Professional Documents
Culture Documents
K.Divya JNTUH-126
AGENDA
History
Hashing
Attacks on Cryptosystems
Cryptography 2
What is Cryptography
Cryptography is the study of mathematical techniques related to aspects of information security such as confidentiality, data integrity, authentication, and nonrepudiation
Cryptography
Contd..
Hidden writing.
Cryptography
Cryptography
Cryptography
Jargon
Plaintext A message in its natural format readable by an attacker
Cipher text Message altered to be unreadable by anyone except the intended recipients
Key Sequence that controls the operation and behavior of the cryptographic algorithm
Plain text
Cryptography
Cipher Text
Cryptography
10
Cryptography
Cryptography
11
Cryptographic Methods
Symmetric Same key for encryption and decryption Key distribution problem
Asymmetric Mathematically related key pairs for encryption and decryption Public and private keys
Cryptography
12
Symmetric Algorithms
DES Modes: ECB, CBC, CFB, OFB, CM
3DES
AES
IDEA
Blowfish
Cryptography
13
Asymmetric Algorithms
Diffie-Hellman RSA El Gamal Elliptic Curve Cryptography (ECC)
Cryptography
14
DES
This has been a US government standard for many years (although recently complimented with AES).
It uses a 64-bit key (actually, only 56 bits are used for the encryption, the other 8 bits are parity bits), so it is no longer viable.
Increased processing speeds (in recent years) are making brute force attacks on DES more viable
Cryptography
15