SlideShare a Scribd company logo
Cryptography
BY-NISHANT BANSAL
11112030
Cryptography.ppt
Overview
๏ต Basic Definitions
๏ต History of Cryptography
๏ต Cipher Types
๏ต Cryptography Methods
๏ต Common Types of Attacks
Definitions -
๏ต Cryptology
๏ต Cryptography
๏ต Cryptanalysis
๏ต Steganography
๏ต Cryptosystem
Cryptography is everywhere
๏ต Secure communication:
โ€“web traffic: HTTPS
โ€“wireless traffic: 802.11i WPA2 (and WEP), GSM, Bluetooth
๏ต Encrypting files on disk: EFS, TrueCrypt
๏ต Content protection (e.g. DVD, Blu-ray): CSS, AACS
๏ต User authentication
โ€ฆ and much much more
History of Cryptography
๏ต The first known evidence of the use of cryptography (in some form)
was found in an inscription carved around 1900 BC, in the main
chamber of the tomb of the nobleman Khnumhotep II, in Egypt.
๏ต Around 400 B.C., the Spartans used a system of encrypting
information by writing a message on a sheet of papyrus.
๏ต Around 100 B.C., Julius Caesar was known to use a form
of encryption to convey secret messages to his army generals
posted in the war front.
๏ต During the 16th century, Vigenere designed a cipher that was
supposedly the first cipher which used an encryption key.
๏ต At the start of the 19th century when everything became
electric, Hebern designed an electro-mechanical contraption
which was called the Hebern rotor machine.
๏ต The Engima machine was invented by German engineer Arthur
Scherbius at the end of World War I, and was heavily used by the
German forces during the Second World War.
๏ต IBM in early 1970s designed a cipher called Lucifer. Lucifer was
eventually accepted by NIST and was called DES or the Data
Encryption Standard.
๏ต In 2000, NIST accepted Rijndael, and named it as AES or the
Advanced Encryption Standard.
Ciphers
In cryptography, a cipher is an algorithm for performing encryption or
decryptionโ€”a series of well-defined steps that can be followed as a
procedure. An alternative, less common term is encipherment.
Answer: WELCOME
Stream cipher
๏ต A Stream Cipher is a secret-key encryption algorithm that encrypts a
single bit at a time. With a Stream Cipher, the same plaintext bit or byte
will encrypt to a different bit or byte every time it is encrypted.
๏ต e.g. :
Plain text: Pay 100
Binary of plain text: 010111101 (hypothetical)
Key: 100101011 ----- Perform XOR
____________________
Cipher text 110010110 ----- ZTU9^%D
๏ต To decrypt make the XOR operation of the cipher text with the key .
Block cipher
๏ต Block cipher technique involves encryption of one block of text at a
time .Decryption also takes one block of encrypted text at a time.
Length of the block is usually 64 or 128 bits.
e.g. :
Plain text: four and five
Four and five
Key Key Key
wvfa ast wvfa --- cipher text
Public Key Cryptosystem
๏ต Public key cryptography is a scheme that uses a Pair of keys for
encryption: a Public key, which encrypts data, and a corresponding
Private key (secret key) for decryption.
CRYPTOGRAPHY METHODS
๏ต Symmetric
๏ต Same key for encryption and decryption
๏ต Key distribution problem
๏ต Asymmetric
๏ต Key pairs for encryption and decryption
๏ต Public and private keys
Symmetric Algorithm
๏ต It is also called as Secret Key Cryptography
๏ต Single key used for both encrypt & decrypt
๏ต Key must be known to both the parties
Encryption Decryption
Key
Plaintext Ciphertext
Original
Plaintext
Symmetric
Cryptosystem
Symmetric Algorithm
๏ต Data Encryption Standard (DES):
56 bits key
๏ต Advance Encryption Standard (AES):
128, 192 or 256 bits key
๏ต International Data Encryption Algorithm(IDEA):
128 bits key
Asymmetric Algorithm
๏ต Private keys are used for decrypting.
๏ต Public keys are used for encrypting
encryption
plaintext ciphertext
public key
decryption
ciphertext plaintext
private key
Hybrid cryptosystem
๏ต A hybrid cryptosystem can be constructed using any two separate cryptosystems:
๏ฑ a key encapsulation scheme, which is a public-key cryptosystem,
๏ฑ a data encapsulation scheme, which is a symmetric-key cryptosystem.
COMMON TYPES OF ATTACKS
Brute force
๏ต Trying all key values in the keyspace.
Chosen Ciphertext
๏ต Decrypt known ciphertext to discover key.
Dictionary Attack
๏ต Find plaintext based on common words.
Frequency Analysis
๏ต Guess values based on frequency of occurrence.
References
๏ต An introduction to cryptography and cryptanalysis
-Edward Schaefer,Santa Clara University
๏ต http://en.wikipedia.org/wiki/History_of_cryptography
๏ต https://securityblog.redhat.com/2013/08/14/a-brief-history-of-
cryptography/
๏ต Contemporary Cryptography - Rolf Oppliger
๏ต Cryptography Theory And Practice - Douglas Stinson
๏ต Modern Cryptography Theory and Practice - Wenbo Mao
One must acknowledge with cryptography no
amount of violence will ever solve a math problem
โ€• Jacob Appelbaum, Cypherpunks: Freedom and the Future of the Internet
Ad

