Pertemuan 4 information hiding (cryptography)

N
NETWORK SECURITY
Jupriyadi, S.Kom. M.T.
jupriyadi@teknokrat.ac.id
Bandarlampung, Maret 2020
https://spada.teknokrat.ac.id
Chapter 4
• To be understand the basic concepts of cryptography
• The student will be able hide the message using cryptography
techniques
Steganography is the art and science of writing hidden
messages in such a way that no-one apart from the sender and
intended recipient even realizes there is a hidden message, a
form of security through obscurity
Cryptography
Symmetric
Key
Cryptography
Symmetric
Key
Cryptography
Hash
Function
Cryptography is the study of secure communications
techniques that allow only the sender and intended recipient of
a message to view its contents. The term is derived from the
Greek word kryptos, which means hidden. It is closely
associated to encryption, which is the act of scrambling
ordinary text into what's known as ciphertext and then back
again upon arrival
Cryptography is the science of using mathematics to encrypt
and decrypt data (Phil Zimmermann)
Cryptography is the art and science of keeping messages
secure (Bruce Schneier)
Basic Terminologies
A message is plaintext (sometimes called cleartext). The process of
disguising a message in such a way as to hide its substance is encryption.
An encrypted message is ciphertext. The process of turning ciphertext
back into plaintext is decryption.
A cipher (or cypher) is an algorithm for performing encryption or
decryption
Basic Terminologies (Cont’d)
A cryptosystem is an implementation of cryptographic techniques and
their accompanying infrastructure to provide information security
services. A cryptosystem is also referred to as a cipher system. The
various components of a basic cryptosystem are as follows −
 Plaintext
 Encryption Algorithm
 Ciphertext
 Decryption Algorithm
 Encryption Key
 Decryption Key
Basic Terminologies (Cont’d)
While cryptography is the science of securing data, cryptanalysis
is the science of analyzing and breaking secure communication.
Classical cryptanalysis involves an interesting combination of
analytical reasoning, application of mathematical tools, pattern
finding, patience, determination, and luck. Cryptanalysts are also
called attackers.
Cryptology embraces both cryptography and cryptanalysis.
Classical Cryptography
Hieroglyph
The first known evidence of cryptography can be traced to the use of
‘hieroglyph’. Some 4000 years ago, the Egyptians used to
communicate by messages written in hieroglyph.
Classical Cryptography (Cont’d)
Caesar Shift Cipher
Caesar Shift Cipher, relies on shifting the letters of a message by
an agreed number (three was a common choice), the recipient of
this message would then shift the letters back by the same
number and obtain the original message.
The Caesar cipher is named after Julius Caesar ,
who used it with a shift of three to protect
messages of military significance.
Caesar Shift Cipher
Caesar Shift Cipher Key = 3
PLAINTEXT : internet society ghana chapter
CYPHERTEXT : lqwhuqhw vrflhwb jkdqd fkdswhu
Goal and Service Cryptography
Goal: The primary goal of cryptography is to secure important data
on the hard disk or as it passes through a medium that may not be
secure itself. Usually, that medium is a computer network.
Services: Cryptography can provide the following services:
 Confidentiality (secrecy)
 Integrity (anti-tampering)
 Authentication
 Non-repudiation.
Service Cryptography
Confidentiality (secrecy)
 Ensuring that no one can read the message except the intended
receiver
 Data is kept secret from those without the proper credentials, even
if that data travels through an insecure medium
Integrity (anti-tampering)
 Assuring the receiver that the received message has not
been altered in any way from the original.
Service Cryptography
Authentication
 Cryptography can help establish identity for authentication
purposes. The process of proving one's identity. (The primary
forms of host-to-host authentication on the Internet today are
name-based or address-based, both of which are notoriously
weak.)
Non-repudiation
 A mechanism to prove that the sender
really sent this message
Types of Cryptography
 Symmetric Key Cryptography
 Asymmetric Key Cryptography
 Hash Functions
