SlideShare a Scribd company logo
Cryptography Basic concepts and terms Public/Private Key Algorithms Key Distribution/Management Digital Signatures Miscellaneous Crypto
Crytpo Intro Why Encrypt? Protect stored information Protect Encryption - process by which  plaintext  is converted to  ciphertext  using a  key Decryption - process by which ciphertext is converted to plaintext (with the appropriate key) plaintext (cleartext)- intelligible data
Crypto Terms Cryptography - art/science relating to encrypting, decrypting information cryptanalysis - art/science relating to converting ciphertext to plaintext without the (secret) key Link encryption - the individual application of encryption to data on each link of a network (nodes are a weak link) end-to-end encryption - the encryption of data from source system to end system (https)
Crypto Terms Repudiation - In communication between parties, Denial by one party of having participated in communication  (commonly heard as non-repudiation) Traffic analysis - inference of information from analysis of traffic (presence, absence, frequency, etc.) Traffic padding - generation of spurious data units Work Factor - effort/time needed to overcome a protective measure
One - Time Pad Two identical pads (keys), one with sender, one with recipient The random pads (keys) are the same length as the message Unbreakable by exhaustive search Relies on physical security of the pads Pads can only be used once
Cryptanalysis Terms  Ciphertext-only attack - attacker attempts to decrypt ciphertext  Known-plaintext attack - attacker attempts to decrypt ciphertext given knowledge of some plaintext (think “Login:  “) Chosen-plaintext attack - attacker obtains ciphertext corresponding to  selected  plaintext Chosen-ciphertext attack - attacker obtains plaintext corresponding to selected ciphertext  (in a public key system, when trying to deduce private key)
Crypto System Properties Encryption/decryption transformations must be efficient for all keys System must be easy to use The security of the system should depend ONLY on the secrecy of the keys and not on the secrecy of the encryption/decryption transformations
Secrecy Requirements If ciphertext and plaintext are known, it should be computationally infeasible to determine the deciphering algorithm It should be computationally infeasible to systematically determine plaintext from intercepted ciphertext (Even if you decrypt ciphertext once, it should require the same amount of work to do it again.) Note: “systematically” allows for a lucky guess Note: “Computationally infeasible” means great effort, doesn’t account for advances in computing, mathematics
Authenticity Requirements If ciphertext and plaintext are known, it should be computationally infeasible to determine the enciphering algorithm It should be computationally infeasible to find valid ciphertext (Even if you encrypt plaintext so that it can be decrypted once, it should require the same amount of work to do it again.)
Public vs. Private Key Encryption Private key encryption uses the same key for both encryption and decryption (faster) (DES) Private key encryption known as  symmetric Public key encryption uses two different keys, one to decrypt and one to encrypt (RSA) Thus, one key can be “public”, because the other key is still necessary for decryption More complex, key management is an issue Public key encryption known as  asymmetric
Encipherment Modes Block Mode ciphers - Message broken into blocks, each block encrypted separately blocks of identical plaintext have identical ciphertext replay and substitution attacks easier (insertion or deletion of blocks Block chaining - parts of the previous block are inserted into the current block makes replay and substitution attacks much harder DES is a block cipher
Encipherment Modes Stream Ciphers - Message broken into characters or bits and enciphered with a “key stream” key stream - should be random and generated independently of the message stream
Digital Encryption Standard ( DES) Developed by IBM in 1972 Never approved for national security applications 64-bit plain & cipher text block size 56-bit true key plus 8 parity bits Single chip (hardware) implementation Most implementations now software 16 rounds of transpositions & substitutions Standard for unclassified government data symmetric, private key
Applications of DES Double DES Effective key length of 112 bits Work factor about the same as single DES Triple DES Encrypt with first key Decrypt with second key Encrypt with first key Very secure
Public key RSA - Rivest, Shamir, and Adleman Introduced in 1976 Relies on factoring of large numbers Elliptic Curve Cryptosystem (ECC) Highest strength/bit of public key stream Big savings over other public key systems Computation Bandwidth Storage
Strength Comparison
Key Selection Similar to password selection, users are the weak link Random number generators may not be random Key clustering - two different keys produce equivalent ciphertext from equivalent plaintext
Key Management Using a public key system, A wants to talk to B C is the Key Distribution Center, has A and B’s public key A calls B, and the calling protocol contacts C C encrypts a session key, “k”, with the public keys and sends the encrypted “k” to A and B A and B can then communicate
Key Management Issues Key storage, recovery Key revocation (lost, compromised keys) Must be fully automated No key in clear outside crypto system Choose key randomly from entire key space Key-encrypting key must be separate from data keys Infrequently use keys with long life
Key Escrow Separate agencies maintain components of private key, which, when combined, can be used to decrypt ciphertext Stated reason is to decrypt drug related communications Clipper chip is an example secret algorithm Unpopular, unused Issues include key storage, Big Brother
Digital Signature Used like a written signature, binds a message to an individual (Provides non-repudiation): S is sender, R is recipient, and M is the Message R must be able to validate S’s signature on M No one can forge S’s signature If S denies signing M, a 3rd party must be able to resolve the dispute between S and R Easy with public key encryption  - S encrypts with private key, R can decrypt with public (so can 3rd party)
Digital Signature Previous method results in M in ciphertext, anyone without S’s public key cannot view An alternative is to compute a digest of the message using a public hash function, then encrypt the digest using private key.  Thus, the only ciphertext is the hash. MD2, MD4, and MD5 are public hash functions that create message digests.  MD5 is strongest, a Rivest upgrade of MD4
Hash Function Hash function produces a message digest message digest also known as fingerprint, imprint 2 messages with the same digest are extremely unlikely Signer can’t claim a different message was signed Recipient can’t claim a different message was signed
Digital Signature Standard (DSS) Uses secure hash algorithm Condenses message to 160 bits Key size 512 - 1024 bits Proposed by NIST in 1991 Adopted???
Message Authentication Code General term used to describe digital signatures
Attacks Brute force attack Attempt to use all keys expensive time consuming But, processing speed doubles every 18 months, Clustered workstations, etc.
Attacks Analytic Use algorithm and algebraic manipulation to reduce complexity Statistical Use statistical weaknesses in design (more 1’s than 0s in keystream on average, for example) Implementation Microsoft - PPTP, LANMAN passwords poor randomization on Netscape key
Kerberos Authentication and encryption system designed at MIT Assigns a unique key, called a “ticket”, to each user on the network “Ticket” embedded in user’s messages to identify sender
Certificate Authority Trusted, 3rd party organization CA (Certificate Authority) guarantees that the individual granted a certificate is who he/she claims to be CA usually has arrangement with financial institution to confirm identity Critical to data security and electronic commerce
Public Key Infrastructure Known as PKI Necessary for widespread electronic commerce No absolute definition or standard A system of digital certificates, Certificate Authorities, and other registration authorities that verify and authenticate the validity of parties in Internet transactions
Steganography Art of hiding communications Why? Deny message exists Hide data transmissions (remember the microdot?) Common implementations hide information in graphic files, sound files, or slack space

