SlideShare a Scribd company logo
1 of 28
TechKnowXpress

Cryptography


Cryptography (from Greek kryptós, "hidden",
+ gráphein, "to write").



Cryptography is the practice and study of
techniques for secure communication in the
presence of third parties (called adversaries).



It is about constructing and analyzing protocols
that overcome the influence of adversaries.

TechKnowXpress

Cryptography

2


There are three eras in the history of Cryptography:
 The Manual era
 The Mechanical era
 The Modern era



Manual era refers to Pen and Paper Cryptography and dates
back to 2000 B.C.eg : Scytale, Atbash , Caesar, Vigenere.



Mechanical era refers to the invention of cipher machines. E.g.:
Japanese Red and Purple Machines , German Enigma.



The modern era of cryptography refers to computers.



There are infinite permutations of cryptography available using
computers. E.g.: Lucifer, Rijndael , RSA , ElGamal.

TechKnowXpress

Cryptography

3


Cipher: the algorithm that does the encryption.



Ciphertext: the encrypted (scrambled) version of
the message. Message altered to be unreadable by
anyone except the intended recipients.



Cryptanalysis: the science of breaking
cryptographic algorithms.



Cryptanalyst: a person who breaks cryptographic
codes; also referred to as “the attacker”.

TechKnowXpress

Cryptography


Cryptosystem – The combination of
algorithm, key, and key management functions used
to perform cryptographic operations.



Decryption: the process of converting ciphertext
back to the original plaintext.



Encryption: scrambling a message or data using a
specialized cryptographic algorithm.



Initialization Vector – Random values used with
ciphers to ensure no patterns are created during
encryption.
TechKnowXpress

Cryptography

5


Key – Sequence that controls the
operation and behavior of the
cryptographic algorithm.



Keyspace – Total number of possible
values of keys in a crypto algorithm.



Plaintext – A message in its natural
format readable by an attacker.

TechKnowXpress

Cryptography

6
Authentication
 ensures that whoever supplies or

accesses sensitive data is an authorized
party.

Confidentiality
 assures that only authorized parties are

able to understand the data.

TechKnowXpress

Cryptography
Integrity
 ensures that when a message is sent over a

network, the message that arrives is the
same as the message that was originally
sent.

Nonrepudiation
 ensuring that the intended recipient actually

received the message & ensuring that the
sender actually sent the message.

TechKnowXpress

Cryptography
Brute force
 Trying all key values in the keyspace.

Chosen Ciphertext
 Decrypt known ciphertext to discover key.

Dictionary Attack
 Find plaintext based on common words.

Frequency Analysis
 Guess values based on frequency of

occurrence.

TechKnowXpress

Cryptography

9
Factoring Attacks

 Find keys through prime factorization.
Replay Attack

 Repeating previous known values.
Side channel attacks

 use seemingly incidental information

that can reveal important information
about the key being used.

TechKnowXpress

Cryptography






Chosen plaintext attacks
The cryptanalyst introduces the plaintext into
the system and then watches for how that
plaintext will be encrypted.
The Allies used this approach in WWII by
sending out false messages about allied troop
movements.
Often the attacker will try to feed a planned
sequence of messages that would reveal the
most about the way in which the data is being
encrypted.

TechKnowXpress

Cryptography
Known plaintext attack






The attacker has both the ciphertext and the
plaintext.
The attacker knows the algorithm that was
used for the encryption.
This is difficult because there are so many
keys, but the plaintext information may
make experimentation easier than in the
previous case.

TechKnowXpress

Cryptography
Differential Power Analysis

 This is an attack on smart cards.
 A DPA attack analyzes the power output

from a processor performing an
encryption algorithm in order to get
information about the key being used by
that algorithm.

TechKnowXpress

Cryptography


There are several size of
encryption keys:








64 bit encryption
128 bit encryption
256 bit encryption
512 bit encryption
1024 bit encryption

Number indicates the size of the
key used to encrypt the message.

