SlideShare une entreprise Scribd logo
1  sur  32
Télécharger pour lire hors ligne
What is Cryptography?




           Pratik Poddar
       Senior Undergraduate
  Computer Science and Engineering
            IIT Bombay

         23th February 2010
What is Cryptology?
Greek: “krypto” meaning hide

Study of: 1) Hiding data
2) Reading Hidden data
3) Signing data

Goals: 1) Authentication
2) Integrity
3) Non-repudiation
4) Confidentiality
Applications of Cryptography


1) ATM
2) Email - Passwords
3) E-payment
4) Electronic Voting
5) Securing Data
Basic Terminology
Encryption -> Plaintext to Ciphertext
Decryption -> Ciphertext to Plaintext
History of Cryptography
Greeks used Transposition Cipher
        “hello world” becomes
              “ehlol owrdl”
“Asimplese
                   ntenceoft
                   ransposit
                  ioncipher”

                  becomes

“Anri stao ienn mnsc pcpi leop eosh sfie ettr”
History of Cryptography

  Greeks used Substitution Cipher
“hello world” becomes “uryyb jbeyq”

26! (~ 30 digit number) keys possible
Caesar Cipher

Caesar Substitution Cipher with key 3
“hello world” becomes “khoor zruog”

          26 keys possible
th
  Statistical Attacks (9 century)
Frequency Analysis in 9th century

Armed with statistical knowledge about the
plaintext, one can easily break a monoalphabetic
substitution cipher:
Most frequent characters: e, t, o, a, n, i
Most frequent diagrams: th, in, er, re, an
Most frequent trigrams: the, ing, and, ion
Take the following example cipher text

BPMZM WVKM EIA IV COTG LCKSTQVO EQBP NMIBPMZA ITT
ABCJJG IVL JZWEV IVL BPM WBPMZ JQZLA AIQL QV AW UIVG
EWZLA OMB WCB WN BWEV OMB WCB, OMB WCB, OMB WCB
WN BWEV IVL PM EMVB EQBP I YCIKS IVL I EILLTM IVL I YCIKS
QV I NTCZZG WN MQLMZLWEV BPIB XWWZ TQBBTM COTG
LCKSTQVO EMVB EIVLMZQVO NIZ IVL VMIZ JCB IB MDMZG
XTIKM BPMG AIQL BW PQA NIKM VWE OMB WCB, OMB WCB,
OMB WCB WN PMZM IVL PM EMVB EQBP I YCIKS IVL I EILLTM
IVL I YCIKS IVL I DMZG CVPIXXG BMIZ

We need to compare the frequency distribution of this text with
standard English
Hence the key is probably equal to 8

We can now decrypt the cipher text to reveal:

There once was an ugly duckling With feathers all stubby and brown
And the other birds said in so many words Get out of town Get out,
get out, get out of town And he went with a quack and a waddle and
a quack In a flurry of eiderdown That poor little ugly duckling Went
wandering far and near But at every place they said to his face Now
get out, get out, get out of here And he went with a quack and a
waddle and a quack And a very unhappy tear
Poly-alphabetic Cipher (1467)

Use different ciphers (i.e., substitution alphabets)
          for various parts of a message

        The first automatic cipher device

             Frequency analysis fails
KILL HIM TONIGHT
      with key PRATIK

    KILL HIM TONIGHT
   PRAT IKP RATIKPR
 ------------------------------
ZZLE PSB KOGQQWK
Attack on Poly-Alphabetic Cipher



If period is known, individual frequency analysis
Kerchoff's Principle (1800s)
     Cryptography always involves:
      Transformation and Secret

Security of the key used should alone be
 sufficient for a good cipher to maintain
      confidentiality under an attack

     The enemy knows the system
Cryptography Machines (1900s)
                     Mechanical
                encryption/decryption
                      devices

              Rotor machines (electro-
                    mechanical)

