SlideShare a Scribd company logo
INTRODUCTION
Cryptography is the practice of securing communication and
information through the use of codes and ciphers. Its primary goal is to
protect data from unauthorized access, ensuring confidentiality,
integrity, and authenticity.
Cryptography is essential in fields like online banking, secure
communications, digital transactions, and VPNs. It plays a major role in
ensuring privacy and trust in digital systems.
BUILDING BLOCKS OF CLASSICAL CRYPOTOGRAPHIC
TECHNIQUES
Encryption and Decryption
Key
Substitution
Transposition
Padding
Cryptographic Algorithms
Steganography
Message Authentication and Integrity
Brute force
Encryption and Decryption
• Encryption: The process of converting plaintext (original data) into
ciphertext (encoded data) using an algorithm and a key.
• Decryption: The reverse process of converting ciphertext back into the
original plaintext using a key and the corresponding decryption
algorithm.
Example: In the Caesar Cipher, the encryption and decryption involve
shifting the letters of the alphabet by a certain number, which serves as
the key.
Key
A key is a piece of information (typically a string of characters or
numbers) used by an algorithm to encrypt and decrypt data. In classical
cryptography, keys are usually secret and shared between the sender
and receiver.
• Symmetric Key Cryptography: The same key is used for both
encryption and decryption (e.g., the Vigenère Cipher, the Caesar
Cipher).
• Asymmetric Key Cryptography: Uses a pair of keys (public and private
keys), although this is more common in modern cryptography, not
classical.
Substitution
Involves replacing elements of the plaintext with other symbols, letters,
or numbers according to a specific rule or cipher. This could involve
simple shifts or more complex transformations.
Example: In the Caesar Cipher, each letter in the plaintext is substituted
with another letter a fixed number of positions down the alphabet.
Transposition
• Involves rearranging the positions of the elements in the plaintext
without changing the actual characters. This process is designed to
make the ciphertext look random or scrambled.
• Example: In the Rail Fence Cipher, plaintext is written in a zigzag
pattern across multiple "rails" and then read off in a specific order.
Padding
• Padding is the process of adding extra characters or symbols to the
plaintext to ensure it fits a specific block size or structure required by
the encryption algorithm. This ensures that the plaintext is fully
encrypted and prevents predictable patterns in the ciphertext.
Well-Known Classical Ciphers
• Caesar Cipher (Shift Cipher)
One of the simplest and oldest ciphers, it involves shifting the letters of the alphabet
by a fixed number (e.g., a shift of 3 means A becomes D, B becomes E, etc.). This is a
substitution cipher.
• Security: Very weak by modern standards, as there are only 25 possible shifts, so
brute force is trivial.
• Vigenère Cipher
A polyalphabetic substitution cipher where each letter in the plaintext is replaced by
a letter from a repeating keyword. The shift for each letter depends on the
corresponding letter in the keyword (e.g., with the keyword "KEY," K shifts by 10, E by
4, and Y by 24).
• Security: More secure than the Caesar Cipher, especially for longer keys. However,
it can be broken with frequency analysis if the key is short or if the same key is
reused.
Playfair Cipher
A digraph cipher that encrypts pairs of letters (e.g., "TH" or "HE"). A 5x5 matrix
of letters is used, and each pair of letters is replaced based on their positions in
the matrix (e.g., if they appear in the same row or column, they are substituted
accordingly).
• Security: Considered stronger than simple substitution ciphers, but still
breakable with frequency analysis.
Atbash Cipher
A simple substitution cipher where the alphabet is reversed. A becomes Z, B
becomes Y, C becomes X, and so on.
• Security: Very weak, as it's just a single substitution and can be easily broken
Columnar Transposition Cipher
A transposition cipher where the plaintext is written into a grid of a fixed
number of columns, and then the columns are read off in a specific order.
• Security: Stronger than simple substitution ciphers, but still breakable using
pattern recognition and frequency analysis.
Well-Known Modern (Professional) Ciphers
(Algorithms)
Data Encryption Standard (DES)
A symmetric-key algorithm that was widely used for encrypting data. It
operates on 64-bit blocks of plaintext and uses a 56-bit key. DES uses a series of
complex transformations and permutations in multiple rounds (16 rounds).
While once considered secure, DES is no longer considered safe due to its short
key length. It is vulnerable to brute-force attacks.
Triple DES (3DES)
A variant of DES that applies the DES algorithm three times with either two or
three different keys. It was designed to overcome the weaknesses of DES.
• Security: Stronger than DES, but still vulnerable to modern attacks due to its
relatively short key length. It is now largely considered outdated.
• Advanced Encryption Standard (AES)
The most widely used symmetric encryption algorithm, AES operates on block
sizes of 128 bits and supports key lengths of 128, 192, or 256 bits. It is based on
a substitution-permutation network and performs multiple rounds of
transformations.
AES is highly secure and efficient, making it the standard for modern
encryption. It is considered unbreakable with current technology when using
longer key sizes (256-bit).
• RSA (Rivest–Shamir–Adleman)
An asymmetric (public-key) algorithm used for encrypting and signing data. RSA
works by using two keys, a public key for encryption and a private key for
decryption. It relies on the difficulty of factoring large prime numbers.
RSA is widely used in modern cryptography, especially for key exchange and
digital signatures. Its security is based on the difficulty of factoring large
numbers, but it is vulnerable to advances in quantum computing.
Blowfish
A symmetric key block cipher that operates on 64-bit blocks and supports variable
key lengths up to 448 bits. It is known for its speed and simplicity.
Blowfish is considered secure for most purposes but has been largely replaced by
AES due to its block size limitation (64-bit), which makes it less secure against
modern attacks.
Twofish
A symmetric key block cipher similar to Blowfish, but with a larger block size (128-
bit) and key size support up to 256 bits. It was a finalist in the competition to
replace DES (which led to the adoption of AES).
Twofish is considered to be a very secure algorithm and is still used in some
applications, though AES has become the dominant choice.
Elliptic Curve Cryptography (ECC)
A form of public-key cryptography that uses the mathematics of elliptic curves over
finite fields. ECC provides the same level of security as RSA but with much smaller
key sizes, making it more efficient.
CHARACTERISTICS OF ROBUST, RELIABLE AND
UNBREAKABLE ENCRYPTION CIPHER
• Uses a strong, long, and random key.
• Is resistant to both brute-force and cryptanalytic attacks.
• Implements confusion and diffusion effectively.
• Is resistant to side-channel and quantum attacks.
• Uses secure modes of operation.
• Supports efficient, practical implementations and secure key
management.
CONCLUSION
Substitution and Transposition are the key cryptographic operations.
Keys play an essential role in the encryption and decryption process.
Classical cryptography often faced vulnerabilities that were addressed
with advanced modern techniques, such as asymmetric key
cryptography and hashing algorithms
Modern cryptographic techniques focus on both security and
efficiency, with algorithms like AES and ECC offering a strong balance
THANK YOU

