Cryptography
Cryptograph
y
It is a method of protecting
information or data while being stored
or being transferred through an
unsecure medium.
There are two basic methods involved
– Encryption and Decryption.
Encryption
• Encryption is a method used to
convert plain text to cipher text.
• Encryption requires an algorithm
and a secret key to convert the
message.
• Some of the earlier methods of
encryption required the message
to be replaced with letters or
interchanged. For example Caesar
cipher.
Decrypti
on
• Decryption is a method used to convert
cipher text to plain text.
• Decryption requires an algorithm and a
secret key to convert the cipher text.
• Decryption is the opposite of encryption.
• While encryption is done by the sender,
decryption is done by the receiver.
Encryption vs Encoding
1. The purpose of encryption is to protect 1. The purpose of encoding is to make it
information consumable by the machine
2. Requires a key and encryption algorithm 2. Requires only encoding algorithm
3. The key is kept secret while the algorithm
is public 3. The algorithm is public.
4. Converting a word into group of
unreadable characters 4. Converting ASCII to binary.
Plain Text
• It is a term referred to a message in its original form.
• It usually comprises of letters, numbers and special characters but in readable format.
• It can also be called as decrypted message.
• With more and more threat on personal information available online, we are finding out ways to not store
our data in plain text.
Hi, I am a plain text. You can read me
Cipher Text
• It is a term referred to a message in its
unreadable form.
• It usually comprises of letters, numbers and
special characters but in unreadable a3c3e2b88c20e24fc3c0b773
format.
0a88faae
• It can also be called as encrypted message.
• When we store our data online, we usually
store it in the form of cipher text.
Why do we
need
cryptography?
• Cryptography makes websites
secure.
• It helps easy data transfer
through unsecure media.
• It helps to verify the authenticity
of the data.
• Cryptography keeps the hackers
away from your information.
Why do we need
cryptography?
History of Cryptography
Know more
The first known evidence of cryptography can be traced
History of to the use of 'hieroglyph'. Some 4000 years ago, the
Egyptians used to communicate by messages written in
Cryptograph hieroglyph. This code was the secret known only to the
y scribes who used to transmit messages on behalf of the
kings.
Scytale Cipher
The Scytale cipher is a type of transposition cipher used
since the 7th century BCE. The first recorded use of the
scytale cipher was by the Spartans and the ancient
Greeks who used it to transport battle information between
generals.
Objectives of
cryptography
• Confidentiality refers to keeping the message
secret between two parties.
• Integrity refers to checking whether the message
has been altered or not.
• Authenticity refers to verification of the owner.
• Non-repudiation refers to assurance that the
sender will not deny that he sent the message.
CIA Triad
• Confidentiality refers to keeping the
message secret between two parties.
• Integrity refers to checking whether the
message has been altered or not.
• Availability refers to the information being
available to authorized users only.
• Both Confidentiality and Integrity can be
achieved by cryptography.
Cryptology
Cryptology
• The application of mathematics, for
example number theory that underpins
cryptography.
• The data that is encrypted is done so by
using mathematical equations which can
only be solved when certain criteria are Cryptography Cryptanalysis
met.
• Some of the common mathematical
techniques used are:-
• Discrete log problem
• Integer factorization problem
• Elliptic curve problem
Cryptanalysis
Cryptology
• The study of ciphers or cipher texts to
understand how they work and to find a
way to weaken them.
• It is used to breach the cryptographic
security systems without the need for key.
Cryptography Cryptanalysis
Caesar
cipher
• One of the simplest and
oldest techniques of
cryptography.
• It is a type of substitution
cipher
• Each letter in plain text is
replaced by another letter
from English alphabet based
on the key.
Acrostic
cipher
• It is a form of cipher where every
first letter of a word or a
sentence spells out a secret
message.
• It was popular during
Renaissance. It came from the
famous technique of writing
acrostic poem.
• It is not a strong method to hide
our secret messages but is still
used in combination with other
encryption techniques.
•Hello! Everything is going fine. Lots of things to do! Please remember to
feed my fish. Maybe you can send a picture. Everyone here has been nice. I
wish you could meet them. Anyway, something funny happened the other
day. My foot got caught and I tripped. But the funniest part was when a bird
popped on my head. Everyone laughed at that. I couldn’t believe it myself.
No one warned me that there was a big log in front of me. Gotta make sure
to look out.
Acrostic
•How has everything been for you? Everything okay? Little by little, I am
learning how to camp. Doing everything for myself has been fun. Have you
started school yet? Enjoying your classes? Remember to pay attention!
Example Everyone would tell you that trick!
•So, I guess that’s it for now. Everyone says hi. No need to send anymore
clothes. Doing laundry in the lake has been fun. Hope everything is going
well for you! Every day I miss you. Lots of love. Please say hi to everyone!
•DECODED MESSAGE :- HELP ME! I AM BEING HELD HERE. SEND HELP.
•HINT:- 1st letter of every sentence
The Enigma
Machine
• The enigma machine was used
by Germans during World War II.
• The machine algorithm was
broken by a Polish
mathematician using
permutations and weaknesses in
the encryption processes.
• The enigma machine used
polyalphabetic substitution
cipher.
What is a Hash?
• Hash is a one-way function.
• A variable length input generates a fixed
length output.
Input Hash
• A single bit of change in the input changes
the hash completely quickheal cb89d1519e52fdccee247530d076b582
QuickHeal fa2f88cb54bed92026ac0871c90c1ae1
• Hashing is case sensitive.
QUICKHEAL 26782ff60cc1b65639d1227683822992
• Hashing does not require a key. The bigger quickheal c141a30a939493ed216d85734b86626e
the hash, the more secure it is
• Hash once generated can not be reversed.
• Hash for same inputs are same.
• Examples:- MD5, SHA256, SHA512
What is the
importance
of Hash?
• Hashing technique can be
used as a proof of data
integrity.
• Websites store passwords in
hashed form and not in
plain text.
How does a website store passwords?
Register
Dhiraj Hash algo
Hashing
Login
Dhiraj Hash algo
Hashing
What is salting?
1@2$ Dhi raj 1@2$
1@2$
Digital
Signature
• Digital signature is an
implementation of cryptography
to verify the authenticity of the
message.
• Digital Signature is not the same
as electronic signature.
• Digital signature uses
asymmetric key cryptography.
• The private key is used to sign
the message.
Applications of cryptography