoryCryptography - A Brief History
Cryptography - A Brief History
 
Cryptography - 101
Cryptography - 101Cryptography - 101
Cryptography - 101
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Different types of Symmetric key Cryptography
Different types of Symmetric key CryptographyDifferent types of Symmetric key Cryptography
Different types of Symmetric key Cryptography
 
Intro to modern cryptography
Intro to modern cryptographyIntro to modern cryptography
Intro to modern cryptography
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
Cryptography
CryptographyCryptography
Cryptography
 

Semelhante a Cryptography

Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarDurlove Kumbhakar
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Saif Kassim
 
Ch12 Encryption
Ch12 EncryptionCh12 Encryption
Ch12 Encryptionphanleson
 
Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overviewppd1961
 
Cryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptxCryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptxSamiDan3
 
Cryptography- "A Black Art"
Cryptography- "A Black Art"Cryptography- "A Black Art"
Cryptography- "A Black Art"Aditya Raina
 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxjibonjibon5
 
Bt0088 cryptography and network security1
Bt0088 cryptography and network security1Bt0088 cryptography and network security1
Bt0088 cryptography and network security1Techglyphs
 
6. cryptography
6. cryptography6. cryptography
6. cryptography7wounders
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network SecurityPa Van Tanku
 
information technology cryptography Msc chapter 1-4.pdf
information technology  cryptography Msc chapter 1-4.pdfinformation technology  cryptography Msc chapter 1-4.pdf
information technology cryptography Msc chapter 1-4.pdfwondimagegndesta
 
7-cryptography.ppt
7-cryptography.ppt7-cryptography.ppt
7-cryptography.pptGhamdan5
 

Semelhante a Cryptography (20)

Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab Kumbhakar
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01
 
Cryptography
CryptographyCryptography
Cryptography
 
Security - ch3.pptx
Security - ch3.pptxSecurity - ch3.pptx
Security - ch3.pptx
 
Cns 1
Cns 1Cns 1
Cns 1
 
Ch12 Encryption
Ch12 EncryptionCh12 Encryption
Ch12 Encryption
 
Security - ch3.pptx
Security - ch3.pptxSecurity - ch3.pptx
Security - ch3.pptx
 
Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overview
 
Cryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptxCryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptx
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography- "A Black Art"
Cryptography- "A Black Art"Cryptography- "A Black Art"
Cryptography- "A Black Art"
 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
 
Bt0088 cryptography and network security1
Bt0088 cryptography and network security1Bt0088 cryptography and network security1
Bt0088 cryptography and network security1
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
chapter 1-4.pdf
chapter 1-4.pdfchapter 1-4.pdf
chapter 1-4.pdf
 
information technology cryptography Msc chapter 1-4.pdf
information technology  cryptography Msc chapter 1-4.pdfinformation technology  cryptography Msc chapter 1-4.pdf
information technology cryptography Msc chapter 1-4.pdf
 
7-cryptography.ppt
7-cryptography.ppt7-cryptography.ppt
7-cryptography.ppt
 
7-cryptography.ppt
7-cryptography.ppt7-cryptography.ppt
7-cryptography.ppt
 
7-cryptography.ppt
7-cryptography.ppt7-cryptography.ppt
7-cryptography.ppt
 

Mais de Nishant Pahad

International business 1
International business 1International business 1
International business 1Nishant Pahad
 
International business 4 WORLD TRADE
International business 4 WORLD TRADEInternational business 4 WORLD TRADE
International business 4 WORLD TRADENishant Pahad
 
International business 2 ECONOMIC SYSTEM
International business 2 ECONOMIC SYSTEMInternational business 2 ECONOMIC SYSTEM
International business 2 ECONOMIC SYSTEMNishant Pahad
 
10 online transactions
10 online transactions10 online transactions
10 online transactionsNishant Pahad
 
Micro finance in India: legal and regulatory framework
Micro finance in India: legal and regulatory frameworkMicro finance in India: legal and regulatory framework
Micro finance in India: legal and regulatory frameworkNishant Pahad
 
Credit facilities and support services
Credit facilities and support services Credit facilities and support services
Credit facilities and support services Nishant Pahad
 
e-business technologies and trends
e-business technologies and trendse-business technologies and trends
e-business technologies and trendsNishant Pahad
 
