Вы находитесь на странице: 1из 42

Submitted by :-

Ashish Harkare (08020541124)


Chetan Bhardwaj (08020541129)
Gaurav Wadhwa (08020541127)
Kartikya Pande (08020541128)
Samridhi Singla (08020541126)

1
Introduction
 Originated from the greek words,
Kryptos and Graphos

 The first known use of this technique by


Julius caesar

2
What is Cryptography?
 Cryptography is the science of using mathematics to
encrypt and decrypt data.It enables you to store
sensitive information or transmit it across insecure
networks (like the Internet) so that it cannot be read by
anyone except the intended receiver.

 It is used in applications present in technological


advanced societies eg. Security of ATM cards,
computer passwords and e-commerce.

 Cryptanalysis is the source of analyzing and breaking


secure communication.

3
Encryption and Decryption
 Plaintext or clear text.
 Cipher
 Key
 Encryption
 Ciphertext
 Decryption

4
How does Cryptography
work?

Netprog: Cryptgraphy 5
Why Cryptography?
The main use of cryptography is to provide
the following :
(1) Privacy or confidentiality

(2) Data integrity

(3) Authentication

(4) Non-repudiation.
6
Secret Key Cryptography
( Symmetric cryptography)

• Single key used to encrypt and decrypt.

• Key must be known by both parties.

• Assuming we live in a hostile


environment , it may be hard to share a
secret key.

7
Secret Key Cryptography
( Symmetric cryptography)

8
Advantage of Symmetric
Cryptography
 The encryption process is simple

 Each trading partner can use the same publicly


known encryption algorithm - no need to develop
and exchange secret algorithms

 Security is dependent on the length of the key


Disadvantage
 If a user has n trading partners, then n secret keys
must be maintained, one for each trading partner

 Authenticity of origin or receipt cannot be proved


because the secret key is shared

 Management of the symmetric keys becomes


problematic
Problems with Management
of Symmetric Keys
 Partners must always use the exact
same key to decrypt the encrypted
message
 key exchange is difficult because the
exchange itself must be secure with no
intervening compromise of the key
 management of keys is difficult as
numbers of trading partners increases,
especially when multiple keys exist for
each trading partner
Public Key Cryptography -
Solution for Managing Symmetric
Keys
 public key cryptography simplifies the
management of symmetric keys to the point
whereby a symmetric key can be used not
only for each trading partner, but for each
exchange between trading partners
 additionally, public key cryptography can be
used to unambiguously establish non-
repudiation of origin and receipt
Public Key Cryptography
( Asymmetric cryptography)

• Relatively new field - 1975

• Each entity has 2 keys:


private key (a secret)
public key (well known).

13
Using Keys
• Private keys are used for decrypting.
• Public keys are used for encrypting.

encryption
plaintext ciphertext
public key

decryption
ciphertext plaintext
private key

14
Asymmetric Key Uses
 confidentiality
 digitalsignatures
 both uses depend on the association of
a key pair with one, and only one owner
of the keys
 both uses depend on one of the keys in
the key pair being secret from everyone
but the owner of the key
Real World Usage of
Asymmetric Encryption
 public key encryption algorithms are
considerably slower than symmetric key
algorithms
 rarely used as encryption methodology for
bulk messages or parts of messages
 normally used in conjunction with a
Message Integrity Check (MIC) or to encrypt
a symmetric key, where the MIC or
symmetric key is what is encrypted using
public key encryption algorithms
disadvantage
 software encryption using DES (symmetric key
algorithm) is 100 times faster than software
encryption using RSA (asymmetric key
algorithm) - estimate provided by RSA Data
Securities
 hardware encryption using DES (symmetric
key algorithm) is anywhere from 1,000 to
10,000 times faster than hardware encryption
using RSA (asymmetric key algorithm)
Digital Signature
• Public key cryptography is also used to
provide digital signatures.

signing
plaintext signed message
private key

verification
signed message plaintext
public key

18
Transmitting over an insecure
channel.
Alice wants to send Bob a private message.

Apublic is Alice’s public key.


Aprivate is Alice’s private key.
Bpublic is Bob’s public key.
Bprivate is Bob’s private key.

