SlideShare a Scribd company logo
Cryptography
Cryptography
• Cryptography is a method of storing and
transmitting data in a particular form so that only
those for whom it is intended can read and
process it.
• The word ‘cryptography’ was invented by
combining two Greek words, ‘Krypto’ meaning
hidden and ‘graphene’ meaning writing.
• The art and science of concealing (hiding) the
messages to introduce secrecy in information
security is recognized as cryptography.
Cryptography
Plaintext= means the
message
Encryption=encoding(hidin
g the contents from
outsiders) the message
Ciphertext= the encrypted
message
Decryption=the process of
retrieving the plaintext
from the ciphertext
“Encryption” and
“Decryption” makes use of
a “key and a coding
method”.
Encryption techniques
There are three important encryption techniques now in use:
• Symmetric or “private key” encryption
• Asymmetric or “public key” encryption
• Digital signature, which are based on a variation of public key
encryption.
Symmetric-key systems use a single
key that both the sender and recipient
have, and public-key systems use two
keys, a public key known to everyone
and a private key known only to the
recipient of messages.
Introduction to Cryptography  and digital signatures
• The illustration shows a sender who wants to transfer some
sensitive data to a receiver in such a way that any party
intercepting or eavesdropping on the communication channel
cannot extract the data.
• The objective of this simple cryptosystem is that at the end of the
process, only the sender and the receiver will know the plaintext.
• Components of a Cryptosystem:
• The various components of a basic cryptosystem are as follows:
• Plaintext: It is the data to be protected during transmission.
• Encryption Algorithm: It is a mathematical process that produces
a cipher-text for any given plaintext and encryption key. It is a
cryptographic algorithm that takes plaintext and an encryption key
as input and produces a cipher-text.
• Cipher-text: It is the scrambled version of the plaintext produced by
the encryption algorithm using a specific the encryption key. The
cipher-text is not guarded. It flows on public channel. It can be
intercepted or compromised by anyone who has access to the
communication channel.
• Decryption Algorithm: It is a mathematical process, that produces a
unique plaintext for any given cipher-text and decryption key. It is a
cryptographic algorithm that takes a cipher-text and a decryption key
as input, and outputs a plaintext. The decryption algorithm essentially
reverses the encryption algorithm and is thus closely related to it.
• Encryption Key: It is a value that is known to the sender. The
sender inputs the encryption key into the encryption algorithm
along with the plaintext in order to compute the cipher-text.
• Decryption Key: It is a value that is known to the receiver. The
decryption key is related to the encryption key, but is not always
identical to it. The receiver inputs the decryption key into the
decryption algorithm along with the cipher-text in order to
compute the plaintext.
Encryption and Decryption
Symmetric cryptography
Asymmetric encryption
Encryption techniques
Introduction to Cryptography  and digital signatures
Symmetric Algorithm
• Data Encryption Standard(DES) is a symmetric algorithm developed by IBM and
maintained by the National Institute of Standard and Technology. It is base on
encryption multiple times with different keys. A 56-bit version of DES is
commonly used, but can be broken by brute force.
Other Symmetric encryption techniques include:
• RC4 uses a 40 bit key, but can use up to 256 bits.
• Triple DES(3DES) used DES three times, effectively giving it a 168 bit key.
• Advance Encryption Standard(AES), design to replace DES uses 128,192, and 256
bit keys.
Digital Signature
An electronic and Digital Signatures
• Authenticates the identity of the sender of a message,
or the signer of a document
• Or ensures that the contents of a message are intact.
Digital Signatures features:
• Are easily transportable
• Cannot be imitated by someone else
• And can be automatically time-stamped
• The ability to ensure that the original signed message
arrived means that :
• the sender can not easily repudiate it later.
Digital Signatures
• Sender encrypts message with their private key
• Receiver can decrypt using sender public key
• The authenticates sender, who is only person who has the matching
key.
• Does not give “privacy” of data
• decrypt key is public
https://youtu.be/JR4_RBb8A9Q
Digital Signatures
• Digital Signatures are a cryptographic technique and are one of the
most important application of asymmetric public-key cryptography.
• They are electronic or digital signature that can be used to
authentication the identity of the sender of the message or the
signer of the document(to ensure that content of the sent message
unchange) .
• A digital signature is a mathematical technique used to validate the
authenticity and integrity of a message, software or digital
document.
Digital Signatures
• The Digital Signature, is a small part of message, and includes:
• The name of the sender
• Other key contents
• The Digital Signature in the outgoing message is encrypted using
the sender’s private key.
• The Digital Signature is then decrypted using the sender’s public
key thus providing evidence that the message originate from the
sender.
• Digital Signature and public key encryption combine to provide
secure and authentication message transmission.
Digital Signatures-How?
Sender
1. Create a message
2. Hash the message to product a
message digest
3. Encryption the message digest
with sender’s private key
4. Append the encrypted digest to
the message
5. Send message
Recipient
1. Receive message
2. Decrypt the message digest with the
sender’s public key
3. If this work’s the sender is authenticated
4. Hash the message to produce another
message digest
5. Compare message digest in step 2 with
step 4. if the same , the message has been
changed.
Digital Signatures
Certificate Authority
• Certificates are usually tied to a particular domain. They can be issued by
a central entity, called a Certificate Authority (CA), or created and signed
locally.
• The biggest organization is VeriSign, the company that also runs the
domain names system. They have sanctioned many other companies to
offer certificates under their authority.
• Generally, the organization will not issue a certificate until they verify the
information you are putting in the certificate, either by phone or via some
kind of paper documentation.
Certificate Authority
• Once they "certify" you, they will take this information,
including the URLs you are going to use the certificate for,
and digitally "sign" it by encrypting it with their private key.
Then a Web server or other program can use this certificate.
When outside users receive some data, such as a Web page
from the server, and it has a certificate attached, they can use
public key cryptography to decrypt the certificate and verify
your identity.

More Related Content

PPTX
Network security
PPT
Encryption
PPTX
Cryptography and Network Security Principles.pptx
PDF
Fundamentals of Cryptography: Securing Data in the Digital Age
PPT
Fundamentals of cryptography
PPTX
Encryption techniques
PPT
What is digital signature or DSC
PPTX
Cryptography
Network security
Encryption
Cryptography and Network Security Principles.pptx
Fundamentals of Cryptography: Securing Data in the Digital Age
Fundamentals of cryptography
Encryption techniques
What is digital signature or DSC
Cryptography

Similar to Introduction to Cryptography and digital signatures (20)

PPTX
Encryption in Cryptography
PPT
Cryptography
PDF
Basic Cryptography.pdf
PPT
Lecture 7 - CRYPTOGRAPHYpptof my presentation.ppt
PPTX
Data encryption
PPTX
Fundamental Concept of Cryptography in Computer Security
PPT
Is case study
DOCX
Computer System Security (UNIT IV) For AKTU Lucknow
PPTX
big data and Iot , its security part ,hoe yoy help this
PPTX
Cryptography
PPTX
Data encryption
PPTX
cryptography-Final.pptx
PPTX
Computer Introduction (Data Encryption)-Lecture05
PDF
Encryption
PDF
UNIT 3 Information Security Sharad Institute
PPTX
Basics of Cryptography presentation.pptx
PPTX
Introduction to Cryptography for btech cse
PPT
Whatisdigitalsignature
PPT
Whatisdigitalsignature
Encryption in Cryptography
Cryptography
Basic Cryptography.pdf
Lecture 7 - CRYPTOGRAPHYpptof my presentation.ppt
Data encryption
Fundamental Concept of Cryptography in Computer Security
Is case study
Computer System Security (UNIT IV) For AKTU Lucknow
big data and Iot , its security part ,hoe yoy help this
Cryptography
Data encryption
cryptography-Final.pptx
Computer Introduction (Data Encryption)-Lecture05
Encryption
UNIT 3 Information Security Sharad Institute
Basics of Cryptography presentation.pptx
Introduction to Cryptography for btech cse
Whatisdigitalsignature
Whatisdigitalsignature
Ad

More from anupama12369 (13)

PPTX
OVERVIEW OF CYBER LAWS IN INDIA AND SECTIONS
PPTX
Diversity and multiculturalism
PPTX
Coordination
PPTX
Controlling
PPTX
Organizing
PPTX
Indian ethos
PPTX
Diversity and multiculturalism
PPTX
Directing
PPTX
Decision making
PPTX
Staffing
PPTX
Functions of management - Planning
PPTX
Basics of management science
PPT
OVERVIEW OF CYBER LAWS IN INDIA AND SECTIONS
Diversity and multiculturalism
Coordination
Controlling
Organizing
Indian ethos
Diversity and multiculturalism
Directing
Decision making
Staffing
Functions of management - Planning
Basics of management science
Ad

Recently uploaded (20)

PPTX
Pharma ospi slides which help in ospi learning
PPTX
GDM (1) (1).pptx small presentation for students
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
Insiders guide to clinical Medicine.pdf
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Pre independence Education in Inndia.pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PPTX
Cell Structure & Organelles in detailed.
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PPTX
master seminar digital applications in india
PDF
Classroom Observation Tools for Teachers
PDF
TR - Agricultural Crops Production NC III.pdf
Pharma ospi slides which help in ospi learning
GDM (1) (1).pptx small presentation for students
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Insiders guide to clinical Medicine.pdf
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Pre independence Education in Inndia.pdf
Supply Chain Operations Speaking Notes -ICLT Program
O7-L3 Supply Chain Operations - ICLT Program
STATICS OF THE RIGID BODIES Hibbelers.pdf
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Cell Structure & Organelles in detailed.
FourierSeries-QuestionsWithAnswers(Part-A).pdf
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
102 student loan defaulters named and shamed – Is someone you know on the list?
master seminar digital applications in india
Classroom Observation Tools for Teachers
TR - Agricultural Crops Production NC III.pdf

