Professional Documents
Culture Documents
Presented by
U.Haritha
07AT1A1225
IV-II, IT
haritha1225@yahoo.com
9494610086
Abstract on security in general, and better
understand how to reduce and
Substitution cipher:
Plaintext letter A B C D
What is Cryptography?
EFGHIJKLMNOPQRSTUV
The word “cryptography” is
WXYZ
derived from Greek and when literally
Cipher text letter Q W E R
translated, means “secret writing.” The
TYUIOPASDFGHJKLZXC
study of enciphering and encoding (on
VBNM
the sending end), and decoding (on the
You can construct a secret message
receiving end) is called cryptography.
from the above table. Relative
Although the distinction is fuzzy,
substitutions can be done. So, the
ciphers are different from codes. When
message “ Meet me after school behind
you mix up or substitute existing letters,
the gym,” would read
you are using a cipher.
“DTTZ DT QYZTK
Encryption refers to the
LEIGGS WTIOFR ZIT UND.”
transformation of data in “plain text”
Five letters are customary in the spy
form into a form called “cipher
biz, so your message comes out like
text,” .The recovery of plain text
this:
requires the key, and this process is
DTTZD TQYZT KLEIG
known as decryption. This key is
GSWTI OFRZI TUNDM
meant to be secret information and the
Transposition cipher: Text chosen in
privacy of the text depends on the
one form can be enciphered choosing a
cryptographic strength of the key.
different route. To decipher, you fill the
Ciphers are broken into two main
in box following the zigzag route and
categories, substitution ciphers and
read the message using the spiral route.
transposition ciphers. Substitution
The cipher text becomes:
ciphers replace letters in the plaintext
with other letters or symbols, keeping
the order in which the symbols fall the
same. Transposition ciphers keep all
Secret key cryptography is sometimes
referred to as symmetric cryptography
or conventional cryptography. If
sender and receiver agree on a shared
secret key, then by using secret key
cryptography we can send messages to
one another on a medium that can be
tapped, without worrying about
EAMTN FTDIE EHOTE
eavesdroppers. All we need to do is
RHMEM BYESC GLOHO
have the sender encrypt the messages
Types of Cryptography: and the receiver decrypt them using the
There are three types of cryptographic key. An eavesdropper will only see
algorithms: unintelligible data. Some of the secret
1. Secret Key Cryptography. key cryptography algorithms are - DES,
2. Public Key Cryptography. 3-DES, blowfish, IDEA, AES, RC2,
3. Hash Algorithms. RC4, RC5, ECB etc.
Secret Key Cryptography: Advantages of Secret Key
Secret key cryptography Cryptography:
involves the use of single key. Given a o Very fast relative to public key
message (Plain text) and the key, cryptography.
encryption produces cipher text, which o Considered secure, provided the key
is about the same length as the plain is relatively strong.
text was. Decryption is the reverse of o The cipher text is compact (i.e.,
encryption, and uses the same key as encryption does not add excess
encryption. “Baggage” to the cipher text).
Encryption o Widely used and very popular.
Plain text ------------------> cipher Disadvantages of Secret Key
text Cryptography:
Key
o The administration of the keys can
Cipher text------------------> become extremely complicated.
plain text
Decryption
o A large number of keys are needed Public key
to communicate securely with a large
group of People. Private key
o The key is subject to interception by
hackers. Cipherkey
--------------------------------> plain
Public Key Cryptography: text
Decryption
Public key cryptography sometimes
also referred to as asymmetric Public key cryptography can do
cryptography. The public key need not anything secret key cryptography can
be kept secret, and, in fact, may be do like- transmitting the data over an
widely available, only its authenticity is insecure channel, secure storage on
required to guarantee that A is indeed insecure media, authentication purposes
the only party who knows the co- and digital signatures. Some Public key
responding private key. A primary cryptography algorithms are RSA,
advantage of such systems is that Elliptic Curve Cryptography (ECC),
providing authentic public keys is ElGamal, DH, DSA/DSS etc.
generally easier than distributing secret
keys securely, as required in symmetric Advantages of Public key
key systems. The main objective of Cryptography:
public-key encryption is to provide o Considered very secure, and easy to
privacy or confidentiality. Public-key configure these systems.
encryption schemes are typically o No form of secret sharing is
substantially slower than symmetric-key required, thus reducing key
encryption algorithms such as DES. administration to a Minimum.
The private key and the public key are o Supports non-repudiation.
mathematically linked. o The number of keys managed by
each user is much less compared to
Encryption secret key Cryptography.
Plain text---------------------------------> Disadvantages of Public key
cipher text Cryptography:
o Much slower compared to secret Message fingerprint: We can know
key cryptography. whether some data stored has been
o The cipher text is much larger than modified from one day to the next,
the plaintext, relative to secret key if we save that data structure with a
Cryptography. hash function. We can compare the
hash function data structure with
the message on the message data. If
Hash Algorithms:
the message digest has not
Hash algorithms are also known changed, you can be sure that none
as message digests or one-way of the data is changed.
transformations. A cryptographic hash Digital Signatures: can be efficiently
function is a mathematical implemented using hash functions.
transformation that takes a message of Implementation Issues
arbitrary length and computes from it a Key Size:
fixed length number. This has major role for amount of
The following things can be done using security. If the algorithm is inherently
hash algorithms. strong, then it can be assumed that the
Password Hashing: When a user types larger the key size for the ciphers, the
a password, the system must store the harder it is for a hacker to perform an
password encrypted because someone attack on the cipher text. But, larger
else can use it. To avoid this problem keys lead to lower levels of
hashing is used. When a password is performance. Thus there are, trade-offs,
supplied, it computes the password hash which are traditionally made between
and compares it with the stored value if the level of security and other factors,
they match; the password is taken to be like performance.
correct. Hybrid Systems:
Message Integrity: Cryptographic hash Just one crypto-system will not
functions can be used to protect the solve every problem. Most systems in
integrity of a message transmitted over use today employ a hybrid system.
insecure media.
Conclusion:
Everyone has a different idea of
what ``security'' is, and what levels of
risk are acceptable. It's important to Cryptography is evergreen and
build systems and networks in such a developments in this area are a better
way that the user is not constantly option.
reminded of the security system around
him. As and when new security References:
methods are developed, breaking of
these methods has increased. So
measures have to be taken to fill the
loopholes, of which cryptography has
and is playing a major role.
o Douglas R.Stinson.
Cryptography: theory and
practice: 2nd edition
o A.Menezes, P.van Oorschot and
S.Vanstone: Handbook of
Applied Cryptography.
o Smith, Laurence Dwight.
Cryptography, the Science of
Secret Writing.
o Speciner, M. Perlman, R:
Network security, Englewood
Cliffs, NJ
o William Stallings:
Cryptography and Network
security: principles and
practice: 2nd edition.
o J.P. Holbrook, J.K. Reynolds.
``Site Security Handbook.''