Professional Documents
Culture Documents
• Cryptography vs Encryption
• Cryptography and History of Cryptography • States of Digital Data and Cryptography
• Let us do some encoding and decoding • Cryptography Protocols
learn with kp
Cryptography vs Encryption
Ciphertext
Encryption Decryption
CRYPTOGRAPHY
Cryptography refers to the technique or practice of securing data and communications.
Encryption is the process through which cryptographers transform secure data into code
learn with kp
Cryptography and History of Cryptography
Encryption is the method by which information is
converted into secret code
that hides the information's true meaning. The
science of encrypting and decrypting information
is called cryptography. Encryption is a subset of
cryptography.
learn with kp
Lets Encrypt using Enigma Machine
world war two that created strong encrypted messages, the role of
Challenge:
•Decode the following :
qxmdi qmame fin
Model: Enigma M3
Reflector: UKW B
Rotor values : VI,I,III (Default)
Position: S, A, A
Ring: 1,1,1 (Default)
learn with kp
Let’s Decrypt
learn with kp
You are awesome
Journey towards modern cryptography
learn with kp
Symmetric and asymmetric Encryption simplified
It is Simple!
learn with kp
Symmetric Cryptography
Symmetric encryption uses a Single Shared Key to encrypt data and provides fast and
efficient encryption between sender and receiver.
Symmetric Encryption
Symmetric Algorithms
•Data Encryption Standard (DES), Advanced Encryption Standard (AES)
•Blowfish, RC4
•International Data Encryption Algorithm (IDEA)
learn with kp
Advantages and Disadvantages - Symmetric Cryptography
Advantages Symmetric Cryptography
•Encrypted data can be transferred on the link even if there is a possibility that the data
will be intercepted.
•Since there is no key transmitted with the data, the chances of data being decrypted are
very less.
•The system only which possesses the secret key can decrypt a message
learn with kp
•Securely generating, managing and distributing the secret key is a challenge
Asymmetric Cryptography
Symmetric cryptography uses two keys that are mathematically related. Asymmetric
cryptography also called as public key cryptography
Asymmetric Cryptography
Asymmetric Algorithms
•RSA, DSA, Ellipic Curve
•Diffie-Hellman key exchange, Ed225519 signing, X448 key exchange
learn with kp
Asymmetric Cryptography - PKI for Digital Certificate in details
learn with kp
States of Digital Data and Cryptography
Of the Data:
• In Motion (Transit)
• In Use (currently accessed)
• At Rest (stored)
learn with kp
Cryptography - Protocols
In Motion (Transit) :
Where the data moving from one location to another.
In Use (currently accessed) :
Source & Destination Example Can be Encrypted Using
Where the data is in use.
Computer Devices Emails SSL/TLS
services Files Uploads HTTPS Source
virtual machines File Downloads IPSec
applications Instant Messages WEP, WPA, Computer Devices
Networks TKIP, CCMP Database Servers
Wireless Points PGM/MIME virtual machines
Example
Authentication Mechanism
Source Example Can be Encrypted Using • Single Sign-On
Computer Devices • Kerberos
Cloud Storage Assets Data in a Disk AES • MFA (eg : R S A)
Files and File Archives Data in Virtual Drives • Secure Virtualization (SEV)
USB or any other device Data any Devices • Encrypt RAM in Use
learn with kp
Practical Application / Integration of Cryptography
learn with kp
Encryption in different layers
learn with kp
Can a hacker bypass encryption ?
➢ Key Theft :
➢ The easiest way for a hacker to bypass encryption schemes is simply to steal the key. If a
hacker manages to plant a keylogger on your system, he can record your activities,
malware enable the controller to browse the contents of your hard drive, so if you store
cryptographic keys and passwords in plain text, they could be vulnerable. Keeping your
operating system, firewall and anti-malware programs up to date can help prevent this
type of attack.
learn with kp
Can a hacker bypass encryption ?
➢ Password Security:
➢ Hackers can find ways around hashed password databases, however. Since the
algorithms that convert these passwords are easy to discover, a hacker can hash
common words and look for matches in the database. If he hashes “password” and
prevent these kinds of attacks, use complex passwords that don't appear in the
dictionary, and sites can add “salts," or randomly chosen numeric values, to the
learn with kp
Can a hacker bypass encryption ?
➢ Using broken or weak cryptographic algorithms can leave data vulnerable to being
means that
➢ encrypted or hashed data is less secure than it appears to beA weak cipher is
opens up the possibility (or probability) that the encryption scheme could be
➢ Digital Signature
➢ Hashing
➢ VPN
➢ RSA Token
learn with kp
SSL and HTTPS
learn with kp
Digital Signature
learn with kp
Hashing
learn with kp
VPN
learn with kp
RSA Token
learn with kp
WhatsApp
learn with kp
Why TLS 1.3 is recommended over TLS 1.2
learn with kp
Thank You
This document has been prepared by
referring many resources that includes
standards, frameworks, tutorials, product
websites, knowledge sharing portals. To
Many graphics adapted from various
websites with an aim to explain it simple
and clear.