SlideShare a Scribd company logo
CRYPTOGRAPHY IN
INFORMTAION SECURITY
PRESENTED AND PERFORMED BY
SABIHA BATOOL (TC-17)
NED UNIVERSITY OF KARACHI
TELECOMMUNICATION ENGINEERING
SYNOPSIS
CRYPTOGRAPHY
 Terms
 Types
 RSA algorithm
INFORMATION SECURITY
 Objectives of security
 Data integrity
 Authentication
 Confidentiality
 Non repudiation
 LETRATURE REVIEW
 CONCLUSION
 REFERENCES
HISTORY
 The conceptual foundation of cryptography was laid out around
3000 years ago in India and china. Since the early days of writing,
heads of state and military commanders understood that it was
necessary to provide some mechanism to protect the
confidentiality of written correspondence and to have some means
of detecting tampering. . World war ii brought about much
advancement in information security and marked the beginning of
the professional field of information security
CRYPTOGRAPHY
• The word cryptography is derived from Greek words “KRYPTOS” means hidden /
secret and “GRAPHEIN” means “to study or write”
 DEFINITION :
 Cryptography is the practice and study of techniques for securing communication and
data/ information in the presence of adversaries.
 It is the study of using mathematics to encrypt and decrypt data.
 To establish a shared secret when other people (eavesdroppers) are listening.
BASIC TERMS IN CRYPTOGRAPHY
ENCRYPTION OR DECRYPTION: Scrambling a message or data using cryptographic
techniques.
PLAINTEXT : the message or data.
CIPHER TEXT : the scrambled (encrypted) version of message .
KEY : Information used in cipher known only to sender/ receiver.
TYPES OF CRYPTOGRAPHY
SYMETRIC KEY CRYPTOGRAPHY
ASYMETRIC KEY CRYPTOGRAPHY
HASH FUNCTION
 The main purpose of this function is to make sure that the original
information is not tampered with.
 Hash function is one way encryption.
 It provides digital fingerprints
 It also helps for password encryption.
RSA ALGORITHM
PUBLISHED IN 1978 BY MIT ,US.
The main function of this algorithm is to providing approach to
public key cryptography and encryption.
In this the cipher text are all the integers between 0 to n-1
INFORMATION SECURITY
WHY IT IS NEEDED?
WHERE?
HOW?
INFORMATION SECURITY
In this information era :
• Information is encoded into bit stream and transmitted on wireless
networks / internet.
• During transmission information it is vulnerable to attack.
• SOLUTION : CRYPTOGRAPHY IN INFORMATION SECURITY.
OBJECTIVES OF SECURITY
To avoid data threats.
To avoid denial of services.
To secure information / data from Masquerades.
To safeguard information from traffic analyzer.
To not to make the message for third person.
DATA INTEGRITY
C could alter the message or the message could change
while in transit . If B does not detect this , then we have
LOSS OF INTEGRITY.
SOLUTION : ENCRYPTION
A B
C
M
AUTHENTICATION
C could send a message to B pretending to be A, if B can not be verify the source
of the information then we have LACK AUTHENTICATION.
SOLUTION : PASSWORDS AND DIGITAL SIGNATURES
A B
C
M
CONFIDENTIALITY
C could view the secret message by eavesdropping on the communication.
SOLUTION : ENCRYPTION
A B
C
M
NON REPUDIATION
A might repudiate having sent M to B.
SOLUTION : DIGITAL SIGNATURES
A B
M
DIGITAL SIGNATURE
 A protocol that produces the same effect as a real signature.
 A mark that only the sender can make.
 A digital signature is a mathematical scheme for demonstrating
the authenticity of a digital message or document.
PASSWORD AUDITING
 Should not be in upper case.
 At least 8 characters.
 Must include alphabets , numeric keys and special characters.
 It should not be the dictionary word or user name.
 Must be updated at least once a month.
