Professional Documents
Culture Documents
Cryptography-1
What is Cryptography?
Cryptography derived its name from a Greek
word called Kryptos which means Hidden
Secrets.
Cryptography is the practice and study of
hiding information. It is the Art or Science of
converting a plain clear data into an
unintelligible data and again retransforming
that message into its original form.
It provides Confidentiality, Integrity, Accuracy.
Decryption
The process of converting cipher text into a plain text is called
Decryption.
Consider
the following
example:
Example
Ceasars
Cypher
If the word to encrypt is SECRET using Caesars key value
of 3,
Then each character change to the third character of the
original character.
That is,
So starting with
ABCDEFGHIJKLMNOPQRSTUVWXYZ
and sliding everything up by 3, you get
DEFGHIJKLMNOPQRSTUVWXYZABC
Example(contd.)
So here, the plaintext, SECRET encrypts as
VHFUHW.
To allow someone else to read the cipher text(decrypt),
you tell them that the key is 3.
Assignment
Encrypt the text SUCCESS with key value as 5.
Ans:
So starting with
ABCDEFGHIJKLMNOPQRSTUVWXYZ
and sliding everything up by 5, you get
FGHIJKLMNOPQRSTUVWXYZABCDE
So, SUCCESS = XZHHJXX
Cipher Methods
Plaintext can be encrypted through bit stream or block
cipher method
Bit stream: each plaintext bit transformed into cipher bit
one bit at a time
Block cipher: message divided into blocks (e.g., sets of
8- or 16-bit blocks) and each is transformed into
encrypted block of cipher bits using algorithm and key
10
01100001 = a
01100010 = b
01100011 = c
Message 011000010110001001100011
Key
011111110111111101111111
Cypher text
000111100001110100011100
11
tiehssiatst!
12
Hash Functions
Mathematical algorithms that generate message
summary or digest to confirm message identity and
confirm no content has changed
Hash algorithms: publicly known functions that create
hash value
Used in password verification systems to confirm
identity of user
13
Cryptographic Algorithms
Often grouped into two broad categories, symmetric and
asymmetric; todays popular cryptosystems use hybrid
combination of symmetric and asymmetric algorithms
Symmetric and asymmetric algorithms distinguished by
types of keys used for encryption and decryption
operations
14
15
16
18
19
Data Encryption
Standards
DES
20
21
22
Triple DES
Can be broken in 2^56 operations if one has
23
Digital Signature
The main application of hash function is the digital
signature.
A digital signature is similar to a handwritten
signature and verifies the author, date, and time of
signature. The signature should also be able to
authenticate the content at the time of the signature.
The main requirements of a digital signature are:
It is unique to the sender.
It should be recognizable and verifiable.
Digital signature
The private-key signs (create) signatures, and the
public-key verifies signatures
Only the owner can create the digital signature,
hence it can be used to verify who created a
message.
The whole message is not signed, but just a digest
or hash of the message is signed.
Digital Certificates
A digital certificate is an electronic "passport" that
allows a person, computer or organization to
exchange information securely over the Internet
using the public key infrastructure (PKI).
A digital certificate may also be referred to as a
public key certificate.
26
27
28