Symmetric Key Cryptography
Also known as Secret Key Cryptography or Conventional
Cryptography, Symmetric Key Cryptography is an encryption system
in which the sender and receiver of a message share a single,
common key that is used to encrypt and decrypt the message.
The Algorithm use is also known as a secret key algorithm or
sometimes called a symmetric algorithm
A key is a piece of information (a parameter)
that determines the functional output of a
cryptographic algorithm or cipher.
The key for encrypting and decrypting the file had to be known to all the recipients. Else,
the message could not be decrypted by conventional means.
Symmetric Key Cryptography - Examples
 Permutation Cipher
 substitution cipher,
 Hill Cipher,
 Rijndael (AES),
 Blowfish,
 DES
 3DES
 IDEA
 etc ....
Problem Symmetric Key Cryptography
Key Management
Symmetric-key systems are simpler and faster; their main drawback
is that the two parties must somehow exchange the key in a secure
way and keep it secure after that.
Key Management caused nightmare for the parties using the
symmetric key cryptography. They were worried about how to get the
keys safely and securely across to all users so that the decryption of
the message would be possible. This gave the chance for third
parties to intercept the keys in transit to decode the top-secret
messages. Thus, if the key was compromised, the entire coding
system was compromised and a “Secret” would no longer remain a
“Secret”.
This is why the “Public Key Cryptography” came into existence.
Asymmetric Key Cryptography
Asymmetric cryptography , also known as Public-key cryptography,
refers to a cryptographic algorithm which requires two separate keys,
one of which is private and one of which is public. The public key is
used to encrypt the message and the private one is used to decrypt
the message.
Asymmetric Key Cryptography (cont’d)
Asymmetric Key Cryptography - Examples
 Digital Signature Standard (DSS)
 Rivest, Shamir and Adleman (RSA)
 ElGamal
 Elliptic Curve cryptography
 etc ...
HASH Function
A cryptographic hash function is a
hash function that takes an arbitrary
block of data and returns a fixed-size
bit string, the cryptographic hash
value, such that any (accidental or
intentional) change to the data will
(with very high probability) change the
hash value.
The data to be encoded are often
called the message, and the hash
value is sometimes called the
message digest or simply digest.
What is a HASH Function
The ideal cryptographic hash function has four main properties:
 it is easy to compute the hash value for any given message
 it is infeasible to generate a message that has a given hash
 it is infeasible to modify a message without changing the hash
 it is infeasible to find two different messages with the same hash.
HASH Function Algorithm - Examples
 Message Digest (MD)
 MD2, MD4, MD5, MD6
 Secure Hash Function (SHA)
 SHA-0, SHA-1, SHA-2, and SHA-3
 RACE Integrity Primitives Evaluation Message Digest (RIPEMD)
 RIPEMD-128, and RIPEMD-160. There also exist 256, and 320-bit versions
of this algorithm.
HASH Function Algorithm - Examples
 Message Digest (MD)
 MD2, MD4, MD5, MD6
 Secure Hash Function (SHA)
 SHA-0, SHA-1, SHA-2, and SHA-3
 RACE Integrity Primitives Evaluation
Message Digest (RIPEMD)
 RIPEMD-128, and RIPEMD-160. There
also exist 256, and 320-bit versions of
this algorithm.
Applications of Hash Functions
 Password Storage
 Hash functions provide protection to password storage.
 Instead of storing password in clear, mostly all logon
processes store the hash values of passwords in the file.
 The Password file consists of a table of pairs which are in the
form (user id, h(P))
 Data Integrity Check
 Data integrity check is a most common application of the
hash functions. It is used to generate the checksums on data
files. This application provides assurance to the user about
correctness of the data.
Applications of Hash Functions - Examples
Checking
$ md5sum file1.dat
MD5 Sum = a4c0d35c95a63a805915367dcfe6b751
$ md5sum file2.dat
MD5 Sum = a4c0d35c95a63a805915367dcfe6b751
$ sha512sum Yellow.jpg
SHA256 Sum =
ee9d1963eb1481f6a8e9c80aa02d33772aa40fbfd9797df4f5333
a7a90bb902b5c143be3db9c1c7b2800274b163515af9315f40b4
d10e3cfce023c885d784e4d
What's Next ?
30
1 von 30

