0% found this document useful (0 votes)
28 views

Cryptographicalgorithms

This document discusses various types of cryptographic algorithms including ciphers, symmetric ciphers, asymmetric ciphers, and authenticators. It describes how ciphers can use techniques like transposition, substitution, XOR operations, and modular arithmetic to encrypt data. Symmetric ciphers use a single shared key for encryption and decryption while asymmetric ciphers use separate public and private keys. Authenticators like hash functions provide data integrity through collision resistance and one-way hashes. Examples of algorithms discussed include DES, AES, RSA, ELGAMAL, SHA, and MD5.

Uploaded by

Lakshaya Agnani
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views

Cryptographicalgorithms

This document discusses various types of cryptographic algorithms including ciphers, symmetric ciphers, asymmetric ciphers, and authenticators. It describes how ciphers can use techniques like transposition, substitution, XOR operations, and modular arithmetic to encrypt data. Symmetric ciphers use a single shared key for encryption and decryption while asymmetric ciphers use separate public and private keys. Authenticators like hash functions provide data integrity through collision resistance and one-way hashes. Examples of algorithms discussed include DES, AES, RSA, ELGAMAL, SHA, and MD5.

Uploaded by

Lakshaya Agnani
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 15

By:

Kirti Chawla
• Introduction What is a Cipher or Crypto-algorithm ?

• Classification
A method or system for transforming given information in
• Algorithms order to conceal its meaning.

• Vis-à-Vis

• Looking back
Prologue

• Introduction Transposition ciphers

• Classification

• Algorithms Computers
Transposition
CCOEAoan
Can xnmnlesp
Only _ycwu__u
• Vis-à-Vis Execute
Answers
et__tre_
_ess____

• Looking back

Substitution ciphers

Computers Frpsxwhuv
Can Substitution Fdq
Only Rqob
Execute Hahfxwh
Answers Dqvzhuv
Algorithms Genealogy

• Introduction
Algorithms
• Classification

• Algorithms Ciphers Authenticators

• Vis-à-Vis
Symmetric Asymmetric
• Looking back

DES\3DES RSA SHA


AES ELGAMAL MD5
IDEA … …
RC6
BlowFish



Algorithmic Parlance

• Introduction

• Classification

• Algorithms

• Vis-à-Vis

• Looking back

Strong Open Key-oriented


At the heart of Algorithms

• Introduction
Categories Methods to do
• Classification 1. Simple XOR
Deciding Operations 2. Modular Arithmetic with Polynomials
3. Relative Prime Factors
• Algorithms

• Vis-à-Vis 1. S-boxes & P-boxes


Controlled Chaos Creation 2. Inversion
3. Data distribution/redundancy
• Looking back
1. Self generation or ask from user
Key Management 2. Key organization
3. Key protection

1. Buffer management
Anomalous 2. Padding and boundary cases
Behavior Handling 3. State management

1. Hash or One time PADs


Directional Behavior 2. Bi-directionality
Deciding Operations

Simple XOR
• Introduction

This This Axaw


• Classification is is sa
secret key dawawt
message sazawcsr
• Algorithms

• Vis-à-Vis Modular arithmetic with polynomials

• Looking back
This This Axaw
is is sa
X7 + x 5 + x 2 + 1
secret key dawawt
message sazawcsr

Relative prime factors

Factorized
This key1 Axaw
is sa
Factorized
secret dawawt
key2
message sazawcsr
Controlled Chaos Creation

S-box P-box
• Introduction

• Classification

• Algorithms

• Vis-à-Vis

• Looking back

Inversion Data distribution/redundancy

1010 (data)

001 1010 001 1010

0101(data)

1010 001 1010 001


Key Management

Self-generation Ask from user


• Introduction
1010 (data)
• Classification
1010 XOR 11 = 1001
• Algorithms
0101 (data)

• Vis-à-Vis 0101 XOR 11 = 0110

• Looking back

Key organization Key protection

1010 0000 1010 1111 0000 1011 (key)


1010 0000 1010 1111 0000 1011 (key)

1010 0000 1010 1111 0000 1010 1010


1010 0000 1010 (key)
Anomalous Behavior Handling

• Introduction Buffer management Padding

• Classification • 1010 1000 0010 1100 If the input data or key are
[+] 1000 1001 = Overflow not exactly fulfilling the algorithm
• Algorithms requirements, lets say required input
• Capture of 1010 1000 0010 1100 as is of multiple of 2 and > 512 bit, but
plain-text from buffer on which user does not provide … !
• Vis-à-Vis algorithm operate

• Looking back

Boundary cases State management

If the algorithm works in various


U/SIGN-INT
stages, each stage signifying a state
*
and regurgitating partially (weak)
U/SIGN-INT > 65536/32768
cipher-text and hence making
possible ‘interleaving’… !
Directional Behavior

• Introduction Hash or one time PADs

• Classification
• Use one character once only for
substitution.
• Algorithms • Destroy or delete encryption
mechanism.
• Vis-à-Vis • Destroy or delete decryption
mechanism.
• Hash differs from one time PADs in
• Looking back a way of producing output.

Bi-directionality

• Given the single algorithm, the


enciphering and deciphering
operations should be inverse of
each other.
• Bi-directional nature of algorithm is
there, because of need to get original
data back.
Symmetric Ciphers

• Introduction
• A single key for enciphering and deciphering operations.
• Classification
• More the number of bits of key, more secure your data.
• Algorithms
• Algorithms are usually characterized as stream or block ciphers.
• Vis-à-Vis
• Algorithmic proclivity to certain weak keys can create problem.
• Looking back
• Used generally for protecting data.
Asymmetric Ciphers

• Introduction
• One key for enciphering and another key for deciphering
• Classification operation.

• More the distance between mutually prime nos. (here they are key),
• Algorithms
more secure your data.
• Vis-à-Vis
• Used generally for protecting data as well for making sure its
• Looking back authentication.
Authenticators

• Hash functions gives a fixed-length output for a arbitrary-length


• Introduction
message.
• Classification
• Strength of algorithm is measured by collision resistance.
• Algorithms
• Uni-directionality is innate capability of authentication algorithms.
• Vis-à-Vis
• Authentication is achieved by re-computing hash and compared
• Looking back with stored hash value.
DES/… algorithms
• Introduction

• Classification Enigma

• Algorithms
Cipher cylinders
• Vis-à-Vis

• Looking back
Caesar cipher

Egyptian pictorial substitution

You might also like