SlideShare a Scribd company logo
CryptographyVsStegnoGraphy
 What is meant by cryptography ?
     • Its Greek word
     • Crypto means “ Secret”
      •   Graphie means “ Writing “

 Why Cryptography ?
     •    To convert the plain text to unreadable text

 What is need of Cryptography ?
   To secure the Sensitive Information

           •   Username – Password

           • Credit Card Number etc..
 CRYPTOGRAPHY COMPONENT
 Cryptanalysis
   basic component of cryptography is a cryptosystem

      Cryptanalyst
          •   Person working for unauthorized interceptor
      Cryptographer
          • Person working for legitimate sender or receiver
      Cryptology
          • encryption and decryption
 Cryptosystem
   A cryptosystem is a 5-tuple (Ε , D , M , K , C)

       •       M is the collection of plaintexts
       •        K is the set of keys
       •        C is the set of cipher texts

      How it works ?
           o Ε = Μ × K → C is the set of encipher (encryption)
           o D = C × K → M is the set of deciphering (decryption)
 Note
           •     Plaintext M : collection of original messages
            •     Cipher text C : set of messages in encrypted form
 Cryptosystem
          Encryption
              • Process of encoding (enciphering / encryption ) a message
          Decryption
             •   Process of decoding (deciphering or decryption) an
                  encrypted message to its original form.

 Alisa                                                            Kishan
                                   data, control
                      channel
                                    messages


data        secure                                  secure            data
            sender                                 receiver


                         Trudy
 CRYPTOGRAPHY




          CRYPTOGRAP
              HY

SYMMETRIC-KEY           ASYMMETRIC-
CRYPTOGRAPHY                KEY
                       CRYPTOGRAPHY
 Types of Cryptosystems
     Symmetric Key Cryptosystems
          • Also called single-key cryptosystems
          • M = D(K, E(K, M))

          • The encryption key and decryption key are the same
 Symmetric Cryptosystems
   Basic techniques for classical ciphers (Encryption)
      Substitution
           • One letter is exchanged for another
      Transposition
           • The order of the letters is rearranged Classical ciphers
      Mono-alphabetic
           • Letters of the plaintext alphabet are mapped into
               other unique letters
      Poly-alphabetic
        • Letters of the plaintext alphabet are mapped into
           letters of the cipher text space depending on their
           positions in the text
      Stream
           • Key stream is generated and used to encrypt the plaintext
                (Symmetric Key Algorithms)
 Transposition
 Example :-
                      Cipher-Text :-          TRHCEEIETGSSMAIAEASS
        T   5     T                                       R
        H   3         H                               C       E                               E
        E   1             I                       E               T                       G
        K   4                 S               S                       M               A
        E   2                     I       A                               E       S
        Y   6                         S                                       S


Refer (by key):   IETGIAESHCEESSMATRSS                                    T H E K E Y
                                                                          5 3 1 4 2 6

 Columnar                                                                T   H I S I S
                                                                          A   S E C R E
         • IEEIRSHSMESCSTATGSEA                                           T   M E S S A
                                                                          G   E
 Types of Cryptosystems
     Asymmetric cryptosystem
         • M = D (Kd , E (Ke , M ) )
         • The encryption key and decryption key are not the same
         • Kd ≠ Ke
 Asymmetric Key Cryptosystem
  (Public Key Cryptosystem)
       Uses public and private keys
            • Public key for encryption
            • Private key for decryption

       Examples

            • RSA
            • Trapdoor one-way function
            • Elliptical curve cryptography
 RSA Principle
   Developed by Ron Rivets , Adi Shamir, and Leonard    Adleman.
    (MIT, 1977)

                  C = me mod (pq)

• P , q : any two large prime numbers (more than 512 bits)

         •   e: public key
         •   d: private key

• Knowing C and e, it is “infeasible” to calculate m without
  knowing d , p and q

• Knowing d, p and q, it is easy to find the original
   plaintext message m = Cd mod (pq)
 RSA Principle

{m, e, p, q;                     {C, e, p, q;
C= me mod(pq)}                   m=Cd mod(pq)}
   Sender                            Receiver