More Related Content

PDF
Introduction to Cryptography
PPTX
Unit -1 cryptography contiues with algorithm.pptx
PPTX
Cryptography .pptx
PPTX
Chapter# 3 modified.pptx
PPTX
cryptographyyy .pptx
PDF
Basic Cryptography.pdf
PPTX
DESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptx
PPT
Cryptography - Overview
Introduction to Cryptography
Unit -1 cryptography contiues with algorithm.pptx
Cryptography .pptx
Chapter# 3 modified.pptx
cryptographyyy .pptx
Basic Cryptography.pdf
DESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptx
Cryptography - Overview

Similar to Cryptography is the practice of securing communication and information (20)

PPTX
Symmetric--Cipher-Model-An-Overview.pptx
PPT
encryptcryptographyyyyyyyyyyyyyyyyyy.ppt
PPTX
FormacaoCrypto
PPT
7-cryptography.ppt
PPT
Introduction to Cryptography and its Basic Fundamentals
PPT
7 cryptography
PPT
detailed presentation on cryptography analysis
PPT
This is the presentation ofcryptography.ppt
PPT
7-cryptography.pptfffffffffffffffffffffffffffffffffff
PPT
7-cryptography.ppt
PPT
7-cryptography.ppt
PPT
the art of the fking dum crypto_basic.ppt
PPT
Crytography CertCourse Module 1 & 2.ppt
PPT
PPT
Best book for the cryptography doctor.ppt
PPT
9-crypthvvy6u7btyjibuibuibryjijighhnm.ppt
PPT
Chaos based cryprography - encryption & hash function
PPT
Computer security communication networking cryptography .ppt
PPT
introduction to cryptography and its basic techniques
PPT
9-crypt.ppt9-crypt.ppt9-crypt.ppt9-crypt.ppt
Symmetric--Cipher-Model-An-Overview.pptx
encryptcryptographyyyyyyyyyyyyyyyyyy.ppt
FormacaoCrypto
7-cryptography.ppt
Introduction to Cryptography and its Basic Fundamentals
7 cryptography
detailed presentation on cryptography analysis
This is the presentation ofcryptography.ppt
7-cryptography.pptfffffffffffffffffffffffffffffffffff
7-cryptography.ppt
7-cryptography.ppt
the art of the fking dum crypto_basic.ppt
Crytography CertCourse Module 1 & 2.ppt
Best book for the cryptography doctor.ppt
9-crypthvvy6u7btyjibuibuibryjijighhnm.ppt
Chaos based cryprography - encryption & hash function
Computer security communication networking cryptography .ppt
introduction to cryptography and its basic techniques
9-crypt.ppt9-crypt.ppt9-crypt.ppt9-crypt.ppt
Ad

