Вы находитесь на странице: 1из 16

CRYPTOGR APHY

-A guide to Salvation

What is cryptography?
Hiding information encryption and Decryption Uses mathematical, computer science, and engineering concepts Applications - ATM cards, computer passwords, and electronic commerce

Why is there a need for cryptography?


Authentication: The process of proving one's identity. (The primary forms of host-to-host authentication on the Internet today are namebased or address-based, both of which are notoriously weak.) Privacy/confidentiality: Ensuring that no one can read the message except the intended receiver. Integrity: Assuring the receiver that the received message has not been altered in any way from the original. Non-repudiation: A mechanism to prove that the sender really sent this message.

THREE TYPES OF CRYPTOGRAPHIC ALGORITHMS

Some of the techniques of cryptography:


Classic cryptography - Transposition ciphers,Substitution ciphers, Invisible ink, Microdots,Digital watermarks, Scytale, Enigma machine. The computer era - Information theory, Computational complexity, Statistics, Combinatorics, Abstract algebra, Number theory, and Finite mathematics.

Need for a new technique


Due to the security pitfalls in the earlier techniques. as a result of Attacks Against Cryptographic Designs over Attacks Against Passwords due to Attacks Against Trust Models by cause of Attacks on the Users

Methods or suggestions to the problem of code breaking:


Analysis and design of secure, fast and practical encryption algorithms. Construction and analysis of block ciphers. Coordinate sequences and stream ciphers. Provably secure systems. The cryptanalysis of cipher primitives using message-passing algorithms.

Methods or suggestions to the problem of code breaking: (contd.)


Design of hash functions in particular by using coding theory. Construction and analysis of message authentication codes (MACs). Design of authentication codes using coding theory. Analysis of stream ciphers using sequences and coding theory. Quantum coding and cryptology.

Methods or suggestions to the problem of code breaking: (contd.)


Using error-correcting codes for digital fingerprinting, watermarking, and copyright protection. Network security and secure multiparty computation using codes on graphs. Security in wireless networks.

MAIN ASPECTS FOR CONSIDERATION

Eliptic Curves Quantum cryptography Hash function

ELIPTIC CURVES
y2 = x3 + ax + b The set of points on an elliptic curve forms a group under a certain addition rule the Elliptic Curve Discrete Logarithm Problem (ECDLP) Difficult to crack mathematical concept combine number theory and algebraic geometry An elliptic curve consists of the set of real numbers (x, y) that satisfies the above equation

QUANTUM CRYPTOGRAPHY
Quantum key distribution Fundamental aspect of quantum mechanics Uses the concepts of  Quantum Superpositions  Quantum entanglement  and transmitting information  Relies on the computational difficulty of certain mathematical functions  Only Used to produce and distribute a key, not to transmit any message data

HASH FUNCTION
converts a large, possibly variable-sized amount of data into a small datum used to speed up table lookup or data comparison tasks finding items in a database, detecting duplicated or similar records in a large file, finding similar stretches in DNA sequences Although the idea was conceived in the 1950s, the design of good hash functions is still a topic of active research.

CONCLUSION:
Because of the need for  Authentication  Privacy/confidentiality  Integrity  Non-repudiation Cryptography plays a vital role by providing all the above benifits and comforts thus i hereby conclude this paper with my suggestion for the lateral improvement.

Upshot of my research:
destroy the source (with out leaving any traces of the technique used) as soon as the encrypted data is created,by this way easy cracking of the cipher by the piracy lovers can be escaped. Have to continuously change the encryption and decryption techniques by implementing the advanced technology

T#@^1< \!0u

A Paper presentation 8 \!, Pr@$#@^t# EEE 1st Yr

Вам также может понравиться