SlideShare a Scribd company logo
2
Most read
11
Most read
20
Most read
Cryptography
BY-NISHANT BANSAL
11112030
Cryptography.ppt
Overview
 Basic Definitions
 History of Cryptography
 Cipher Types
 Cryptography Methods
 Common Types of Attacks
Definitions -
 Cryptology
 Cryptography
 Cryptanalysis
 Steganography
 Cryptosystem
Cryptography is everywhere
 Secure communication:
–web traffic: HTTPS
–wireless traffic: 802.11i WPA2 (and WEP), GSM, Bluetooth
 Encrypting files on disk: EFS, TrueCrypt
 Content protection (e.g. DVD, Blu-ray): CSS, AACS
 User authentication
… and much much more
History of Cryptography
 The first known evidence of the use of cryptography (in some form)
was found in an inscription carved around 1900 BC, in the main
chamber of the tomb of the nobleman Khnumhotep II, in Egypt.
 Around 400 B.C., the Spartans used a system of encrypting
information by writing a message on a sheet of papyrus.
 Around 100 B.C., Julius Caesar was known to use a form
of encryption to convey secret messages to his army generals
posted in the war front.
 During the 16th century, Vigenere designed a cipher that was
supposedly the first cipher which used an encryption key.
 At the start of the 19th century when everything became
electric, Hebern designed an electro-mechanical contraption
which was called the Hebern rotor machine.
 The Engima machine was invented by German engineer Arthur
Scherbius at the end of World War I, and was heavily used by the
German forces during the Second World War.
 IBM in early 1970s designed a cipher called Lucifer. Lucifer was
eventually accepted by NIST and was called DES or the Data
Encryption Standard.
 In 2000, NIST accepted Rijndael, and named it as AES or the
Advanced Encryption Standard.
Ciphers
In cryptography, a cipher is an algorithm for performing encryption or
decryption—a series of well-defined steps that can be followed as a
procedure. An alternative, less common term is encipherment.
Answer: WELCOME
Stream cipher
 A Stream Cipher is a secret-key encryption algorithm that encrypts a
single bit at a time. With a Stream Cipher, the same plaintext bit or byte
will encrypt to a different bit or byte every time it is encrypted.
 e.g. :
Plain text: Pay 100
Binary of plain text: 010111101 (hypothetical)
Key: 100101011 ----- Perform XOR
____________________
Cipher text 110010110 ----- ZTU9^%D
 To decrypt make the XOR operation of the cipher text with the key .
Block cipher
 Block cipher technique involves encryption of one block of text at a
time .Decryption also takes one block of encrypted text at a time.
Length of the block is usually 64 or 128 bits.
e.g. :
Plain text: four and five
Four and five
Key Key Key
wvfa ast wvfa --- cipher text
Public Key Cryptosystem
 Public key cryptography is a scheme that uses a Pair of keys for
encryption: a Public key, which encrypts data, and a corresponding
Private key (secret key) for decryption.
CRYPTOGRAPHY METHODS
 Symmetric
 Same key for encryption and decryption
 Key distribution problem
 Asymmetric
 Key pairs for encryption and decryption
 Public and private keys
Symmetric Algorithm
 It is also called as Secret Key Cryptography
 Single key used for both encrypt & decrypt
 Key must be known to both the parties
Encryption Decryption
Key
Plaintext Ciphertext
Original
Plaintext
Symmetric
Cryptosystem
Symmetric Algorithm
 Data Encryption Standard (DES):
56 bits key
 Advance Encryption Standard (AES):
128, 192 or 256 bits key
 International Data Encryption Algorithm(IDEA):
128 bits key
Asymmetric Algorithm
 Private keys are used for decrypting.
 Public keys are used for encrypting
encryption
plaintext ciphertext
public key
decryption
ciphertext plaintext
private key
Hybrid cryptosystem
 A hybrid cryptosystem can be constructed using any two separate cryptosystems:
 a key encapsulation scheme, which is a public-key cryptosystem,
 a data encapsulation scheme, which is a symmetric-key cryptosystem.
COMMON TYPES OF ATTACKS
Brute force
 Trying all key values in the keyspace.
Chosen Ciphertext
 Decrypt known ciphertext to discover key.
Dictionary Attack
 Find plaintext based on common words.
Frequency Analysis
 Guess values based on frequency of occurrence.
References
 An introduction to cryptography and cryptanalysis
-Edward Schaefer,Santa Clara University
 http://en.wikipedia.org/wiki/History_of_cryptography
 https://securityblog.redhat.com/2013/08/14/a-brief-history-of-
cryptography/
 Contemporary Cryptography - Rolf Oppliger
 Cryptography Theory And Practice - Douglas Stinson
 Modern Cryptography Theory and Practice - Wenbo Mao
One must acknowledge with cryptography no
amount of violence will ever solve a math problem
― Jacob Appelbaum, Cypherpunks: Freedom and the Future of the Internet

