SlideShare a Scribd company logo
SECURITY LECTURE
CRYPTOGRAPHY
Plaintext: is a clear message needs to be sent secretly.
Ciphertext: is an encrypted message hided form intruders.
Encryption: converting a plaintext to a ciphertext using a
key.
Decryption: the process of retrieving the plaintext from the
ciphertext using a key.
CRYPTOGRAPHY
Cryptography is the science of keeping messages secret.
Cryptography = Encryption + Decryption
Cryptanalysis is the art of retrieving the plaintext without
knowing the proper key
CRYPTOGRAPHY
Cryptography is the science of keeping messages secret.
Cryptography = Encryption + Decryption
Cryptanalysis is the art of retrieving the plaintext without
knowing the proper key
SYMMETRIC & ASYMMETRIC
CIPHERS
Symmetric Cipher
SYMMETRIC & ASYMMETRIC
CIPHERS
Symmetric Cipher
Symmetric algorithms can be divided into stream
ciphers and block ciphers. Stream ciphers can
encrypt a single bit of plaintext at a time, whereas
block ciphers take a number of bits (typically 64 bits
in modern ciphers), and encrypt them as a single unit.
SYMMETRIC & ASYMMETRIC
CIPHERS
Assymmetric Cipher
SYMMETRIC & ASYMMETRIC
CIPHERS
Asymmetric Cipher
Asymmetric ciphers permit the encryption key to be
public, allowing anyone to encrypt with the key, whereas
only the proper recipient (who knows the decryption key)
can decrypt the message. The encryption key is also called
the public key and the decryption key the private key.
CRYPTANALYSIS AND ATTACKS ON CRYPTOSYSTEMS
Cryptanalysis is the art of deciphering encrypted communications
without knowing the proper keys.
Some of the cryptanalytic techniques:
 Ciphertext-only attack ( Only know algorithm / ciphertext, statistical):
This is the situation where the attacker does not know anything about the
contents of the message, and must work from ciphertext only.
CRYPTANALYSIS AND ATTACKS ON CRYPTOSYSTEMS
CRYPTANALYSIS AND ATTACKS ON CRYPTOSYSTEMS
Known-plaintext attack (know/suspect plaintext & ciphertext to
attack cipher): The attacker knows or can guess the plaintext for some
parts of the ciphertext.
The task is to decrypt the rest of the ciphertext blocks using this
information.
CRYPTANALYSIS AND ATTACKS ON CRYPTOSYSTEMS
CRYPTANALYSIS AND ATTACKS ON CRYPTOSYSTEMS
Chosen-plaintext attack (selects plaintext and obtain ciphertext to
attack cipher): The attacker is able to have any text he likes encrypted
with the unknown key. The task is to determine the key used for
encryption.
Some encryption methods, particularly RSA, are extremely vulnerable
to chosen- plaintext attacks.
CRYPTANALYSIS AND ATTACKS ON CRYPTOSYSTEMS
CRYPTANALYSIS AND ATTACKS ON CRYPTOSYSTEMS
 Chosen Ciphertext Attacks (select ciphertext and obtain plaintext
to attack cipher): Attacker obtains the decryption of any ciphertext
of its choice (under the key being attacked)
CRYPTANALYSIS AND ATTACKS ON CRYPTOSYSTEMS

More Related Content

PPT
Fundamentals of cryptography
DOCX
PPTX
Cryptography
PPTX
Cryptography
PDF
crypto-105058445051058480051448005540405
PDF
Computer Security (Cryptography) Ch01
PPTX
Cryptography by Durlab Kumbhakar
Fundamentals of cryptography
Cryptography
Cryptography
crypto-105058445051058480051448005540405
Computer Security (Cryptography) Ch01
Cryptography by Durlab Kumbhakar

Similar to System Security Principles for Beginners (20)

PPTX
Cryptography
PPTX
P2-L5+Intro+to+Cryptography+-+Script.pptx
PPTX
PPTX
Cryptography
PDF
Unit-2-IS (1).pdf
PPTX
Cryptography, a science of secure writing
PPTX
Topic1 substitution transposition-techniques
PPTX
Cryptography
PPTX
622 Crypto Presentattion.pptx
PPTX
Symmetric ciphermodel
PPT
PresentationonCRYPTOGRvvvvvvvvvvvAPHYppt.ppt
PPT
Presentationon ON THE TOPIC CRYPTOGRAPHY
PPT
PresentationonCRYPTOGRAPHYppt.ppt
PPT
PresentationonCRYPTOGRAPHYppt.ppt
PPT
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
PPTX
Cryptography-Known plain text attack
PPT
Elementry Cryptography
PPTX
Cryptography & Network Security.pptx
PPT
Day5
Cryptography
P2-L5+Intro+to+Cryptography+-+Script.pptx
Cryptography
Unit-2-IS (1).pdf
Cryptography, a science of secure writing
Topic1 substitution transposition-techniques
Cryptography
622 Crypto Presentattion.pptx
Symmetric ciphermodel
PresentationonCRYPTOGRvvvvvvvvvvvAPHYppt.ppt
Presentationon ON THE TOPIC CRYPTOGRAPHY
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
Cryptography-Known plain text attack
Elementry Cryptography
Cryptography & Network Security.pptx
Day5
Ad

