0% found this document useful (0 votes)
115 views

Cryptogrphy

This document provides an overview of cryptography, including its history and principles. It discusses different cipher methods like bit stream and block ciphers. It also covers cryptographic elements such as substitution and transposition ciphers. Popular cryptographic algorithms are also summarized, including symmetric algorithms like AES and asymmetric algorithms used in public key encryption. The importance of key size for encryption strength is also noted.

Uploaded by

Danish Hassan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
115 views

Cryptogrphy

This document provides an overview of cryptography, including its history and principles. It discusses different cipher methods like bit stream and block ciphers. It also covers cryptographic elements such as substitution and transposition ciphers. Popular cryptographic algorithms are also summarized, including symmetric algorithms like AES and asymmetric algorithms used in public key encryption. The importance of key size for encryption strength is also noted.

Uploaded by

Danish Hassan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 17

Cryptography

Objectives
• Describe the most significant events and
discoveries from the history of cryptology
• Understand the basic principles of
cryptography
• Understand the operating principles of the
most popular tools in the area of cryptography
• List and explain the major protocols used for
secure communications
• Understand the nature and execution of the
dominant methods of attack used against
cryptosystems
Introduction
• Cryptography: process of making and using
codes to secure transmission of information
• Encryption: converting original message into a
form unreadable by unauthorized individuals
• Cryptanalysis: process of obtaining original
message from encrypted message without
knowing algorithms
• Cryptology: science of encryption; combines
cryptography and cryptanalysis
Principles of Cryptography

• With emergence of technology, need for


encryption in information technology
environment greatly increased
• All popular Web browsers use built-in
encryption features for secure e-commerce
applications
Cipher Methods

• Plaintext can be encrypted through bit stream or


block cipher method
• Bit stream: each plaintext bit transformed into
cipher bit one bit at a time
• Block cipher: message divided into blocks (e.g.,
sets of 8- or 16-bit blocks) and each is
transformed into encrypted block of cipher bits
using algorithm and key
Elements of Cryptosystems
• Cryptosystems typically made up of algorithms,
data handling techniques, and procedures
• Substitution cipher: substitute one value for
another
• Monoalphabetic substitution: uses only one
alphabet
• Polyalphabetic substitution: more advanced; uses
two or more alphabets
• Vigenère cipher: advanced cipher type that uses
simple polyalphabetic code; made up of 26 distinct
cipher alphabets
Elements of Cryptosystems
(continued)
• Transposition cipher: rearranges values
within a block to create ciphertext
• Exclusive OR (XOR): function of Boolean
algebra; two bits are compared
– If two bits are identical, result is binary 0
– If two bits not identical, result is binary 1
Elements of Cryptosystems
(continued)
• Vernam cipher: developed at AT&T; uses set of
characters once per encryption process
• Book (running key) cipher: uses text in book as
key to decrypt a message; ciphertext contains
codes representing page, line and word
numbers
Hash Functions
• Mathematical algorithms that generate message
summary/digest to confirm message identity and
confirm no content has changed
• Hash algorithms: publicly known functions that
create hash value
• Use of keys not required; message
authentication code (MAC), however, may be
attached to a message
• Used in password verification systems to confirm
identity of user
Cryptographic Algorithms

• Often grouped into two broad categories,


symmetric and asymmetric; today’s popular
cryptosystems use hybrid combination of
symmetric and asymmetric algorithms
• Symmetric and asymmetric algorithms
distinguished by types of keys used for
encryption and decryption operations
Cryptographic Algorithms
(continued)
• Symmetric encryption: uses same “secret
key” to encipher and decipher message
– Encryption methods can be extremely
efficient, requiring minimal processing
– Both sender and receiver must possess
encryption key
– If either copy of key is compromised, an
intermediate can decrypt and read messages
Cryptographic Algorithms
(continued)
• Data Encryption Standard (DES): one of most
popular symmetric encryption cryptosystems
– 64-bit block size; 56-bit key
– Adopted by NIST in 1976 as federal standard for
encrypting non-classified information
• Triple DES (3DES): created to provide security
far beyond DES
• Advanced Encryption Standard (AES):
developed to replace both DES and 3DES
Cryptographic Algorithms
(continued)
• Asymmetric Encryption (public key
encryption)
– Uses two different but related keys; either key
can encrypt or decrypt message
– If Key A encrypts message, only Key B can
decrypt
– Highest value when one key serves as private
key and the other serves as public key
Encryption Key Size
• When using ciphers, size of cryptovariable or
key very important
• Strength of many encryption applications and
cryptosystems measured by key size
• For cryptosystems, security of encrypted data is
not dependent on keeping encrypting algorithm
secret
• Cryptosystem security depends on keeping
some or all of elements of cryptovariable(s) or
key(s) secret
Encryption Key Power
Summary
• Cryptography and encryption provide sophisticated approach
to security
– Many security-related tools use embedded encryption
technologies
– Encryption converts a message into a form that is
unreadable by the unauthorized
• Many tools are available and can be classified as symmetric
or asymmetric, each having advantages and special
capabilities
• Strength of encryption tool dependent on key size but even
more dependent on following good management practices
• Cryptography is used to secure most aspects of Internet and
Web uses that require it, drawing on extensive set of
protocols and tools designed for that purpose
• Cryptosystems are subject to attack in many ways

You might also like