Cryptography cryptography CryptographyCryptography

rohanbawadkar 61 views 19 slides Jun 24, 2024
Slide 1
Slide 1 of 19
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19

About This Presentation

Cryptograph


Slide Content

Cryptography Cryptography is a technique of securing information and communications through use of codes so that only those person for whom the information is intended can understand it and process it. It preventing unauthorised access to information. The prefix “crypt” means “hidden” and suffix“graphy ” means “writing”. Techniques used for cryptography : In todays age of computers cryptography is often associated with the process where an ordinary plain text is converted to cipher text which is the text made such that intended receiver of the text can only decode it and this process is known as encryption. The process of conversion of cipher text to plain text this is known as decryption.

Terminology used in Cryptography Plaintext and ciphertext :The original message,before being transformed is called plaintext.After the message transformed it is called as ciphertext . Encryption Algorithm: The encryption algorithm is the algorithm that performs various substitution and transformation on the plaintext.Encryption is the process of changing plaintext into ciphertext . Decryption Algorithm: The process of changing ciphertext into plaintext is known as decryption. Key: A key is a number(set of numbers)that the cipher,as an algorithm,operates on.It is also act as input to the encryption algorithm.

Encryption Process It is the process of converting plain text into cipher text using key. Encryption is a technique of translation of data into a secret code( ciphertext ). Encryption Decryption Process It is a process of converting cipher text into plain text using key. Decryption is a technique of decoded data ( ciphertext )into original data(plaintext). A secret key used for decryption. Decryption Plaintext Ciphertext Plaintext Ciphertext

Encryption Model Encryption model involves transforming plaintext message into cipher text messages that are to be decrypted only by the intended receiver. Both sender and receiver agree upon a secret key to be used in encrypting and decrypting. To convert the plaintext ciphertext , the encryption operation takes two parameters as input. They are the original message(p) and key(k). The encryption algorithm uses an encryption function which will produce different ciphertext values for the same plaintext values using different key values. Figure shows a conventional encryption model that consist of three components namely sender( yogita ),the receiver(Amar) and attacker(Eavesdropper).

The main objectives of this model is to enable yogita and amar to communicate over an insecure channel in a such a way that the attacker should not understand the original plaintext. Initially Yogita is generating tha plaintext P and sends it to the encryption algorithm. Yogita Amar Encryption algorithm Decryption algorithm Eavesdropper Key generator Secure channel

The encryption algorithm uses an encryption function to convert plaintext P into the ciphertext C using a key value K. After computing a ciphertext , Yogita transmit it through insecure channel. At the receiver side( amar ),the ciphertext is converted back into the original plaintext using the same key with the help of decryption algorithm .

Cryptography Cryptography is a art of codifying messages, so that they becomes unreadable. It is the science of using mathematics to encrypt and decrypt data. Cryptography is the art of secret writing. The user can secure his/her message using different techniques of cryptography. User can securely store or transmit the message using these techniques. Cryptography system or cryptosystem convert a plaintext message to a ciphertext message using a cryptographic key. Welcome to unipune RHs %$ s89 (cipher text) Cryptography system

Fundamentally there are two types of Cryptosystem Symmetric key Encryption Asymmetric key Encryption Symmetric key Encryption The encryption process where same key are used for encrypting and decrypting the information is known as symmetric key encryption. Symmetric cryptography are sometimes referred to as secret key cryptosystems. Examples of symmetric key encryption methods are Digital Encryption Standards(DES),Triple-DES(3DES),IDEA and BLOWFISH.

Asymmetric key Encryption The encryption where different key are using for encrypting and decrypting the information is known as Asymmetric key encryption. Though the keys are different, they are mathematically related and hence,retrieving the plaintext by decrypting ciphertext .

Encryption - Cipher Cipher is a method for encrypting messages Encryption algorithms are standardized & published The key which is an input to the algorithm is secret Key is a string of numbers or characters If same key is used for encryption & decryption the algorithm is called symmetric If different keys are used for encryption & decryption the algorithm is called asymmetric Plain Text Encryption Algorithm Cipher Text Decryption Algorithm Plain Text Key A Key B

Encryption - Symmetric Algorithms Algorithms in which the key for encryption and decryption are the same are Symmetric Example : Caesar Cipher Types: Block Ciphers Encrypt data one block at a time (typically 64 bits, or 128 bits) Used for a single message Stream Ciphers Encrypt data one bit or one byte at a time Used if data is a constant stream of information

Symmetric Algorithms – Caesar Cipher Caesar Cipher is a method in which each letter in the alphabet is rotated by three letters as shown Let us try to encrypt the message Attack at Dawn A B C D E F G H I J K L M N O P Q R S T U V W X Y Z D E F G H I J K L M N O P Q R S T U V W X Y Z A B C

Encryption Decryption Plain Text Message: Attack at Dawn Cipher Text Message: Dwwdfn Dw Gdyq Cipher: Caesar Cipher Algorithm Key (3) Plain Text Message: Attack at Dawn Cipher Text Message: Dwwdfn Dw Gdyq Cipher: Caesar Cipher Algorithm Key (3)

Any letter can be substituted for any other letter Each letter has to have a unique substitute There are 26! pairing of letters (~10 26 ) Brute Force approach would be too time consuming Statistical Analysis would make it feasible to crack the key Symmetric Algorithms - Monoalphabetic Cipher A B C D E F G H I J K L M N O P Q R S T U V W X Y Z M N B V C X Z A S D F G H J K L P O I U Y T R E W Q Encrypted Message: Nkn, s gktc wky. mgsbc Message: Bob, I love you. Alice Cipher: Monoalphabetic Cipher Key

Developed by Blaise de Vigenere Also called Vigenere cipher Uses a sequence of monoalpabetic ciphers in tandem e.g. C 1 , C 2 , C 2 , C 1 , C 2 Example Symmetric Algorithms - Polyalphabetic Cipher Encrypted Message: Gnu, n etox dhz. tenvj Message: Bob, I love you. Alice Cipher: Monoalphabetic Cipher Key Plain Text A B C D E F G H I J K L M N O P Q R S T U V W X Y Z C1(k=6) F G H I J K L M N O P Q R S T U V W X Y Z A B C D E C1(k=20) T U V W X Y Z A B C D E F G H I J K L M N O P Q R S

Example of Polyalphabetic

Transposition Cipher Transposition cipher differs from substitution cipher. Transposition cipher do not simply replace one alphabet to another. They also perform some permutation over to the plaintext alphabet. A transposition cipher does not substitute one symbol for another,instead it changes the location of the symbol. A symbol of the first position of the plaintext may appear in the tenth position of the ciphertext . Columnar transposition is the example of common transposition method. In this method ,one key is used which does not contain any repeated letters. Columnar transposition is a transposition technique where the plaintext is first written in n-length rows. The key often represents a keyword of length n that defines the plaintext ordering of columns.

Transposition Cipher Example Plaintext: Please transfer one million dollar to my swiss bank account six two. Key : MEGABUCK Solution Steps: Write the key and give numbers to the alphabets Write the plaintext horizontally, in rows, padded to fill the matrix if the need be. Write the ciphertext by columns, starting with the column whose key letter is lowest .

Ciphertext:AFLLSKSOSELAWAIATOOSSCTCLNMOMANTESILYNTWRNNTSOWDPAEDOBUOERIRICXB M E G A B U C K 5 6 7 1 9 3 4 2 P l e a s e t r A n s f e r o n E m i l l i o n D o l l a r s t O m y s w i s s B a n k a c c o U n t s i x t w O t w o a b c d
Tags