More Related Content

PPTX
Cryptography.ppt
PPTX
Cryptography
PPTX
Cryptography
PPTX
Cryptography
PDF
Introduction to Cryptography
PPTX
Cryptography
PPTX
Cryptography
PPTX
Cryptography
Cryptography.ppt
Cryptography
Cryptography
Cryptography
Introduction to Cryptography
Cryptography
Cryptography
Cryptography

What's hot (20)

PPT
6. cryptography
PDF
symmetric key encryption algorithms
PDF
Asymmetric Cryptography
PPTX
cryptography
PPTX
Cryptography
PPTX
Diffie hellman key exchange algorithm
PPTX
Cryptography and Information Security
PPT
DES (Data Encryption Standard) pressentation
PPTX
Diffie Hellman Key Exchange
PPT
Cryptography Intro
PPTX
Symmetric and asymmetric key
PDF
CRYPTOGRAPHY AND NETWORK SECURITY
PPTX
Cryptography
PPTX
Cryptography and Network Security
PPTX
Key Management and Distribution
PPTX
Public Key Cryptosystem
PDF
Block Ciphers and the Data Encryption Standard
PPTX
Public Key Cryptography
PPTX
PDF
2. Stream Ciphers
6. cryptography
symmetric key encryption algorithms
Asymmetric Cryptography
cryptography
Cryptography
Diffie hellman key exchange algorithm
Cryptography and Information Security
DES (Data Encryption Standard) pressentation
Diffie Hellman Key Exchange
Cryptography Intro
Symmetric and asymmetric key
CRYPTOGRAPHY AND NETWORK SECURITY
Cryptography
Cryptography and Network Security
Key Management and Distribution
Public Key Cryptosystem
Block Ciphers and the Data Encryption Standard
Public Key Cryptography
2. Stream Ciphers
Ad

Viewers also liked (20)

PPTX
Cryptography
PPTX
Cryptography and network security
PPT
Network Security and Cryptography
PPTX
types of network
PPTX
Types of computer network
PPTX
Virtual manufacturing
PPTX
Thesis presentation
PPT
Smartplug ppt
PPTX
Lessons from Software for Synthetic Biology
PPT
artificial neural network
PPT
Cryptography
PPT
Cryptography and E-Commerce
PPTX
How does rotary heat machine work on fabric
PPT
NEURAL Network Design Training
PDF
Analysis and applications of artificial neural networks
PPT
Micromachining Technology Seminar Presentation
PPT
Sublimation vs Digital Printing By Sukhvir Sabharwal
PPTX
Laser Assisted Micro Machining (lamm)
PDF
IBA Admission - Mystery Revealed (Infographics)
PPTX
Artificial intelligence NEURAL NETWORKS
Cryptography
Cryptography and network security
Network Security and Cryptography
types of network
Types of computer network
Virtual manufacturing
Thesis presentation
Smartplug ppt
Lessons from Software for Synthetic Biology
artificial neural network
Cryptography
Cryptography and E-Commerce
How does rotary heat machine work on fabric
NEURAL Network Design Training
Analysis and applications of artificial neural networks
Micromachining Technology Seminar Presentation
Sublimation vs Digital Printing By Sukhvir Sabharwal
Laser Assisted Micro Machining (lamm)
IBA Admission - Mystery Revealed (Infographics)
Artificial intelligence NEURAL NETWORKS
Ad