Recomendados

Cryptography Fundamentals von
Cryptography FundamentalsCryptography Fundamentals
Cryptography FundamentalsDuy Do Phan
2.4K views32 Folien
Overview of cryptography von
Overview of cryptographyOverview of cryptography
Overview of cryptographyRoshan Chaudhary
1.1K views17 Folien
Applied Cryptography von
Applied CryptographyApplied Cryptography
Applied CryptographyMarcelo Martins
1.4K views167 Folien
Cryptography full report von
Cryptography full reportCryptography full report
Cryptography full reportharpoo123143
16.9K views9 Folien
Seminar report on symmetric key von
Seminar report on symmetric keySeminar report on symmetric key
Seminar report on symmetric keyRajat Tripathi
498 views10 Folien

Más contenido relacionado

Was ist angesagt?

Cryptography on cloud von
Cryptography on cloudCryptography on cloud
Cryptography on cloudkrprashant94
4K views12 Folien
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHM von
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHMPROJECT REPORT ON CRYPTOGRAPHIC ALGORITHM
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHMsaniacorreya
3.1K views24 Folien
Cryptography von
CryptographyCryptography
CryptographyVicky Kamboj
4.4K views20 Folien
Topic1 substitution transposition-techniques von
Topic1 substitution transposition-techniquesTopic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesMdFazleRabbi18
1.4K views13 Folien
Computer Security (Cryptography) Ch01 von
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Saif Kassim
493 views13 Folien
Cryptography von
CryptographyCryptography
Cryptographyjayashri kolekar
13.6K views44 Folien

Was ist angesagt?(20)

PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHM von saniacorreya
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHMPROJECT REPORT ON CRYPTOGRAPHIC ALGORITHM
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHM
saniacorreya3.1K views
Topic1 substitution transposition-techniques von MdFazleRabbi18
Topic1 substitution transposition-techniquesTopic1 substitution transposition-techniques
Topic1 substitution transposition-techniques
MdFazleRabbi181.4K views
Computer Security (Cryptography) Ch01 von Saif Kassim
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01
Saif Kassim493 views
6. cryptography von 7wounders
6. cryptography6. cryptography
6. cryptography
7wounders5.6K views
Evolution of Cryptography and Cryptographic techniques von Mona Rajput
Evolution of Cryptography and Cryptographic techniquesEvolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniques
Mona Rajput179 views
A Study of Different Partitioning Clustering Technique von ijsrd.com
A Study of Different Partitioning Clustering TechniqueA Study of Different Partitioning Clustering Technique
A Study of Different Partitioning Clustering Technique
ijsrd.com184 views
Cryptography-Known plain text attack von amiteshg
Cryptography-Known plain text attack Cryptography-Known plain text attack
Cryptography-Known plain text attack
amiteshg5K views
Cryptography.ppt von kusum sharma
Cryptography.pptCryptography.ppt
Cryptography.ppt
kusum sharma203.5K views
Encryption And Decryption von NA
Encryption And DecryptionEncryption And Decryption
Encryption And Decryption
NA25.3K views
Encryption presentation final von adrigee12
Encryption presentation finalEncryption presentation final
Encryption presentation final
adrigee1234.2K views

Similar a Pertemuan 4 information hiding (cryptography)

Pertemuan 4 information hiding (cryptography) von
Pertemuan 4 information hiding (cryptography)Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)newbie2019
1.2K views29 Folien
Fundamentals of cryptography von
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptographyHossain Md Shakhawat
8.4K views53 Folien
Cryptography by Durlab Kumbhakar von
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarDurlove Kumbhakar
132 views17 Folien
Overview Of Cryptography von
Overview Of CryptographyOverview Of Cryptography
Overview Of CryptographyManjarul Hoque
56 views19 Folien
White Paper on Cryptography von
White Paper on Cryptography White Paper on Cryptography
White Paper on Cryptography Durgesh Malviya
2.1K views7 Folien
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC von
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHICA NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHICijsrd.com
646 views5 Folien

Similar a Pertemuan 4 information hiding (cryptography)(20)

