Cryptography, a science of secure writing

Preview:

Citation preview

Presented By:Tahir Ilyas (BSEES01121005)Iqra hamid (BSEES01121004)

Department of electronicsUniversity of Lahore

GROUP MEMBERS

‘’ The Science of Secure writing ’’

• What is cryptography ?

• Why cryptography is important ?

Contents• The purpose of cryptography• Basic terms• History of cryptography and cryptanalysis• Modern cryptography(Types of Algorithms)

- Secret Key Cryptography- Hash Functions- Public Key Cryptography- Methods of Cryptography

- The Significance of Passwords & Password Security• Draw Backs of Cryptography• Conclusion

Science of writing in secret code

THE PURPOSE OF CRYPTOGRAPHY Computer communications Data transfer and telecommunicationSpecific security requirements for communication:

Authentication:

Privacy/confidentiality:

Non-repudiation:

Integrity:

THE PURPOSE OF CRYPTOGRAPHY

Authentication:ensures that whoever supplies or accesses sensitive data is an authorized party.

Privacy/confidentiality:assures that only authorized parties are able to understand the data.

THE PURPOSE OF CRYPTOGRAPHY

Integrity:ensures that when a message is sent over a network, the message that arrives is the same as the message that was originally sent.

Non-repudiation:ensuring that the intended recipient actually received the message & ensuring that the sender actually sent the message.

BASIC TERMSCipher: The algorithm that does the encryption.Ciphertext:The encrypted version of the message. Message altered to be unreadable by anyone except the intended recipients.Crytanlysis:The science of breaking cryptographic algorithms.Cryptanalysts:A person who breaks cryptographic codes; also referred to as “the attacker”.

BASIC TERMSEncryption:Scrambling a message or data using a specialized cryptographic algorithm.Decryption:The process of converting ciphertext back to the original plaintext.Key:Sequence that controls the operation and behavior of the cryptographic algorithm.Plaintext:A message in its natural format readable by an attacker.

The history of cryptography can be divided into two parts:

(1) From ancient civilizations to the 19th century and the first part of the 20th century,

(2) Use of encrypting electro-mechanical machines, around the period of the WW II.

HISTORY OF CRYPTOGRAPHY

Cryptography:

Greek κρυπτός, kryptos,

"hidden, secret"

HISTORY OF CRYPTOGRAPHYCryptography was used in three kinds of contexts in ancient times :

Private communications

Art and religion

Military and diplomatic use

Here we have three types of algorithms that we can talk about:

MODERN CRYPTOGHRAPHY

Secret Key Cryptography

Hash Functions

Public Key Cryptography

MODERN CRYPTOGHRAPHY

Secret key

Secret Key(Symmetric) Cryptography uses a single key for both encryption and decryption.

SECRET KEY CRYPTOGHRAPHY

A single key is used

SECRET KEY CRYPTOGHRAPHY

Sender uses the key to encrypt

Receiver uses the same key to decrypt

Key must be known to both the sender and the receiver

The difficulty is the distribution of the key

Secret key cryptography algorithms that are in use today :

SECRET KEY CRYPTOGHRAPHY

Data Encryption Standard (DES):

Advanced Encryption Standard (AES):

International Data Encryption Algorithm (IDEA):

SECRET KEY SUMMARY

Hash functions(One-way cryptography) have no key since plaintext cannot be recovered from the ciphertext.

HASH FUNCTIONS

Called message compiler and one-way encryption

HASH FUNCTIONS

No key is used

Digital fingerprint

Provide the integrity

Hash algorithms that are in common use today:

HASH FUNCTIONS

Message Digest (MD) algorithms:

HAVAL (Hash of Variable Length):

Tiger:

PUBLIC KEY CRYPTOGHRAPHY

Public Key(Asymmetric) Cryptography. Two keys are used. One for encryption, one for decryption.

PUBLIC KEY CRYPTOGHRAPHY

Developed in the last 300-400 years.

Martin Hellman and graduate student Whitfield Diffie

A two-key crypto system

Mathematical functions

PUBLIC KEY CRYPTOGHRAPHY

Mathematical Functions :

Multiplication vs. factorization:

Exponentiation vs. logarithms:

PUBLIC KEY CRYPTOGHRAPHY

PUBLIC KEY SUMMARY

METHODS OF CRYPTOGRAPHY

Cryptography

Symmetric key Asymmetric key cryptography cryptography (Public key cryptography)

Classical Modern

cryptography cryptography

Transposition Substitution Stream Block cipher cipher cipher cipher

TRANSPOSITION CIPHER

In classical cryptography, a transposition cipher changes one character from the plaintext to another i.e. the order of the characters is changed.

SUBSITITUTE CIPHER

Substitution cipher is a method of encryption by which units of plaintext are substituted with ciphertext according to a regular system.

STREAM CIPHER A Stream Cipher is a symmetric

or secret-key encryption algorithm that encrypts a single bit at a time. With a Stream Cipher, the same plaintext bit or byte will encrypt to a different bit or byte every time it is encrypted.

e.g. :Plain text: Pay 100Binary of plain text:

010111101 (hypothetical)Key: 100101011

----- Perform XOR____________________

Cipher text 110010110 ----- ZTU9^%D

To decrypt make the XOR operation of the cipher text with the key .

BLOCK CIPHER

Block cipher technique involves encryption of one block of text at a time .Decryption also takes one block of encrypted text at a time. Length of the block is usually 64 or 128 bits.

e.g. :Plain text: four and fiveFour and fiveKey Key Keywvfa ast wvfa

--- cipher text

Every password can be decyrpted.

THE SIGNIFICANCE OF PASSWORDS

In cryptography, size does matter.

How to create & use strong Passwords

Use lengthy passwords.

Combine letters, numbers, and symbols.

How to create & use strong Passwords

Use words and phrases.

Draw Backs of Cryptography

Advantages• The biggest advantage of public key cryptography is the secure nature

of the private key. In fact it never needs to be transmitted or revealed to anyone.

• Another type of benefit of public key cryptography is that is provides a method for employing digital signatures.

• It enables the use of digital certificates and digital timestamps, which is a very secure technique of authorization .We will look at digital

timestamps and digital signatures in a moment.

Draw Backs of Cryptography

disAdvantages

• Transmission time for documents encrypted public key cryptography are significantly larger than

symmetric cryptography. In fact transmission of very large documents is prohibitive.

• The key sizes must be significantly larger than symmetric cryptography to achieve the same level of

protection.• Public key cryptography is susceptible to

impersonation attacks.

CONCLUSION

Cryptography, being an art of encrypting and decrypting confidential information and private messages, should be implemented in the network security to prevent any leakage and threat. It can be done by using any of

these techniques discussed above for fortifying the personal data transmission as well as for secure transaction.

Recommended