Professional Documents
Culture Documents
A
PAPER ON
CRYPTOGRAPHY
ByK.RAMYA SREE
J.SINDHU
Ramyabubbly14@yahoo.com
CRYPTOGRAPHY
CRYPTOGRAPHY
ABSTRACT
The word Cryptography comes from a
moved
message.
provided
finally
applications of cryptography.
towards
the
use
information
presented
of
keys
regarding
some
benefits
in
hash
and
INTRODUCTION
1
CRYPTOGRAPHY
authentication.
with
Bob
who
thinks
he
is
methodology
into
cipher
original
data
(converted
is
in
Eves Goals
1. Read the message
2. Figure out the key Alice is using and
read all the messages encrypted with
that key
IS
TRANSFORMATION
Transformation function is the function
which converts the message from one form
to another form.
Example: the function works as shown in
figure:
2
CRYPTOGRAPHY
plaintext
is
WELCOME
TO
1
2
3
4
5
6
7
8
P
3
F
F
V
F
D
G
F
D
K
2
X
A
D
G
A
F
D
V
T
6
F
D
X
A
G
X
V
F
C
4
D
V
D
D
F
D
V
D
C
1
V
F
D
V
X
D
D
D
H
8
V
D
A
D
D
F
F
F
A
7
D
D
D
D
D
F
F
V
E
5
F
F
G
D
A
X
A
D
CRYPTOGRAPHY.
DV FD DF VD XD DA DG FG AD VD DD
VV DF FA DV FD DG FA DF VD XD DA
DA GF XD DA GF XD DF is converted
DG FG AD VD DD DA GF XD.
SECRET KEY
For
encrypting
message
(original
DECRYPTION
ENCRYPTION
fetched out.
WHY CRYPTOGRAPHY???
Data
confidentiality:
Encryption
functions
into
the
cipher.
Example:
The
final
provide
information
CRYPTOGRAPHY
ASPECTS OF CRYPTOGRAPHY
Modern
cryptography
heavily
It is an inter-disciplinary study of
the
following
three
fields:
Mathematics
ComputerScience
Electrical Engineering
Without
having
complete
as
error-correcting
codes
compression.
EXAMPLES OF CRYPTOGRAM
algorithms
use
keys
to
CRYPTOGRAPHY
KERCKHKOFFSS PRINCIPLE
While assessing the strength, one should
always assume that the enemy knows the
cryptographic algorithm used.
The security of the system is based on:
* the quality (strength) of the algorithm not
obscurity
TYPES OF CRYPTOGRAPHIC
FUNCTIONS
text
namely
symmetric
key
and
Conventional
cryptography
or
CRYPTOGRAPHY
CRYPTOGRAPHY
DIGITAL SIGNATURES
scheme
cryptography.
equivalent
signatures
scale.
valid
encryption
for
is given below.
and
private
key
used
is
type
Digital
to
in
of
signatures
traditional
many
nonetheless.
asymmetric
are
handwritten
respects;
properly
Examples
include
signature
are
generated.
BENEFITS-DIGITAL SIGNATURE
AUTHENTICATION
It requires many computer processing cycles
to do Public key encryption and decryption,
so the efficiency is less. The major benefit is
that the public keys are not secret, so there is
no need to exchange them securely.
CRYPTOGRAPHY
the signature.
NON-REPUDIATION
In a cryptographic context, the word
.
4. Choose an integer e such that
, and e and
RSA ALGORITHM
relation
i.e.
integer k.
for some
ENCRYPTION
to
< by
8
CRYPTOGRAPHY
-Secret
key
encryption/decryption
DECRYPTION
Sender can recover
a secret key.
use the secret key to encrypt the bulk
of the communication.
HASH FUNCTIONS
Hash algorithms are known as message
Given
hash
function
is
message M.
COMPARISON
SYMMETRIC
BETWEEN
AND
PUBLIC
KEYS
CRYPTOGRAPHY
used
transactions.
HTTPS server usually runs on port
443.
Include notion of verification of
for
most
secure
web
to ensure security.
Confidentiality
MESSAGE FINGERPRINT
exchanged in a transaction.
Authentication
SECURE PROTOCOLS
Many application protocols include the use
of cryptography as part of the application
level protocol.
- The cryptographic scheme employed is
part of the protocol.
- If stronger cryptographic tools become
available we need to change the protocol.
- Secure Sockets Layer (SSL) is a different
approach - a new layer is added that
provides a secure channel over a TCP only
link.
- TLS is Transport Layer Security (IETF
standard based on SSL).
- HTTPS is HTTP running over SSL.
Integrity
Ensuring that only authorized parties are
able to modify computer system assets and
transmitted information.
Non-repudiation
Requires that neither of the authorized
parties
deny the
aspects
of a
valid
transaction.
Digital Signatures
Allows electronically sign (personalize) the
electronic
documents,
messages
and
transactions
Identification
Is capable of replacing password-based
identification methods with more powerful
(secure) techniques.
10
CRYPTOGRAPHY
Key Establishment
To
communicate
correspondent
whom
ways
a
key
you
that
cryptography
can
be
to
your
have
never
Secret Sharing
algorithms.
Happy
coding
and
have
no
fear
CONCLUSION
The stupendous growth of the internet
aspect
of
modern
computing
REFERENCES
1] www.rsasecurity.com
3] www.itsecurity.com
4] www.cryptographyworld.com
5] Introduction to network security and
computing by Perlman, Kauffmann.
6] Computer network security by
Raymonds
11
CRYPTOGRAPHY
12