SlideShare ist ein Scribd-Unternehmen logo
1 von 48
CRYPTOGRAPHY
PRATIKSHA PATIL
CONTENTS
o Introduction
o Need of Cryptography
o Types of Attacks
o Techniques of Cryptography
o Encryption Algorithm
• Symmetric
• Asymmetric
o Digital Signature
o Visual cryptography
INTRODUCTION
 What is Cryptography?
 “Hidden Writing”
 Mainly used to protect Information.
NEED OF ENCRYPTION
 Confidentiality
 Integrity
 Authentication
 Nonrepudiation
 Access Control
 Availability
TYPES OF ATTACKS
 A General View:
1. Criminal attacks
2. Publicity attacks
 A Technical View:
1. Passive attacks
2. Modification
3. Fabrication
 A Practical Side of Attacks:
1. Application level
2. Network level
 Programs that Attack:
1. Virus(infects)
2. Worm (replicates)
3. Trojan (hidden)
4. Applets and Active X controls (downloadable)
ENCRYPTION DECRYPTION
PLAIN
TEXT
PLAIN
TEXT
SENDER
CIPHER
TEXT
RECEIVER
BASIC BLOCK DIAGRAM
BASIC TERMINOLOGIES
 Encryption
 Encryption is the process of encoding a message so that its
meaning is not obvious
 Decryption
 Decryption is the reverse process, transforming an encrypted
message back into its normal, original form
 Cryptosystem
 A system for encryption and decryption is called a
cryptosystem.
BASIC TERMINOLOGIES
 Plaintext
 Cipher text
 Key –
 key refers to a sequence of symbols or a numerical value used
by an algorithm to alter information & making that information
secure
 Encryption algorithm
 The cryptosystem involves a set of rules for how to encrypt the
plaintext and how to decrypt the cipher text.
 Cryptanalysis
 Cryptanalysis is an attempt to break the cipher text.
TECHNIQUES OF CRYPTOGRAPHY
 Substitution Technique
 Caesar Cipher
 Monoalphabetic Cipher
 Playfair Cipher
 Polyalphabetic Cipher
 Transposition Technique
 Rail Fence Technique
 Vernam Cipher(One -time Pads)
 Simple Columnar Cipher
ENCRYPTION ALGORITHM
Symmetric
 Same key for encryption and decryption
 Key distribution problem
Asymmetric
 Key pairs for encryption and decryption
 Public and private keys
SYMMETRIC ALGORITHM
 It is also called as Secret Key Cryptography
 Single key used for both encrypt & decrypt
 Key must be known to both the parties
Encryption Decryption
Key
Plaintext Ciphertext
Original
Plaintext
Symmetric Cryptosystem
ASYMMETRIC ALGORITHM
 Private keys are used for decrypting.
 Public keys are used for encrypting
encryption
plaintext ciphertext
public key
decryption
ciphertext plaintext
private key
SYMMETRIC ALGORITHM
 Data Encryption Standard (DES):
56 bits key
 Advance Encryption Standard (AES):
128, 192 or 256 bits key
 International Data Encryption
Algorithm(IDEA):
128 bits key
DATA ENCRYPTION STANDARD
 Developed by IBM and it is known as the Data Encryption
Standard
 It is also known as Data Encryption Algorithm
 The DES algorithm is a careful and complex combination of
two fundamental building blocks of encryption:
 Substitution and
 Transposition
 DES uses only standard arithmetic and logical operations on
numbers up to 64 bits long
Plain text (64 bits)
Initial Permutation (IP)
LPT RPT
16 rounds
Final Permutation
Cipher text (64 bits)
BROAD LEVEL STEPS IN DES
key
DATA ENCRYPTION STANDARD
 1st 64 bit plain text is handed over to initial
permutation function.
 IP is performed over the plain text.
 IP produces two halves of the permuted blocks
left plain text (LPT) & right plain text (RPT).
 Now LPT & RPT goes 16 rounds of encryption
process, each with its own key.
 Now LPT & RPT are rejoined and FINAL
PERMUTATION (FP) is performed on the
combined block.
 The result is 64 bit cipher text.
DETAILS OF ONE ROUND IN DES
Key Transformation
Expansion Permutation
S- box Substitution
P- box Permutation
XOR with LPT and Swap
64-56-
48BITS
32-48BITS
48-32BITS
RPT
o DES is also an ANSI and ISO standard - anybody
can learn the details and implement it.
o Hard to crack.
DISADVANTAGES OF DES:
o Software implementations of DES are slow.
ADVANTAGES OF DES:
ASYMMETRIC ALGORITHM
 Rivest Shamir Adleman (RSA) Encryption:
Based on factoring the product of large prime numbers.
 Knapsack Algorithm:
If M1,M2…., Mn are given values & S is the sum,
S=b1M1+b2M2….+bnMn
where, bi can be 0 or 1
RSA
 It is named after its three inventors Rivest
Shamir and Adleman
 This algorithm was introduced in 1978 and to
date remains secure.
 RSA has been the subject of extensive
cryptanalysis, and no serious flaws have yet been
