0% found this document useful (0 votes)
43 views11 pages

Maths Cryptography Board Practical Maths CBSE

Cryptography is the practice of securing information through various techniques, ensuring that only intended recipients can access it. It encompasses methods such as symmetric key cryptography, hash functions, and asymmetric key cryptography, each serving specific purposes in data protection. Applications of cryptography include secure web browsing, digital currencies, electronic signatures, and authentication, providing advantages like access control and protection against attacks.

Uploaded by

Sjjjx Sihcyu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
43 views11 pages

Maths Cryptography Board Practical Maths CBSE

Cryptography is the practice of securing information through various techniques, ensuring that only intended recipients can access it. It encompasses methods such as symmetric key cryptography, hash functions, and asymmetric key cryptography, each serving specific purposes in data protection. Applications of cryptography include secure web browsing, digital currencies, electronic signatures, and authentication, providing advantages like access control and protection against attacks.

Uploaded by

Sjjjx Sihcyu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 11

CONTENT

 WHAT IS CRYPTOGRAPHY?

 CRYPTOGAPHY TECHNIQUES

 TYPES OF CRYPTOGRAPHY

 TO ENCODE A MESSAGE

 TO DECODE A MESSAGE

 APPLICATIONS OF CRYPTOGRAPHY

 ADVANTAGES OF CRYPTOGRAPHY

 EXAMPLES
CRYPTOGRAPHY
What is Cryptography?
Cryptography is a captivating field closely related to cryptology and
cryptanalysis. It encompasses a wide range of techniques, including the use of
microdots, steganography (which involves merging words with images), and other
ingenious methods to conceal information during storage or transmission. .It is a
technique of securing information and communications through the use of codes so
that only those persons for whom the information is intended can understand and
process it. Thus preventing unauthorized access to information. The prefix “crypt”
means “hidden” and the suffix “graphy” means “writing”. In Cryptography, the
techniques that are used to protect information are obtained from mathematical
concepts and a set of rule-based calculations known as algorithms to convert
messages in ways that make it hard to decode them. These algorithms are used for
cryptographic key generation, digital signing, and verification to protect data
privacy, web browsing on the internet and to protect confidential transactions such
as credit card and debit card transactions.

Cryptography techniques
Cryptography is closely related to the discipline of cryptology and cryptanalysis. It
includes techniques such as microdots, merging words with images and other ways
to hide information in storage or transit. In today's computer-centric world,
cryptography is most often associated with scrambling plaintext (ordinary text,
sometimes referred to as clear text) into cipher text(a process called encryption),
then back again (known as decryption). Individuals who practice this field are
known as cryptographers.

Modern cryptography concerns itself with the following four objectives:

1. Circumspection: The information cannot be understood by anyone for whom it


was unintended.

2. Integrity: The information cannot be altered in storage or transit between


sender and intended receiver without the alteration being detected.

3. Non-negation: The creator/sender of the information cannot deny at a later stage


their intentions in the creation or transmission of the information.
4. Authentication: The sender and receiver can confirm each other's identity and
the origin/destination of the information.

Procedures and protocols that meet some or all the above criteria are known as
cryptosystems. Cryptosystems are often thought to refer only to mathematical
procedures and computer programs; however, they also include the regulation of
human behavior, such as choosing hard-to-guess passwords, logging off unused
systems and not discussing sensitive procedures with outsiders.

Types of cryptography

1. Symmetric Key Cryptography:


 In this encryption system, both the sender and receiver use a single
common key to encrypt and decrypt messages.
 Symmetric key cryptography is faster and simpler, but the challenge lies in
securely exchanging keys between the sender and receiver.
 Popular symmetric key algorithms include Data Encryption Standard
(DES) and Advanced Encryption Standard (AES)1.

2. Hash Functions:
 Hash functions do not use any key. Instead, they calculate a fixed-length
hash value based on the input plaintext.
 The resulting hash value makes it impossible to recover the original
plaintext.
 Operating systems often use hash functions to securely encrypt passwords.

