You are on page 1of 31

R K S E C U R I T Y A N D

N E T W O
CR Y P TO G R A P H Y

S. ROHIT
06631A0431
Under the guidance of
Mr.G.Ramu
Introduction
curity
Aspects of information se
Attacks &
Services
Cryptography
TOPICS Ancient techniques
public & private key
New trends
Eleptical curve &
Quantum cryptography
Network Security Model
Trusted Third
Party
Principal Principal
(sender) (receiver)

Security Security
transformation transformation

attacker
Important Services of Security
• Confidentiality, also known as secrecy

• Integrity

• Availability

• Authentication
Attacks
• Passive attacks
– Interception
• Release of message contents
• Traffic analysis
• Active attacks
– Interruption, modification, fabrication
• Masquerade
• Replay
• Modification
• Denial of service
Information Transferring
Attack: Interruption
availability

Cut wire lines,


Jam wireless
signals,
Drop packets,
Attack: Interception

secrecy

Wiring,
eavesdrop
Attack: Modification
integrity

Replaced
intercept
info
Attack: Fabrication
Ali: this is

Also called impersonation


Ali: this is integrity

Cryptography

Kryptós “ hidden ”
Gráphein “ to write ”

Secret (crypto-) writing (-graphy)


Conventional cryptosystem
x
Cryptanalyst
k

Message x y x
Encrypter Decrypter Destination
source
k Secure Channel

Key Y = Ek (X)
source
X = Dk (Y)
Cryptography in
Ancient Times
“shift index”.

shift index of 4 =>


A is encoded to E, V is encoded to Z,
B is encoded to F, W is encoded to A,
C is encoded to G, X is encoded to B,

and so forth………
Oops!

It is possible for an unauthorized person to


convert the ciphertext back to plaintext.
A Better Cryptosystem
digraph cipher:

Rather than encode one letter at a time,


we can encode blocks of letters at a time.
Digraph Cipher
1. Start with the plaintext
West Georgia

2. Add a random letter ‘x’ and break the


message into digraphs:
WE ST GE OR GI AX
Digraph Cipher
Next, we convert the digraphs to vectors in Z/26Z:
WE (23, 5)
ST (19, 20)
GE (7, 5)
OR (15, 18)
GI (7, 9)
AX (1, 24)
We encipher all the vectors at once using
matrix multiplication:
2 323 19 7 15 7 1 
  
3 45 20 5 18 9 24
9 20 3 6 15 22
=  
11 7 15 13 5 21
Converting these vectors back into
digraphs, we get the ciphertext
IKTGCOFMOEVU

Comparing the ciphertext


IKTGCOFMOEVU
with the plaintext
WESTGEORGIAX
Private Key Cryptography
The cryptosystems we have described so far is
private key cryptosystems.
Secret Key

Original
Plaintext Ciphertext Plaintext
Encryption Decryption

Symmetric (Single Key) Cryptography


Public Key Cryptography

Public Key Private Key

Original
Plaintext Ciphertext Plaintext
Encryption Decryption

Asymmetric (Two Key) Cryptography


How does Public Key
Cryptography Work?
We must have a trapdoor function.
“ function f which is easy to compute, but
whose inverse function f-1 is Computationally
infeasible ”
A Litt le Co m p u tatio n

This computer would take more than


3x1033 years to factor a 100 digit number by
its systematic method.
“Computationally infeasible”
New Trends
Elliptical Curve Cryptography
Quantum Cryptography
Heisenberg uncertainty principle and quantum
entanglement can be exploited in a system of
secure communication, often referred to as
"quantum cryptography"
Quantum Cryptography
Conclusion
NEW TRENDS of cryptography saves the messages
from the DANGEROUS CLUTCHES OF MESSAGE
HACKERS
Thank
you

You might also like