Lecture#1
CRYPTOGRAPHY
Course Title
Cryptography
and Its Applications
Semester
Fall-2019
Presented By : Shibani Sarangi
IT Branch, Regd no. 1001289324
Muhammad Asif
Guided By : Prof. X
1
OVERVIEW OF LECTURE
Cryptography
Basic Definitions
Encryption & Decryption
Transmission Technique
Symmetric Cryptography
Asymmetric Cryptography
Types of Ciphers
2
WHAT IS CRYPTOGRAPHY ?
Cryptography is the study of transforming a secret message in such
a way that it can be understood only by an authorized recipient who
has been provided with a secret key for deciphering it.
Cryptography enables you to store sensitive information or
transmit it across insecure networks so that it cannot be read by
anyone except the intended recipient.
3
BASIC DEFINITIONS
Plaintext: Data that can be read and understood without any
special measures.
Encryption: The method of hiding plaintext in such a way as to
hide its substance is called encryption.
Cipher text: Encrypting plaintext results in unreadable data called
cipher text. i.e transformed message.
Decryption: The process of returning cipher text to its original
plaintext is called decryption.
Key: some secret piece of information that customizes how the
cipher text is produced.
4
BASIC DEFINITIONS
Cryptanalysis: The art of breaking ciphers, i.e. retrieving the
plaintext without knowing the proper key.
Cryptanalysts: Experts of cryptanalysis.
Cryptology: The branch of mathematics that studies the
mathematical foundations of cryptographic methods.
Cipher: The Encoder, i.e., the encryption/decryption scheme
5
ENCRYPTION & DECRYPTION
6
WHY USE CRYPTOGRAPHY ?
For “secret writing”
To establish a shared secret when other people (eavesdroppers)
are listening.
TYPES
Mainly classified into two types :
1. Symmetric key cryptography
2. Asymmetric key cryptography
7
TRANSMISSION TECHNIQUE
bla-bla
Cipher
ciphertext
msg
msg
Cipher text – in
decoder (ciphertext
Plain text in
- out
encoder - plaintext out)
(plaintext in -
Plain text – in
cm b -cm b bla-bla
ciphertext
Cipher out)
text - out
eavesdropper
Should (should understand
understand NOTHING
nothing
about about the msg)
the message
8
CLASSIFICATION
Cryptography
Symmetric key Asymmetric key
cryptography cryptography
(Public key cryptography)
Classical Modern
cryptography cryptography
Transposition Substitution Stream Block
cipher cipher cipher cipher
9
SYMMETRIC KEY CRYPTOGRAPHY
BOTH SHOULD
KNOW THE KEY
10
TRANSPOSITION CIPHER
In classical cryptography, a transposition cipher changes one
character from the plaintext to another i.e. the order of the
characters is changed.
11
SUBSTITUTION CIPHER
Substitution cipher is a method of encryption by which units of
plaintext are substituted with cipher text according to a regular
system or A system of enciphering that uses the method of
substitution is called substitution cipher.
12
STREAM CIPHER
A Stream Cipher is a symmetric or secret-key encryption algorithm
that encrypts a single bit at a time. With a Stream Cipher, the same
plaintext bit or byte will encrypt to a different bit or byte every time it
is encrypted.
In stream cipher we use different keys for enciphering successive
letters.
e.g. :Plain text: Pay 100
Binary of plain text:010111101 (hypothetical)
Key: 100101011 Perform XOR
Cipher text:110010110 ZTU9^%D
To decrypt make the XOR operation of the cipher text with the
key .
13
BLOCK CIPHER
Block cipher technique involves encryption of one block of text at a
time .Decryption also takes one block of encrypted text at a time.
Length of the block is usually 64 or 128 bits.
e.g. :
Plain text: four and five
Four and five
Key Key Key
Cipher text: wvfa ast wvfa
14
ASYMMETRIC KEY CRYPTOGRAPHY
Public key cryptography is an asymmetric scheme that uses a Pair of
keys for encryption: a Public key, which encrypts data, and a
corresponding Private key (secret key) for decryption.
15
CRYPTANALYSIS
Cryptanalysis refers to the study of ciphers, cipher text, or
cryptosystems (that is, to secret code systems) with a view to
finding weaknesses in them that will license recovery of the plain
text from the cipher text, without necessarily knowing the key or
the algorithm. This is known as breaking the cipher, cipher text, or
cryptosystem.
Unlike cryptography which is a clearly defined science,
Cryptanalysis is as much an art as it is a science.
16
CRYPTANALYSIS TECHNIQUES
Known - plain text analysis
Chosen – plain text analysis (Differential cryptanalysis)
Cipher text - only analysis
Man – in – the - middle attack
17
ACOUSTIC CRYPTANALYSIS
It is a side channel attack which exploits sounds emitted by computers or
machines.
Modern acoustic cryptanalysis mostly focuses on sounds emitted by
computer keyboards and internal computer components
Historically it has also been applied to impact printers and
electromechanical cipher machines.
18
COUNTER MEASURES
Use rubber keyboard or virtual keyboards to prevent keystroke
sounds.
Use acoustic printers.
Use Acoustic case for CPU.
19
Cryptography, being an art of encrypting and decrypting confidential
information and private messages, should be implemented in the network
security to prevent any leakage and threat.
It can be done by using any of these techniques discussed above for
fortifying the personal data transmission as well as for secure transaction.
Acoustic cryptanalysis, being an art of decrypting or leaking confidential
information from the sound generated from the CPU, Keyboard, printers, etc
may be used in both constructive as well as destructive ways.
20