Cryptographicalgorithms
Cryptographicalgorithms
Kirti Chawla
• Introduction What is a Cipher or Crypto-algorithm ?
• Classification
A method or system for transforming given information in
• Algorithms order to conceal its meaning.
• Vis-à-Vis
• Looking back
Prologue
• Classification
• Algorithms Computers
Transposition
CCOEAoan
Can xnmnlesp
Only _ycwu__u
• Vis-à-Vis Execute
Answers
et__tre_
_ess____
• Looking back
Substitution ciphers
Computers Frpsxwhuv
Can Substitution Fdq
Only Rqob
Execute Hahfxwh
Answers Dqvzhuv
Algorithms Genealogy
• Introduction
Algorithms
• Classification
• Vis-à-Vis
Symmetric Asymmetric
• Looking back
• Introduction
• Classification
• Algorithms
• Vis-à-Vis
• Looking back
• Introduction
Categories Methods to do
• Classification 1. Simple XOR
Deciding Operations 2. Modular Arithmetic with Polynomials
3. Relative Prime Factors
• Algorithms
1. Buffer management
Anomalous 2. Padding and boundary cases
Behavior Handling 3. State management
Simple XOR
• Introduction
• Looking back
This This Axaw
is is sa
X7 + x 5 + x 2 + 1
secret key dawawt
message sazawcsr
Factorized
This key1 Axaw
is sa
Factorized
secret dawawt
key2
message sazawcsr
Controlled Chaos Creation
S-box P-box
• Introduction
• Classification
• Algorithms
• Vis-à-Vis
• Looking back
1010 (data)
0101(data)
• Looking back
• Classification • 1010 1000 0010 1100 If the input data or key are
[+] 1000 1001 = Overflow not exactly fulfilling the algorithm
• Algorithms requirements, lets say required input
• Capture of 1010 1000 0010 1100 as is of multiple of 2 and > 512 bit, but
plain-text from buffer on which user does not provide … !
• Vis-à-Vis algorithm operate
• Looking back
• Classification
• Use one character once only for
substitution.
• Algorithms • Destroy or delete encryption
mechanism.
• Vis-à-Vis • Destroy or delete decryption
mechanism.
• Hash differs from one time PADs in
• Looking back a way of producing output.
Bi-directionality
• Introduction
• A single key for enciphering and deciphering operations.
• Classification
• More the number of bits of key, more secure your data.
• Algorithms
• Algorithms are usually characterized as stream or block ciphers.
• Vis-à-Vis
• Algorithmic proclivity to certain weak keys can create problem.
• Looking back
• Used generally for protecting data.
Asymmetric Ciphers
• Introduction
• One key for enciphering and another key for deciphering
• Classification operation.
• More the distance between mutually prime nos. (here they are key),
• Algorithms
more secure your data.
• Vis-à-Vis
• Used generally for protecting data as well for making sure its
• Looking back authentication.
Authenticators
• Classification Enigma
• Algorithms
Cipher cylinders
• Vis-à-Vis
• Looking back
Caesar cipher