               Enigma machine was used
               by the German government
              and military from the late 20s
                 and during World War II
Post WW2 Cryptography
1) Cryptography now on bits instead of letters
2) Academic Research began in 1970s
3) Computers helped Cryptography?
4) No more linguistic and lexicographic patterns,
but aspects of information theory, computational
complexity, statistics, combinatorics, abstract
algebra, number theory, and finite mathematics
“Modern cryptography is a remarkable discipline. It is a cornerstone
 of computer and communications security, with end products that
     are imminently practical. Yet its study touches on branches
  of mathematics that may have been considered esoteric, and it
brings together fields like number theory, computational-complexity
                    theory, and probability theory”
Block vs Stream

                Block Cipher
Message is broken into blocks, each of which is
               then encrypted

              Stream Cipher
Process the message bit by bit ( as a stream )
Symmetric Key Cryptosystem
Symmetric Key Algorithm - DES
Asymmetric Key Cryptosystem
Asymmetric Key Cryptosystem -
             Idea

Some modern cryptographic techniques can only
  keep their keys secret if certain mathematical
  problems are intractable, such as the integer
 factorization or the discrete logarithm problems
Designing Cipher

-- Little Secrets Hide Bigger Secrets
-- Open Algorithms and value of Peer-Review
-- Mathematical Background
-- Unbroken is Not Necessarily Unbreakable

What is a good encryption scheme?
1) Complexity of encrypting or decrypting
2) Unbreakable
3) Size of cipher-text relative to plaintext
4) Key exchange should be easy
Breaking Cipher
Weakness:

Length of the key      Quality of Random Source
Statistical Leaking    Faulty Implementation
Inadequate Peer-Review Social Engineering and Coercion

Attacks:

Brute-Force Attack         Frequency Analysis
Index of Coincidence       Linear Cryptanalysis
Differential Cryptanalysis Meet in the Middle Attack
Research and Education

-- Encryption Decryption Algorithms
-- Cryptanalysis
-- Mathematics
-- Proofs of cryptosystem
-- Key Exchange Protocols
-- Certificates
Work being done at IIT Bombay
Prof. Bernard Menezes and his 5-6 students

Contact:
Pratik Poddar
pratik.poddar@iitb.ac.in
pratik@cse.iitb.ac.in
(Topic: IBE and Elliptic-Curve Cryptography)
Thank You!

Contenu connexe

Tendances (20)

Overview of cryptography
Overview of cryptographyOverview of cryptography
Overview of cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Cryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie BrownCryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie Brown
 
Asymmetric Cryptography
Asymmetric CryptographyAsymmetric Cryptography
Asymmetric Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Intro to modern cryptography
Intro to modern cryptographyIntro to modern cryptography
Intro to modern cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementation
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography and applications
Cryptography and applicationsCryptography and applications
Cryptography and applications
 
Encryption algorithms
Encryption algorithmsEncryption algorithms
Encryption algorithms
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography - 101
Cryptography - 101Cryptography - 101
Cryptography - 101
 
Cryptography
CryptographyCryptography
Cryptography
 
Topic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesTopic1 substitution transposition-techniques
Topic1 substitution transposition-techniques
 

En vedette

Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securitypatisa
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and CryptographyAdam Reagan
 
Clipr rodinhood openhouse
Clipr rodinhood openhouseClipr rodinhood openhouse
Clipr rodinhood openhousePratik Poddar
 
Guide to wall street quant jobs for IITians
Guide to wall street quant jobs for IITiansGuide to wall street quant jobs for IITians
Guide to wall street quant jobs for IITiansPratik Poddar
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptographyRahulprasad Yadav
 
Digital Signature
Digital SignatureDigital Signature
Digital Signaturesaurav5884
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation finaladrigee12
 
Non-convex Optimization in Networks
Non-convex Optimization in NetworksNon-convex Optimization in Networks
Non-convex Optimization in NetworksPratik Poddar
 
Mat 140 Cryptology Day 2 Presentation
Mat 140 Cryptology Day 2 PresentationMat 140 Cryptology Day 2 Presentation
Mat 140 Cryptology Day 2 Presentationguestbc46fa
 

