SlideShare a Scribd company logo
INTRODUCTION
 Computer data often travels from one computer to another, leaving
the safety of its protected physical surroundings.
 Once the data is out of hand, people with bad intention could modify
or forge your data, either for amusement or for their own benefit.
Cryptography can reformat and transform our data, making it safer on
its trip between computers.
 The technology is based on the essentials of secret codes,
augmented by modern mathematics that protects our data in
powerful ways.
• Computer Security - generic name for the collection of tools designed
to protect data and to thwart hackers
• Network Security - measures to protect data during their
transmission
• Internet Security - measures to protect data during their transmission
over a collection of interconnected networks
Security Attacks, Services and Mechanisms
• To assess the security needs of an organization effectively, the manager
responsible for security needs some systematic way of defining the
requirements for security and characterization of approaches to satisfy
those requirements.
• One approach is to consider three aspects of information security:
• Security attack – Any action that compromises the security of information
owned by an organization.
• Security mechanism – A mechanism that is designed to detect, prevent or
recover from a security attack.
• Security service – A service that enhances the security of the data
processing systems and the information transfers of an organization.
The services are intended to counter security attacks and they make use of
one or more security mechanisms to provide the service.
Basic Concepts
• Cryptography The art or science encompassing the principles and
methods of transforming an intelligible message into one that is
unintelligible, and then retransforming that message back to its
original form.
• Plaintext The original intelligible message
• Cipher text The transformed message
• Cipher An algorithm for transforming an intelligible message into one
that is unintelligible by transposition and/or substitution methods
• Key Some critical information used by the cipher, known only to the
sender& receiver
• Encipher (encode) The process of converting plaintext to cipher text
using a cipher and a key
• Decipher (decode) the process of converting cipher text back into
plaintext using a cipher and a key
• Cryptanalysis The study of principles and methods of transforming an
unintelligible message back into an intelligible message without
knowledge of the key. Also called code breaking
• Cryptology Both cryptography and cryptanalysis
• ode An algorithm for transforming an intelligible message into an
unintelligible one using a codebook
Cryptography Cryptographic systems are generally classified along 3
independent dimensions?
Type of operations used for transforming plain text
to cipher text
• All the encryption algorithms are based on two general principles:
substitution, in which each element in the plaintext is mapped into
another element, and
• transposition, in which elements in the plaintext are rearranged.
The number of keys used
• If the sender and receiver uses same key then it is said to be symmetric key
(or) single key (or) conventional encryption.
• If the sender and receiver use different keys, then it is said to be public key
encryption.
• The way in which the plain text is processed A block cipher processes the
input and block of elements at a time, producing output block for each
input block.
• STEGANOGRAPHYA plaintext message may be hidden in any one of the two
ways. The methods of steganography conceal the existence of the message,
whereas the methods of cryptography render the message unintelligible to
outsiders by various transformations of the text.
SECURITY SERVICES
• The classification of security services are as follows:
• Confidentiality: Ensures that the information in a computer system and
transmitted information are accessible only for reading by authorized parties. E.g.
Printing, displaying and other forms of disclosure. Authentication: Ensures that
the origin of a message or electronic document is correctly identified, with an
assurance that the identity is not false.
• Integrity: Ensures that only authorized parties are able to modify computer
system assets and transmitted information. Modification includes writing,
changing status, deleting, creating and delaying or replaying of transmitted
messages.
• Nonrepudiation: Requires that neither the sender nor the receiver of a message
be able to deny the transmission.
• Access control: Requires that access to information resources may be controlled
by or the target system. Availability: Requires that computer system assets be
available to authorized parties when needed.
SECURITY MECHANISMS
• One of the most specific security mechanisms in use is cryptographic
techniques.
• Encryption or encryption-like transformations of information are the
most common means of providing security. Some of the mechanisms
are
1. Encipherment(the process of making data unreadable to unauthorized entities by applying a
cryptographic algorithm (an encryption algorithm). Decipherment (decryption) is the reverse operation by
which the ciphertext is transformed to the plaintext.)
