En Cryptolog y

Embed Size (px)

Citation preview

  • 8/14/2019 En Cryptolog y

    1/13

    [1]Nation

    alIns t

    ituteofSci en

    ce&

    Tec

    hno

    logy

    Cryptology and Its Applications

    Akshat Mathur

    Cryptology and Its Applications

    Presented By

    AKSHAT MATHUR Roll # EC200118042

    Under the guidance of

    Dr. Parth S. Mallick

  • 8/14/2019 En Cryptolog y

    2/13

    [2]Nation

    alIns t

    ituteofSci en

    ce&

    Tec

    hno

    logy

    Cryptology and Its Applications

    Akshat Mathur

    Introduction

    The science ofcryptology is the science of secure communications, formed from the Greek

    words krypts, "hidden", and logos, "word".

    Useful Terminology CIPHERTEXT

    CODE

    CRYPTANALYSIS

    CRYPTOGRAPHY

    CRYPTOSYSTEM

    DECRYPTION

    ENCRYPTION

  • 8/14/2019 En Cryptolog y

    3/13

    [3]Nation

    alIns t

    ituteofSci en

    ce&

    Tec

    hno

    logy

    Cryptology and Its Applications

    Akshat Mathur

    Cryptography

    PRODUCT CIPHERS A D F G B X

    A S U B J E C

    D T A D F G H

    F I K L M N O

    G P Q R V W X

    V Y Z 0 1 2 3

    X 4 5 6 7 8 9

    M E R C H A N T T A Y L O R S

    FG AV GF AX DX DD FV DA DA DD VA FF FX GF AA

  • 8/14/2019 En Cryptolog y

    4/13

    [4]Nation

    alIns t

    ituteofSci e

    nce&

    Tec

    hno

    logy

    Cryptology and Its Applications

    Akshat Mathur

    Cryptography

    Block Ciphers

    It is a type of symmetric-key encryption algorithm that changesa fixed length of block text into same length of Cipher text.

    Encryption works by means of key and Decryption is the reverse

    of encryption process using the same key. Stream Ciphers

    The encryption method is based on simple XOR of binary bits.It encrypts one bit at a time.

    The key sequence is generated on highly complex mathematicalalgorithms. LFSR based on primitive polynomials andcombination of several LFSR using linear and nonlinear logic

    provides a very high level of complexity.

  • 8/14/2019 En Cryptolog y

    5/13

    [5]Nation

    alIns t

    ituteofSci e

    nce&

    Tec

    hno

    logy

    Cryptology and Its Applications

    Akshat Mathur

    Cryptography

    Public Key Cryptography

    RSA Algorithm

    In this system a user chooses a pair of prime numbers so large that

    factorizing the product is beyond all computing capabilities.

    Stages of sending the message by this method.

    The receiver, M, distributes his public key pair.

    The sender, F, composes a plain text message, m, and then uses Ms public key

    to encrypt the message and from cipher text, c. c is the remainder left when m

    is raised to the power ofe and divided by the modulus n.

  • 8/14/2019 En Cryptolog y

    6/13

    [6]Nation

    alIns t

    ituteofSci e

    nce&

    Tec

    hno

    logy

    Cryptology and Its Applications

    Akshat Mathur

    Cryptography c = me mod n (where e and n are Ms public key pair).

    F sends the ciphertext, c, to M.

    The receiver, M, decrypts the ciphertext and retrieves the

    plaintext message, m. m is the remainder obtained when c is

    raised to the power ofdand divided by n. m = cd mod n

    As you can see, this process requires d, which only M knows.

    Another person, I, who intercepts the message, can not decrypt

    it.

    Example:

    Let p = 5, q = 11, n = pq = 55

    The least common multiple of (p-1)(q-1) is 20 = 22 5.

  • 8/14/2019 En Cryptolog y

    7/13[7]Nation

    alIns t

    ituteofSci e

    nce&

    Tec

    hno

    logy

    Cryptology and Its Applications

    Akshat Mathur

    Cryptography Therefore, in this case, any key, e, not divisible by 2 or 5

    will have a matching key, d(e must be relatively prime to

    (p-1)(q-1) for it to be the key).

    Let e = 7

    (ed -1) mod (p-1)(q-1) = 0 \ d = 3 Let the plaintext message, m = b = 2

    \ The ciphertext, c = me mod n = 27 mod 55 = 18

    To decrypt this information it is necessary to know d.

    m = cd mod n = 183 mod 55 = 2 \ The message has been

    successfully decrypted.

  • 8/14/2019 En Cryptolog y

    8/13[8]Nation

    alIns t

    ituteofSci e

    nce&

    Tec

    hno

    logy

    Cryptology and Its Applications

    Akshat Mathur

    Cryptography in the "Real World"

    Applications of Cryptography

    military and diplomatic services

    protecting confidential company information, telephone

    calls

    Internet Business

    lottery tickets

  • 8/14/2019 En Cryptolog y

    9/13

  • 8/14/2019 En Cryptolog y

    10/13[10]Nation

    alIns t

    ituteofSci e

    nce&

    Tec

    hno

    logy

    Cryptology and Its Applications

    Akshat Mathur

    Cryptanalysis

    A Triumph of Cryptanalysis Enigma

    What Was Enigma?The Enigma machine consisted of a 26 letter keyboard for

    input. The output was read off 26 lamps which each

    corresponded to a letter. The encipherment was performed

    by a device called a "scrambler" that was made of three

    rotating wheels on a common spindle and a plug boardknown as a "Steckerboard" that added an additional level of

    security.

  • 8/14/2019 En Cryptolog y

    11/13[11]Nation

    alIns t

    ituteofSci e

    nce&

    Tec

    hno

    logy

    Cryptology and Its Applications

    Akshat Mathur

    Cryptanalysis

    What Made It Possible?

    With the level of sophistication of the Enigma machines it

    should have been unbreakable. However, the Germans had

    a number of procedural flaws which allowed the British

    and Polish to break the cipher.

  • 8/14/2019 En Cryptolog y

    12/13[12]Nation

    alIns t

    ituteofSci e

    nce&

    Tec

    hno

    logy

    Cryptology and Its Applications

    Akshat Mathur

    CONCLUSION

    Military cryptography for encryption may still remain

    mainly symmetric key based for obvious reasons.

    Public key cryptography would develop more in near

    future particularly in the context of key exchange anddigital signatures.

    Simultaneously , the challenging area of the

    cryptanalysis, being the other side of the development

    exercise will gain the importance in the view of the

    plethora of applications demanding assured security.

  • 8/14/2019 En Cryptolog y

    13/13[13]Nation

    alIns

    tituteofSci e

    nce&

    Tec

    hnolo

    gy

    Cryptology and Its Applications

    Akshat Mathur

    THANK YOU !!!