0% found this document useful (0 votes)
131 views25 pages

Cryptography - Ps

The document discusses cryptography concepts including: - Cryptographic basics like keys, symmetric and asymmetric key cryptography, hashing algorithms. - The goals of cryptography which are confidentiality, integrity, authentication, and non-repudiation. - Cryptography concepts such as plaintext, ciphertext, keys, and keyspaces. - Cryptography mathematics including logical operations like AND, OR, NOT, and XOR as well as modulo functions. - Cryptographic techniques like one-way functions, nonces, zero-knowledge proofs, and work functions. - Types of ciphers including transposition, substitution, block, and stream ciphers.

Uploaded by

umti29
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
131 views25 pages

Cryptography - Ps

The document discusses cryptography concepts including: - Cryptographic basics like keys, symmetric and asymmetric key cryptography, hashing algorithms. - The goals of cryptography which are confidentiality, integrity, authentication, and non-repudiation. - Cryptography concepts such as plaintext, ciphertext, keys, and keyspaces. - Cryptography mathematics including logical operations like AND, OR, NOT, and XOR as well as modulo functions. - Cryptographic techniques like one-way functions, nonces, zero-knowledge proofs, and work functions. - Types of ciphers including transposition, substitution, block, and stream ciphers.

Uploaded by

umti29
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 25

Cryptography

Slide ke- Mata Kuliah: Keamanan Jaringan

Course Objectives
Cryptographic Basic. Modern Cryptographic
Key. Symmetric and Asymmetric Key. Hashing Algorithm.

Symmetric Cryptography.
DES, Triple DES, Blowfish, etc. Key Distribution.

Goals of Cryptography
Security practitioners utilize cryptographic systems to meet Four Fundamental Goals:
Condentiality. Integrity. Authentication. Non-Repudiation.

Cryptography Concept

Cryptography Basic

Cryptography Concept
Term Details
A message in its natural format readable by an attacker. Message altered to be unreadable by anyone except the intended recipients. Sequence that controls the operation and behavior of the cryptographic algorithm. Total number of possible values of keys in a crypto algorithm.

Plaintext

Chipertext
Key Keyspace

Cryptography Concept
All cryptographic algorithms rely on keys to maintain their security. Every algorithm has a specic key space.
The key space is the range of values that are valid for use as a key for a specic algorithm. A key space is dened by its bit size.

Cryptography Concept
The key space is the range between the key that has all 0s and the key that has all 1s. Or to state it another way, the key space is the range of numbers from 0 to 2n, where n is the bit size of the key. Thus, a 128-bit key can have a value from 0 to 2128.

Cryptography Concept
Different Types of Key In private key cryptosystems, all
participants use a single shared key. In public key cryptosystems, each participant has their own pair of keys.

Cryptography Mathematics: Logical Operation


The AND operation (represented by the symbol) checks to see whether two values are both true.

Cryptography Mathematics: Logical Operation


The OR operation (represented by the symbol) checks to see whether at least one of the input values is true

Cryptography Mathematics: Logical Operation


The NOT operation (represented by the ~ or ! symbol) simply reverses the value of an input variable. This function operates on only one variable at a time.

Cryptography Mathematics: Logical Operation


The XOR function returns a true value when only one of the input values is true. If both values are false or both values are true, the output of the XOR function is false

Cryptography Mathematics: Modulo Function


The modulo function is represented in equations by the abbreviation mod, although its sometimes represented by the % operator.

One Way Function


A one-way function is a mathematical operation that easily produces output values for each possible combination of inputs but makes it impossible to retrieve the input values. Cryptographers rely on functions that they suspect may be one way.
But its theoretically possible that they might be broken by future Cryptanalysts.

Nonce
One of the more recognizable examples of a nonce is an Initialization Vector (IV), a random bit string that is the same length as the block size and is XORed with the message. IVs are used to create Unique Cipher Text every time the same message is encrypted using the same key.

Zero-Knowledge Proof

Work Function
Measuring the strength of a cryptography system by measuring the effort in terms of cost and/or time using a Work Function. Spend no more effort to protect an asset than it warrants, but Be Sure To Provide Sufcient Protection.
Thus, if information loses its value over time, the work function needs to be only large enough to ensure protection until the value of the data is gone.

Chiper
Ciphers are always meant to Hide The True Meaning Of A Message. They use a variety of techniques to alter and/or re-arrange the characters or bits of a message to achieve condentiality. Ciphers Convert messages from plain text
to cipher text on a bit basis, character basis,or block basis.

Chiper: Transposition
Transposition ciphers use an encryption algorithm to rearrange the letters of a plain-text message, forming the cipher-text message. The decryption algorithm simply reverses the encryption transformation to retrieve the original message.

Chiper: Transposition
In this example, were attempting to encrypt the message The ghters will strike the enemy bases at noon using the secret key attacker.

Chipertext

Chiper: Substitution
Substitution ciphers use the encryption algorithm to replace each character or bit of the plain-text message with a different character.

Chiper: Substitution

Chiper: Block Chiper


Block ciphers operate on chunks or blocks, of a message and apply the encryption algorithm to an entire message block at the same time.
The transposition ciphers are examples of block ciphers.

Chiper: Stream Chiper


Stream ciphers are ciphers that operate on each character or bit of a message (or data stream) one character/bit at a time.

You might also like