2. Digital Signature
3. Access Control
cryptography introduction.pptx
Access control
• Access control identifies users by verifying various login
credentials, which can include usernames and passwords,
PINs, biometric scans, and security tokens. Many access
control systems also include multifactor authentication (MFA), a
method that requires multiple authentication methods to verify a
user's identity.
SECURITY ATTACKS
• There are four general categories of attack which are listed below.
1. Interruption An asset of the system is destroyed or becomes
unavailable or unusable. This is an attack on availability e.g.,
destruction of piece of hardware, cutting of a communication line
or Disabling of file management system.
2. Interception:
An unauthorized party gains access to an asset. This is an attack on
confidentiality. Unauthorized party could be a person, a program or a
computer.e.g., wire tapping to capture data in the network, illicit
copying of files
3.Modification
An unauthorized party not only gains access to but tampers with an
asset. This is an attack on integrity. e.g., changing values in data file,
altering a program, modifying the contents of messages being
transmitted in a network
Eavesdropper or forger
4. Fabrication
An unauthorized party inserts counterfeit objects into the system. This
is an attack on authenticity. e.g., insertion of spurious message in a
network or addition of records to a file.
Cryptographic Attacks
• Passive Attacks
• Passive attacks are in the nature of eavesdropping on, or monitoring of,
transmissions. The goal of the opponent is to obtain information that is being
transmitted. Passive attacks are of two types:
1.Release of message contents: A telephone conversation, an e-mail message
and a transferred file may contain sensitive or confidential information. We
would like to prevent the opponent from learning the contents of these
transmissions.
2. Traffic analysis: If we had encryption protection in place, an opponent might
still be able to observe the pattern of the message. The opponent could
determine the location and identity of communication hosts and could observe
the frequency and length of messages being exchanged. This information might
be useful in guessing the nature of communication that was taking place.
Passive attacks are very difficult to detect because they do not involve any
alteration of data. However, it is feasible to prevent the success of these
attacks.
Active attacks
These attacks involve some modification of the data stream or the creation of a
false stream. These attacks can be classified in to four categories:
Masquerade – One entity pretends to be a different entity.
A masquerade attack is an attack that uses a fake identity, such as a network identity, to gain unauthorized access
to personal computer information through legitimate access identification. If an authorization process is not fully
protected, it can become extremely vulnerable to a masquerade attack.
Masquerade attacks can be perpetrated using stolen passwords and logons, by locating gaps in programs, or by
finding a way around the authentication process.
Replay – involves passive capture of a data unit and its subsequent transmission to
produce an unauthorized effect.(server or receiver gets the message twice — once from the true
sender and once from the attacker)
Modification of messages – Some portion of message is altered, or the messages
are delayed or recorded, to produce an unauthorized effect.
Denial of service – Prevents or inhibits the normal use or management of
communication facilities. Another form of service denial is the disruption of an
entire network, either by disabling the network or overloading it with messages so
as to degrade performance
• It is quite difficult to prevent active attacks absolutely, because to do
so would require physical protection of all communication facilities
and paths at all times. Instead, the goal is to detect them and to
recover from any disruption or delays caused by them.
• Symmetric and public key algorithms
• Encryption/Decryption methods fall into two categories.
Symmetric key, the encryption and decryption keys are known both to
sender and receiver. The encryption key is shared, and the decryption
key is easily calculated from it.In many cases, the encryption and
decryption keys are the same.