                 Intruder
                            {C, e}
CryptographyVsStegnoGraphy
 What is Steganography?
           Its Greek Words:

                  • STEGANOS – “Covered”
                  • GRAPHIE – “Writing”

           Steganography is about Hiding messages
         Digital Applications of Steganography
          • Can be hidden in digital data
                - MS Word (doc)
                - Web pages (html)
                - Sound files (mp3, wav, cda)
                - Video files (mpeg, avi)
               - Digital images (bmp, gif, jpg)
 Today, steganography is used primarily to protect
  digital rights
              •   “watermarking” copyright notices
              •   “fingerprinting” a serial ID
 History of Steganography
             Chinese silk balls
             Invisible ink-jet technology
             Microdots
             Easter eggs

   Hiding a message within a text
        Shift some words by one point/pixel
             - Shifted words (or their first letters) make the sentence
        Use different fonts

              - Letter by letter or word by word
 A Real Example
   During WW2 the following cipher message
    was actually sent by a German spy
      “Apparently, neutral’s protest is thoroughly
      discounted and ignored. Isman hard hit.
      Blockade issue affect pretext for embargo on
      by products, ejecting suets and vegetable
      oils.”

     Hidden Message

                • “ Pershing sails from NY June 1”
 Modern Steganography
      Hiding one message within another
       (“container”)
         Most containers are rich media
            • Images , audio, video ,mp3 etc.


      Copyright notices embedded in digital art

                • Prove ownership

       Digital cameras EXIF tags

                • Not secretive, but hidden from the eyez
                • Embed info such as camera type, date, shutter speed ,
                   focal length,..


 Similarly , possible to embed messages in invisible parts of html pages
 Steganography System
 Comparison
Cryptography
   C = Ek (P)             Plain text
    P = Dk (C)                         f       Ciphertext

                          Key


Steganography
                 secret message
                                           f   Stego message
                 cover image
 Hiding a Message in an Image
 Original Picture    Embedded picture
CryptographyVsStegnoGraphy
CryptographyVsStegnoGraphy

More Related Content

PPTX
RSA Algorithm
PPTX
Cryptography seminar 2017
PPSX
Cryptography
ODP
Basic techniques in cryptography
PPTX
Cryptography
PDF
RSA Algorithm
PPT
Digital Signature Recognition using RSA Algorithm
PPTX
Secret key cryptography
RSA Algorithm
Cryptography seminar 2017
Cryptography
Basic techniques in cryptography
Cryptography
RSA Algorithm
Digital Signature Recognition using RSA Algorithm
Secret key cryptography

What's hot (20)

PDF
Data Protection Techniques and Cryptography
PDF
Ch12 Encryption
PDF
CRYPTOGRAPHY AND NETWORK SECURITY
PDF
2 classical cryptosystems
PPT
RSA Algorithm
PDF
Chapter 8 cryptography lanjutan
PDF
PPT
Network Security & Cryptography
PDF
Computer Security Lecture 7: RSA
PDF
CNS - Unit - 4 - Public Key Cryptosystem
PPTX
Applications of-linear-algebra-hill-cipher
PDF
basic encryption and decryption
PDF
IS Unit 1_Conventional Encryption_Classical Encryption Techniques
PPT
Classical Encryption Techniques in Network Security
PDF
Presentation about RSA
PDF
Security Attacks on RSA
PPT
Elementry Cryptography
PPT
The rsa algorithm
PDF
Pertemuan 7 cryptography
Data Protection Techniques and Cryptography
Ch12 Encryption
CRYPTOGRAPHY AND NETWORK SECURITY
2 classical cryptosystems
RSA Algorithm
Chapter 8 cryptography lanjutan
Network Security & Cryptography
Computer Security Lecture 7: RSA
CNS - Unit - 4 - Public Key Cryptosystem
Applications of-linear-algebra-hill-cipher
basic encryption and decryption
IS Unit 1_Conventional Encryption_Classical Encryption Techniques
Classical Encryption Techniques in Network Security
Presentation about RSA
Security Attacks on RSA
Elementry Cryptography
The rsa algorithm
Pertemuan 7 cryptography
Ad

Similar to CryptographyVsStegnoGraphy (20)

