You are on page 1of 20

Lecture#1

CRYPTOGRAPHY
Course Title
Cryptography
and Its Applications
Semester
Fall-2019
Presented By : Shibani Sarangi
IT Branch, Regd no. 1001289324

Muhammad Asif
Guided By : Prof. X
1
OVERVIEW OF LECTURE
Cryptography
Basic Definitions
Encryption & Decryption
Transmission Technique
Symmetric Cryptography
Asymmetric Cryptography
Types of Ciphers

2
WHAT IS CRYPTOGRAPHY ?

Cryptography is the study of transforming a secret message in such


a way that it can be understood only by an authorized recipient who
has been provided with a secret key for deciphering it.

Cryptography enables you to store sensitive information or


transmit it across insecure networks so that it cannot be read by
anyone except the intended recipient.

3
BASIC DEFINITIONS

Plaintext: Data that can be read and understood without any


special measures.
Encryption: The method of hiding plaintext in such a way as to
hide its substance is called encryption.
Cipher text: Encrypting plaintext results in unreadable data called
cipher text. i.e transformed message.
Decryption: The process of returning cipher text to its original
plaintext is called decryption.
Key: some secret piece of information that customizes how the
cipher text is produced.

4
BASIC DEFINITIONS

Cryptanalysis: The art of breaking ciphers, i.e. retrieving the


plaintext without knowing the proper key.
Cryptanalysts: Experts of cryptanalysis.
Cryptology: The branch of mathematics that studies the
mathematical foundations of cryptographic methods.
Cipher: The Encoder, i.e., the encryption/decryption scheme

5
ENCRYPTION & DECRYPTION

6
WHY USE CRYPTOGRAPHY ?

For “secret writing”


To establish a shared secret when other people (eavesdroppers)
are listening.
TYPES
Mainly classified into two types :
1. Symmetric key cryptography
2. Asymmetric key cryptography

7
TRANSMISSION TECHNIQUE
bla-bla

Cipher
ciphertext
msg
msg
Cipher text – in
decoder (ciphertext
Plain text in
- out
encoder - plaintext out)
(plaintext in -
Plain text – in
cm b -cm b bla-bla
ciphertext
Cipher out)
text - out

eavesdropper
Should (should understand
understand NOTHING
nothing
about about the msg)
the message
8
CLASSIFICATION

Cryptography

Symmetric key Asymmetric key


cryptography cryptography
(Public key cryptography)

Classical Modern
cryptography cryptography

Transposition Substitution Stream Block


cipher cipher cipher cipher

9
SYMMETRIC KEY CRYPTOGRAPHY

BOTH SHOULD
KNOW THE KEY

10
TRANSPOSITION CIPHER

In classical cryptography, a transposition cipher changes one


character from the plaintext to another i.e. the order of the
characters is changed.

11
SUBSTITUTION CIPHER
Substitution cipher is a method of encryption by which units of
plaintext are substituted with cipher text according to a regular
system or A system of enciphering that uses the method of
substitution is called substitution cipher.

12
STREAM CIPHER
A Stream Cipher is a symmetric or secret-key encryption algorithm
that encrypts a single bit at a time. With a Stream Cipher, the same
plaintext bit or byte will encrypt to a different bit or byte every time it
is encrypted.
In stream cipher we use different keys for enciphering successive
letters.
e.g. :Plain text: Pay 100
Binary of plain text:010111101 (hypothetical)
Key: 100101011 Perform XOR
Cipher text:110010110 ZTU9^%D
To decrypt make the XOR operation of the cipher text with the
key .

13
BLOCK CIPHER

Block cipher technique involves encryption of one block of text at a


time .Decryption also takes one block of encrypted text at a time.
Length of the block is usually 64 or 128 bits.
e.g. :
Plain text: four and five
Four and five
Key Key Key
Cipher text: wvfa ast wvfa

14
ASYMMETRIC KEY CRYPTOGRAPHY

Public key cryptography is an asymmetric scheme that uses a Pair of


keys for encryption: a Public key, which encrypts data, and a
corresponding Private key (secret key) for decryption.

15
CRYPTANALYSIS
Cryptanalysis refers to the study of ciphers, cipher text, or
cryptosystems (that is, to secret code systems) with a view to
finding weaknesses in them that will license recovery of the plain
text from the cipher text, without necessarily knowing the key or
the algorithm. This is known as breaking the cipher, cipher text, or
cryptosystem.
Unlike cryptography which is a clearly defined science,
Cryptanalysis is as much an art as it is a science.

16
CRYPTANALYSIS TECHNIQUES

Known - plain text analysis

Chosen – plain text analysis (Differential cryptanalysis)

Cipher text - only analysis

Man – in – the - middle attack

17
ACOUSTIC CRYPTANALYSIS
It is a side channel attack which exploits sounds emitted by computers or
machines.
Modern acoustic cryptanalysis mostly focuses on sounds emitted by
computer keyboards and internal computer components
Historically it has also been applied to impact printers and
electromechanical cipher machines.

18
COUNTER MEASURES

Use rubber keyboard or virtual keyboards to prevent keystroke


sounds.
Use acoustic printers.
Use Acoustic case for CPU.

19
Cryptography, being an art of encrypting and decrypting confidential
information and private messages, should be implemented in the network
security to prevent any leakage and threat.
It can be done by using any of these techniques discussed above for
fortifying the personal data transmission as well as for secure transaction.
Acoustic cryptanalysis, being an art of decrypting or leaking confidential
information from the sound generated from the CPU, Keyboard, printers, etc
may be used in both constructive as well as destructive ways.

20

You might also like