Вы находитесь на странице: 1из 23

WELCOME

TO
THE WORLD OF
SECRET
COMMUNICATION
INDEX
•What Is Cryptography
•Cryptography-A Few Terms
•Who Uses Cryptography
•History Of Cryptography
•Types Of Ciphers
•Substitution Cipher
•Reciprocal Cipher
•Symmetric Cipher
•Asymmetric Cipher
•Steganography
•Key And it’s Types
•Possible Types Of Attacks
•Advantages Of Cryptography
•Disadvantages Of Cryptography
•Conclusion
WHAT IS
CRYPTOGRAPHY?

It is the art of achieving


security by encoding
messages to make them non
readable.
The process or skill of
communicating in or
deciphering secret writings or
ciphers.
CRYPTOGRAPHY-A FEW TERMS

 Plaintext
 The initial unencrypted (unscrambled) data to be
communicated.
 Example: “dr partha pratim das”
 Ciphertext
 Plaintext is encrypted (scrambled) into something
unintelligible – ciphertext for communication
 Example: “es qbsuib qsbujn ebt”
 Encryption
 The process of converting ordinary information (plaintext)
into ciphertext.
 Decryption
 The reverse process of moving from unintelligible
ciphertext to plaintext.
CRYPTOGRAPHY – A FEW TERMS

 Cipher
 Pair of algorithms performing encryption & decryption.
 Key
 A secret parameter for the cipher algorithm.
 Key Management
 Management of generation, exchange, storage, safeguarding,
use, vetting, and replacement of keys.
 Provisions in
 Cryptosystem design,

 Cryptographic protocols in that design,

 User procedures, and so on.

 Crypto Analysis / Code Breaking


 The study of how to circumvent the confidentiality sought by
using encryption.
Who Uses Cryptography
•Governments.
•Spies.
•Banks.
•Credit Card Companies.
•Secure web browsers.

Why Use Cryptography


•It values our privacy.
•Ensures-
Identification.
Authentication.
Signature.
HISTORY OF CRYPTOGRAPHY

There were many different forms of


cryptography used in early days. They
are as follows:-
1.Caesar’s Alphabet
For example, plain text is:
ABCDEFGHIJKLMNOPQRSTUVWXYZ
can be written in cipher as follows:
DEFGHIJKLMNOPQRSTUVWXYZABC
where every letter is shifted by 3 letters to the left.
2.Enigma.
3.Data Encryption Standard (DES).
TYPES OF CIPHERS

Ciphers

Substitution Reciprocal Symmetric Asymmetric


SUBSTITUTION
CIPHER
•It is very simple.
•It switches one letter for another
throughout the length of a message.
•It can be classified in to:
1.Caesar Cipher.
2.Homophonic Cipher.
3.Mono-alphabetic Cipher.
4.Polygram Cipher.
5.Polyalphabetic Cipher.
RECIPROCAL CIPHER

• In this system if plain text can be converted in to cipher


text, similarily cipher text can be converted in to plain
in the same system.

• It is a form of cryptographic suicide.


• It makes cipher half as difficult to break.

• It is used in enigma.
SYMMETRIC CIPHER

• It uses the same key for encryption or


decryption.
• It secures the key.
• It is no less secure than asymmetric ciphers.
• In general for n persons the no of lock and key
pairs is n*(n-1)/2.
ASYMMETRIC CIPHER

• It is also known as split key cipher.


• Each key here has a dual purpose.
• The recipient has to send lock and his public key to the
sender. The sender uses these to apply the lock and
sends the sealed contents to the recipient.
• Since the recipient possess his private key,so only he
can open it.
STEGANOGRAPHY

• It is a technique that facilitates hiding of a message


that is to be kept secret inside other messages.
• It results in the concealment of secret message itself.
• For example ,the sender uses methods such as invisible
ink, tiny pin pictures on specific characters, graphic
image with hidden secret message.
Key and It’s Types
•The actual value of the key is a challenge for
the attacker. Its value can range from a
number between 0 and 100 billion.
•There are two types of keys. They are:
1.Public Key.
2.Private Key.

How Keys Are Used


• Securing message data.
• Signing a message.
PKC: MULTIPLICATION VS
FACTORIZATION

• It is easy to multiply two primes:


o 3 * 5 =15
o 17 * 23 =391
o 101 * 223 =22523

• It is difficult to factorize into two primes:


o 35 = 5*7
o 551 = 19*29
o 24503 = 107*229

Heart Of RSA
POSSIBLE TYPES OF ATTACKS

• Cipher text only attack.


• Known plain text attack.
• Chosen plain text attack.
Advantages Of Cryptography
•Secure nature of the private key.
•Secure technique of signature
authorization.

Disadvantages of Cryptography
•Transmission of very large documents is
prohibitive.

•The key sizes must be significantly larger


than symmetric cryptography to achieve the
same level of protection.

•Public key cryptography is susceptible to


impersonation attacks.
CONCLUSION
•To make Communication secure is not the only use of
cryptography.

•A controversial topic called “digital rights


management” could benefit from digital
signatures.It therefore could be argued
as an important topic in today’s digital
age.
ACKNOWLEDGEMENT

We are thankful to the teacher who has given us this


project. We have gathered a lot of technical
knowledge by doing this project.
We are thankful to the teacher who has helped
us in completing the project .We hope that this kind
of projects will be given to us again .
BIBLIOGRAPHY

• “Cryptography and Network Security” by Atul


Kahate.
• www.cryptography.com
GROUP MEMBERS

• Sangita Majumdar (CS-37)


• Pooja Dave (CS-13)
• Sanchayita Bhowmik (CS-36)
• Nuzhat Saba Ali (CS-42)
THANK YOU

Вам также может понравиться