TechKnowXpress

Cryptography
o
o
o

Symmetric
Even if an attacker captures the data, the attacker will not be
able to manipulate it in any meaningful way.
Symmetric algorithms use a single key shared by two
communicating parties.
The same key is used for both encryption and decryption.

Asymmetric

Mathematically related key pairs for encryption and
decryption.
o Public and private keys.
o

Hybrid

Combines strengths of both methods.
o TechKnowXpressdistributes symmetric key.
Asymmetric
o

Cryptography 15
Asymmetric Cryptography

Symmetric Cryptography

TechKnowXpress

Cryptography
Types of Symmetric Cryptography:
Stream-based Ciphers
 Mixes plaintext with key stream.
 Good for real-time services.

Block Ciphers
 Substitution and transposition.
 E.g.: DES, AES.

TechKnowXpress

Cryptography
Public Key Cryptography


In public-key cryptosystems, the
public key may be freely
distributed, while its paired private
key must remain secret and is used
for decryption.



Public-key cryptography can be used
for implementing digital
signature schemes.

TechKnowXpress

Cryptography
TechKnowXpress

Cryptography


Quantum cryptography describes the use
of quantum mechanical effects (in
particular quantum communication
and quantum computation) to
perform cryptographic tasks or to break
cryptographic systems.

TechKnowXpress

Cryptography


The advantage of quantum cryptography is
that it allows the completion of various
cryptographic tasks that are proven or
conjectured to be impossible using only
classical communication.



For example, quantum mechanics
guarantees that measuring quantum data
disturbs that data. This can be used to
detect eavesdropping in quantum key
distribution.

TechKnowXpress

Cryptography


Digital signatures can be
permanently tied to the content of
the message being signed. They
cannot then be 'moved' from one
document to another, for any
attempt will be detectable.



RSA and DSA are two of the most
popular digital signature schemes.

TechKnowXpress

Cryptography


In digital signature schemes, there are two
algorithms: one for signing, in which a secret
key is used to process the message and one for
verification, in which the matching public key is
used with the message to check the validity of
the signature.

TechKnowXpress

Cryptography


Traditionally, a watermark has been
used to verify the authenticity of a
document.

TechKnowXpress

Cryptography


Driver’s Licenses, diplomas, official
letterhead were the primary
applications of watermarks . More
recently, used to track or prevent
redistribution of TV logos.

TechKnowXpress

Cryptography


Purpose of using:
 Ensure authenticity of digital goods.
 Prevent unauthorized use/ensures
copyright.
 Prevent copying.



Adding the watermark to the image
itself
prevents removal by
changing the format.
E.g. GIF->JPEG.

TechKnowXpress

Cryptography


DRM is the practice of imposing
technological restrictions that control
what users can do with digital media.



DRM is a class of controversial
technologies that are used by
hardware
manufacturers, publishers, copyright
holders, and individuals with the
intent to control the use of digital
content and devices after sale.

TechKnowXpress

Cryptography
TechKnowXpress

Cryptography

More Related Content

What's hot (20)

Cryptography
CryptographyCryptography
Cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography Fundamentals
Cryptography FundamentalsCryptography Fundamentals
Cryptography Fundamentals
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
cryptography ppt free download
cryptography ppt free downloadcryptography ppt free download
cryptography ppt free download
 
Overview of cryptography
Overview of cryptographyOverview of cryptography
Overview of cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Key management
Key managementKey management
Key management
 

Viewers also liked

Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securitypatisa
 
Types of computer network
Types of computer networkTypes of computer network
Types of computer networkAmit Shaw
 
artificial neural network
artificial neural networkartificial neural network
artificial neural networkPallavi Yadav
 
NEURAL Network Design Training
NEURAL Network Design  TrainingNEURAL Network Design  Training
NEURAL Network Design TrainingESCOM
 
Analysis and applications of artificial neural networks
Analysis and applications of artificial neural networksAnalysis and applications of artificial neural networks
Analysis and applications of artificial neural networksSnehil Rastogi
 
