CYBER SECURIT
            Lecture – 8
Faculty Name : Professor Seema Sahai
Cryptography
Objectives
• Describe the history of cryptography
• Describe symmetric and asymmetric
  cryptography algorithms
• Explain public key infrastructure (PKI)
• Describe possible attacks on cryptosystems
Understanding Cryptography Basics
• Cryptography is the process of converting
  plaintext into cipher text
   – Plaintext: readable text (also called clear text)
   – Cipher text: unreadable or encrypted text
• Cryptography is used to hide information from
  unauthorized users
• Decryption is the process of converting cipher
  text back to plaintext
History of Cryptography
• Substitution cipher
   – Replaces one letter with another letter based
     on a key
   – Example: Julius Caesar’s Cipher
      • Used a key value of 3
      • ABCDEFGHIJKLMNOPQRSTUVWXYZ
      • DEFGHIJKLMNOPQRSTUVWXYZABC
History of Cryptography (continued)
• Cryptanalysis studies the process of breaking
  encryption algorithms
• When a new encryption algorithm is
  developed, cryptanalysts study it and try to
  break it
   – Or prove that it is impractical to break it
     (taking much time and many resources)
Enigma
• Used by the Germans
  during World War II
   – Replaced letters as
     they were typed
   – Substitutions were
     computed using a
     key and a set of
     switches or rotors
   – Image from
     Wikipedia
Steganography
• The process of hiding data in plain view in
  pictures, graphics, or text
   – Example: changing colors slightly to encode
     individual bits in an image
• The image on the left contains the image on the
  right hidden in it
Algorithms
• An algorithm is a mathematical function or
  program that works with a key
• Security comes from
   – A strong algorithm—one that cannot be
     reversed without the key
   – A key that cannot be found or guessed
Keys
              (not in textbook)
• A sequence of random bits
   – The range of allowable values is called a key
     space
• The larger the keys pace, the more secure the
  key
   – 8-bit key has 28 = 256 values in keys pace
   – 24-bit key has 224 = 16 million values
   – 56-bit key has 256 = 7 x 1016 values
   – 128-bit key has 2128 = 3 x 1038 values

More Related Content

PPTX
Low Complexity Secure Code Design for Big Data in Cloud Storage Systems
PDF
Data encryption techniques and standard
PPTX
Blow fish final ppt
PPTX
PPT
DES (Data Encryption Standard) pressentation
PPT
Cryptography Intro
PPT
Data encryption standard
Low Complexity Secure Code Design for Big Data in Cloud Storage Systems
Data encryption techniques and standard
Blow fish final ppt
DES (Data Encryption Standard) pressentation
Cryptography Intro
Data encryption standard

What's hot (6)

PDF
PPTX
Implication of rh and qc on information security sharad nalawade(author)
PDF
Network security jeni corrected 1
PPT
Data encryption, Description, DES
PPT
Cryptography
PPTX
Cryptography
Implication of rh and qc on information security sharad nalawade(author)
Network security jeni corrected 1
Data encryption, Description, DES
Cryptography
Cryptography
Ad

Similar to AMITY UNIVERSITY ONLINE (20)

PPT
Cryptography cse,ru
PPTX
Introduction to cryptography part1-final
PPTX
Cryptography and Network Security
PPT
ICSE6104 Lecture bbbbbbbbbbbbbbbbbbbb 2.ppt
PPTX
Image Security System using Image Processing
PPTX
NS Classical Encryption Techniqnbbghghgues.pptx
PPTX
Image Security
PPTX
symmetric cipher model.pptx
DOCX
Cryptography : The Art of Secured Messaging
PPT
Classical Encryption Techniques in Network Security
PPT
Cns 13f-lec03- Classical Encryption Techniques
PPTX
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
PPTX
Cryptography and network security Nit701
PDF
Data Science Unit 02 SPPU Sem 6 PPT-2.pdf
PPTX
Symmetric ciphermodel
PPTX
Information and network security 11 cryptography and cryptanalysis
PPTX
Cryptography and Network Security-ch1-4.pptx
PPTX
Lecture 5 - Cryptography.pptx
PPT
PPTX
Cryptography Introduction
Cryptography cse,ru
Introduction to cryptography part1-final
Cryptography and Network Security
ICSE6104 Lecture bbbbbbbbbbbbbbbbbbbb 2.ppt
Image Security System using Image Processing
NS Classical Encryption Techniqnbbghghgues.pptx
Image Security
symmetric cipher model.pptx
Cryptography : The Art of Secured Messaging
Classical Encryption Techniques in Network Security
Cns 13f-lec03- Classical Encryption Techniques
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
Cryptography and network security Nit701
Data Science Unit 02 SPPU Sem 6 PPT-2.pdf
Symmetric ciphermodel
Information and network security 11 cryptography and cryptanalysis
Cryptography and Network Security-ch1-4.pptx
Lecture 5 - Cryptography.pptx
Cryptography Introduction
Ad

Recently uploaded (20)

PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PPTX
TNA_Presentation-1-Final(SAVE)) (1).pptx
PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
PDF
Empowerment Technology for Senior High School Guide
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PPTX
Share_Module_2_Power_conflict_and_negotiation.pptx
PDF
AI-driven educational solutions for real-life interventions in the Philippine...
PPTX
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
PDF
What if we spent less time fighting change, and more time building what’s rig...
PPTX
Computer Architecture Input Output Memory.pptx
PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PDF
HVAC Specification 2024 according to central public works department
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PPTX
20th Century Theater, Methods, History.pptx
PDF
advance database management system book.pdf
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PPTX
Unit 4 Computer Architecture Multicore Processor.pptx
PPTX
History, Philosophy and sociology of education (1).pptx
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
TNA_Presentation-1-Final(SAVE)) (1).pptx
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
Empowerment Technology for Senior High School Guide
Practical Manual AGRO-233 Principles and Practices of Natural Farming
A powerpoint presentation on the Revised K-10 Science Shaping Paper
Share_Module_2_Power_conflict_and_negotiation.pptx
AI-driven educational solutions for real-life interventions in the Philippine...
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
What if we spent less time fighting change, and more time building what’s rig...
Computer Architecture Input Output Memory.pptx
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
HVAC Specification 2024 according to central public works department
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
20th Century Theater, Methods, History.pptx
advance database management system book.pdf
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
Unit 4 Computer Architecture Multicore Processor.pptx
History, Philosophy and sociology of education (1).pptx

AMITY UNIVERSITY ONLINE

  • 1. CYBER SECURIT Lecture – 8 Faculty Name : Professor Seema Sahai
  • 3. Objectives • Describe the history of cryptography • Describe symmetric and asymmetric cryptography algorithms • Explain public key infrastructure (PKI) • Describe possible attacks on cryptosystems
  • 4. Understanding Cryptography Basics • Cryptography is the process of converting plaintext into cipher text – Plaintext: readable text (also called clear text) – Cipher text: unreadable or encrypted text • Cryptography is used to hide information from unauthorized users • Decryption is the process of converting cipher text back to plaintext
  • 5. History of Cryptography • Substitution cipher – Replaces one letter with another letter based on a key – Example: Julius Caesar’s Cipher • Used a key value of 3 • ABCDEFGHIJKLMNOPQRSTUVWXYZ • DEFGHIJKLMNOPQRSTUVWXYZABC
  • 6. History of Cryptography (continued) • Cryptanalysis studies the process of breaking encryption algorithms • When a new encryption algorithm is developed, cryptanalysts study it and try to break it – Or prove that it is impractical to break it (taking much time and many resources)
  • 7. Enigma • Used by the Germans during World War II – Replaced letters as they were typed – Substitutions were computed using a key and a set of switches or rotors – Image from Wikipedia
  • 8. Steganography • The process of hiding data in plain view in pictures, graphics, or text – Example: changing colors slightly to encode individual bits in an image • The image on the left contains the image on the right hidden in it
  • 9. Algorithms • An algorithm is a mathematical function or program that works with a key • Security comes from – A strong algorithm—one that cannot be reversed without the key – A key that cannot be found or guessed
  • 10. Keys (not in textbook) • A sequence of random bits – The range of allowable values is called a key space • The larger the keys pace, the more secure the key – 8-bit key has 28 = 256 values in keys pace – 24-bit key has 224 = 16 million values – 56-bit key has 256 = 7 x 1016 values – 128-bit key has 2128 = 3 x 1038 values