Pertemuan 4 information hiding (cryptography) von newbie2019
Pertemuan 4 information hiding (cryptography)Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)
newbie20191.2K views
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC von ijsrd.com
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHICA NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
ijsrd.com646 views
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY von IJNSA Journal
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEYMETHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY
IJNSA Journal24 views
Cryptography von Jasim Jas
CryptographyCryptography
Cryptography
Jasim Jas4.1K views
cryptography and network security von nitishV3
cryptography and network security cryptography and network security
cryptography and network security
nitishV324 views
Introduction to Cryptography von Seema Goel
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
Seema Goel1.7K views
Introduction To PKI Technology von Sylvain Maret
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI Technology
Sylvain Maret5.4K views
Cryptography von prasham95
CryptographyCryptography
Cryptography
prasham952.1K views
Paper id 27201444 von IJRAT
Paper id 27201444Paper id 27201444
Paper id 27201444
IJRAT278 views
Basic Cryptography unit 4 CSS von SURBHI SAROHA
Basic Cryptography unit 4 CSSBasic Cryptography unit 4 CSS
Basic Cryptography unit 4 CSS
SURBHI SAROHA439 views

Más de newbie2019

Digital forensic principles and procedure von
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedurenewbie2019
450 views16 Folien
Fundamental digital forensik von
Fundamental digital forensikFundamental digital forensik
Fundamental digital forensiknewbie2019
201 views20 Folien
Pendahuluan it forensik von
Pendahuluan it forensikPendahuluan it forensik
Pendahuluan it forensiknewbie2019
41 views16 Folien
Chapter 15 incident handling von
Chapter 15 incident handlingChapter 15 incident handling
Chapter 15 incident handlingnewbie2019
376 views62 Folien
Chapter 14 sql injection von
Chapter 14 sql injectionChapter 14 sql injection
Chapter 14 sql injectionnewbie2019
320 views39 Folien
Chapter 13 web security von
Chapter 13 web securityChapter 13 web security
Chapter 13 web securitynewbie2019
264 views36 Folien

Más de newbie2019(20)

Digital forensic principles and procedure von newbie2019
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedure
newbie2019450 views
Fundamental digital forensik von newbie2019
Fundamental digital forensikFundamental digital forensik
Fundamental digital forensik
newbie2019201 views
Pendahuluan it forensik von newbie2019
Pendahuluan it forensikPendahuluan it forensik
Pendahuluan it forensik
newbie201941 views
Chapter 15 incident handling von newbie2019
Chapter 15 incident handlingChapter 15 incident handling
Chapter 15 incident handling
newbie2019376 views
Chapter 14 sql injection von newbie2019
Chapter 14 sql injectionChapter 14 sql injection
Chapter 14 sql injection
newbie2019320 views
Chapter 13 web security von newbie2019
Chapter 13 web securityChapter 13 web security
Chapter 13 web security
newbie2019264 views
NIST Framework for Information System von newbie2019
NIST Framework for Information SystemNIST Framework for Information System
NIST Framework for Information System
newbie2019363 views
Nist.sp.800 37r2 von newbie2019
Nist.sp.800 37r2Nist.sp.800 37r2
Nist.sp.800 37r2
newbie2019475 views
Iso iec 27000_2018 von newbie2019
Iso iec 27000_2018Iso iec 27000_2018
Iso iec 27000_2018
newbie2019265 views
Chapter 12 iso 27001 awareness von newbie2019
Chapter 12 iso 27001 awarenessChapter 12 iso 27001 awareness
Chapter 12 iso 27001 awareness
newbie2019282 views
Chapter 10 security standart von newbie2019
Chapter 10 security standartChapter 10 security standart
Chapter 10 security standart
newbie2019394 views
Chapter 8 cryptography lanjutan von newbie2019
Chapter 8 cryptography lanjutanChapter 8 cryptography lanjutan
Chapter 8 cryptography lanjutan
newbie2019378 views
Pertemuan 7 cryptography von newbie2019
Pertemuan 7  cryptographyPertemuan 7  cryptography
Pertemuan 7 cryptography
newbie2019411 views
Chapter 6 information hiding (steganography) von newbie2019
Chapter 6 information hiding (steganography)Chapter 6 information hiding (steganography)
Chapter 6 information hiding (steganography)
newbie2019261 views
Vulnerability threat and attack von newbie2019
Vulnerability threat and attackVulnerability threat and attack
Vulnerability threat and attack
newbie2019338 views
Chapter 4 vulnerability threat and attack von newbie2019
Chapter 4 vulnerability threat and attack Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack
newbie2019444 views
Chapter 3 security principals von newbie2019
Chapter 3 security principalsChapter 3 security principals
Chapter 3 security principals
newbie2019365 views
Chapter 2 konsep dasar keamanan von newbie2019
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
newbie2019477 views
Fundamentals of information systems security ( pdf drive ) chapter 1 von newbie2019
Fundamentals of information systems security ( pdf drive ) chapter 1Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1
newbie20191.1K views

