You are on page 1of 9

Cryptography

Name: T Sampathkumar Name: Sudeep


Year: III/IV CSE , Year: III/IV CSE,
e-mail: sampaththatikonda@rocketmail.com e-mail : sudeep4u_lp@yahoo.com

ABSTRACT

This paper introduces Cryptography All these methods and means of communication
Techniques. Cryptography is “The science of have
protecting data” & Network Security played an important role in our lives, but in the
“keeping information private and Secure from
unauthorized Users”.
past
This paper gives the Fundamental few years, network communication, especially over
Requirements for the Data Transmission, the the Internet, has emerged as one of the most
security attacks like Interruption, powerful
Interception and Modification of the data Methods of communication with an overwhelming
Transmission. The Cryptographic Process Impact on our lives. Such rapid advances in
explaining through a generalized function is Communications technology have also given rise
discussed through which encryption and
to
decryption is done by the various algorithms
like RSA algorithm, Hash Functions and
Security threats to individuals and organizations.
many cryptographic algorithms.
Fundamental Requirements
Introduction
Confidential: Is the process of keeping
The Cryptanalysis is the process of information
attempting to discover the plain text and/ or private and Secret so that only the intended
the key. recipient
Applications of Various is able to understand the information.
Cryptographic Technologies. Authentication: Is the process of providing proof
of
Why & How to Provide Network Security in the identity of the sender to the recipient, so that the
Certificates issuing, The Validity & Trust for recipient can be assured that the person sending
Certificate the
Services, Certificate Revocation in the Internet, information is who and what he or she claims to
Intranet and other Network Communications, the be.
Applications of Network Security to the various Integrity: Is the method to ensure that information
Data is
Transfer techniques and protocols. not tampered with during its transit or its storage
From the dawn of civilization, to the highly on
networked societies that we live in Today the network. Any unauthorized person should not
communication has always been an be
integral part of our existence. able to tamper with the information or change the
· Radio communication Information during transit Non-repudiation: Is the
· Network communication method to ensure that information cannot be
· Mobile communication disowned. Once the non-repudiation
· Telephonic communication
process is in place, the sender cannot
deny being the originator of the data.

source destination What is Cryptography?