In public key cryptography, encryption key is made public, but it is
computationally infeasible to find the decryption key without the
information known to the receiver
cryptography introduction.pptx
cryptography introduction.pptx
cryptography introduction.pptx
• A message is to be transferred from one party to another across some
sort of internet. The two parties, who are the principals in this
transaction, must cooperate for the exchange to take place.A logical
information channel is established by defining a route through the
internet from source to destination and by the cooperative use of
communication protocols (e.g., TCP/IP) by the two principals

More Related Content

PDF
information technology cryptography Msc chapter 1-4.pdf
PDF
chapter 1-4.pdf
PPTX
Cryptography and Network Security-ch1-4.pptx
PPTX
Information Assurance and Security all in One Handout.pptx
PPTX
Seminar Information Protection & Computer Security (Cryptography).pptx
PPTX
Chapter 1 information assurance and security
PPT
Cryptography
PPT
CNS Unit-I_final.ppt
information technology cryptography Msc chapter 1-4.pdf
chapter 1-4.pdf
Cryptography and Network Security-ch1-4.pptx
Information Assurance and Security all in One Handout.pptx
Seminar Information Protection & Computer Security (Cryptography).pptx
Chapter 1 information assurance and security
Cryptography
CNS Unit-I_final.ppt

Similar to cryptography introduction.pptx (20)

PPT
Cryptography introduction
PDF
Cryptography-PART-1.pdf,taught in nitw 2025
PPTX
cryptography_and_Network_Security_fuck_scribd_scribd_will_go_to_hell.pptx
PDF
ch01.pdf
PPT
Info security & crypto
PPT
Module-1.ppt cryptography and network security
PPTX
Mastering Network Security: Protecting Networks from Cyber Threats with Firew...
PPTX
CNS new ppt unit 1.pptx
PPTX
Cryptography and attacks ins
PPTX
Unit-1.pptx
PPTX
CRYPTOGRAPHY crytopgraphy wh is sd wkd ,w d .pptx
PDF
Cryptography networkcns subject notes
PPTX
Introduction of network security
PPTX
CRYPTOGRAPHY AND NETWORK SECURITY
PDF
Cryptography and Network Lecture Notes
PDF
wireless networking chapter three WAN.pdf
PPTX
cns unit 1.pptx
PPTX
BCA-601N_final_1-1.pptx uuggjjgghjjhhjjj
PPTX
BCA-601N_final_1-1Finalsem6metworks.pptx
PPTX
chapter 7.pptx
Cryptography introduction
Cryptography-PART-1.pdf,taught in nitw 2025
cryptography_and_Network_Security_fuck_scribd_scribd_will_go_to_hell.pptx
ch01.pdf
Info security & crypto
Module-1.ppt cryptography and network security
Mastering Network Security: Protecting Networks from Cyber Threats with Firew...
CNS new ppt unit 1.pptx
Cryptography and attacks ins
Unit-1.pptx
CRYPTOGRAPHY crytopgraphy wh is sd wkd ,w d .pptx
Cryptography networkcns subject notes
Introduction of network security
CRYPTOGRAPHY AND NETWORK SECURITY
Cryptography and Network Lecture Notes
wireless networking chapter three WAN.pdf
cns unit 1.pptx
BCA-601N_final_1-1.pptx uuggjjgghjjhhjjj
BCA-601N_final_1-1Finalsem6metworks.pptx
chapter 7.pptx
Ad

Recently uploaded (20)

PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPT
Teaching material agriculture food technology
PPTX
A Presentation on Artificial Intelligence
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Electronic commerce courselecture one. Pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
Building Integrated photovoltaic BIPV_UPV.pdf
Big Data Technologies - Introduction.pptx
CIFDAQ's Market Insight: SEC Turns Pro Crypto
NewMind AI Weekly Chronicles - August'25 Week I
NewMind AI Monthly Chronicles - July 2025
Mobile App Security Testing_ A Comprehensive Guide.pdf
The AUB Centre for AI in Media Proposal.docx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Teaching material agriculture food technology
A Presentation on Artificial Intelligence
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Encapsulation_ Review paper, used for researhc scholars
“AI and Expert System Decision Support & Business Intelligence Systems”
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Electronic commerce courselecture one. Pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Advanced methodologies resolving dimensionality complications for autism neur...
