Professional Documents
Culture Documents
Computer Science & Engineering: Apex Institute of Technology
Computer Science & Engineering: Apex Institute of Technology
1.
3
Security and Cryptography: Course Objective
CO1 Analyze and design classical encryption techniques and block ciphers.
CO2 Understand and analyze symmetric key algorithm.
CO3 Analyze and design Hash and MAC algorithms and digital signatures.
CO4 Understand and analyze public-key cryptography, RSA and other public-key
cryptosystems.
CO5 Design network security schemes such as PGP, SSL, TLS. Understand and analyze
steganography and cryptanalysis.
Contents
• Symmetric Cryptography
• Substitution Cipher
• Transposition Cipher
5
SYMMETRIC CRYPTOGRAPHY
• Symmetric cryptography, known also as secret key cryptography, is the use of a single shared
secret to share encrypted data between parties.
• Ciphers in this category are called symmetric because you use the same key to encrypt and to
decrypt the data.
• In simple terms, the sender encrypts data using a password, and the recipient must know that
password to access the data.
• Symmetric encryption is a two-way process.
• With a block of plaintext and a given key, symmetric ciphers will always produce the
same ciphertext.
• Likewise, using that same key on that block of ciphertext will always produce the original
plaintext.
• Symmetric encryption is useful for protecting data between parties with an established shared key
and is also frequently used to store confidential data.
• For example, ASP.NET uses 3DES to encrypt cookie data for a forms authentication ticket.
6
SYMMETRIC CRYPTOGRAPHY
• Symmetric cryptography is best suited for bulk encryption because it is much faster than
asymmetric cryptography. With symmetric cryptography:
• Both parties share the same key (which is kept secret).
• Before communications begin, both parties must exchange the shared secret key.
• Each pair of communicating entities requires a unique shared key.
• The key is not shared with other communication partners.
• NOTE: Other names: Secret key, Conventional Key, Session Key, File Encryption Key, etc.
7
SUBSTITUTION CIPHER
•Substitution technique is a classical encryption approach where the characters present in the initial
message are restored by the other characters or numbers or by symbols.
•If the plain text (original message) is treated as the string of bits, thus the substitution technique
would restore bit pattern of plain text with the bit pattern of cipher text.
•Monoalphabetic Cipher
•Polyalphabetic cipher
•Caesar Cipher
•Playfair Cipher
8
TRANSPOSITION CIPHERS
The transposition technique is a cryptographic technique that converts the plain text to cipher text
by performing permutations on the plain text, i.e., changing each character of plain text for each
round.
It includes various techniques like the Rail Fence technique, Simple columnar transposition
technique, simple columnar transposition technique with multiple rounds, Vernam cipher, and book
Cipher to encrypt the plain text in a secure way.
• Rail-Fence Technique
• Rail-Fence is the simple Transposition technique that involves writing plain text as a sequence of
diagonals and then reading it row by row to produce the ciphertext.
Algorithm
• Step 1: Write down all the characters of plain text message in a sequence of diagnosis.
• Step 2: Read the plain text written in step 1 as a sequence of rows.
9
References
TEXT BOOKS:
• T1: William Stallings, “Cryptography and Network Security ", Pearson Education, 2014.
• T2: Behrouz A. Ferouzan, “Cryptography & Network Security”, Tata McGraw Hill,2015.
REFERENCE BOOKS:
• R1: Alfred J. Menenzes, Paul C. van Oorschot, Scott A, “Handbook of Applied Cryptography", CRC Press, 1997.
• R2: Jonathan Katz and Yehuda Lindell, “Introduction to Modern Cryptography”, CRC Press, 2007.
COURSE LINKS:
• https://www.coursera.org/specializations/applied-crypto
VIDEO LINKS:
• Lecture:- Introduction to Applied Cryptography
• https://crypto.stanford.edu/~dabo/courses/OnlineCrypto/
WEB LINKS:
• Handbook of Applied Cryptography
• https://cacr.uwaterloo.ca › hac
10
THANK YOU