Cryptography
Cryptography
What and Why?
History
Hieroglyph
The Oldest Cryptographic Technique
Steganography
Evolution
Goals of a Cryptography
Cryptosystems
FERB PHINEAS CANDACE
LETS GET AN ICECREAM
CAESAR CIPHER
p is the plaintext and 𝑝𝑖 is the i th character in p
and k is the secret key
Each letter 𝑐𝑖of the cipher text c is calculated as:
LETS GET AN ICECREAM
WV JHW DQ LFHFUHDPO H
CAESARCIPHER
Cryptography
VIGENERE CIPHER
Each letter 𝑐𝑖of the cipher text c is calculated as:
p is the plaintext and 𝑝𝑖 is the i th character in p
and 𝑘𝑗 is the j th letter of the secret key.
VIGENERE CIPHER
KEY : PERRY
LETS GET AN
ICECREAMPERR YPE RR
YPERRYPE
AIKJ ETX RE
RSA
(RIVEST-SHAMIR-ADLEMAN)
RSA
(RIVEST-SHAMIR-ADLEMAN)
• Generation of a pair of keys
• Encryption of the message at sender end
• Decryption of the message at receiver’s end
Generation of RSA key pairs
• Choose two prime numbers, p and q
p = 7 and q = 13
• Calculate RSA modulus (n)
n = pq
n = 91
• Find a number e such that 1<e<m and
gcd(e,m) = 1 where m = (p-1)(q-1)
let e = 5
• Public key is of the form (n,e).
Thus the pair (91,5) form our public key.
• Private key (d)
ed = 1 mod m
5d = 1 mod 72
• Extended Euclidean Algorithm
ax + by = gcd(a,b)
5x + 72y = 1
5x = 1 – 72y
5x = 1 mod 72
x y d k
1 0 5
0 1 72
x y d k
1 0 5
0 1 72 0
x y d k
1 0 5
0 1 72 0
1 0 5 14
x y d k
1 0 5
0 1 72 0
1 0 5 14
-14 1 2 2
x y d k
1 0 5
0 1 72 0
1 0 5 14
-14 1 2 2
29 -2 1 2
• Private key is the pair (91,29)
• Message , p is “CS”
c = 𝒑 𝒆
𝒎𝒐𝒅 𝒏
c1 = 58
c2 = 83
Cipher text c = 58 83
• To Decrypt the message
p = 𝒄 𝒅
mod n
p1 = 58 ^ 29 (mod 91)
p1 = 67 i.e C
p2 = 83 ^ 29 (mod 91)
p2 = 83
So the message is “CS”
Cryptography
Cryptography

More Related Content

PPTX
Cryptography
PPTX
Timing Attack paper--pres--v.01
PPT
Cryptography for Smalltalkers - ESUG 2004
PDF
Digital Signatures: Reassessing security of randomizable signatures
PDF
Cryptography for Smalltalkers
PPTX
Displaying Data
PPTX
Economia 2
PPTX
Keynes
Cryptography
Timing Attack paper--pres--v.01
Cryptography for Smalltalkers - ESUG 2004
Digital Signatures: Reassessing security of randomizable signatures
Cryptography for Smalltalkers
Displaying Data
Economia 2
Keynes

Similar to Cryptography (20)

PPT
Crypto2
PDF
Public-Key Cryptography.pdfWrite the result of the following operation with t...
PPT
Network Security and Cryptography
PPTX
module 4 ppt on crypography and network security
PPT
Crypt
PPTX
Encryption and Decription of a Text Using Rivest-Shamir-Adleman Algorithm
PPTX
Cryptography based chat system
PPTX
Cryptography in discrete structure .pptx
PDF
How prime numbers keep the internet secure
PPT
Session-1 CRYPTO_Intro_basics_part1.0.ppt
PPT
Rsa diffi-network security-itt
PPTX
Security
PPTX
PDF
Simple Overview Caesar and RSA Encryption_by_Tarek_Gaber
PPT
Unit --3.ppt
PPTX
CNS 3RD UNIT PPT.pptx
PDF
CyberSecurity_Cryptography and its fundamentals
PDF
PKC&RSA
PPTX
Cryptography and applications
PPT
Introduction to cryptography
Crypto2
Public-Key Cryptography.pdfWrite the result of the following operation with t...
Network Security and Cryptography
module 4 ppt on crypography and network security
Crypt
Encryption and Decription of a Text Using Rivest-Shamir-Adleman Algorithm
Cryptography based chat system
Cryptography in discrete structure .pptx
How prime numbers keep the internet secure
Session-1 CRYPTO_Intro_basics_part1.0.ppt
Rsa diffi-network security-itt
Security
Simple Overview Caesar and RSA Encryption_by_Tarek_Gaber
Unit --3.ppt
CNS 3RD UNIT PPT.pptx
CyberSecurity_Cryptography and its fundamentals
PKC&RSA
Cryptography and applications
Introduction to cryptography
Ad

Recently uploaded (20)

PPTX
TNA_Presentation-1-Final(SAVE)) (1).pptx
PPTX
Virtual and Augmented Reality in Current Scenario
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
PPTX
20th Century Theater, Methods, History.pptx
PPTX
Computer Architecture Input Output Memory.pptx
PDF
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PPTX
Share_Module_2_Power_conflict_and_negotiation.pptx
PDF
Uderstanding digital marketing and marketing stratergie for engaging the digi...
PDF
Trump Administration's workforce development strategy
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PPTX
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
PDF
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
PDF
Weekly quiz Compilation Jan -July 25.pdf
PDF
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PDF
FORM 1 BIOLOGY MIND MAPS and their schemes
PDF
My India Quiz Book_20210205121199924.pdf
TNA_Presentation-1-Final(SAVE)) (1).pptx
Virtual and Augmented Reality in Current Scenario
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
20th Century Theater, Methods, History.pptx
Computer Architecture Input Output Memory.pptx
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
Share_Module_2_Power_conflict_and_negotiation.pptx
Uderstanding digital marketing and marketing stratergie for engaging the digi...
Trump Administration's workforce development strategy
Practical Manual AGRO-233 Principles and Practices of Natural Farming
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
Weekly quiz Compilation Jan -July 25.pdf
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
Chinmaya Tiranga quiz Grand Finale.pdf
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
FORM 1 BIOLOGY MIND MAPS and their schemes
My India Quiz Book_20210205121199924.pdf
Ad

Cryptography

Editor's Notes

  • #5: The growing understandability of number theory and algebra led to the advancement in ciphers or algorithms, it was adopted by govt, military business organizations to secure their secrets.Cryptography has decided wars and now is at the heart of communication
  • #12: FREQUENCY ANALYSIS AND BRUTE FORCE ATTACKS
  • #17: Pick 2 prime numbers.in practice this no are too big so that its harder to crack.p and q recommended to be 1024 bits i.e each no over 300 decimal digits.