Ad

cryptography introduction.pptx

  • 1. INTRODUCTION  Computer data often travels from one computer to another, leaving the safety of its protected physical surroundings.  Once the data is out of hand, people with bad intention could modify or forge your data, either for amusement or for their own benefit. Cryptography can reformat and transform our data, making it safer on its trip between computers.  The technology is based on the essentials of secret codes, augmented by modern mathematics that protects our data in powerful ways.
  • 2. • Computer Security - generic name for the collection of tools designed to protect data and to thwart hackers • Network Security - measures to protect data during their transmission • Internet Security - measures to protect data during their transmission over a collection of interconnected networks
  • 3. Security Attacks, Services and Mechanisms • To assess the security needs of an organization effectively, the manager responsible for security needs some systematic way of defining the requirements for security and characterization of approaches to satisfy those requirements. • One approach is to consider three aspects of information security: • Security attack – Any action that compromises the security of information owned by an organization. • Security mechanism – A mechanism that is designed to detect, prevent or recover from a security attack. • Security service – A service that enhances the security of the data processing systems and the information transfers of an organization. The services are intended to counter security attacks and they make use of one or more security mechanisms to provide the service.
  • 4. Basic Concepts • Cryptography The art or science encompassing the principles and methods of transforming an intelligible message into one that is unintelligible, and then retransforming that message back to its original form. • Plaintext The original intelligible message • Cipher text The transformed message • Cipher An algorithm for transforming an intelligible message into one that is unintelligible by transposition and/or substitution methods • Key Some critical information used by the cipher, known only to the sender& receiver
  • 5. • Encipher (encode) The process of converting plaintext to cipher text using a cipher and a key • Decipher (decode) the process of converting cipher text back into plaintext using a cipher and a key • Cryptanalysis The study of principles and methods of transforming an unintelligible message back into an intelligible message without knowledge of the key. Also called code breaking • Cryptology Both cryptography and cryptanalysis • ode An algorithm for transforming an intelligible message into an unintelligible one using a codebook
  • 6. Cryptography Cryptographic systems are generally classified along 3 independent dimensions?
  • 7. Type of operations used for transforming plain text to cipher text • All the encryption algorithms are based on two general principles: substitution, in which each element in the plaintext is mapped into another element, and • transposition, in which elements in the plaintext are rearranged.
  • 8. The number of keys used • If the sender and receiver uses same key then it is said to be symmetric key (or) single key (or) conventional encryption. • If the sender and receiver use different keys, then it is said to be public key encryption. • The way in which the plain text is processed A block cipher processes the input and block of elements at a time, producing output block for each input block. • STEGANOGRAPHYA plaintext message may be hidden in any one of the two ways. The methods of steganography conceal the existence of the message, whereas the methods of cryptography render the message unintelligible to outsiders by various transformations of the text.
  • 9. SECURITY SERVICES • The classification of security services are as follows: • Confidentiality: Ensures that the information in a computer system and transmitted information are accessible only for reading by authorized parties. E.g. Printing, displaying and other forms of disclosure. Authentication: Ensures that the origin of a message or electronic document is correctly identified, with an assurance that the identity is not false. • Integrity: Ensures that only authorized parties are able to modify computer system assets and transmitted information. Modification includes writing, changing status, deleting, creating and delaying or replaying of transmitted messages. • Nonrepudiation: Requires that neither the sender nor the receiver of a message be able to deny the transmission. • Access control: Requires that access to information resources may be controlled by or the target system. Availability: Requires that computer system assets be available to authorized parties when needed.
