SlideShare a Scribd company logo
CRYPTOGRAPHYPresenting by:      J.P.S.M.K
What   is   CryptographyCryptography
In a narrow sense
Mangling information into apparent unintelligibility
Allowing a secret method of un-mangling
In a broader sense
Mathematical techniques related to information security
About secure communication in the presence of adversaries
Cryptanalysis
The study of methods for obtaining the meaning of encrypted information without accessing the secret information
Cryptology
Cryptography + cryptanalysisSecurity AttacksPassive attacks
Obtain message contents
Monitoring traffic flows
Active attacks
Masquerade of one entity as some other
Replay previous messages
Modify messages in transmit
Add, delete messages
Denial of serviceObjectives of Information SecurityConfidentiality (secrecy)
Only the sender and intended receiver should be able to understand the contents of the transmitted message
Authentication
Both the sender and receiver need to confirm the identity of other party involved in the communication
Data integrity
The content of their communication is not altered, either maliciously or by accident, in transmission.
Availability
Timely accessibility of data to authorized entities.Objectives of Information SecurityNon-repudiation
An entity is prevented from denying its previous commitments or actions
Access control

More Related Content

PPTX
Cryptography on cloud
PPT
Information Security & Cryptography
DOC
Cryptography full report
PDF
Network security & cryptography full notes
PPTX
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHM
PPTX
PPTX
Cryptography
PPTX
Cryptography.ppt
Cryptography on cloud
Information Security & Cryptography
Cryptography full report
Network security & cryptography full notes
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHM
Cryptography
Cryptography.ppt

What's hot (20)

PPTX
Cryptography
PPT
Cryptography Lecture by Sam Bowne
PPT
Ch12 Cryptography it-slideshares.blogspot.com
PPT
Ch11 Basic Cryptography
PPT
Cryptography
PPTX
Encryption
PPTX
Network security and cryptography
PPT
6. cryptography
PDF
Computer Security (Cryptography) Ch01
PPT
Network Security and Cryptography
PPTX
Cryptography
PPT
Chapter 15 - Security
PPTX
Overview of cryptography
ODP
Encryption presentation final
PPTX
Network security & cryptography
PPT
Encryption And Decryption
 
PPTX
Network security and cryptography
PPTX
Cryptanalysis 101
PPTX
Cryptography and network security
Cryptography
Cryptography Lecture by Sam Bowne
Ch12 Cryptography it-slideshares.blogspot.com
Ch11 Basic Cryptography
Cryptography
Encryption
Network security and cryptography
6. cryptography
Computer Security (Cryptography) Ch01
Network Security and Cryptography
Cryptography
Chapter 15 - Security
Overview of cryptography
Encryption presentation final
Network security & cryptography
Encryption And Decryption
 
Network security and cryptography
Cryptanalysis 101
Cryptography and network security
Ad

Viewers also liked (20)

PDF
Campionat grups previa_fase_final_passen2_max128_plantilla
PPT
Josie Bury Evaluation
PPTX
Building a "Rocket" Business.
PPT
Creating new markets fin
PPTX
V sphere 5 roadshow final
PPTX
Cryptography /Sankar jayam
PPT
Presentaciò ppt del 1er trimestre, d'informàtica.
PPTX
Primer trimestre informatica
PPT
Josie bury
PPT
The history of boomerang
DOCX
Grammar tests
DOCX
Fitxes activitats
PPTX
District central cooperative banks (dccb
PDF
Cisco it collaboration for blue chip 03 2011
PPT
Kcc bnk...
PPTX
Difference between cooperative bank and commercial bank
PPTX
Presentation1
PPTX
VNX Overview
PPTX
Cooperative and commercial banks in india
PDF
Fearless Leadership - Sri Sakti India Leadership Summit, CBE March 2012
Campionat grups previa_fase_final_passen2_max128_plantilla
Josie Bury Evaluation
Building a "Rocket" Business.
Creating new markets fin
V sphere 5 roadshow final
Cryptography /Sankar jayam
Presentaciò ppt del 1er trimestre, d'informàtica.
Primer trimestre informatica
Josie bury
The history of boomerang
Grammar tests
Fitxes activitats
District central cooperative banks (dccb
Cisco it collaboration for blue chip 03 2011
Kcc bnk...
Difference between cooperative bank and commercial bank
Presentation1
VNX Overview
Cooperative and commercial banks in india
Fearless Leadership - Sri Sakti India Leadership Summit, CBE March 2012
Ad

Similar to Sankar jayam (20)

