0% found this document useful (0 votes)
23 views28 pages

Third Lecture - Modern Cryptography

Uploaded by

bakrcyber
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views28 pages

Third Lecture - Modern Cryptography

Uploaded by

bakrcyber
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 28

CRYPTOGRAPHY 1

Third Lecture –
Modern Cryptography
Assistant Professor Dr.
Sufyan Salim Mahmood
2024 - 2025
Dr. Sufyan Aldabbagh
2024- 2025

Introduction

➢ The most common method for


securing data transmissions in
web applications or computer
science projects is modern
Cryptography.
➢ It is like a secret code language
that helps to keep information
safe.
Dr. Sufyan Aldabbagh
2024- 2025

Cryptography Algorithms

➢ Cryptographic algorithms are classified in


various respects. For the basis of the current
review, the keys used for encryption and
decryption will be classified :
➢ Symmetric cryptography
➢ Asymmetric cryptography
Dr. Sufyan Aldabbagh
2024- 2025

Symmetric Cryptography

Symmetrical encryption allows the content


of material to be encrypted where the
recipient and sender both use the same
secret key.
Dr. Sufyan Aldabbagh
2024- 2025

Symmetric cryptography

This type of algorithms uses the same key


for encryption and decryption process.
The sender has a specific key to encrypt
the plain-text and the receiver relates the
same key to decrypt the message.
This key must save secretly
Dr. Sufyan Aldabbagh
2024- 2025

Symmetric cryptography

A symmetric key encryption scheme


ensures confidentiality when two sides
communicate, sending and receiving.
They meet on a specific key to establish a
safe communication.
Encrypted of a plain-text is performed by
the sender to compute ciphertext that is
sent to the receiver.
Dr. Sufyan Aldabbagh
2024- 2025

Symmetric cryptography

By using the symmetric key encryption,


each pair of the users who need to
exchange the data must have two
instances of the identical key.
Dr. Sufyan Aldabbagh
2024- 2025

Symmetric cryptography

If 10 people expect the symmetrical keys


to be used to interact safely, 45 keys
should be kept informed.
Then, there will be 4,950 keys if 100
persons are to interact.
Dr. Sufyan Aldabbagh
2024- 2025

Symmetric cryptography

In order to verify the number of the


symmetric keys required, the
mathematical statement is n (n–1)/2.
The safeguard key is the basis for the
symmetrical encryption technique
Dr. Sufyan Aldabbagh
2024- 2025

Symmetric cryptography

Stream and block ciphers can be


classified as the main parts of the
symmetric algorithms.
Stream ciphers encode one bit of plain-
text at a moment. Block ciphers encrypt
amount of bits in one piece(such as 64
bit).
Dr. Sufyan Aldabbagh
2024- 2025

Symmetric cryptography

The symmetrical encoding algorithms


Blowfish, AES, DES, RC5, and RC6 are
popular examples
Dr. Sufyan Aldabbagh
2024- 2025

Symmetric cryptography

➢ Symmetric encryption provides several benefits,


including:

• Security: Symmetric encryption provides strong


security for data, as the same key is used for both
encryption and decryption.

• This makes it difficult for unauthorised users to access


the data.
Dr. Sufyan Aldabbagh
2024- 2025

Symmetric cryptography

• Speed: Symmetric encryption is


generally faster than other types of
encryption, as the same key is used for
both encryption and decryption. This
makes it a good choice for applications
that require fast data encryption and
decryption.
Dr. Sufyan Aldabbagh
2024- 2025

Symmetric cryptography

• Efficiency: Symmetric encryption


requires less processing power and
resources to encrypt and decrypt data,
which can save time and money.
Dr. Sufyan Aldabbagh
2024- 2025

Symmetric cryptography

• Simplicity: Symmetric encryption is easy


to implement and use, as it only requires
a single key for both encryption and
decryption.
• This makes it a popular choice for
applications that require simple and
straightforward encryption.
Dr. Sufyan Aldabbagh
2024- 2025

Symmetric cryptography

• Compatibility: Symmetric encryption is


widely used and supported by most
software and hardware platforms, making it
compatible with a wide range of systems
and devices.
• This means that it can be easily integrated
into existing applications and systems
without requiring major modifications.
Dr. Sufyan Aldabbagh
2024- 2025

Symmetric cryptography

• However, the downside of symmetric


encryption is that it can be less secure
than asymmetric encryption. If the key
falls into the wrong hands, the data can
be compromised.
• Therefore, it is important to ensure that
the key is kept secure and only shared
with authorised users.
Dr. Sufyan Aldabbagh
2024- 2025

Asymmetric cryptography

Asymmetric-key cryptography is also


called Public key cryptography. It is
the cryptographic algorithm which
uses pairs keys.
The keys are known as public and
private keys. Public key is used to
encrypt the data and private key is
used to decrypt the data.
Dr. Sufyan Aldabbagh
2024- 2025

Asymmetric cryptography

Both the key pairs are generated


using cryptographic algorithms.
The security of public key
cryptography depends on keeping
the private key secret and the public
key can be shared and distributed
publicly.
Dr. Sufyan Aldabbagh
2024- 2025

Asymmetric cryptography

When someone wants to send an


encrypted message, they pull the intended
recipient's public key from a public
directory and use it to encrypt the
message before sending it. The recipient
of the message can decrypt the message
using their related private key.
Dr. Sufyan Aldabbagh
2024- 2025

Asymmetric cryptography

Examples of these algorithms include


➢ RSA
➢ Diffie-Hellman
➢ Elliptic Curve Cryptography (ECC)
Dr. Sufyan Aldabbagh
2024- 2025

Asymmetric cryptography

Many protocols rely on asymmetric


cryptography including
➢ Transport Layer Security (TLS)
➢ Secure Sockets Layer (SSL)
Dr. Sufyan Aldabbagh
2024- 2025

Asymmetric cryptography

Number of required keys is 2N


Dr. Sufyan Aldabbagh
2024- 2025

Asymmetric cryptography

➢ Asymmetric encryption offers several benefits


over other encryption techniques, including:
• Security: Asymmetric encryption provides
strong security for data, as the private key
used for decryption is kept secret and not
shared with anyone.
• This makes it difficult for unauthorized users
to access the data encrypted with asymmetric
keys.
Dr. Sufyan Aldabbagh
2024- 2025

Asymmetric cryptography

• Authentication: Asymmetric encryption


can also be used for authentication, as
the public key can be used to verify the
identity of the sender of the message,
and only the corresponding private key
can decrypt it.
• This helps to prevent fraud and protect
against malicious attacks.
Dr. Sufyan Aldabbagh
2024- 2025

Asymmetric cryptography

• Key distribution: Asymmetric encryption


eliminates the need for a secure channel
to distribute keys, as each user has a
unique public-private key pair, and only
the private key can decrypt messages
encrypted with the public key.
• This makes it easier to distribute keys
and manage access to encrypted data.
Dr. Sufyan Aldabbagh
2024- 2025

Asymmetric cryptography

• Non-repudiation: Asymmetric encryption


provides non-repudiation, meaning that
the sender of a message cannot deny
having sent it, as the message can be
traced back to their unique private key,
and only the intended recipient’s public
key can decrypt it.
Dr. Sufyan Aldabbagh
2024- 2025

Asymmetric cryptography

• However, the downside of Asymmetric


encryption is that it is slower and more
complex to implement than symmetric
encryption.

You might also like