BDSMâĄCall Girls in Mandawali Delhi >àŒ8448380779 Escort Service
Â
Advanced cryptography and implementation
1. Technical Paper Presentation
TECH-TALK 2014
Topic: Advanced Cryptography and Implementation
Presented By,
Mr. Manish Ambre (144003)
Mr. Akash Jadhav (144024)
CUSROW WADIA INSTITUTE OF TECHNOLOGY,
19, BUND GARDEN ROAD, PUNE-01.
2. Advanced Cryptography And Its
Implementation
Index
1. Introduction
2. What is Cryptography?
3. History
3. Introduction
ï Cryptography is the practice of the enciphering and deciphering of messages in
secret code in order to render them unintelligible to all but the intended receiver.
ï It is the key technology in secure electronics. Modern cryptography has many
uses, such as to digitally sign documents, for access control, for copyright
protection, etc.
Cryptography is the science of secret writing. It is the science
of safe and secure communication.
4. What is Cryptography?
(An Example)
ï Suppose if some one wants to send a message
to a receiver, and wants to be sure that no one
else knows of it.
ï However there is a possibility that some one
opens the letter or hears the electronic
communication.
ï So the sender converts the message into
unintelligible form (i.e. he encrypts the
message)
ï The encrypted message can be decrypted, i.e.
reconverted into its original form only by a key,
which is known to the sender and receiver.
ï Without the key, the message cannot be
decrypted.
ï Hence the message can only be accessed by the
sender and the receiver only.
Sender
Receiver
Unknown
Person
5. History
ï Cryptography has been around for hundreds of years.
ï It has been used for different purposes, since when man felt the need of
it.
ï It has developed as the time has passed.
ï The Roman emperor Julius Ceaser, used basic encryption methods for
his secret messages.
ï He used to write the messages in an encrypted form (secret method of
writing).
6. History
ï Babington Plot: Cryptography was used in the 1586 plot to assassinate
Queen Elizabeth and put Mary, Queen of Scots on the throne in her
place. Ultimately led to Maryâs execution.
ï During the World War II, mechanical and electromechanical ciphers
were used.
ï The Nazi Germans used many different methods for protecting their
confidential data.
8. Cryptography- Basic Concepts
ï Cryptography: It is the art or the science of transforming
intelligible message into one that is unintelligible, and then
retransforming the message back to its original form.
ï Plaintext - the original intelligible message
ï Cipher text - the transformed message
ï Cipher - an algorithm for transforming an intelligible message into
one that is unintelligible by transposition and/or substitution
methods
ï Key - some critical information used by the cipher, known only to
the sender & receiver.
9. Cryptography- Basic Concepts
ï Encipher (encode) - the process of converting plaintext to cipher text
using a cipher and a key
ï Decipher (decode) - the process of converting cipher text back into
plaintext using a cipher and a key
ï Cryptanalysis - the study of principles and methods of transforming
an unintelligible message back into an intelligible message without
knowledge of the key. Also called code breaking.
ï Authentication - Process of proving oneâs identity.
11. Cryptographic systems - classification
Cryptographic systems are classified along three dimensions,
1) The type of operations used for transforming plaintext to cipher text
ï§ Substitution
ï§ Transposition
2) The number of keys used
ï§ Single key, symmetric, secret key, conventional
ï§ Two keys, asymmetric, public key
3) The way in which plaintext is processed
ï§ Block cipher
ï§ Stream cipher
12. Encryption and Decryption
ï Encryption is the science of changing data so that it is
unrecognizable and useless to an unauthorized person.
ï Decryption is changing it back to its original form.
Hello @!*w9
Plain text
Encrypted data
14. Private Key
ï The most secure techniques use a mathematical algorithm and a
variable value known as a 'key'.
ï The selected key (often any random character string) is input on
encryption and is integral to the changing of the data. The EXACT
same key MUST be input to enable decryption of the data.
ï This is the basis of the protection.... if the key (sometimes called a
password) is only known by authorized individual(s), the data cannot
be exposed to other parties.
