cryptography

26
CRYPTOGRAPHY

Upload: alisha-rizvi

Post on 22-Jan-2017

187 views

Category:

Education


1 download

TRANSCRIPT

Page 1: Cryptography

CRYPTOGRAPHY

Page 2: Cryptography

CRYPTOGRAPHY Greek Word - kryptos : hidden - graphein : to write

It is an art or science to transform a

message into non-readable form

Page 3: Cryptography

CipherThe encoding & decoding

Algorithm

KeyA secret value used by the cipher

Plain TextThe original message

Cipher TextThe encoded message

Page 4: Cryptography
Page 5: Cryptography
Page 6: Cryptography

SYMMETRIC KEY CRYPTOGRAPHY The encryption and decryption keys

are same. It is of the form : P = D(K, E(K,P))

Page 7: Cryptography

ASYMMETRIC KEY CRYPTOGRAPHY In this method, we have two

different keys : 1. Encryption Key (Public) 2. Decryption Key (Private)

It is of the form : P = D( KD , E(KE ,P))

Page 8: Cryptography

SYMMETRIC KEY CRYPTOGRAPHY

ASYMMETRIC KEY CRYPTOGRAPHY

Page 9: Cryptography

An encryption scheme that does not require the use of a

key is called a KEYLESS CIPHER

Page 10: Cryptography

CIPHERSCipher

Substitution Transposition

Polyalphabetic

Monoalphabetic

Page 11: Cryptography

SUBSTITUTION CIPHER A substitution cipher replaces one symbol with

another. Monoalphabetic Cipher : The relationship

between a symbol in the plain text to a symbol in the cipher text is always one-to-one.

Polyalphabetic Cipher : The relationship between a symbol in the plain text to a symbol in the cipher text is always one-to-many.

Page 12: Cryptography

EXAMPLES

- Caesar Cipher- Vigenere Cipher- One Time Pad

Page 13: Cryptography

CAESAR CIPHER Earliest known Substitution Cipher Invented by Julius Caesar Monoalphabetic If each letter is represented by integers 0,1,...,25

Then, C = ( P + K ) mod 26 P = ( C – K ) mod 26 where the key is K = 3

Page 14: Cryptography
Page 15: Cryptography

VIGENERE CIPHER

Simplest Polyalphabetic Cipher The Vigenere Cipher chooses a sequence of keys i.e. Key = K1 K2 K3 ……… Kn When the end of the key sequence is reached, the

key starts over again Ci = ( Pi + Ki%n ) mod 26 Pi = ( Ci – Ki%n ) mod 26

Page 16: Cryptography
Page 17: Cryptography

ONE TIME PAD

Also called Vernam Cipher Invented by Vernam Polyalphabetic Cipher The key is chosen at random The length of the key is at least as long as that

of the message, and so it does not repeat. Ci = ( Pi + Ki ) mod 26 Pi = ( Ci – Ki ) mod 26

Page 18: Cryptography
Page 19: Cryptography

TRANSPOSITION CIPHER

A transposition cipher does not substitute one symbol for another, instead it changes the location of the symbols.

A transposition cipher reorders symbols

Page 20: Cryptography

TYPES- Keyless 1. Rail Fence Cipher 2. Columnar Cipher- Keyed- Combination of Keyless & Keyed

Page 21: Cryptography

KEYLESS

Rail Fence Cipher

Plain Text : Meet me at the park

Cipher Text : MEMATEAKETETHPR

Page 22: Cryptography

Columnar Cipher

Plain Text : Meet me at the park

Cipher Text : MMTAEEHREAEKTTP

Page 23: Cryptography

KEYEDPlain Text : Meet me at the park

Key (A permutation Key)

Cipher Text : EMTME TETHA AERKP

MEETM EATTH EPARK

Page 24: Cryptography

COMBINATION OF KEYED & KEYLESS

Page 25: Cryptography

DES Data Encryption Standard Developed for the U.S. government in 1976 Accepted as a cryptographic standard both

in the United States and abroad Many hardware and software systems have

been designed with the DES

Page 26: Cryptography

ThankYou