Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 27

INTRODUCTION

TO
CRYPTOGRAPHY

CHAPTER - 4
Humans and
Animals were used
to deliver
messages.
This was not a
safe way to send
secret messages.
So symbols or
coding was used
in later years by
the army specially
and now by e-com
ATMs etc.
A PARTICULAR SIGN CORRESPONDS TO
A PARTICULAR SUIT AND IS PREDEFINED
WHICH IS KNOWN TO BOTH.
WHEN A MESSAGE IS NOT UNDERSTOOD
BY ANY OTHER BUT THE RECEIVER IS
“CRYPTOGRAPHY”.
GREEK WORD = “KRYPTO” = “SECRET
WRITING”.
USED AT ATMS, COMPUTER PASSWORDS
AND E-COMMERCE.
ENCRYPTION ON ORIGINAL DATA CONVERTED INTO UNREADABLE
FORMATIS CALLED CIPHER TEXT.

DECRYPTION IS THE REVERSE PROCESS AT THE RECEIVING END.

A KEY IS USED FOR BOTH ENCRYPTION AND DECRYPTION.

A KEY MAY BE A WORD, A SYMBOL OR A COMPLETE TRANSFORMATION


FOR ALL THE CHARACTERS IN THE ORIGINAL TEXT.
substitution cipher: substituting one thing for another
– monoalphabetic cipher: substitute one letter for another

plaintext:
abcdefghijklmnopqrstuvwxyz
mnbvcxzasdfghjklpoiuytrewq
ciphertext:
E.g.: Plaintext: bob. i love you. alice
ciphertext: nkn. s gktc wky. mgsbc
Key: the mapping from the set of 26 letters to the
set of 26 letters
7
NEED FOR CRYPTOGRAPHY

• DATA AND ENTIRE SYSTEM SAFE FROM


UNAUTHORISED ACCESS.
• VERIFIES IDENTITY OF USER.
• USER’S PRIVILEGES.
• CHECK’S ILLEGAL MODIFICATION.
• E-COMMERCE TRANSACTION’S.
• TRANSMITION OF DATA THROUGH
INTERNET.
• TO PROTECT CONFIDENTIALITY.
What is of Cryptography ?
It’s Types

Plain Text Cipher Text Plain Text


A single key is used – secret key – Symmetric
Cryptography.
Agree on a key. - Eg. Key is BUSH
Message - Shoot at 83 degrees north

B U S H The Message Encrypted will be


1 4 3 2
s h o o St3rnho8gstoteerhadeo
St
t a t 8
3 d e g Which will decrypted in
r e e s reverse order in the same
n o r t tabular format as the
h plaintext table.
SOME SYMMETRIC ENCRIPTION
USED

• DES – Data • Camellia


Encryption Standard. • MISTY1
• AES – Advanced • SAFER - Secure and
Encryption Standard. Fast Encryption
• CAST – 128/256. Routine.
• IDEA – International • KASUMI.
Data Encryption • Skipjack.
Algorithm. • Two fish
• Blowfish • SEED.
SOME LIMITATIONS
• Organization to keep separate key for all
customers.
• Key is to distributed secretly and very
confidentially.
• The sender and receiver have to agree
on the same key.
Asymmetric
Public Key Cryptography
• 1976: W. Diffie and M.E. Hellman proposed the
first public-key encryption algorithms -- actually
an algorithm for public exchange of a secret
key.
• Overcome the limitation of Symmetric Key.
• Secure communication over a non-secure
communication channel.
• ATM uses PKC - private key to the customer –
Personal Identification Number.
• Two keys are used for this method, the
public key is used to encrypt. The private
key is used to decrypt. This is used when
it isn’t feasible to securely exchange keys.

Jay’s Public Key

Frank Encrypted
Message

Jay’s Private Key


Clear Text
Requirements:
1 need K ( ) and K ( ) such
that - +
K (K (m)) = m
B B
2 given public key K , it should be
impossible to compute private key K

RSA: Rivest, Shamir, Adelson algorithm


Private is
Public is called
called Decryption
Encryption key
key
Why more secure?
• Decryption key cannot be derived from encryption
key.
• Public Key Cryptography depends on one-way
function or mathematical functions.
• “Easy” to compute Me mod N and Cd mod N
• “Hard” to determine d, even given e and N! or
reverse the function.
• Suppose you know Bob’s public key (n,e). How
hard is it to determine d?
• Essentially need to find factors of n without
knowing the two factors p and q.
Digital Signatures
Cryptographic technique analogous to
hand-written signatures.
• sender (Bob) digitally signs document,
establishing he is document owner/creator.
• Goal is to authenticate and check for unaltered
message
• verifiable, nonforgeable: recipient (Alice) can
prove to someone that Bob, and no one else
(including Alice), must have signed document
21
Digital Signatures
Simple digital signature for message m:
• Bob- signs m by encrypting with -his private key
KB, creating “signed” message, KB(m)

Bob’s message, m - Bob’s private -


K K (m)
B key B
Dear Alice
Bob’s message, m,
Oh, how I have missed Public key signed (encrypted)
you. I think of you all the
time! …(blah blah blah)
encryption with his private key
algorithm
Bob

22
Alice verifies signature
Bob sends digitally and integrity of
signed message: digitally signed
message:
large
message H: Hash encrypted
m function H(m)
msg digest
-
KB(H(m))
Bob’s digital large
private signature message
key K - m Bob’s digital
(encrypt)
B public
signature
key K +
encrypted H: Hash B (decrypt)
msg digest function
-
+ KB(H(m))
H(m) H(m)

equal
? 23
Certification Authorities
• Certification authority (CA): binds public key to
particular entity, E.
• E (person, router) registers its public key with CA.
– E provides “proof of identity” to CA.
– CA creates certificate binding E to its public key.
– certificate containing E’s public key digitally signed by
CA – CA says “this is E’s public key”
Bob’s digital
+
public + signature K
B
key K B (encrypt)
CA
certificate for Bob’s
Bob’s private -
K public key, signed by
identifying key CA
CA 24
information
Certificates: summary
• Primary standard X.509 (RFC 2459)
• Certificate contains:
– Issuer name
– Entity name, address, domain name, etc.
– Entity’s public key
– Digital signature (signed with issuer’s private key)
• Public-Key Infrastructure (PKI)
– Certificates and certification authorities
– Often considered “heavy”
25
Advantages
• Helps prevent fraudulence and
impersonation and imposters.
• Robust computer based technology.
• Uses Asymmetric crypto system.
• The ensure integrity of the public key as a
third party is called for the verification.
• Visa and Master card have jointly developed
a protocol to check secure transactions on
the net.

You might also like