PPT
Crypt
PPTX
Cryptography
PPT
Cryptography - An Overview
PPTX
CISSP - Chapter 3 - Cryptography
PPTX
Cryptography
PPTX
Introduction to cryptography part2-final
PPT
Cryptography
PDF
Introduction to Cryptography
PPSX
An Introduction to Cryptology
PPTX
Network security
PPTX
Cryptography
PDF
Introduction to cryptography
PPTX
Cryptography and Network Security
DOCX
Cryptography : The Art of Secured Messaging
PPT
overview of cryptographic techniques
PPTX
Introduction to Cryptography
PPTX
Lecture 2
PPT
Cipher techniques
Crypt
Cryptography
Cryptography - An Overview
CISSP - Chapter 3 - Cryptography
Cryptography
Introduction to cryptography part2-final
Cryptography
Introduction to Cryptography
An Introduction to Cryptology
Network security
Cryptography
Introduction to cryptography
Cryptography and Network Security
Cryptography : The Art of Secured Messaging
overview of cryptographic techniques
Introduction to Cryptography
Lecture 2
Cipher techniques
Ad

Recently uploaded (20)

PDF
Classroom Observation Tools for Teachers
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PPTX
Orientation - ARALprogram of Deped to the Parents.pptx
PPTX
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
PPTX
Cell Types and Its function , kingdom of life
PPTX
History, Philosophy and sociology of education (1).pptx
PPTX
Introduction to Building Materials
PPTX
UNIT III MENTAL HEALTH NURSING ASSESSMENT
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PDF
RMMM.pdf make it easy to upload and study
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
PDF
What if we spent less time fighting change, and more time building what’s rig...
PPTX
Lesson notes of climatology university.
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
Classroom Observation Tools for Teachers
Paper A Mock Exam 9_ Attempt review.pdf.
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
Orientation - ARALprogram of Deped to the Parents.pptx
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
Cell Types and Its function , kingdom of life
History, Philosophy and sociology of education (1).pptx
Introduction to Building Materials
UNIT III MENTAL HEALTH NURSING ASSESSMENT
Practical Manual AGRO-233 Principles and Practices of Natural Farming
RMMM.pdf make it easy to upload and study
Final Presentation General Medicine 03-08-2024.pptx
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
What if we spent less time fighting change, and more time building what’s rig...
Lesson notes of climatology university.
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
ChatGPT for Dummies - Pam Baker Ccesa007.pdf

