Cryptography
Cryptography
Cryptography
If you say “I don’t care!!!” for security, you may have to pay big
Security
Two Types:
1. System security
2. Communication security
Applications of Cryptography
What is cryptography?
What is steganography?
Historical evidences show that even Julius and Ceaser have used
the cryptographic techniques for the meetings.
Key: The code used for converting plain to cipher text and back
again
Encryption 2 types:
What is the time in 12 hour format for 13:30 Hrs –1:30 How do
you got it ??? you subtracted 12 from the 24 Hr format. This is
called wrap around.
5 mod 10 is 5
20 mod 10 is 0
13 mod 10 is 3
Digits 0 1 2 3 4 5 6 7 8 9
Key= 3 4 5 6 7 8 9 10 1 2
3 mod 10 (wrap
=3 around)
8+3=11
11-
10=1
In the encoded text, any number is encrypted with the plain text
+ key
Other algorithms
4. Elliptic curve
5. SHA
6. Diffie-Hellman
Digits 0 1 2 3 4 5 6 7 8 9
Round1 1 2 3 4 5 6 7 8 9 0
Round2 2 3 4 5 6 7 8 9 0 1
Round3 3 4 5 6 7 8 9 10 1 2
Round4 4 5 6 7 8 9 0 1 2 3
For the same number: 1828
Encryption:
1 is at position 0 in round1 - 0
8 is at position 6 in round2 -6
2 is at position 9 in round3 – 9
8 is at position 4 in round4 – 4
Decryption
Prime Numbers:
Problem to solve