E marketing planning
E marketing planningE marketing planning
E marketing planningNishant Pahad
 
E marketing planning
E marketing planningE marketing planning
E marketing planningNishant Pahad
 
Unit 5 E-BUSINESS OPERATIONS AND PROCESSES
Unit 5 E-BUSINESS OPERATIONS AND PROCESSESUnit 5 E-BUSINESS OPERATIONS AND PROCESSES
Unit 5 E-BUSINESS OPERATIONS AND PROCESSESNishant Pahad
 
Online commodity trading
Online commodity tradingOnline commodity trading
Online commodity tradingNishant Pahad
 
commodity trading and derivatives
commodity trading and derivativescommodity trading and derivatives
commodity trading and derivativesNishant Pahad
 
Commodity derivatives
Commodity derivativesCommodity derivatives
Commodity derivativesNishant Pahad
 
Issues and challenges in e-business
Issues and challenges in e-businessIssues and challenges in e-business
Issues and challenges in e-businessNishant Pahad
 

Mais de Nishant Pahad (20)

International business 1
International business 1International business 1
International business 1
 
International business 4 WORLD TRADE
International business 4 WORLD TRADEInternational business 4 WORLD TRADE
International business 4 WORLD TRADE
 
International business 2 ECONOMIC SYSTEM
International business 2 ECONOMIC SYSTEMInternational business 2 ECONOMIC SYSTEM
International business 2 ECONOMIC SYSTEM
 
10 online transactions
10 online transactions10 online transactions
10 online transactions
 
Micro finance in India: legal and regulatory framework
Micro finance in India: legal and regulatory frameworkMicro finance in India: legal and regulatory framework
Micro finance in India: legal and regulatory framework
 
Credit facilities and support services
Credit facilities and support services Credit facilities and support services
Credit facilities and support services
 
e-business technologies and trends
e-business technologies and trendse-business technologies and trends
e-business technologies and trends
 
E ticketing
E ticketing E ticketing
E ticketing
 
E marketing planning
E marketing planningE marketing planning
E marketing planning
 
E marketing planning
E marketing planningE marketing planning
E marketing planning
 
E - governance
E - governanceE - governance
E - governance
 
E governance
E governance E governance
E governance
 
E banking
E bankingE banking
E banking
 
Unit 5 E-BUSINESS OPERATIONS AND PROCESSES
Unit 5 E-BUSINESS OPERATIONS AND PROCESSESUnit 5 E-BUSINESS OPERATIONS AND PROCESSES
Unit 5 E-BUSINESS OPERATIONS AND PROCESSES
 
Online commodity trading
Online commodity tradingOnline commodity trading
Online commodity trading
 
commodity trading and derivatives
commodity trading and derivativescommodity trading and derivatives
commodity trading and derivatives
 
Commodity derivatives
Commodity derivativesCommodity derivatives
Commodity derivatives
 
Issues and challenges in e-business
Issues and challenges in e-businessIssues and challenges in e-business
Issues and challenges in e-business
 
EDI
EDIEDI
EDI
 
E business models
E business modelsE business models
E business models
 

Último

DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxnelietumpap1
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 

Último (20)

DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 

Cryptography

  • 1. Cryptography A way of Texting Secretly
  • 2. 2 Cryptography Cryptography The field of study related to encoded information (comes from Greek word for "secret writing") Encryption The process of converting plaintext into ciphertext Decryption The process of converting ciphertext into plaintext
  • 4. 4 Cryptography Cipher An algorithm used to encrypt and decrypt text Key The set of parameters that guide a cipher Neither is any good without the other
  • 5. 5 Encryption / Decryption • Encryption: A process of encoding a message, so that its meaning is not obvious. (= encoding, enciphering) • Decryption: A process of decoding an encrypted message back into its original form. (= decoding, deciphering) • A cryptosystem is a system for encryption and decryption.
  • 6. 6 Plaintext / ciphertext • P: plaintext • C: ciphertext • E: encryption • D: decryption • C = E (P) • P = D (C) • P = D ( E(P) )
  • 7. 7 Terminology • Cryptography: The practice of using encryption to conceal text. (cryptographer) • Cryptanalysis: The study of encryption and encrypted messages, with the goal of finding the hidden meanings of the messages. (cryptanalyst) • Cryptology = cryptography + cryptanalysis
  • 8. csci5233 computer security & integrity 8 Two forms of encryption • Substitutions One letter is exchanged for another Examples: monoalphabetic substitution ciphers, polyalphabetic substitution ciphers • Transpositions (= permutations) The order of the letters is rearranged Examples: columnar transpositions
  • 9. 9 Cryptanalysis • The process of decrypting a message without knowing the cipher or the key used to encrypt it • A cryptanalyst may work with various data (intercepted messages, data items known or suspected to be in a cipher-text message), known encryption algorithms, mathematical or statistical tools and techniques, properties of languages, computers, and plenty of ingenuity and luck. 1. Attempt to break a single message 2. Attempt to recognize patterns in encrypted messages 3. Attempt to find general weakness in an encryption algorithm
  • 10. Substitution Ciphers • A cipher that substitutes one character with another. • These can be as simple as swapping a list, or can be based on more complex rules. • These are NOT secure anymore, but they used to be quite common.
  • 11. 11 Caesar ciphers A B C D E F G H I J K L M N O P Q R S T U V W X Y Z D E F G H I J K L M N O P Q R S T U V W X Y Z A B C Substitute the letters in the second row for the letters in the top row to encrypt a message Encrypt(COMPUTER) gives FRPSXWHU Substitute the letters in the first row for the letters in the second row to decrypt a message Decrypt(Encrypt(COMPUTER)) = Decrypt(FRPSXWHU) = COMPUTER
  • 12. 12 Transposition Cipher T O D A Y + I S + M O N D A Y Write the letters in a row of five, using '+' as a blank. Encrypt by starting spiraling inward from the top left moving counter clockwise Encrypt(TODAY IS MONDAY) gives T+ONDAYMYADOIS+ Decrypt by recreating the grid and reading the letters across the row The key are the dimension of the grid and the route used to encrypt the data
  • 13. 13 Cryptosystems • Symmetric encryption: P = D (Key, E(Key,P) ) • Asymmetric encryption: P = D (KeyD, E(KeyE,P) ) • Symmetric cryptosystem: A cryptosystem that uses symmetric encryption. • Asymmetric cryptosystem: A cryptosystem that uses Asymmetric encryption.
  • 14. Encryption on computers • Roughly speaking, there are two different broad types of encryption that are used on computers today – Symmetric encryption relies on keeping keys totally secret – Asymmetric encryption actually publicizes one key, but keeps some information private also • Neither is really “better” - they just use different principles. • In reality, both are vulnerable to attacks.
  • 15. Secret Key Encryption • Secret-key ciphers generally fall into one of two categories: – Stream Ciphers: A stream cipher applies the key and algorithm one bit at a time. – Block Ciphers: A block cipher applies a private key and algorithm to a block of data simultaneously.
  • 16. Symmetric Cryptography • In cryptography, a private key (secret key) is a variable that is used with an algorithm to encrypt and decrypt code. • It is also known as private key encryption, uses the same private key for both encryption and decryption. The risk in this system is that if either party loses the key or the key is intercepted, the system is broken and messages cannot be exchanged securely.
  • 17. Asymmetric Cryptography • It is also known as public key encryption, uses two different but mathematically linked keys. The complexity and length of the private key determine how feasible it is for an interloper to carry out a brute force attack and try out different keys until the right one is found. The challenge for this system is that significant computing resources are required to create long, strong private keys.
  • 18. Secret Key Algorithm • A secret key algorithm (sometimes called a symmetric algorithm) is a cryptographic algorithm that uses the same key to encrypt and decrypt data. The best known algorithm is the U.S. Department of Defense's Data Encryption Standard (DES). DES, which was developed at IBM in 1977, was thought to be so difficult to break that the U.S. government restricted its exportation.
  • 19. RSA • In 1977, Rivest, Shamir, and Adleman came up with another way to use public key cryptography • Rather than secure key exchanges, this one actually lets you encrypt whole messages • Today, this is the most commonly used public key cryptosystem on the market