Último

REPRESENTATION - GAUNTLET.pptx von
REPRESENTATION - GAUNTLET.pptxREPRESENTATION - GAUNTLET.pptx
REPRESENTATION - GAUNTLET.pptxiammrhaywood
100 views26 Folien
Class 10 English lesson plans von
Class 10 English  lesson plansClass 10 English  lesson plans
Class 10 English lesson plansTARIQ KHAN
288 views53 Folien
Google solution challenge..pptx von
Google solution challenge..pptxGoogle solution challenge..pptx
Google solution challenge..pptxChitreshGyanani1
131 views18 Folien
Computer Introduction-Lecture06 von
Computer Introduction-Lecture06Computer Introduction-Lecture06
Computer Introduction-Lecture06Dr. Mazin Mohamed alkathiri
89 views12 Folien
The Accursed House by Émile Gaboriau von
The Accursed House  by Émile GaboriauThe Accursed House  by Émile Gaboriau
The Accursed House by Émile GaboriauDivyaSheta
201 views15 Folien
EIT-Digital_Spohrer_AI_Intro 20231128 v1.pptx von
EIT-Digital_Spohrer_AI_Intro 20231128 v1.pptxEIT-Digital_Spohrer_AI_Intro 20231128 v1.pptx
EIT-Digital_Spohrer_AI_Intro 20231128 v1.pptxISSIP
369 views50 Folien

Último(20)

REPRESENTATION - GAUNTLET.pptx von iammrhaywood
REPRESENTATION - GAUNTLET.pptxREPRESENTATION - GAUNTLET.pptx
REPRESENTATION - GAUNTLET.pptx
iammrhaywood100 views
Class 10 English lesson plans von TARIQ KHAN
Class 10 English  lesson plansClass 10 English  lesson plans
Class 10 English lesson plans
TARIQ KHAN288 views
The Accursed House by Émile Gaboriau von DivyaSheta
The Accursed House  by Émile GaboriauThe Accursed House  by Émile Gaboriau
The Accursed House by Émile Gaboriau
DivyaSheta201 views
EIT-Digital_Spohrer_AI_Intro 20231128 v1.pptx von ISSIP
EIT-Digital_Spohrer_AI_Intro 20231128 v1.pptxEIT-Digital_Spohrer_AI_Intro 20231128 v1.pptx
EIT-Digital_Spohrer_AI_Intro 20231128 v1.pptx
ISSIP369 views
Drama KS5 Breakdown von WestHatch
Drama KS5 BreakdownDrama KS5 Breakdown
Drama KS5 Breakdown
WestHatch79 views
Create a Structure in VBNet.pptx von Breach_P
Create a Structure in VBNet.pptxCreate a Structure in VBNet.pptx
Create a Structure in VBNet.pptx
Breach_P75 views
Ch. 7 Political Participation and Elections.pptx von Rommel Regala
Ch. 7 Political Participation and Elections.pptxCh. 7 Political Participation and Elections.pptx
Ch. 7 Political Participation and Elections.pptx
Rommel Regala97 views
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively von PECB
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
PECB 585 views
Education and Diversity.pptx von DrHafizKosar
Education and Diversity.pptxEducation and Diversity.pptx
Education and Diversity.pptx
DrHafizKosar173 views
JiscOAWeek_LAIR_slides_October2023.pptx von Jisc
JiscOAWeek_LAIR_slides_October2023.pptxJiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptx
Jisc96 views
Structure and Functions of Cell.pdf von Nithya Murugan
Structure and Functions of Cell.pdfStructure and Functions of Cell.pdf
Structure and Functions of Cell.pdf
Nithya Murugan545 views
AI Tools for Business and Startups von Svetlin Nakov
AI Tools for Business and StartupsAI Tools for Business and Startups
AI Tools for Business and Startups
Svetlin Nakov107 views