The term cryptology has its origin in Greek


Kryptós lógos , which means “hidden word.”
Cryptography is the science of protecting data,
which
provides means and methods of converting data
into
Unauthorized user unreadable form, so that Valid User can access
Information at the Destination. Cryptography is the
science of using mathematics to encrypt and
Security Attacks decrypt
data. Cryptography enables you to store sensitive
Interruption: In an attack where one or more of information or transmit it across insecure networks
the (like the Internet) so that it cannot be read by
systems of the organization become unusable anyone
due to except the intended recipient. While cryptography
attacks by unauthorized users. This leads is
to systems the science of securing data, cryptanalysis is the
being unavailable for use. science of analyzing and breaking secure
communication. Cryptanalysts are also called
Interception: An unauthorized individual attackers. Cryptology embraces both cryptography
intercepts and cryptanalysis.
the message content and changes it or uses it
for malicious purposes. After this type of attack, Cryptography Terminology
the message does not remain confidential.
a) Plaintext: The original intelligible message.
Modification: The content of the message is b) Cipher text: The transformed message.
modified c) Cipher: An algorithm for transforming an intelligible
by a third party. This attack affects the integrity of message to unintelligible by transposition.
the message. So for maintaining the data d) Key: Some critical information used by the cipher,
secretly while known only to the sender & receiver.
communicating data between two persons or e) Encipher :( Encode) the process of converting
two organizations data is to be converted to plaintext to cipher text using a cipher and a key.
other format f) Decipher :( Decode) the process of converting
and the data is to be transmitted. So now we cipher text back into plaintext using a cipher & key.
deal with g) Cryptanalysis: The study of principles and methods of
the Cryptography which is process of transforming an unintelligible message
transmitting data securely without any
interruption. Network security is the security of
data transmission in the communication.
back into an intelligible message without h) Cryptology: Both cryptography and
knowledge of the key. Also called code breaking cryptanalysis
i) Code: an algorithm for transforming an are being built as distributed applications, the
intelligible physical
message into an unintelligible one using codes. security model has lost its significance. The advent
j) Hash algorithm: Is an algorithm that converts of
text the internet and the web has raised the scale and
string into a string of fixed length. frequency of network Security threats.
k) Secret Key Cryptography (SKC): Uses a single
key for both encryption and decryption Common Security Threats
l) Public Key Cryptography (PKC): Uses one key
for Identity interception: It means that someone
encryption and another for decryption might
m) Pretty Good Privacy (PGP): PGP is a hybrid steal your identity and use it as their own.
cryptosystem. Masquerading. If you send your username and
n) Public Key Infrastructure (PKI): PKI feature is password in clear text form, someone might be
Certificate authority. able to
grab it from the network and use it elsewhere with
the
intention of perpetrating fraud.
Replay attack: They might capture your request of
withdrawing 1000 dollars from your Bank account
Network Security and
then replay that request over the network.
For Distributed computing Data interception and manipulation: If someone
· Logical set of services distributed over can read your credit card information while it is on
the network the
· Physical security model does not wire, they could cause a lot of trouble for you.
work anymore Repudiation: When someone performs a
For Internet and Web transaction
and then deny it later can be a big problem in
· Increase of security threat
ecommerce.
· More stringent security for Ecommerce For example, if you are manufacturer of something
and B2B and you received a 1 million dollar purchase
request from a customer, you will want to make
Why network security? sure that person does not deny it after the
transaction has been completed. We all know what
When networks were not that pervasive, that “denial of service” means.
is when computing devices were running in
their own Network Security Needs Security
Islands, it was rather easy to deal with Needs of an Enterprise
security. The
only thing they needed to do was to lock the door. · Single sign-on Internet and intranet
Now, as more and more computing devices are
getting connected and more and more applications · Controlled access to corporate
information
· Secure business transaction over
Internet
· Centralized, easy to use security
admin
tools · Transparency of security features
· Interoperable security systems
Key Process Techniques
· Various PKI schemes, Kerbos

