SlideShare a Scribd company logo
1 of 44
Download to read offline
Cryptography
 Definition
 It is an ancient art and science of writing in secret message.
 Cryptography comes from Greek word “crypto “ means hiding
and “Graphy” means writing
 It is the art of achieving security by encoding messages to
make them non readable.
8/3/2016 jaya 2
Cryptography
 Terminologies
 Cryptanalysis
 Cryptanalysis (from the Greek kryptós, "hidden", and analýein,
"to loosen“ ) is the study of analyzing information system in
order to study the hidden aspects of the systems.
 breaking “secret codes”
 Cryptology
 Cryptology (from Greek kryptós, "hidden, secret“, and logia,
"study“) is the study of cryptography and cryptanalysis
 The art and science of making and breaking “secret codes”
8/3/2016 jaya 3
Cryptography
 Terminologies
 Encryption
 It is the process of transforming information so it is unintelligible to
anyone but the intended recipient.
 Decryption
 It is the process of transforming encrypted information so that it is
intelligible again.
 Plaintext
 the message to be transmitted or stored.
 Cipher text
 the disguised message or encrypted message
 Algorithm
 The mathematical formula used for encryption and decryption
 Cipher
 Algorithm used for encryption and decryption
 Key
 Value used by algorithm to encrypt and decrypt
8/3/2016 jaya 4
Cryptography
 Steps of cryptography
8/3/2016 jaya 5
Cryptography
 Purpose of Cryptography
 Authentication
 Privacy/confidentiality
 Integrity
 Non-repudiation
8/3/2016 jaya 6
Cryptography
 Application of Cryptography
 Secure communication:
 To prevent eavesdropping-war time communication and business
transactions.
 Identification & Authentication:
 Checking the integrity
 Secret sharing / data hiding:
 Hide something that has been written.
 E-commerce / E-payment:
 Certification:
 Certification is a scheme by which trusted agents such as
certifying authorities guarantee for unknown agents , such as
users.
8/3/2016 jaya 7
Cryptography
 Application of Cryptography
 Key recovery:
 It is a technology that allows a key to be revealed under certain
circumstances without the owner of the key revealing it.
 Remote access:
 Passwords gives a level of security for secure access.
 Cell phone:
 Prevent people from stealing cell phone nos. , access code or
eavesdropping.
 Access control:
 Regulate access to satellite and cable TV
8/3/2016 jaya 8
Cryptography
 Characteristics of Cryptographic System:
 The type of operations used for transforming plaintext
to cipher text.
 The number of keys used
 The way in which the plaintext is processed.
8/3/2016 jaya 9
Cryptography
 Types of Cryptography
 Secret –key Cryptography(Symmetric key cryptography)
 Single key is used for both encryption and decryption.
 Public key Cryptography(Asymmetric key cryptography)
 Uses one key for encryption and anther for decryption.
 Hash function
 It uses a mathematical transformation to irreversibly “encrypt”
information.
8/3/2016 jaya 10
Cryptography
 Classical encryption(symmetric key cryptography)
techniques
 Substitution
 Replacing an element of plain text by cipher text
 Transposition
 Rearranging the order of appearance of the elements of the
plaintext.
8/3/2016 jaya 11
Symmetric key Cryptography
 Substitution ciphers technique:
 Caesar’s cipher substitution technique.
 Monoalphabetic cipher substitution technique
 Polyalphabetic cipher substitution technique
 One time pad
 Playfair cipher
 Hill cipher
8/3/2016 jaya 12
Symmetric key Cryptography
 Caesar’s cipher substitution technique.
 The method is named after Julius Caesar, who used it to
communicate with his generals.
 It is also known as the shift cipher, Caesar’s code or
Caesar shift.
 It is one of the simplest and most widely known
encryption techniques.
 Letter in the plaintext is replaced by a letter some fixed
number of positions down the alphabet.
8/3/2016 jaya 13
Symmetric key Cryptography
 Caesar’s cipher substitution technique.
 Encryption of a letter x by a shift n can be described
mathematically as,
 En(x) = (x+n) mod 26
 Example:
 Encryption of a letter A by a shift 3 can be described
mathematically as,
 En(x) = (A+3) mod 26 = (0+3) mod 26 = 3 mod 26 =3
 Encrypted letter for A is D
8/3/2016 jaya 14
Symmetric key Cryptography
