You are on page 1of 13

APEX INSTITUTE OF TECHNOLOGY

COMPUTER SCIENCE & ENGINEERING


Bachelor of Engineering (Information Security)
Security and Cryptography
Abhishek Ankur(E12833)

DISCOVER . LEARN . EMPOWER


Security and Cryptography: Course Objective

• Recognize and predict attacks in a network.


• Review cryptographic algorithms, use of this algorithm to provide security.
• Design and evaluate algorithms for encryption and decryption techniques.
• Incorporate practical usage for the development of security algorithms and
protocols.
Chapter Course Objectives

● Exhibit knowledge to secure systems, protect personal data, and


1.
secure computer networks in an organization through cryptography.

Chapter Course Outcomes


Analyze and design classical encryption techniques and block ciphers.

1.

3
Security and Cryptography: Course Objective

CO1 Analyze and design classical encryption techniques and block ciphers.
CO2 Understand and analyze symmetric key algorithm.
CO3 Analyze and design Hash and MAC algorithms and digital signatures.

CO4 Understand and analyze public-key cryptography, RSA and other public-key
cryptosystems.
CO5 Design network security schemes such as PGP, SSL, TLS. Understand and analyze
steganography and cryptanalysis.
CRYPTOGRAPHY
• Cryptography is an important aspect when we deal with network security.

• ‘Crypto’ means secret or hidden. Cryptography is the science of secret writing with the intention of
keeping the data secret. 

• Cryptography is technique of securing information and communications through use of codes so


that only those person for whom the information is intended can understand it and process it. Thus
preventing unauthorized access to information.

• In Cryptography the techniques which are use to protect information are obtained from
mathematical concepts and a set of rule based calculations known as algorithms to convert
messages in ways that make it hard to decode it.

5
MONOALPHABETIC SUBSTITUTION CIPHER

• Substitution ciphers are probably the most common form of cipher.


• They work by replacing each letter of the plaintext (and sometimes punctuation marks and
spaces) with another letter (or possibly even a random symbol).
• A monoalphabetic substitution cipher, also known as a simple substitution cipher, relies on
a fixed replacement structure.
• That is, the substitution is fixed for each letter of the alphabet.
• Thus, if "a" is encrypted to "R", then every time we see the letter "a" in the plaintext, we
replace it with the letter "R" in the ciphertext.

6
CAESAR CIPHER
• The Caesar Cipher technique is one of the earliest and simplest methods of encryption technique.
• It’s simply a type of substitution cipher, i.e., each letter of a given text is replaced by a letter with a
fixed number of positions down the alphabet.
• The method is apparently named after Julius Caesar, who apparently used it to communicate with his
officials. 
• Thus to cipher a given text we need an integer value, known as a shift which indicates the number of
positions each letter of the text has been moved down. 
• EXAMPLE:
Text : ATTACKATONCE
Shift: 4
Cipher: EXXEGOEXSRGI

7
ATBASH CIPHER
• Atbash cipher is a substitution cipher with just one specific key where all the letters are reversed that is A to
Z and Z to A. 
• It was originally used to encode the Hebrew alphabets but it can be modified to encode any alphabet
• Relationship to Affine: Atbash cipher can be thought of as a special case of Affine cipher with both the keys
being 25, i.e, a = 25 & b = 25
AFFINE CIPHER
• The Affine cipher is a type of monoalphabetic substitution cipher, where in each letter in an alphabet is mapped
to its numeric equivalent, encrypted using a simple mathematical function and converted back to a letter.

• The formula used means that each letter encrypts to one other letter, and back again, meaning the cipher is
essentially a standard substitution cipher with a rule governing which letter goes to which. 
• Encryption
The first step in the encryption process is to transform each of the letters in the plaintext alphabet to the
corresponding integer in the range 0 to m-1. With this done, the encryption process for each letter is given by
E(x) = (ax + b) mod m , where a and b are the key for the cipher.
• Decryption
In deciphering the ciphertext, we must perform the opposite (or inverse) functions on the ciphertext to retrieve
the plaintext. Once again, the first step is to convert each of the ciphertext letters into their integer values. We
must now perform the following calculation on each integer
D(x) = c(x - b) mod m, where c is the modular multiplicative inverse of a. That is, a x c = 1 mod m (c is the
number such that when you multiply a by it, and keep taking away the length of the alphabet, you get to 1).

9
SINGLE SUBSTITUTION STRENGTH AND WEAKNESS
Strengths
Large theoretical key space (using only letters)
This cipher technically has 26! Different ways to assemble the English alphabet
That is around 403,291,461,126,605,635,584,000,000 different combinations (this be
alot)
This is around 2^88 bits of work.
Substitutions can be made with many different things
Nomenclature
A document that a list of homophonic substitution tables
Homophonic Substitution
In these forms of substitutions, the plaintext characters can be mapped to different
letters
In these cases, letters with higher frequency are mapped to a group of letters which
have lower frequency which in turn flattens out the frequency counts. This makes it
harder to perform analysis

10
SINGLE SUBSTITUTION STRENGTH AND WEAKNESS

Weaknesses
Frequency of letters are the same
In English the letter e is the most common letter, just because it has been changed
into a different doesn’t mean it hides the fact that the letter is likely the letter e
Ways you can avoid this is to replace 2 or 3 letters at a time
You can use poly-alphabetic substitution which allows repeated letters
English lacks enough entropy
any person with enough time can just work it out because people can find meaning
in the text

11
References
 TEXT BOOKS:
T1: William Stallings, “Cryptography and Network Security ", Pearson Education, 2014.
T2: Behrouz A. Ferouzan, “Cryptography & Network Security”, Tata McGraw Hill,2015.

 REFERENCE BOOKS:
R1: Alfred J. Menenzes, Paul C. van Oorschot, Scott A, “Handbook of Applied Cryptography", CRC Press, 1997.
R2: Jonathan Katz and Yehuda Lindell, “Introduction to Modern Cryptography”, CRC Press, 2007.

 COURSE LINKS:
• https://www.coursera.org/specializations/applied-crypto

 VIDEO LINKS:

Lecture:- Introduction to Applied Cryptography


https://crypto.stanford.edu/~dabo/courses/OnlineCrypto/

 WEB LINKS:
Handbook of Applied Cryptography
https://cacr.uwaterloo.ca › hac

12
THANK YOU

For Queries, Write at :


Abhishek.e12833@cumail.in

You might also like