meljun cortes ict security cryptography

26
Cryptography Cryptography

Upload: meljun-cortes

Post on 12-Jan-2017

143 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: MELJUN CORTES ICT security cryptography

CryptographyCryptography

Page 2: MELJUN CORTES ICT security cryptography

What is Cryptography?What is Cryptography?Cryptography is the science and

study of secret writing.

Page 3: MELJUN CORTES ICT security cryptography

What is Cipher?What is Cipher?A cipher is a secret method of

writing, whereby plaintext is transformed into cipher text also called cryptogram.

Page 4: MELJUN CORTES ICT security cryptography

When do we use it?When do we use it?

Page 5: MELJUN CORTES ICT security cryptography

Mono-alphabetic CipherMono-alphabetic CipherA class of ciphers where the code

is based on one letter of the alphabet standing in for another letter consistently throughout the message

Page 6: MELJUN CORTES ICT security cryptography

Thing you need when Thing you need when encrypting a messageencrypting a messageThe Cipher

◦Set of rules that you’re using to encode the information

The Key◦It tells you how to arrange those

rules

Page 7: MELJUN CORTES ICT security cryptography

Encipher and EncryptionEncipher and EncryptionThe process of transforming

plaintext into cipher text is called encipherment or encryption.

Page 8: MELJUN CORTES ICT security cryptography

Decipher or DecryptionDecipher or DecryptionThe reverse process of

transforming cipher text into plaintext is called decipherment or decryption

Page 9: MELJUN CORTES ICT security cryptography

Things to know!Things to know!A “key” is needed to retrieve the

message back from the garbled message.

Page 10: MELJUN CORTES ICT security cryptography

What is a Cryptosystem?What is a Cryptosystem?A cryptosystem is an

implementation of cryptographic techniques and their accompanying infrastructure to provide information security services. A cryptosystem is also referred to as a cipher system.

Page 11: MELJUN CORTES ICT security cryptography

Cryptosystem ModelCryptosystem Model

Page 12: MELJUN CORTES ICT security cryptography

Eavesdropping Eavesdropping An interceptor (an attacker) is an unauthorized entity who attempts to determine the plaintext. He can see the cipher text and may know the decryption algorithm. He, however, must never know the decryption key.

Page 13: MELJUN CORTES ICT security cryptography

Transposition Ciphers Transposition Ciphers

Transposition Ciphers rearrange bits or characters in the data.

Page 14: MELJUN CORTES ICT security cryptography

Substitution ciphersSubstitution ciphersSubstitution ciphers replace bits,

characters, or blocks of characters with substitutes.

A simple type of substitution cipher shifts each letter in the English alphabet forward

The cipher is often called a Caesar cipher because Julius Caesar

Page 15: MELJUN CORTES ICT security cryptography

Substitution ciphersSubstitution ciphers123

Page 16: MELJUN CORTES ICT security cryptography

What is Cryptanalysis? What is Cryptanalysis? The art and science of breaking

the cipher text is known as cryptanalysis.

Page 17: MELJUN CORTES ICT security cryptography

Classic vs ModernClassic vs Modern

Page 18: MELJUN CORTES ICT security cryptography

Poly-alphabetic cipherPoly-alphabetic cipherThe way you scramble the

alphabet actually changes throughout the message

One of the earliest poly-alphabetic cipher was the “Vigenere Cipher” developed in the 16th century

Page 19: MELJUN CORTES ICT security cryptography

MODERN SYMMETRIC KEY MODERN SYMMETRIC KEY ENCRYPTION ENCRYPTION Digital data is represented in

strings of binary digits (bits) unlike alphabets. Modern cryptosystems need to process this binary strings to convert in to another binary string.

Page 20: MELJUN CORTES ICT security cryptography

Block Ciphers Block Ciphers In this scheme, the plain binary

text is processed in blocks (groups) of bits at a time; i.e. a block of plaintext bits is selected, a series of operations is performed on this block to generate a block of cipher text bits.

Page 21: MELJUN CORTES ICT security cryptography

Block Ciphers Block Ciphers Digital Encryption Standard (DES): The popular

block cipher of the 1990s. It is now considered as a ‘broken’ block cipher, due primarily to its small key size.

Triple DES: It is a variant scheme based on repeated DES applications. It is still a respected block ciphers but inefficient compared to the new faster block ciphers available.

Advanced Encryption Standard (AES): It is a relatively new block cipher based on the encryption algorithm Rijndael that won the AES design competition.

Page 22: MELJUN CORTES ICT security cryptography

Block Ciphers Block Ciphers IDEA: It is a sufficiently strong block cipher with a

block size of 64 and a key size of 128 bits. A number of applications use IDEA encryption, including early versions of Pretty Good Privacy (PGP) protocol. The use of IDEA scheme has a restricted adoption due to patent issues.

Twofish: This scheme of block cipher uses block size of 128 bits and a key of variable length. It was one of the AES finalists. It is based on the earlier block cipher Blowfish with a block size of 64 bits.

Serpent: A block cipher with a block size of 128 bits and key lengths of 128, 192, or 256 bits, which was also an AES competition finalist. It is a slower but has more secure design than other block cipher.

Page 23: MELJUN CORTES ICT security cryptography

Stream Ciphers Stream Ciphers The plaintext is processed one bit

at a time i.e. one bit of plaintext is taken, and a series of operations is performed on it to generate one bit of ciphertext.

Technically, stream ciphers are block ciphers with a block size of one bit.

Page 24: MELJUN CORTES ICT security cryptography

Block cipher and Stream Block cipher and Stream ciphercipher

Page 26: MELJUN CORTES ICT security cryptography

ReferenceReferenceElizabeth D., & Denning R.,

(1982).Cryptography and Data SecurityTutorials Point, (2015). Cryptography just

for beginnersSmart N., Cryptography: An Introduction

byBellare M., & Rogaway P.,

(2005 ).Introduction to modern Cryptography by

www.tutorialspoint.comwww.techtarget.com/cryptography