ï Only those who know the key can decrypt it. This is known as 'private
key' cryptography, which is the most well known form.
15. Cryptographic Methods
ï Cryptographic Algorithms generally fall into one of two different
categories, or are a combination of both.
Symmetric1
Asymmetric2
Asymmetric + Symmetric3
16. Cryptographic Methods
ïSymmetric
ï§ Fast
ï§ Only provides confidentiality
ï§ Need secure channel for key distribution
ï§ Key management headaches from large number of key pairs to
maintain N(N1)/2
ï§ Examples: DES, AES, Blowfish, RC4, RC5
17. Cryptographic Methods
ïAsymmetric
ï§ Large mathematical operations make it slower than symmetric
algorithms
ï§ No need for out of band key distribution (public keys are
public!)
ï§ Scales better since only a single key pair needed per individual
ï§ Can provide authentication and no repudiation
ï§ Examples: RSA, El Gamal, ECC, Diffie-Hellman
18. Applications of Cryptography
ï In particular, the secure exchange
of computer data is of great
importance to banking,
government, and commercial
communications.
ï The principles of cryptography
are today applied to the
encryption of fax, television, and
computer network
communications.
Username
Password
Mr. Alex
xxxxxxxxxx
19. ATM and Debit cards
DEBIT CARD
9875 XXXX XXXX XXXX
Mr. Robert
12345
Exp
12/75
ïThe Personal Identity number or PIN that is entered by the
Card owner to perform transactions, along with the card is a
form of cryptography.
ïThe original PIN in plain text format may be with the
owner or can be encrypted on the card itself (cipher text
format).
ïThe PIN is also present in the Bank computers, but is in
cipher text format.
ïThis allows only the user to receive unrestricted access to
his/her bank account, for performing transactions.
20. ATM and Debit cards
ïSimilarly, the communication between the ATM machine, and the
bankâs central computer, is encrypted to prevent anyone from
tapping into the phone lines and recording the signals sent to the
ATM to authorize the dispensing of cash in response to a legitimate
user request and then later feeding the same signals to the ATM
repeatedly to deceive it into dispensing money illegitimately.
21. Lottery Tickets
ï Lottery tickets are simply printed on
pasteboard and hence are easily
counterfeited if one knows what to
print on the ticket.
ï Each ticket, however, has two
numbers printed on it- one being the
identifying number that will be
announced when a winner is selected
and the other being an encrypted
version of this number.
ï Thus, when the winning number is
made known, the would-be
counterfeiter is unable to print an
acceptable encrypted code.
National Lottery
1001 XXXX 0000
XX009 5321 WQRTU
A 123456789
B 987654321
C 000000000
D 999999999
E XXXXXXX
Rs. 100000
Rs. 50000
Rs. 20000
22. Credit Cards
ï The Credit Cards have a small
microprocessor built into the card
itself.
ï The card and the card reader execute a
sequence of encrypted sign-
/countersign-like exchanges to verify
that each is dealing with a legitimate
counterpart.
ï Once this is done, the transaction is
carried out in an encrypted format to
prevent any including the cardholder
or the merchant whose card reader is
involved, from eavesdropping on the
exchange and then later impersonating
either party to defraud the system.
9875 XXXX XXXX XXXX
12345
Exp
12/75
VISACREDIT CARD
23. E-mail
ï Email encryption can rely on
public-key cryptography, in
which users can each publish a
public key that others can use to
encrypt messages to them, while
keeping secret a private key
they can use to decrypt such
messages or to digitally encrypt
and sign messages they send.
@
24. E-mail
ï Because encryption can be difficult for users, security and
compliance managers at companies and government agencies
automate the process for employees and executives by using
encryption appliances and services that automate encryption.
ï Instead overflying on voluntary cooperation, automated
encryption, based undefined policies, takes the decision and the
process out of the users 'hands.
ï Emails are routed through a gate way appliance that has been
configured to ensure compliance with regulatory and security
policies.
ï Emails that require it are automatically encrypted and sent.