22
Cryptography Presented By:Sanjeev Kumar Dept: I.T

Er. Sanjeev Raaz

Embed Size (px)

Citation preview

Page 1: Er. Sanjeev Raaz

Cryptography

Presented By:Sanjeev Kumar

Dept: I.T

Page 2: Er. Sanjeev Raaz

Cryptography Intro

Why Encrypt?• Protect stored information

• Protect from Unauthorized disclosure

Encryption - process by which plaintext is converted to cipher text using a key

Decryption - process by which cipher text is converted to plaintext (with the appropriate key)

plaintext (clear text)- intelligible data

Page 3: Er. Sanjeev Raaz

Cryptography Terminology

Cryptography - art/science relating to encrypting, decrypting information

Cryptanalysis - art/science relating to converting cipher text to plaintext without the (secret) key

Page 4: Er. Sanjeev Raaz

Here we have three types of algorithms that we can talk about:

MODERN CRYPTOGHRAPHY

Secret Key Cryptography

Hash Functions

Public Key Cryptography

Page 5: Er. Sanjeev Raaz

MODERN CRYPTOGHRAPHY

Secret key

Page 6: Er. Sanjeev Raaz

Here we have three types of algorithms that we can talk about:

MODERN CRYPTOGHRAPHY

Secret Key Cryptography

Hash Functions

Public Key Cryptography

Page 7: Er. Sanjeev Raaz

MODERN CRYPTOGHRAPHY

Secret key

Page 8: Er. Sanjeev Raaz

Secret Key(Symmetric) Cryptography uses a single key for both encryption and decryption.

SECRET KEY CRYPTOGHRAPHY

Page 9: Er. Sanjeev Raaz

A single key is used

SECRET KEY CRYPTOGHRAPHY

Sender uses the key to encrypt

Receiver uses the same key to decrypt

Key must be known to both the sender and the receiver

The difficulty is the distribution of the key

Page 10: Er. Sanjeev Raaz

Secret key cryptography algorithms that are in use today :

SECRET KEY CRYPTOGHRAPHY

Data Encryption Standard (DES):

Advanced Encryption Standard (AES):

International Data Encryption Algorithm (IDEA):

Page 11: Er. Sanjeev Raaz

SECRET KEY SUMMARY

Page 12: Er. Sanjeev Raaz

Hash functions(One-way cryptography) have no key since plaintext cannot be recovered from the ciphertext.

HASH FUNCTIONS

Page 13: Er. Sanjeev Raaz

Called message compiler and one-way encryption

HASH FUNCTIONS

No key is used

Digital fingerprint

Provide the integrity

Page 14: Er. Sanjeev Raaz

Hash algorithms that are in common use today:

HASH FUNCTIONS

Message Digest (MD) algorithms:

HAVAL (Hash of Variable Length):

Tiger:

Page 15: Er. Sanjeev Raaz

PUBLIC KEY CRYPTOGHRAPHY

Public Key(Asymmetric) Cryptography. Two keys are used. One for encryption, one for decryption.

Page 16: Er. Sanjeev Raaz

PUBLIC KEY CRYPTOGHRAPHY

Developed in the last 300-400 years.

Martin Hellman and graduate student Whitfield Diffie

A two-key crypto system

Mathematical functions

Page 17: Er. Sanjeev Raaz

Public key Cryptography

Secret key Cryptography

Page 18: Er. Sanjeev Raaz

Secret Key Cryptography

With secret key cryptography, a single key is used for both encryption and decryption. As shown in Figure 1A, the sender uses the key (or some set of rules) to encrypt the plaintext and sends the ciphertext to the receiver. The receiver applies the same key (or ruleset) to decrypt the message and recover the plaintext. Because a single key is used for both functions, secret key cryptography is also called symmetric encryption.

Page 19: Er. Sanjeev Raaz

Secret Key Cryptography

Page 20: Er. Sanjeev Raaz

Public-Key Cryptography

Generic PKC employs two keys that are mathematically related although knowledge of one key does not allow someone to easily determine the other key. One key is used to encrypt the plaintext and the other key is used to decrypt the ciphertext. The important point here is that it does not matter which key is applied first, but that both keys are required for the process to work (Figure 1B). Because a pair of keys are required, this approach is also called asymmetric cryptography.

Page 21: Er. Sanjeev Raaz

Public-Key Cryptography

Page 22: Er. Sanjeev Raaz

THANK YOU....