19
Hello Bob,
Wanna get together?

Alice Bob

encrypt using Bpublic decrypt using Bprivate

20
OK Alice,
Your place or mine?

Alice Bob

decrypt using Aprivate encrypt using Apublic

21
Bob’s Dilemma
• Nobody can read the message from
Alice, but anyone could produce it.
• How does Bob know that the message
was really sent from Alice?

• Bob may be comforted to know that only


Alice can read his reply.

22
Alice can sign her
message!
• Alice can create a digital signature and
prove she sent the message (or
someone with knowledge of her private
key).
• The signature can be a message digest
encrypted with Aprivate.

23
Message Digest
• Also known as “hash function” or “one-
way transformation”.
• Transforms a message of any length
and computes a fixed length string.
• We want it to be hard to guess.

24
Message Digest

25
Alice’s Signature
• Alice feeds her original message through a
hash function and encrypts the message
digest with Aprivate.
• Bob can decrypt the message digest using
Apublic.
• Bob can compute the message digest
himself.
• If the 2 message digests are identical, Bob
knows Alice sent the message.

26
Revised Scheme

Alice Bob

Sign with Aprivate check signature using Apublic

encrypt using Bpublic decrypt using Bprivate

27
Why the digest?
• Alice could just encrypt her name, and
then Bob could decrypt it with Apublic.

• Why wouldn’t this be sufficient?

28
Implications
• Suppose Alice denies she sent the
message?

• Bob can prove that only someone with


Alice’s key could have produced the
message.

29
Another possible problem
• Suppose Bill receives a message from Alice
including a digital signature.
“meet me at the library tonight”

• Bill sends the same message to Joe so that it


looks like the message came from Alice.
• Bill includes the digital signature from the
message Alice sent to him.
• Joe is convinced Alice sent the message!

30
Solution?
• Always start your messages with:
Dear Bill,

• Create a digest from the encrypted


message and sign that digest.

• There are many other schemes as well.

31
Speed
• Secret key encryption/decryption
algorithms are much faster than public
key algorithms.
• Many times a combination is used:
use public key cryptography to share a
secret key.
use the secret key to encrypt the bulk of the
communication.

32
Secure Protocols
• There are a growing number of
applications for secure protocols:
email
electronic commerce
electronic voting
homework submission

33
Secure Protocols
• Many application protocols include the
use of cryptography as part of the
application level protocol.
The cryptographic scheme employed is part
of the protocol.
If stronger cryptographic tools become
available we need to change the protocol.

34
SSL and TLS
• Secure Sockets Layer (SSL) is a
different approach - a new layer is
added that provides a secure channel
over a TCP only link.

• TLS is Transport Layer Security (IETF


standard based on SSL).

35
SSL and TLS
• Transport Layer Security (TLS)
Protocol and its predecessor, Secure
Sockets Layer (SSL), are cryptographic
protocols that provide security and data
integrity for communications over
TCP/IP networks such as the Internet

36
SSL layer
Application Application
SSL SSL
TCP TCP
IP IP

37
Advantages of SSL/TLS
• Independent of application layer

• Includes support for negotiated


encryption techniques.
easy to add new techniques.

• applications like web browsing,


electronic mail, Internet faxing, instant
messaging and voice-over-IP (VoIP

38
HTTPS Usage
• HTTPS is HTTP running over SSL.
used for most secure web transactions.
HTTPS server usually runs on port 443.
Include notion of verification of server via a
certificate.
Central trusted source of certificates.

39
Common Symmetric Key
Algorithms
 Data Encryption Standard - DES
 Triple DES
 RC2 and RC5
 IDEA
Data Encryption Standard -
DES
 most widely used commercial encryption
algorithm
 in the public domain, available to all
 a U. S. government encryption standard
 security is known and is dependent solely
on the key length
 data sequenced into 64 bit blocks prior to
encryption, each block encrypted
Triple DES
 variant on DES which encrypts message
3 times with 2 independent 56 bit keys
 effective key length is 112 bits
 brute force attack on Triple DES is not
feasible

Вам также может понравиться