[go: up one dir, main page]

0% found this document useful (0 votes)
15 views64 pages

Cryptography: Ciphers & Algorithms Guide

The document discusses various cryptographic algorithms and concepts including symmetric and asymmetric ciphers, hashing, digital signatures, and key exchange protocols. It covers algorithms like AES, DES, RSA, Diffie-Hellman, and algorithms modes of operation and how to implement cryptography using APIs.

Uploaded by

ashifa2030
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views64 pages

Cryptography: Ciphers & Algorithms Guide

The document discusses various cryptographic algorithms and concepts including symmetric and asymmetric ciphers, hashing, digital signatures, and key exchange protocols. It covers algorithms like AES, DES, RSA, Diffie-Hellman, and algorithms modes of operation and how to implement cryptography using APIs.

Uploaded by

ashifa2030
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 64

Devising is the act of planning, inventing

(Subsitution Cipher)

1
AES, DES

Columnar Transposition Cipher

Rijndeal cipher
Rijndael is a family of ciphers that encrypt and decrypt data in 128-bit blocks.
The name Rijndael comes from the names of its Belgian creators, Joan Daemen and Vincent Rijmen.

2
Security through obscurity is a controversial principle that equates “secrecy” with “security.”

3
4
5
6
7
8
doo·uh·bl
feasible

9
10
11
Symmetric Key Algorithm

12
13
DES is a block cipher that operates on data
blocks of 64 bits in size. DES uses a
64-bit key 8 × 8 including 1 bit for parity,
so the actual key is 56 bits.

-12
pico = 10

The Data Encryption Standard (DES) is a symmetric-key block cipher that operates on 64-bit blocks of data.
It uses a key of 56 bits, but due to the inclusion of parity bits, the effective key size is 48 bits. DES operates
through a series of 16 rounds, each using a different 48-bit round key generated from the original 56-bit key.

14
Advanced Encryption Standard

Diffe-Hellman Key Exchange 1976 originally conceptualized by Ralph Merkle and


published by Whitfield Diffie and Martin Hellman
RSA is asymmetric crypto algorithm proposed 1978 by Ron Rivest, Adi Sharmir and Len Adleman at MIT

Rijndael cipher : Pronounce as rin-dale


Rijndael is a family of ciphers that encrypt and decrypt data in 128-bit blocks.
The name Rijndael comes from the names of its Belgian creators, Joan Daemen and Vincent Rijmen.

The number of rounds in Rijndael depends on the key size. It uses 10 rounds for 128-bit keys, 12 rounds for 192-bit keys,
and 14 rounds for 256-bit keys.

DES operates through a series of 16 rounds

15
16
17
18
19
AES Expansion/Schedule

20
The number of rounds depends on
the key length as follows :

128 bit key – 10 rounds


192 bit key – 12 rounds
256 bit key – 14 rounds

21
22
AES Selection Criteria

23
24
25
26
27
28
29
Dealing with Block Swapping and Replay Attacks

30
31
32
The MD5 (message-digest algorithm) hashing algorithm is a one-way cryptographic function that
accepts a message of any length as input and returns as output a fixed-length digest value to be
used for authenticating the original message.
 Non-trivial: tasks that are extremely difficult and time consuming.
 Nonce: In cryptography, a nonce is an arbitrary number that can be used just once in a cryptographic
communication.

Block Cipher Mode of Operation

33
ECB: Electronic Code Book Mode
CBC: Cipher Block Chaining Mode
CFB: Cipher Feedback Mode
CTR: Counter
OFB: Output Feedback Modes
34
35
CTR (short for counter), CTR is similar to OFB

36
Diffie-Hellman Symmetric Key Exchange Protocol
37
38
39
Modular Arithmetic

40
21 + 9 -9 + 9 (mod 10)

41
42
43
Euler Totient Theorem

44
45
46
47
RSA Asymmetric Crypto Algorithm

RSA is used primarily for secure key exchange and


digital signatures.

RSA is more computationally intensive than AES, and much slower.


It's normally used to encrypt only small amounts of data.

48
49
50
51
52
Understanding RSA with OpenSSL

53
54
55
Use Crypto API to Encrypt and Decrypt

56
Public-Key Cryptography Standards #7

57
58
Use Crypto API to Sign and Verify

59
60
Mini Capstone: Enhance Registration Web Site Security

61
62
63
64

You might also like