 Decryption of a letter x by a shift n can be described
mathematically as,
 Decryption is performed similarly,
 Dn(x) =(x-n) mod 26
 Example:
 Decryption of a letter D by a shift 3 can be described
mathematically as,
 Dn(x) = (D-3) mod 26 = (3 -3) mod 26 = 0 mod 26 =0
 Decrypted letter for D is A
8/3/2016 jaya 15
Symmetric key Cryptography
 Example for Caesar cipher
 Key=3
 Plain text is =“WELCOME”
 Cipher text is =“ZHOFRPH”
Plain text
A B C D E F G H I J K L M
Cipher text
D E F G H I J K L M N O P
Plain text
N O P Q R S T U V W X Y Z
Cipher text
Q R S T U V W X Y Z A B C
8/3/2016 jaya 16
Symmetric key Cryptography
 Mono-Alphabetic cipher substitution technique
 It uses fixed substitution over the entire message
 Uses random substitution
 Requires permutation or combination of 26 alphabets.
 Hard to crack
 Example
 Plain text is =“WELCOME”
 Cipher text is =“GXDLRPX”
Plain
text A B C D E F G H I J K L M
Cipher
text Y N L K X B S H M I W D P
Plain
text N O P Q R S T U V W X Y Z
Cipher
text J R O Q V F E A U G T Z C
8/3/2016 jaya 17
Symmetric key Cryptography
 Homophonic substitution technique
 A plain text alphabet can map to more than one cipher
text alphabet.
 Example
 A can be replaced by [D,H,P,R] and B can be replaced by
[E,I,Q,S]
8/3/2016 jaya 18
Symmetric key Cryptography
 Polygram substitution technique
 A block of plain text alphabet is replaced by block of
cipher text alphabet.
 Example
 Hello can be replaced by YUQQW
8/3/2016 jaya 19
Symmetric key Cryptography
 Poly-Alphabetic cipher substitution technique:
 Leon Battista invented this technique in 1568
 It is made up of multiple simple substitution cipher.
 This method uses multiple one character keys.
 Each key encrypts one plain text character.
 Examples:
 Vigenere Cipher
 Beaufort Cipher
8/3/2016 jaya 20
STEGANOGRAPHY
 Steganography is the science of hiding information by
embedding the hidden(secret) message within a cover
media.
 It works by replacing bits of useless or unused data in
regular computer files with bits of different, invisible
information.
 It used sometime when encryption is not permitted.
 Steganographic process
Stego medium = cover media + hidden data + stego key
8/3/2016 jaya 21
STEGANOGRAPHY
 Different techniques of Steganography:
 Character marking
 Invisible ink
 Pin punctures
 Typewriter correction ribbon
8/3/2016 jaya 22
STEGANOGRAPHY
 Advantages of Steganography:
 used to transfer sensitive data
 We can hide secrete message with graphic images.
 Provides high security
8/3/2016 jaya 23
STEGANOGRAPHY
 Disadvantages of Steganography:
 It requires lot of overhead to hide a relatively few bits of
information
 Once the system is discovered, it becomes virtually
worthless.
8/3/2016 jaya 24
STEGANOGRAPHY
 Applications of Steganography:
 Digital watermarking
 Used in conjunction with encryption for extra security.
8/3/2016 jaya 25
CRYPTOGRAPHY
 Symmetric cipher /secrete key cryptography
 Sender and recipient share a same key for encryption
and decryption
 The encryption algorithm is divided into two types
 Block Cipher
 Stream Cipher
8/3/2016 jaya 26
CRYPTOGRAPHY
 Advantages of Symmetric cipher /secrete key
cryptography
 It is faster
 While transmission the chances of data being decrypted
is null
 Uses password authentication to prove the receivers
identity
8/3/2016 jaya 27
CRYPTOGRAPHY
 Disadvantages of Symmetric cipher /secrete key
cryptography
 Issue of key transportation
 It cannot provide digital signature that cannot be
repudiated.
8/3/2016 jaya 28
CRYPTOGRAPHY
 Asymmetric cipher /secrete key cryptography
 A pair of key is used to encrypt and decrypt.
 With asymmetric cryptography, the sender encrypts data
with one key, and the recipient uses a different key to
decrypt cipher text.
 Encrypt data using public key and decrypt data using
private key.
8/3/2016 jaya 29
CRYPTOGRAPHY
 Advantages Asymmetric cipher /secrete key
cryptography
 Eliminating the key distribution problem
 Increased security
 It can provide digital signatures that can be repudiated.
 Advantages Asymmetric cipher /secrete key
cryptography
 Faster methods are available.
8/3/2016 jaya 30
DIGITAL SIGNATURE
 A digital signature is an electronic signature that can be
used to authenticate the identity of the sender of a
message.
 It is a mathematical scheme for demonstrating the