PPT
Network Security
PPTX
Cryptography by Durlab Kumbhakar
PPT
Cyber security Unit 3 Cryptography and Network security
PPT
Introduction To PKI Technology
PPTX
Introduction to Cryptography for btech cse
PPTX
Cryptography by gaurav singh
PDF
Pertemuan 4 information hiding (cryptography)
PPT
Java Crypto
PPTX
A study of cryptography for satellite applications
PDF
Pertemuan 4 information hiding (cryptography)
PPTX
cns unit 1.pptx
PDF
Information Security Imp +Past Paper.pdf
PDF
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
PPT
Fundamentals of cryptography
PDF
White Paper on Cryptography
PDF
A Robust Cryptographic System using Neighborhood-Generated Keys
PDF
A Robust Cryptographic System using Neighborhood-Generated Keys
PPTX
IS-cryptograpy algorithms.pptx
PDF
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
PPTX
Networking Advance Concepts with handson experience
Network Security
Cryptography by Durlab Kumbhakar
Cyber security Unit 3 Cryptography and Network security
Introduction To PKI Technology
Introduction to Cryptography for btech cse
Cryptography by gaurav singh
Pertemuan 4 information hiding (cryptography)
Java Crypto
A study of cryptography for satellite applications
Pertemuan 4 information hiding (cryptography)
cns unit 1.pptx
Information Security Imp +Past Paper.pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
Fundamentals of cryptography
White Paper on Cryptography
A Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated Keys
IS-cryptograpy algorithms.pptx
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
Networking Advance Concepts with handson experience

Recently uploaded (20)

PPTX
Institutional Correction lecture only . . .
PDF
01-Introduction-to-Information-Management.pdf
PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PPTX
master seminar digital applications in india
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
Cell Structure & Organelles in detailed.
PPTX
Cell Types and Its function , kingdom of life
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
Institutional Correction lecture only . . .
01-Introduction-to-Information-Management.pdf
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
master seminar digital applications in india
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Abdominal Access Techniques with Prof. Dr. R K Mishra
human mycosis Human fungal infections are called human mycosis..pptx
2.FourierTransform-ShortQuestionswithAnswers.pdf
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
Pharmacology of Heart Failure /Pharmacotherapy of CHF
102 student loan defaulters named and shamed – Is someone you know on the list?
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
VCE English Exam - Section C Student Revision Booklet
Cell Structure & Organelles in detailed.
Cell Types and Its function , kingdom of life
STATICS OF THE RIGID BODIES Hibbelers.pdf