found.
 The encryption algorithm is based on the
underlying problem of factoring large numbers.
GENERATING PUBLIC AND PRIVATE KEYS
1. pick two prime numbers, we'll pick p = 3 and q =
11
2. calculate n = p * q = 3 * 11 = 33
calculate z = ( p - 1 ) * ( q - 1 ) = ( 3 - 1 ) * ( 11 - 1 )
= 20
3. choose a prime number k, such that k is co-prime
to z, i.e, z is not divisible by k. We have several
choices for k: 7, 11, 13, 17, 19 (we cannot use 5,
because 20 is divisible by 5). Let's pick k=7
4. So, the numbers n = 33 and k = 7 become the
Server's public key.
1. Now, still done in advance of any transmission,
the Server has to calculate it's secret key. Here is
how.
2. k * j = 1 ( mod z )
3. 7 * j = 1 ( mod 20 )
4. ( 7 * j ) / 20 = ? with the remainder of 1
5. 21 / 20 gives "something" with the remainder of 1.
So, 7 * j = 21, and j = 3. This is our secret key.
Encrypting the message
Here is the encryption math that Browser executes.
P ^ k = E ( mod n )
P is the Plain message we want to encrypt
n and k are Server's public key
E is our Encrypted message we want to generate
After plugging in the values, this equation is solved as
follows:
14 ^ 7 = E ( mod 33 )
This equation says: raise 14 to the power of 7, divide this
by 33, giving the remainder of E.
105413504 / 33 = 3194348.606
3194348 * 33 = 10541348
E = 105413504 - 10541348 = 20
 So, our Encrypted message is E=20. This is now the
value that the Browser is going to send to the Server.
When the Server receives this message, it then proceeds
to Decrypt it, as follows.
Decrypting the Message
Here is the decryption math the Server executes to recover the original
Plain text message which the Browser started with.
E ^ j = P ( mod n)
E is the Encrypted message just received
j is the Server's secret key
P is the Plain message we are trying to recover
n is Server's public key
After plugging in the values:
20 ^ 3 = P ( mod 33 )
8000 / 33 = ? with the remainder of P. So to calculate this remainder:
8000 / 33 = 242.424242...
242 * 33 = 7986
P = 8000 - 7986 = 14, which is exactly the Plain text message
that the Browser started with!
DIGITAL SIGNATURE
 When an author signs a document, it
cannot be changed.
 When you send a document electronically,
you can also sign it.
Signing the digest
 The two most common hash functions are:
 Message digest 5 (MD5)
 Secure hash algorithm (SHA-1)
 The properties of hash function
 One-way: the digest can only be created from the
message, but not vice versa
 One-to-one: be very difficult to find two messages that
create the same digest.
Sender site
Receiver site
WEB SECURITY
 Web now widely used by business, government,
individuals
 but Internet & Web are vulnerable
 have a variety of threats
 integrity
 confidentiality
 denial of service
 authentication
 need added security mechanisms
31
SSL (SECURE SOCKET LAYER)
 transport layer security service
 originally developed by Netscape
 uses TCP to provide a reliable end-to-end service
32
SSL HANDSHAKE PROTOCOL
 allows server & client to:
 authenticate each other
 to negotiate encryption
 to negotiate cryptographic keys to be used
 comprises a series of messages in phases
 Establish Security Capabilities
 Server Authentication and Key Exchange
 Client Authentication and Key Exchange
 Finish
34
Overview of Visual Cryptography
Share1
Stacking the share
reveals the secret
Share2
Encryption Decryption
The basis matrices and the collections of the encoding matrices in
the conventional (2,2) scheme can be written as:
IMPLEMENTATION
FIG 1
 6 ways to place two black subpixels in the 2 x 2
square
2 OUT OF 2 SCHEME (4 SUB PIXELS)
Horizontal shares Vertical shares Diagonal shares
2 out of 2 Scheme (4 subpixels)
2 out of 2 Scheme (4 sub pixels)
share1
share2
stack
pixel
4
1
0
5
random
0 1 2 3 4 5 0 1 2 3 4 5
EXAMPLE OF TWO-OUT-OF-TWO VC SCHEME:
(a) (b)
(c) (d)
HALFTONE VISUAL CRYPTOGRAPHY
1. The halftoning technique is used to convert the gray-scale image into the binary
image.
2. The methods of halftoning that we are going to use are Error Diffusion and
Direct Binary Search.
BACKGROUND
HALFTONE VISUAL
CRYPTOGRAPHY
44
Distributions of SIPs
Assign the values of
all SIPs
underlying VC
scheme
ERROR FILTER
ERROR DIFFUSION
HVC VIA ERROR DIFFUSION
Grayscale
image
Threshold
block
input
Output
1
2
Quantization
error
Threshold of
error diffusion
Cryptography and network security

