CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography...
-
Upload
beverley-smith -
Category
Documents
-
view
215 -
download
0
Transcript of CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography...
![Page 1: CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.](https://reader036.fdocuments.net/reader036/viewer/2022062803/56649f345503460f94c51847/html5/thumbnails/1.jpg)
CRYPTOGRAPHY
![Page 2: CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.](https://reader036.fdocuments.net/reader036/viewer/2022062803/56649f345503460f94c51847/html5/thumbnails/2.jpg)
TOPICS OF SEMINAR
• Introduction & Related Terms• Categories and Aspects of
cryptography• Model of Network Security• Encryption Techniques• Public key cryptosystem• Application• Bibliography
![Page 3: CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.](https://reader036.fdocuments.net/reader036/viewer/2022062803/56649f345503460f94c51847/html5/thumbnails/3.jpg)
DEFINATION OF CRYPTOGRAPHY• Cryptography is the study of
mathematical techniques related to the aspects of information security, such as confidentially, data integrity and entity authentication.
• Cryptography is not only means of providing information, but rather one set of techniques.
![Page 4: CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.](https://reader036.fdocuments.net/reader036/viewer/2022062803/56649f345503460f94c51847/html5/thumbnails/4.jpg)
Related Terms
• Plain text :-Original Message• Cipher text:-Coded Message.• Encryption:-The process of converting
plain text into cipher
text.• Decryption:-Restoring plain text from cipher text.
![Page 5: CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.](https://reader036.fdocuments.net/reader036/viewer/2022062803/56649f345503460f94c51847/html5/thumbnails/5.jpg)
• Cryptography:-The science or area of Encryption & Decryption • Cryptanalysis:-The science of analysis or breaking of secure communication • Cryptology :- The area of cryptography and cryptanalysis together
![Page 6: CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.](https://reader036.fdocuments.net/reader036/viewer/2022062803/56649f345503460f94c51847/html5/thumbnails/6.jpg)
Categories OF CRYPTOGRAPHY
There are two types of cryptographic algorithm
• Symmetric key
• Asymmetric key
![Page 7: CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.](https://reader036.fdocuments.net/reader036/viewer/2022062803/56649f345503460f94c51847/html5/thumbnails/7.jpg)
GOALS OF CRYPTOGRAPHY
• Confidentially• Data Integrity• Authentication• Non-repudiation
![Page 8: CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.](https://reader036.fdocuments.net/reader036/viewer/2022062803/56649f345503460f94c51847/html5/thumbnails/8.jpg)
ASPECTS OF SECURITY
• Security Service
• Security Mechanism
• Security Attacks Passive Attacks Active Attacks
![Page 9: CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.](https://reader036.fdocuments.net/reader036/viewer/2022062803/56649f345503460f94c51847/html5/thumbnails/9.jpg)
MODEL OF NETWORK SECURITY
![Page 10: CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.](https://reader036.fdocuments.net/reader036/viewer/2022062803/56649f345503460f94c51847/html5/thumbnails/10.jpg)
There are four basic tasks in designing a particular security services.
• Design an algorithm• Generate a secret information • Develop methods for distribution
and sharing• Specify the protocol
![Page 11: CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.](https://reader036.fdocuments.net/reader036/viewer/2022062803/56649f345503460f94c51847/html5/thumbnails/11.jpg)
SUBSTITUTION TECHNIQUES• CAESAR CIPHER• To Encrypt using Caesar's key value of
3,we offset the alphabet so that the 3rd letter down (D) begins the alphabet.
• ABCDEFGHIJKLMNOPQRSTUVWXYZ and sliding everything up by 3, you get DEFGHIJKLMNOPQRSTUVWXYZABC where D=A, E=B, F=C, and so on.
• "SECRET" encrypts as "VHFUHW."
![Page 12: CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.](https://reader036.fdocuments.net/reader036/viewer/2022062803/56649f345503460f94c51847/html5/thumbnails/12.jpg)
TRANSPOSITION TECHNIQUES• Plain text = “meet me after this
party”• Key = 2• m e m a t r h s a t e t e f e t i p r y• Cipher text
=“mematrshsatetefetipry”
![Page 13: CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.](https://reader036.fdocuments.net/reader036/viewer/2022062803/56649f345503460f94c51847/html5/thumbnails/13.jpg)
A more complex scheme is • Key 4 3 1 2 5 6 7• plaintext: a t t a c k p o s t p o n e d u n t I l t• Ciphertext:
TTNAPTTSUAODCOLKNLPET
![Page 14: CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.](https://reader036.fdocuments.net/reader036/viewer/2022062803/56649f345503460f94c51847/html5/thumbnails/14.jpg)
DES ALGORITHM
![Page 15: CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.](https://reader036.fdocuments.net/reader036/viewer/2022062803/56649f345503460f94c51847/html5/thumbnails/15.jpg)
Public Key Cryptosystem: Secrecy
Encryption Algorithm
Source A
Source Destination
Decryption Algorithm
Key pair source
Cryptanalyst
Destination B
B’s public key
B’s private key
![Page 16: CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.](https://reader036.fdocuments.net/reader036/viewer/2022062803/56649f345503460f94c51847/html5/thumbnails/16.jpg)
Public Key Cryptosystem: Authentication
Encryption Algorithm
Source A
Source Destination
Decryption Algorithm
Key pair source
Cryptanalyst
Destination B
A’s private key
A’s public key
![Page 17: CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.](https://reader036.fdocuments.net/reader036/viewer/2022062803/56649f345503460f94c51847/html5/thumbnails/17.jpg)
Public Key Cryptosystem: Secrecy & Authentication
Encry.Algori-them
Encry.Algori-them
Decry.Algori-them
Decry.Algori-them
Source
Dest.
Key Pair Source
Key Pair Source
B’s private key B’s public key
A’s public key
Source A
Destination B
A’s private key
![Page 18: CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.](https://reader036.fdocuments.net/reader036/viewer/2022062803/56649f345503460f94c51847/html5/thumbnails/18.jpg)
APPLICATION
• Secure Communication
• Identification & Authentication
• Secret Sharing
![Page 19: CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.](https://reader036.fdocuments.net/reader036/viewer/2022062803/56649f345503460f94c51847/html5/thumbnails/19.jpg)
BIBLIOGRAPHY
• Cryptography & Network Security By William Stallings
• WWW.google.com• Computer Network By Andrew S.
Tanenbaum
![Page 20: CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.](https://reader036.fdocuments.net/reader036/viewer/2022062803/56649f345503460f94c51847/html5/thumbnails/20.jpg)
THANK YOU
![Page 21: CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.](https://reader036.fdocuments.net/reader036/viewer/2022062803/56649f345503460f94c51847/html5/thumbnails/21.jpg)