More Related Content

What's hot (20)

Cryptography
CryptographyCryptography
Cryptography
Kalyani Government Engineering College
ย 
Cryptography
CryptographyCryptography
Cryptography
subodh pawar
ย 
6. cryptography
6. cryptography6. cryptography
6. cryptography
7wounders
ย 
Public Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithmPublic Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithm
Indra97065
ย 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
Seema Goel
ย 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
Gopal Sakarkar
ย 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
Pa Van Tanku
ย 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
Rashmi Burugupalli
ย 
Diffie-hellman algorithm
Diffie-hellman algorithmDiffie-hellman algorithm
Diffie-hellman algorithm
Computer_ at_home
ย 
Cryptography
CryptographyCryptography
Cryptography
Rutuja Solkar
ย 
Cryptography
CryptographyCryptography
Cryptography
Shivanand Arur
ย 
Cryptography
CryptographyCryptography
Cryptography
prasham95
ย 
Rsa cryptosystem
Rsa cryptosystemRsa cryptosystem
Rsa cryptosystem
Abhishek Gautam
ย 
Intro to modern cryptography
Intro to modern cryptographyIntro to modern cryptography
Intro to modern cryptography
zahid-mian
ย 
cryptography
cryptographycryptography
cryptography
Abhijeet Singh
ย 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
Sathish Kumar
ย 
Symmetric and Asymmetric Encryption
Symmetric and Asymmetric EncryptionSymmetric and Asymmetric Encryption
Symmetric and Asymmetric Encryption
RapidSSLOnline.com
ย 
cryptography ppt free download
cryptography ppt free downloadcryptography ppt free download
cryptography ppt free download
Twinkal Harsora
ย 
Cipher techniques
Cipher techniquesCipher techniques
Cipher techniques
Mohd Arif
ย 
Key Management and Distribution
Key Management and DistributionKey Management and Distribution
Key Management and Distribution
Syed Bahadur Shah
ย 
Cryptography
CryptographyCryptography
Cryptography
subodh pawar
ย 
6. cryptography
6. cryptography6. cryptography
6. cryptography
7wounders
ย 
Public Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithmPublic Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithm
Indra97065
ย 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
Seema Goel
ย 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
Gopal Sakarkar
ย 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
Pa Van Tanku
ย 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
Rashmi Burugupalli
ย 
Diffie-hellman algorithm
Diffie-hellman algorithmDiffie-hellman algorithm
Diffie-hellman algorithm
Computer_ at_home
ย 
Cryptography
CryptographyCryptography
Cryptography
Rutuja Solkar
ย 
Cryptography
CryptographyCryptography
Cryptography
prasham95
ย 
Rsa cryptosystem
Rsa cryptosystemRsa cryptosystem
Rsa cryptosystem
Abhishek Gautam
ย 
Intro to modern cryptography
Intro to modern cryptographyIntro to modern cryptography
Intro to modern cryptography
zahid-mian
ย 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
Sathish Kumar
ย 
Symmetric and Asymmetric Encryption
Symmetric and Asymmetric EncryptionSymmetric and Asymmetric Encryption
Symmetric and Asymmetric Encryption
RapidSSLOnline.com
ย 
cryptography ppt free download
cryptography ppt free downloadcryptography ppt free download
cryptography ppt free download
Twinkal Harsora
ย 
Cipher techniques
Cipher techniquesCipher techniques
Cipher techniques
Mohd Arif
ย 
Key Management and Distribution
Key Management and DistributionKey Management and Distribution
Key Management and Distribution
Syed Bahadur Shah
ย 