Weitere ähnliche Inhalte

Was ist angesagt?

Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptographyHossain Md Shakhawat
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket LayerNaveen Kumar
 
Security Mechanisms
Security MechanismsSecurity Mechanisms
Security Mechanismspriya_trehan
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption StandardPrince Rachit
 
Topic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesTopic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesMdFazleRabbi18
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.pptUday Meena
 
Message Authentication Code & HMAC
Message Authentication Code & HMACMessage Authentication Code & HMAC
Message Authentication Code & HMACKrishna Gehlot
 
key distribution in network security
key distribution in network securitykey distribution in network security
key distribution in network securitybabak danyal
 
Secure Hash Algorithm
Secure Hash AlgorithmSecure Hash Algorithm
Secure Hash AlgorithmVishakha Agarwal
 
Symmetric and asymmetric key
Symmetric and asymmetric keySymmetric and asymmetric key
Symmetric and asymmetric keyTriad Square InfoSec
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security ArchitectureBharathiKrishna6
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographyPopescu Petre
 
Cryptography
CryptographyCryptography
Cryptographysubodh pawar
 

Was ist angesagt? (20)

Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
CRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITYCRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITY
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
Security Mechanisms
Security MechanismsSecurity Mechanisms
Security Mechanisms
 
Cryptography
CryptographyCryptography
Cryptography
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption Standard
 
Topic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesTopic1 substitution transposition-techniques
Topic1 substitution transposition-techniques
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Message Authentication Code & HMAC
Message Authentication Code & HMACMessage Authentication Code & HMAC
Message Authentication Code & HMAC
 
key distribution in network security
key distribution in network securitykey distribution in network security
key distribution in network security
 
Cryptography
CryptographyCryptography
Cryptography
 
Secure Hash Algorithm
Secure Hash AlgorithmSecure Hash Algorithm
Secure Hash Algorithm
 
Symmetric and asymmetric key
Symmetric and asymmetric keySymmetric and asymmetric key
Symmetric and asymmetric key
 
S/MIME
S/MIMES/MIME
S/MIME
 
Cryptography
CryptographyCryptography
Cryptography
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security Architecture
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
Cryptography
CryptographyCryptography
Cryptography
 

Andere mochten auch

Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and CryptographyAdam Reagan
 
types of network
types of networktypes of network
types of networkZenobia Sukhia
 
Types of computer network
Types of computer networkTypes of computer network
Types of computer networkAmit Shaw
 
LinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-PresentedLinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-PresentedSlideShare
 

Andere mochten auch (6)

cryptography
cryptographycryptography
cryptography
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
types of network
types of networktypes of network
types of network
 
Types of computer network
Types of computer networkTypes of computer network
Types of computer network
 
Cryptography
CryptographyCryptography
Cryptography
 
LinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-PresentedLinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-Presented
 

