You are on page 1of 30

Introduction to

Cryptography

Dr. Arup Kumar Pal


Department of Computer Science & Engineering
Indian Institute of Technology (ISM) Dhanbad
Jharkhand-826004
E-mail: cryptography202021@gmail.com

Introduction to Cryptography Department of CSE, ISM Dhanbad 8/27/20 1


Outline
 Course Related Information
 Overview of Cryptography
 Secure Communications
 Cryptographic Techniques
 Cryptographic Attacks
 Conclusions

Introduction to Cryptography Department of CSE, ISM Dhanbad 8/27/20 2


Lecture Plan
Sl Topics Number of
No. Lectures
1 Introduction to Cryptography and Its Applications, Mathematical 6L
Tools for Cryptography, Classical Cryptosystems, Cryptanalysis of Classical
Ciphers
2 Private-Key Cryptosystems: Feistel Cipher, DES, Differential 10L
Cryptanalysis, AES, IDEA, CAST, RC4, RC5, Blowfish; Mode of
operations;
3 Public Key Cryptosystems: Knapsack cryptosystems, RSA; Attacks on 12L
RSA, Diffie-Hellman Key Exchange, Discrete Logarithm problem,
ElGamal cryptosystems, Elliptic Curve cryptosystems;
4 Cryptographic Hash functions: MD5, SHA-1, SHA-512, Birthday 6L
Attack, Message Authentication Codes, HMAC
5 Digital Signatures: RSA Signatures, ElGamal Signature, DSA, Blind 3L
Signatures
6 Key Establishment: Kerberos, X.509 Certificates. 2L
Total 39L

Introduction to Cryptography Dept. of CSE, IIT(ISM) Dhanbad 8/27/20 3


Useful Resources
1. Cryptography and Network Security by
Forouzan and Mukhopadhyay
2. Cryptography and Network Security by
William Stallings
3. Understanding Cryptography by Christof Paar
4. Introduction to Cryptography and Coding
Theory by Washington
5. Cryptography: Theory and Practice by Stinson

Introduction to Cryptography Dept. of CSE, IIT(ISM) Dhanbad 8/27/20 4


Evaluation
No Mid Term Examination
Four Quiz Test: 52 Marks (13 Marks Each)
End Semester Examination: 48 Marks
Duration of Each Quiz is 30 minutes
The Questions can be of MCQ type, True/False, fill in the blanks,
short answer questions or numerical problem.
The schedule for conducting quizzes is as below:
 Quiz I: 24 August 2020
 Quiz II: 07 September 2020

 Quiz III: 28 September 2020

 Quiz IV: 19 October 2020

• .

Introduction to Cryptography Dept. of CSE, IIT(ISM) Dhanbad 8/27/20 5


Why Information Security?
Information Security

Protection of Information Protection of Information Systems

Security
Between two parties
i.e., sender and
Broadcast Data storage
receiver environment environment

Introduction to Cryptography Department of CSE, ISM Dhanbad 8/27/20 6


Motivation for defining Cryptographic mechanism

Old Office

Recognition of Handwritte Sealing Locking a


handwriting of
n signature documents document
people known
to staff in the on in an in a filing
office documents envelope cabinet

Introduction to Cryptography Department of CSE, ISM Dhanbad 8/27/20 7


Motivation for defining Cryptographic mechanism

Modern Office

Electronic Receiver Electroni


Email
file have not
been
received from can read c
genuine users
altered an email payment

Introduction to Cryptography Department of CSE, ISM Dhanbad 8/27/20 8


Overview of Cryptography
 People want and need privacy and security
while communicating.
 Introduced by Julius Caesar for communicating
with army men during war (a simple fixed-
length shift cipher technique).
 Nowadays, complex substitution and
mathematical operations are used in
cryptographic techniques.

Introduction to Cryptography Department of CSE, ISM Dhanbad 8/27/20 9


What is Cryptography?
• Traditionally, cryptography refers to
Study of encryption principles/methods
Transforming information in order to prevent unauthorized
people to read it.
Modern cryptography goes beyond encryption/ decryption to
include
Techniques for making sure that encrypted messages are not
modified during accessing time.
Techniques for secure identification/ authentication of
communication partners.
• Information needs to hidden from unauthorized access
(Confidentiality), protected from unauthorized change (integrity)
and available to an authorized entity (availability)

Introduction to Cryptography Department of CSE, ISM Dhanbad 8/27/20 10


Basic Terminology
Plaintext: original message to be sent. Could be text,
audio, image, etc.
Encryption/Decryption Algorithm: mathematical tool
(software) used to encrypt or decrypt
Key: A string of bits used by to encrypt the plaintext or
decrypt the ciphertext
Ciphertext: encrypted message. Looks like a random
stream of bits

Introduction to Cryptography Department of CSE, ISM Dhanbad 8/27/20 11


Secure Communications

Introduction to Cryptography Department of CSE, ISM Dhanbad 8/27/20 12


Purpose of Cryptography
Confidentiality: Only authorized entities are allowed to
view.
Integrity: Ensures the message was not altered by
unauthorized individuals.
Authentication: Validates the source of a message, to ensure
the sender is properly identified.
Nonrepudiation: Establishes sender identity so that the
entity cannot deny having sent the message
Access Control: Access to an object requires access to the
associated crypto keys in many systems (e.g. login)
Availability: Information should be available to authorized
parties at all times.

