Isnis Unit3
Isnis Unit3
Cryptography
Plaintext
Clear text that anyone who knows the language can easily read the message
Original message plain text
Ciphertext:
Cryptography:
Applica on Of Cryptography
Data hiding
Digitally code – cryptography can be applied for digitally coding – so ware, graphics,
voice
Electronic payment
Message Authen ca on- to prevent message tampering
Cryptanalysis
Cryptology
In cryptography
o cipher => algorithm for performing encryp on and decryp on
o
Encryp on
Decryp on
Opposite to Encryp on
Ciphertext to plaintext
Sender’s computer transforms plaintext to ciphertext (Encryp on)
Ciphertext travels over network(internet)
Receiver’s computer decryp on to get original message
Encryp on algorithm => used for encryp on => sender’s end
Decryp on algorithm => used for decryp on => receiver’s end
Encryp on and Decryp on
Symmetric and Asymmetric Cryptography
Symmetric Encryp on
Asymmetric Key Cryptography
Only user having secret key – can decrypt message
This method uses Key Management System
Which implements Public Key Infrastructure
This helps in finding suitable keys
Advantage : Key is secure
Public Key Distribu on
o
o
Public Key Cer ficate
o Public key is shared others
o Even it is broadcasted publicly
o This is significant weakness
o Anyone can fake such public announcement
o
o Solu on: use public-key cer ficate
o Cer ficate includes – public key & user ID of key owner
o Signed by trusted third-party
o Third party cer ficate authority (can be government agency or financial
ins tu on)
o User can send public key to CA and get cer ficate
o User can share cer ficate with others
o Who needs public key verifies cer ficate for authen city
Subs tu on Technique
2 ways to convert plaintext to ciphertext
o Subs tu on Technique
o Transposi on Technique
Subs tu on text replaced by another le ers / numbers/symbols
Caesar’s Cipher
I R E X M
B C D G H
K N O Q S
T U V W Z
Key – MONARCHY
C H Y B D
E F G I/J K
L P Q S T
U V W X Z
Cipher text -
Plain text - balloon
Diagraph-
Diagraph -
Cipher text -
Vigenère cipher
Search key le er row wise
Search plaintext le er column wise
Cipher Text- MWCSHHNKXZKNKJJALFR
Cipher Text- UQXTQUYFR
Highly secure method
Hard for large messages
Transposi on Technique
Rail fence technique
Cipher text – WLOETDNSECMSUET
E.g. plain text- COMPUTER SECURITY rails-2
ciphertext- CMUESCRTOPTREUIY
plaintext – THANK YOU VERY MUCH rails -3
T K V M
H N Y U E Y U H
A O R C
ciphertext - TKVMHNYUEYUHAORC
Algorithm :
o Write down plain text message as a sequence of diagonals
o Read the plain text wri en in step1 as a sequence of rows
E L L F O R
Y O U R E X
A M
E H O M E
Ciphertext- ___EHCMMWELOOE_________________________________
M E T O M O
R R O W
Ciphertext- _______EOWOOCMROERHMMTO_____________________________
Algorithm:
Steganography
Defini on: “ a technique of hiding large amount of secret message within and
ORDINARY message and extrac on of it at its des na on”
One step ahead of cryptography
Hides encrypted message
Data is more secure
Data is encrypted using encryp on algorithm
Encrypted data inserted into covered media (JPEG image)
Stego-key is used
Steganography process:
Resultant file = stego-medium
Cover media can be :- image/audio file
Image :
o All bits represen ng same color pixels repeated in a row
o Encrypted data applied to this redundant data in random manner
o So result will have “ noise pa erns”
Disadvantages:
o Once a acked data become worthless
o Lots of overhead to hide few bits of informa on
Solu on:
o Inser on method with some key
o First encrypt then hide
Advantage:
o Can be useful for par es dealing with highly secret informa on
Terminologies :
o Cover-medium: data within which a message is to be hidden
o Stego-medium: data within which a message has been hidden
o Message: data to be hidden
o Redundant bits: bits of data in cover medium that can be modified without
compromising medium integrity