Introduction to Cryptography and digital signatures

  • 2. Cryptography • Cryptography is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it. • The word ‘cryptography’ was invented by combining two Greek words, ‘Krypto’ meaning hidden and ‘graphene’ meaning writing. • The art and science of concealing (hiding) the messages to introduce secrecy in information security is recognized as cryptography.
  • 3. Cryptography Plaintext= means the message Encryption=encoding(hidin g the contents from outsiders) the message Ciphertext= the encrypted message Decryption=the process of retrieving the plaintext from the ciphertext “Encryption” and “Decryption” makes use of a “key and a coding method”.
  • 4. Encryption techniques There are three important encryption techniques now in use: • Symmetric or “private key” encryption • Asymmetric or “public key” encryption • Digital signature, which are based on a variation of public key encryption.
  • 5. Symmetric-key systems use a single key that both the sender and recipient have, and public-key systems use two keys, a public key known to everyone and a private key known only to the recipient of messages.
  • 7. • The illustration shows a sender who wants to transfer some sensitive data to a receiver in such a way that any party intercepting or eavesdropping on the communication channel cannot extract the data. • The objective of this simple cryptosystem is that at the end of the process, only the sender and the receiver will know the plaintext.
  • 8. • Components of a Cryptosystem: • The various components of a basic cryptosystem are as follows: • Plaintext: It is the data to be protected during transmission. • Encryption Algorithm: It is a mathematical process that produces a cipher-text for any given plaintext and encryption key. It is a cryptographic algorithm that takes plaintext and an encryption key as input and produces a cipher-text.
  • 9. • Cipher-text: It is the scrambled version of the plaintext produced by the encryption algorithm using a specific the encryption key. The cipher-text is not guarded. It flows on public channel. It can be intercepted or compromised by anyone who has access to the communication channel. • Decryption Algorithm: It is a mathematical process, that produces a unique plaintext for any given cipher-text and decryption key. It is a cryptographic algorithm that takes a cipher-text and a decryption key as input, and outputs a plaintext. The decryption algorithm essentially reverses the encryption algorithm and is thus closely related to it.
  • 10. • Encryption Key: It is a value that is known to the sender. The sender inputs the encryption key into the encryption algorithm along with the plaintext in order to compute the cipher-text. • Decryption Key: It is a value that is known to the receiver. The decryption key is related to the encryption key, but is not always identical to it. The receiver inputs the decryption key into the decryption algorithm along with the cipher-text in order to compute the plaintext.
  • 16. Symmetric Algorithm • Data Encryption Standard(DES) is a symmetric algorithm developed by IBM and maintained by the National Institute of Standard and Technology. It is base on encryption multiple times with different keys. A 56-bit version of DES is commonly used, but can be broken by brute force. Other Symmetric encryption techniques include: • RC4 uses a 40 bit key, but can use up to 256 bits. • Triple DES(3DES) used DES three times, effectively giving it a 168 bit key. • Advance Encryption Standard(AES), design to replace DES uses 128,192, and 256 bit keys.
  • 17. Digital Signature An electronic and Digital Signatures • Authenticates the identity of the sender of a message, or the signer of a document • Or ensures that the contents of a message are intact. Digital Signatures features: • Are easily transportable • Cannot be imitated by someone else • And can be automatically time-stamped • The ability to ensure that the original signed message arrived means that : • the sender can not easily repudiate it later.
  • 18. Digital Signatures • Sender encrypts message with their private key • Receiver can decrypt using sender public key • The authenticates sender, who is only person who has the matching key. • Does not give “privacy” of data • decrypt key is public https://youtu.be/JR4_RBb8A9Q
  • 19. Digital Signatures • Digital Signatures are a cryptographic technique and are one of the most important application of asymmetric public-key cryptography. • They are electronic or digital signature that can be used to authentication the identity of the sender of the message or the signer of the document(to ensure that content of the sent message unchange) . • A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital document.
  • 20. Digital Signatures • The Digital Signature, is a small part of message, and includes: • The name of the sender • Other key contents • The Digital Signature in the outgoing message is encrypted using the sender’s private key. • The Digital Signature is then decrypted using the sender’s public key thus providing evidence that the message originate from the sender. • Digital Signature and public key encryption combine to provide secure and authentication message transmission.
  • 21. Digital Signatures-How? Sender 1. Create a message 2. Hash the message to product a message digest 3. Encryption the message digest with sender’s private key 4. Append the encrypted digest to the message 5. Send message Recipient 1. Receive message 2. Decrypt the message digest with the sender’s public key 3. If this work’s the sender is authenticated 4. Hash the message to produce another message digest 5. Compare message digest in step 2 with step 4. if the same , the message has been changed.
  • 23. Certificate Authority • Certificates are usually tied to a particular domain. They can be issued by a central entity, called a Certificate Authority (CA), or created and signed locally. • The biggest organization is VeriSign, the company that also runs the domain names system. They have sanctioned many other companies to offer certificates under their authority. • Generally, the organization will not issue a certificate until they verify the information you are putting in the certificate, either by phone or via some kind of paper documentation.
  • 24. Certificate Authority • Once they "certify" you, they will take this information, including the URLs you are going to use the certificate for, and digitally "sign" it by encrypting it with their private key. Then a Web server or other program can use this certificate. When outside users receive some data, such as a Web page from the server, and it has a certificate attached, they can use public key cryptography to decrypt the certificate and verify your identity.