Professional Documents
Culture Documents
CRYPTOGRAPHY
Course Title
Cryptography
and Its Applications
Semester
Fall-2019
Presented By : Shibani Sarangi
IT Branch, Regd no. 1001289324
Muhammad Asif
Guided By : Prof. X
1
OVERVIEW OF LECTURE
Cryptography
Basic Definitions
Encryption & Decryption
Transmission Technique
Symmetric Cryptography
Asymmetric Cryptography
Types of Ciphers
2
WHAT IS CRYPTOGRAPHY ?
3
BASIC DEFINITIONS
4
BASIC DEFINITIONS
5
ENCRYPTION & DECRYPTION
6
WHY USE CRYPTOGRAPHY ?
7
TRANSMISSION TECHNIQUE
bla-bla
Cipher
ciphertext
msg
msg
Cipher text – in
decoder (ciphertext
Plain text in
- out
encoder - plaintext out)
(plaintext in -
Plain text – in
cm b -cm b bla-bla
ciphertext
Cipher out)
text - out
eavesdropper
Should (should understand
understand NOTHING
nothing
about about the msg)
the message
8
CLASSIFICATION
Cryptography
Classical Modern
cryptography cryptography
9
SYMMETRIC KEY CRYPTOGRAPHY
BOTH SHOULD
KNOW THE KEY
10
TRANSPOSITION CIPHER
11
SUBSTITUTION CIPHER
Substitution cipher is a method of encryption by which units of
plaintext are substituted with cipher text according to a regular
system or A system of enciphering that uses the method of
substitution is called substitution cipher.
12
STREAM CIPHER
A Stream Cipher is a symmetric or secret-key encryption algorithm
that encrypts a single bit at a time. With a Stream Cipher, the same
plaintext bit or byte will encrypt to a different bit or byte every time it
is encrypted.
In stream cipher we use different keys for enciphering successive
letters.
e.g. :Plain text: Pay 100
Binary of plain text:010111101 (hypothetical)
Key: 100101011 Perform XOR
Cipher text:110010110 ZTU9^%D
To decrypt make the XOR operation of the cipher text with the
key .
13
BLOCK CIPHER
14
ASYMMETRIC KEY CRYPTOGRAPHY
15
CRYPTANALYSIS
Cryptanalysis refers to the study of ciphers, cipher text, or
cryptosystems (that is, to secret code systems) with a view to
finding weaknesses in them that will license recovery of the plain
text from the cipher text, without necessarily knowing the key or
the algorithm. This is known as breaking the cipher, cipher text, or
cryptosystem.
Unlike cryptography which is a clearly defined science,
Cryptanalysis is as much an art as it is a science.
16
CRYPTANALYSIS TECHNIQUES
17
ACOUSTIC CRYPTANALYSIS
It is a side channel attack which exploits sounds emitted by computers or
machines.
Modern acoustic cryptanalysis mostly focuses on sounds emitted by
computer keyboards and internal computer components
Historically it has also been applied to impact printers and
electromechanical cipher machines.
18
COUNTER MEASURES
19
Cryptography, being an art of encrypting and decrypting confidential
information and private messages, should be implemented in the network
security to prevent any leakage and threat.
It can be done by using any of these techniques discussed above for
fortifying the personal data transmission as well as for secure transaction.
Acoustic cryptanalysis, being an art of decrypting or leaking confidential
information from the sound generated from the CPU, Keyboard, printers, etc
may be used in both constructive as well as destructive ways.
20