Common Network Security Needs Symmetric-Key Encryption: One


Key
Symmetric-key encryption, also called shared-
· Authentication (Identity verification)
key encryption or secret-key cryptography, uses
· Access control (Authorization) a single key that both the sender and recipient
possess.
· Data confidentiality (Privacy) This key, used for both encryption and decryption,
· Data integrity (Tamper-proofing) is
called a secret key (also referred to as a
· Non-repudiation (Proof of transaction) symmetric
· Auditing key or session key). Symmetric-key encryption is
an
Cryptographic Process Basic Process efficient method for encrypting large amounts of
data.
M is the original message But the drawback is to transfer the Key to Receiver
K enc is encryption key as
M' is the scrambled message it is prone to security risks.
K dec is decryption key
It is “difficult” to get M just by knowing Public-Key Encryption: Two Keys
M' E and D are related such that E(K
enc , M) = M' Two keys—a public key and a private key, which
D(K dec , M') = M are mathematically related—are used in public-key
D(K dec , E(K enc , M)) = M Plaintext encryption. To contrast it with symmetric-key
—M Cipher text—M' Original encryption, public-key encryption is also
Plaintext—M sometimes
Decryption function—D called asymmetric-key encryption. In public-key
Encryption function—E encryption, the public key can be passed openly
So how does cryptographic process work? between the parties or published in a public
The idea is rather simple. Let's say you repository, but the related private key remains
have plaintext private.
M. By providing the encryption key and Data encrypted with the public key can be
the encryption decrypted
function you get cipher text, M'. The cipher only using the private key. Data encrypted with the
text can be private key can be decrypted only using the public
decrypted using a decryption function and a key. In Figure 1, a sender has the receiver's public
decryption key and the result is the original text. In key and uses it to encrypt a message, but only the
cryptographic process the mathematical property receiver has the related private key used to
is decrypt
such that it is practically impossible to derive the message.
M from
M' unless the key is known. Private Key Method
Public Key Method
Encryption is done with Public Key and
Decryption with another key called Private Key.
This
is called Public Key Cryptography. aside, the patent for RSA expired in September
2000
Public-key cryptography algorithms
which does not appear to have affected RSA's
RSA: The first, and still most common, popularity one way or the other.
PKC implementation, named for the three Diffie-Hellman: After the RSA algorithm
MIT mathematicians who developed it — Diffie and Hellman came up with their own
Ronald Rivest, algorithm.
Adi Shamir, and Leonard Adleman. RSA today is D-H is used for secret-key key exchange only, and
used in hundreds of software products and can not
be used for key exchange, digital signatures, or for authentication or digital signatures.
encryption of small blocks of data. RSA uses a
variable size encryption block and a variable size Digital Signature Algorithm (DSA): The
key. algorithm specified in NIST's Digital Signature
The key-pair is derived from a very large Standard (DSS), provides digital signature
number, n, capability
that is the product of two prime numbers for the authentication of messages.
chosen according to special rules; these primes
may be 100 Elliptic Curve Cryptography (ECC): A
or more digits in length each, yielding an n with PKC algorithm based upon elliptic curves. ECC
roughly twice as many digits as the prime can
factors. The offer levels of security with small keys comparable
public key information includes n and a to
derivative of RSA and other PKC methods. It was designed for
one of the devices with limited compute power and/or
factors of n; an attacker cannot determine memory,
the prime factors of n (and, therefore, the such as smartcards and PDAs
private key)
from this information alone and that is what Hash functions
makes the An improvement on the Public Key scheme is the
RSA algorithm so secure. (Some descriptions of addition of a one way hash function in the process.
PKC A one-way hash function takes variable length
erroneously state that RSA's safety is due to the input. In this case, a message of any length, even
difficulty in factoring large prime numbers. In thousands or millions of bits and produces a fixed-
fact, large prime numbers, like small prime length output; say, 160-bits. The hash function
numbers, only
