CRYPTOGRAPHY
“You can’t make something secure if you don’t
know how to break it”
-Marc Weber Tobias
Definition
• Cryptography is the science of
disguising messages so that
only the intended recipient can
decipher the received message.
Goal of Cryptography
Terminologies
• Encryption
• Decryption
• Plain Text
• Cipher Text
• Cryptanalysis
• Cryptology
Encryption and Decryption
Encryption and Decryption
✘ Encryption is the process of using an
algorithm to transform information into a format
that cannot be read.
✘ Decryption is the process of using another
algorithm to transform encrypted information
back into a readable format.
Encryption and Decryption
The original information is referred
to as the plain text while the
encrypted version is the cipher text.
PLAIN TEXT → CIPHER TEXT (Encryption)
CIPHER TEXT → PLAIN TEXT (Decryption)
Communicating Securely
Communicating Securely
Encryption and Decryption
Encryption and decryption are processes
performed in cryptography, which is
essentially about inventing cryptosystems
(also called cryptographic systems or cipher
systems).
Encryption and Decryption
• Breaking cryptosystems, on the other hand, is
part of cryptanalysis.
• Cryptography and cryptanalysis make up what
we refer to as cryptology.
Encryption and Decryption
Objectives of Encryption
• Confidentiality
• Integrity
• Authenticity
• Non-repudiation
METHODS OF
CRYPTOGRAPHY
Shift Cipher
It is the simple type of substitution
cipher
A shift cipher with key K operates by
shifting each letter K places to left.
Caesar’s Cipher
“If he had anything confidential to say,
he wrote it in cipher, that is, by so
changing the order of the letters of
the alphabet, that not a word could be
made out. If anyone wishes to
decipher these, and get at their
meaning, he must substitute the
fourth letter of the alphabet, namely
D, for A, and so with the others. “
—Suetonius, Life of Julius Caesar 56
Caesar’s Cipher
Caesar’s Cipher
A B C D E F G H I J
D E F G H I J K L M
K L M N O P Q R S T
N O P Q R S T U V W
U V W X Y Z
X Y Z A B C
Affine Cipher
A special type of substitution cipher. The key is K=(a,b)
The encryption rule is :
The decryption rule
However the decryption is possible if and only if
gcd (a,26) = 1. Below is the list of the multiplicative inverse of
the 12 elements a in for which gcd (a,26) = 1
1 3 5 7 9 11 15 17 19 21 23 25
1 9 21 15 3 19 7 23 11 5 17 15
Vigenere Cipher
A well known polyalphabetic cryptosystem is the Vigenere
Ciphere (named after 16th century cryptographer Blaise de
Vigenere). The key K is a “keyword” of length m. For
example, K might be ECLIPSE whose length is 7. The plain
text is encrypted 7 letters at a time by “adding” the keyword
to the plain text. Hence, each plain text letters is mapped to
one of m possible cipher text letters.
Vigenere Cipher
Suppose the message to be sent is
RUNNOW.
Using the alphabet A B … Z → 0 1 … 25 and
keyword HUSH, we proceed as follows:
Vigenere Cipher
Vigenere Cipher
Suppose the message to be sent is
RUNNOW.
Using the alphabet A B … Z → 0 1 … 25 and
keyword HUSH, we proceed as follows:
THANK YOU FOR
LISTENING