Viewers also liked (19)

Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
patisa
ย 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
Adam Reagan
ย 
types of network
types of networktypes of network
types of network
Zenobia Sukhia
ย 
Types of computer network
Types of computer networkTypes of computer network
Types of computer network
Amit Shaw
ย 
Virtual manufacturing
Virtual manufacturingVirtual manufacturing
Virtual manufacturing
Anurag Chaudhary
ย 
Thesis presentation
Thesis presentationThesis presentation
Thesis presentation
Sanaullah Shimul
ย 
Smartplug ppt
Smartplug pptSmartplug ppt
Smartplug ppt
Agniv Mukherjee
ย 
Lessons from Software for Synthetic Biology
Lessons from Software for Synthetic BiologyLessons from Software for Synthetic Biology
Lessons from Software for Synthetic Biology
Tim O'Reilly
ย 
artificial neural network
artificial neural networkartificial neural network
artificial neural network
Pallavi Yadav
ย 
Cryptography
CryptographyCryptography
Cryptography
gueste4c97e
ย 
Cryptography and E-Commerce
Cryptography and E-CommerceCryptography and E-Commerce
Cryptography and E-Commerce
Hiep Luong
ย 
How does rotary heat machine work on fabric
How does rotary heat machine work on fabricHow does rotary heat machine work on fabric
How does rotary heat machine work on fabric
Fei Yue Paper Industrial Co.,Ltd.
ย 
NEURAL Network Design Training
NEURAL Network Design  TrainingNEURAL Network Design  Training
NEURAL Network Design Training
ESCOM
ย 
Analysis and applications of artificial neural networks
Analysis and applications of artificial neural networksAnalysis and applications of artificial neural networks
Analysis and applications of artificial neural networks
Snehil Rastogi
ย 
Micromachining Technology Seminar Presentation
Micromachining Technology Seminar PresentationMicromachining Technology Seminar Presentation
Micromachining Technology Seminar Presentation
Orange Slides
ย 
Sublimation vs Digital Printing By Sukhvir Sabharwal
Sublimation vs Digital Printing By Sukhvir SabharwalSublimation vs Digital Printing By Sukhvir Sabharwal
Sublimation vs Digital Printing By Sukhvir Sabharwal
Sukhvir Sabharwal
ย 
Laser Assisted Micro Machining (lamm)
Laser Assisted Micro Machining (lamm)Laser Assisted Micro Machining (lamm)
Laser Assisted Micro Machining (lamm)
Pratik Gandhi
ย 
IBA Admission - Mystery Revealed (Infographics)
IBA Admission - Mystery Revealed (Infographics)IBA Admission - Mystery Revealed (Infographics)
IBA Admission - Mystery Revealed (Infographics)
Ayman Sadiq
ย 
Artificial intelligence NEURAL NETWORKS
Artificial intelligence NEURAL NETWORKSArtificial intelligence NEURAL NETWORKS
Artificial intelligence NEURAL NETWORKS
REHMAT ULLAH
ย 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
patisa
ย 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
Adam Reagan
ย 
types of network
types of networktypes of network
types of network
Zenobia Sukhia
ย 
Types of computer network
Types of computer networkTypes of computer network
Types of computer network
Amit Shaw
ย 
Virtual manufacturing
Virtual manufacturingVirtual manufacturing
Virtual manufacturing
Anurag Chaudhary
ย 
Thesis presentation
Thesis presentationThesis presentation
Thesis presentation
Sanaullah Shimul
ย 
Lessons from Software for Synthetic Biology
Lessons from Software for Synthetic BiologyLessons from Software for Synthetic Biology
Lessons from Software for Synthetic Biology
Tim O'Reilly
ย 
artificial neural network
artificial neural networkartificial neural network
artificial neural network
Pallavi Yadav
ย 
Cryptography
CryptographyCryptography
Cryptography
gueste4c97e
ย 
Cryptography and E-Commerce
Cryptography and E-CommerceCryptography and E-Commerce
Cryptography and E-Commerce
Hiep Luong
ย 
NEURAL Network Design Training
NEURAL Network Design  TrainingNEURAL Network Design  Training
NEURAL Network Design Training
ESCOM
ย 
Analysis and applications of artificial neural networks
Analysis and applications of artificial neural networksAnalysis and applications of artificial neural networks
Analysis and applications of artificial neural networks
Snehil Rastogi
ย 
Micromachining Technology Seminar Presentation
Micromachining Technology Seminar PresentationMicromachining Technology Seminar Presentation
Micromachining Technology Seminar Presentation
Orange Slides
ย 
Sublimation vs Digital Printing By Sukhvir Sabharwal
Sublimation vs Digital Printing By Sukhvir SabharwalSublimation vs Digital Printing By Sukhvir Sabharwal
Sublimation vs Digital Printing By Sukhvir Sabharwal
Sukhvir Sabharwal
ย 
Laser Assisted Micro Machining (lamm)
Laser Assisted Micro Machining (lamm)Laser Assisted Micro Machining (lamm)
Laser Assisted Micro Machining (lamm)
Pratik Gandhi
ย 
IBA Admission - Mystery Revealed (Infographics)
IBA Admission - Mystery Revealed (Infographics)IBA Admission - Mystery Revealed (Infographics)
IBA Admission - Mystery Revealed (Infographics)
Ayman Sadiq
ย 
Artificial intelligence NEURAL NETWORKS
Artificial intelligence NEURAL NETWORKSArtificial intelligence NEURAL NETWORKS
Artificial intelligence NEURAL NETWORKS
REHMAT ULLAH
ย 
Ad

