Click To Edit Master Subtitle Style
Click To Edit Master Subtitle Style
CRYPTOGRAPHY
We need an efficient and simple way of securing the electronic documents from being read or used by people other than who are authorized to do it. Cryptography is a standard way of securing the electronic documents.
3/10/13
What is Cryptography?
3/10/13
The art of secret writing The art of protection using information The science of encrypting or hiding secrets Needed for confidentiality
3/10/13
3/10/13
3/10/13
plaintext - the original message ciphertext - the coded message cipher - algorithm for transforming plaintext to ciphertext key - info used in cipher known only to sender/receiver encipher (encrypt) - converting plaintext to ciphertext decipher (decrypt) - recovering ciphertext from plaintext cryptography - study of encryption principles/methods cryptanalysis (codebreaking) - the study
NEED OF CRYPTOGRAPHY
The
3/10/13
main use of cryptography is mentioned below: Private or confidentiality Data integrity Authentication Non-repudation
1)
2)
3)
4)
3/10/13
Ever
encryption and decryption has two aspects: the ALGORITHM and the KEY used for encryption and decryption.
3/10/13
Cryptographic Algorithms:
A cryptographic algorithms works in combination with a key (a number, word or phrase), to encrypt the plain text. Same plain text encrypts to different cipher texts for different keys.
3/10/13
Strength of a cryptosystems depends on the strength of the algorithm and the secrecy of the key.
KEYS:
A key is a value that works with a cryptographic algorithm to produce a specific ciphertext. Keys are basically really, really, big numbers . In public-key cryptography, the bigger the key, the more secure the ciphertext.
NOTE:
v v
The algorithm is usually known to everybody. The key makes the process secure.
3/10/13
Asymmetric Symmetric key key cryptograph Symmetric Cryptograpcryptosystems use the same key (the secret key) to encrypt and decrypt a message. Symmetric y hy cryptosystems are also called as private key
cryptosystems.
3/10/13
TYPES
3/10/13
STREAM CIPHERS:
Stream
ciphers operate on a single bit (byte or computer word) at a time, and implement some form of feedback mechanism so that the key is constantly changing. scheme encrypts one block of data at a time using the same key on each block.
BLOCK CIPHERS :
The
3/10/13
PUBLIC KEY CRYPTOGRAPHIC ALGORITHMS: The Asymmetric(public key) key cryptographic algorithms are as follow:a) RSA b) Diffie-Hellman c) Elliptic curve
3/10/13
Brief
Introduction Of RC4
3/10/13
RC4
is a stream cipher designed by Rivest for RSA Data Security (now RSA Security). It is a variable key-size stream cipher with byteoriented operations. The algorithm is based on the use of a random permutation. Analysis shows that the period of the cipher is overwhelmingly likely to be greater than 10100. Eight to sixteen machine operations are required per output byte, and the cipher can be expected to run very quickly in software. Independent analysts have scrutinized the algorithm and it is considered secure.
Advantages of symmeric key - Simple: - Encrypt and decrypt your own files - Fast. - Uses less computer resources - Prevents widespread message security compromise Disadvantages of Symmetric key - Need for secure channel for secret key exchange: - Too many keys - Origin and authenticity of message cannot be guaranteed
3/10/13
3/10/13
Advantage of Asymmetric key - Convenience - Provides for message authentication: - Detection of tampering: - Provide for non-repudiation: Disadvantage of Asymmetric key - Public keys should/must be authenticated - Slow - Uses up more computer resources - Widespread security compromise is possible
-