You are on page 1of 23

CRYPTOGRAPHY

“You can’t make something secure if you don’t


know how to break it”
-Marc Weber Tobias
Definition

• Cryptography is the science of


disguising messages so that
only the intended recipient can
decipher the received message.
Goal of Cryptography
Terminologies

• Encryption
• Decryption
• Plain Text
• Cipher Text
• Cryptanalysis
• Cryptology
Encryption and Decryption

Encryption and Decryption


✘ Encryption is the process of using an
algorithm to transform information into a format
that cannot be read.
✘ Decryption is the process of using another
algorithm to transform encrypted information
back into a readable format.
Encryption and Decryption

The original information is referred


to as the plain text while the
encrypted version is the cipher text.

PLAIN TEXT → CIPHER TEXT (Encryption)


CIPHER TEXT → PLAIN TEXT (Decryption)
Communicating Securely
Communicating Securely
Encryption and Decryption

Encryption and decryption are processes


performed in cryptography, which is
essentially about inventing cryptosystems
(also called cryptographic systems or cipher
systems).
Encryption and Decryption

• Breaking cryptosystems, on the other hand, is


part of cryptanalysis.

• Cryptography and cryptanalysis make up what


we refer to as cryptology.
Encryption and Decryption
Objectives of Encryption

• Confidentiality
• Integrity
• Authenticity
• Non-repudiation
METHODS OF
CRYPTOGRAPHY
Shift Cipher

It is the simple type of substitution


cipher
A shift cipher with key K operates by
shifting each letter K places to left.
Caesar’s Cipher

“If he had anything confidential to say,


he wrote it in cipher, that is, by so
changing the order of the letters of
the alphabet, that not a word could be
made out. If anyone wishes to
decipher these, and get at their
meaning, he must substitute the
fourth letter of the alphabet, namely
D, for A, and so with the others. “
—Suetonius, Life of Julius Caesar 56
Caesar’s Cipher
Caesar’s Cipher

A B C D E F G H I J
D E F G H I J K L M
K L M N O P Q R S T
N O P Q R S T U V W
U V W X Y Z
X Y Z A B C
Affine Cipher
 A special type of substitution cipher. The key is K=(a,b)

The encryption rule is :

The decryption rule

However the decryption is possible if and only if


gcd (a,26) = 1. Below is the list of the multiplicative inverse of
the 12 elements a in for which gcd (a,26) = 1
1 3 5 7 9 11 15 17 19 21 23 25
1 9 21 15 3 19 7 23 11 5 17 15
Vigenere Cipher

A well known polyalphabetic cryptosystem is the Vigenere


Ciphere (named after 16th century cryptographer Blaise de
Vigenere). The key K is a “keyword” of length m. For
example, K might be ECLIPSE whose length is 7. The plain
text is encrypted 7 letters at a time by “adding” the keyword
to the plain text. Hence, each plain text letters is mapped to
one of m possible cipher text letters.
Vigenere Cipher

Suppose the message to be sent is


RUNNOW.
Using the alphabet A B … Z → 0 1 … 25 and
keyword HUSH, we proceed as follows:
Vigenere Cipher
Vigenere Cipher

Suppose the message to be sent is


RUNNOW.
Using the alphabet A B … Z → 0 1 … 25 and
keyword HUSH, we proceed as follows:
THANK YOU FOR
LISTENING

You might also like