CryptographyVsStegnoGraphy

  • 2.  What is meant by cryptography ? • Its Greek word • Crypto means “ Secret” • Graphie means “ Writing “  Why Cryptography ? • To convert the plain text to unreadable text  What is need of Cryptography ?  To secure the Sensitive Information • Username – Password • Credit Card Number etc..
  • 4.  Cryptanalysis basic component of cryptography is a cryptosystem  Cryptanalyst • Person working for unauthorized interceptor  Cryptographer • Person working for legitimate sender or receiver  Cryptology • encryption and decryption
  • 5.  Cryptosystem  A cryptosystem is a 5-tuple (Ε , D , M , K , C) • M is the collection of plaintexts • K is the set of keys • C is the set of cipher texts  How it works ? o Ε = Μ × K → C is the set of encipher (encryption) o D = C × K → M is the set of deciphering (decryption)  Note • Plaintext M : collection of original messages • Cipher text C : set of messages in encrypted form
  • 6.  Cryptosystem  Encryption • Process of encoding (enciphering / encryption ) a message  Decryption • Process of decoding (deciphering or decryption) an encrypted message to its original form. Alisa Kishan data, control channel messages data secure secure data sender receiver Trudy
  • 7.  CRYPTOGRAPHY CRYPTOGRAP HY SYMMETRIC-KEY ASYMMETRIC- CRYPTOGRAPHY KEY CRYPTOGRAPHY
  • 8.  Types of Cryptosystems  Symmetric Key Cryptosystems • Also called single-key cryptosystems • M = D(K, E(K, M)) • The encryption key and decryption key are the same
  • 9.  Symmetric Cryptosystems  Basic techniques for classical ciphers (Encryption)  Substitution • One letter is exchanged for another  Transposition • The order of the letters is rearranged Classical ciphers  Mono-alphabetic • Letters of the plaintext alphabet are mapped into other unique letters  Poly-alphabetic • Letters of the plaintext alphabet are mapped into letters of the cipher text space depending on their positions in the text  Stream • Key stream is generated and used to encrypt the plaintext (Symmetric Key Algorithms)
  • 10.  Transposition  Example :- Cipher-Text :- TRHCEEIETGSSMAIAEASS T 5 T R H 3 H C E E E 1 I E T G K 4 S S M A E 2 I A E S Y 6 S S Refer (by key): IETGIAESHCEESSMATRSS T H E K E Y 5 3 1 4 2 6  Columnar T H I S I S A S E C R E • IEEIRSHSMESCSTATGSEA T M E S S A G E
  • 11.  Types of Cryptosystems  Asymmetric cryptosystem • M = D (Kd , E (Ke , M ) ) • The encryption key and decryption key are not the same • Kd ≠ Ke
  • 12.  Asymmetric Key Cryptosystem (Public Key Cryptosystem)  Uses public and private keys • Public key for encryption • Private key for decryption  Examples • RSA • Trapdoor one-way function • Elliptical curve cryptography
  • 13.  RSA Principle  Developed by Ron Rivets , Adi Shamir, and Leonard Adleman. (MIT, 1977)  C = me mod (pq) • P , q : any two large prime numbers (more than 512 bits) • e: public key • d: private key • Knowing C and e, it is “infeasible” to calculate m without knowing d , p and q • Knowing d, p and q, it is easy to find the original plaintext message m = Cd mod (pq)
  • 14.  RSA Principle {m, e, p, q; {C, e, p, q; C= me mod(pq)} m=Cd mod(pq)} Sender Receiver Intruder {C, e}
  • 16.  What is Steganography?  Its Greek Words: • STEGANOS – “Covered” • GRAPHIE – “Writing”  Steganography is about Hiding messages  Digital Applications of Steganography • Can be hidden in digital data - MS Word (doc) - Web pages (html) - Sound files (mp3, wav, cda) - Video files (mpeg, avi) - Digital images (bmp, gif, jpg)  Today, steganography is used primarily to protect digital rights • “watermarking” copyright notices • “fingerprinting” a serial ID
  • 17.  History of Steganography  Chinese silk balls  Invisible ink-jet technology  Microdots  Easter eggs  Hiding a message within a text  Shift some words by one point/pixel - Shifted words (or their first letters) make the sentence  Use different fonts - Letter by letter or word by word
  • 18.  A Real Example  During WW2 the following cipher message was actually sent by a German spy “Apparently, neutral’s protest is thoroughly discounted and ignored. Isman hard hit. Blockade issue affect pretext for embargo on by products, ejecting suets and vegetable oils.”  Hidden Message • “ Pershing sails from NY June 1”
  • 19.  Modern Steganography  Hiding one message within another (“container”)  Most containers are rich media • Images , audio, video ,mp3 etc.  Copyright notices embedded in digital art • Prove ownership  Digital cameras EXIF tags • Not secretive, but hidden from the eyez • Embed info such as camera type, date, shutter speed , focal length,..  Similarly , possible to embed messages in invisible parts of html pages
  • 21.  Comparison Cryptography C = Ek (P) Plain text P = Dk (C) f Ciphertext Key Steganography secret message f Stego message cover image
  • 22.  Hiding a Message in an Image Original Picture Embedded picture

Editor's Notes

  • #2: Cryptography
  • #3: Cryptography
  • #4: Cryptography
  • #5: Cryptography
  • #6: Cryptography
  • #7: Cryptography
  • #8: Cryptography
  • #9: Cryptography
  • #10: Cryptography
  • #11: Cryptography
  • #12: Cryptography
  • #13: Cryptography
  • #14: Cryptography
  • #15: Cryptography
  • #16: Cryptography
  • #17: Cryptography
  • #18: Cryptography
  • #19: Cryptography
  • #20: EXIF = Exchangeable Image File Format Cryptography
  • #21: Cryptography
  • #22: Cryptography
  • #23: Cryptography
  • #24: Cryptography
  • #25: Cryptography