LITERATURE REVIEW
S# AURHOR NAME AND YEAR STATEMENTS OF AUTHORS
1 2019 , Laura Savu Cryptography is used in information security to
protect information from unauthorized or accidental
disclosure.[3].
2 2019 , June ,nurhayat varol ,
abdalbasit .
Has an important role role which requires privacy to
be protected when data is sent .[4].
3 2015 , August , Sanket A. Ubhad,
prof. Nilesh Chaubey , prof. Shyam
P.
Text should be send in additionally converted into
computer codes.[5].
4 2016 , April , Marukh- Juhaani
O.Saarinen , Elizzbeth O’Sullivan
Implementations must be able to create public and
private keys for lattice based digital signatures.[6].
5 2016 , August , Neal Koblitz
,Palash Sarkar.
A tight information security reduction is often very
useful in establishing confidence in protocole.[7].
6 2015 , Saritaa kumara. To secure data , compression should use for security
ADVANTAGES
 Cryptography is an essential information security tool.
 Encryption can protect communications from unauthorized
parties.
 Cryptographic technique can protect against spoofing and
message forgeries.
DRAWBACKS
 Provides a means for tax evasion, money laundering ‘ contract
killings, and implementation of data havens for storing and
marketing illegal or controversial material.
 Electronic information can be bought and sold on "black
networks“. With complete secrecy.
APPLICATIONS
 Credit card information.
 Private correspondence.
 Social security numbers.
 Personal details.
 Sensitive company information.
CONCLUSION(1)
From a technical point of view, cryptography is the solution to many
of the security challenges that are present in the internet. The
technology exists to solve most of the problems. However, there are
several issues that have obstructed the widespread use of
cryptography in the internet. First of all, cryptography, as a science,
faces a difficult problem for example, terrorists could communicate
information over the internet using encryption that law enforcement
agencies could not decrypt.
CONCLUSION(2)
Thus information security measures are needed to protect data from
hackers, when it is transmitted between terminal user and computer
and between computer and computer and it is also necessary to
protect the computer system when there is an attack of virus. The
capability of security enabled components still lags behind the
claims. Everyone has a different idea of what “security” is, and what
levels of risk are acceptable. It’s important to build systems and
networks in such a way that the user is not constantly reminded of
the security system around him.
REFERENCE(1)
[1]. 1. TIM MAY, "CRYPTO ANARCHY AND VIRTUAL COMMUNITIES," INTERNET
SECURITY, APRIL 2015, PP. 4-12.
[2] .KARLS, M. A, CODES, CIPHERS, AND CRYPTOGRAPHY-AN HONORS
COLLOQUIUM, 2011.
[3]. LAURA SAVU , CRYPTO AND INFORMATION SECURITY , 2019. BACHMAN, D. J.;
BROWN, E. A.;
[4]. NORTON, A.H, CHOCOLATE KEY CRYPTOGRAPHY, MATHEMATICS TEACHER,
104(2),2010.
[5]. PRIMUS, 20 (1),2010, P21-38.
REFERENCE(2)
[6]. DIFFIE, W. HELLMAN, M., NEW DIRECTIONS IN CRYPTOGRAPHY, IEEE TRANSACTIONS ON
INFORMATION THEORY, NOV 1976, VOLUME: 22, ISSUE: 6, 644- 654.
[7]. BUTLER W. LAMPSON, COMPUTER SECURITY IN THE REAL WORLD, COMPUTER, VOL. 37,
NO. 6, PP. 37-46, JUN., 2004.
[8]. ANDERSON, J., COMPUTER SECURITY TECHNOLOGY PLANNING STUDY, U.S. AIR FORCE
ELECT. SYS. DIV. TECH. RPT. 73-51, OCT 1972;
[9]. JOANNA LYN GRAMA, “LEGAL ISSUES IN INFORMATION SECURITY”, PUBLISHER: JONES &
BARTLETT LEARNING .
[10]. GENÇOĞLU, M.T, EMBEDDED IMAGE CODING USING LAPLACE TRANSFORM FOR TURKISH
LETTERS, MULTIMEDIA TOOLS AND APPLICATIONS, 67(3),2019,PP 1-14
THANK YOU