Pertemuan 4 information hiding (cryptography)

  • 1. NETWORK SECURITY Jupriyadi, S.Kom. M.T. jupriyadi@teknokrat.ac.id Bandarlampung, Maret 2020 https://spada.teknokrat.ac.id Chapter 4
  • 2. • To be understand the basic concepts of cryptography • The student will be able hide the message using cryptography techniques
  • 3. Steganography is the art and science of writing hidden messages in such a way that no-one apart from the sender and intended recipient even realizes there is a hidden message, a form of security through obscurity
  • 5. Cryptography is the study of secure communications techniques that allow only the sender and intended recipient of a message to view its contents. The term is derived from the Greek word kryptos, which means hidden. It is closely associated to encryption, which is the act of scrambling ordinary text into what's known as ciphertext and then back again upon arrival
  • 6. Cryptography is the science of using mathematics to encrypt and decrypt data (Phil Zimmermann) Cryptography is the art and science of keeping messages secure (Bruce Schneier)
  • 7. Basic Terminologies A message is plaintext (sometimes called cleartext). The process of disguising a message in such a way as to hide its substance is encryption. An encrypted message is ciphertext. The process of turning ciphertext back into plaintext is decryption. A cipher (or cypher) is an algorithm for performing encryption or decryption
  • 8. Basic Terminologies (Cont’d) A cryptosystem is an implementation of cryptographic techniques and their accompanying infrastructure to provide information security services. A cryptosystem is also referred to as a cipher system. The various components of a basic cryptosystem are as follows −  Plaintext  Encryption Algorithm  Ciphertext  Decryption Algorithm  Encryption Key  Decryption Key
  • 9. Basic Terminologies (Cont’d) While cryptography is the science of securing data, cryptanalysis is the science of analyzing and breaking secure communication. Classical cryptanalysis involves an interesting combination of analytical reasoning, application of mathematical tools, pattern finding, patience, determination, and luck. Cryptanalysts are also called attackers. Cryptology embraces both cryptography and cryptanalysis.
  • 10. Classical Cryptography Hieroglyph The first known evidence of cryptography can be traced to the use of ‘hieroglyph’. Some 4000 years ago, the Egyptians used to communicate by messages written in hieroglyph.
  • 11. Classical Cryptography (Cont’d) Caesar Shift Cipher Caesar Shift Cipher, relies on shifting the letters of a message by an agreed number (three was a common choice), the recipient of this message would then shift the letters back by the same number and obtain the original message. The Caesar cipher is named after Julius Caesar , who used it with a shift of three to protect messages of military significance.
  • 12. Caesar Shift Cipher Caesar Shift Cipher Key = 3 PLAINTEXT : internet society ghana chapter CYPHERTEXT : lqwhuqhw vrflhwb jkdqd fkdswhu
  • 13. Goal and Service Cryptography Goal: The primary goal of cryptography is to secure important data on the hard disk or as it passes through a medium that may not be secure itself. Usually, that medium is a computer network. Services: Cryptography can provide the following services:  Confidentiality (secrecy)  Integrity (anti-tampering)  Authentication  Non-repudiation.
  • 14. Service Cryptography Confidentiality (secrecy)  Ensuring that no one can read the message except the intended receiver  Data is kept secret from those without the proper credentials, even if that data travels through an insecure medium Integrity (anti-tampering)  Assuring the receiver that the received message has not been altered in any way from the original.
  • 15. Service Cryptography Authentication  Cryptography can help establish identity for authentication purposes. The process of proving one's identity. (The primary forms of host-to-host authentication on the Internet today are name-based or address-based, both of which are notoriously weak.) Non-repudiation  A mechanism to prove that the sender really sent this message
  • 16. Types of Cryptography  Symmetric Key Cryptography  Asymmetric Key Cryptography  Hash Functions
