0% found this document useful (0 votes)
27 views30 pages

Chapter 3 Cryptography

Chapter 3 discusses cryptography, defining key terms and techniques such as encryption, decryption, and various cipher methods including transposition and substitution ciphers. It also covers conventional encryption algorithms like DES, 3DES, and AES, highlighting their characteristics, advantages, and vulnerabilities. The chapter emphasizes the importance of cryptanalysis in identifying weaknesses in cryptographic systems.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views30 pages

Chapter 3 Cryptography

Chapter 3 discusses cryptography, defining key terms and techniques such as encryption, decryption, and various cipher methods including transposition and substitution ciphers. It also covers conventional encryption algorithms like DES, 3DES, and AES, highlighting their characteristics, advantages, and vulnerabilities. The chapter emphasizes the importance of cryptanalysis in identifying weaknesses in cryptographic systems.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 30

Chapter 3

Cryptography
Abdulhafith 04/05/2025
Contents
1. Basic cryptographic terms
2. Historical background
3. Cipher Techniques
1. Transposition Cipher
2. Substitution Cipher
4. Conventional encryption algorithms
5. Cryptanalysis
6. Cryptographic Systems
1. Symmetric key cryptography
1. DES
2. 3DES
Abdulhafith 04/05/2025
Startup

 What do you think is encryption?

 Have ever used encryption to secure some data?

Abdulhafith 04/05/2025
Introduction
 Cryptography Comes from the Greek kryptós which means ‘hidden’ and gráphein, ‘to
write’) is the study of designing the techniques of cryptosystem

 It is the science and study of secret writing (practice and study of hiding information)

 It is the art and science of making a cryptosystem that is capable of providing information
security.

 It deals with the actual securing of digital data.

 It refers to the design of mechanisms based on mathematical algorithms that provide


fundamental information security services.

 Cryptography and encryption techniques are fundamental to securing information in digital


communications,

 Ensuring confidentiality, integrity, authenticity, and non-repudiation.


Abdulhafith 04/05/2025
Basic Terms
• Cryptography: The science of securing information by transforming it into
an unreadable format.
• Encryption: The process of converting plaintext (readable data) into
ciphertext (unreadable data) using an algorithm and a key.
• Decryption: The reverse process of converting ciphertext back into plaintext.
• Key: A piece of information used by cryptographic algorithms to encrypt or
decrypt data.
• Plaintext: The original, readable message or data.
• Ciphertext: The encrypted, unreadable message or data.
Abdulhafith 04/05/2025
Cont.
 Cryptographer: An individual who practices cryptography

 Cryptanalysis: The art of analyzing cryptographic algorithms

with the intent of identifying weaknesses. The art and science


of breaking the cipher text

 Cryptology is the study of Cryptosystems.

 Cryptosystems are the techniques for ensuring the secrecy

and/or authenticity of information.=(cryptography


+cryptanalysis)
Abdulhafith 04/05/2025
Cont.
 A cryptosystem is a 5-tuple (E,D,M,K,C), where:

 M:the set of plaintexts

 K: the set of keys

 C: the set of ciphertexts

 E: (M x K C) the set of enciphering functions(P = DK(C))

 D: (C x K M) the set of deciphering functions (C =EK(P))

 Security depends on the secrecy of the key, not the secrecy of the
algorithm
Abdulhafith 04/05/2025
Description

 A sender S wants to transmit message M to a receiver R

 To protect the message M, the sender first encrypts it into an


unintelligible message M’

 After receipt of M’, R decrypts the message to obtain M

 Which One is Plain text?

 Which one is Cipher Text?


Abdulhafith 04/05/2025
Cryptographic Systems

Abdulhafith 04/05/2025
Cont.
 Cryptographic systems are characterized along three dimensions

 operations used for transforming

 Substitution: Replace(bit, letter, group of bits letters)

 Transposition: Rearrange the order

 Number of keys used

 Symmetric: same key , secret-key,

 private-key Asymmetric: different key , public-key

 Way in which the plaintext is processed

 block cipher
Abdulhafith 04/05/2025
 Stream cipher
Transposition Cipher
 The Transposition Cipher Technique is an encryption method
used to encrypt a message or information.
 This encryption method is done by playing with the position of
letters of the plain text.
 The positions of the characters present in the plaintext are
rearranged or shifted to form the ciphertext.

Abdulhafith 04/05/2025
Example Rail fence Technique
 The Rail Fence Cipher is a type of transposition cipher that
rearranges the plaintext by writing it in a zigzag pattern along a
set number of rails (rows) and then reading the ciphertext row by
row. It is one of the simplest forms of transposition ciphers.

Abdulhafith 04/05/2025
Columnar Transposition Cipher
 Columnar Transposition involves writing the plaintext out in rows,
and then reading the ciphertext off in columns one by one.

Abdulhafith 04/05/2025
Substitution cipher
 A Substitution cipher is a cryptographic method that
replaces characters in a plaintext with other characters or
symbols according to a fixed system or key.
 Unlike transposition ciphers (which rearrange characters),
substitution ciphers alter the identity of the characters
while preserving their order.
Abdulhafith 04/05/2025
ROT13 Ceasar Cipher example

Abdulhafith 04/05/2025
Conventional Encryption algorithms
 Conventional encryption algorithms, also known as symmetric-key algorithms,

 use the same key for both encryption and decryption.

