Sei sulla pagina 1di 31

CONTENTS

o o o o o

4/17/12

Introduction Need of Cryptography Types of Attacks Techniques of Cryptography Encryption Algorithm


Symmetric Asymmetric

o o

Digital Signature Conclusion

INTRODUCTION

4/17/12

What is Cryptography?

Hidden Writing protect Information.

Mainly used to

Goal

of Cryptography
communication over insecure

Ensure security of

medium

Communicate even with possibility of

adversary

4/17/12

NEED OF ENCRYPTION
Confidentiality Integrity Authentication Nonrepudiation Access

Control Availability

4/17/12

TYPES OF ATTACKS

A General View Technical View Practical Side of Attacks that Attack

A A

Programs

4/17/12

PLAIN TEXT

PLAIN TEXT

ENCRYPT ION

DECRYPT ION

SENDE R

CIPHE RTEX T BASIC BLOCK DIAGRAM

RECEIV ER

Basic Terminologies
Encryption

Encryption is the process of encoding a message so that its meaning is not obvious is the reverse process, transforming an encrypted message back into its normal, original form system for encryption and decryption is called a cryptosystem.

4/17/12

Decryption
Decryption

Cryptosystem
A

Basic Terminologies
Plaintext Cipher Key

4/17/12

text

key

refers to a sequence of symbols or a numerical value used by an algorithm to alter information & making that information secure

Encryption
The

algorithm

cryptosystem involves a set of rules for how to encrypt the plaintext and how to decrypt the cipher text. is an attempt to break the cipher text.

Cryptanalysis
Cryptanalysis

Techniques of Cryptography
q

4/17/12

Substitution Technique
Caesar Cipher Monoalphabetic Cipher Homophonic Cipher Polyalphabetic Cipher

Transposition Technique
Rail Fence Technique Vernam Cipher(One -time Pads) Simple Columnar Cipher

Encryption Algorithm

4/17/12

Symmetric
Same Key

key for encryption and decryption

distribution problem

Asymmetric
Key

pairs for encryption and decryption and private keys

Public

Symmetric Algorithm
It
Single

is also called as Secret Key Cryptography

4/17/12

key used for both encrypt & decrypt Key must be known to both the parties

Key Plaintext

Encrypti on

Ciphertex t

Decrypt ion

Original Plaintext

Symmetric Cryptosystem

Asymmetric Algorithm
Private

4/17/12

keys are used for decrypting. Public keys are used for encrypting
plaintext encryption public key ciphertext decryption private key plaintext ciphertext

Comparison
Secret Key (Symmetric) Number of Key Protection of Key 1 Must be kept secret Public Key (Asymmetric) 2 One key must be kept secret & other can be freely exposed Key exchange, authentication Safer Slow; typically, 10,000 times slower than secret key

4/17/12

Best Uses

secrecy and integrity of data Problematic Fast

Key Distribution Speed

Symmetric Algorithm
Data

4/17/12

Encryption Standard (DES):

56 bits key
Advance

Encryption Standard (AES):

128, 192 or 256 bits key


International

Data Encryption Algorithm(IDEA):


128 bits key

DATA ENCRYPTION STANDARD


Developed

4/17/12

by IBM and it is known as the Data Encryption

Standard It is also known as Data Encryption Algorithm The DES algorithm is a careful and complex combination of two fundamental building blocks of encryption: Substitution and Transposition DES uses only standard arithmetic and logical operations on numbers up to 64 bits long

Plain text (64 bits) Initial Permutation (IP) LPT key RPT key

4/17/12

16 rounds 16 rounds Final Permutation Cipher text (64 bits) BROAD LEVEL STEPS IN DES

4/17/12

DATA ENCRYPTION STANDARD


1st

64 bit plain text is handed over to initial permutation function. IP is performed over the plain text. IP produces two halves of the permuted blocks left plain text (LPT) & right plain text (RPT). Now LPT & RPT goes 16 rounds of encryption process, each with its own key. Now LPT & RPT are rejoined and FINAL PERMUTATION (FP) is performed on the combined block.

4/17/12

DETAILS OF ONE ROUND IN DES


Key Transformation

Expansion Permutation S- box Substitution P- box Permutation XOR and Swap

ADVANTAGES OF DES:
o

4/17/12

DES is also an ANSI and ISO standard anybody can learn the details and implement it. Since DES was designed to run on hardware, it is fast in hardware. Hard to crack.

DISADVANTAGES OF DES:
o

Hardware implementations of DES are very fast; DES was not designed for software and hence runs relatively slowly.

Asymmetric Algorithm
Rivest

4/17/12

Shamir Adleman (RSA) Encryption:

Based on factoring the product of large prime numbers.


Knapsack

Algorithm:

If M1,M2., Mn are given values & S is the sum, S=b1M1+b2M2.+bnMn where, bi can be 0 or 1

RSA
It

4/17/12

is named after its three inventors Rivest Shamir and Adleman This algorithm was introduced in 1978 and to date remains secure. RSA has been the subject of extensive cryptanalysis, and no serious flaws have yet been found. The encryption algorithm is based on the underlying problem of factoring large numbers.

RSA
p n

4/17/12

and q are two large prime numbers =p.q = (p-1)(q-1)

m a b

is such that 1 < a < m and gcd (m , a) = 1. is such that ( a. b) mod m = 1

4/17/12

RSA ENCRYPTION & DECRYPTION


Message

M < n. Encryption key = (a , n). Decryption key = (b , n). Encrypt => E = Ma mod n. Decrypt => M = Eb mod n.

4/17/12

Advantage
Individuals can post their public key on their Web site. The number of the keys is only twice of the number of user.

Disadvantage It is slower

than symmetric algorithms. The cipher text may be larger than plain text.

4/17/12

Digital signature
When

an author signs a document, it cannot be changed. you send a document electronically, you can also sign it. ways:

When

Digital

signature can be done in two

You can sign the whole document You can sign a digest of the document

Signing the whole document

4/17/12

You

can not provide these aspects of security using the secret key. The method provides authentication & nonrepudiation.

4/17/12

Signing the digest

The

two most common hash functions are: properties of hash function

Message

digest 5 (MD5) Secure hash algorithm (SHA-1)


The
One-way:

the digest can only be created from the message, but not vice versa One-to-one: be very difficult to find two messages that create the same digest.

4/17/12

Sender site

4/17/12

Receiver site

APPLICATIONS OF ENCRYPTION
Cryptographic Digital

4/17/12

Hash Function

Signature

Certificate Secure Office

electronic transactions equipment

4/17/12

CONCLUSION
RSA

finds its strongest application when parties who have no prior relationship want to share sensitive data with each other. Thus , even though slower as compared to symmetric algorithms it is & will be widely used as it can be used in digital signature for long haul transmission.

4/17/12

THANK YOU

Potrebbero piacerti anche