Professional Documents
Culture Documents
Need of Cryptography Types of Attacks Techniques of Cryptography Encryption Algorithm
Need of Cryptography Types of Attacks Techniques of Cryptography Encryption Algorithm
o Introduction
o Need of Cryptography
o Types of Attacks
o Techniques of Cryptography
o Encryption Algorithm
• Symmetric
• Asymmetric
o Digital Signature
o Conclusion
INTRODUCTION
What is Cryptography?
“Hidden Writing”
Goal of Cryptography
Integrity
Authentication
Nonrepudiation
Access Control
Availability
TYPES OF ATTACKS
A General View
A Technical View
ENCRYPTION DECRYPTION
CIPHER
TEXT
SENDER RECEIVER
Caesar Cipher
Monoalphabetic Cipher
Homophonic Cipher
Polyalphabetic Cipher
Transposition Technique
Asymmetric
Key pairs for encryption and decryption
Key
Original
Plaintext Ciphertext Plaintext
Encryption Decryption
Symmetric Cryptosystem
ASYMMETRIC ALGORITHM
Private keys are used for decrypting.
Public keys are used for encrypting
encryption
plaintext ciphertext
public key
decryption
ciphertext plaintext
private key
COMPARISON
Secret Key (Symmetric) Public Key (Asymmetric)
Number of Key 1 2
Protection of Key Must be kept secret One key must be kept secret
& other can be freely
exposed
Best Uses secrecy and integrity of Key exchange, authentication
data
International
Data Encryption
Algorithm(IDEA):
128 bits key
DATA ENCRYPTION STANDARD
Developed by IBM and it is known as the Data Encryption
Standard
It is also known as Data Encryption Algorithm
LPT RPT
Final Permutation
Key Transformation
Expansion Permutation
S- box Substitution
P- box Permutation
DISADVANTAGES OF DES:
Knapsack Algorithm:
n=p.q
m = (p-1)(q-1)
Message M < n.
Encryption key = (a , n).
Disadvantage
Digital Signature
Certificate
Office equipment
CONCLUSION
RSA finds its strongest application when parties
who have no prior relationship want to share
sensitive data with each other.
Thus , even though slower as compared to
symmetric algorithms it is & will be widely used as it
can be used in digital signature for long haul
transmission.