Sei sulla pagina 1di 34

ENCRYPTION

BY
S.MEENA
ASST.PROFESSOR,CHENNAI
WHAT DO YOU MEAN BY ENCRYPTION
• Data encryption translates data into another
form, or code, so that only people with access
to a secret key (formally called a decryption
key) or password can read it.
• Encrypted data is commonly referred to as
cipher text, while unencrypted data is called
plaintext.
DECRYPTION
• Decryption is generally the reverse process of
encryption.
• It is the process of decoding the data which
has been encrypted into a secret format.
• An authorized user can only decrypt data
because decryption requires a secret key or
password.
ENCRYPTION & DECRYPTION
CRYPTOGRAPHY
• Cryptography is the practice and study of
techniques for securing communication
and data in the presence of adversaries.
WHY CRYPTOGRAPHY?
CRYPTOGRAPHY
ENCRYPTION ALGORITHMS
CRYPTOGRAPHY

SYMMETRIC ASYMMETRIC
CRYPTOGRAPHY CRYPTOGRAPHY

CLASSICAL MODERN

TRANSPOSITION SUBSTITUTION
STREAM CIPHER BLOCK CIPHER
CIPHER CIPHER
SYMMETRIC KEY CRYPTOGRAPHY
SYMMETRIC KEY CRYPTOGRAPHY
• An encryption system in which the sender and
receiver of a message share a single, common
key that is used to encrypt and decrypt the
message.
• The most popular symmetric–key system is
the Data Encryption Standard (DES)
TRANSPOSITION CIPHER
TRANSPOSITION CIPHER
• In Cryptography, a transposition cipher is a
method of encryption by which the positions
held by units of plaintext (which are
commonly characters or groups of characters)
are shifted according to a regular system, so
that the ciphertext constitutes a permutation
of the plaintext.
SUBSTITUTION CIPHER
• Method of encryption by which units of
plaintext are replaced with ciphertext,
according to a fixed system; the “units” may
be single letters (the most common), pairs of
letters, triplets of letters, mixtures of the
above, and so forth.
SUBSTITUTION CIPHER
STREAM CIPHER
STREAM CIPHER
•Symmetric or secret-key encryption
algorithm that encrypts a single bit at
a time. With a Stream Cipher, the
same plaintext bit or byte will
encrypt to a different bit or byte
every time it is encrypted.
BLOCK CIPHER
BLOCK CIPHER
• An encryption method that applies a
deterministic algorithm along with a
symmetric key to encrypt a block of text,
rather than encrypting one bit at a time as in
stream ciphers
ASYMMETRIC KEY ENCRYPTION(OR)PUBLIC
KEY ENCRYPTION
ASYMMETRIC KEY ENCRYPTION
• The encryption process where different keys
are used for encrypting and decrypting the
information.
• Keys are different but are mathematically
related, such that retrieving the plain text by
decrypting cipher text is feasible.
• RSA is the most widely used form of public key
encryption,
RSA ALGORITHM

• RSA stands for Rivest, Shamir, and Adelman,


inventors of this technique
• Both public and private key are
interchangeable
• Variable Key Size (512, 1024, or 2048 bits)
HOW KEYS ARE GENERATED USING
RSA
APPLICATION OF ENCRYPTION
• The strength of any cryptographic system rests
with the key distribution technique-a term
that refers to the means of delivering a key to
two parties that want to exchange data
without allowing others to see the key
TWO KINDS OF KEYS

SESSION KEY

PERMANENT
KEY
SESSION KEY
• When two end systems want to
communicate ,they establish a
logical connection. For the duration
of that logical connection, all user
data is encrypted with a one time
SESSION KEY session key. At the conclusion of the
session ,the session key is destroyed
PERMANENT KEY

•A permanent key is
used between
PERMANENET entities to distribute
KEY session keys.
Key distribution approach

ACCESS
CONTROL
CENTER

KEY
DISTRIBUTION
CENTER
ACC

• The access control


center determines
which systems can
ACCESS CONTROL communicate with
CENTER each other
KDC

• The network interface


unit performs end to end
encryption and obtains
KEY DISTRIBUTION session keys on behalf of
CENTER its host terminal
CRYPTOANALYSIS
• Cryptonalysis, is the investigation of
systems, cipher text, and ciphers in order
to reveal the hidden meaning or details
of the system itself.
CRYPTOANALYSIS BASIC ATTACKS

CIPHER TEXT ONLY

KNOWN PLAIN
TEXT

CHOSEN PLAIN
TEXT
CRYPTOANALYSIS ATTACKS
• Attacker gets a hold of some cipher text and stores it to
analyze it.
CIPHERTEXTONLY • Known as recognizable plain text attack

• Attackers use old pairs of(plain ,cipher text)to try to decipher


KNOWN PLAIN new cipher text messages
TEXT

• Hackers choose any plain text they want and have the system
CHOSEN give them the corresponding encrypted version.
PLAINTEXT

Potrebbero piacerti anche