More Related Content

PPT
6. cryptography
PPTX
Cryptography
PDF
Introduction to Cryptography
PPTX
Cryptography
PPTX
Cryptography
PPTX
Cryptography and Information Security
PPTX
cryptography
PPTX
Cryptography
6. cryptography
Cryptography
Introduction to Cryptography
Cryptography
Cryptography
Cryptography and Information Security
cryptography
Cryptography

What's hot (20)

PPTX
Rsa cryptosystem
PPTX
Introduction to Cryptography
PDF
CRYPTOGRAPHY AND NETWORK SECURITY
PPTX
Cryptography.ppt
PPT
Fundamentals of cryptography
PPTX
Cryptography
PDF
2. Stream Ciphers
PPTX
Digital certificates
PPTX
Cryptography
PPTX
Elgamal & schnorr digital signature scheme copy
PPT
Cryptography
PDF
Asymmetric Cryptography
PPT
Digital Signature Standard
PPTX
Symmetric and asymmetric key cryptography
PPT
Cryptography
PPTX
Transport Layer Security (TLS)
PPTX
Cryptography and network security
PDF
Introduction to Cryptography
PPTX
Cryptography
Rsa cryptosystem
Introduction to Cryptography
CRYPTOGRAPHY AND NETWORK SECURITY
Cryptography.ppt
Fundamentals of cryptography
Cryptography
2. Stream Ciphers
Digital certificates
Cryptography
Elgamal & schnorr digital signature scheme copy
Cryptography
Asymmetric Cryptography
Digital Signature Standard
Symmetric and asymmetric key cryptography
Cryptography
Transport Layer Security (TLS)
Cryptography and network security
Introduction to Cryptography
Cryptography
Ad

Viewers also liked (20)

