Cryptography Prateek Sharma
Cryptography Prateek Sharma
130 13042 13401 8501 115 3528 416 17214 6491 11310 18147 18222 21560
10247 11518 23677 13605 3494 14936 98092 5905 11311 10392 10371 0302
21290 5161 39695 23571 17504 11269 18276 18101 0317 0228 17694 4473
22284 22200 19452 21589 67893 5569 13918 8958 12137 1333 4725 4458
5905 17166 13851 4458 17149 14471 6706 13850 12224 6929 14991 7382
15857 67893 14218 36477 5870 17553 67893 5870 5454 16102 15217 22801
17138 21001 17388 7446 23638 18222 6719 14331 15021 23845 3156 23552
22096 21604 4797 9497 22464 20855 4377 23610 18140 22260 5905 13347
20420 39689 13732 20667 6929 5275 18507 52262 1340 22049 13339 11265
22295 10439 14814 4178 6992 8784 7632 7357 6926 52262 11267 21100
21272 9346 9559 22464 15874 18502 18500 15857 2188 5376 7381 98092
16127 13486 9350 9220 76036 14219 5144 2831 17920 11347 17142 11264
7667 7762 15099 9110 10482 97556 3569 3670
Zimmermann Telegram
By aurther Zimmermann,
Foreign Secretary of the German Empire, 1917
Prateek Sharma
Cryptography
Cryptography
The art/ science of devising ciphers.
Cryptanalysis
The art/ science of breaking the ciphers.
Cryptology
Both cryptography & cryptanalysis are collectively known as cryptology.
Encryption
The sender transforms the original information to another form &
sends the resulting unintelligible message out over the network.
Decryption
Reverses the encryption process in order to transform the message
back to its original form.
Annotation:
The study & practice of encryption is called the science of Cryptography (US)/
Cryptology (Netherland).
Both encryption & decryption are processes.
Cryptology ( cryptography & cryptanalysis) is an art/ science.
The Encryption Model
Passive Active
intruder Intruder intruder
just listens can alter
msg.
Encryption Decryption
method/ Cipher method/
Plaintext, text Plaintext,
algorithm algorithm
P P
C = EK(P)
Encryption Decryption
Key Key
Notational relation b/w plaintext, cipher text & keys
DK {EK (P)}=P
Where,
P = plaintext
C = cipher text obtained by encrypting plain text, C = EK(P)
EK (P) = Encryption of plaintext P using key K.
DK (P) = Decryption of the cipher text.
Conventional
Public Key
Methods
Methods
Encryption/
Decryption
Methods
Character Level Bit Level
Encryption Encryption (2)
(1)
Mono- alphabetic Encoding/
Conventional Encryption
Decoding
Public Key
Algorithm Methods
Methods
Poly- alphabetic
Permutation
Encryption
Algorithm
X-OR
Bit Level RSA
Encryption Encryption
Rotation
Mono- alphabetic Encryption Algorithm
Sender Receiver
KE = 3 KD = 3
DEAR Add GHDU Subtract DEAR
Plaintext KE Cipher text KD Plaintext
Encryption Decryption
Algorithm Algorithm
Poly- alphabetic Encryption Algorithm
Sender Receiver
KE = Position KD = Position
DEAR Add EGDV Subtract DEAR
Plaintext KE Cipher text KD Plaintext
Encryption Decryption
Algorithm Algorithm
Transpositional Encryption
KE = KD
Encryption 1 2 3 4 5 6 Decryption
6 4 2 3 1 5
1 2 3 4 5 6 1 2 3 4 5 6 1 2 3 4 5 6
A T R U E U T R E A A T R U E
F R I E N D N I E R D F F R I E N D
2 X 4 Decoder 4 X 2 Encoder
1 1 0 0 0 1 1 1 0 1 0 1 1 1
Straight Permutation Compressed Permutation Expanded Permutation
P- Boxes: Permutation units which can easily be made as H/w circuits with internal wiring.
Substitution (S- Boxes)
2 X 4 Decoder
Substitution of n bits by
another n bits can be achieved
using a combination of P-Boxes,
encoders, & decoders.
P- box
Input Output
00 01 S- box
01 00
10 11 4 X 2 Encoder
11 10
Product
P- boxes
A product is a S- boxes
combination of
P- boxes & S- boxes
P- boxes
S- boxes
Exclusive OR
0 1 1 0 0 1 1 1 8– bit plaintext
Sender 1 1 0 1 1 0 0 1 Key
1 0 1 1 1 1 1 0 8– bit cipher text
Transposition
...
Swapping
Complex
Complex
Complex
Cipher
Plain Text
Text
64 bits 64 bits
1 2 3 17 18 19
The algorithm encrypts 64 bit plaintext using 56 bit key.
Steps 2 & 17 are very complex. Each step is a combination of transposition,
substitution , swapping, X- OR, & rotation.
Public Key Encryption (RSA- Rivest, Shamir, Aldeman)
Customer 1
Public Key
Private Key
Customer 2
Public Key
..
Customer n
.. Bank
Public Key Each user has same encryption algo. & key.
The decryption algo. & key are kept secret.
Limitations of Conventional Methods
Sender Receiver
KE = 3 KD = 3
DEAR Add GHDU Subtract DEAR
Plaintext KE Cipher text KD Plaintext
Encryption Decryption
Algorithm Algorithm
Anyone who knows the encryption algorithm & key can deduct the decryption
algorithm, e.g. reasoning questions in various examinations.
Anyone can encrypt information, but only an authorized receiver can decrypt it.
Applications of Cryptography
Defense.
Diplomatic corps.
Diarists.
Lovers.
Security of ATM cards.
Computer passwords.
Electronic commerce.
Framing reasoning questions.
Enjoy the scenic beauty at Joox Islands…
Joox Islands…
If
ABCDEFGHIJKLMNOPQRSTUVWXYZ
Is
ZYXWVUTSRQPONMLKJIHGFEDCBA
Then,
X I B K G LT I Z K S B
leads to
Fortifying Network Securities
Thank You