Вы находитесь на странице: 1из 24

Seminar Presented by Pankaj sharma

(kuk. University)

Cryptography
Cryptography is Nothing New

Cryptography is the art of "secret writing".


Cryptography was used in ancient times. Cryptography was used in both sides of the revolutionary war. Cryptography has been featured in may mystery stories, including Sherlock Holmes.

Cryptography
What is Cryptography

Cryptography is a process of communications. Cryptography takes something readable and makes it unreadable. Cryptography is reversible in a controlled manner.

Cryptography does NOT destroy information.

Cryptography
Cryptography is More Important Now Than Ever

Computers and networks are getting faster and faster.


Connectivity and access are improving and increasing. Companies now exist which require the net for their very survival.

Individuals are relying on the net for more and more personal, professional, and commercial activities.
There is real value on the net in content, communications, and commerce.

Cryptography
Threats in the Digital World

Criminals will attack systems for financial gain. Criminals will use systems for financial gain. Privacy violations by marketeers, criminals, and government agencies. Identity theft threatens your reputation and your ability to prove who you say you are.

Cryptography
The Adversaries

Crackers Insiders The Press Lone Criminals Organized Crime

Industrial Espionage Agents


International Espionage Agents

Terrorists
National Intelligence Government Agencies

Cryptography
Cryptography to protect our networks Cryptography to protect our commerce Cryptography to protect our communications Cryptography to protect our files

Cryptography to protect our filesystems Cryptography to protect our identify

Cryptography
Cryptography Can Do Some Really Cool Stuff

It can protect your privacy It can protect your


communications It can protect your property It can protect your systems It can authenticate It can authorize

It can validate It stops a lot of lying and cheating

TYPES OF CRYPTOGRAPHIC ALGORITHMS


Secret Key Cryptography: Uses a single key for both
encryption and decryption

Public Key Cryptography: Uses one key for encryption


and another for decryption

Hash Functions: Uses a mathematical transformation to


irreversibly "encrypt" information

WHAT IS SECRET KEY CRYPTOGRAPHY ?

Secret Key Cryptography - Types


stream ciphers :Stream ciphers operate on
a single bit (byte or computer word) at a time, and implement some form of feedback mechanism so that the key is constantly changing. block ciphers :the scheme encrypts one block of data at a time using the same key on each block.

stream ciphers
Stream ciphers come in several flavors but two are worth mentioning here :

Self-synchronizing stream ciphers calculate each


bit in the keystream as a function of the previous n bits in the keystream

Synchronous stream ciphers generate the

keystream in a fashion independent of the message stream but by using the same keystream generation function at sender and receiver.

Block ciphers
Block ciphers can operate in one of several modes; the following four are the most important:

Electronic Codebook (ECB) mode : Cipher Block Chaining (CBC) mode : Cipher Feedback (CFB) mode : Output Feedback (OFB) mode

Cryptography
Symmetric Key Cryptographic Algorithms

DES
TripleDes Blowfish

IDEA
Cast RC4 RC5 TwoFish

WHAT IS PUBLIC KEY CRYPTOGRAPHY ?

Cryptography
Public Key Cryptographic Algorithms

RSA Diffie-Hellman Elliptic curve

Hash Functions
some sense, use no key . Among the most common hash functions in use today in commercial cryptographic applications are: MD2 (RFC 1319) MD4 (RFC 1320) MD5 (RFC 1321) The Secure Hash Algorithm (SHA) ,in particular, the SHA-1

Hash functions, also called message digests and one-way encryption, are algorithms that, in

Why Three Encryption Techniques?

Hash functions : for data integrity


Secret-key cryptography: ideally suited
to encrypting messages

public-key cryptography : for Key exchange

hybrid cryptography

digital envelope digital signature

Cryptography
Future Directions

Crypto Smart Cards Crypto Ring Processors

Java Rings Distributed crypto crackers S/MIME Cracking Screen Savers


"Chinese Television" crypto crackers Low cost Beowolf supercomputers

Cryptography
Summary

There are a large number of tools for cryptography available on Linux. Most are not well integrated into the operating systems and applications. Most require some effort and some knowlege to use. They are, however, just tools. How they are used or abused is up to the end user.

A Parting Thought

"If you think cryptography can solve your problem, then you don't understand your problem and you don't understand cryptography."

******* THE END ********

Вам также может понравиться