Cryptography The Art of Secret Writing: SRKR Engineering College Bhimavaram
Cryptography The Art of Secret Writing: SRKR Engineering College Bhimavaram
Cryptography The Art of Secret Writing: SRKR Engineering College Bhimavaram
PRESENTED BY:
Strong cryptography:
Cryptography can be strong or weak, as explained above.
Cryptographic strength is measured in the time and resources it would
require to recover the plaintext. The result of strong cryptography is
ciphertext that is very difficult to decipher without possession of the
appropriate decoding tool. How difficult? Given all of today’s computing
power and available time—even a billion computers doing a billion checks a
second—it is not possible to decipher the result of strong cryptography
before the end of the universe.
How does cryptography work?
A cryptographic algorithm, or cipher, is a mathematical function used
in the encryption and decryption process. A cryptographic algorithm works in
Combination with a key—a word, number, or phrase—to encrypt the
plaintext. The same plaintext encrypts to different ciphertext with different
keys. The security of encrypted data is entirely dependent on two things: the
strength of the cryptographic algorithm and the secrecy of the key.
A cryptographic algorithm, plus all possible keys and all the protocols
that make it work, comprise a cryptosystem. PGP is a cryptosystem.
Conventional cryptography:
In conventional cryptography, also called secret-key or symmetric-key
encryption, one key is used both for encryption and decryption. The Data
Encryption Standard (DES) is an example of a conventional cryptosystem
that is widely employed by the U.S. government.
Public key cryptography
The problems of key distribution are solved by public key
cryptography. Public key cryptography is an asymmetric scheme that uses a
pair of keys for encryption: a public key, which encrypts data, and a
corresponding private key (secret key) for decryption.
It is computationally infeasible to deduce the private key from the
public key. Anyone who has a public key can encrypt information but cannot
decrypt it.Only the person who has the corresponding private key can
decrypt the information.
The primary benefit of public key cryptography is that it allows people
who have no preexisting security arrangement to exchange messages
securely. The need for sender and receiver to share secret keys via some
secure channel is eliminated; all communications involve only public keys,
and no private key is ever transmitted or shared. Some examples of public-
key cryptosystems are Elgamal, RSA, Diffie-Hellman and DSA, the Digital
Signature Algorithm.
Keys:
A key is a value that works with a cryptographic algorithm to produce
a specific ciphertext. Keys are basically really, really, really big numbers. Key
size is measured in bits; the number representing a 2048-bit key is huge. In
public-key cryptography, the bigger the key, the more secure the ciphertext.
However, public key size and conventional cryptography’s secret key size are
totally unrelated. A conventional 80-bit key has the equivalent strength of a
1024-bit public key. A conventional 128-bit key is equivalent to a 3000-bit
public key. Again, the bigger the key, the more secure, but the algorithms
used for each type of cryptography are very different.
While the public and private keys are mathematically related, it’s very
difficult to derive the private key given only the public key; however, deriving
the private key is always possible given enough time and computing power.
This makes it very important to pick keys of the right size; large enough to
be secure, but small enough to be applied fairly quickly.
Digital signatures:
A major benefit of public key cryptography is that it provides a method
for employing digital signatures. Digital signatures let the recipient of
information verify the authenticity of the information’s origin, and also verify
that the information was not altered while in transit. Thus, public key digital
signatures provide authentication and data integrity. A digital signature also
provides non-repudiation, which means that it prevents the sender from
claiming that he or she did not actually send the information. These features
are every bit as fundamental to cryptography as privacy, if not more.
A digital signature serves the same purpose as a handwritten
signature. However, a handwritten signature is easy to counterfeit. A digital
signature is superior to a handwritten signature in that it is nearly impossible
to counterfeit, plus it attests to the contents of the information as well as to
the identity of the signer.
Some people tend to use signatures more than they use encryption.
Instead of encrypting information using someone else’s public key, you
encrypt it with your private key. If the information can be decrypted with
your public key, then it must have originated with you.
Hash functions:
The system described above has some problems. It is slow, and it
produces an enormous volume of data—at least double the size of the
original information. An improvement on the above scheme is the addition of
a one-way hash function in the process. A one-way hash function takes
variable-length input in this case, a message of any length, even thousands
or millions of bits—and produces a fixed-length output; say, 160 bits. The
hash function ensures that, if the information is changed in any way—even
by just one bit—an entirely different output value is produced.
PGP uses a cryptographically strong hash function on the plaintext the
user is signing. This generates a fixed-length data item known as a message
digest. Then PGP uses the digest and the private key to create the
“signature.” PGP transmits the signature and the plaintext together. Upon
receipt of the message, the recipient uses PGP to recompute the digest, thus
verifying the signature. PGP can encrypt the plaintext or not; signing
plaintext is useful if some of the recipients are not interested in or capable of
verifying the signature.
As long as a secure hash function is used, there is no way to take
someone’s signature from one document and attach it to another, or to alter
a signed message in any way. The slightest change to a signed document will
cause the digital signature verification process to fail. Digital signatures play
a major role in authenticating and validating the keys of other PGP users.
DATA REPRESENTATION:
Two basis are used:
• Vertical
• Diagonal
THE EXCHANGE:
• The Sequence of events:
- A generates random key and encoding basis.
- A sends the polarized photons to B.
- A announces the polarization for each bit.
- B generates random encoding basis.
- B measures photons with random basis.
- B announces which basis are the same as A’s.
• Finally, the matching bits are used as the key for a classical channel.
SEQUENTIAL VIEW:
A B
EAVESDROPPING:
• Photon emitters and detectors are far from perfect, causing a lot of
errors.
• Most protocols require a classical channel.
REFERENCES: