SlideShare a Scribd company logo
Information and Network Security:11
Cryptography and Cryptanalysis
Prof Neeraj Bhargava
Vaibhav Khanna
Department of Computer Science
School of Engineering and Systems Sciences
Maharshi Dayanand Saraswati University Ajmer
Cryptography
• can characterize cryptographic system by:
• type of encryption operations used
• substitution
• transposition
• product
• number of keys used
• single-key or private
• two-key or public
• way in which plaintext is processed
• block
• stream
Cryptography
• Cryptographic systems can be characterized along these three
independent dimensions.
• The type of operations used for transforming plaintext to ciphertext.
All encryption algorithms are based on two general principles:
substitution, in which each element in the plaintext (bit, letter, group
of bits or letters) is mapped into another element, and transposition,
in which elements in the plaintext are rearranged. The fundamental
requirement is that no information be lost (that is, that all operations
are reversible). Most systems, referred to as product systems, involve
multiple stages of substitutions and transpositions.
Cryptography
• The number of keys used. If both sender and receiver use the same
key, the system is referred to as symmetric, single-key, secret-key, or
conventional encryption. If the sender and receiver use different keys,
the system is referred to as asymmetric, two-key, or public-key
encryption.
• The way in which the plaintext is processed. A block cipher processes
the input one block of elements at a time, producing an output block
for each input block. A stream cipher processes the input elements
continuously, producing output one element at a time, as it goes
along.
Cryptanalysis
• objective to recover key not just message
• general approaches:
• cryptanalytic attack
• brute-force attack
• if either succeed all key use compromised
Cryptanalysis
• Typically objective is to recover the key in use rather then simply to
recover the plaintext of a single ciphertext. There are two general
approaches:
• Cryptanalysis: relies on the nature of the algorithm plus perhaps
some knowledge of the general characteristics of the plaintext or
even some sample plaintext- ciphertext pairs. This type of attack
exploits the characteristics of the algorithm to attempt to deduce a
specific plaintext or to deduce the key being used.
•
Cryptanalysis
• Brute-force attacks try every possible key on a piece of ciphertext
until an intelligible translation into plaintext is obtained. On
average,half of all possible keys must be tried to achieve success.
• If either type of attack succeeds in deducing the key, the effect is
catastrophic: All future and past messages encrypted with that key
are compromised.
Cryptanalytic Attacks
ciphertext only
only know algorithm & ciphertext, is statistical, know or can
identify plaintext
known plaintext
know/suspect plaintext & ciphertext
chosen plaintext
select plaintext and obtain ciphertext
chosen ciphertext
select ciphertext and obtain plaintext
chosen text
select plaintext or ciphertext to en/decrypt
More Definitions
unconditional security
no matter how much computer power or time is available,
the cipher cannot be broken since the ciphertext provides
insufficient information to uniquely determine the
corresponding plaintext
computational security
given limited computing resources (eg time needed for
calculations is greater than age of universe), the cipher
cannot be broken
More Definitions
• Two more definitions are worthy of note. An encryption scheme is
unconditionally secure if the ciphertext generated by the scheme does not
contain enough information to determine uniquely the corresponding
plaintext, no matter how much ciphertext is available.
• An encryption scheme is said to be computationally secure if either the
cost of breaking the cipher exceeds the value of the encrypted information,
or the time required to break the cipher exceeds the useful lifetime of the
information. Unconditional security would be nice, but the only known
such cipher is the one-time pad (later).
• For all reasonable encryption algorithms, we have to assume
computational security where it either takes too long, or is too expensive,
to bother breaking the cipher.
Brute Force Search
• always possible to simply try every key
• most basic attack, proportional to key size
• assume either know / recognise plaintext
Key Size (bits) Number of Alternative
Keys
Time required at 1
decryption/µs
Time required at 106
decryptions/µs
32 232 = 4.3  109 231 µs = 35.8 minutes 2.15 milliseconds
56 256 = 7.2  1016 255 µs = 1142 years 10.01 hours
128 2128 = 3.4  1038 2127 µs = 5.4  1024 years 5.4  1018 years
168 2168 = 3.7  1050 2167 µs = 5.9  1036 years 5.9  1030 years
26 characters
(permutation)
26! = 4  1026 2  1026 µs = 6.4  1012 years 6.4  106 years
Assignment
• What is Cryptography.
• Explain Cryptanalysis and briefly describe Cryptanalytic Attacks

More Related Content

PPT
CRYPTOGRAPHY
PDF
CNIT 141: 2. Randomness
PPTX
2 basic of cryptography
PPTX
Network security
PPTX
Cryptography using python
PPTX
Introduction to cryptography part1-final
PDF
CNIT 141: 3. Cryptographic Security
PDF
How to hack cryptographic protocols with Formal Methods
CRYPTOGRAPHY
CNIT 141: 2. Randomness
2 basic of cryptography
Network security
Cryptography using python
Introduction to cryptography part1-final
CNIT 141: 3. Cryptographic Security
How to hack cryptographic protocols with Formal Methods

What's hot (20)

PPTX
Ppt cns
PDF
Cryptographic Protocol is and isn't like LEGO.
PPTX
PPTX
Symmetric Encryption Techniques
PPTX
Slidecast - Workshop
ODP
Network Security Topic 3 cryptography
ODP
Network Security Topic 4 cryptography2
PDF
CNIT 141 7. Keyed Hashing
PDF
CNIT 141: 4. Block Ciphers
PPTX
Encryption algorithms
PDF
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
ODP
One-Time Pad Encryption
PPTX
CISSP Certification Security Engineering-Part2
PDF
Post quantum cryptography
PPTX
cryptography security
POTX
Stream Ciphers
PPTX
Information and network security 21 strength of des
PDF
Ch 12: Cryptography
PDF
CNIT 141: 8. Authenticated Encryption
Ppt cns
Cryptographic Protocol is and isn't like LEGO.
Symmetric Encryption Techniques
Slidecast - Workshop
Network Security Topic 3 cryptography
Network Security Topic 4 cryptography2
CNIT 141 7. Keyed Hashing
CNIT 141: 4. Block Ciphers
Encryption algorithms
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
One-Time Pad Encryption
CISSP Certification Security Engineering-Part2
Post quantum cryptography
cryptography security
Stream Ciphers
Information and network security 21 strength of des
Ch 12: Cryptography
CNIT 141: 8. Authenticated Encryption
Ad

Similar to Information and network security 11 cryptography and cryptanalysis (20)

PPTX
symmetric cipher model.pptx
PPTX
Symmetric ciphermodel
PPTX
NS Classical Encryption Techniqnbbghghgues.pptx
PPTX
Cryptography and Network Security-ch1-4.pptx
PDF
chapter 1-4.pdf
PDF
information technology cryptography Msc chapter 1-4.pdf
PPTX
Detailed description about the concept of E Commerce UNIT IV.pptx
PDF
Types of Cryptosystem and Cryptographic Attack
PPTX
Information-Security-Lecture-8.pptx
PPTX
CISSP - Chapter 3 - Cryptography
PPTX
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
PDF
Information security in term of computer science
PPT
Network Security
DOCX
httpswww.youtube.comwatchtime_continue=8&v=rFV0aes0vYAN.docx
PDF
Data Science Unit 02 SPPU Sem 6 PPT-2.pdf
PPTX
Cryptographic Chronicles: Unveiling Definitions, Algorithms, Attacks, and App...
PDF
Security Fundamentals
PDF
Security fundamentals
PDF
Unit-2-IS (1).pdf
symmetric cipher model.pptx
Symmetric ciphermodel
NS Classical Encryption Techniqnbbghghgues.pptx
Cryptography and Network Security-ch1-4.pptx
chapter 1-4.pdf
information technology cryptography Msc chapter 1-4.pdf
Detailed description about the concept of E Commerce UNIT IV.pptx
Types of Cryptosystem and Cryptographic Attack
Information-Security-Lecture-8.pptx
CISSP - Chapter 3 - Cryptography
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
Information security in term of computer science
Network Security
httpswww.youtube.comwatchtime_continue=8&v=rFV0aes0vYAN.docx
Data Science Unit 02 SPPU Sem 6 PPT-2.pdf
Cryptographic Chronicles: Unveiling Definitions, Algorithms, Attacks, and App...
Security Fundamentals
Security fundamentals
Unit-2-IS (1).pdf
Ad

More from Vaibhav Khanna (20)

PPTX
Information and network security 47 authentication applications
PPTX
Information and network security 46 digital signature algorithm
PPTX
Information and network security 45 digital signature standard
PPTX
Information and network security 44 direct digital signatures
PPTX
Information and network security 43 digital signatures
PPTX
Information and network security 42 security of message authentication code
PPTX
Information and network security 41 message authentication code
PPTX
Information and network security 40 sha3 secure hash algorithm
PPTX
Information and network security 39 secure hash algorithm
PPTX
Information and network security 38 birthday attacks and security of hash fun...
PPTX
Information and network security 37 hash functions and message authentication
PPTX
Information and network security 35 the chinese remainder theorem
PPTX
Information and network security 34 primality
PPTX
Information and network security 33 rsa algorithm
PPTX
Information and network security 32 principles of public key cryptosystems
PPTX
Information and network security 31 public key cryptography
PPTX
Information and network security 30 random numbers
PPTX
Information and network security 29 international data encryption algorithm
PPTX
Information and network security 28 blowfish
PPTX
Information and network security 27 triple des
Information and network security 47 authentication applications
Information and network security 46 digital signature algorithm
Information and network security 45 digital signature standard
Information and network security 44 direct digital signatures
Information and network security 43 digital signatures
Information and network security 42 security of message authentication code
Information and network security 41 message authentication code
Information and network security 40 sha3 secure hash algorithm
Information and network security 39 secure hash algorithm
Information and network security 38 birthday attacks and security of hash fun...
Information and network security 37 hash functions and message authentication
Information and network security 35 the chinese remainder theorem
Information and network security 34 primality
Information and network security 33 rsa algorithm
Information and network security 32 principles of public key cryptosystems
Information and network security 31 public key cryptography
Information and network security 30 random numbers
Information and network security 29 international data encryption algorithm
Information and network security 28 blowfish
Information and network security 27 triple des

Recently uploaded (20)

PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
PDF
System and Network Administration Chapter 2
PDF
2025 Textile ERP Trends: SAP, Odoo & Oracle
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PDF
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
PDF
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
PDF
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PDF
AI in Product Development-omnex systems
PPTX
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
PPTX
L1 - Introduction to python Backend.pptx
PDF
Odoo Companies in India – Driving Business Transformation.pdf
PPTX
Operating system designcfffgfgggggggvggggggggg
PDF
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PPTX
ai tools demonstartion for schools and inter college
PDF
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
PDF
medical staffing services at VALiNTRY
VVF-Customer-Presentation2025-Ver1.9.pptx
System and Network Administration Chapter 2
2025 Textile ERP Trends: SAP, Odoo & Oracle
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
Adobe Illustrator 28.6 Crack My Vision of Vector Design
AI in Product Development-omnex systems
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
L1 - Introduction to python Backend.pptx
Odoo Companies in India – Driving Business Transformation.pdf
Operating system designcfffgfgggggggvggggggggg
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
Wondershare Filmora 15 Crack With Activation Key [2025
ai tools demonstartion for schools and inter college
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
medical staffing services at VALiNTRY