En vedette (20)

Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Cryptography
CryptographyCryptography
Cryptography
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
Cryptography Intro
Cryptography IntroCryptography Intro
Cryptography Intro
 
Encryption
EncryptionEncryption
Encryption
 
Clipr rodinhood openhouse
Clipr rodinhood openhouseClipr rodinhood openhouse
Clipr rodinhood openhouse
 
Guide to wall street quant jobs for IITians
Guide to wall street quant jobs for IITiansGuide to wall street quant jobs for IITians
Guide to wall street quant jobs for IITians
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptography
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation final
 
Clipr Introduction
Clipr IntroductionClipr Introduction
Clipr Introduction
 
Non-convex Optimization in Networks
Non-convex Optimization in NetworksNon-convex Optimization in Networks
Non-convex Optimization in Networks
 
Grad School101
Grad School101Grad School101
Grad School101
 
Network ssecurity toolkit
Network ssecurity toolkitNetwork ssecurity toolkit
Network ssecurity toolkit
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Mat 140 Cryptology Day 2 Presentation
Mat 140 Cryptology Day 2 PresentationMat 140 Cryptology Day 2 Presentation
Mat 140 Cryptology Day 2 Presentation
 
La cultura digitale
La cultura digitaleLa cultura digitale
La cultura digitale
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 

Similaire à What is Cryptography

Cryptography - A Brief History
Cryptography - A Brief HistoryCryptography - A Brief History
Cryptography - A Brief Historyprasenjeetd
 
Cryptography
CryptographyCryptography
Cryptographymilanmath
 
crypto-105058445051058480051448005540405
crypto-105058445051058480051448005540405crypto-105058445051058480051448005540405
crypto-105058445051058480051448005540405ukd789555
 
Mathematics Towards Elliptic Curve Cryptography-by Dr. R.Srinivasan
Mathematics Towards Elliptic Curve Cryptography-by Dr. R.SrinivasanMathematics Towards Elliptic Curve Cryptography-by Dr. R.Srinivasan
Mathematics Towards Elliptic Curve Cryptography-by Dr. R.Srinivasanmunicsaa
 
Introduction to Cryptography Part I
Introduction to Cryptography Part IIntroduction to Cryptography Part I
Introduction to Cryptography Part IMaksim Djackov
 
Security Systems for Digital Data
Security Systems for Digital DataSecurity Systems for Digital Data
Security Systems for Digital DataBernhard Hofer
 
Computer Security Chapter III.pdf
Computer Security Chapter III.pdfComputer Security Chapter III.pdf
Computer Security Chapter III.pdfHarrisentertainment
 
Introductory Lecture on Cryptography and Information Security
Introductory Lecture on Cryptography and Information SecurityIntroductory Lecture on Cryptography and Information Security
Introductory Lecture on Cryptography and Information SecurityBikramjit Sarkar, Ph.D.
 
Introduction to encryption
Introduction to encryptionIntroduction to encryption
Introduction to encryptionfaffyman
 
02 Information System Security
02  Information System Security02  Information System Security
02 Information System SecurityShu Shin
 
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETYCRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETYijcisjournal
 
Security Systems for Digital Data - Paper
Security Systems for Digital Data - PaperSecurity Systems for Digital Data - Paper
Security Systems for Digital Data - PaperBernhard Hofer
 
My cryptography
My cryptographyMy cryptography
My cryptographyNAVYA RAO
 
2. Stream Ciphers
2. Stream Ciphers2. Stream Ciphers
2. Stream CiphersSam Bowne
 
Cryptography Overview
Cryptography OverviewCryptography Overview
Cryptography OverviewColinShaw
 

Similaire à What is Cryptography (20)

Edward Schaefer
Edward SchaeferEdward Schaefer
Edward Schaefer
 
Cryptography - A Brief History
Cryptography - A Brief HistoryCryptography - A Brief History
Cryptography - A Brief History
 
