Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 11

APEX INSTITUTE OF TECHNOLOGY

COMPUTER SCIENCE & ENGINEERING


Bachelor of Engineering (Information Security)
Security and Cryptography
Abhishek Ankur(E12833)

Chapter 1.4: Symmetric DISCOVER . LEARN . EMPOWER


Cryptography
Security and Cryptography: Course Objective

• Recognize and predict attacks in a network.


• Review cryptographic algorithms, use of this algorithm to provide security.
• Design and evaluate algorithms for encryption and decryption techniques.
• Incorporate practical usage for the development of security algorithms and
protocols.
Chapter Course Objectives

● Exhibit knowledge to secure systems, protect personal data, and


1. secure computer networks in an organization through cryptography
using symmetric cryptography.

Chapter Course Outcomes


Understand and analyze symmetric key algorithm.

1.

3
Security and Cryptography: Course Objective

CO1 Analyze and design classical encryption techniques and block ciphers.
CO2 Understand and analyze symmetric key algorithm.
CO3 Analyze and design Hash and MAC algorithms and digital signatures.

CO4 Understand and analyze public-key cryptography, RSA and other public-key
cryptosystems.
CO5 Design network security schemes such as PGP, SSL, TLS. Understand and analyze
steganography and cryptanalysis.
Contents
• Symmetric Cryptography

• Substitution Cipher

• Transposition Cipher

5
SYMMETRIC CRYPTOGRAPHY
• Symmetric cryptography, known also as secret key cryptography, is the use of a single shared
secret to share encrypted data between parties.
• Ciphers in this category are called symmetric because you use the same key to encrypt and to
decrypt the data.
• In simple terms, the sender encrypts data using a password, and the recipient must know that
password to access the data.
• Symmetric encryption is a two-way process.
• With a block of plaintext and a given key, symmetric ciphers will always produce the
same ciphertext.
• Likewise, using that same key on that block of ciphertext will always produce the original
plaintext.
• Symmetric encryption is useful for protecting data between parties with an established shared key
and is also frequently used to store confidential data.
• For example, ASP.NET uses 3DES to encrypt cookie data for a forms authentication ticket.

6
SYMMETRIC CRYPTOGRAPHY
• Symmetric cryptography is best suited for bulk encryption because it is much faster than 
asymmetric cryptography. With symmetric cryptography:
• Both parties share the same key (which is kept secret).
• Before communications begin, both parties must exchange the shared secret key.
• Each pair of communicating entities requires a unique shared key.
• The key is not shared with other communication partners.
• NOTE: Other names: Secret key, Conventional Key, Session Key, File Encryption Key, etc.

7
SUBSTITUTION CIPHER
•Substitution technique is a classical encryption approach where the characters present in the initial
message are restored by the other characters or numbers or by symbols.

•If the plain text (original message) is treated as the string of bits, thus the substitution technique
would restore bit pattern of plain text with the bit pattern of cipher text.

•There are various types of substitution ciphers which are as follows

•Monoalphabetic Cipher

•Polyalphabetic cipher

•Caesar Cipher

•Playfair Cipher
8
TRANSPOSITION CIPHERS
The transposition technique is a cryptographic technique that converts the plain text to cipher text
by performing permutations on the plain text, i.e., changing each character of plain text for each
round.
It includes various techniques like the Rail Fence technique, Simple columnar transposition
technique, simple columnar transposition technique with multiple rounds, Vernam cipher, and book
Cipher to encrypt the plain text in a secure way.
• Rail-Fence Technique
• Rail-Fence is the simple Transposition technique that involves writing plain text as a sequence of
diagonals and then reading it row by row to produce the ciphertext.
Algorithm
• Step 1: Write down all the characters of plain text message in a sequence of diagnosis.
• Step 2: Read the plain text written in step 1 as a sequence of rows.

9
References
 TEXT BOOKS:
• T1: William Stallings, “Cryptography and Network Security ", Pearson Education, 2014.
• T2: Behrouz A. Ferouzan, “Cryptography & Network Security”, Tata McGraw Hill,2015.
 REFERENCE BOOKS:
• R1: Alfred J. Menenzes, Paul C. van Oorschot, Scott A, “Handbook of Applied Cryptography", CRC Press, 1997.
• R2: Jonathan Katz and Yehuda Lindell, “Introduction to Modern Cryptography”, CRC Press, 2007.

 COURSE LINKS:
• https://www.coursera.org/specializations/applied-crypto

 VIDEO LINKS:
• Lecture:- Introduction to Applied Cryptography
• https://crypto.stanford.edu/~dabo/courses/OnlineCrypto/

 WEB LINKS:
• Handbook of Applied Cryptography
• https://cacr.uwaterloo.ca › hac

10
THANK YOU

For Queries, Write at :


Abhishek.e12833@cumail.in

You might also like