3. Asymmetric Key Cryptography:


 In asymmetric key cryptography, a pair of keys is used: a public key for
encryption and a private key for decryption.
 The public key can be shared openly, but only the intended receiver can
decode messages using their private key.
 Asymmetric cryptography provides a foundation for secure
communication and digital signatures.
 Remember that each type serves specific purposes, and their applications
vary based on security requirements and use cases

Examples of public-key cryptography include the following:


 RSA (Rivets-Shamir-Adelman), used widely on the internet.
 Elliptic Curve Digital Signature Algorithm (ECDSA) used by Bitcoin.
 Digital Signature Algorithm (DSA) adopted as a standard for digital signatures
by NIST in FIPS 186-4.
 Diffie-Hellman key exchange.

To maintain data integrity in cryptography, hash functions, which return a


deterministic output from an input value, are used to map data to a fixed data size.
Types of cryptographic hash functions include SHA-1 (Secure Hash Algorithm 1),
SHA-2 and SHA-3.
How to Decode and Encode Using Matrix

TO ENCODE A MESSAGE

1. Divide the letters of the message into groups of two or three.

2. Convert each group into a string of numbers by assigning a number to each


letter of the message. Remember to assign letters to blank spaces.

3. Convert each group of numbers into column matrices.

4. Convert these column matrices into a new set of column matrices by


multiplying them with a compatible square matrix of your choice that has an
inverse. This new set of numbers or matrices represents the coded message.

TO DECODE A MESSAGE

1. Take the string of coded numbers and multiply it by the inverse of the matrix
that was used to encode the message.

2. Associate the numbers with their corresponding letters.


Applications of Cryptography
 Computer passwords: Cryptography is widely utilized in computer security,
particularly when creating and maintaining passwords. When a user logs in, their
password is hashed and compared to the hash that was previously stored.
Passwords are hashed and encrypted before being stored.

 Digital Currencies: To protect transactions and prevent fraud, digital currencies


like Bitcoin also use cryptography. Complex algorithms and cryptographic keys
are used to safeguard transactions, making it nearly hard to tamper with or forge
the transactions.

 Secure web browsing: Online browsing security is provided by the use of


cryptography, which shields users from eavesdropping and man-in-the-middle
assaults. Public key cryptography is used by the Secure Sockets Layer (SSL) and
Transport Layer Security (TLS) protocols to encrypt data sent between the web
server and the client, establishing a secure channel for communication.

 Electronic signatures: Electronic signatures, created using cryptography, serve as


the digital equivalent of handwritten signatures. They can be validated using
public key cryptography and are legally enforceable in many countries.

 Authentication: Cryptography is used for authentication in many different


situations, such as when accessing a bank account, logging into a computer, or
using a secure network. Cryptographic methods are employed by authentication
protocols to confirm the user’s identity and confirm that they have the required
access rights to the resource.

 Cryptocurrencies: Cryptography is heavily used by cryptocurrencies like Bitcoin


and Ethereum to protect transactions, thwart fraud, and maintain the network’s
integrity. Complex algorithms and cryptographic keys are used to safeguard
transactions, making it nearly hard to tamper with or forge the transactions.

End-to-end Internet Encryption: End-to-end encryption is used to protect two-way


communications like video conversations, instant messages, and email. Even if the
message is encrypted, it assures that only the intended receivers can read the
message. End-to-end encryption is widely used in communication apps like
WhatsApp and Signal, and it provides a high level of security and privacy for users.
Advantages of Cryptography

 Access Control: Cryptography can be used for access control to ensure that only
parties with the proper permissions have access to a resource. Only those with
the correct decryption key can access the resource thanks to encryption.

 Secure Communication: For secure online communication, cryptography is


crucial. It offers secure mechanisms for transmitting private information like
passwords, bank account numbers, and other sensitive data over the Internet.

 Protection against attacks: Cryptography aids in the defense against various types
of assaults, including replay and man-in-the-middle attacks. It offers strategies
for spotting and stopping these assaults.

 Compliance with legal requirements: Cryptography can assist firms in meeting a


variety of legal requirements, including data protection and privacy legislation.
EXAMPLE 1

The receiver reads the message as “KEEP IT”


EXAMPLE 2

You might also like