PDF
Public private key
PDF
Public key cryptography
PDF
Public Key Authentication With SSH
PPTX
Public Key Cryptosystem
KEY
Alice & bob public key cryptography 101
PPTX
3 public key cryptography
PPT
PUBLIC KEY ENCRYPTION
PPTX
Cryptography.ppt
PDF
Key Management Schemes for Secure Communication in Heterogeneous Sensor Networks
PPT
Handout infosec defense-mechanism-y3dips
PPT
Cryptography
PDF
Contributory broadcast encryption with efficient encryption and short ciphert...
PDF
PPTX
Attack lecture #2 ppt
PPTX
Ppt.1
PPT
Public Key Cryptography
PDF
Ieee 2015 2016
PPTX
Introduction to SSH & PGP
PPTX
Message digest & digital signature
PPTX
Image Encryption in java ppt.
Public private key
Public key cryptography
Public Key Authentication With SSH
Public Key Cryptosystem
Alice & bob public key cryptography 101
3 public key cryptography
PUBLIC KEY ENCRYPTION
Cryptography.ppt
Key Management Schemes for Secure Communication in Heterogeneous Sensor Networks
Handout infosec defense-mechanism-y3dips
Cryptography
Contributory broadcast encryption with efficient encryption and short ciphert...
Attack lecture #2 ppt
Ppt.1
Public Key Cryptography
Ieee 2015 2016
Introduction to SSH & PGP
Message digest & digital signature
Image Encryption in java ppt.
Ad

Similar to Cryptography (20)

PPT
Ch12 Cryptography it-slideshares.blogspot.com
PPT
Network Security and Cryptography
PPT
Cryptography Lecture by Sam Bowne
PPTX
Cryptography
PPT
Introduction To PKI Technology
PPTX
Encryption techniques
PPTX
Cryptography and network security
PPTX
Security - ch3.pptx
PPT
Rothke Info Security Canada 2007 Final
PDF
Cryptology - The practice and study of hiding information
PPTX
Security - ch3.pptx
PPT
Day5
PDF
Chapter 8 cryptography lanjutan
PPT
1329 n 9460
PPTX
Security
PPT
Lecture 7 - CRYPTOGRAPHYpptof my presentation.ppt
PPTX
CNS 3RD UNIT PPT.pptx
PPT
Network security
DOC
DOCS ON NETWORK SECURITY
PDF
cryptography
Ch12 Cryptography it-slideshares.blogspot.com
Network Security and Cryptography
Cryptography Lecture by Sam Bowne
Cryptography
Introduction To PKI Technology
Encryption techniques
Cryptography and network security
Security - ch3.pptx
Rothke Info Security Canada 2007 Final
Cryptology - The practice and study of hiding information
Security - ch3.pptx
Day5
Chapter 8 cryptography lanjutan
1329 n 9460
Security
Lecture 7 - CRYPTOGRAPHYpptof my presentation.ppt
CNS 3RD UNIT PPT.pptx
Network security
DOCS ON NETWORK SECURITY
cryptography

More from amiable_indian (20)

PDF
Phishing As Tragedy of the Commons
PDF
Cisco IOS Attack & Defense - The State of the Art
PDF
Secrets of Top Pentesters
PPS
Workshop on Wireless Security
PDF
Insecure Implementation of Security Best Practices: of hashing, CAPTCHA's and...
PPS
Workshop on BackTrack live CD
PPS
Reverse Engineering for exploit writers
PPS
State of Cyber Law in India
PPS
AntiSpam - Understanding the good, the bad and the ugly
PPS
Reverse Engineering v/s Secure Coding
PPS
Network Vulnerability Assessments: Lessons Learned
PPS
Economic offenses through Credit Card Frauds Dissected
PPS
Immune IT: Moving from Security to Immunity
PPS
Reverse Engineering for exploit writers
PPS
Hacking Client Side Insecurities
PDF
Web Exploit Finder Presentation
PPT
Network Security Data Visualization
PPT
Enhancing Computer Security via End-to-End Communication Visualization
PDF
Top Network Vulnerabilities Over Time
PDF
What are the Business Security Metrics?
Phishing As Tragedy of the Commons
Cisco IOS Attack & Defense - The State of the Art
Secrets of Top Pentesters
Workshop on Wireless Security
Insecure Implementation of Security Best Practices: of hashing, CAPTCHA's and...
Workshop on BackTrack live CD
Reverse Engineering for exploit writers
State of Cyber Law in India
AntiSpam - Understanding the good, the bad and the ugly
Reverse Engineering v/s Secure Coding
Network Vulnerability Assessments: Lessons Learned
Economic offenses through Credit Card Frauds Dissected
Immune IT: Moving from Security to Immunity
Reverse Engineering for exploit writers
Hacking Client Side Insecurities
Web Exploit Finder Presentation
Network Security Data Visualization
Enhancing Computer Security via End-to-End Communication Visualization
Top Network Vulnerabilities Over Time
What are the Business Security Metrics?