Micromachining Technology Seminar Presentation
Micromachining Technology Seminar PresentationMicromachining Technology Seminar Presentation
Micromachining Technology Seminar PresentationOrange Slides
 
Sublimation vs Digital Printing By Sukhvir Sabharwal
Sublimation vs Digital Printing By Sukhvir SabharwalSublimation vs Digital Printing By Sukhvir Sabharwal
Sublimation vs Digital Printing By Sukhvir SabharwalSukhvir Sabharwal
 
Cryptography and E-Commerce
Cryptography and E-CommerceCryptography and E-Commerce
Cryptography and E-CommerceHiep Luong
 
Lessons from Software for Synthetic Biology
Lessons from Software for Synthetic BiologyLessons from Software for Synthetic Biology
Lessons from Software for Synthetic BiologyTim O'Reilly
 
Laser Assisted Micro Machining (lamm)
Laser Assisted Micro Machining (lamm)Laser Assisted Micro Machining (lamm)
Laser Assisted Micro Machining (lamm)Pratik Gandhi
 
IBA Admission - Mystery Revealed (Infographics)
IBA Admission - Mystery Revealed (Infographics)IBA Admission - Mystery Revealed (Infographics)
IBA Admission - Mystery Revealed (Infographics)Ayman Sadiq
 
Artificial intelligence NEURAL NETWORKS
Artificial intelligence NEURAL NETWORKSArtificial intelligence NEURAL NETWORKS
Artificial intelligence NEURAL NETWORKSREHMAT ULLAH
 

Viewers also liked (18)

Cryptography
CryptographyCryptography
Cryptography
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
types of network
types of networktypes of network
types of network
 
Types of computer network
Types of computer networkTypes of computer network
Types of computer network
 
How does rotary heat machine work on fabric
How does rotary heat machine work on fabricHow does rotary heat machine work on fabric
How does rotary heat machine work on fabric
 
artificial neural network
artificial neural networkartificial neural network
artificial neural network
 
NEURAL Network Design Training
NEURAL Network Design  TrainingNEURAL Network Design  Training
NEURAL Network Design Training
 
Analysis and applications of artificial neural networks
Analysis and applications of artificial neural networksAnalysis and applications of artificial neural networks
Analysis and applications of artificial neural networks
 
Micromachining Technology Seminar Presentation
Micromachining Technology Seminar PresentationMicromachining Technology Seminar Presentation
Micromachining Technology Seminar Presentation
 
Sublimation vs Digital Printing By Sukhvir Sabharwal
Sublimation vs Digital Printing By Sukhvir SabharwalSublimation vs Digital Printing By Sukhvir Sabharwal
Sublimation vs Digital Printing By Sukhvir Sabharwal
 
Virtual manufacturing
Virtual manufacturingVirtual manufacturing
Virtual manufacturing
 
Smartplug ppt
Smartplug pptSmartplug ppt
Smartplug ppt
 
Cryptography and E-Commerce
Cryptography and E-CommerceCryptography and E-Commerce
Cryptography and E-Commerce
 
Thesis presentation
Thesis presentationThesis presentation
Thesis presentation
 
Lessons from Software for Synthetic Biology
Lessons from Software for Synthetic BiologyLessons from Software for Synthetic Biology
Lessons from Software for Synthetic Biology
 
Laser Assisted Micro Machining (lamm)
Laser Assisted Micro Machining (lamm)Laser Assisted Micro Machining (lamm)
Laser Assisted Micro Machining (lamm)
 
IBA Admission - Mystery Revealed (Infographics)
IBA Admission - Mystery Revealed (Infographics)IBA Admission - Mystery Revealed (Infographics)
IBA Admission - Mystery Revealed (Infographics)
 
Artificial intelligence NEURAL NETWORKS
Artificial intelligence NEURAL NETWORKSArtificial intelligence NEURAL NETWORKS
Artificial intelligence NEURAL NETWORKS
 