Recently uploaded (20)

PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PDF
01-Introduction-to-Information-Management.pdf
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
Cell Types and Its function , kingdom of life
PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
Cell Structure & Organelles in detailed.
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PPTX
Presentation on HIE in infants and its manifestations
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
Complications of Minimal Access Surgery at WLH
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
Institutional Correction lecture only . . .
PDF
A systematic review of self-coping strategies used by university students to ...
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
01-Introduction-to-Information-Management.pdf
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Cell Types and Its function , kingdom of life
Microbial disease of the cardiovascular and lymphatic systems
Cell Structure & Organelles in detailed.
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
Supply Chain Operations Speaking Notes -ICLT Program
STATICS OF THE RIGID BODIES Hibbelers.pdf
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Presentation on HIE in infants and its manifestations
Microbial diseases, their pathogenesis and prophylaxis
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Complications of Minimal Access Surgery at WLH
O5-L3 Freight Transport Ops (International) V1.pdf
Institutional Correction lecture only . . .
A systematic review of self-coping strategies used by university students to ...
Ad

System Security Principles for Beginners

  • 2. CRYPTOGRAPHY Plaintext: is a clear message needs to be sent secretly. Ciphertext: is an encrypted message hided form intruders. Encryption: converting a plaintext to a ciphertext using a key. Decryption: the process of retrieving the plaintext from the ciphertext using a key.
  • 3. CRYPTOGRAPHY Cryptography is the science of keeping messages secret. Cryptography = Encryption + Decryption Cryptanalysis is the art of retrieving the plaintext without knowing the proper key
  • 4. CRYPTOGRAPHY Cryptography is the science of keeping messages secret. Cryptography = Encryption + Decryption Cryptanalysis is the art of retrieving the plaintext without knowing the proper key
  • 6. SYMMETRIC & ASYMMETRIC CIPHERS Symmetric Cipher Symmetric algorithms can be divided into stream ciphers and block ciphers. Stream ciphers can encrypt a single bit of plaintext at a time, whereas block ciphers take a number of bits (typically 64 bits in modern ciphers), and encrypt them as a single unit.
  • 8. SYMMETRIC & ASYMMETRIC CIPHERS Asymmetric Cipher Asymmetric ciphers permit the encryption key to be public, allowing anyone to encrypt with the key, whereas only the proper recipient (who knows the decryption key) can decrypt the message. The encryption key is also called the public key and the decryption key the private key.
  • 9. CRYPTANALYSIS AND ATTACKS ON CRYPTOSYSTEMS Cryptanalysis is the art of deciphering encrypted communications without knowing the proper keys. Some of the cryptanalytic techniques:  Ciphertext-only attack ( Only know algorithm / ciphertext, statistical): This is the situation where the attacker does not know anything about the contents of the message, and must work from ciphertext only.
  • 10. CRYPTANALYSIS AND ATTACKS ON CRYPTOSYSTEMS
  • 11. CRYPTANALYSIS AND ATTACKS ON CRYPTOSYSTEMS Known-plaintext attack (know/suspect plaintext & ciphertext to attack cipher): The attacker knows or can guess the plaintext for some parts of the ciphertext. The task is to decrypt the rest of the ciphertext blocks using this information.
  • 12. CRYPTANALYSIS AND ATTACKS ON CRYPTOSYSTEMS
  • 13. CRYPTANALYSIS AND ATTACKS ON CRYPTOSYSTEMS Chosen-plaintext attack (selects plaintext and obtain ciphertext to attack cipher): The attacker is able to have any text he likes encrypted with the unknown key. The task is to determine the key used for encryption. Some encryption methods, particularly RSA, are extremely vulnerable to chosen- plaintext attacks.
  • 14. CRYPTANALYSIS AND ATTACKS ON CRYPTOSYSTEMS
  • 15. CRYPTANALYSIS AND ATTACKS ON CRYPTOSYSTEMS  Chosen Ciphertext Attacks (select ciphertext and obtain plaintext to attack cipher): Attacker obtains the decryption of any ciphertext of its choice (under the key being attacked)
  • 16. CRYPTANALYSIS AND ATTACKS ON CRYPTOSYSTEMS