17
Cryptography The science of writing in secret code

Cryptography The science of writing in secret code

Embed Size (px)

Citation preview

Page 1: Cryptography The science of writing in secret code

Cryptography The science of writing in secret

code

Page 2: Cryptography The science of writing in secret code

The Science of Writing In Secret Code

• Cryptography is an ancient art - first documented use of cryptography in writing dates back to circa 1900 B.C. when

an Egyptian scribe used non-standard hieroglyphs in an inscription

• New forms of cryptography came soon after the widespread development of computer communications

Page 3: Cryptography The science of writing in secret code

Secure Communication

• Crypto is the secure communication in the presence of third parties (adversaries)

• Generally: about constructing and analyzing protocols that overcome such adversaries

• MAIN GOAL: SECURITY!

Page 4: Cryptography The science of writing in secret code

DISCIPLINES• Modern crypto intersects disciples of Math,

Computer Science, and Electrical Engineering

• APPLICATIONS: ATM cards, computer passwords, electronic commerce, etc.

Related to various aspects in information security such as data confidentiality, data integrity, authentication

Page 5: Cryptography The science of writing in secret code

Specific Security Requirements

• Authentication: process of proving one’s identity

• Privacy/confidentiality: ensuring that no one can read the message except the intended receiver

• Integrity: assuring the intended receiver that the original message has not been altered in any way

• Non-repudiation: mechanism to prove that sender really sent the message

Page 6: Cryptography The science of writing in secret code

Cryptographic Schemes

• Initial unencrypted date is referred to as plaintext• It is then encrypted into ciphertext• Then decrypted into usable plaintext

PLAINTEXT CIPHERTEXT PLAINTEXT

Page 7: Cryptography The science of writing in secret code

Types of Cryptography

• Secret Key Cryptography (SKC)• Public Key Cryptography (PKC)

•Hash Functions

Page 8: Cryptography The science of writing in secret code

Crypto

Page 9: Cryptography The science of writing in secret code

SECRET KEY ENCRYPTIONAlso known as private key & symmetric key

Page 10: Cryptography The science of writing in secret code

Secret Key Encryption

Page 12: Cryptography The science of writing in secret code

Public Key Encryption

Page 13: Cryptography The science of writing in secret code

Why Three?

• Each scheme is optimized for some specific applications

• Secret Key Cryptography is suited for encrypting messages as it provides privacy and

confidentiality• Public Key Cryptography is ideal for non-

repudiation and user authentication• Hash functions ensure data integrity

Page 14: Cryptography The science of writing in secret code

Caesar Cipher

Roman ruler Julius Caesar used a very simple cipher for secret communication

Involves the use of a “displacement” concept

Caesar cipher is the simplest to solve, since there are only 25 possible combinations

Page 15: Cryptography The science of writing in secret code

Caesar Cipher

Outside wheel: The Alphabet

Inner wheel: can be rotated so that any letter on one wheel can be aligned with any letter on the other wheel

- The inner wheel becomes the key

Page 17: Cryptography The science of writing in secret code

A lock is only as strong as its weakest link