Iss lecture 2
Iss lecture 2Iss lecture 2
Iss lecture 2
 
Cryptography
CryptographyCryptography
Cryptography
 
crypto-105058445051058480051448005540405
crypto-105058445051058480051448005540405crypto-105058445051058480051448005540405
crypto-105058445051058480051448005540405
 
Mathematics Towards Elliptic Curve Cryptography-by Dr. R.Srinivasan
Mathematics Towards Elliptic Curve Cryptography-by Dr. R.SrinivasanMathematics Towards Elliptic Curve Cryptography-by Dr. R.Srinivasan
Mathematics Towards Elliptic Curve Cryptography-by Dr. R.Srinivasan
 
Introduction to Cryptography Part I
Introduction to Cryptography Part IIntroduction to Cryptography Part I
Introduction to Cryptography Part I
 
Cns 1
Cns 1Cns 1
Cns 1
 
Security Systems for Digital Data
Security Systems for Digital DataSecurity Systems for Digital Data
Security Systems for Digital Data
 
Computer Security Chapter III.pdf
Computer Security Chapter III.pdfComputer Security Chapter III.pdf
Computer Security Chapter III.pdf
 
Introductory Lecture on Cryptography and Information Security
Introductory Lecture on Cryptography and Information SecurityIntroductory Lecture on Cryptography and Information Security
Introductory Lecture on Cryptography and Information Security
 
Introduction to encryption
Introduction to encryptionIntroduction to encryption
Introduction to encryption
 
02 Information System Security
02  Information System Security02  Information System Security
02 Information System Security
 
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETYCRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
 
Security Systems for Digital Data - Paper
Security Systems for Digital Data - PaperSecurity Systems for Digital Data - Paper
Security Systems for Digital Data - Paper
 
My cryptography
My cryptographyMy cryptography
My cryptography
 
Pavan
PavanPavan
Pavan
 
Cryptography
CryptographyCryptography
Cryptography
 
2. Stream Ciphers
2. Stream Ciphers2. Stream Ciphers
2. Stream Ciphers
 
Cryptography Overview
Cryptography OverviewCryptography Overview
Cryptography Overview
 

Dernier

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Dernier (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

