Presentation
on
Cryptography
Submitted to: Er. Parveen Garg
(Lect. in CSE & IT Deptt.)
Submitted by:
Monika Sharma
1606048
CSE-6th Sem.
Cryptography
Cryptography is Nothing New
Cryptography is the art of "secret writing".
Cryptography was used in ancient times.
Cryptography was used in both sides of the
revolutionary war.
Cryptography has been featured in may
mystery stories, including Sherlock Holmes.
Cryptography
What is Cryptography
Cryptography is a process of communications.
Cryptography takes something readable and makes it
unreadable.
Cryptography is reversible in a controlled manner.
Cryptography does NOT destroy information.
Cryptography
Cryptography is More Important Now Than Ever
Computers and networks are getting faster and faster.
Connectivity and access are improving and
increasing.
Companies now exist which require the net for their
very survival.
Individuals are relying on the net for more and more
personal, professional, and commercial activities.
There is real value on the net in content,
communications, and commerce.
Cryptography
Threats in the Digital World
Criminals will attack systems for financial gain.
Criminals will use systems for financial gain.
Privacy violations by marketeers, criminals, and
government agencies.
Identity theft threatens your reputation and your
ability to prove who you say you are.
Cryptography
The Adversaries
Crackers
Insiders
The Press
Lone Criminals
Organized Crime
Industrial Espionage Agents
International Espionage Agents
Terrorists
National Intelligence
Government Agencies
Cryptography
Cryptography to protect our networks
Cryptography to protect our commerce
Cryptography to protect our communications
Cryptography to protect our files
Cryptography to protect our filesystems
Cryptography to protect our identify
Cryptography
Cryptography Can Do Some Really Cool Stuff
It can protect your privacy
It can protect your
communications
It can protect your property
It can protect your systems
It can authenticate
It can authorize
It can validate
It stops a lot of lying and cheating
TYPES OF CRYPTOGRAPHIC
ALGORITHMS
• Secret Key Cryptography: Uses a single key for both
encryption and decryption
• Public Key Cryptography: Uses one key for encryption
and another for decryption
• Hash Functions: Uses a mathematical transformation to
irreversibly "encrypt" information
WHAT IS SECRET KEY
CRYPTOGRAPHY ?
Secret Key Cryptography - Types
• stream ciphers :Stream ciphers operate on
a single bit (byte or computer word) at a
time, and implement some form of
feedback mechanism so that the key is
constantly changing.
• block ciphers :the scheme encrypts one
block of data at a time using the same key
on each block.
stream ciphers
Stream ciphers come in several flavors but two are
worth mentioning here :
• Self-synchronizing stream ciphers calculate each
bit in the keystream as a function of the previous n
bits in the keystream
• Synchronous stream ciphers generate the
keystream in a fashion independent of the message
stream but by using the same keystream
generation function at sender and receiver.
Block ciphers
Block ciphers can operate in one of several
modes; the following four are the most
important:
• Electronic Codebook (ECB) mode :
• Cipher Block Chaining (CBC) mode :
• Cipher Feedback (CFB) mode :
• Output Feedback (OFB) mode
Cryptography
Symmetric Key Cryptographic Algorithms
DES
Triple-Des
Blowfish
IDEA
Cast
RC4
RC5
TwoFish
WHAT IS PUBLIC KEY
CRYPTOGRAPHY ?
Cryptography
Public Key Cryptographic Algorithms
RSA
Diffie-Hellman
Elliptic curve
Hash Functions
Hash functions, also called message digests and
one-way encryption, are algorithms that, in some
sense, use no key .
Among the most common hash functions in use
today in commercial cryptographic applications
are:
• MD2 (RFC 1319)
• MD4 (RFC 1320)
• MD5 (RFC 1321)
• The Secure Hash Algorithm (SHA) ,in
particular, the SHA-1
Why Three Encryption Techniques?
• Hash functions : for data integrity
• Secret-key cryptography: ideally suited
to encrypting messages
• public-key cryptography : for Key exchange
Cryptography
Future Directions
Crypto Smart Cards
Crypto Ring Processors
Java Rings
Distributed crypto crackers
S/MIME Cracking Screen Savers
"Chinese Television" crypto crackers
Low cost Beowolf supercomputers
******* THE END ********