You are on page 1of 27

Cryptography

What is Cryptography?
• The word ‘cryptography’ originated from two greek words ‘Krypto’
means secrete and ‘graphene’ means writing.
• The roots are cryptography are found in Roman and Egyptian
civilizations
• 1900 BCE during the time of the Old Kingdom of Egypt in form of non-
standard hieroglyphs.
History of Cryptography Timeline
Components of Cryptography

Plaintext or cleartext is unencrypted readable text


Cipher text is encrypted and unreadable until it is decrypted to plaintext with a key
encryption key is a piece of information that is used to encrypt and decrypt data
Caesar cipher
• used by Julius Caesar to send secret messages to his allies.
• one of the earliest and simplest methods of encryption technique.
• It works by shifting the letters in the plaintext message by a certain
number of positions, known as the “shift” or “key”.

Representation of plaintext and ciphertext characters in


modulo 26
Example 1
Use the additive cipher or Caesar cipher with key = 15 to
encrypt the message “hello”.

31.8
Example 2
Use the additive cipher with key = 15 to decrypt the
message “WTAAD”.

31.9
Monoalphabetic Substitution Cipher

We can use the key to encrypt the message


autokey cipher
Assume that Alice and Bob agreed to use an autokey cipher
with initial key value k1 = 12. Now Alice wants to send Bob
the message “Attack is today”. The three occurrences of “t”
are encrypted differently.

31.11
Transposition cipher

31.12
Modern block cipher

31.13
Components of a modern block cipher

31.14
Categories of Cryptography
Keys used in cryptography

• Asymmetric encryption is a form of cryptosystem in which encryption and


decryption are performed using the different keys—one a public key and
one a private key.
Symmetric-key Cryptosystem
Symmetric-key encipherment as locking
and unlocking with the same key
General Idea Of A Symmetric-key Cipher

• In symmetric-key cryptography, the same key is used by the


sender (for encryption) and the receiver (for decryption).
• The key is shared. .
Symmetric-key Algorithms

• DES (Data Encryption Standard)


• Triple- DES
• AES (Advance Encryption Standard)
• Blowfish
• Twofish
• IDEA
Asymmetric-key Cryptosystem
Locking and unlocking in asymmetric-key
cryptosystem

31.22
General idea of asymmetric-key cryptosystem

31.23
Asymmetric-key Algorithms

• RSA
• Diffie Hellman
• Elliptic Curve Cryptosystem
• Digital Signature
Testing
https://www.cryptool.org/en/cto/caesar
https://www.mymathtables.com/calculator/digital/caesar-cipher-encript-decript-converter.ht
ml

https://www.onlinecryptographytools.com/

You might also like