What is Cryptography

  • 1. What is Cryptography? Pratik Poddar Senior Undergraduate Computer Science and Engineering IIT Bombay 23th February 2010
  • 2. What is Cryptology? Greek: “krypto” meaning hide Study of: 1) Hiding data 2) Reading Hidden data 3) Signing data Goals: 1) Authentication 2) Integrity 3) Non-repudiation 4) Confidentiality
  • 3. Applications of Cryptography 1) ATM 2) Email - Passwords 3) E-payment 4) Electronic Voting 5) Securing Data
  • 4. Basic Terminology Encryption -> Plaintext to Ciphertext Decryption -> Ciphertext to Plaintext
  • 5. History of Cryptography Greeks used Transposition Cipher “hello world” becomes “ehlol owrdl”
  • 6. “Asimplese ntenceoft ransposit ioncipher” becomes “Anri stao ienn mnsc pcpi leop eosh sfie ettr”
  • 7. History of Cryptography Greeks used Substitution Cipher “hello world” becomes “uryyb jbeyq” 26! (~ 30 digit number) keys possible
  • 8. Caesar Cipher Caesar Substitution Cipher with key 3 “hello world” becomes “khoor zruog” 26 keys possible
  • 9. th Statistical Attacks (9 century) Frequency Analysis in 9th century Armed with statistical knowledge about the plaintext, one can easily break a monoalphabetic substitution cipher: Most frequent characters: e, t, o, a, n, i Most frequent diagrams: th, in, er, re, an Most frequent trigrams: the, ing, and, ion
  • 10.
  • 11. Take the following example cipher text BPMZM WVKM EIA IV COTG LCKSTQVO EQBP NMIBPMZA ITT ABCJJG IVL JZWEV IVL BPM WBPMZ JQZLA AIQL QV AW UIVG EWZLA OMB WCB WN BWEV OMB WCB, OMB WCB, OMB WCB WN BWEV IVL PM EMVB EQBP I YCIKS IVL I EILLTM IVL I YCIKS QV I NTCZZG WN MQLMZLWEV BPIB XWWZ TQBBTM COTG LCKSTQVO EMVB EIVLMZQVO NIZ IVL VMIZ JCB IB MDMZG XTIKM BPMG AIQL BW PQA NIKM VWE OMB WCB, OMB WCB, OMB WCB WN PMZM IVL PM EMVB EQBP I YCIKS IVL I EILLTM IVL I YCIKS IVL I DMZG CVPIXXG BMIZ We need to compare the frequency distribution of this text with standard English
  • 12.
  • 13. Hence the key is probably equal to 8 We can now decrypt the cipher text to reveal: There once was an ugly duckling With feathers all stubby and brown And the other birds said in so many words Get out of town Get out, get out, get out of town And he went with a quack and a waddle and a quack In a flurry of eiderdown That poor little ugly duckling Went wandering far and near But at every place they said to his face Now get out, get out, get out of here And he went with a quack and a waddle and a quack And a very unhappy tear
  • 14. Poly-alphabetic Cipher (1467) Use different ciphers (i.e., substitution alphabets) for various parts of a message The first automatic cipher device Frequency analysis fails
  • 15. KILL HIM TONIGHT with key PRATIK KILL HIM TONIGHT PRAT IKP RATIKPR ------------------------------ ZZLE PSB KOGQQWK
  • 16. Attack on Poly-Alphabetic Cipher If period is known, individual frequency analysis
  • 17. Kerchoff's Principle (1800s) Cryptography always involves: Transformation and Secret Security of the key used should alone be sufficient for a good cipher to maintain confidentiality under an attack The enemy knows the system
  • 18. Cryptography Machines (1900s) Mechanical encryption/decryption devices Rotor machines (electro- mechanical) Enigma machine was used by the German government and military from the late 20s and during World War II
  • 19. Post WW2 Cryptography 1) Cryptography now on bits instead of letters 2) Academic Research began in 1970s 3) Computers helped Cryptography? 4) No more linguistic and lexicographic patterns, but aspects of information theory, computational complexity, statistics, combinatorics, abstract algebra, number theory, and finite mathematics
  • 20. “Modern cryptography is a remarkable discipline. It is a cornerstone of computer and communications security, with end products that are imminently practical. Yet its study touches on branches of mathematics that may have been considered esoteric, and it brings together fields like number theory, computational-complexity theory, and probability theory”
  • 21. Block vs Stream Block Cipher Message is broken into blocks, each of which is then encrypted Stream Cipher Process the message bit by bit ( as a stream )
  • 25.
  • 26. Asymmetric Key Cryptosystem - Idea Some modern cryptographic techniques can only keep their keys secret if certain mathematical problems are intractable, such as the integer factorization or the discrete logarithm problems
  • 27. Designing Cipher -- Little Secrets Hide Bigger Secrets -- Open Algorithms and value of Peer-Review -- Mathematical Background -- Unbroken is Not Necessarily Unbreakable What is a good encryption scheme?
  • 28. 1) Complexity of encrypting or decrypting 2) Unbreakable 3) Size of cipher-text relative to plaintext 4) Key exchange should be easy
  • 29. Breaking Cipher Weakness: Length of the key Quality of Random Source Statistical Leaking Faulty Implementation Inadequate Peer-Review Social Engineering and Coercion Attacks: Brute-Force Attack Frequency Analysis Index of Coincidence Linear Cryptanalysis Differential Cryptanalysis Meet in the Middle Attack
  • 30. Research and Education -- Encryption Decryption Algorithms -- Cryptanalysis -- Mathematics -- Proofs of cryptosystem -- Key Exchange Protocols -- Certificates
  • 31. Work being done at IIT Bombay Prof. Bernard Menezes and his 5-6 students Contact: Pratik Poddar pratik.poddar@iitb.ac.in pratik@cse.iitb.ac.in (Topic: IBE and Elliptic-Curve Cryptography)