Similar to Cryptography.ppt (20)

Cryptography
CryptographyCryptography
Cryptography
Rohan04
ย 
Overview Of Cryptography
Overview Of CryptographyOverview Of Cryptography
Overview Of Cryptography
Manjarul Hoque
ย 
Ch12 Encryption
Ch12 EncryptionCh12 Encryption
Ch12 Encryption
phanleson
ย 
Cryptography Intro
Cryptography IntroCryptography Intro
Cryptography Intro
Christopher Martin
ย 
Introduction To PKI Technology
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI Technology
Sylvain Maret
ย 
Data encryption
Data encryptionData encryption
Data encryption
Balvant Biradar
ย 
Cryptography
CryptographyCryptography
Cryptography
Shafique Rehman
ย 
Pavan
PavanPavan
Pavan
pavan kumar
ย 
Cryptography
CryptographyCryptography
Cryptography
Shray Jali
ย 
Cryptography - A Brief History
Cryptography - A Brief HistoryCryptography - A Brief History
Cryptography - A Brief History
prasenjeetd
ย 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
Nagendra Um
ย 
Cryptography 130919084510-phpapp02(2)
Cryptography 130919084510-phpapp02(2)Cryptography 130919084510-phpapp02(2)
Cryptography 130919084510-phpapp02(2)
Vidyadhar Vijju
ย 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
AdityaShukla141
ย 
crypto-105058445051058480051448005540405
crypto-105058445051058480051448005540405crypto-105058445051058480051448005540405
crypto-105058445051058480051448005540405
ukd789555
ย 
Cryptography
CryptographyCryptography
Cryptography
Pratiksha Patil
ย 
Day5
Day5Day5
Day5
Jai4uk
ย 
Ch11 Basic Cryptography
Ch11 Basic CryptographyCh11 Basic Cryptography
Ch11 Basic Cryptography
Information Technology
ย 
What is Encryption
What is EncryptionWhat is Encryption
What is Encryption
Israel Marcus
ย 
Iss lecture 2
Iss lecture 2Iss lecture 2
Iss lecture 2
Ali Habeeb
ย 
DataMotion-IG1-TheEvolutionofEncryption
DataMotion-IG1-TheEvolutionofEncryptionDataMotion-IG1-TheEvolutionofEncryption
DataMotion-IG1-TheEvolutionofEncryption
Clint Walker
ย 
Cryptography
CryptographyCryptography
Cryptography
Rohan04
ย 
Overview Of Cryptography
Overview Of CryptographyOverview Of Cryptography
Overview Of Cryptography
Manjarul Hoque
ย 
Ch12 Encryption
Ch12 EncryptionCh12 Encryption
Ch12 Encryption
phanleson
ย 
Introduction To PKI Technology
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI Technology
Sylvain Maret
ย 
Data encryption
Data encryptionData encryption
Data encryption
Balvant Biradar
ย 
Cryptography
CryptographyCryptography
Cryptography
Shray Jali
ย 
Cryptography - A Brief History
Cryptography - A Brief HistoryCryptography - A Brief History
Cryptography - A Brief History
prasenjeetd
ย 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
Nagendra Um
ย 
Cryptography 130919084510-phpapp02(2)
Cryptography 130919084510-phpapp02(2)Cryptography 130919084510-phpapp02(2)
Cryptography 130919084510-phpapp02(2)
Vidyadhar Vijju
ย 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
AdityaShukla141
ย 
crypto-105058445051058480051448005540405
crypto-105058445051058480051448005540405crypto-105058445051058480051448005540405
crypto-105058445051058480051448005540405
ukd789555
ย 
Day5
Day5Day5
Day5
Jai4uk
ย 
What is Encryption
What is EncryptionWhat is Encryption
What is Encryption
Israel Marcus
ย 
Iss lecture 2
Iss lecture 2Iss lecture 2
Iss lecture 2
Ali Habeeb
ย 
DataMotion-IG1-TheEvolutionofEncryption
DataMotion-IG1-TheEvolutionofEncryptionDataMotion-IG1-TheEvolutionofEncryption
DataMotion-IG1-TheEvolutionofEncryption
Clint Walker
ย 
Ad

