Cryptography Week4 Part1
Cryptography Week4 Part1
Content
Introduction to Cryptography
Key Cryptographic Concepts
Symmetric vs. Asymmetric Encryption
Overview of hashing functions and applications
Difference between encryption and hashing
Ciphers
Practical: Exercise on Basic Encryption and Decryption
Introduction to Cryptography
Cryptography is the practice of using mathematics and computers to create
secret code that can only be unlocked with a unique digital key. The original
is called ciphertext
Decryption: Decryption is the process of converting encrypted data into a
encrypt and decrypt data. It's also known as "private key" encryption because
the key must be kept private. Symmetric encryption is often used for high-
volume data processing because it's faster and more efficient than other
two keys, a public key and a private key. It's also known as public key
which uses a single secret key to both encrypt and decrypt information.
Differences between symmetric and
asymmetric Encryption
Symmetric Encryption:
Uses the same key for both encryption and decryption.
Faster and simpler, but key management can be challenging.
Examples: AES (Advanced Encryption Standard), DES (Data Encryption
Standard).
Asymmetric Encryption:
Uses a pair of keys: a public key for encryption and a private key for decryption.
Ensures secure communication even if the encryption key (public key) is shared
openly.
Examples: RSA (Rivest-Shamir-Adleman), ECC (Elliptic Curve Cryptography).
Hash Functions
A hash function is a mathematical algorithm that converts a variable number
Applications
i. Password Storage
hashing is a one-way process that takes an input (or message) and generates a
irreversible here is no way to retrieve the original data from the hash.
Ciphers
Ciphers, also called encryption algorithms, are systems for encrypting and
decrypting data. A cipher converts the original message, called plaintext, into
Types of Ciphers
Transposition cipher
Caesar cipher
Substitution cipher
Affine cipher
Hill cipher
Personal research : find the meaning of these types of ciphers and how they work
Practical: Exercise on Basic Encryption
and Decryption
Objective:
Understand encryption and decryption through simple ciphers like the Caesar
Cipher.
Exercise: Caesar Cipher
1. Encryption:
1. Shift each letter of the plain text by a fixed number of positions in the alphabet.
2. Example:
1. Plain Text: HELLO
2. Key: 3
3. Ciphertext: KHOOR
Decryption:
• Reverse the shift to retrieve the original text.
• Example:
• Ciphertext: KHOOR
• Key: 3
• Plain Text: HELLO
Conclusion
In conclusion, cryptography forms the backbone of modern cybersecurity,