Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 14

REPORT

ON
CRYPTOGRAPHY

BY:
DEEPAK KRISHNA
08/ ME/08
MECHANICAL
FIEM, KOLKATA
CONTENTS

1. Introduction
2. Overview of Cryptography & its Application
3. Terminology
4. Cryptography Components
5. Symmetric key Cryptography
6. History of Public key Cryptosystem
7. Asymmetric key Cryptography
8. Asymmetric Algorithms
9. Working
10. Conclusion
11. Bibliography
INTRODUCTION

Cryptography is the science of information security. The word is


derived from the Greek  kryptos, meaning hidden. Cryptography
includes techniques such as microdots, merging words with images,
and other ways to hide information in storage or transit. Modern
cryptography intersects the disciplines of mathematics, computer
science, and electrical engineering. Applications of cryptography
include ATM cards, computer passwords, and electronic commerce.

Cryptology prior to the modern age was almost synonymous


with encryption, the conversion of information from a readable state
to apparent nonsense. The sender retained the ability to decrypt the
information and therefore avoid unwanted persons being able to
read it. Since WWI and the advent of the computer, the methods
used to carry out cryptology have become increasingly complex and
its application more widespread.

Modern cryptography follows a strongly scientific approach, and


designs cryptographic algorithms around computational hardness
assumptions, making such algorithms hard to break by an adversary.
Such systems are not unbreakable in theory but it is infeasible to do
so by any practical means. These schemes are therefore
computationally secure. There exist secure schemes that provably
cannot be broken--an example is the one-time pad--but these
schemes are more difficult to implement than the theoretically
breakable but computationally secure mechanisms.
Overview of Cryptography & Its Applications
People want and need privacy and security while
communicating. In the past, cryptography was heavily used for military
applications to keep sensitive information secret from
enemies (adversaries). Nowadays, with the technologic progress as our
dependency on electronic systems has increased we need
more sophisticated techniques. Cryptography provides most of the
methods and techniques for a secure communication

• Confidentiality:- the information cannot be understood by anyone for


whom it was unintended.

• Integrity :-the information cannot be altered in storage or transit


between sender and intended receiver without the alteration being
detected.

• Authentication :-the sender and receiver can confirm each others


identity and the origin/destination of the information.
Terminology

Cryptology: All-inclusive term used for the study


of secure
communication over non-secure channels.

Cryptography: The process of designing systems


to realize
secure communications over non-secure channels.
Cryptoanalysis: The discipline of breaking the
cryptographic
systems.

Coding Theory: Deals with representing the


information using codes. It covers compression,
secrecy, and error correction.
Cryptography components

• Encryption – It is a process of changing or converting normal text


or data information into gibberish text.

• Decryption – It is a process of changing or converting gibberish


text back to correct message or data by using encryption
method.
SYMMETRIC- KEY CRYPTOGRAPHY
• A single common encryption key is used to encode and decode
messages.

• Both sender and receiver must know the common key.

• The common key need to be exchanged before hand by some


other secure method.

• Symmetric encryption is simple and fast.

• But - key management is impractical with large number of


senders and receivers.
Asymmetric-key cryptography
• Asymmetric system under, which two different keys are used to
encrypt and decrypt the message or received data packet.

• On public key is used to encrypt the data or message and the


private key on receiving end is used to decrypt the message or
data packet.

• Each user has a Public key and a corresponding Private (secret)


key
WORKING

 Everybody selects its own public key P and private key S, and
publicizes P

 Therefore Alice has (Pa , Sa), and Bob has (Pb , Sb)

 Everybody knows Pa, Pb, …

 Suppose Alice wants to send a message to Bob.

 Alice encrypts the message with Bob’s public key Pb and sends
out.

 (only) Bob can decrypt the message using his private key Sb.
Nobody else can.
Asymmetric Algorithms
History of Public-Key
Cryptosystem

1970 – The public-key cryptography was


proposed by James Ellis, “The possibility of
non-secret encryption”. This paper was not
published
1973 – Clifford Cocks’ paper “a note on non-
secret encryption”, same as RSA
1976 – The idea of Public Key Cryptography
was put by Diffie and Hellman
1977 – Rivest, Shamir and Adleman invented
RSA Cryptosystem.
CONCLUSION
• Public-key cryptography
Increased security and
convenience.
• Public-key cryptography is
best suited for an open
multi-user environment.
• Symmetric encryption is
simple and fast.
• Unsymmetrical encryption is
the safest.
BIBLIOGRAPHY
1) www.wikipedia.com
2) www.rsasecurity.com

You might also like