Chapter 3 Cryptography
Chapter 3 Cryptography
CHAPTER NO.3
CRYPTOGRAPHY
2
CHAPTER 1:- SYLLABUS
1 Introduction
.
2 Substitution techniques
3 Transposition techniques
4 Hashing
DTEL 3
CHAPTER-1 SPECIFIC OBJECTIVE / COURSE OUTCOME
1 To understand cryptography.
.
DTEL 4
LECTURE 1:- CRYPTOGRAPHY Introduction
DTEL 5
LECTURE 1:- CRYPTOGRAPHY Introduction
DTEL 6
LECTURE 1:- CRYPTOGRAPHY Introduction
Hash functions:
Uses a mathematical transformation to irreversibly
“encrypt” information.
7
DTEL 7
LECTURE 1:- CRYPTOGRAPHY Introduction
Sender Receiver
Encrypt Decrypt
DTEL 8
LECTURE 1:- CRYPTOGRAPHY
THANK YOU
DTEL 9
LECTURE 2:- CRYPTOGRAPHY Caesar’s Cipher
Cryptography:
Cryptography is an ancient art and science of writing in
secret message. In areas like data and telecommunications
Cryptanalysis:
The process of trying to break any cipher text message to
obtain the original massage itself is known as cryptanalysis.
Cryptology:
It is a combination of cryptography and cryptanalysis.
In cryptography, a cipher (or cypher) is an algorithm for
performing encryption
10
DTEL 10
LECTURE 2:- CRYPTOGRAPHY Caesar’s Cipher/shift cipher
Cipher: DEFGHIJKLMNOPQRSTUVWXYZABC
(When key is 3 or shift is 3)
11
DTEL 11
LECTURE 2:- CRYPTOGRAPHY
THANK YOU
DTEL 12
LECTURE 3:- CRYPTOGRAPHY Vigenere Cipher
To decrypt the text consider the row start with the key letter
and find the cipher-text letter in that row.
13
DTEL 13
LECTURE 3:- CRYPTOGRAPHY Vigenere Cipher
14
DTEL 14
LECTURE 3:- CRYPTOGRAPHY Vigenere Cipher
15
DTEL 15
LECTURE 3:- CRYPTOGRAPHY Vigenere Cipher
DTEL 16
LECTURE 3:- CRYPTOGRAPHY Transposition Technique
(key is 3)
The result is “ TIE HSSTS IAT “
17
DTEL 17
LECTURE 3:- CRYPTOGRAPHY Transposition Technique
18
DTEL 18
LECTURE 3:- CRYPTOGRAPHY Transposition Technique
For example :
Suppose we use the keyword ZEBRAS and the message
WE ARE DISCOVERED. FLEE AT ONCE. In a regular
columnar transposition, we write this into the grid as
Follows:
Z E B R A S-----------------keyword
6 3 2 4 1 5
W E A R E D
I S C O V E
R E D F L E
E A T O N C
E Q K J E U
Providing five nulls (QKJEU) at the end. The cipher text is
then read off as:
19
EVLNE ACDTK ESEAQ ROFOJ DEECU WIREE
DTEL 19
LECTURE 3:- CRYPTOGRAPHY
THANK YOU
DTEL 20
LECTURE 4:- CRYPTOGRAPHY Stenography
Stenography :
21
DTEL 21
LECTURE 4:- CRYPTOGRAPHY Stenography
Advantages :
DTEL 22
LECTURE 4:- CRYPTOGRAPHY Stenography
Disadvantages :
23
DTEL 23
LECTURE 4:- CRYPTOGRAPHY Stenography
Disadvantages :
24
DTEL 24
LECTURE 4:- CRYPTOGRAPHY
THANK YOU
DTEL 25
LECTURE 5:- CRYPTOGRAPHY Hashing
26
DTEL 26
LECTURE 5:- CRYPTOGRAPHY Hashing
27
DTEL 27
LECTURE 5:- CRYPTOGRAPHY Hashing
28
DTEL 28
LECTURE 5:- CRYPTOGRAPHY
THANK YOU
DTEL 29
LECTURE 6:- CRYPTOGRAPHY Symmetric and asymmetric
key encryption
Symmetric Algorithm:
• In symmetric algorithm, the same key is used for
encryption and decryption. Hence this is also known as
• Single key or secrete key or shared key algorithm. This
key has to kept secret, sender and receiver uses the
same key to read encrypted data. The key is only known
to sender and receiver and no one else.