authenticity of a digital message or document.
 Each signatory has their own paired public and private key
8/3/2016 jaya 31
DIGITAL SIGNATURE
 It consists three algorithms:
 A digital signature generation algorithm:
 It consists of a (mathematical) digital signature generation
algorithm
 Randomly produces a key pair( public and private)
 A signing algorithm:
 Produces a signature
 A digital signature verification algorithm
 It consists of a verification algorithm, along with a method for
recovering data from the message.
8/3/2016 jaya 32
DIGITAL SIGNATURE
Message Message digest
Hash function
Digital Signature
Senders private key
Concept of digital signature
8/3/2016 jaya 33
DIGITAL SIGNATURE
 Working of digital signature
8/3/2016 jaya 34
DIGITAL SIGNATURE
 Advantages of Digital Signature
 Imposter prevention
 Message integrity
 Legal requirement
 Disadvantages of Digital Signature:
 Digital signature involves the primary avenue for any
business is money
8/3/2016 jaya 35
Authentication Protocols
 Kerberos:
 Developed by MIT( massachusetts Institute of Technology)
 It is a computer network authentication protocol works on
tickets.
 Designed for c-s network
 Mutual authentication
 Builds on symmetric key cryptography
 Requires a trusted third party
 Protected against eavesdropping and replay attacks
 Provides secure authentication for unix
8/3/2016 jaya 36
Authentication Protocols
 SSL(secure sockets layers)
 Establishes an encrypted link between a server and a client .
 Uses combination of symmetric and asymmetric encryption
 Supported by web servers and web browsers
 Operates at lower layer
 Based on digital certification
 Allows sensitive information to be transmitted securely
8/3/2016 jaya 37
Authentication Protocols
 Microsoft NTLM( NT Lan Manager)
 Used by windows NT server to authenticate clients to an NT
domain
 It is a challenge-Response authentication protocol uses three
messages to authenticate a client
 Users credentials do not get transferred across the nw when
resources are accessed, which increases security .
client
server
NEGOTIATE_MESSAGE CHALLENGE_MESSAGE
AUTHENTICATE_MESSAGE
8/3/2016 jaya 38
Authentication Protocols
 PAP(Password Authentication Protocol)
 Two way handshake protocol designed for PPP
 Authenticate a user over a remote access control
 It sends user passwords across the nw to the authenticating
server in plain text.
 Poses a significant security risk.
 Advantage is it is compatible with many server types running in
different OS.
8/3/2016 jaya 39
Authentication Protocols
 SPAP(Shiva Password Authentication Protocol)
 Used by shiva remote access server
 It is an improvement over PAP in terms of the security level
 Client sends encrypted password to remote server and server
decrypts the password
 Based on login info server sends ACK or NACK.
 Advantage is it is compatible with many server types running in
different OS.
8/3/2016 jaya 40
Authentication Protocols
 CHAP(Challenge Handshake Authentication Protocol)
 Used for remote access security
 It is an internet standard uses MD5
 Password does not go across the nw and can’t be captured
 No reverse engineering.
 Vulnerable to remote server impersonation.
8/3/2016 jaya 41
Authentication Protocols
 MCHAP(Microsoft version of CHAP)
 Uses 2-way authentication to verify identity of client and server
 Protects against impersonation
 Uses separate cryptographic keys for transmitted and received data
8/3/2016 jaya 42
Authentication Protocols
 EAP(Extensible authentication protocol )
 used to determine what authentication protocol will be used
 Used in wireless nw and PPP
 Used in devices such as smart card readers and finger print readers.
 S/KEY
 One time password system developed for UNIX
 OTP allows to logon only once
 List of password is given and maintained by hardware device.
8/3/2016 jaya 43
Authentication Protocols
 RADIUS( Remote Authentication Dial-In User service
Protocol)
 Client server protocol
 Provides centralized authentication, authorization and accounting
management for network users
 TACACS( Terminal Access Controller Access Control System)
 Older authentication protocol used in UNIX
 Client pass login information to server to gain access
 Encryption protocol so less expensive
8/3/2016 jaya 44

