Sei sulla pagina 1di 23

CRYPTOGRAPHY

What is
Cryptography..?

INTRODUCTIO
N
Cryptography is the study of Secret (crypto-) writing (-graphy).
It is a science of Protecting information by encoding it into an
unreadable format. Cryptography is the art and science of
keeping information secure from unintended audiences, of
encrypting it. Conversely, cryptanalysis is the art and science of
breaking encoded data.

Why
Cryptography..?

Applications of cryptography include


ATM cards,
Networking,
Computer passwords,
Electronic commerce and etc.

Web sites.

Cryptography
Functions o

Encryption

o Decryption
o Hash Functions

Encryption & Decryption


Encryption is the process of transforming a message (referred to as plaintext) to
a cryptogram, which is a set of symbols unreadable to anyone except those
possessing the readable key. The encryption process takes place through the use
of algorithms, complex mathematical functions that are applied to the message
and make it unreadable without the decryption key. Decryption is the process of
converting cipher text back to plaintext.

Hash
Acryptographic hash functionis which takes an input (or 'message') and
returns a fixed-size alphanumeric string, which is called thehashvalue
(sometimes called a message digest, a digital fingerprint, a digest or a
checksum). Hashing is a one-way trip (its also called one-way cryptography) so
we can only encrypt the text once a text was encrypted it will never decrypt.
Some hash algorithms are MD5(Message Digest algorithm 5) and SHA1.
MD5 hash for Siva is :1955b38f13116a57e4de2134a139d139

Plain Text :
The original data is called Plain Text or Clear Text.
Cipher Text:

The encrypted data is called Cipher Text. The term cipher is sometimes used as
a synonym
for cipher text, but it more properly means the method of encryption rather than the
result.
Encryption Algorithm :
An

Algorithm used for transforming Plain Text to Cipher Text That the

algorithm is
called Encryption algorithm.
Keys :
Sequence that controls the operation and behavior of the cryptographic
algorithm.

Symmetric Encryption
Symmetric encryption (also called private-key encryption or secret-key
encryption) involve using the same key for encryption and decryption. The
most common private-key algorithms are DES (Data Encryption Standard),
Triple-DES, Blowfish, IDEA and AES (Advanced Encryption Standard).

Asymmetric Encryption
The public-key algorithms use two different keys to encrypt and decrypt the message.
The keys are generated by a particular algorithm that doesn't allow to obtain one key
from another. One of the keys, calledpublic key, is shared and will be used for the
encryption process.
The most common asymmetric key algorithms areRSA (named by their inventors:
Rivest, Shamir and Adelman), Diffie-Hellman, DSS (Digital Signature Standard).

Operations are used for Encryption


Substitution
In this operations we change Replace a letter in the text
Transposition
Change the Order of the letters in the text
Keys
Public and Private keys are used
Block Cipher
A block cipher transforms a fixed-length block ofplaintextinto a block ofcipher
textof the same length, using a secret key. To decrypt, the reverse process is applied to the
cipher text block using the same secret key.
Stream Cipher
Stream ciphers are typically much faster than block ciphers. A stream cipher
generates akey stream(a sequence of bits or bytes used as a key).It produce a output
immediately.

Cryptanalys
is

What is
Cryptanalysis..?

Cryptanalysis
Cryptanalysis is the science and study of methods for
breaking encryption schemes. Finding weaknesses in
cipher that will permit retrieval of the plaintext from the
cipher text, without necessarily knowing the key or the
algorithm.

Cipher text-only
The cryptanalyst has several pieces of cipher text that were all encrypted
using the same encryption algorithm. The goal is to recover as many plaintexts as possible
or, better yet, to deduce the key(s) used for encryption and/or decryption.

Known-plaintext
The cryptanalyst is able to obtain several plaintext cipher text pairs. The goal is to
deduce the key(s) used for encryption and/or decryption, so that any further messages
encrypted with the same key(s) can be decrypted.

Chosen-plaintext
The cryptanalyst can choose plaintexts and obtain the corresponding cipher texts. The goal
is to choose the plaintexts such that the resulting plaintext-cipher text pairs make it as easy
as possible to deduce the encryption and/or decryption key(s).

Symmetric Cryptography
It means taking plaintext and converting it to cipher textusing the same key, or secret,
to encrypt and decrypt the text. This is symmetric encryption and it is comparatively fast
compared to other types of encryption such as asymmetric encryption. The most widelyused algorithm used in symmetric key cryptography is AES (Advanced Encryption
Standard). It comprises three block ciphers, AES-128, AES-192 and AES-256, each of
which is deemed sufficient to protect government classified information up to the
SECRET level with TOP SECRET information requiring either 192 or 256 key lengths.
The main disadvantage of symmetric key cryptography is that all parties involved have
to exchange the key used to encrypt the data before they can decrypt it. This
requirement to securely distribute and manage large numbers of keys means most
cryptographic services also make use of other types of encryption algorithms. Secure
MIME (S/MIME) for example uses an asymmetric algorithm - public/private key algorithm for non-repudiation and a symmetric algorithm for efficient privacy and data protection.

DE
S The Data Encryption Standard was once a predominant symmetric-key algorithm for
the encryption of electronic data. Developed in the early 1970s at IBM and based on an
earlier design by Horst Festal, the algorithm was submitted to the National Bureau of
Standards (NBS) following the agency's invitation to propose a candidate for the
protection of sensitive, unclassified electronic government data. In 1976, after
consultation with the National Security Agency (NSA), the NBS eventually selected a
slightly modified version (strengthened against differential cryptanalysis, but weakened
against brute force attacks), which was published as an official Federal Information
Processing Standard (FIPS) for the United States in 1977.

TDEA
Triple Data Encryption Algorithm.
Encrypt-Decrypt-Encrypt using different keys.

Key length 112 to 168 bits.

AES

Block size:128-bit

Key size: 128-bit, 192-bit, 256-bit.

Encryption is fast.

Security
As of 2005, no successful attacks are recognized.

Asymmetric Cryptography
Asymmetric algorithms use two interdependent keys, one to encrypt the
data, and the other to decrypt it. This interdependency provides a number
of different features, the most important probably being digital signatures
which are used amongst other things to guarantee that a message was
created by a particular entity or authenticate remote systems or users.
The RSA (Rivets, Shamir and Adelman) asymmetric algorithm is widely
used in electronic commerce protocols such as SSL, and is believed to be
secure given sufficiently long keys and the use of up-to-date
implementations. As RSA is much slower than symmetric encryption, what
typically happens is that data is encrypted with a symmetric algorithm and
then the comparatively short symmetric key is encrypted using RSA. This
allows the key necessary to decrypt the data to be securely sent to other

Potrebbero piacerti anche