Download as pdf or txt
Download as pdf or txt
You are on page 1of 12

CRYPTOGRAPHY

Learning Objectives

1) Upon completion of this material, you should be able to

2) Understand why maintenance of the information security program is needed on an ongoing basis

3) Recognize recommended security management models

4) Define a model for a full maintenance program

Agenda 5) Identify the key factors involved in monitoring the external and internal environment

1
INTRODUCTION
The art of war teaches us to rely not on the likelihood of the
enemy's not coming, but on our own readiness to receive him; not
on the chance of his not attacking, but rather on the fact that we
have made our position unassailable.
—The Art of War, Sun Tzu
What is Cryptography in information security?

• Cryptography derived its name from a Greek word called


“krypto’s” which means “Hidden Secrets”.
• Cryptography is the practice and study of hiding information. It is
the Art or Science of converting a plain intelligible data into an
unintelligible data and again retransforming that message into its
original form.
• It provides Confidentiality, Integrity, and Accuracy.
PURPOSE OF CRYPTOGRAPHY

Authentication: The process of proving one's identity. (The primary forms of


host-to-host authentication on the Internet today are name-based or address-
based, both of which are notoriously weak.)

Privacy/confidentiality: Ensuring that no one can read the message except


the intended receiver.

Integrity: Assuring the receiver that the received message has not been
altered in any way from the original.

Non-repudiation: A mechanism to prove that the sender really sent this


message.
Architecture of cryptography
SYMMETRIC CRYPTOGRAPHY VS ASYMMETRIC CRYPTOGRAPHY
.

Symmetric cryptography Asymmetric cryptography


• When communicating,
• Symmetric encryption
asymmetric encryption
employs a unique key that
employs a pair of public and
must get distributed among
private keys to encrypt and
the information recipients.
decode communications.
• It encrypts communication
using a key and decrypts the
message with the same key,
• It encrypts and decrypts the
message using two separate
making it more
keys.
straightforward but less
secure.
• It necessitates a secure
mechanism of passing the
• Although it is safer than
symmetric key encryption, it
key from one party to the
is considerably slower.
next.
• The encrypted text is the • The encryption text is the
same size or smaller than the same size or greater than the
plain text. plain text.
• When compared to
asymmetric key encryption, • In asymmetric key encryption,
symmetric key encryption resource utilization is high.
uses fewer resources.
What are the applications of cryptography in
information security?

There are various applications of


cryptography which are as follows −
ØSecrecy in Transmission −
ØSecrecy in Storage −
ØIntegrity in Transmission −
ØIntegrity in Storage −
ØAuthentication of Identity −
ØCredentialing Systems −
ØElectronic Signatures −
Symmetric and Public key
algorithms
The functions of cryptography are as follows
Ø Confidentiality
Ø Integrity
Ø Authenticity
Ø Non-repudiation

Ø Symmetric algorithm
Ø Symmetric Algorithm
Ø Public Key Algorithm
Ø Digital signature
Ø RSA
Ø Elliptic Curve Cryptography (ECC)
TYPES OF CRYPTOGRAPHIC ALGORITHMS
Attacks of cryptography

Cipher text only attack


§ The only data available is a target cipher text
Known plaintext attack
§ A target cipher text
§ Pairs of other cipher text and plaintext (say, previously broken or guessing)
Attacks of cryptography…

Chosen plaintext attacks


§ A target cipher text
• Can feed encryption algorithm with plaintexts and
obtain the matching cipher texts
Chosen cipher text attack
§ A target cipher text
§ Can feed decryption algorithm with cipher texts and obtain the matching
plaintext matching cipher texts
• A Q Q
&
& A

THANKS…!!!

You might also like