Similar to Cryptography.ppt (20)

PPTX
Data encryption
PPTX
NS UNIT 1 Advanced Encryption Standard& RSA
PPTX
PPT
Cryptography cse,ru
PDF
Fundamentals of Cryptography: Securing Data in the Digital Age
PPTX
Cryptography.pptxhis document provides an overview of cryptography. It define...
PPTX
Cryptography & Steganography
PPTX
619cb9e9-b273-4ed7-9181-937ba84734ab-.pptx
PPT
Fundamentals of cryptography
PPTX
Introduction to Cryptography
PPTX
Detailed description about the concept of E Commerce UNIT IV.pptx
PDF
A Survey on Generation and Evolution of Various Cryptographic Techniques
PPTX
Security - ch3.pptx
PPT
Iss lecture 2
PPT
Lecture 7 - CRYPTOGRAPHYpptof my presentation.ppt
DOCX
Cryptography- "A Black Art"
PDF
A Study On Cryptographic Techniques
PDF
Encryption
PPTX
Security - ch3.pptx
PDF
Computer Security Chapter III.pdf
Data encryption
NS UNIT 1 Advanced Encryption Standard& RSA
Cryptography cse,ru
Fundamentals of Cryptography: Securing Data in the Digital Age
Cryptography.pptxhis document provides an overview of cryptography. It define...
Cryptography & Steganography
619cb9e9-b273-4ed7-9181-937ba84734ab-.pptx
Fundamentals of cryptography
Introduction to Cryptography
Detailed description about the concept of E Commerce UNIT IV.pptx
A Survey on Generation and Evolution of Various Cryptographic Techniques
Security - ch3.pptx
Iss lecture 2
Lecture 7 - CRYPTOGRAPHYpptof my presentation.ppt
Cryptography- "A Black Art"
A Study On Cryptographic Techniques
Encryption
Security - ch3.pptx
Computer Security Chapter III.pdf

Recently uploaded (20)

PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPT
Teaching material agriculture food technology
PDF
cuic standard and advanced reporting.pdf
PPTX
Cloud computing and distributed systems.
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Machine learning based COVID-19 study performance prediction
Chapter 3 Spatial Domain Image Processing.pdf
Network Security Unit 5.pdf for BCA BBA.
Understanding_Digital_Forensics_Presentation.pptx
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
NewMind AI Weekly Chronicles - August'25 Week I
Encapsulation_ Review paper, used for researhc scholars
Advanced methodologies resolving dimensionality complications for autism neur...
Digital-Transformation-Roadmap-for-Companies.pptx
Teaching material agriculture food technology
cuic standard and advanced reporting.pdf
Cloud computing and distributed systems.
The AUB Centre for AI in Media Proposal.docx
Building Integrated photovoltaic BIPV_UPV.pdf
Spectral efficient network and resource selection model in 5G networks
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
The Rise and Fall of 3GPP – Time for a Sabbatical?
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
NewMind AI Monthly Chronicles - July 2025
Machine learning based COVID-19 study performance prediction