More Related Content

PPTX
Shannon and 5 good criteria of a good cipher
PPTX
Network Security Fundamental
PPT
Cryptppt1
PPTX
fundamental of network security
PDF
Modified honey encryption scheme for encoding natural language message
PDF
Survey Paper: Cryptography Is The Science Of Information Security
PPTX
Crytography
PPTX
Cryptography and attacks ins
Shannon and 5 good criteria of a good cipher
Network Security Fundamental
Cryptppt1
fundamental of network security
Modified honey encryption scheme for encoding natural language message
Survey Paper: Cryptography Is The Science Of Information Security
Crytography
Cryptography and attacks ins

What's hot (17)

PPTX
Steganography
PDF
How Encryption Works
PPTX
Secure communication in Networking
PPTX
PPT
Rothke Info Security Canada 2007 Final
PPTX
Cryptography
PDF
Network Security & Attacks
PPTX
Network security & cryptography
PPT
Data security & cryptography
PPTX
Cryptography
PPTX
Crim cybersecurity_jarno_limnéll
PPTX
Communication security
PPTX
Cyber Conflicts - Time for Reality Check
PPTX
Secure communication
PPT
A+ Update Endpoint Encryption
PDF
Frsa
Steganography
How Encryption Works
Secure communication in Networking
Rothke Info Security Canada 2007 Final
Cryptography
Network Security & Attacks
Network security & cryptography
Data security & cryptography
Cryptography
Crim cybersecurity_jarno_limnéll
Communication security
Cyber Conflicts - Time for Reality Check
Secure communication
A+ Update Endpoint Encryption
Frsa
Ad

Similar to Cryptography in formtaion security (20)

PPTX
Cryptography
PPTX
Unit - I cyber security fundamentals part -1.pptx
PPTX
Cryptography
PDF
chap1.pdf
PDF
chap1 crypto.pdf
PPTX
Information Security and Privacy-Unit-2.pptx
DOCX
Cryptography- "A Black Art"
PPTX
Cryptography
PPT
Information Security & Cryptography
PPT
Crytography
PPT
Fundamentals of cryptography
PPTX
CRYPTOGRAPHY crytopgraphy wh is sd wkd ,w d .pptx
PPTX
Network security
PPT
Network security cryptography ppt
PPTX
Cryptography and Network Security
PPTX
Cryptography and Network Security Principles.pptx
PDF
Chapter 1 2
PPTX
CSE CRYPTOGRAPHY ppt - Copy.pptx
PPTX
Cryptography & Network Security.pptx
PPT
Computer and Network Security
Cryptography
Unit - I cyber security fundamentals part -1.pptx
Cryptography
chap1.pdf
chap1 crypto.pdf
Information Security and Privacy-Unit-2.pptx
Cryptography- "A Black Art"
Cryptography
Information Security & Cryptography
Crytography
Fundamentals of cryptography
CRYPTOGRAPHY crytopgraphy wh is sd wkd ,w d .pptx
Network security
Network security cryptography ppt
Cryptography and Network Security
Cryptography and Network Security Principles.pptx
Chapter 1 2
CSE CRYPTOGRAPHY ppt - Copy.pptx
Cryptography & Network Security.pptx
Computer and Network Security
Ad

Recently uploaded (20)

PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PDF
Digital Logic Computer Design lecture notes
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
Construction Project Organization Group 2.pptx
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PPTX
Geodesy 1.pptx...............................................
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
additive manufacturing of ss316l using mig welding
PPT
Project quality management in manufacturing
PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
Welding lecture in detail for understanding
PPTX
web development for engineering and engineering
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
UNIT 4 Total Quality Management .pptx
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Digital Logic Computer Design lecture notes
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
bas. eng. economics group 4 presentation 1.pptx
Construction Project Organization Group 2.pptx
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
R24 SURVEYING LAB MANUAL for civil enggi
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
Geodesy 1.pptx...............................................
UNIT-1 - COAL BASED THERMAL POWER PLANTS
additive manufacturing of ss316l using mig welding
Project quality management in manufacturing
Internet of Things (IOT) - A guide to understanding
CH1 Production IntroductoryConcepts.pptx
Welding lecture in detail for understanding
web development for engineering and engineering
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
UNIT 4 Total Quality Management .pptx
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf

Cryptography in formtaion security

  • 1. CRYPTOGRAPHY IN INFORMTAION SECURITY PRESENTED AND PERFORMED BY SABIHA BATOOL (TC-17) NED UNIVERSITY OF KARACHI TELECOMMUNICATION ENGINEERING
  • 2. SYNOPSIS CRYPTOGRAPHY  Terms  Types  RSA algorithm INFORMATION SECURITY  Objectives of security  Data integrity  Authentication  Confidentiality  Non repudiation  LETRATURE REVIEW  CONCLUSION  REFERENCES
  • 3. HISTORY  The conceptual foundation of cryptography was laid out around 3000 years ago in India and china. Since the early days of writing, heads of state and military commanders understood that it was necessary to provide some mechanism to protect the confidentiality of written correspondence and to have some means of detecting tampering. . World war ii brought about much advancement in information security and marked the beginning of the professional field of information security
  • 4. CRYPTOGRAPHY • The word cryptography is derived from Greek words “KRYPTOS” means hidden / secret and “GRAPHEIN” means “to study or write”  DEFINITION :  Cryptography is the practice and study of techniques for securing communication and data/ information in the presence of adversaries.  It is the study of using mathematics to encrypt and decrypt data.  To establish a shared secret when other people (eavesdroppers) are listening.
  • 5. BASIC TERMS IN CRYPTOGRAPHY ENCRYPTION OR DECRYPTION: Scrambling a message or data using cryptographic techniques. PLAINTEXT : the message or data. CIPHER TEXT : the scrambled (encrypted) version of message . KEY : Information used in cipher known only to sender/ receiver.
  • 9. HASH FUNCTION  The main purpose of this function is to make sure that the original information is not tampered with.  Hash function is one way encryption.  It provides digital fingerprints  It also helps for password encryption.
  • 10. RSA ALGORITHM PUBLISHED IN 1978 BY MIT ,US. The main function of this algorithm is to providing approach to public key cryptography and encryption. In this the cipher text are all the integers between 0 to n-1
  • 11. INFORMATION SECURITY WHY IT IS NEEDED? WHERE? HOW?
  • 12. INFORMATION SECURITY In this information era : • Information is encoded into bit stream and transmitted on wireless networks / internet. • During transmission information it is vulnerable to attack. • SOLUTION : CRYPTOGRAPHY IN INFORMATION SECURITY.
  • 13. OBJECTIVES OF SECURITY To avoid data threats. To avoid denial of services. To secure information / data from Masquerades. To safeguard information from traffic analyzer. To not to make the message for third person.
  • 14. DATA INTEGRITY C could alter the message or the message could change while in transit . If B does not detect this , then we have LOSS OF INTEGRITY. SOLUTION : ENCRYPTION A B C M
  • 15. AUTHENTICATION C could send a message to B pretending to be A, if B can not be verify the source of the information then we have LACK AUTHENTICATION. SOLUTION : PASSWORDS AND DIGITAL SIGNATURES A B C M
  • 16. CONFIDENTIALITY C could view the secret message by eavesdropping on the communication. SOLUTION : ENCRYPTION A B C M
  • 17. NON REPUDIATION A might repudiate having sent M to B. SOLUTION : DIGITAL SIGNATURES A B M
  • 18. DIGITAL SIGNATURE  A protocol that produces the same effect as a real signature.  A mark that only the sender can make.  A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message or document.
  • 19. PASSWORD AUDITING  Should not be in upper case.  At least 8 characters.  Must include alphabets , numeric keys and special characters.  It should not be the dictionary word or user name.  Must be updated at least once a month.