  • 10. SECURITY MECHANISMS • One of the most specific security mechanisms in use is cryptographic techniques. • Encryption or encryption-like transformations of information are the most common means of providing security. Some of the mechanisms are 1. Encipherment(the process of making data unreadable to unauthorized entities by applying a cryptographic algorithm (an encryption algorithm). Decipherment (decryption) is the reverse operation by which the ciphertext is transformed to the plaintext.) 2. Digital Signature 3. Access Control
  • 12. Access control • Access control identifies users by verifying various login credentials, which can include usernames and passwords, PINs, biometric scans, and security tokens. Many access control systems also include multifactor authentication (MFA), a method that requires multiple authentication methods to verify a user's identity.
  • 13. SECURITY ATTACKS • There are four general categories of attack which are listed below. 1. Interruption An asset of the system is destroyed or becomes unavailable or unusable. This is an attack on availability e.g., destruction of piece of hardware, cutting of a communication line or Disabling of file management system.
  • 14. 2. Interception: An unauthorized party gains access to an asset. This is an attack on confidentiality. Unauthorized party could be a person, a program or a computer.e.g., wire tapping to capture data in the network, illicit copying of files
  • 15. 3.Modification An unauthorized party not only gains access to but tampers with an asset. This is an attack on integrity. e.g., changing values in data file, altering a program, modifying the contents of messages being transmitted in a network Eavesdropper or forger
  • 16. 4. Fabrication An unauthorized party inserts counterfeit objects into the system. This is an attack on authenticity. e.g., insertion of spurious message in a network or addition of records to a file.
  • 17. Cryptographic Attacks • Passive Attacks • Passive attacks are in the nature of eavesdropping on, or monitoring of, transmissions. The goal of the opponent is to obtain information that is being transmitted. Passive attacks are of two types: 1.Release of message contents: A telephone conversation, an e-mail message and a transferred file may contain sensitive or confidential information. We would like to prevent the opponent from learning the contents of these transmissions. 2. Traffic analysis: If we had encryption protection in place, an opponent might still be able to observe the pattern of the message. The opponent could determine the location and identity of communication hosts and could observe the frequency and length of messages being exchanged. This information might be useful in guessing the nature of communication that was taking place. Passive attacks are very difficult to detect because they do not involve any alteration of data. However, it is feasible to prevent the success of these attacks.
  • 18. Active attacks These attacks involve some modification of the data stream or the creation of a false stream. These attacks can be classified in to four categories: Masquerade – One entity pretends to be a different entity. A masquerade attack is an attack that uses a fake identity, such as a network identity, to gain unauthorized access to personal computer information through legitimate access identification. If an authorization process is not fully protected, it can become extremely vulnerable to a masquerade attack. Masquerade attacks can be perpetrated using stolen passwords and logons, by locating gaps in programs, or by finding a way around the authentication process. Replay – involves passive capture of a data unit and its subsequent transmission to produce an unauthorized effect.(server or receiver gets the message twice — once from the true sender and once from the attacker) Modification of messages – Some portion of message is altered, or the messages are delayed or recorded, to produce an unauthorized effect. Denial of service – Prevents or inhibits the normal use or management of communication facilities. Another form of service denial is the disruption of an entire network, either by disabling the network or overloading it with messages so as to degrade performance
  • 19. • It is quite difficult to prevent active attacks absolutely, because to do so would require physical protection of all communication facilities and paths at all times. Instead, the goal is to detect them and to recover from any disruption or delays caused by them. • Symmetric and public key algorithms • Encryption/Decryption methods fall into two categories. Symmetric key, the encryption and decryption keys are known both to sender and receiver. The encryption key is shared, and the decryption key is easily calculated from it.In many cases, the encryption and decryption keys are the same. In public key cryptography, encryption key is made public, but it is computationally infeasible to find the decryption key without the information known to the receiver
  • 23. • A message is to be transferred from one party to another across some sort of internet. The two parties, who are the principals in this transaction, must cooperate for the exchange to take place.A logical information channel is established by defining a route through the internet from source to destination and by the cooperative use of communication protocols (e.g., TCP/IP) by the two principals