More Related Content

What's hot

6. cryptography
6. cryptography6. cryptography
6. cryptography7wounders
 
Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography pptThushara92
 
block ciphers
block ciphersblock ciphers
block ciphersAsad Ali
 
Steganography
Steganography Steganography
Steganography Uttam Jain
 
Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Dr. Kapil Gupta
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & SteganographyAnimesh Shaw
 
Topic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesTopic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesMdFazleRabbi18
 
Cryptography Fundamentals
Cryptography FundamentalsCryptography Fundamentals
Cryptography FundamentalsDuy Do Phan
 
cryptography ppt free download
cryptography ppt free downloadcryptography ppt free download
cryptography ppt free downloadTwinkal Harsora
 
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...JAINAM KAPADIYA
 
Encryption And Decryption
Encryption And DecryptionEncryption And Decryption
Encryption And DecryptionNA
 

What's hot (20)

Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Encryption ppt
Encryption pptEncryption ppt
Encryption ppt
 
Data encryption
Data encryptionData encryption
Data encryption
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography ppt
 
block ciphers
block ciphersblock ciphers
block ciphers
 
Steganography
Steganography Steganography
Steganography
 
Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & Steganography
 
Topic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesTopic1 substitution transposition-techniques
Topic1 substitution transposition-techniques
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography Fundamentals
Cryptography FundamentalsCryptography Fundamentals
Cryptography Fundamentals
 
cryptography ppt free download
cryptography ppt free downloadcryptography ppt free download
cryptography ppt free download
 
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
 
Encryption And Decryption
Encryption And DecryptionEncryption And Decryption
Encryption And Decryption
 
Cryptography
CryptographyCryptography
Cryptography
 

Viewers also liked

History of cryptography
History of cryptographyHistory of cryptography
History of cryptographyFarah Shaikh
 
Block Cipher vs. Stream Cipher
Block Cipher vs. Stream CipherBlock Cipher vs. Stream Cipher
Block Cipher vs. Stream CipherAmirul Wiramuda
 
Introduction To Digital Signatures
Introduction To Digital SignaturesIntroduction To Digital Signatures
Introduction To Digital SignaturesRobert Talbert
 
Digital signature introduction
Digital signature introductionDigital signature introduction
Digital signature introductionAsim Neupane
 
Digital signatures
Digital signaturesDigital signatures
Digital signaturesIshwar Dayal
 
Seminar ppt on digital signature
Seminar ppt on digital signatureSeminar ppt on digital signature
Seminar ppt on digital signaturejolly9293
 
Digital Signature
Digital SignatureDigital Signature
Digital Signaturesaurav5884
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signaturesRohit Bhat
 

Viewers also liked (12)

Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
 
History of cryptography
History of cryptographyHistory of cryptography
History of cryptography
 
Classical Encryption
Classical EncryptionClassical Encryption
Classical Encryption
 
Block Cipher vs. Stream Cipher
Block Cipher vs. Stream CipherBlock Cipher vs. Stream Cipher
Block Cipher vs. Stream Cipher
 
Introduction To Digital Signatures
Introduction To Digital SignaturesIntroduction To Digital Signatures
Introduction To Digital Signatures
 
Digital signature introduction
Digital signature introductionDigital signature introduction
Digital signature introduction
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
cryptography
cryptographycryptography
cryptography
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Seminar ppt on digital signature
Seminar ppt on digital signatureSeminar ppt on digital signature
Seminar ppt on digital signature
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signatures
 

Similar to Cryptography

Cryptography
CryptographyCryptography
Cryptographyprasham95
 
Computer Cryptography and Encryption [by: Magoiga].pptx
Computer Cryptography and Encryption [by: Magoiga].pptxComputer Cryptography and Encryption [by: Magoiga].pptx
Computer Cryptography and Encryption [by: Magoiga].pptxmagoigamtatiro1
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarDurlove Kumbhakar
 
Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)newbie2019
 
Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)newbie2019
 
Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overviewppd1961
 
Multiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisMultiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisIJCERT
 
Seminar report on symmetric key
Seminar report on symmetric keySeminar report on symmetric key
Seminar report on symmetric keyRajat Tripathi
 
cryptography and network security
cryptography and network security cryptography and network security
cryptography and network security nitishV3
 
Paper id 27201444
Paper id 27201444Paper id 27201444
Paper id 27201444IJRAT
 
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEYMETHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEYIJNSA Journal
 
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Jayanth Dwijesh H P
 
Cryptography Lecture by Sam Bowne
Cryptography Lecture by Sam BowneCryptography Lecture by Sam Bowne
Cryptography Lecture by Sam BowneSecurityTube.Net
 
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...IJCSIS Research Publications
 

Similar to Cryptography (20)

Cryptography
CryptographyCryptography
Cryptography
 
Computer Cryptography and Encryption [by: Magoiga].pptx
Computer Cryptography and Encryption [by: Magoiga].pptxComputer Cryptography and Encryption [by: Magoiga].pptx
Computer Cryptography and Encryption [by: Magoiga].pptx
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab Kumbhakar
 
Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)
 
Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)
 
Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overview
 
Multiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisMultiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity Analysis
 
Cn ppt
Cn pptCn ppt
Cn ppt
 
Seminar report on symmetric key
Seminar report on symmetric keySeminar report on symmetric key
Seminar report on symmetric key
 
Elementry Cryptography
Elementry CryptographyElementry Cryptography
Elementry Cryptography
 
cryptography and network security
cryptography and network security cryptography and network security
cryptography and network security
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Unit-2-IS (1).pdf
Unit-2-IS (1).pdfUnit-2-IS (1).pdf
Unit-2-IS (1).pdf
 
Ch34508510
Ch34508510Ch34508510
Ch34508510
 
Paper id 27201444
Paper id 27201444Paper id 27201444
Paper id 27201444
 
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEYMETHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY
 
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..
 
Cns 1
Cns 1Cns 1
Cns 1
 
Cryptography Lecture by Sam Bowne
Cryptography Lecture by Sam BowneCryptography Lecture by Sam Bowne
Cryptography Lecture by Sam Bowne
 
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
 

More from jayashri kolekar

More from jayashri kolekar (13)

FILE MANAGEMENT.pptx
FILE MANAGEMENT.pptxFILE MANAGEMENT.pptx
FILE MANAGEMENT.pptx
 
Architectural modeling chapter 5 of omd
Architectural modeling chapter 5 of omdArchitectural modeling chapter 5 of omd
Architectural modeling chapter 5 of omd
 
Advanced behavioral modeling chapter 4 of omd
Advanced behavioral modeling chapter 4 of omdAdvanced behavioral modeling chapter 4 of omd
Advanced behavioral modeling chapter 4 of omd
 
Basic behavioral modeling chapter 3 of OMD
Basic behavioral modeling chapter 3 of OMDBasic behavioral modeling chapter 3 of OMD
Basic behavioral modeling chapter 3 of OMD
 
Object oriented modeling and design
Object oriented modeling and designObject oriented modeling and design
Object oriented modeling and design
 
OMD chapter 2 Class modelling
 OMD  chapter 2 Class modelling OMD  chapter 2 Class modelling
OMD chapter 2 Class modelling
 
Macro
MacroMacro
Macro
 
Parsing
ParsingParsing
Parsing
 
Loader
LoaderLoader
Loader
 
Assembler1
Assembler1Assembler1
Assembler1
 
System programming
System programmingSystem programming
System programming
 
Compilers
CompilersCompilers
Compilers
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 

Recently uploaded

Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxkarenfajardo43
 
6 ways Samsung’s Interactive Display powered by Android changes the classroom
6 ways Samsung’s Interactive Display powered by Android changes the classroom6 ways Samsung’s Interactive Display powered by Android changes the classroom
6 ways Samsung’s Interactive Display powered by Android changes the classroomSamsung Business USA
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...Nguyen Thanh Tu Collection
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...DhatriParmar
 
The role of Geography in climate education: science and active citizenship
The role of Geography in climate education: science and active citizenshipThe role of Geography in climate education: science and active citizenship
The role of Geography in climate education: science and active citizenshipKarl Donert
 
Indexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfIndexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfChristalin Nelson
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationdeepaannamalai16
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxSayali Powar
 
4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptxmary850239
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
Sulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesSulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesVijayaLaxmi84
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Association for Project Management
 
PART 1 - CHAPTER 1 - CELL THE FUNDAMENTAL UNIT OF LIFE
PART 1 - CHAPTER 1 - CELL THE FUNDAMENTAL UNIT OF LIFEPART 1 - CHAPTER 1 - CELL THE FUNDAMENTAL UNIT OF LIFE
PART 1 - CHAPTER 1 - CELL THE FUNDAMENTAL UNIT OF LIFEMISSRITIMABIOLOGYEXP
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfPrerana Jadhav
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQuiz Club NITW
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research DiscourseAnita GoswamiGiri
 
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxCLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxAnupam32727
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQuiz Club NITW
 

Recently uploaded (20)

Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
 
6 ways Samsung’s Interactive Display powered by Android changes the classroom
6 ways Samsung’s Interactive Display powered by Android changes the classroom6 ways Samsung’s Interactive Display powered by Android changes the classroom
6 ways Samsung’s Interactive Display powered by Android changes the classroom
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
 
The role of Geography in climate education: science and active citizenship
The role of Geography in climate education: science and active citizenshipThe role of Geography in climate education: science and active citizenship
The role of Geography in climate education: science and active citizenship
 
Indexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfIndexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdf
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentation
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
 