Ähnlich wie Cryptography and network security

Introduction to cryptography
Introduction to cryptographyIntroduction to cryptography
Introduction to cryptographySuresh Thammishetty
 
Public key algorithm
Public key algorithmPublic key algorithm
Public key algorithmPrateek Pandey
 
Unit-III_3R-CRYPTO_2021-22_VSM.pptx
Unit-III_3R-CRYPTO_2021-22_VSM.pptxUnit-III_3R-CRYPTO_2021-22_VSM.pptx
Unit-III_3R-CRYPTO_2021-22_VSM.pptxVishwanathMahalle
 
Cryptography based chat system
Cryptography based chat systemCryptography based chat system
Cryptography based chat systemJagsir Singh
 
CH02-CompSec4e.pptx
CH02-CompSec4e.pptxCH02-CompSec4e.pptx
CH02-CompSec4e.pptxams1ams11
 
Cryptography Key Management.pptx
Cryptography Key Management.pptxCryptography Key Management.pptx
Cryptography Key Management.pptxSurendraBasnet6
 
ch09_rsa_nemo.ppt
ch09_rsa_nemo.pptch09_rsa_nemo.ppt
ch09_rsa_nemo.pptChandraB15
 
RSA & MD5 algorithm
RSA & MD5 algorithmRSA & MD5 algorithm
RSA & MD5 algorithmSiva Rushi
 
An implementation of RSA policy
An implementation of RSA policyAn implementation of RSA policy
An implementation of RSA policySM NAZMUS SALEHIN
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_cryptoHarry Potter
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_cryptoJames Wong
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_cryptoYoung Alista
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_cryptoDavid Hoen
 

Ähnlich wie Cryptography and network security (20)

Introduction to cryptography
Introduction to cryptographyIntroduction to cryptography
Introduction to cryptography
 
F010243136
F010243136F010243136
F010243136
 
Public key algorithm
Public key algorithmPublic key algorithm
Public key algorithm
 
Unit-III_3R-CRYPTO_2021-22_VSM.pptx
Unit-III_3R-CRYPTO_2021-22_VSM.pptxUnit-III_3R-CRYPTO_2021-22_VSM.pptx
Unit-III_3R-CRYPTO_2021-22_VSM.pptx
 
Cryptography based chat system
Cryptography based chat systemCryptography based chat system
Cryptography based chat system
 
Cryptography
CryptographyCryptography
Cryptography
 
Rsa
RsaRsa
Rsa
 
CH02-CompSec4e.pptx
CH02-CompSec4e.pptxCH02-CompSec4e.pptx
CH02-CompSec4e.pptx
 
Elementry Cryptography
Elementry CryptographyElementry Cryptography
Elementry Cryptography
 
82 86
82 8682 86
82 86
 
82 86
82 8682 86
82 86
 
Net
NetNet
Net
 
Cryptography Key Management.pptx
Cryptography Key Management.pptxCryptography Key Management.pptx
Cryptography Key Management.pptx
 
ch09_rsa_nemo.ppt
ch09_rsa_nemo.pptch09_rsa_nemo.ppt
ch09_rsa_nemo.ppt
 
RSA & MD5 algorithm
RSA & MD5 algorithmRSA & MD5 algorithm
RSA & MD5 algorithm
 
An implementation of RSA policy
An implementation of RSA policyAn implementation of RSA policy
An implementation of RSA policy
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 

KĂźrzlich hochgeladen

Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxPoojaSen20
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A BeĂąa
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 

KĂźrzlich hochgeladen (20)

Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 

Cryptography and network security

  • 2. CONTENTS o Introduction o Need of Cryptography o Types of Attacks o Techniques of Cryptography o Encryption Algorithm • Symmetric • Asymmetric o Digital Signature o Visual cryptography
  • 3. INTRODUCTION  What is Cryptography?  “Hidden Writing”  Mainly used to protect Information.
  • 4. NEED OF ENCRYPTION  Confidentiality  Integrity  Authentication  Nonrepudiation  Access Control  Availability
  • 5. TYPES OF ATTACKS  A General View: 1. Criminal attacks 2. Publicity attacks  A Technical View: 1. Passive attacks 2. Modification 3. Fabrication
  • 6.  A Practical Side of Attacks: 1. Application level 2. Network level  Programs that Attack: 1. Virus(infects) 2. Worm (replicates) 3. Trojan (hidden) 4. Applets and Active X controls (downloadable)
  • 8. BASIC TERMINOLOGIES  Encryption  Encryption is the process of encoding a message so that its meaning is not obvious  Decryption  Decryption is the reverse process, transforming an encrypted message back into its normal, original form  Cryptosystem  A system for encryption and decryption is called a cryptosystem.
  • 9. BASIC TERMINOLOGIES  Plaintext  Cipher text  Key –  key refers to a sequence of symbols or a numerical value used by an algorithm to alter information & making that information secure  Encryption algorithm  The cryptosystem involves a set of rules for how to encrypt the plaintext and how to decrypt the cipher text.  Cryptanalysis  Cryptanalysis is an attempt to break the cipher text.
  • 10. TECHNIQUES OF CRYPTOGRAPHY  Substitution Technique  Caesar Cipher  Monoalphabetic Cipher  Playfair Cipher  Polyalphabetic Cipher  Transposition Technique  Rail Fence Technique  Vernam Cipher(One -time Pads)  Simple Columnar Cipher
  • 11. ENCRYPTION ALGORITHM Symmetric  Same key for encryption and decryption  Key distribution problem Asymmetric  Key pairs for encryption and decryption  Public and private keys
  • 12. SYMMETRIC ALGORITHM  It is also called as Secret Key Cryptography  Single key used for both encrypt & decrypt  Key must be known to both the parties Encryption Decryption Key Plaintext Ciphertext Original Plaintext Symmetric Cryptosystem
  • 13. ASYMMETRIC ALGORITHM  Private keys are used for decrypting.  Public keys are used for encrypting encryption plaintext ciphertext public key decryption ciphertext plaintext private key
  • 14. SYMMETRIC ALGORITHM  Data Encryption Standard (DES): 56 bits key  Advance Encryption Standard (AES): 128, 192 or 256 bits key  International Data Encryption Algorithm(IDEA): 128 bits key
  • 15. DATA ENCRYPTION STANDARD  Developed by IBM and it is known as the Data Encryption Standard  It is also known as Data Encryption Algorithm  The DES algorithm is a careful and complex combination of two fundamental building blocks of encryption:  Substitution and  Transposition  DES uses only standard arithmetic and logical operations on numbers up to 64 bits long
  • 16. Plain text (64 bits) Initial Permutation (IP) LPT RPT 16 rounds Final Permutation Cipher text (64 bits) BROAD LEVEL STEPS IN DES key
  • 17. DATA ENCRYPTION STANDARD  1st 64 bit plain text is handed over to initial permutation function.  IP is performed over the plain text.  IP produces two halves of the permuted blocks left plain text (LPT) & right plain text (RPT).  Now LPT & RPT goes 16 rounds of encryption process, each with its own key.  Now LPT & RPT are rejoined and FINAL PERMUTATION (FP) is performed on the combined block.  The result is 64 bit cipher text.
  • 18. DETAILS OF ONE ROUND IN DES Key Transformation Expansion Permutation S- box Substitution P- box Permutation XOR with LPT and Swap 64-56- 48BITS 32-48BITS 48-32BITS RPT
  • 19. o DES is also an ANSI and ISO standard - anybody can learn the details and implement it. o Hard to crack. DISADVANTAGES OF DES: o Software implementations of DES are slow. ADVANTAGES OF DES:
  • 20. ASYMMETRIC ALGORITHM  Rivest Shamir Adleman (RSA) Encryption: Based on factoring the product of large prime numbers.  Knapsack Algorithm: If M1,M2…., Mn are given values & S is the sum, S=b1M1+b2M2….+bnMn where, bi can be 0 or 1
  • 21. RSA  It is named after its three inventors Rivest Shamir and Adleman  This algorithm was introduced in 1978 and to date remains secure.  RSA has been the subject of extensive cryptanalysis, and no serious flaws have yet been found.  The encryption algorithm is based on the underlying problem of factoring large numbers.