Cryptography.ppt

  • 3. Overview  Basic Definitions  History of Cryptography  Cipher Types  Cryptography Methods  Common Types of Attacks
  • 4. Definitions -  Cryptology  Cryptography  Cryptanalysis  Steganography  Cryptosystem
  • 5. Cryptography is everywhere  Secure communication: –web traffic: HTTPS –wireless traffic: 802.11i WPA2 (and WEP), GSM, Bluetooth  Encrypting files on disk: EFS, TrueCrypt  Content protection (e.g. DVD, Blu-ray): CSS, AACS  User authentication … and much much more
  • 6. History of Cryptography  The first known evidence of the use of cryptography (in some form) was found in an inscription carved around 1900 BC, in the main chamber of the tomb of the nobleman Khnumhotep II, in Egypt.  Around 400 B.C., the Spartans used a system of encrypting information by writing a message on a sheet of papyrus.  Around 100 B.C., Julius Caesar was known to use a form of encryption to convey secret messages to his army generals posted in the war front.
  • 7.  During the 16th century, Vigenere designed a cipher that was supposedly the first cipher which used an encryption key.  At the start of the 19th century when everything became electric, Hebern designed an electro-mechanical contraption which was called the Hebern rotor machine.
  • 8.  The Engima machine was invented by German engineer Arthur Scherbius at the end of World War I, and was heavily used by the German forces during the Second World War.
  • 9.  IBM in early 1970s designed a cipher called Lucifer. Lucifer was eventually accepted by NIST and was called DES or the Data Encryption Standard.  In 2000, NIST accepted Rijndael, and named it as AES or the Advanced Encryption Standard.
  • 10. Ciphers In cryptography, a cipher is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure. An alternative, less common term is encipherment.
  • 12. Stream cipher  A Stream Cipher is a secret-key encryption algorithm that encrypts a single bit at a time. With a Stream Cipher, the same plaintext bit or byte will encrypt to a different bit or byte every time it is encrypted.  e.g. : Plain text: Pay 100 Binary of plain text: 010111101 (hypothetical) Key: 100101011 ----- Perform XOR ____________________ Cipher text 110010110 ----- ZTU9^%D  To decrypt make the XOR operation of the cipher text with the key .
  • 13. Block cipher  Block cipher technique involves encryption of one block of text at a time .Decryption also takes one block of encrypted text at a time. Length of the block is usually 64 or 128 bits. e.g. : Plain text: four and five Four and five Key Key Key wvfa ast wvfa --- cipher text
  • 14. Public Key Cryptosystem  Public key cryptography is a scheme that uses a Pair of keys for encryption: a Public key, which encrypts data, and a corresponding Private key (secret key) for decryption.
  • 15. CRYPTOGRAPHY METHODS  Symmetric  Same key for encryption and decryption  Key distribution problem  Asymmetric  Key pairs for encryption and decryption  Public and private keys
  • 16. Symmetric Algorithm  It is also called as Secret Key Cryptography  Single key used for both encrypt & decrypt  Key must be known to both the parties Encryption Decryption Key Plaintext Ciphertext Original Plaintext Symmetric Cryptosystem
  • 17. Symmetric Algorithm  Data Encryption Standard (DES): 56 bits key  Advance Encryption Standard (AES): 128, 192 or 256 bits key  International Data Encryption Algorithm(IDEA): 128 bits key
  • 18. Asymmetric Algorithm  Private keys are used for decrypting.  Public keys are used for encrypting encryption plaintext ciphertext public key decryption ciphertext plaintext private key
  • 19. Hybrid cryptosystem  A hybrid cryptosystem can be constructed using any two separate cryptosystems:  a key encapsulation scheme, which is a public-key cryptosystem,  a data encapsulation scheme, which is a symmetric-key cryptosystem.
  • 20. COMMON TYPES OF ATTACKS Brute force  Trying all key values in the keyspace. Chosen Ciphertext  Decrypt known ciphertext to discover key. Dictionary Attack  Find plaintext based on common words. Frequency Analysis  Guess values based on frequency of occurrence.
  • 21. References  An introduction to cryptography and cryptanalysis -Edward Schaefer,Santa Clara University  http://en.wikipedia.org/wiki/History_of_cryptography  https://securityblog.redhat.com/2013/08/14/a-brief-history-of- cryptography/  Contemporary Cryptography - Rolf Oppliger  Cryptography Theory And Practice - Douglas Stinson  Modern Cryptography Theory and Practice - Wenbo Mao
  • 22. One must acknowledge with cryptography no amount of violence will ever solve a math problem ― Jacob Appelbaum, Cypherpunks: Freedom and the Future of the Internet

Editor's Notes

  • #12: The Pigpen cipher (sometimes called the Masonic cipher or Freemason's cipher) is a simple substitution cipher exchanging letters for symbols based on a grid (or the "pigpen") surrounding it.