Professional Documents
Culture Documents
com
Abstract
Everyone has secrets; some have more than others. When it becomes necessary to transmit those secrets from one point to another, it's important to protect the information while it's in transit. There are many aspects to security and many applications, ranging from secure commerce and payments to private communications and protecting passwords. One essential aspect for secure communications is that of cryptography. In the past, cryptography is heavily used for military applications to keep sensitive information secret from enemies. Cryptography presents various methods for taking legible, readable data, and transforming it into unreadable data for the purpose of secure transmission, and then using a key to transform it back into readable data when it reaches its destination. The most secure techniques use a mathematical algorithm and a variable value known as a 'key'. Cryptography uses a single key to encrypt i.e. changing data so that it is unrecognizable and useless to an unauthorized person and decrypt a message i.e. changing it back to its original form. There are several ways of classifying cryptographic algorithms Secret Key Cryptography, which uses a single key for both encryption and decryption. Public Key Cryptography, which uses one key for encryption and another for decryption. Hash Functions uses a mathematical transformation to irreversibly "encrypt" information. The goal of cryptography extends beyond merely making data unreadable; it also extends into user authentication, Privacy/confidentiality, Integrity, Non-repudiation.
Cryptography
Cryptography is the study of mathematical techniques related to aspects of information security. Information security deals with several different "trust" aspects of information. Another common term is information assurance. Information security is not confined to computer systems, nor to information in an electronic or machine-readable form. It applies to all aspects of safeguarding or protecting information or data, in whatever form. Cryptography can also be defined as the science and art of manipulating massege to make them secure.In this the original message to be transformed is called the plaintext and resulting message after transformation is called the ciphertext.
Cryptography plays an essential role in, Authentication: The process of proving ones identity. Privacy/confidentiality: Ensuring that no one can read the message except the intended receiver. Integrity: Assuring the receiver that the received message has not been altered in any way from the original. Non-repudiation: A mechanism to prove that the sender really sent this message. www.1000projects.com www.fullinterview.com www.chetanasprojects.com 2
Types Of Cryptographic Algorithms: There are several ways of classifying cryptographic algorithms. They will be categorized based on the number of keys that are employed for encryption and decryption, and further defined by their application and use. The three types of algorithms that will be discussed are: Secret Key Cryptography (SKC): Uses a single key for both encryption and decryption Public Key Cryptography (PKC): Uses one key for encryption and another for decryption Hash Functions: Uses a mathematical transformation to irreversibly "encrypt" information
Secret key cryptography schemes are generally categorized as being either stream ciphers or block ciphers. Block Ciphers A block cipher transforms a fixed-length block of plaintext into a block of cipher text of the same length, using a secret key. To decrypt, the reverse process is applied to the cipher text block using the same secret key. www.1000projects.com www.fullinterview.com www.chetanasprojects.com 4
www.1000projects.com www.fullinterview.com www.chetanasprojects.com Stream Ciphers Stream ciphers are typically much faster than block ciphers. A stream cipher generates a key stream (a sequence of bits or bytes used as a key). The plaintext is combined with the key stream, usually with the XOR operation.
and a permutation.
C 0
PC1
D 0
LH S
LH S PC2 D 1 LH S PC2 K6 1 K 1
DES Algorithm
Public-key cryptography:
Public-key cryptography is based on the notion that encryption keys are related pairs, private and public. The private key remains concealed by the key owner; the public key is freely disseminated to various partners. Data encrypted using the public key can be decrypted only by using the associated private key and vice versa. Because the key used to encrypt plaintext is different from the key used to decrypt the corresponding cipher text, public-key cryptography is also known as asymmetric cryptography.
Receiver
Receiver
www.1000projects.com www.fullinterview.com www.chetanasprojects.com Only the private key must be kept secret Relatively long life time of the key Relatively efficient digital signature mechanisms Smaller verification key Low data throughput Much larger key sizes
Disadvantages:
Decryption: www.1000projects.com www.fullinterview.com If c is the cipher www.chetanasprojects.com text, the decoding a* is a* = c^d(mod n)a*
Application of cryptography:
Secure Communication: Secure communication is the most straightforward use of cryptography. Two people may communicate securely by encrypting the messages sent between them. This can be done in such a way that a third party eavesdropping may never be able to decipher the messages Identification and Authentication:
www.1000projects.com www.fullinterview.com www.chetanasprojects.com Identification capable of password-based identification with more (secure) methods powerful techniques. is replacing
Authentication is similar to identification, in that both allow an entity access to resources but authentication is broader because it does not necessarily involve identifying a person or entity. E-commerce: E-commerce carry out the secure transaction over an insecure channel like internet
Digital Signatures: sDigital Signatures allows electronically sign (personalize) the electronic
Summary
www.1000projects.com www.fullinterview.com www.chetanasprojects.com 9
www.1000projects.com www.fullinterview.com www.chetanasprojects.com Cryptography is the gold standard for security. It is used to protect the transmission and storage of data between two parties by encrypting it into an unreadable format. Cryptography has enabled the first wave of secure transmissions, which has helped fuel the growth of transactions like shopping, banking, and finance over the world's biggest public network, the Internet. The study of cryptography is advancing steadily, and scientists are rapidly creating mechanisms that are more difficult to break. The most secure type of cryptography yet may be quantum cryptography, a method that has not yet been perfected, which instead of using a key, relies on the basic laws of physics, and the movement and orientation of photons to establish a connection that is absolutely secure and unbreakable.
10
Contents
1. Abstract..1 2. Cryptography.2 3. Types Of Cryptographic Algorithms4 4. Secret key cryptography ...5 5. Secret key cryptography algorithms (DES).6 6. Public-key cryptography7 7. Public-key cryptography algorithms (RSA).8 8. Application of cryptography..10 9. Summery...12
11
13