Chapter 3. Cryptography
Chapter 3. Cryptography
Cryptography
16 Marks
Dheeraj S. Sadawarte
CRYPTOGRAPHY
Cryptography is the art and science of
achieving security by encoding messages to
make them non-readable.
This process is
systematic &
well-structured
This process is
trial & error
August 4, 2015
based
Dheeraj S. Sadawarte 6
CRYPTOLOGY
It is a combination of cryptography and
cryptanalysis
ENCRYPTION
Hi there !! ALGORITHM
m/okuG
DECRYPTION
m/okuG ALGORITHM
Hi there !!
Plaintext Plaintext
Encryption Decryption
Ciphertext Ciphertext
Internet
August 4, 2015 Dheeraj S. Sadawarte 9
SUBSTITUTION TECHNIQUES:
CAESAR CIPHER :
• Was Developed By Julius Caesar.
• the characters of plain text message are replaced
by other characters, numbers or symbols.
• Example :If each alphabet in a message is
replaced by an alphabet 3 place down the line
then
PLAIN TEXT: ABC
KEY: 3
CIPHER TEXT: DEF
August 4, 2015 Dheeraj S. Sadawarte 10
Caesar’s Cipher
plaintext: meet me after the toga party
ciphertext:PHHW PH DIWHU WKH WRJD SDUWB
A B C D E F G H I J K L MN O P Q R S T U VW X Y Z
D E F G H I J K L MN O P Q R S T U VWX Y Z A B C
N O P Q R S T U V W X Y Z
13 14 15 16 17 18 19 20 21 22 23 24 25
W l o e t d n s
e c m s u e t
ciphertext- WLOETDNSECMSUET
Column Out 3 4 2 1 5 6 7
Plaintext: t t n a a p t
m t s u o a o
d w c o i x k
n l y p e t z
August 4, 2015 Dheeraj S. Sadawarte 24
Ciphertext: AUOPNSCYTMDNTTWLAOIEPAXTTOKZ
ENCRYPTION AND
DECRPTION IN REAL WORLD
Sender Receiver
HELLO HELLO
Plaintext Plaintext
Encrypt Decrypt
INTERNET
Lfmmp Kplo Lfmmp Kplo
August 4, 2015 Dheeraj S. Sadawarte 25
ciphertext ciphertext
SYMMETRIC AND ASYMMETRIC
KEY CRYPTOGRAPHY
• Symmetric key cryptography: Involves the use
of same key for encryption and decryption.
• Asymmetric key cryptography : Involves the
use of one key for encryption and another,
different key for decryption.
Key Distribution problem in Symmetric key
cryptography.
Message Digest.
Ciphertext 64 bit
August 4, 2015 Dheeraj S. Sadawarte 49
DES Encryption Overview
Advantages
Authentication
Authenticate the source of message
Integrity
Any change in msg invalidate the signature