Introduction to Cryptography Department of CSE, ISM Dhanbad 8/27/20 13


Example

Introduction to Cryptography Department of CSE, ISM Dhanbad 8/27/20 14


Definition
 Cryptography: is the study of mathematical
techniques related to aspects of information security
such as confidentiality, data integrity, entity
authentication, and data origin authentication.
 Cryptanalysis: is the study of mathematical
techniques for attempting to defeat cryptographic
techniques, and more generally, information services
without knowing the key.
 Cryptology: is the study of Cryptography and
Cryptanalysis

Introduction to Cryptography Department of CSE, ISM Dhanbad 8/27/20 15


Categories of Cryptography
Based on the number of keys are used:
 Symmetric or private key cryptography: sender
and receiver use the same key
 Asymmetric or public key cryptography: sender

and receiver use different keys.

Introduction to Cryptography Department of CSE, ISM Dhanbad 8/27/20 16


Contd…

Introduction to Cryptography Department of CSE, ISM Dhanbad 8/27/20 17


Contd…
Symmetric or private key cryptography is a
natural concept.
Asymmetric or public key cryptography is
quite complex process. Its important facts are:
How can the decryption key and the encryption key
be related?
It is impossible to determine the decryption key
from the encryption key.

Introduction to Cryptography Department of CSE, ISM Dhanbad 8/27/20 18


• Regarding the type of operations:
 Substitution: each element in the plaintext is mapped
into each another element.
 Transposition: elements in the plaintext are rearranged.
 Product System: involve multiple stages of substitution
and transpositions.
• The way in which the plaintext is processed:
 Block Cipher: processes the input a block of elements at
a time (typically 64-bits)
 Stream Cipher: processes the input elements
continuously producing an element at a time

Introduction to Cryptography Department of CSE, ISM Dhanbad 8/27/20 19


Choosing Security Mechanisms
The following three points to be considered when
considering the use of any security mechanisms:
Appropriateness: Is it the right tool for the job?
Strength: Why put in an expensive burglar
alarm in situations where a warning sign would
suffice?
Cost: Does the security gain justify the costs?
(Cost can be measured in terms of ease of use
and efficiency of operation)

Introduction to Cryptography Department of CSE, ISM Dhanbad 8/27/20 20


Security Risks
We now consider the types of risk to which
information is typically exposed.
Risks to information can be assessed by
identifying different types of possible attacks
that can be applied.
These are Passive Attacks and Active Attacks

Introduction to Cryptography Department of CSE, ISM Dhanbad 8/27/20 21


Contd…

Passive Attacks ●
Unauthorised access of data


Unauthorised alteration of data

Unauthorised deletion of data
Active Attacks ●
Unauthorised transmission of data

Unauthorised prevention of access to data

Introduction to Cryptography Department of CSE, ISM Dhanbad 8/27/20 22


Cryptographic Security
Cryptographic Security is determined by the
ability to resist the cryptanalysis methods.
The performance of enciphering is measure
based on the following parameter:

Introduction to Cryptography Department of CSE, ISM Dhanbad 8/27/20 23


Contd…

Introduction to Cryptography Department of CSE, ISM Dhanbad 8/27/20 24


Contd…

Introduction to Cryptography Department of CSE, ISM Dhanbad 8/27/20 25


Key lengths and Keyspace
Size of Keyspace is the number of possible
different decryption keys in a cryptosystem.
In Symmetric Cryptosystems, if the key length is
k bits then the size of the Keyspace is 2 k

In Asymmetric Cryptosystems, it depends on


decryption key.
Keyspace should be large enough to prevent
exhaustive key search practically impossible.

Introduction to Cryptography Department of CSE, ISM Dhanbad 8/27/20 26


Cryptanalysis

Introduction to Cryptography Department of CSE, ISM Dhanbad 8/27/20 27


Requirements
Kerckhoff’s Principle
The only secrecy involved with a cryptosystem
should be the key
Unconditional security
No matter how much computer power is available,
the cipher cannot be broken since the ciphertext
provides insufficient information to uniquely
determine the corresponding plaintext
Computational security
Given limited computing resources the cipher cannot
be broken within desirable time span.

Introduction to Cryptography Department of CSE, ISM Dhanbad 8/27/20 28


Conclusions
Encryption converts a message into a form that is
unreadable by the unauthorized
Many tools are available and can be classified as
symmetric or asymmetric, each having advantages and
special capabilities
Strength of encryption tool dependent on key size but even
more dependent on following good management practices
Cryptography is used to secure most aspects of Internet
and Web uses that require it, drawing on extensive set of
protocols and tools designed for that purpose
Cryptosystems are subject to attack in many ways.

Introduction to Cryptography Department of CSE, ISM Dhanbad 8/27/20 29


!!!Thank You!!!

Introduction to Cryptography Department of CSE, ISM Dhanbad 8/27/20 30

You might also like