4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
prashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Professionprashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Profession
 
Sulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesSulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their uses
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
 
PART 1 - CHAPTER 1 - CELL THE FUNDAMENTAL UNIT OF LIFE
PART 1 - CHAPTER 1 - CELL THE FUNDAMENTAL UNIT OF LIFEPART 1 - CHAPTER 1 - CELL THE FUNDAMENTAL UNIT OF LIFE
PART 1 - CHAPTER 1 - CELL THE FUNDAMENTAL UNIT OF LIFE
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdf
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
 
Introduction to Research ,Need for research, Need for design of Experiments, ...
Introduction to Research ,Need for research, Need for design of Experiments, ...Introduction to Research ,Need for research, Need for design of Experiments, ...
Introduction to Research ,Need for research, Need for design of Experiments, ...
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research Discourse
 
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxCLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
 

Cryptography

  • 1.
  • 2. Cryptography  Definition  It is an ancient art and science of writing in secret message.  Cryptography comes from Greek word “crypto “ means hiding and “Graphy” means writing  It is the art of achieving security by encoding messages to make them non readable. 8/3/2016 jaya 2
  • 3. Cryptography  Terminologies  Cryptanalysis  Cryptanalysis (from the Greek kryptós, "hidden", and analýein, "to loosen“ ) is the study of analyzing information system in order to study the hidden aspects of the systems.  breaking “secret codes”  Cryptology  Cryptology (from Greek kryptós, "hidden, secret“, and logia, "study“) is the study of cryptography and cryptanalysis  The art and science of making and breaking “secret codes” 8/3/2016 jaya 3
  • 4. Cryptography  Terminologies  Encryption  It is the process of transforming information so it is unintelligible to anyone but the intended recipient.  Decryption  It is the process of transforming encrypted information so that it is intelligible again.  Plaintext  the message to be transmitted or stored.  Cipher text  the disguised message or encrypted message  Algorithm  The mathematical formula used for encryption and decryption  Cipher  Algorithm used for encryption and decryption  Key  Value used by algorithm to encrypt and decrypt 8/3/2016 jaya 4
  • 5. Cryptography  Steps of cryptography 8/3/2016 jaya 5
  • 6. Cryptography  Purpose of Cryptography  Authentication  Privacy/confidentiality  Integrity  Non-repudiation 8/3/2016 jaya 6
  • 7. Cryptography  Application of Cryptography  Secure communication:  To prevent eavesdropping-war time communication and business transactions.  Identification & Authentication:  Checking the integrity  Secret sharing / data hiding:  Hide something that has been written.  E-commerce / E-payment:  Certification:  Certification is a scheme by which trusted agents such as certifying authorities guarantee for unknown agents , such as users. 8/3/2016 jaya 7
  • 8. Cryptography  Application of Cryptography  Key recovery:  It is a technology that allows a key to be revealed under certain circumstances without the owner of the key revealing it.  Remote access:  Passwords gives a level of security for secure access.  Cell phone:  Prevent people from stealing cell phone nos. , access code or eavesdropping.  Access control:  Regulate access to satellite and cable TV 8/3/2016 jaya 8
  • 9. Cryptography  Characteristics of Cryptographic System:  The type of operations used for transforming plaintext to cipher text.  The number of keys used  The way in which the plaintext is processed. 8/3/2016 jaya 9
  • 10. Cryptography  Types of Cryptography  Secret –key Cryptography(Symmetric key cryptography)  Single key is used for both encryption and decryption.  Public key Cryptography(Asymmetric key cryptography)  Uses one key for encryption and anther for decryption.  Hash function  It uses a mathematical transformation to irreversibly “encrypt” information. 8/3/2016 jaya 10
  • 11. Cryptography  Classical encryption(symmetric key cryptography) techniques  Substitution  Replacing an element of plain text by cipher text  Transposition  Rearranging the order of appearance of the elements of the plaintext. 8/3/2016 jaya 11
  • 12. Symmetric key Cryptography  Substitution ciphers technique:  Caesar’s cipher substitution technique.  Monoalphabetic cipher substitution technique  Polyalphabetic cipher substitution technique  One time pad  Playfair cipher  Hill cipher 8/3/2016 jaya 12
