Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 18

3/10/13

Click to edit Master subtitle style

CRYPTOGRAPHY
We need an efficient and simple way of securing the electronic documents from being read or used by people other than who are authorized to do it. Cryptography is a standard way of securing the electronic documents.

3/10/13

What is Cryptography?

3/10/13

The art of secret writing The art of protection using information The science of encrypting or hiding secrets Needed for confidentiality

3/10/13

Basic idea of Cryptography:


Basic idea of cryptography is to mumblejumble the original message into something that is unreadable or to something that is readable but makes no sense of what the original message is. To retrieve the original message again, we have to transform the mumble-jumbled message back into the original message again.

3/10/13

Encipher, encrypt Decipher, decrypt

Basic Terminologies used in Cryptography:


3/10/13

plaintext - the original message ciphertext - the coded message cipher - algorithm for transforming plaintext to ciphertext key - info used in cipher known only to sender/receiver encipher (encrypt) - converting plaintext to ciphertext decipher (decrypt) - recovering ciphertext from plaintext cryptography - study of encryption principles/methods cryptanalysis (codebreaking) - the study

NEED OF CRYPTOGRAPHY
The

3/10/13

main use of cryptography is mentioned below: Private or confidentiality Data integrity Authentication Non-repudation

1)

2)

3)

4)

BASICS OF CRYPTOGRAPHY ENCRYPTION:-Procedure to convert plain text into cipher text.

3/10/13

DECRYPTION:-Procedure to convert cipher text into plain text.

Ever

encryption and decryption has two aspects: the ALGORITHM and the KEY used for encryption and decryption.

3/10/13

Cryptographic Algorithms:
A cryptographic algorithms works in combination with a key (a number, word or phrase), to encrypt the plain text. Same plain text encrypts to different cipher texts for different keys.

3/10/13

Strength of a cryptosystems depends on the strength of the algorithm and the secrecy of the key.

KEYS:

A key is a value that works with a cryptographic algorithm to produce a specific ciphertext. Keys are basically really, really, big numbers . In public-key cryptography, the bigger the key, the more secure the ciphertext.

NOTE:
v v

The algorithm is usually known to everybody. The key makes the process secure.

Two Kinds of Cryptography Systems:

3/10/13

Asymmetric Symmetric key key cryptograph Symmetric Cryptograpcryptosystems use the same key (the secret key) to encrypt and decrypt a message. Symmetric y hy cryptosystems are also called as private key
cryptosystems.

Asymmetric cryptosystems: use one key (the public


key) to encrypt a message and a different key (the private key) to decrypt it. Asymmetric cryptosystems are also called as public key cryptosystems.

3/10/13

TYPES

OF SECRET KEY CRYPTOGRAPHY:-

3/10/13

STREAM CIPHERS:
Stream

ciphers operate on a single bit (byte or computer word) at a time, and implement some form of feedback mechanism so that the key is constantly changing. scheme encrypts one block of data at a time using the same key on each block.

BLOCK CIPHERS :
The

3/10/13

Symmetric Key Cryptographic Algorithms


The symmetric key cryptographic algorithms are as follow:a) DES b) TRIPLE-DES c) BLOWFISH d) IDEA e) RC4 f) RC5 g) TwoFish

PUBLIC KEY CRYPTOGRAPHIC ALGORITHMS: The Asymmetric(public key) key cryptographic algorithms are as follow:a) RSA b) Diffie-Hellman c) Elliptic curve

3/10/13

Brief

Introduction Of RC4

3/10/13

RC4

is a stream cipher designed by Rivest for RSA Data Security (now RSA Security). It is a variable key-size stream cipher with byteoriented operations. The algorithm is based on the use of a random permutation. Analysis shows that the period of the cipher is overwhelmingly likely to be greater than 10100. Eight to sixteen machine operations are required per output byte, and the cipher can be expected to run very quickly in software. Independent analysts have scrutinized the algorithm and it is considered secure.

Advantages of symmeric key - Simple: - Encrypt and decrypt your own files - Fast. - Uses less computer resources - Prevents widespread message security compromise Disadvantages of Symmetric key - Need for secure channel for secret key exchange: - Too many keys - Origin and authenticity of message cannot be guaranteed

3/10/13

3/10/13

Advantage of Asymmetric key - Convenience - Provides for message authentication: - Detection of tampering: - Provide for non-repudiation: Disadvantage of Asymmetric key - Public keys should/must be authenticated - Slow - Uses up more computer resources - Widespread security compromise is possible
-

Loss of private key may be irreparable

You might also like