0% found this document useful (0 votes)
3 views13 pages

cryptography

Cryptography is the practice of secure communication techniques that ensure data confidentiality, integrity, and authentication. It includes both secret-key (symmetric) and public-key (asymmetric) cryptosystems, each with its own key distribution challenges. Certificate authorities play a crucial role in verifying public keys, ensuring trust in digital communications.

Uploaded by

SACHIN
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views13 pages

cryptography

Cryptography is the practice of secure communication techniques that ensure data confidentiality, integrity, and authentication. It includes both secret-key (symmetric) and public-key (asymmetric) cryptosystems, each with its own key distribution challenges. Certificate authorities play a crucial role in verifying public keys, ensuring trust in digital communications.

Uploaded by

SACHIN
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 13

INTRODUCTION TO

CRYPTOGRAPHY
WHAT IS CRYPTOGRAPHY?
Practice and study of techniques for secure communication in the
presence of third parties called adversaries
Modern cryptography includes
 data confidentiality
 data integrity
 authentication
 etc.

Cryptography prior to the modern age was effectively synonymous


with encryption
 conversion of information from a readable state to apparent nonsense
ENCRYPTION AND
DECRYPTION
SUBSTITUTION CIPHER
One simple example of encryption/decryption
CRYPTOSYSTEM (CIPHER)
TYPES OF CRYPTOSYSTEMS
Secret-key cryptosystem Public-key cryptosystem
 Symmetric system  Asymmetric system
 Same key is used for both  A pair of keys
encryption  Public key
and decryption  Private key
 Key has to be kept secret  Private key needs to be kept secret
SECRET-KEY (SYMMETRIC)
CRYPTOSYSTEMS
KEY DISTRIBUTION PROBLEM
A lot of keys among
users
 Each pair of uses needs
a unique key

How to send a key to


the other
 Key needs to be plain
text
PUBLIC-KEY (ASYMMETRIC)
CRYPTOSYSTEM
KEY DISTRIBUTION IN
PUBLIC-KEY CRYPTOSYSTEM
Alice says to Bob
 “Hi Bob, could you send me your public key?”

Bob replies back to Alice


 “Here you go. The attached is my public key.”

Alice receives the public key of Bob and starts sending messages to Bob
 Messages are encrypted by Bob’s public key

Bob uses the corresponding private key to decrypt the messages

Any concerns?
 How can Alice make sure that the received key is indeed the public key of Bob?
CERTIFICATE AUTHORITY
A certificate authority or certification authority (CA) is an entity that
issues digital certificates
A digital certificate certifies the ownership of a public key by the
named subject of the certificate
A CA acts as a trusted third party—trusted both by the subject
(owner) of the certificate and by the party relying upon the
certificate
Format of these certificates is specified by the X.509 standard
Top 5 CAs as of May 2018
 IdenTrust, Comodo, DigiCert, GoDaddy, GlobalSign
PROCEDURE OF OBTAINING
A PUBLIC KEY CERTIFICATE
HOW TO OBTAIN THE PUBLIC
KEYS OF CAS
Public keys are embedded in root certificates
Root certificates are contained in the release of operating systems
(and their updates) and the trustable web browsers (and their
updates)

You might also like