Recently uploaded (20)

PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Modernizing your data center with Dell and AMD
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Machine learning based COVID-19 study performance prediction
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Cloud computing and distributed systems.
PDF
KodekX | Application Modernization Development
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Unlocking AI with Model Context Protocol (MCP)
PPT
Teaching material agriculture food technology
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Approach and Philosophy of On baking technology
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Big Data Technologies - Introduction.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
Modernizing your data center with Dell and AMD
Network Security Unit 5.pdf for BCA BBA.
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Encapsulation_ Review paper, used for researhc scholars
NewMind AI Weekly Chronicles - August'25 Week I
Machine learning based COVID-19 study performance prediction
Reach Out and Touch Someone: Haptics and Empathic Computing
Cloud computing and distributed systems.
KodekX | Application Modernization Development
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
The Rise and Fall of 3GPP – Time for a Sabbatical?
The AUB Centre for AI in Media Proposal.docx
Unlocking AI with Model Context Protocol (MCP)
Teaching material agriculture food technology
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Approach and Philosophy of On baking technology
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Big Data Technologies - Introduction.pptx

Cryptography

  • 1. Cryptography Basic concepts and terms Public/Private Key Algorithms Key Distribution/Management Digital Signatures Miscellaneous Crypto
  • 2. Crytpo Intro Why Encrypt? Protect stored information Protect Encryption - process by which plaintext is converted to ciphertext using a key Decryption - process by which ciphertext is converted to plaintext (with the appropriate key) plaintext (cleartext)- intelligible data
  • 3. Crypto Terms Cryptography - art/science relating to encrypting, decrypting information cryptanalysis - art/science relating to converting ciphertext to plaintext without the (secret) key Link encryption - the individual application of encryption to data on each link of a network (nodes are a weak link) end-to-end encryption - the encryption of data from source system to end system (https)
  • 4. Crypto Terms Repudiation - In communication between parties, Denial by one party of having participated in communication (commonly heard as non-repudiation) Traffic analysis - inference of information from analysis of traffic (presence, absence, frequency, etc.) Traffic padding - generation of spurious data units Work Factor - effort/time needed to overcome a protective measure
  • 5. One - Time Pad Two identical pads (keys), one with sender, one with recipient The random pads (keys) are the same length as the message Unbreakable by exhaustive search Relies on physical security of the pads Pads can only be used once
  • 6. Cryptanalysis Terms Ciphertext-only attack - attacker attempts to decrypt ciphertext Known-plaintext attack - attacker attempts to decrypt ciphertext given knowledge of some plaintext (think “Login: “) Chosen-plaintext attack - attacker obtains ciphertext corresponding to selected plaintext Chosen-ciphertext attack - attacker obtains plaintext corresponding to selected ciphertext (in a public key system, when trying to deduce private key)
  • 7. Crypto System Properties Encryption/decryption transformations must be efficient for all keys System must be easy to use The security of the system should depend ONLY on the secrecy of the keys and not on the secrecy of the encryption/decryption transformations
  • 8. Secrecy Requirements If ciphertext and plaintext are known, it should be computationally infeasible to determine the deciphering algorithm It should be computationally infeasible to systematically determine plaintext from intercepted ciphertext (Even if you decrypt ciphertext once, it should require the same amount of work to do it again.) Note: “systematically” allows for a lucky guess Note: “Computationally infeasible” means great effort, doesn’t account for advances in computing, mathematics
  • 9. Authenticity Requirements If ciphertext and plaintext are known, it should be computationally infeasible to determine the enciphering algorithm It should be computationally infeasible to find valid ciphertext (Even if you encrypt plaintext so that it can be decrypted once, it should require the same amount of work to do it again.)
  • 10. Public vs. Private Key Encryption Private key encryption uses the same key for both encryption and decryption (faster) (DES) Private key encryption known as symmetric Public key encryption uses two different keys, one to decrypt and one to encrypt (RSA) Thus, one key can be “public”, because the other key is still necessary for decryption More complex, key management is an issue Public key encryption known as asymmetric