Information and network security 11 cryptography and cryptanalysis

  • 1. Information and Network Security:11 Cryptography and Cryptanalysis Prof Neeraj Bhargava Vaibhav Khanna Department of Computer Science School of Engineering and Systems Sciences Maharshi Dayanand Saraswati University Ajmer
  • 2. Cryptography • can characterize cryptographic system by: • type of encryption operations used • substitution • transposition • product • number of keys used • single-key or private • two-key or public • way in which plaintext is processed • block • stream
  • 3. Cryptography • Cryptographic systems can be characterized along these three independent dimensions. • The type of operations used for transforming plaintext to ciphertext. All encryption algorithms are based on two general principles: substitution, in which each element in the plaintext (bit, letter, group of bits or letters) is mapped into another element, and transposition, in which elements in the plaintext are rearranged. The fundamental requirement is that no information be lost (that is, that all operations are reversible). Most systems, referred to as product systems, involve multiple stages of substitutions and transpositions.
  • 4. Cryptography • The number of keys used. If both sender and receiver use the same key, the system is referred to as symmetric, single-key, secret-key, or conventional encryption. If the sender and receiver use different keys, the system is referred to as asymmetric, two-key, or public-key encryption. • The way in which the plaintext is processed. A block cipher processes the input one block of elements at a time, producing an output block for each input block. A stream cipher processes the input elements continuously, producing output one element at a time, as it goes along.
  • 5. Cryptanalysis • objective to recover key not just message • general approaches: • cryptanalytic attack • brute-force attack • if either succeed all key use compromised
  • 6. Cryptanalysis • Typically objective is to recover the key in use rather then simply to recover the plaintext of a single ciphertext. There are two general approaches: • Cryptanalysis: relies on the nature of the algorithm plus perhaps some knowledge of the general characteristics of the plaintext or even some sample plaintext- ciphertext pairs. This type of attack exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used. •
  • 7. Cryptanalysis • Brute-force attacks try every possible key on a piece of ciphertext until an intelligible translation into plaintext is obtained. On average,half of all possible keys must be tried to achieve success. • If either type of attack succeeds in deducing the key, the effect is catastrophic: All future and past messages encrypted with that key are compromised.
  • 8. Cryptanalytic Attacks ciphertext only only know algorithm & ciphertext, is statistical, know or can identify plaintext known plaintext know/suspect plaintext & ciphertext chosen plaintext select plaintext and obtain ciphertext chosen ciphertext select ciphertext and obtain plaintext chosen text select plaintext or ciphertext to en/decrypt
  • 9. More Definitions unconditional security no matter how much computer power or time is available, the cipher cannot be broken since the ciphertext provides insufficient information to uniquely determine the corresponding plaintext computational security given limited computing resources (eg time needed for calculations is greater than age of universe), the cipher cannot be broken
  • 10. More Definitions • Two more definitions are worthy of note. An encryption scheme is unconditionally secure if the ciphertext generated by the scheme does not contain enough information to determine uniquely the corresponding plaintext, no matter how much ciphertext is available. • An encryption scheme is said to be computationally secure if either the cost of breaking the cipher exceeds the value of the encrypted information, or the time required to break the cipher exceeds the useful lifetime of the information. Unconditional security would be nice, but the only known such cipher is the one-time pad (later). • For all reasonable encryption algorithms, we have to assume computational security where it either takes too long, or is too expensive, to bother breaking the cipher.
  • 11. Brute Force Search • always possible to simply try every key • most basic attack, proportional to key size • assume either know / recognise plaintext Key Size (bits) Number of Alternative Keys Time required at 1 decryption/µs Time required at 106 decryptions/µs 32 232 = 4.3  109 231 µs = 35.8 minutes 2.15 milliseconds 56 256 = 7.2  1016 255 µs = 1142 years 10.01 hours 128 2128 = 3.4  1038 2127 µs = 5.4  1024 years 5.4  1018 years 168 2168 = 3.7  1050 2167 µs = 5.9  1036 years 5.9  1030 years 26 characters (permutation) 26! = 4  1026 2  1026 µs = 6.4  1012 years 6.4  106 years
  • 12. Assignment • What is Cryptography. • Explain Cryptanalysis and briefly describe Cryptanalytic Attacks