  • 22. GENERATING PUBLIC AND PRIVATE KEYS 1. pick two prime numbers, we'll pick p = 3 and q = 11 2. calculate n = p * q = 3 * 11 = 33 calculate z = ( p - 1 ) * ( q - 1 ) = ( 3 - 1 ) * ( 11 - 1 ) = 20 3. choose a prime number k, such that k is co-prime to z, i.e, z is not divisible by k. We have several choices for k: 7, 11, 13, 17, 19 (we cannot use 5, because 20 is divisible by 5). Let's pick k=7 4. So, the numbers n = 33 and k = 7 become the Server's public key.
  • 23. 1. Now, still done in advance of any transmission, the Server has to calculate it's secret key. Here is how. 2. k * j = 1 ( mod z ) 3. 7 * j = 1 ( mod 20 ) 4. ( 7 * j ) / 20 = ? with the remainder of 1 5. 21 / 20 gives "something" with the remainder of 1. So, 7 * j = 21, and j = 3. This is our secret key.
  • 24. Encrypting the message Here is the encryption math that Browser executes. P ^ k = E ( mod n ) P is the Plain message we want to encrypt n and k are Server's public key E is our Encrypted message we want to generate After plugging in the values, this equation is solved as follows: 14 ^ 7 = E ( mod 33 ) This equation says: raise 14 to the power of 7, divide this by 33, giving the remainder of E. 105413504 / 33 = 3194348.606 3194348 * 33 = 10541348 E = 105413504 - 10541348 = 20
  • 25.  So, our Encrypted message is E=20. This is now the value that the Browser is going to send to the Server. When the Server receives this message, it then proceeds to Decrypt it, as follows.
  • 26. Decrypting the Message Here is the decryption math the Server executes to recover the original Plain text message which the Browser started with. E ^ j = P ( mod n) E is the Encrypted message just received j is the Server's secret key P is the Plain message we are trying to recover n is Server's public key After plugging in the values: 20 ^ 3 = P ( mod 33 ) 8000 / 33 = ? with the remainder of P. So to calculate this remainder: 8000 / 33 = 242.424242... 242 * 33 = 7986 P = 8000 - 7986 = 14, which is exactly the Plain text message that the Browser started with!
  • 27. DIGITAL SIGNATURE  When an author signs a document, it cannot be changed.  When you send a document electronically, you can also sign it.
  • 28. Signing the digest  The two most common hash functions are:  Message digest 5 (MD5)  Secure hash algorithm (SHA-1)  The properties of hash function  One-way: the digest can only be created from the message, but not vice versa  One-to-one: be very difficult to find two messages that create the same digest.
  • 31. WEB SECURITY  Web now widely used by business, government, individuals  but Internet & Web are vulnerable  have a variety of threats  integrity  confidentiality  denial of service  authentication  need added security mechanisms 31
  • 32. SSL (SECURE SOCKET LAYER)  transport layer security service  originally developed by Netscape  uses TCP to provide a reliable end-to-end service 32
  • 33.
  • 34. SSL HANDSHAKE PROTOCOL  allows server & client to:  authenticate each other  to negotiate encryption  to negotiate cryptographic keys to be used  comprises a series of messages in phases  Establish Security Capabilities  Server Authentication and Key Exchange  Client Authentication and Key Exchange  Finish 34
  • 35. Overview of Visual Cryptography Share1 Stacking the share reveals the secret Share2 Encryption Decryption
  • 36. The basis matrices and the collections of the encoding matrices in the conventional (2,2) scheme can be written as:
  • 38.  6 ways to place two black subpixels in the 2 x 2 square 2 OUT OF 2 SCHEME (4 SUB PIXELS)
  • 39. Horizontal shares Vertical shares Diagonal shares 2 out of 2 Scheme (4 subpixels)
  • 40. 2 out of 2 Scheme (4 sub pixels)
  • 42. EXAMPLE OF TWO-OUT-OF-TWO VC SCHEME: (a) (b) (c) (d)
  • 43. HALFTONE VISUAL CRYPTOGRAPHY 1. The halftoning technique is used to convert the gray-scale image into the binary image. 2. The methods of halftoning that we are going to use are Error Diffusion and Direct Binary Search.
  • 44. BACKGROUND HALFTONE VISUAL CRYPTOGRAPHY 44 Distributions of SIPs Assign the values of all SIPs underlying VC scheme
  • 47. HVC VIA ERROR DIFFUSION Grayscale image Threshold block input Output 1 2 Quantization error Threshold of error diffusion