  • 11. Encipherment Modes Block Mode ciphers - Message broken into blocks, each block encrypted separately blocks of identical plaintext have identical ciphertext replay and substitution attacks easier (insertion or deletion of blocks Block chaining - parts of the previous block are inserted into the current block makes replay and substitution attacks much harder DES is a block cipher
  • 12. Encipherment Modes Stream Ciphers - Message broken into characters or bits and enciphered with a “key stream” key stream - should be random and generated independently of the message stream
  • 13. Digital Encryption Standard ( DES) Developed by IBM in 1972 Never approved for national security applications 64-bit plain & cipher text block size 56-bit true key plus 8 parity bits Single chip (hardware) implementation Most implementations now software 16 rounds of transpositions & substitutions Standard for unclassified government data symmetric, private key
  • 14. Applications of DES Double DES Effective key length of 112 bits Work factor about the same as single DES Triple DES Encrypt with first key Decrypt with second key Encrypt with first key Very secure
  • 15. Public key RSA - Rivest, Shamir, and Adleman Introduced in 1976 Relies on factoring of large numbers Elliptic Curve Cryptosystem (ECC) Highest strength/bit of public key stream Big savings over other public key systems Computation Bandwidth Storage
  • 17. Key Selection Similar to password selection, users are the weak link Random number generators may not be random Key clustering - two different keys produce equivalent ciphertext from equivalent plaintext
  • 18. Key Management Using a public key system, A wants to talk to B C is the Key Distribution Center, has A and B’s public key A calls B, and the calling protocol contacts C C encrypts a session key, “k”, with the public keys and sends the encrypted “k” to A and B A and B can then communicate
  • 19. Key Management Issues Key storage, recovery Key revocation (lost, compromised keys) Must be fully automated No key in clear outside crypto system Choose key randomly from entire key space Key-encrypting key must be separate from data keys Infrequently use keys with long life
  • 20. Key Escrow Separate agencies maintain components of private key, which, when combined, can be used to decrypt ciphertext Stated reason is to decrypt drug related communications Clipper chip is an example secret algorithm Unpopular, unused Issues include key storage, Big Brother
  • 21. Digital Signature Used like a written signature, binds a message to an individual (Provides non-repudiation): S is sender, R is recipient, and M is the Message R must be able to validate S’s signature on M No one can forge S’s signature If S denies signing M, a 3rd party must be able to resolve the dispute between S and R Easy with public key encryption - S encrypts with private key, R can decrypt with public (so can 3rd party)
  • 22. Digital Signature Previous method results in M in ciphertext, anyone without S’s public key cannot view An alternative is to compute a digest of the message using a public hash function, then encrypt the digest using private key. Thus, the only ciphertext is the hash. MD2, MD4, and MD5 are public hash functions that create message digests. MD5 is strongest, a Rivest upgrade of MD4
  • 23. Hash Function Hash function produces a message digest message digest also known as fingerprint, imprint 2 messages with the same digest are extremely unlikely Signer can’t claim a different message was signed Recipient can’t claim a different message was signed
  • 24. Digital Signature Standard (DSS) Uses secure hash algorithm Condenses message to 160 bits Key size 512 - 1024 bits Proposed by NIST in 1991 Adopted???
  • 25. Message Authentication Code General term used to describe digital signatures
  • 26. Attacks Brute force attack Attempt to use all keys expensive time consuming But, processing speed doubles every 18 months, Clustered workstations, etc.
  • 27. Attacks Analytic Use algorithm and algebraic manipulation to reduce complexity Statistical Use statistical weaknesses in design (more 1’s than 0s in keystream on average, for example) Implementation Microsoft - PPTP, LANMAN passwords poor randomization on Netscape key
  • 28. Kerberos Authentication and encryption system designed at MIT Assigns a unique key, called a “ticket”, to each user on the network “Ticket” embedded in user’s messages to identify sender
  • 29. Certificate Authority Trusted, 3rd party organization CA (Certificate Authority) guarantees that the individual granted a certificate is who he/she claims to be CA usually has arrangement with financial institution to confirm identity Critical to data security and electronic commerce
  • 30. Public Key Infrastructure Known as PKI Necessary for widespread electronic commerce No absolute definition or standard A system of digital certificates, Certificate Authorities, and other registration authorities that verify and authenticate the validity of parties in Internet transactions
  • 31. Steganography Art of hiding communications Why? Deny message exists Hide data transmissions (remember the microdot?) Common implementations hide information in graphic files, sound files, or slack space