0 Up votes0 Down votes

11 views33 pagesUntil modern times cryptography referred almost exclusively to encryption, which is the process of converting ordinary information (plaintext) into unintelligible gibberish (i.e., ciphertext).Decryption is the reverse, in other words, moving from the unintelligible ciphertext back to plaintext. A cipher (or cypher) is a pair of algorithms that create the encryption and the reversing decryption. The detailed operation of a cipher is controlled both by the algorithm and in each instance by a key. This is a secret parameter (ideally known only to the communicants) for a specific message exchange context. Keys are important, as ciphers without variable keys can be trivially broken with only the knowledge of the cipher used and are therefore less than useful for most purposes. Historically, ciphers were often used directly for encryption or decryption without additional procedures such as authentication or integrity

Mar 24, 2014

© © All Rights Reserved

PPTX, PDF, TXT or read online from Scribd

Until modern times cryptography referred almost exclusively to encryption, which is the process of converting ordinary information (plaintext) into unintelligible gibberish (i.e., ciphertext).Decryption is the reverse, in other words, moving from the unintelligible ciphertext back to plaintext. A cipher (or cypher) is a pair of algorithms that create the encryption and the reversing decryption. The detailed operation of a cipher is controlled both by the algorithm and in each instance by a key. This is a secret parameter (ideally known only to the communicants) for a specific message exchange context. Keys are important, as ciphers without variable keys can be trivially broken with only the knowledge of the cipher used and are therefore less than useful for most purposes. Historically, ciphers were often used directly for encryption or decryption without additional procedures such as authentication or integrity

© All Rights Reserved

11 views

Until modern times cryptography referred almost exclusively to encryption, which is the process of converting ordinary information (plaintext) into unintelligible gibberish (i.e., ciphertext).Decryption is the reverse, in other words, moving from the unintelligible ciphertext back to plaintext. A cipher (or cypher) is a pair of algorithms that create the encryption and the reversing decryption. The detailed operation of a cipher is controlled both by the algorithm and in each instance by a key. This is a secret parameter (ideally known only to the communicants) for a specific message exchange context. Keys are important, as ciphers without variable keys can be trivially broken with only the knowledge of the cipher used and are therefore less than useful for most purposes. Historically, ciphers were often used directly for encryption or decryption without additional procedures such as authentication or integrity

© All Rights Reserved

- VANET
- Coursework Definition Revised
- cryptography09
- unit-v-info-sec-question-ans-cs1014
- Anitha - Resume
- D4-EB-SECRUITY
- Presentation 1
- Security
- Result and Discussion
- Networksecurity.doc
- Public Key Cryptography
- Public Key
- 1169-2156-1-PB
- Cryptography
- Comparative Study of Private and Public Key Cryptography Algorithms a Survey
- Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
- cryptography-130910073000-phpapp02.pptx
- good.pdf
- Midterm Assignment 101016653
- An Approach to Provide Safety over cloud using Efficient Encryption

You are on page 1of 33

Abdullah Rashid Baig Adnan Haider Muhammad Zakria Muhammad Zeeshan Khan 10-Arid-270 11-Arid-803 11-Arid-829 11-Arid-843

It is derived from the Greek words kruptos means secret and graphia means writing. So cryptography means secret writing. Cryptography is the science of using mathematics to encrypt and decrypt data. Cryptography enables you to store sensitive information or transmit it across insecure networks (like the Internet) so that it cannot be read by anyone except the intended recipient. It is the science of analyzing and breaking secure communication.

Cryptography has long history. Actually dating back to the time of Julius Caesar. When Julius Caesar sent messages to his generals, he didn't trust his messengers. So he replaced every A in his messages with a D, every B with an E, and so on through the alphabet. Only someone who knew the shift by 3 rule could decipher his messages .

A cryptographic algorithm, or cipher, is a mathematical function used in the encryption and decryption process. A cryptographic algorithm works in combination with a key, a word, number, or phrase to encrypt the plaintext. The same plaintext encrypts to different cipher text with different keys. The security of encrypted data is entirely dependent on two things: the strength of the cryptographic algorithm and the secrecy of the key. A cryptographic algorithm, plus all possible keys and all the protocols that make it work comprise a cryptosystem . Cryptosystem is a system comprised of cryptographic algorithms, all possible plain text, cipher text, and keys. PGP is a cryptosystem.

PGP is an application and protocol for secure e-mail and file encryption developed by Phil R. Zimmermann. Originally published as Freeware, the source code has always been available for public scrutiny. PGP uses a variety of algorithms, like IDEA, RSA, DSA, MD5, SHA-1 for providing encryption, authentication, message integrity, and key management.

Data that can be read and understood without any special measures is called plaintext or clear text. The method of disguising plaintext in such a way as to hide its substance is called encryption. Encrypting plaintext results in unreadable text called cipher text.