Recently uploaded (20)

Rusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond SparkRusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond Spark
carlyakerly1
ย 
Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
ย 
TrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business ConsultingTrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business Consulting
Trs Labs
ย 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
ย 
AI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global TrendsAI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global Trends
InData Labs
ย 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
ย 
Generative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in BusinessGenerative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in Business
Dr. Tathagat Varma
ย 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
ย 
Heap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and DeletionHeap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and Deletion
Jaydeep Kale
ย 
How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?
Daniel Lehner
ย 
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Impelsys Inc.
ย 
Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
ย 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
ย 
AI Changes Everything โ€“ Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything โ€“ Talk at Cardiff Metropolitan University, 29th April 2...AI Changes Everything โ€“ Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything โ€“ Talk at Cardiff Metropolitan University, 29th April 2...
Alan Dix
ย 
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxIncreasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Anoop Ashok
ย 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
ย 
Linux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdfLinux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdf
RHCSA Guru
ย 
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Aqusag Technologies
ย 
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
SOFTTECHHUB
ย 
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfComplete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Software Company
ย 
Rusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond SparkRusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond Spark
carlyakerly1
ย 
Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
ย 
TrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business ConsultingTrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business Consulting
Trs Labs
ย 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
ย 
AI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global TrendsAI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global Trends
InData Labs
ย 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
ย 
Generative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in BusinessGenerative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in Business
Dr. Tathagat Varma
ย 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
ย 
Heap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and DeletionHeap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and Deletion
Jaydeep Kale
ย 
How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?
Daniel Lehner
ย 
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Impelsys Inc.
ย 
Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
ย 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
ย 
AI Changes Everything โ€“ Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything โ€“ Talk at Cardiff Metropolitan University, 29th April 2...AI Changes Everything โ€“ Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything โ€“ Talk at Cardiff Metropolitan University, 29th April 2...
Alan Dix
ย 
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxIncreasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Anoop Ashok
ย 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
ย 
Linux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdfLinux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdf
RHCSA Guru
ย 
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Aqusag Technologies
ย 
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
SOFTTECHHUB
ย 
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfComplete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Software Company
ย 

