Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
BY
S.MEENA
ASST.PROFESSOR,CHENNAI
WHAT DO YOU MEAN BY ENCRYPTION
• Data encryption translates data into another
form, or code, so that only people with access
to a secret key (formally called a decryption
key) or password can read it.
• Encrypted data is commonly referred to as
cipher text, while unencrypted data is called
plaintext.
DECRYPTION
• Decryption is generally the reverse process of
encryption.
• It is the process of decoding the data which
has been encrypted into a secret format.
• An authorized user can only decrypt data
because decryption requires a secret key or
password.
ENCRYPTION & DECRYPTION
CRYPTOGRAPHY
• Cryptography is the practice and study of
techniques for securing communication
and data in the presence of adversaries.
WHY CRYPTOGRAPHY?
CRYPTOGRAPHY
ENCRYPTION ALGORITHMS
CRYPTOGRAPHY
SYMMETRIC ASYMMETRIC
CRYPTOGRAPHY CRYPTOGRAPHY
CLASSICAL MODERN
TRANSPOSITION SUBSTITUTION
STREAM CIPHER BLOCK CIPHER
CIPHER CIPHER
SYMMETRIC KEY CRYPTOGRAPHY
SYMMETRIC KEY CRYPTOGRAPHY
• An encryption system in which the sender and
receiver of a message share a single, common
key that is used to encrypt and decrypt the
message.
• The most popular symmetric–key system is
the Data Encryption Standard (DES)
TRANSPOSITION CIPHER
TRANSPOSITION CIPHER
• In Cryptography, a transposition cipher is a
method of encryption by which the positions
held by units of plaintext (which are
commonly characters or groups of characters)
are shifted according to a regular system, so
that the ciphertext constitutes a permutation
of the plaintext.
SUBSTITUTION CIPHER
• Method of encryption by which units of
plaintext are replaced with ciphertext,
according to a fixed system; the “units” may
be single letters (the most common), pairs of
letters, triplets of letters, mixtures of the
above, and so forth.
SUBSTITUTION CIPHER
STREAM CIPHER
STREAM CIPHER
•Symmetric or secret-key encryption
algorithm that encrypts a single bit at
a time. With a Stream Cipher, the
same plaintext bit or byte will
encrypt to a different bit or byte
every time it is encrypted.
BLOCK CIPHER
BLOCK CIPHER
• An encryption method that applies a
deterministic algorithm along with a
symmetric key to encrypt a block of text,
rather than encrypting one bit at a time as in
stream ciphers
ASYMMETRIC KEY ENCRYPTION(OR)PUBLIC
KEY ENCRYPTION
ASYMMETRIC KEY ENCRYPTION
• The encryption process where different keys
are used for encrypting and decrypting the
information.
• Keys are different but are mathematically
related, such that retrieving the plain text by
decrypting cipher text is feasible.
• RSA is the most widely used form of public key
encryption,
RSA ALGORITHM
SESSION KEY
PERMANENT
KEY
SESSION KEY
• When two end systems want to
communicate ,they establish a
logical connection. For the duration
of that logical connection, all user
data is encrypted with a one time
SESSION KEY session key. At the conclusion of the
session ,the session key is destroyed
PERMANENT KEY
•A permanent key is
used between
PERMANENET entities to distribute
KEY session keys.
Key distribution approach
ACCESS
CONTROL
CENTER
KEY
DISTRIBUTION
CENTER
ACC
KNOWN PLAIN
TEXT
CHOSEN PLAIN
TEXT
CRYPTOANALYSIS ATTACKS
• Attacker gets a hold of some cipher text and stores it to
analyze it.
CIPHERTEXTONLY • Known as recognizable plain text attack
• Hackers choose any plain text they want and have the system
CHOSEN give them the corresponding encrypted version.
PLAINTEXT