0% found this document useful (0 votes)
21 views22 pages

Module 03 Cryptography MB - HJ

The document provides an overview of cryptography, detailing its purpose in securing information through encryption and decryption, as well as its various types, including symmetric and asymmetric key cryptography. It also discusses threats to cybersecurity, attacks on cryptosystems, and the role of public key infrastructure (PKI) in maintaining secure communications. Additionally, it highlights the importance of cryptography in protecting digital data in various applications such as banking and e-commerce.

Uploaded by

Sanchit Jaggi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views22 pages

Module 03 Cryptography MB - HJ

The document provides an overview of cryptography, detailing its purpose in securing information through encryption and decryption, as well as its various types, including symmetric and asymmetric key cryptography. It also discusses threats to cybersecurity, attacks on cryptosystems, and the role of public key infrastructure (PKI) in maintaining secure communications. Additionally, it highlights the importance of cryptography in protecting digital data in various applications such as banking and e-commerce.

Uploaded by

Sanchit Jaggi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 22

Cryptogr

aphy
Table of Content
• Threats
• Security Goals
• Encryption & Decryption
• Cryptography
• Types of Cryptography
• Hash Functions
• Ciphers
• Public Key Infrastructure (PKI)
• Attacks on cryptosystems
• Cryptography + Cyber Security
THREATS
A cyber or cybersecurity threat is
a malicious act that seeks to
damage data, steal data, or
disrupt digital life in general.

Cyber threats include computer


viruses, data breaches, Denial of
Service (DoS) attacks, and other
attack vectors.
THREATS
Security Goals
ENCRYPTION & DECRYPTION
CYPTOGRAPHY
Cryptography is the process of hiding or
coding information so that only the person
a message was intended for can read it.

The art of cryptography has been used to


code messages for thousands of years and
continues to be used in bank cards,
computer passwords, and ecommerce.
About Cryptography
• Cryptography is the science of protecting information by transforming it
into a secure format.
• Today, cryptography is used to protect digital data.
• It is a part of computer science that focuses on transforming data into
formats that cannot be recognized by unauthorized users
Basic Vocabulary OF Cryptography
● Cryptography- the art of writing or solving codes
● Cipher- and method of encrypting text
● Plaintext- the message being shared, text as it is normally written
● Ciphertext- text that has been enciphered to prevent others from reading it
● Encode- to put a message into the form of code so that it can be kept as a secret
● Decode- to translate data or a message from code into the original language or form
● Encipher- to convert a message or a piece of text into coded form; encrypt
● Decipher- To convert a text written in code, or a coded signal, into normal language
● Code- a system of words, letter, figures, or other symbols substituted for other words,
letters, etc., for the purposes of secrecy
TYPES OF CYPTOGRAPHY

Cryptography

Symmetric Key Asymmetric Key Hash Functions


Symmetric Key Cryptography
• It is an encryption system where the sender and receiver of a message use a single common
key to encrypt and decrypt messages.
• Symmetric Key cryptography is faster and simpler but the problem is that the sender and
receiver have to somehow exchange keys securely.

The most popular symmetric key cryptography systems are:


• Data Encryption Systems (DES)
• Advanced Encryption Systems (AES).
Symmetric Key Cryptography
Asymmetric Key Cryptography
Asymmetric cryptography, also known as public-key cryptography, is a
cryptographic technique that uses a pair of keys (public key and private key)
for encryption and decryption of data. Unlike symmetric encryption, where
the same key is used for both encryption and decryption, asymmetric
encryption uses two distinct keys, each with its own specific role.
Asymmetric Key Cryptography
Hash Functions
There is no usage of any key in this algorithm. A hash value with a
fixed length is calculated as per the plain text which makes it
impossible for the contents of plain text to be recovered. Many
operating systems use hash functions to encrypt passwords.
Did You Know?
The oldest known encryption
attempt is from the Egyptian
kingdom, around 2,000 years
before Christ.
Ciphers
Ciphers are algorithms used to perform encryption and decryption. They
convert plaintext into ciphertext to secure information.
•Transposition ciphers maintain all of the original
bits of data in a byte but reverse their order.

•Substitution ciphers substitute specified data


sequences with alternative data sequences. For
example, one type of replacement would be to
convert all bits with a value of 1 to bits with a
value of 0, and vice versa.
Public Key Infrastructure (PKI)
Public key infrastructure or PKI is the governing body behind issuing
digital certificates. It helps to protect confidential data and gives
unique identities to users and systems. Thus, it ensures security in
communications.

The public key infrastructure uses a pair of keys: the public key and
the private key to achieve security. The public keys are prone to
attacks and thus an intact infrastructure is needed to maintain them.
Attacks on cryptosystems
Passive Attacks:

• Goal: Obtain unauthorized access to information.


• Examples: Intercepting and eavesdropping on communication channels.
• Characteristics: Do not affect or disrupt the information or communication channel,
often go unnoticed.

Active Attacks:

• Goal: Modify or disrupt information in some way.


• Examples: Unauthorized modification of data, denial of service, alteration of
authentication data, unauthorized deletion of data.
• Characteristics: Involves altering information or processes, can be detected due to
disruption caused.
Attacks on cryptosystems
Ciphertext Only Attacks (COA):

• Goal: Determine the plaintext from a set of ciphertexts without access to


corresponding plaintext.
• Characteristics: Attacker tries to deduce the plaintext or the encryption key,
modern cryptosystems are designed to guard against COA.

Brute Force Attack (BFA):

• Goal: Determine the encryption key by trying all possible keys.


• Characteristics: Computationally intensive, effectiveness depends on the length of
the key, longer keys exponentially increase the difficulty.
Cryptography + Cyber Security
• ATM cards, computer passwords,
electronic commerce, etc. all use
cryptography for security

• Aspects in information security


include data confidentiality, data
integrity, authentication, etc

You might also like