Cryptography.ppt

  • 3. Overview ๏ต Basic Definitions ๏ต History of Cryptography ๏ต Cipher Types ๏ต Cryptography Methods ๏ต Common Types of Attacks
  • 4. Definitions - ๏ต Cryptology ๏ต Cryptography ๏ต Cryptanalysis ๏ต Steganography ๏ต Cryptosystem
  • 5. Cryptography is everywhere ๏ต Secure communication: โ€“web traffic: HTTPS โ€“wireless traffic: 802.11i WPA2 (and WEP), GSM, Bluetooth ๏ต Encrypting files on disk: EFS, TrueCrypt ๏ต Content protection (e.g. DVD, Blu-ray): CSS, AACS ๏ต User authentication โ€ฆ and much much more
  • 6. History of Cryptography ๏ต The first known evidence of the use of cryptography (in some form) was found in an inscription carved around 1900 BC, in the main chamber of the tomb of the nobleman Khnumhotep II, in Egypt. ๏ต Around 400 B.C., the Spartans used a system of encrypting information by writing a message on a sheet of papyrus. ๏ต Around 100 B.C., Julius Caesar was known to use a form of encryption to convey secret messages to his army generals posted in the war front.
  • 7. ๏ต During the 16th century, Vigenere designed a cipher that was supposedly the first cipher which used an encryption key. ๏ต At the start of the 19th century when everything became electric, Hebern designed an electro-mechanical contraption which was called the Hebern rotor machine.
  • 8. ๏ต The Engima machine was invented by German engineer Arthur Scherbius at the end of World War I, and was heavily used by the German forces during the Second World War.
  • 9. ๏ต IBM in early 1970s designed a cipher called Lucifer. Lucifer was eventually accepted by NIST and was called DES or the Data Encryption Standard. ๏ต In 2000, NIST accepted Rijndael, and named it as AES or the Advanced Encryption Standard.
  • 10. Ciphers In cryptography, a cipher is an algorithm for performing encryption or decryptionโ€”a series of well-defined steps that can be followed as a procedure. An alternative, less common term is encipherment.
  • 12. Stream cipher ๏ต A Stream Cipher is a secret-key encryption algorithm that encrypts a single bit at a time. With a Stream Cipher, the same plaintext bit or byte will encrypt to a different bit or byte every time it is encrypted. ๏ต e.g. : Plain text: Pay 100 Binary of plain text: 010111101 (hypothetical) Key: 100101011 ----- Perform XOR ____________________ Cipher text 110010110 ----- ZTU9^%D ๏ต To decrypt make the XOR operation of the cipher text with the key .
  • 13. Block cipher ๏ต Block cipher technique involves encryption of one block of text at a time .Decryption also takes one block of encrypted text at a time. Length of the block is usually 64 or 128 bits. e.g. : Plain text: four and five Four and five Key Key Key wvfa ast wvfa --- cipher text
  • 14. Public Key Cryptosystem ๏ต Public key cryptography is a scheme that uses a Pair of keys for encryption: a Public key, which encrypts data, and a corresponding Private key (secret key) for decryption.
  • 15. CRYPTOGRAPHY METHODS ๏ต Symmetric ๏ต Same key for encryption and decryption ๏ต Key distribution problem ๏ต Asymmetric ๏ต Key pairs for encryption and decryption ๏ต Public and private keys
  • 16. Symmetric Algorithm ๏ต It is also called as Secret Key Cryptography ๏ต Single key used for both encrypt & decrypt ๏ต Key must be known to both the parties Encryption Decryption Key Plaintext Ciphertext Original Plaintext Symmetric Cryptosystem
  • 17. Symmetric Algorithm ๏ต Data Encryption Standard (DES): 56 bits key ๏ต Advance Encryption Standard (AES): 128, 192 or 256 bits key ๏ต International Data Encryption Algorithm(IDEA): 128 bits key
  • 18. Asymmetric Algorithm ๏ต Private keys are used for decrypting. ๏ต Public keys are used for encrypting encryption plaintext ciphertext public key decryption ciphertext plaintext private key
  • 19. Hybrid cryptosystem ๏ต A hybrid cryptosystem can be constructed using any two separate cryptosystems: ๏ฑ a key encapsulation scheme, which is a public-key cryptosystem, ๏ฑ a data encapsulation scheme, which is a symmetric-key cryptosystem.
  • 20. COMMON TYPES OF ATTACKS Brute force ๏ต Trying all key values in the keyspace. Chosen Ciphertext ๏ต Decrypt known ciphertext to discover key. Dictionary Attack ๏ต Find plaintext based on common words. Frequency Analysis ๏ต Guess values based on frequency of occurrence.
  • 21. References ๏ต An introduction to cryptography and cryptanalysis -Edward Schaefer,Santa Clara University ๏ต http://en.wikipedia.org/wiki/History_of_cryptography ๏ต https://securityblog.redhat.com/2013/08/14/a-brief-history-of- cryptography/ ๏ต Contemporary Cryptography - Rolf Oppliger ๏ต Cryptography Theory And Practice - Douglas Stinson ๏ต Modern Cryptography Theory and Practice - Wenbo Mao
  • 22. One must acknowledge with cryptography no amount of violence will ever solve a math problem โ€• Jacob Appelbaum, Cypherpunks: Freedom and the Future of the Internet

Editor's Notes

  • #12: The Pigpen cipher (sometimes called the Masonic cipher or Freemason's cipher) is a simple substitution cipher exchanging letters for symbols based on a grid (or the "pigpen") surrounding it.