  • 20. LITERATURE REVIEW S# AURHOR NAME AND YEAR STATEMENTS OF AUTHORS 1 2019 , Laura Savu Cryptography is used in information security to protect information from unauthorized or accidental disclosure.[3]. 2 2019 , June ,nurhayat varol , abdalbasit . Has an important role role which requires privacy to be protected when data is sent .[4]. 3 2015 , August , Sanket A. Ubhad, prof. Nilesh Chaubey , prof. Shyam P. Text should be send in additionally converted into computer codes.[5]. 4 2016 , April , Marukh- Juhaani O.Saarinen , Elizzbeth O’Sullivan Implementations must be able to create public and private keys for lattice based digital signatures.[6]. 5 2016 , August , Neal Koblitz ,Palash Sarkar. A tight information security reduction is often very useful in establishing confidence in protocole.[7]. 6 2015 , Saritaa kumara. To secure data , compression should use for security
  • 21. ADVANTAGES  Cryptography is an essential information security tool.  Encryption can protect communications from unauthorized parties.  Cryptographic technique can protect against spoofing and message forgeries.
  • 22. DRAWBACKS  Provides a means for tax evasion, money laundering ‘ contract killings, and implementation of data havens for storing and marketing illegal or controversial material.  Electronic information can be bought and sold on "black networks“. With complete secrecy.
  • 23. APPLICATIONS  Credit card information.  Private correspondence.  Social security numbers.  Personal details.  Sensitive company information.
  • 24. CONCLUSION(1) From a technical point of view, cryptography is the solution to many of the security challenges that are present in the internet. The technology exists to solve most of the problems. However, there are several issues that have obstructed the widespread use of cryptography in the internet. First of all, cryptography, as a science, faces a difficult problem for example, terrorists could communicate information over the internet using encryption that law enforcement agencies could not decrypt.
  • 25. CONCLUSION(2) Thus information security measures are needed to protect data from hackers, when it is transmitted between terminal user and computer and between computer and computer and it is also necessary to protect the computer system when there is an attack of virus. The capability of security enabled components still lags behind the claims. Everyone has a different idea of what “security” is, and what levels of risk are acceptable. It’s important to build systems and networks in such a way that the user is not constantly reminded of the security system around him.
  • 26. REFERENCE(1) [1]. 1. TIM MAY, "CRYPTO ANARCHY AND VIRTUAL COMMUNITIES," INTERNET SECURITY, APRIL 2015, PP. 4-12. [2] .KARLS, M. A, CODES, CIPHERS, AND CRYPTOGRAPHY-AN HONORS COLLOQUIUM, 2011. [3]. LAURA SAVU , CRYPTO AND INFORMATION SECURITY , 2019. BACHMAN, D. J.; BROWN, E. A.; [4]. NORTON, A.H, CHOCOLATE KEY CRYPTOGRAPHY, MATHEMATICS TEACHER, 104(2),2010. [5]. PRIMUS, 20 (1),2010, P21-38.
  • 27. REFERENCE(2) [6]. DIFFIE, W. HELLMAN, M., NEW DIRECTIONS IN CRYPTOGRAPHY, IEEE TRANSACTIONS ON INFORMATION THEORY, NOV 1976, VOLUME: 22, ISSUE: 6, 644- 654. [7]. BUTLER W. LAMPSON, COMPUTER SECURITY IN THE REAL WORLD, COMPUTER, VOL. 37, NO. 6, PP. 37-46, JUN., 2004. [8]. ANDERSON, J., COMPUTER SECURITY TECHNOLOGY PLANNING STUDY, U.S. AIR FORCE ELECT. SYS. DIV. TECH. RPT. 73-51, OCT 1972; [9]. JOANNA LYN GRAMA, “LEGAL ISSUES IN INFORMATION SECURITY”, PUBLISHER: JONES & BARTLETT LEARNING . [10]. GENÇOĞLU, M.T, EMBEDDED IMAGE CODING USING LAPLACE TRANSFORM FOR TURKISH LETTERS, MULTIMEDIA TOOLS AND APPLICATIONS, 67(3),2019,PP 1-14