Professional Documents
Culture Documents
WITH APPLICATIONS
Name : Parth Sarthi Singh
Tanmay Sharma
Branch : Computer Science Engineering
Year : III Semester : VI
CRYPTOGRAPHY
• The primary responsibility of this position is to study, research, and test novel cryptology
ideas and applications.
• Ensures that message transmission data (wireless network, secure telephone, cellphones,
email, and so on) is not accessed or altered unlawfully while in transit.
• For military, political, and law enforcement forces, capable of interpreting obscure signals and coding
schemes.
• Create statistical and mathematical models for data analysis and solving security-related problems.
• In cryptographic security systems and algorithms, evaluate, analyze, and target flaws.
• An encryption system in which the sender and receiver of a message share a single,
common key that is used to encrypt and decrypt the message. The most popular
symmetric–key system is the Data Encryption Standard (DES).
ASYMMETRIC KEY CRYPTOGRAPHY
• Public key - two keys are used one key is used for encryption and another key is used
for decryption. One key (public key) is used for encrypt the plain text to convert it
into cipher text and another key (private key) is used by receiver to decrypt the
cipher text to read the message.
• Private key - the same key (secret key) is used for encryption and decryption. In this
key is symmetric because the only key is copy or share by another party to decrypt
the cipher text. It is faster than the public key cryptography.
RSA
• But e Must be
• An integer.
• Not be a factor of n.
• 1 < e < Φ(n) [Φ(n) is discussed below],
• Let us now consider it to be equal to 3.
• Our Public Key is made of n and e
GENERATING PRIVATE KEY
• In ElGamal system, each user has a private key x. and has three components of public
key − prime modulus p, generator g, and public Y = gx mod p. The strength of the
ElGamal is based on the difficulty of discrete logarithm problem.
• The secure key size is generally > 1024 bits. Today even 2048 bits long key are used.
On the processing speed front, Elgamal is quite slow, it is used mainly for key
authentication protocols.
• Due to higher processing efficiency, Elliptic Curve variants of ElGamal are becoming
increasingly popular.
ELLIPTIC CURVE CRYPTOSYSTEM (ECC)
• It is believed that the discrete logarithm problem is much harder when applied to points
on an elliptic curve. This prompts switching from numbers modulo p to points on an
elliptic curve. Also an equivalent security level can be obtained with shorter keys if we
use elliptic curve-based variants.