The process of decoding data that has been encrypted into a secret format. Decryption requires a secret key or password. It is the reverse process of encryption. The process of reverting cipher text to its original plaintext is called decryption.

Unscrambled information to be transmitted. It could be a simple text document, a credit card number, a password, a bank account number or sensitive information such as payroll data, personnel information, or a secret formula being transmitted between organizations.

The result of strong cryptography is cipher text that is very difficult to decipher without possession of the appropriate decoding tool. The result of manipulating characters or bits via substitution transposition, or both.

Substitution Cipher

A substitution cipher substitutes one piece of information for another. This is most frequently done by offsetting letters of the alphabet.

Transposition Cipher

It is a method of encryption by which the positions held by units of plaintext (which are commonly characters or groups of characters) are shifted according to a regular system, so that the cipher text constitutes a permutation of the plaintext. That is, the order of the units is changed. Mathematically a bijective function is used on the characters' positions to encrypt and an inverse function to decrypt.

block Cipher

Block ciphers encrypt the information by breaking down into blocks. The blocks are of fixed size commonly of 64 bits.

Stream Cipher

Stream ciphers encrypt the bits of information one at a time. These are faster and smaller to implement than Block Ciphers. Stream ciphers operate on 1-bit of data at a time. If the same key stream is used, attacks may cause the information to be revealed.

Steganography

Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. The word steganography is of Greek origin and means "concealed writing" from the Greek words steganos meaning "covered or protected ", and graphia meaning "writing".

A mathematical value, formula or process that determine how a plaintext message is encrypted or decrypted. The key is the only way to decipher the scrambled information.

Secret Key Cryptography (SKC). Public Key Cryptography (PKC).

In secret key cryptography, a single key is used for both encryption and decryption. Secret key cryptography schemes are generally categorized as being either stream ciphers or block ciphers. Secret key is also called symmetric encryption.

Public key cryptography is an asymmetric scheme that uses a pair of keys for encryption: a public key, which encrypts data, and a corresponding private, or secret key for decryption. You publish your public key to the world while keeping your private key secret. Anyone with a copy of your public key can then encrypt information that only you can read. Even people you have never met. The publicly available component of an integrated asymmetric key pair often referred to as the encryption key.

A hash function takes variable-length input in this case, a message of any length, even thousands or millions of bits and produces a fixed-length output; say, 160-bits. The hash function ensures that, if the information is changed in any way even by just one bitan entirely different output value is produced. A function that produces a message digest that cannot be reversed to produced the original.

Advantages

The biggest advantage of public key cryptography is the secure nature of the private key. In fact it never needs to be transmitted or revealed to anyone. Another type of benefit of public key cryptography is that is provides a method for employing digital signatures. It enables the use of digital certificates and digital timestamps, which is a very secure technique of authorization .We will look at digital timestamps and digital signatures in a moment.

disAdvantages

Transmission time for documents encrypted public key cryptography are significantly larger than symmetric cryptography. In fact transmission of very large documents is prohibitive. The key sizes must be significantly larger than symmetric cryptography to achieve the same level of protection.

Confidentiality (secrecy)

Only the sender and intended receiver should be able to understand the contents of the transmitted message.

Authentication

Both the sender and receiver need to confirm the identity of other party involved in the communication

Data integrity

The content of their communication is not altered, either maliciously or by accident, in transmission.

Digital signatures enable the recipient of information to verify the authenticity of the informations origin, and also verify that the information is intact. A digital signature also provides nonrepudiation, which means that it prevents the sender from claiming that he or she did not actually send the information. These features are every bit as fundamental to cryptography as privacy, if not more. A digital signature serves the same purpose as a handwritten signature. However, a handwritten signature is easy to counterfeit. A digital signature is superior to a handwritten signature in that it is nearly impossible to counterfeit, plus it attests to the contents of the information as well as to the identity of the signer.

Availability

Timely accessibility of data to authorized entities.

Non-repudiation

Access control

An entity cannot access any entity that it is not authorized to

Anonymity

The identity of an entity if protected from others.

What is a passphrase?

A passphrase is a longer version of a password, and in theory, a more secure one. Typically composed of multiple words, a passphrase is more secure against standard dictionary attacks, wherein the attacker tries all the words in the dictionary in an attempt to determine your password. The best passphrases are relatively long and complex and contain a combination of upper and lowercase letters, numeric and punctuation characters. Your private key is totally and absolutely useless without your passphrase.

Attack could involve a specially tailored hostile computer virus or worm that might infect PGP or your operating system. This hypothetical virus could be designed to capture your passphrase or private key or deciphered messages and to covertly write the captured information to a file or send it through a network to the viruss owner.