have two factors!) The ability for computers to ensures that, if the information is changed in any
factor way
large numbers, and therefore attack schemes even by just one bit an entirely different output
such as value
RSA, is rapidly improving and systems today is produced.
can find Hash functions, also called message digests
the prime factors of numbers with more than 140 and one-way encryption, are algorithms that, in
digits. The presumed protection of RSA, some
however, is sense, use no key Instead; a fixed-length hash
that users can easily increase the key size value
to always is computed based upon the plaintext that makes it
stay ahead of the computer processing curve. impossible for either the contents or length of the
As an plaintext to be recovered. Hash algorithms are
typically used to provide a digital fingerprint of a means that it prevents the sender from claiming
file's that
contents often used to ensure that the file has he or she did not actually send the information.
not been altered by an intruder or virus. Hash These
functions features are every bit as fundamental to
are also commonly employed by many operating cryptography
systems so encrypt passwords. Hash functions, as privacy, if not more.
then, A digital signature serves the same purpose
help preserve the integrity of a file. as a handwritten signature. However, a
As long as a secure hash function is used, handwritten
there is no way to take someone's signature signature is easy to counterfeit. A digital signature
from one is
document and attach it to another, or to alter superior to a handwritten signature in that it is
a signed nearly
message in any way. The slightest change in impossible to counterfeit, plus it attests to the
a signed contents
document will cause the digital signature of the information as well as to the identity of the
verification signer.
process to fail.
Public-Key Encryption for Digital Certificates
Applications Of Cryptography Digital certificates, or cert., simplify the task
of establishing whether a public key truly belongs
1. Defense Services to
2. Secure Data Manipulation the purported owner. A certificate is a form of
3. E –Commerce credential. Examples might be your birth
4. Business Transactions certificate.
5. Internet Payment Systems Each of these has some information on it
6. Pass Phrasing identifying
7. Secure Internet Comm. you and some authorization stating that someone
8. User Identification Systems else
9. Access Control has confirmed your identity. Some certificates,
10. Computational Security such
11.Secure access to Corp Data as your passport, are important enough
12.Data Security. confirmation
of your identity that you would not want to lose
Public-Key Encryption for Digital Signatures them,
lest someone use them to impersonate you.
A major benefit of public key cryptography is that
it provides a method for employing digital Digital Certificate
signatures. Digital signatures enable the
recipient of A digital certificate is data that functions much like
information to verify the authenticity of the a physical certificate. A digital certificate is
information's origin, and also verify that the information included with a person's public key that
information is intact. Thus, public key digital helps others verify that a key is genuine or valid.
signatures provide authentication and data Digital certificates are used to thwart attempts to
integrity. A substitute one person's key for another.
digital signature also provides non-
repudiation, which A digital certificate consists of three things:
· A public key. · Certificate information. ("Identity"
information
about the user, such as name, user ID,
and Secret-key encryption algorithms (Symmetric
so on.) algorithms)
· One or more digital signatures. The
purpose of the digital signature on a certificate is to · DES (Data Encryption Standard) -- 56 bit
state that the certificate information has been key
attested to by some other person or entity. · Triple DES --112 bit key
· IDEA (International Data Encryption
The digital signature does not attest to Algorithm) --128bit key
the authenticity
of the certificate as a whole; it vouches only Public-key encryption algorithms (Asymmetric
that the algorithms)
signed identity information goes along with, or is
bound to, the public key. Thus, a certificate is Diffie-Hellman (DH): Exponentiation is easy
basically a public key with one or two forms of but computing discrete logarithms from the
ID attached, plus a hearty stamp of approval resulting
from some value is practically impossible
other trusted individual.

