The Role of Cryptography in Secure Data Transmission

Embed Size (px)

Citation preview

  • 8/9/2019 The Role of Cryptography in Secure Data Transmission

    1/21

    THE ROLE OF CRYPTOGRAPHY INSECURE DATA TRANSMISSION

    S.VINILA KUMARIDEPT.OF COMPUTER SCIENCE

    SRI VSSC GOVT.DEGREE COLLEGESULLURPET

  • 8/9/2019 The Role of Cryptography in Secure Data Transmission

    2/21

    Outline

    IntroductionCryptography Issues

    Cryptography FunctionsCryptography AlgorithmsNew Trends in Cryptography

    ConclusionReferences

  • 8/9/2019 The Role of Cryptography in Secure Data Transmission

    3/21

    Introduction

    Cryptography definitionNet work and Security Risks

    Denial of Service attackirus

    Tro!an "orse#orm

    Cryptography $rinciples

  • 8/9/2019 The Role of Cryptography in Secure Data Transmission

    4/21

    Cryptography Issues

    Confidentiality

    IntegrityNon%repudiationAuthentication

  • 8/9/2019 The Role of Cryptography in Secure Data Transmission

    5/21

    Cryptography Functions

    "ash Functions

    Secret % &ey Cryptography$u'lic ( &ey Cryptography

  • 8/9/2019 The Role of Cryptography in Secure Data Transmission

    6/21

    "ash Function)g*For e+ample ,o' received a hash

    value of -. and decrypted amessage Alice had sent as

    you are bei ! "o##o$e% u&eba'( roa%&) *urry +

    "ashing algorithm will multiply thenum'er of a/s0 e/s and h/s in themessage and will then add thenum'er of o/s to this value1

    23+4+-5647-8

    #hich is different from the value -.that Alice sent

  • 8/9/2019 The Role of Cryptography in Secure Data Transmission

    7/21

    Secret &ey Cryptography

    )g*

    ,ee- ,e a- -*e roa%*ou&e a- oo ur!e - +If Alice and ,o' agree on a key of 90 the cipher te+t of Alice/s message will 'e ,ee*a earo-u-e-ou r--a&o!,*%eoe +:eetm)atth)road"ouseAtnooNurgent

  • 8/9/2019 The Role of Cryptography in Secure Data Transmission

    8/21

    $u'lic &ey Cryptography1) Alice writes the message

    2) Bob pulls Alice's public key o a public key ser!er

    ") Bob encrypts the message withAlice's public key

    #) Bob sends the encrypted message toAlice

    $) Alice recei!es the message

    %) &sing her pri!ate key Alice decryptsthe message

  • 8/9/2019 The Role of Cryptography in Secure Data Transmission

    9/21

    Cryptography Algorithms

    Su'stitution CipherTransposition CipherThe D)S AlgorithmThe RSA Algorithm

  • 8/9/2019 The Role of Cryptography in Secure Data Transmission

    10/21

    Su'stitution ; Transposition Cipher

  • 8/9/2019 The Role of Cryptography in Secure Data Transmission

    11/21

    Su'stitution Ciphers

  • 8/9/2019 The Role of Cryptography in Secure Data Transmission

    12/21

    Transposition Cipher

    =nkeyed single transposition is oneof the simplest methods of

    enciphering1 For e+ample0 themessage

    TI:) IS

  • 8/9/2019 The Role of Cryptography in Secure Data Transmission

    13/21

  • 8/9/2019 The Role of Cryptography in Secure Data Transmission

    14/21

    The D)S Algorithm

    $rotecting sensitive commercialand unclassified dataD)S works on 84 'it data at atime)ach 84 'it data is iteratedfrom - to -8 times

    'its for error detection and98 'it key system for securitypurposesThe uni ue key chosen forparticular application=nauthori>ed recipients can notderive the original dataalgorithmically

  • 8/9/2019 The Role of Cryptography in Secure Data Transmission

    15/21

    The RSA Algorithm

    There are three phases-1 Determination of pu'lic and

    private keysChoose two large primes0 Pand Q1Compute N = P * Q 1Compute F2n5 7 2$ % -52E % -51

    1 )ncrypting a messageCompute C = Me (Mod N)

    31 Decrypting a message

    Compute Cd (Mod N) = M

  • 8/9/2019 The Role of Cryptography in Secure Data Transmission

    16/21

    New Trends in Cryptography

    )lliptical Curve CryptographyEuantum Cryptography

  • 8/9/2019 The Role of Cryptography in Secure Data Transmission

    17/21

    )lliptical Curve CryptographyFaster0 smaller and more efficientcryptographic keys

    enerate keys elliptical curvee uation instead of product of largeprime num'ers

    )CC can yield a level of securitywith a -84%'it key)CC used lower computing powerand 'attery resource usage)CC is 'ased on properties of aparticular type of creation derivedfrom points 1

    :ultiplying a point on the curve 'ya num'er will produce anothernum'erIt is easy to perform

  • 8/9/2019 The Role of Cryptography in Secure Data Transmission

    18/21

    Euantum Cryptography

    Ne+t enerationCommunications aretransmitted 'y assigning digital

    >ero or one signal to eachphoton or so called Ggrains oflightH The signals are e+pressed thestrength and weak of the lightThe information carried 'y

    photons is instantly 'roken ifthe communication is o'served

  • 8/9/2019 The Role of Cryptography in Secure Data Transmission

    19/21

    Conclusion

    )volution of Cryptography follow the paceof technology closely1Types of algorithms to estimate correctalgorithm according to our re uirementCryptography functions is used to protectour data at the time of transmissionNew trends in cryptography is used totransmit data fastly and easily

  • 8/9/2019 The Role of Cryptography in Secure Data Transmission

    20/21

    References:inoli0 Deniel and :inoli0 )mma1 #e' Commerce Technology

    "and'ook1New Delhi0 Tata :c raw%"ill )dition0 - 1Tanen'aum0 Andrew S1 Computer Networks1 3rd ed1 New Delhi0 $rentice%"all ofIndia0 - .1Joung0 :argaret Bevine0 The Complete Reference Internet :illennium )dition0New Delhi0 Tata:c raw%"ill )dition0 - 1

    reenlaw Raymond and "epp )llen1 In%lineK

  • 8/9/2019 The Role of Cryptography in Secure Data Transmission

    21/21