You are on page 1of 12

1

Cryptography & Digital


Signature

By
Sreekanth .A
MBA IB
2

Netprog: Cryptgraphy

What is cryptography?

Cryptography is the science of using


mathematics to encrypt and decrypt data.

Cryptography enables you to store sensitive


information or transmit it across insecure
networks (like the Internet) so that it
cannot be read by anyone except the
intended recipient.
3

Netprog: Cryptgraphy

Conventional cryptography

Plain Text Encryption Cipher text Decryption Plain Text


4

Netprog: Cryptgraphy

Basics of Cryptography

1.Transpositions -- Rearranging

2.Substitutions -- Replacing
5

Netprog: Cryptgraphy

Crptographic Systems

• Caesar’s Cipher

• Digital Ciphers
Example (S. Singh, The Code Book, 1999)
• Ciphertext
• PCQ VMJYPD LBYK LYSO KBXBJXWXV BXV ZCJPO EYPD
KBXBJYUXJ LBJOO KCPK. CP LBO LBCMKXPV XPV IYJKL
PYDBL, QBOP KBO BXV OPVOV LBO LXRO CI SX'XJMI, KBO
JCKO XPV EYKKOV LBO DJCMPV ZOICJO BYS, KXUYPD:
'DJOXL EYPD, ICJ X LBCMKXPV XPV CPO PYDBLK Y BXNO
ZOOP JOACMPLYPD LC UCM LBO IXZROK CI FXKL XDOK XPV
LBO RODOPVK CI XPAYOPL EYPDK. SXU Y SXEO KC ZCRV XK
LC AJXNO X IXNCMJ CI UCMJ SXGOKLU?'
OFYRCDMO, LXROK IJCS LBO LBCMKXPV XPV CPO PYDBLK

Any Guesses???

Cryptography

6
Frequency Analysis
• Identyfying comon letters, digrams and trigrams...
• PCQ VMJYPD LBYK LYSO KBXBJXWXV BXV ZCJPO EYPD KBXBJYUXJ
LBJOO KCPK. CP LBO LBCMKXPV XPV IYJKL PYDBL, QBOP KBO BXV
OPVOV LBO LXRO CI SX'XJMI, KBO JCKO XPV EYKKOV LBO DJCMPV
ZOICJO BYS, KXUYPD: 'DJOXL EYPD, X LBCMKXPV XPV CPO PYDBLK Y
BXNO ZOOP JOACMPLYPD LC UCM LBO IXZROK CI FXKL XDOK XPV
LBO RODOPVK CI XPAYOPL EYPDK. SXU Y SXEO KC ZCRV XK LC
AJXNO X IXNCMJ CI UCMJ SXGOKLU?'
OFYRCDMO, LXROK IJCS LBO LBCMKXPV XPV CPO PYDBLK
• First guess: LBO is THE

7
Frequency Analysis
• Assuming LBO represents THE we replace L with T, B with H,
and O with E and get
• PCQ VMJYPD THYK TYSE KHXHJXWXV HXV ZCJPE EYPD
KHXHJYUXJ THJEE KCPK. CP THE THCMKXPV XPV IYJKT PYDHT,
QHEP KHO HXV EPVEV THE LXRE CI SX'XJMI, KHE JCKE XPV
EYKKOV THE DJCMPV ZEICJE HYS, KXUYPD: 'DJEXT EYPD, ICJ X
LHCMKXPV XPV CPE PYDHLK Y HXNE ZEEP JEACMPTYPD TC UCM
THE
IXZREK CI FXKL XDEK XPV THE REDEPVK CI XPAYEPT EYPDK. SXU Y
SXEE KC ZCRV XK TC AJXNE X IXNCMJ CI UCMJ SXGEKTU?'
EFYRCDME, TXREK IJCS THE LHCMKXPV XPV CPE PYDBTK
• More guesses…?

8
• Code
X ZAV O I D BYG E R S PC F H J K LM N Q T U W
ABCDEFGHIJK LMNOPQRSTUVWXYZ

• Plaintext Now during this time Shahrazad had borne King


Shahriyar three sons. On the thousand and first night, when
she had ended the tale of Ma'aruf, she rose and kissed the
ground before him, saying: 'Great King, for a thousand and
one nights I have been recounting to you the fables of past
ages and the legends of ancient kings. May I make so bold as
to crave a favour of your majesty?’ Epilogue, Tales from the
Thousand and One Nights

9
Digital Signature
• Digital signatures enable the recipient of
information to verify the authenticity of the
information’s origin, and also verify that the
information is intact.

A digital signature serves the same purpose as


a handwritten signature.

10
Application
• Protect stored data

• Global System of Mobiles (GSM)

• Virtual Private Network (VPN)

• Secure Socket Layer (SSL)

11
THANK YOU

12

You might also like