Even if the attacker cannot read the contents of your encrypted messages, he may be able to infer at least some useful information by observing where the messages come from and where they are going, the size of the messages, and the time of day the messages are sent. This is analogous to the attacker looking at your long-distance phone bill to see who you called and when and for how long, even though the actual content of your calls is unknown to the attacker. This is called traffic analysis.

A kind of attack that has been used by well-equipped opponents involves the remote detection of the electromagnetic signals from your computer.

A calculated brute force attack to reveal a password by trying obvious and logical combinations of words.

- VANETUploaded byNabeel Shahood
- Coursework Definition RevisedUploaded byCreanga Florin
- cryptography09Uploaded byapi-3774860
- unit-v-info-sec-question-ans-cs1014Uploaded byN.Vivekananthamoorthy
- Anitha - ResumeUploaded byPrepare Interview
- D4-EB-SECRUITYUploaded byPrannay Seth
- Presentation 1Uploaded byUpasana Singh
- SecurityUploaded byShruti Gupta
- Networksecurity.docUploaded byRakesh
- Result and DiscussionUploaded bykkyasi
- Public Key CryptographyUploaded byTanusri Ghosh
- Public KeyUploaded bySherin Zafar
- 1169-2156-1-PBUploaded bySarvjeet Singh Sohal
- CryptographyUploaded byamukhopadhyay
- Comparative Study of Private and Public Key Cryptography Algorithms a SurveyUploaded byInternational Journal of Research in Engineering and Technology
- Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud StorageUploaded byNarendra Babu
- cryptography-130910073000-phpapp02.pptxUploaded byNatarajanBalasubramaniyan
- good.pdfUploaded bySandeep Pandey
- Midterm Assignment 101016653Uploaded byvasanthme
- An Approach to Provide Safety over cloud using Efficient EncryptionUploaded byEditor IJRITCC
- rajesh Term_Paper Format_CST (3).odtUploaded byrajesh kumar
- 2LQR Code for Private Message Sharing and Document AuthenticationUploaded byEditor IJRITCC
- 117DY - INFORMATION SECURITY.pdfUploaded byvenkiscribd444
- Common-Key Encryption in Duplex Server with Key Search for Reliable Distort StorageUploaded byAnonymous kw8Yrp0R5r
- Cns Lesson PlanUploaded bysujjarella pabba
- SteganographyUploaded byAbhijith Rangudu
- RsaUploaded byHarsh Modi
- 2018-757Uploaded bykowsalya
- Ch3 Cryptography and Public Key Infrastructure - CopyUploaded byGetachew Shambel
- 17BCE0735_VL2018195002798_PE003.pdfUploaded byNIPUN GUPTA 17BCE0249

- Case Studies of Business LawUploaded bySwapnil Kasar
- UNIT-6Uploaded byJinni Jinni
- Cakephp TestUploaded byhathanh13
- JVM Troubleshooting GuideUploaded byAndrei Maresu
- Addition and Subtraction of Algebraic ExpressionUploaded bynurhaiziinovasi
- Syron v.2008-2009.pdfUploaded byAsep Arus
- Cenzic Vulnerability Report 2014Uploaded bySamDunn
- Super Schools 1Uploaded byJim Briggs
- Mla Annotated Bibliography ExampleUploaded byitargeting
- Traffic Violations-SAHER Presentation EnglishUploaded byKhusro Siddiqui
- Colin ZS Bitgrail Chat Log TheBomberUploaded byAfufa Afufa
- HCT-I-008.pdfUploaded byEnelrahc Omz
- Bab 7.pdfUploaded byBaskara Putranto
- Plsql for AllUploaded byKamineni Kalyan Pavan Kumar
- Critical Thinking Assignment 2 PersonaUploaded bycharlie simo
- Ch7.TreesUploaded byUsama Lucky
- Final Solution of n Coins ProblemUploaded bySrijoni Maitra
- Swarma – A Women Safety DeviceUploaded byAnonymous kw8Yrp0R5r
- CSC Final Exam Study SheetUploaded byThess Dimalibot Bengua
- CCTV Related Questions.docxUploaded byAnil Bisht
- micro teach 4Uploaded byapi-319443853
- Super Street Fighter CommandUploaded byoverdrive0
- KondicIonalUploaded byMydays31
- Week7 MiniUploaded byeatspizza
- Sprint v. Precise Wireless - unlocking complaint.pdfUploaded byMark Jaffe
- Data MiningUploaded byahmed
- pmUploaded byamr
- Mcdonals.pdfUploaded byPancho1407
- Chap 1 Introduction to Computer SecurityUploaded byZorroX
- Defending Child Porn CasesUploaded byBrian Martin

## Much more than documents.

Discover everything Scribd has to offer, including books and audiobooks from major publishers.

Cancel anytime.