3. Formed from the Greek words kryptós, "hidden", and logos, "word".
4.
5.
6.
7. We need to define a way by which we can exchange these private keys in a secure manner between distant entities
8.
9.
10. Early Cryptography 500- 600 BC 486 BC: Greece 60 –50 BC: JuliusCaesar Substitution cipher Used by Hebrew Shift letters by X positions E.g. X = 3: A -> D, B -> E, C ->F, ..
11.
12.
13. modern Cryptography 1976: Diffie-Hellman Key Exchange Private key: This key must be know only by its owner. Public key: This key is known to everyone
33. To prove future ownership, stored hash is decoded using the owner’s public key and that hash is compared with a current hash of the document.
34. If the two hashes agree, the document belongs to the owner.Digital Signature
35. Digital signature Symmetric key signature Shray Sir Sumit A, KA ( B, RA, t, P) KB ( a, RA, t, P, Ksir( A,t, P)) Public key signature SHRAY’s COMPUTER SUMIT’s COMPUTER Shray’spvt key DA Sumit’s public key EB Sumit’spvt key DB Shray’s public key EA P P DA(P) DA(P) EB(DA(P))