Recently uploaded (20)

PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
KodekX | Application Modernization Development
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Encapsulation theory and applications.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Network Security Unit 5.pdf for BCA BBA.
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
cuic standard and advanced reporting.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Digital-Transformation-Roadmap-for-Companies.pptx
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
KodekX | Application Modernization Development
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Encapsulation theory and applications.pdf
Understanding_Digital_Forensics_Presentation.pptx
Encapsulation_ Review paper, used for researhc scholars
Network Security Unit 5.pdf for BCA BBA.
The AUB Centre for AI in Media Proposal.docx
Programs and apps: productivity, graphics, security and other tools
20250228 LYD VKU AI Blended-Learning.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
The Rise and Fall of 3GPP – Time for a Sabbatical?
Building Integrated photovoltaic BIPV_UPV.pdf
cuic standard and advanced reporting.pdf
Ad

Cryptography is the practice of securing communication and information

  • 1. INTRODUCTION Cryptography is the practice of securing communication and information through the use of codes and ciphers. Its primary goal is to protect data from unauthorized access, ensuring confidentiality, integrity, and authenticity. Cryptography is essential in fields like online banking, secure communications, digital transactions, and VPNs. It plays a major role in ensuring privacy and trust in digital systems.
  • 2. BUILDING BLOCKS OF CLASSICAL CRYPOTOGRAPHIC TECHNIQUES Encryption and Decryption Key Substitution Transposition Padding Cryptographic Algorithms Steganography Message Authentication and Integrity Brute force
  • 3. Encryption and Decryption • Encryption: The process of converting plaintext (original data) into ciphertext (encoded data) using an algorithm and a key. • Decryption: The reverse process of converting ciphertext back into the original plaintext using a key and the corresponding decryption algorithm. Example: In the Caesar Cipher, the encryption and decryption involve shifting the letters of the alphabet by a certain number, which serves as the key.
  • 4. Key A key is a piece of information (typically a string of characters or numbers) used by an algorithm to encrypt and decrypt data. In classical cryptography, keys are usually secret and shared between the sender and receiver. • Symmetric Key Cryptography: The same key is used for both encryption and decryption (e.g., the Vigenère Cipher, the Caesar Cipher). • Asymmetric Key Cryptography: Uses a pair of keys (public and private keys), although this is more common in modern cryptography, not classical.
  • 5. Substitution Involves replacing elements of the plaintext with other symbols, letters, or numbers according to a specific rule or cipher. This could involve simple shifts or more complex transformations. Example: In the Caesar Cipher, each letter in the plaintext is substituted with another letter a fixed number of positions down the alphabet.
  • 6. Transposition • Involves rearranging the positions of the elements in the plaintext without changing the actual characters. This process is designed to make the ciphertext look random or scrambled. • Example: In the Rail Fence Cipher, plaintext is written in a zigzag pattern across multiple "rails" and then read off in a specific order.
  • 7. Padding • Padding is the process of adding extra characters or symbols to the plaintext to ensure it fits a specific block size or structure required by the encryption algorithm. This ensures that the plaintext is fully encrypted and prevents predictable patterns in the ciphertext.
  • 8. Well-Known Classical Ciphers • Caesar Cipher (Shift Cipher) One of the simplest and oldest ciphers, it involves shifting the letters of the alphabet by a fixed number (e.g., a shift of 3 means A becomes D, B becomes E, etc.). This is a substitution cipher. • Security: Very weak by modern standards, as there are only 25 possible shifts, so brute force is trivial. • Vigenère Cipher A polyalphabetic substitution cipher where each letter in the plaintext is replaced by a letter from a repeating keyword. The shift for each letter depends on the corresponding letter in the keyword (e.g., with the keyword "KEY," K shifts by 10, E by 4, and Y by 24). • Security: More secure than the Caesar Cipher, especially for longer keys. However, it can be broken with frequency analysis if the key is short or if the same key is reused.