Sankar jayam

  • 2. What is CryptographyCryptography
  • 3. In a narrow sense
  • 4. Mangling information into apparent unintelligibility
  • 5. Allowing a secret method of un-mangling
  • 7. Mathematical techniques related to information security
  • 8. About secure communication in the presence of adversaries
  • 10. The study of methods for obtaining the meaning of encrypted information without accessing the secret information
  • 12. Cryptography + cryptanalysisSecurity AttacksPassive attacks
  • 16. Masquerade of one entity as some other
  • 20. Denial of serviceObjectives of Information SecurityConfidentiality (secrecy)
  • 21. Only the sender and intended receiver should be able to understand the contents of the transmitted message
  • 23. Both the sender and receiver need to confirm the identity of other party involved in the communication
  • 25. The content of their communication is not altered, either maliciously or by accident, in transmission.
  • 27. Timely accessibility of data to authorized entities.Objectives of Information SecurityNon-repudiation
  • 28. An entity is prevented from denying its previous commitments or actions
  • 30. An entity cannot access any entity that it is not authorized to.
  • 32. The identity of an entity if protected from others.Types of Cryptographic FunctionsSecret key functions
  • 34. Hash functionsSecret Key CryptographyencryptionplaintextciphertextkeyciphertextplaintextdecryptionUsing a single key for encryption/decryption.The plaintext and the ciphertext having the same size.Also called symmetric key cryptography
  • 35. SKC: Security UsesTransmitting over an insecure channelThe transmitted message is encrypted by the sender and can be decrypted by the receiver, with the same keyPrevent attackers from eavesdroppingSecure storage on insecure mediaData is encrypted before being stored somewhereOnly the entities knowing the key can decrypt it
  • 36. SKC: Security UsesAuthenticationStrong authentication: proving knowledge of a secret without revealing it.AliceBobchallenger AresponserA encrypted with KA,Br BrB encrypted with KA,B
  • 37. SKC: Security UsesIntegrity CheckNoncryptographic checksumUsing a well-known algorithm to map a message (of arbitrary length) to a fixed-length checksumProtecting against accidental corruption of a messageExample: CRCCryptographic checksumA well-know algorithmGiven a key and a messageThe algorithm produces a fixed-length message authentication code (MAC) that is sent with the message
  • 38. Public Key CryptographyencryptionplaintextciphertextPublic keyPrivate keyciphertextplaintextdecryptionEach individual has two keysa private key (d): need not be reveal to anyone a public key (e): preferably known to the entire worldPublic key crypto is also called asymmetric crypto.
  • 39. PKC: Security UsesTransmitting over an insecure channelAliceBobencrypt mA using dBencrypt mA using eBSecure storage on insecure mediaData is encrypted with the public key of the source, before being stored somewhereNobody else can decrypt it (not knowing the private key of the data source)
  • 40. PKC: Security UsesAuthenticationAliceBobencrypt rusing eBdecrypt to rusing dBr
  • 41. PKC: Security UsesDigital SignaturesProving that a message is generated by a particular individualNon-repudiation: the signing individual can not be denied, because only him/her knows the private key. signingplaintextSigned messagePrivate keyPublic keySigned messageplaintextverification
  • 42. Hash FunctionsCryptographic hash functionA mathematical transformation that takes a message of arbitrary length and computes it a fixed-length (short) number.Properties( Let the hash of a message m be h(m) )For any m, it is relatively easy to compute h(m)Given h(m), there is no way to find an m that hashes to h(m) in a way that is substantially easier than going through all possible values of m and computing h(m) for each one.It is computationally infeasible to find two values that hash to the same thing.
  • 43. Hash Functions: Security UsesPassword hashingThe system store a hash of the password (not the password itself)When a password is supplied, it computes the password’s hash and compares it with the stored value.Message integrityUsing cryptographic hash functions to generate a MACBobAlicesecret=?messagehashhashsecret
  • 44. Hash Functions: Security UsesMessage fingerprintSave the message digest of the data on a tamper-proof backing storePeriodically re-compute the digest of the data to ensure it is not changed.Downline load securityUsing a hash function to ensure a download program is not modifiedImproving signature efficiencyCompute a message digest (using a hash function) and sign that.
  • 45. Cryptographic Algorithms: AgendaAttacks on cryptographic algorithmsDefinition of securitySome cryptographic algorithms: basic facts
  • 46. Attacks: TypesBrute force searchAssume either know/recognize plaintextSimply try every keyCryptoanalysisCiphertext onlyWith the ciphertext Plaintext is recognizableKnown plaintext<cipher, plaintext> pairs are knownChosen plaintextSelect plaintext and obtain ciphertext to attack
  • 47. Birthday AttacksPrincipleAssume: A function yields any of n different outputs with equal probability, where n is sufficiently large.After evaluating the function for about 1.2*squart(n) arguments, we expect to find a pair of different arguments, x1 and x2, such that f(x1)=f(x2). Attack: message replaySolution: increase the size of the output
  • 48. Meet-in-the-Middle AttacksPrinciplebuild a table of keysCompute f(k,m) for every keyf is an encryption function, m is a known messageEavesdrop a value f(k’,m)If f(k’,m)=f(k,m), then there is a good chance k’=k.
  • 49. Meet-in-the-Middle AttacksAn attack exampleAssume:a new encryption function: F(k1,k2,m)=f(k1,f(k2,m))A pair (P,C) is knownAttacker:Encrypt P, i.e., computing f(k2,P), for all possible values of k2; store the values in a tableDecrypt C, i.e., computing f-1(k1,C), for all possible values of k1, and for each result check the table A match reveals a possible combination of the keys
  • 50. Security DefinitionUnconditional SecurityThe system cannot be defeated, no matter how much power is available by the adversary.Computational securityThe perceived level of computation required to defeat the system using the best known attack exceeds, by a comfortable margin, the computational resources of the hypothesized adversary.e.g., given limited computing resources, it takes the age of universe to break cipher.
  • 51. Security DefinitionProvable securityThe difficulty of defeating the system can be shown to be essentially as difficult as solving a well-known and supposedly difficult problem (e.g., integer factorization) Ad hoc securityClaims of security generally remain questionableUnforeseen attacks remain a threat
  • 52. Secret Key Cryptographic AlgorithmsDES (Data Encryption Standard)3DES (Triple DES)IDEA (International Data Encryption Algorithm)AES (Advanced Encryption Standard)
  • 53. DES (Data Encryption Standard)Authors: NSA & IBM, 1977Data block size: 64-bit (64-bit input, 64-bit output)Key size: 56-bit keyEncryption is fastDES chipsDES software: a 500-MIP CPU can encrypt at about 30K octets per secondSecurityNo longer considered secure: 56 bit keys are vulnerable to exhaustive search
  • 54. Triple-DES (3DES)C = DESk3(DESk2(DESk1(P))). Data block size: 64-bitKey size: 168-bit key; effective key size: 112 (due to man-in-the-middle attack)Encryption is slower than DESSecurer than DES
  • 55. IDEA (International Data Encryption Algorithm)Authors: Lai & Massey, 1991Data block size: 64-bitKey size: 128-bitEncryption is slower than DESSecurityNobody has yet published results on how to break itHaving patent protection
  • 56. AES (Advanced Encryption Standard)Authors: Daemen & RijmenBlock size:128-bitKey size: 128-bit, 192-bit, 256-bitEncryption is fastSecurityAs of 2005, no successful attacks are recognized.NSA stated it secure enough for non-classified data.