Similar to Cryptography

Encryption technology
Encryption technologyEncryption technology
Encryption technologyNeha Bhambu
 
crypto-105058445051058480051448005540405
crypto-105058445051058480051448005540405crypto-105058445051058480051448005540405
crypto-105058445051058480051448005540405ukd789555
 
Cryptanalysis and Attacks
Cryptanalysis and AttacksCryptanalysis and Attacks
Cryptanalysis and AttacksShahbaz Anjam
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarDurlove Kumbhakar
 
Cryptography & Network Security.pptx
Cryptography & Network Security.pptxCryptography & Network Security.pptx
Cryptography & Network Security.pptxsunil sharma
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Saif Kassim
 
Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)newbie2019
 
Evolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniquesEvolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniquesMona Rajput
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPrabhatMishraAbvp
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptvinitajain703
 
Presentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHYPresentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHYBARATH800940
 
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.pptPresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.pptso6281019
 
Cryptography, a science of secure writing
Cryptography, a science of secure writingCryptography, a science of secure writing
Cryptography, a science of secure writingtahirilyas92
 
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.pptCRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.pptPayalChopra9
 

Similar to Cryptography (20)

Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Encryption technology
Encryption technologyEncryption technology
Encryption technology
 
crypto-105058445051058480051448005540405
crypto-105058445051058480051448005540405crypto-105058445051058480051448005540405
crypto-105058445051058480051448005540405
 
Cryptanalysis and Attacks
Cryptanalysis and AttacksCryptanalysis and Attacks
Cryptanalysis and Attacks
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab Kumbhakar
 
Pavan
PavanPavan
Pavan
 
Cryptography
CryptographyCryptography
Cryptography
 
Unit-2-IS (1).pdf
Unit-2-IS (1).pdfUnit-2-IS (1).pdf
Unit-2-IS (1).pdf
 
Cryptography & Network Security.pptx
Cryptography & Network Security.pptxCryptography & Network Security.pptx
Cryptography & Network Security.pptx
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01
 
Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Evolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniquesEvolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniques
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
 
Presentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHYPresentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHY
 
Cryptography saurabh
Cryptography saurabhCryptography saurabh
Cryptography saurabh
 
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.pptPresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
 
Cryptography, a science of secure writing
Cryptography, a science of secure writingCryptography, a science of secure writing
Cryptography, a science of secure writing
 
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.pptCRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
 

More from Darshini Parikh

More from Darshini Parikh (8)

Semantic web
Semantic webSemantic web
Semantic web
 
Pseudo Random Number Generators
Pseudo Random Number GeneratorsPseudo Random Number Generators
Pseudo Random Number Generators
 
Software Engineering
Software EngineeringSoftware Engineering
Software Engineering
 
Swift
SwiftSwift
Swift
 
Online erp
Online erpOnline erp
Online erp
 
Scrum
ScrumScrum
Scrum
 
Windows 7 installation steps
Windows 7 installation stepsWindows 7 installation steps
Windows 7 installation steps
 
Android
AndroidAndroid
Android
 

Recently uploaded

Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 

Recently uploaded (20)

Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 

Cryptography

  • 2.  Cryptography (from Greek kryptós, "hidden", + gráphein, "to write").  Cryptography is the practice and study of techniques for secure communication in the presence of third parties (called adversaries).  It is about constructing and analyzing protocols that overcome the influence of adversaries. TechKnowXpress Cryptography 2
  • 3.  There are three eras in the history of Cryptography:  The Manual era  The Mechanical era  The Modern era  Manual era refers to Pen and Paper Cryptography and dates back to 2000 B.C.eg : Scytale, Atbash , Caesar, Vigenere.  Mechanical era refers to the invention of cipher machines. E.g.: Japanese Red and Purple Machines , German Enigma.  The modern era of cryptography refers to computers.  There are infinite permutations of cryptography available using computers. E.g.: Lucifer, Rijndael , RSA , ElGamal. TechKnowXpress Cryptography 3
  • 4.  Cipher: the algorithm that does the encryption.  Ciphertext: the encrypted (scrambled) version of the message. Message altered to be unreadable by anyone except the intended recipients.  Cryptanalysis: the science of breaking cryptographic algorithms.  Cryptanalyst: a person who breaks cryptographic codes; also referred to as “the attacker”. TechKnowXpress Cryptography
  • 5.  Cryptosystem – The combination of algorithm, key, and key management functions used to perform cryptographic operations.  Decryption: the process of converting ciphertext back to the original plaintext.  Encryption: scrambling a message or data using a specialized cryptographic algorithm.  Initialization Vector – Random values used with ciphers to ensure no patterns are created during encryption. TechKnowXpress Cryptography 5
  • 6.  Key – Sequence that controls the operation and behavior of the cryptographic algorithm.  Keyspace – Total number of possible values of keys in a crypto algorithm.  Plaintext – A message in its natural format readable by an attacker. TechKnowXpress Cryptography 6
  • 7. Authentication  ensures that whoever supplies or accesses sensitive data is an authorized party. Confidentiality  assures that only authorized parties are able to understand the data. TechKnowXpress Cryptography
  • 8. Integrity  ensures that when a message is sent over a network, the message that arrives is the same as the message that was originally sent. Nonrepudiation  ensuring that the intended recipient actually received the message & ensuring that the sender actually sent the message. TechKnowXpress Cryptography
  • 9. Brute force  Trying all key values in the keyspace. Chosen Ciphertext  Decrypt known ciphertext to discover key. Dictionary Attack  Find plaintext based on common words. Frequency Analysis  Guess values based on frequency of occurrence. TechKnowXpress Cryptography 9
  • 10. Factoring Attacks  Find keys through prime factorization. Replay Attack  Repeating previous known values. Side channel attacks  use seemingly incidental information that can reveal important information about the key being used. TechKnowXpress Cryptography
  • 11.    Chosen plaintext attacks The cryptanalyst introduces the plaintext into the system and then watches for how that plaintext will be encrypted. The Allies used this approach in WWII by sending out false messages about allied troop movements. Often the attacker will try to feed a planned sequence of messages that would reveal the most about the way in which the data is being encrypted. TechKnowXpress Cryptography
  • 12. Known plaintext attack    The attacker has both the ciphertext and the plaintext. The attacker knows the algorithm that was used for the encryption. This is difficult because there are so many keys, but the plaintext information may make experimentation easier than in the previous case. TechKnowXpress Cryptography
  • 13. Differential Power Analysis  This is an attack on smart cards.  A DPA attack analyzes the power output from a processor performing an encryption algorithm in order to get information about the key being used by that algorithm. TechKnowXpress Cryptography
  • 14.  There are several size of encryption keys:       64 bit encryption 128 bit encryption 256 bit encryption 512 bit encryption 1024 bit encryption Number indicates the size of the key used to encrypt the message. TechKnowXpress Cryptography
  • 15. o o o Symmetric Even if an attacker captures the data, the attacker will not be able to manipulate it in any meaningful way. Symmetric algorithms use a single key shared by two communicating parties. The same key is used for both encryption and decryption. Asymmetric Mathematically related key pairs for encryption and decryption. o Public and private keys. o Hybrid Combines strengths of both methods. o TechKnowXpressdistributes symmetric key. Asymmetric o Cryptography 15
  • 17. Types of Symmetric Cryptography: Stream-based Ciphers  Mixes plaintext with key stream.  Good for real-time services. Block Ciphers  Substitution and transposition.  E.g.: DES, AES. TechKnowXpress Cryptography
  • 18. Public Key Cryptography  In public-key cryptosystems, the public key may be freely distributed, while its paired private key must remain secret and is used for decryption.  Public-key cryptography can be used for implementing digital signature schemes. TechKnowXpress Cryptography
  • 20.  Quantum cryptography describes the use of quantum mechanical effects (in particular quantum communication and quantum computation) to perform cryptographic tasks or to break cryptographic systems. TechKnowXpress Cryptography
  • 21.  The advantage of quantum cryptography is that it allows the completion of various cryptographic tasks that are proven or conjectured to be impossible using only classical communication.  For example, quantum mechanics guarantees that measuring quantum data disturbs that data. This can be used to detect eavesdropping in quantum key distribution. TechKnowXpress Cryptography
  • 22.  Digital signatures can be permanently tied to the content of the message being signed. They cannot then be 'moved' from one document to another, for any attempt will be detectable.  RSA and DSA are two of the most popular digital signature schemes. TechKnowXpress Cryptography
  • 23.  In digital signature schemes, there are two algorithms: one for signing, in which a secret key is used to process the message and one for verification, in which the matching public key is used with the message to check the validity of the signature. TechKnowXpress Cryptography
  • 24.  Traditionally, a watermark has been used to verify the authenticity of a document. TechKnowXpress Cryptography
  • 25.  Driver’s Licenses, diplomas, official letterhead were the primary applications of watermarks . More recently, used to track or prevent redistribution of TV logos. TechKnowXpress Cryptography
  • 26.  Purpose of using:  Ensure authenticity of digital goods.  Prevent unauthorized use/ensures copyright.  Prevent copying.  Adding the watermark to the image itself prevents removal by changing the format. E.g. GIF->JPEG. TechKnowXpress Cryptography
  • 27.  DRM is the practice of imposing technological restrictions that control what users can do with digital media.  DRM is a class of controversial technologies that are used by hardware manufacturers, publishers, copyright holders, and individuals with the intent to control the use of digital content and devices after sale. TechKnowXpress Cryptography

