Professional Documents
Culture Documents
Cryptography Fundamentals
Cryptography
• Is the science of hiding information. The practice
of it is thought to be nearly as old as the written
word.
• Cryptography comes from the Greek words:
• “kryptos” = meaning hidden and
• “graphein” = meaning to write
• Translating to “hidden writing”
Cryptography Fundamentals
bla-bla
ciphertext
msg
decoder (ciphertext in
encoder - plaintext out)
(plaintext in - bla-bla
cmb-cmb
ciphertext out)
eavesdropper
(should understand
nothing about the msg)
Terminologies
• Plaintext – The original message
Cryptography Fundamentals
Terminologies
Cryptography Fundamentals
Ciphers
Original Encrypted
Cipher
Information Information
Cryptography Fundamentals
Steganography
• Is an alternative cipher process that hides
information by enclosing it in another file such as
a graphic, movie, or sound file
Cryptography Fundamentals
Steganography
• Steganographic techniques include:
– Hiding information within images.
– Invisibly altering the structure of a digital image.
Secret Data
Cryptography Fundamentals
Keys
• An encryption key is a specific piece of
information that is used in conjunction with
an algorithm to perform encryption and
decryption
Cryptography Fundamentals
Keys
= Two
Letters
Following
Cryptography Fundamentals
Hashing
Cryptography Fundamentals
Hashing
• Is a one-way encryption that transforms
cleartext into ciphertext that is not intended
to be decrypted.
Cryptography Fundamentals
Hashing (uses)
• Hashing is used in a number of password
authentication schemes.
• A hash value can be embedded in an
electronic message to support data integrity
• A hash of a file can be used to verify the
integrity of that file after transfer
Cryptography Fundamentals
Hashing Algorithms
• MD5 (Message Digest 5) – produces 128-bit
message digest
• SHA (Secure Hash Algorithm) – modeled after
MD5, stronger than the former, produces 160-
bit hash
Encrypts Decrypts
Data Data
Cryptography Fundamentals
Asymmetric Encryption
• Is using public and private keys
• Public key - is given to anyone as the message
is to be delivered through the internet or any
means of transportation
Cryptography Fundamentals
Types of Ciphers
• Caesar Cipher
• Atbash Cipher
• Baconian Cipher
• Polybius Square
Cryptography Fundamentals
Caesar Cipher
• One of the earliest known and simplest
ciphers
• Is named after Julius Caesar who allegedly
used it to protect messages of military
significance
• E(x) = (x + k) mod 26
1 2 3 4 5 6 7 8 9 1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6
• Example: k= 1
• Plaintext:
defend the east wall of the castle
• Ciphertext:
efgfoe uif fbtu xbmm pg uif dbtumf
Cryptography Fundamentals – Types of Ciphers
Caesar Cipher (cont.)
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
1 2 3 4 5 6 7 8 9 1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6
• Example: k= 7
• Plaintext:
Black clover
• Ciphertext:
Ishjr jsvcly
Cryptography Fundamentals – Types of Ciphers
Atbash Cipher
• Is an ancient encryption system created in the
Middle East.
• Example:
• Plaintext: money
• Ciphertext: nlmvb
Plaintext: Insertion
Cryptography Fundamentals
End of Module
References
CompTIA Security+ (Exam SY0-401)