  • 17. Symmetric Key Cryptography Also known as Secret Key Cryptography or Conventional Cryptography, Symmetric Key Cryptography is an encryption system in which the sender and receiver of a message share a single, common key that is used to encrypt and decrypt the message. The Algorithm use is also known as a secret key algorithm or sometimes called a symmetric algorithm A key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm or cipher. The key for encrypting and decrypting the file had to be known to all the recipients. Else, the message could not be decrypted by conventional means.
  • 18. Symmetric Key Cryptography - Examples  Permutation Cipher  substitution cipher,  Hill Cipher,  Rijndael (AES),  Blowfish,  DES  3DES  IDEA  etc ....
  • 19. Problem Symmetric Key Cryptography Key Management Symmetric-key systems are simpler and faster; their main drawback is that the two parties must somehow exchange the key in a secure way and keep it secure after that. Key Management caused nightmare for the parties using the symmetric key cryptography. They were worried about how to get the keys safely and securely across to all users so that the decryption of the message would be possible. This gave the chance for third parties to intercept the keys in transit to decode the top-secret messages. Thus, if the key was compromised, the entire coding system was compromised and a “Secret” would no longer remain a “Secret”. This is why the “Public Key Cryptography” came into existence.
  • 20. Asymmetric Key Cryptography Asymmetric cryptography , also known as Public-key cryptography, refers to a cryptographic algorithm which requires two separate keys, one of which is private and one of which is public. The public key is used to encrypt the message and the private one is used to decrypt the message.
  • 22. Asymmetric Key Cryptography - Examples  Digital Signature Standard (DSS)  Rivest, Shamir and Adleman (RSA)  ElGamal  Elliptic Curve cryptography  etc ...
  • 23. HASH Function A cryptographic hash function is a hash function that takes an arbitrary block of data and returns a fixed-size bit string, the cryptographic hash value, such that any (accidental or intentional) change to the data will (with very high probability) change the hash value. The data to be encoded are often called the message, and the hash value is sometimes called the message digest or simply digest.
  • 24. What is a HASH Function The ideal cryptographic hash function has four main properties:  it is easy to compute the hash value for any given message  it is infeasible to generate a message that has a given hash  it is infeasible to modify a message without changing the hash  it is infeasible to find two different messages with the same hash.
  • 25. HASH Function Algorithm - Examples  Message Digest (MD)  MD2, MD4, MD5, MD6  Secure Hash Function (SHA)  SHA-0, SHA-1, SHA-2, and SHA-3  RACE Integrity Primitives Evaluation Message Digest (RIPEMD)  RIPEMD-128, and RIPEMD-160. There also exist 256, and 320-bit versions of this algorithm.
  • 26. HASH Function Algorithm - Examples  Message Digest (MD)  MD2, MD4, MD5, MD6  Secure Hash Function (SHA)  SHA-0, SHA-1, SHA-2, and SHA-3  RACE Integrity Primitives Evaluation Message Digest (RIPEMD)  RIPEMD-128, and RIPEMD-160. There also exist 256, and 320-bit versions of this algorithm.
  • 27. Applications of Hash Functions  Password Storage  Hash functions provide protection to password storage.  Instead of storing password in clear, mostly all logon processes store the hash values of passwords in the file.  The Password file consists of a table of pairs which are in the form (user id, h(P))  Data Integrity Check  Data integrity check is a most common application of the hash functions. It is used to generate the checksums on data files. This application provides assurance to the user about correctness of the data.
  • 28. Applications of Hash Functions - Examples Checking $ md5sum file1.dat MD5 Sum = a4c0d35c95a63a805915367dcfe6b751 $ md5sum file2.dat MD5 Sum = a4c0d35c95a63a805915367dcfe6b751 $ sha512sum Yellow.jpg SHA256 Sum = ee9d1963eb1481f6a8e9c80aa02d33772aa40fbfd9797df4f5333 a7a90bb902b5c143be3db9c1c7b2800274b163515af9315f40b4 d10e3cfce023c885d784e4d
  • 30. 30