Module 1 and 3 Cryptography 1
Module 1 and 3 Cryptography 1
Introduction to Cryptography
Symmetric Asymmetric
Cryptography Cryptography
: :
Example:
Key word: AES Example: Key word: RSA
SSL/TLS for
(Advanced Online (Rivest-
web security
Encryption banking Shamir-
(e.g., Google,
Standard) transactions Adleman)
Amazon)
History of Encryption
Evolution of Encryption:
Strengths:
Weaknesses:
ns of military
communications.
teaching cryptography.
• Vigenère Cipher:
• Key words:
Keyword-based
multiple Caesar
shifts
• Example: "HELLO" →
"RIJVS" (Keyword:
"KEY")
• Weakness:
Vulnerable to
frequency analysis
Real-World Applications of Cryptography
Encrypted
Online Banking Messaging Blockchain and
and E- Apps Cryptocurrency
commerce: (WhatsApp, :
Signal):
• Key word: AES • Key word: End- • Key word: ECC
for data to-end for digital
encryption encryption signatures
• Example: (AES, RSA) • Example:
Securing • Example: Bitcoin
transactions Protecting transactions
and login personal
credentials communicatio
ns
Cryptography Evolution:
Parallel encryption
Advantages:
Simple implementation
Prone to cryptanalysis
Disadvantages: Identical blocks produce identical
ciphertext
ECB: SIMPLE, WEAK CBC: SECURE, NOT CFB: BIT-LEVEL OFB: ERROR- CTR: FAST,
AGAINST ATTACKS PARALLELIZABLE ENCRYPTION, ERROR- RESISTANT, REQUIRES
PRONE VULNERABLE TO SYNCHRONIZATION
MODIFICATION
Stream Cipher and Block Cipher
Data Encryption Standard
Initial and Final Permutation
Round Function
Expansion Permutation Box
The S-box rule is illustrated below
Straight Permutation − The 32 bit output of S-boxes is then subjected to the straight
shown in the following illustration:
Key Generation
Simplicity and Speed
Symmetric Encryption
Advantages
Widespread Adoption
of DES
Foundation for Future
Algorithms
Well-Studied and Analyzed
Short Key Length (Vulnerable to Brute-
Force Attacks)
Disadvantag
Outdated
es of DES
Vulnerable to Differential and Linear
Cryptanalysis
Legacy Systems
Advanced Encryption Standard
(AES)
• AES is a symmetric encryption algorithm widely used for
securing sensitive data. It is a block cipher that
operates on fixed-size blocks of data (128 bits) using
keys of size 128, 192, or 256 bits.
Flexibility
Widely Adopted
Parallel
Processing
Disadvantage Key
s of AES Management
Fixed Block
Vulnerability to
Side-Channel
Attacks
RSA ALGORITHM
Perform encryption for the plain text 20 using RSA
Algorithm with the values p=5, q=11, 13 as the public key
Security of
RSA