  • 9. Playfair Cipher A digraph cipher that encrypts pairs of letters (e.g., "TH" or "HE"). A 5x5 matrix of letters is used, and each pair of letters is replaced based on their positions in the matrix (e.g., if they appear in the same row or column, they are substituted accordingly). • Security: Considered stronger than simple substitution ciphers, but still breakable with frequency analysis. Atbash Cipher A simple substitution cipher where the alphabet is reversed. A becomes Z, B becomes Y, C becomes X, and so on. • Security: Very weak, as it's just a single substitution and can be easily broken Columnar Transposition Cipher A transposition cipher where the plaintext is written into a grid of a fixed number of columns, and then the columns are read off in a specific order. • Security: Stronger than simple substitution ciphers, but still breakable using pattern recognition and frequency analysis.
  • 10. Well-Known Modern (Professional) Ciphers (Algorithms) Data Encryption Standard (DES) A symmetric-key algorithm that was widely used for encrypting data. It operates on 64-bit blocks of plaintext and uses a 56-bit key. DES uses a series of complex transformations and permutations in multiple rounds (16 rounds). While once considered secure, DES is no longer considered safe due to its short key length. It is vulnerable to brute-force attacks. Triple DES (3DES) A variant of DES that applies the DES algorithm three times with either two or three different keys. It was designed to overcome the weaknesses of DES. • Security: Stronger than DES, but still vulnerable to modern attacks due to its relatively short key length. It is now largely considered outdated.
  • 11. • Advanced Encryption Standard (AES) The most widely used symmetric encryption algorithm, AES operates on block sizes of 128 bits and supports key lengths of 128, 192, or 256 bits. It is based on a substitution-permutation network and performs multiple rounds of transformations. AES is highly secure and efficient, making it the standard for modern encryption. It is considered unbreakable with current technology when using longer key sizes (256-bit). • RSA (Rivest–Shamir–Adleman) An asymmetric (public-key) algorithm used for encrypting and signing data. RSA works by using two keys, a public key for encryption and a private key for decryption. It relies on the difficulty of factoring large prime numbers. RSA is widely used in modern cryptography, especially for key exchange and digital signatures. Its security is based on the difficulty of factoring large numbers, but it is vulnerable to advances in quantum computing.
  • 12. Blowfish A symmetric key block cipher that operates on 64-bit blocks and supports variable key lengths up to 448 bits. It is known for its speed and simplicity. Blowfish is considered secure for most purposes but has been largely replaced by AES due to its block size limitation (64-bit), which makes it less secure against modern attacks. Twofish A symmetric key block cipher similar to Blowfish, but with a larger block size (128- bit) and key size support up to 256 bits. It was a finalist in the competition to replace DES (which led to the adoption of AES). Twofish is considered to be a very secure algorithm and is still used in some applications, though AES has become the dominant choice. Elliptic Curve Cryptography (ECC) A form of public-key cryptography that uses the mathematics of elliptic curves over finite fields. ECC provides the same level of security as RSA but with much smaller key sizes, making it more efficient.
  • 13. CHARACTERISTICS OF ROBUST, RELIABLE AND UNBREAKABLE ENCRYPTION CIPHER • Uses a strong, long, and random key. • Is resistant to both brute-force and cryptanalytic attacks. • Implements confusion and diffusion effectively. • Is resistant to side-channel and quantum attacks. • Uses secure modes of operation. • Supports efficient, practical implementations and secure key management.
  • 14. CONCLUSION Substitution and Transposition are the key cryptographic operations. Keys play an essential role in the encryption and decryption process. Classical cryptography often faced vulnerabilities that were addressed with advanced modern techniques, such as asymmetric key cryptography and hashing algorithms Modern cryptographic techniques focus on both security and efficiency, with algorithms like AES and ECC offering a strong balance