Cryptographic Technologies

Based on Layers
· Link layer encryption
· Network layer encryption
· IPSEC, VPN, SKIP RSA: Multiplication of two large prime
· Transport layer numbers is easy but factoring the resulting product
· SSL, PCT(Private Communication is
Technology) practically impossible
· Application layer
· PEM (Privacy Enhanced Mail)
· PGP (Pretty Good Privacy) Public Key Infrastructure (PKI)
· SHTTP
Cryptographic process can be implemented Introduction
at various
layers starting from the link Layer all the way up to The term public key infrastructure (PKI) is
the used to describe the policies, standards, and
application layer. The most popular encryption software
scheme is SSL and it is implemented at the that regulate or manipulate certificates and public
transport and
layer. If the encryption is done at the transport private keys. In practice, PKI refers to a system of
layer, digital certificates, certification authorities (CA),
any application that is running on the top of and
the transport layer can be protected. other registration authorities that verify and
authenticate the validity of each party
Based on Algorithms involved
in an electronic transaction. Standards for PKI
are still evolving, even as they are being
widely
implemented as a necessary element of certificate is in compliance with the
electronic commerce. This section will help you criteria established
understand what by the CA policy.
a PKI is and what services are required to build Certificate enrollment: The procedure that an
a PKI. end
entity follows to request and receive a certificate
PKI concepts on Certificates from
a CA. The certificate request provides identity
Certificate: A public key certificate is a digitally information to the CA
signed statement used for authentication and Certificate Revocation: Certificates have a
secure specified
exchange of information on the networks. lifetime, but CAs can reduce this lifetime by the
The issuer process known as certificate revocation. The CAs
and signer of the certificate is known as publishes a certificate revocation list (CRL) that
a certification lists
authority (CA). Certificate has No, Validity, Uses serial numbers of certificates that it considers no
of the Key pair (Public & Secret) longer usable.
Certification Authority: A certification authority Certificate Chain Validation: In a network, when
(CA) we
is an entity trusted to issue certificates to a generate a request for a new certificate, the
requesting information in that request is first passed from the
entity. A CA verifies the requester's information requesting program to Certificate Authority (CA)
according to the policy of the CA, and then uses then
its private key to apply its digital signature to the passes the appropriate data to a program known
certificate. as a
cryptographic service provider (CSP) A CSP is an
CA Policy: A CA issues certificates to requesters independent software module that performs
based on a set of established criteria. The set of cryptography operations, such as secret-key
criteria that a CA uses when processing exchange, digital signing of data, and public-key
certificate requests is referred to as CA policy. authentication. Chain-building mechanism
Typically, a CA attempts to
publishes its policy in a document known as a build a certification path (a certificate chain) from
Certification Practice Statement (CPS). the
end-entity certificate, such as a user certificate, up
Types of Certification Authorities to
a CA root certificate.
Self-signed CA: The public key in the certificate
and Attacking Cryptography Cryptanalysis
the key used to verify the certificate are the same
Subordinate CA: The public key in certificate and Cryptanalysis is the process of attempting to
the discover the plaintext and/ or the key. The types of
key used to verify the certificates are different. Cryptanalysis attacks are
Rooted CA: This is trusted unconditionally by a
client Differential Cryptanalysis Attack:
and is at top of a certification hierarchy.
Registration: Registration is the process by which The differential cryptanalysis attack looks
a specifically at
certificate is issued to the subject, provided pairs of cipher texts whose plaintext has some
that the
specific differences. It analyzes these
differences as
the plaintext propagates through various rounds describes the cryptographic concepts of symmetric
of Data Encryption Standards (DES) when they key
are encrypted with the same key. encryption, public-key encryption, types of
encryption algorithms, hash algorithms, digital
Linear Cryptanalysis Attack: signatures, and key exchange. The Cryptography
Attacking techniques like Cryptanalysis and Brute
Linear Cryptanalys is attack was invented by Force Attack. This Paper provides information of
Mitsuru Matsui in 1993. This method is based on Network Security Needs and Requirements.
the concept that if you XOR some of the plaintext Cryptography is a particularly interesting field
bits together, XOR some cipher text bits because of the amount of work that is, by
together, and then XOR the results, you will get a necessity,
single bit that is the XOR of some of the key bits. done in secret. The irony is that today, secrecy is
A large number of such plain/cipher texts pairs not
are used to guess the values of the key bits the key to the goodness of a cryptographic
algorithm.
Brute Force Attack Regardless of the mathematical theory behind an
algorithm, the best algorithms are those that are
The simplest attack to decipher a DES key is well known
the brute force attack. The brute force attack and well-documented because they are also
on the well-tested and well-studied! In fact, time is the
DES algorithm is feasible because of the only
relatively small key length (56 bit) and ever- true test of good cryptography; any cryptographic
increasing computational power of the computers. scheme that stays in use year after year is most
It can break likely
through any cipher by trying all keys that a good one. The strength of cryptography lies in
possibly exist. However, in brute force attacks, the
the time taken choice (and management) of the keys; longer keys
to break a cipher is directly proportional to the will resist attack better than shorter keys.
length
of the key. In a brute force attack, keys References:
are randomly · Cryptography and Network Security –By
generated and applied to the cipher text until the William Stallings.
legitimate key is generated. The Average Time · Introduction to Cryptography –By Aysel
Required for Exhaustive Key Search Ozgur
· www.en.wikipedia.org.
Conclusion · http://www-users.cs.umn.edu/
http:/
Cryptography protects users by providing
functionality for the encryption of data and
authentication of other users. This technology
lets the
receiver of an electronic message verify the
sender,
ensures that a message can be read only by the
intended person, and assures the recipient that a
message has not be altered in transit. This paper

You might also like