• The sender and receiver must agree on a key before they
communicate. To set up private channels with different
parties, you need a new key for each channel.
Maintaining a large number of shared secret key can
become a quite tedious task.
30
DTEL 30
LECTURE 6:- CRYPTOGRAPHY Symmetric and asymmetric
key encryption
31
DTEL 31
LECTURE 6:- CRYPTOGRAPHY Symmetric and asymmetric
key encryption
Asymmetric Algorithm:
• Asymmetric Encryption is a form of Encryption where
keys come in pairs. What one key encrypts, only the other
can decrypt.
• Frequently the keys are interchangeable, in the sense
that if key A encrypts a message, then B can decrypt it,
and if key B encrypts a message, then key A can decrypt
it. While common, this property is not essential to
asymmetric encryption.
• Asymmetric Encryption is also known as Public Key
Cryptography, since users typically create a matching key
pair, and make one public while keeping the other secret.
32
DTEL 32
LECTURE 6:- CRYPTOGRAPHY Symmetric and asymmetric
key encryption
• Users can ‘sign’ messages by encrypting them with their
private keys. This is effective since any message
recipient can verify that the user’s public key can decrypt
the message, and thus prove that the user’s secret key
was used to encrypt it.
• If the user’s secret key is, in fact, secret, then it follows
that the user, and not some impostor, really sent the
message.
• Users can send secret messages by encrypting a
message with the recipient’s public key. In this case, only
the intended recipient can decrypt the message, since
only that user should have access to the required secret
key.
33
DTEL 33
LECTURE 6:- CRYPTOGRAPHY
THANK YOU
DTEL 34
LECTURE 7:- CRYPTOGRAPHY DES
35
DTEL 35
LECTURE 7:- CRYPTOGRAPHY DES
Steps :
• 64 bit plain text block is handed over to an Initial
Permutation (IP) function.
• Initial Permutation is performed on plain text.
• IP produces two halves of permuted block.
• Left Plain Text (LPT) and
• Right Plain Text (RPT)
•
• Each LPT and RPT goes through 16 rounds of
encryption process, each with its own key. In the end
LPT and RPT are rejoined and Final Permutation (FP) is
performed on the combined block.
• The result is 64 bit cipher text
36
DTEL 36
LECTURE 7:- CRYPTOGRAPHY DES
DTEL 37
LECTURE 7:- CRYPTOGRAPHY
THANK YOU
DTEL 38
LECTURE 8:- CRYPTOGRAPHY Digital Signatures
39
DTEL 39
LECTURE 8:- CRYPTOGRAPHY Digital Signatures
DTEL 40
LECTURE 8:- CRYPTOGRAPHY Digital Signatures
How It Works :
• Assume you were going to send the draft of a contract to
your lawyer in another town. You want to give your
lawyer the assurance that it was unchanged from what
you sent and that it is really from you.
DTEL 41
LECTURE 8:- CRYPTOGRAPHY Digital Signatures
42
DTEL 42
LECTURE 8:- CRYPTOGRAPHY
THANK YOU
DTEL 43
References Books:
cryptography and Network security by atul kahate
Compute security principle and practice by william
stalling
References Web:
http://www.pgpi.org/doc/pgpintro
http://www.emailtrackerpro.com
http://www.kmint21.com
http://www.jjtc.com/Steganography/tools.html
DTEL 44