You are on page 1of 20

Cryptography

A10 Members:

746 Kemble Amruta Anil


747 Khadtare Harshada Bharat
748 Khan Ahmed parvez Zulfikhar
749 Khan Faizan Moin
750 Mohammed Arbaz Salim Khan
Index
Introduction
What is Cryptography?
Purpose Of cryptography
Architecture of cryptography
 Types of Cryptography
  Process of cryptography
Types Of cryptography Algorithms
Attacks of cryptography
Conclusion
References
INTRODUCTION

The Internet or the global Internet is the internationally connected


network of computer networks with addresses that are administrated
by IANA (Internet address and Naming Authority).
There are many aspects to security and many applications, ranging
from secure commerce and payments to private communications
and protecting passwords. One essential aspect for secure
communications is that of cryptography.
 
What is Cryptography?

Cryptography derived its name from a Greek word called


“krypto’s” which means “Hidden Secrets”.
Cryptography is the practice and study of hiding information.
It is the Art or Science of converting a plain intelligible data
into an unintelligible data and again retransforming that
message into its original form.
It provides Confidentiality, Integrity, and Accuracy.
  PURPOSE OF CRYPTOGRAPHY

 Authentication: The process of proving one's identity. (The


primary forms of host-to-host authentication on the Internet
today are name-based or address-based, both of which are
notoriously weak.)
Privacy/confidentiality: Ensuring that no one can read the
message except the intended receiver.
Integrity: Assuring the receiver that the received message has
not been altered in any way from the original.
Non-repudiation: A mechanism to prove that the sender really
sent this message.
Architecture of cryptography
Types of Cryptography

Secret Key Cryptography:

 • Single key used to encrypt and decrypt.


 • Key must be known by both parties.
 • Assuming we live in a hostile environment (otherwise - why the
need for cryptography?), it may be hard to share a secret key.
 Public Key Cryptography

One of the keys allocated to each person is called the


"public key", and is published in an open directory
somewhere where anyone can easily look it up, for
example by email address.
Each entity has 2 keys:
 Private Key (a secret)
 Public key (well known).
Using Keys

 Private keys are used for decrypting.


 Public keys are used for encrypting.
 
Process of cryptography
 
TYPES OF CRYPTOGRAPHIC ALGORITHMS
Public/Private Key Cryptography

 Asymmetric key cryptography overcomes the key management problem


by using different encryption and decryption key pairs. Having
knowledge of one key, say the encryption key, is not sufficient enough to
determine the other key - the decryption key.

 The mathematical relationship between the public/private key pair


permits a general rule: any message encrypted with one key of the pair
can be successfully decrypted only with that key's counterpart.
Hash functions

 A one way function - is a function that is easy to calculate but hard to


invert.
 It is difficult to calculate the input to the function given its output.
Attacks On Cryptography

1) Cryptanalysis or Cryptanalytic attack


2) Brute force attack

 Types of Cryptanalytic attacks


3) Cyphertext only
4) Known plaintext
5) Chosen plaintext
6) Chosen cyphertext
7) Chosen text
1) Cypher text only
 In this attack, the cryptanalyst just knows about the cyphertext and based on the given
info it tries to decrypt the cypher text into plain text.
 This is one of the most difficult attack for the attacker because of the less information
known to the attacker.

2) Known PlainText
 In this attack, the cryptanalyst knows the cypher text as well as some plain text and
some knowledge of encryption algorithm formed because of the secret key and based on
this knowledge the attacker will try to find what is the key use to generate the
cyphertext.
3) Chosen PlainText
 In this type of attack the main motive of the attacker will be to know the plain text. The
attacker in this scenario will have temporary amount of access to the encryption algorithm
and he will try to feed some plain text and try to get the cypher text, now the attacker has
both pairs plain text and cypher text so he can guess the plain text.

4) Chosen CypherText
 In this type of attack Lets say that the attacker has some temporary access to the
decryption algorithm, Now the attacker already has some cypher text with him because he
is in the network of the sender. Now what the attacker will do is he will give that
cyphertext to the decryption algorithm in order to generate some plaintext. Now the
attacker has cypher text and decrypted plaintext. So he can guess the plain text with that
knowledge.

5) Chosen Text
 It is nothing but the combination of Chosen Plain Text and Chosen CypherText attack.
2) What is Brute force attack?
 Brute Force attack consists of an attacker submitting
many passwords with the hope of eventually guessing
correcting. The attacker systematically checks all
possible passwords until the correct one is found.

Brute force attacks include :-


 Trying all possible keys or passwords
 Guessing
 Exhaustive search

Software Tools that can perform brute force :-


 Hydra  Crack
 Hashcat  John the ripper
CONCLUSION

 We use different types of algorithms to establish security services in


different service mechanisms.
 We use either private key cryptography or public key cryptography
according to requirement.
 If we want to send message quickly we use private key algorithm and if
we want to send messages secretly we use public key algorithm.
References

 www.simplylearn.com

 www.google.com

 www.google.com

 www.studymafia.org
Thanks…!!!
Any Query

You might also like