 These algorithms are widely used for their efficiency and speed compared to
asymmetric encryption.

 Symmetric Encryption:

 Single shared key for encryption/decryption.

 Fast and suitable for bulk data encryption.

 Key challenge: Secure key distribution.


Abdulhafith 04/05/2025
Common Algorithms 1. DES

 DES (Data Encryption Standard):

 Key size: 56 bits (insecure due to brute-force vulnerabilities).

 Block size: 64 bits.

 Status: Deprecated, replaced by 3DES and AES.


2. DES
 Applies DES three times with 2–3 keys (effective key length: 112–168 bits).
 Status: Legacy (phased out by NIST in 2023), still used in some financial
systems.
Abdulhafith 04/05/2025
Common Algorithm 3. AES

 Block Ciphers (encrypt data in fixed-size blocks):

 AES (Advanced Encryption Standard):

 Key sizes: 128, 192, or 256 bits.

 Block size: 128 bits.

 Rounds: 10/12/14 (depending on key size).

 Status: Secure, widely adopted (e.g., TLS, VPNs, disk


encryption).
Abdulhafith 04/05/2025
Cryptanalysis
 Cryptanalysis is the study and practice of analyzing cryptographic
systems to find weaknesses or break encryption without having
access to the secret key.

 The goal of cryptanalysis is to uncover vulnerabilities in encryption


algorithms, protocols, or implementations.

Abdulhafith 04/05/2025
Types of Cryptanalysis Attacks
 Brute-Force Attack Method: Tries every possible key until the correct one is
found.

 Effective only if the key space is small.

 Modern encryption algorithms like AES-256 are resistant due to large key sizes.

 Ciphertext-Only Attack Method: The attacker has access only to encrypted


messages (ciphertext) and attempts to recover the plaintext or key.
 Man-in-the-Middle (MITM) Attack

 Method: The attacker intercepts and alters communication between two parties without
their knowledge.
Abdulhafith 04/05/2025
 Example: Downgrade attacks on TLS to force weak encryption.
Cryptographic systems (DES)
 The Data Encryption Standard (DES) is a symmetric-key block cipher published by the
National Institute of Standards and Technology (NIST).

 DES is an implementation of a Feistel Cipher. It uses 16 round Feistel structure. The


block size is 64-bit. Though, key length is 64-bit,

 DES has an effective key length of 56 bits, since 8 of the 64 bits of the key are not used by
the encryption algorithm (function as check bits only)

 Block Cipher: encrypt data by dividing it in to 64bit block

 Feistel cipher : splitting data into halves and applying a round function.

Abdulhafith 04/05/2025
How it works

Abdulhafith 04/05/2025
Initial permutation

Abdulhafith 04/05/2025
Round function
 The round function (also called the F-function) is a critical component of the
Data Encryption Standard (DES). It is applied in each of the 16 rounds of DES's
Feistel network structure.

 Inputs:

 Right Half (R): 32 bits of the data block.


 Subkey (K): A 48-bit round-specific key derived from the main 56-bit key.

 Output:
 A 32-bit result that is XORed with the left half of the data block.

Abdulhafith 04/05/2025
Each round follows these steps:

1. Expansion (E-Box): The 32-bit right half is expanded to 48 bits using a fixed table.

2. Key Mixing: The expanded right half is XORed with a 48-bit subkey (one per
round).

3. Substitution (S-Box): The result is passed through eight S-boxes, reducing it to 32


bits.

4. Permutation (P-Box): The output is rearranged using a fixed table.

5. XOR with Left Half: The result is XORed with the left half.

6. Swap: The left and right halves are swapped, except in the last round
Abdulhafith 04/05/2025
Tripple DES (3DES)
 3DES operates on 64-bit blocks of data using a 168-bit key (three 56-
bit keys).
 There are two main versions of

 3DES:3-Key 3DES (Most Secure) Uses three different 56-bit keys (K1,
K2, K3).

 2 Key 3DES (Moderately Secure)Uses only two keys (K1 = K3, K2 is


different).The encryption process follows the Encrypt-Decrypt-Encrypt
(EDE) sequence:
Abdulhafith 04/05/2025
Encryption Process
1. Encrypt the plaintext with DES using Key 1 (K1).

2. Decrypt the result using DES with Key 2 (K2).

3. Encrypt again using DES with Key 3 (K3).

Mathematically:

 C=EK3(DK2(EK1(P))) Where:

• E = Encryption using DES

• D = Decryption using DES

• P = Plaintext

• C = Ciphertext
Abdulhafith 04/05/2025
Decryption Process
 Decryption is the reverse of encryption:

1. Decrypt using Key 3 (K3).

2. Encrypt using Key 2 (K2).

3. Decrypt using Key 1 (K1).

Mathematically:

 P=DK1(EK2(DK3(C)))

Abdulhafith 04/05/2025
Advantages / Disadvantages
 Advantages of 3DES

• Stronger Security: Resistant to brute-force attacks compared to DES.

• Backward Compatibility: Supports DES systems.

 Disadvantages of 3DES

• Slower Performance: Due to triple encryption.

• Vulnerable to Meet-in-the-Middle Attacks: Although safer than DES, it's


still not as secure as modern encryption algorithms like AES.

Abdulhafith 04/05/2025
AES

Abdulhafith 04/05/2025

You might also like