  • 13. Symmetric key Cryptography  Caesar’s cipher substitution technique.  The method is named after Julius Caesar, who used it to communicate with his generals.  It is also known as the shift cipher, Caesar’s code or Caesar shift.  It is one of the simplest and most widely known encryption techniques.  Letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet. 8/3/2016 jaya 13
  • 14. Symmetric key Cryptography  Caesar’s cipher substitution technique.  Encryption of a letter x by a shift n can be described mathematically as,  En(x) = (x+n) mod 26  Example:  Encryption of a letter A by a shift 3 can be described mathematically as,  En(x) = (A+3) mod 26 = (0+3) mod 26 = 3 mod 26 =3  Encrypted letter for A is D 8/3/2016 jaya 14
  • 15. Symmetric key Cryptography  Decryption of a letter x by a shift n can be described mathematically as,  Decryption is performed similarly,  Dn(x) =(x-n) mod 26  Example:  Decryption of a letter D by a shift 3 can be described mathematically as,  Dn(x) = (D-3) mod 26 = (3 -3) mod 26 = 0 mod 26 =0  Decrypted letter for D is A 8/3/2016 jaya 15
  • 16. Symmetric key Cryptography  Example for Caesar cipher  Key=3  Plain text is =“WELCOME”  Cipher text is =“ZHOFRPH” Plain text A B C D E F G H I J K L M Cipher text D E F G H I J K L M N O P Plain text N O P Q R S T U V W X Y Z Cipher text Q R S T U V W X Y Z A B C 8/3/2016 jaya 16
  • 17. Symmetric key Cryptography  Mono-Alphabetic cipher substitution technique  It uses fixed substitution over the entire message  Uses random substitution  Requires permutation or combination of 26 alphabets.  Hard to crack  Example  Plain text is =“WELCOME”  Cipher text is =“GXDLRPX” Plain text A B C D E F G H I J K L M Cipher text Y N L K X B S H M I W D P Plain text N O P Q R S T U V W X Y Z Cipher text J R O Q V F E A U G T Z C 8/3/2016 jaya 17
  • 18. Symmetric key Cryptography  Homophonic substitution technique  A plain text alphabet can map to more than one cipher text alphabet.  Example  A can be replaced by [D,H,P,R] and B can be replaced by [E,I,Q,S] 8/3/2016 jaya 18
  • 19. Symmetric key Cryptography  Polygram substitution technique  A block of plain text alphabet is replaced by block of cipher text alphabet.  Example  Hello can be replaced by YUQQW 8/3/2016 jaya 19
  • 20. Symmetric key Cryptography  Poly-Alphabetic cipher substitution technique:  Leon Battista invented this technique in 1568  It is made up of multiple simple substitution cipher.  This method uses multiple one character keys.  Each key encrypts one plain text character.  Examples:  Vigenere Cipher  Beaufort Cipher 8/3/2016 jaya 20
  • 21. STEGANOGRAPHY  Steganography is the science of hiding information by embedding the hidden(secret) message within a cover media.  It works by replacing bits of useless or unused data in regular computer files with bits of different, invisible information.  It used sometime when encryption is not permitted.  Steganographic process Stego medium = cover media + hidden data + stego key 8/3/2016 jaya 21
  • 22. STEGANOGRAPHY  Different techniques of Steganography:  Character marking  Invisible ink  Pin punctures  Typewriter correction ribbon 8/3/2016 jaya 22
  • 23. STEGANOGRAPHY  Advantages of Steganography:  used to transfer sensitive data  We can hide secrete message with graphic images.  Provides high security 8/3/2016 jaya 23
  • 24. STEGANOGRAPHY  Disadvantages of Steganography:  It requires lot of overhead to hide a relatively few bits of information  Once the system is discovered, it becomes virtually worthless. 8/3/2016 jaya 24
  • 25. STEGANOGRAPHY  Applications of Steganography:  Digital watermarking  Used in conjunction with encryption for extra security. 8/3/2016 jaya 25
  • 26. CRYPTOGRAPHY  Symmetric cipher /secrete key cryptography  Sender and recipient share a same key for encryption and decryption  The encryption algorithm is divided into two types  Block Cipher  Stream Cipher 8/3/2016 jaya 26
  • 27. CRYPTOGRAPHY  Advantages of Symmetric cipher /secrete key cryptography  It is faster  While transmission the chances of data being decrypted is null  Uses password authentication to prove the receivers identity 8/3/2016 jaya 27
  • 28. CRYPTOGRAPHY  Disadvantages of Symmetric cipher /secrete key cryptography  Issue of key transportation  It cannot provide digital signature that cannot be repudiated. 8/3/2016 jaya 28
  • 29. CRYPTOGRAPHY  Asymmetric cipher /secrete key cryptography  A pair of key is used to encrypt and decrypt.  With asymmetric cryptography, the sender encrypts data with one key, and the recipient uses a different key to decrypt cipher text.  Encrypt data using public key and decrypt data using private key. 8/3/2016 jaya 29