Editor's Notes

  1. Cryptography – Greek for hidden and writing is a means of transforming data in a way that renders it unreadable by anyone except the intended recipient.What was originally used almost exclusively by governments for espionage has become a powerful tool for personal privacy today. Every modern computer system uses modern cryptographic methods to secure passwords stored and provides the trusted backbone for e-commerce (think lock icon).Cryptography fits into the CIA triad, as it can be used to ensure confidentiality and integrity of a message. Some forms also provide for sender authenticity and proof of delivery. But cryptography doesn’t address availability as some other forms of security do. Although forgetting a password for your user account can certainly lead to a denial of service attack. However, cryptography is used in many access control systems
  2. The history of cryptography begins where many stories of history do…. in ancient Egypt with hieroglyphics.Scytale – Spartan method involved wrapping a belt around a rod of a given diameter and lengthAtbash – Hewbrew cipher which mirrored the normal alphabet (shown in The DaVinci Code)Caesar – Shift all letters by a given number of letters in the alphabetVignère – Use of a key and multiple alphabets to hide repeated characters in an encrypted message
  3. Just like with many technical topics, Cryptography has its own lingo. Learning and using these terms and their definitions are the key to speaking like a crypto geek.
  4. Just like with many technical topics, Cryptography has its own lingo. Learning and using these terms and their definitions are the key to speaking like a crypto geek.
  5. Cryptographic Algorithms generally fall into one of two different categories, or are a combination of both.SymmetricFastOnly provide confidentialityNeed secure channel for key distributionKey management headaches from large number of key pairs to maintain N(N-1)/2That’s over 6.3 million key pairs to let all 3556 Purdue A/P staff members exchange encrypted messagesTo do the same for all students would require over half a billion key pairs!Examples: DES, AES, Blowfish, RC4, RC5AsymmetricLarge mathematical operations make it slower than symmetric algorithmsNo need for out of band key distribution (public keys are public!)Scales better since only a single key pair needed per individualCan provide authentication and nonrepudiationExamples: RSA, El Gamal, ECC, Diffie-Hellman
  6. Stream Ciphers are fast and easy to implement in hardware.Block ciphers are stronger, but slower and often implemented in hardware.