  • 30. CRYPTOGRAPHY  Advantages Asymmetric cipher /secrete key cryptography  Eliminating the key distribution problem  Increased security  It can provide digital signatures that can be repudiated.  Advantages Asymmetric cipher /secrete key cryptography  Faster methods are available. 8/3/2016 jaya 30
  • 31. DIGITAL SIGNATURE  A digital signature is an electronic signature that can be used to authenticate the identity of the sender of a message.  It is a mathematical scheme for demonstrating the authenticity of a digital message or document.  Each signatory has their own paired public and private key 8/3/2016 jaya 31
  • 32. DIGITAL SIGNATURE  It consists three algorithms:  A digital signature generation algorithm:  It consists of a (mathematical) digital signature generation algorithm  Randomly produces a key pair( public and private)  A signing algorithm:  Produces a signature  A digital signature verification algorithm  It consists of a verification algorithm, along with a method for recovering data from the message. 8/3/2016 jaya 32
  • 33. DIGITAL SIGNATURE Message Message digest Hash function Digital Signature Senders private key Concept of digital signature 8/3/2016 jaya 33
  • 34. DIGITAL SIGNATURE  Working of digital signature 8/3/2016 jaya 34
  • 35. DIGITAL SIGNATURE  Advantages of Digital Signature  Imposter prevention  Message integrity  Legal requirement  Disadvantages of Digital Signature:  Digital signature involves the primary avenue for any business is money 8/3/2016 jaya 35
  • 36. Authentication Protocols  Kerberos:  Developed by MIT( massachusetts Institute of Technology)  It is a computer network authentication protocol works on tickets.  Designed for c-s network  Mutual authentication  Builds on symmetric key cryptography  Requires a trusted third party  Protected against eavesdropping and replay attacks  Provides secure authentication for unix 8/3/2016 jaya 36
  • 37. Authentication Protocols  SSL(secure sockets layers)  Establishes an encrypted link between a server and a client .  Uses combination of symmetric and asymmetric encryption  Supported by web servers and web browsers  Operates at lower layer  Based on digital certification  Allows sensitive information to be transmitted securely 8/3/2016 jaya 37
  • 38. Authentication Protocols  Microsoft NTLM( NT Lan Manager)  Used by windows NT server to authenticate clients to an NT domain  It is a challenge-Response authentication protocol uses three messages to authenticate a client  Users credentials do not get transferred across the nw when resources are accessed, which increases security . client server NEGOTIATE_MESSAGE CHALLENGE_MESSAGE AUTHENTICATE_MESSAGE 8/3/2016 jaya 38
  • 39. Authentication Protocols  PAP(Password Authentication Protocol)  Two way handshake protocol designed for PPP  Authenticate a user over a remote access control  It sends user passwords across the nw to the authenticating server in plain text.  Poses a significant security risk.  Advantage is it is compatible with many server types running in different OS. 8/3/2016 jaya 39
  • 40. Authentication Protocols  SPAP(Shiva Password Authentication Protocol)  Used by shiva remote access server  It is an improvement over PAP in terms of the security level  Client sends encrypted password to remote server and server decrypts the password  Based on login info server sends ACK or NACK.  Advantage is it is compatible with many server types running in different OS. 8/3/2016 jaya 40
  • 41. Authentication Protocols  CHAP(Challenge Handshake Authentication Protocol)  Used for remote access security  It is an internet standard uses MD5  Password does not go across the nw and can’t be captured  No reverse engineering.  Vulnerable to remote server impersonation. 8/3/2016 jaya 41
  • 42. Authentication Protocols  MCHAP(Microsoft version of CHAP)  Uses 2-way authentication to verify identity of client and server  Protects against impersonation  Uses separate cryptographic keys for transmitted and received data 8/3/2016 jaya 42
  • 43. Authentication Protocols  EAP(Extensible authentication protocol )  used to determine what authentication protocol will be used  Used in wireless nw and PPP  Used in devices such as smart card readers and finger print readers.  S/KEY  One time password system developed for UNIX  OTP allows to logon only once  List of password is given and maintained by hardware device. 8/3/2016 jaya 43
  • 44. Authentication Protocols  RADIUS( Remote Authentication Dial-In User service Protocol)  Client server protocol  Provides centralized authentication, authorization and accounting management for network users  TACACS( Terminal Access Controller Access Control System)  Older authentication protocol used in UNIX  Client pass login information to server to gain access  Encryption protocol so less expensive 8/3/2016 jaya 44