SlideShare une entreprise Scribd logo
1  sur  110
Copyright IntelliPaat, All rights reserved
Cryptography
TUTORIAL
Copyright IntelliPaat, All rights reserved
Agenda
Copyright IntelliPaat, All rights reserved
Agenda
01 Introduction to Cryptography
Copyright IntelliPaat, All rights reserved
Agenda
02 Types of Cryptography
01 Introduction to Cryptography
Copyright IntelliPaat, All rights reserved
Agenda
02 Types of Cryptography
01 Introduction to Cryptography
03 Examples of Cryptography
Copyright IntelliPaat, All rights reserved
Agenda
02 Types of Cryptography
01 Introduction to Cryptography
03 Examples of Cryptography
04 Ethical Hacking Cryptography: Hands-on
Copyright Intellipaat. All rights reserved.
Introduction to
Cryptography
Copyright IntelliPaat, All rights reserved
Introduction to Cryptography
What is
Cryptography?
Copyright IntelliPaat, All rights reserved
Introduction to Cryptography
What is
Cryptography?
Cryptography is the study of the various processes which are
implemented to protect information and communications, through the
use of mathematical concepts and rule-based calculations
Copyright IntelliPaat, All rights reserved
Introduction to Cryptography
What is
Cryptography?
Cryptography is the study of the various processes which are
implemented to protect information and communications, through the
use of mathematical concepts and rule-based calculations
Data Mathematics Protected Data
Copyright IntelliPaat, All rights reserved
Introduction to Cryptography
Why do we need
Cryptography?
Copyright IntelliPaat, All rights reserved
Introduction to Cryptography
Why do we need
Cryptography?
Sender
Copyright IntelliPaat, All rights reserved
Introduction to Cryptography
Why do we need
Cryptography?
Sender
Copyright IntelliPaat, All rights reserved
Introduction to Cryptography
Why do we need
Cryptography?
Sender Recipient
Email
Copyright IntelliPaat, All rights reserved
Introduction to Cryptography
Why do we need
Cryptography?
Sender Recipient
Email
Copyright IntelliPaat, All rights reserved
Introduction to Cryptography
Why do we need
Cryptography?
Sender Recipient
Email
Intruder
Copyright IntelliPaat, All rights reserved
Introduction to Cryptography
Why do we need
Cryptography?
Sender Recipient
Email
Intruder
Copyright IntelliPaat, All rights reserved
Introduction to Cryptography
Why do we need
Cryptography?
Sender Recipient
Email
Intruder
Intruder is able to read
your data
Copyright IntelliPaat, All rights reserved
Introduction to Cryptography
Why do we need
Cryptography?
Sender Recipient
Email
Intruder
We need some method
to make this data
unreadable by the
intruder
Copyright IntelliPaat, All rights reserved
Introduction to Cryptography
Why do we need
Cryptography?
Sender Recipient
Email
We do this with
‘Encryption’
Copyright IntelliPaat, All rights reserved
Introduction to Cryptography
What is
Encryption?
Copyright IntelliPaat, All rights reserved
Introduction to Cryptography
What is
Encryption?
Encryption (enciphering) is a cryptographic process where we convert
plaintext or raw data to unintelligible information (cipher) by processing
the data with an algorithm
Copyright IntelliPaat, All rights reserved
Introduction to Cryptography
What is
Encryption?
Encryption (enciphering) is a cryptographic process where we convert
plaintext or raw data to unintelligible information (cipher) by processing
the data with an algorithm
Sender Recipient
Email
plaintext
Copyright IntelliPaat, All rights reserved
Introduction to Cryptography
What is
Encryption?
Encryption (enciphering) is a cryptographic process where we convert
plaintext or raw data to unintelligible information (cipher) by processing
the data with an algorithm
Sender Recipient
Email
cipher
Copyright IntelliPaat, All rights reserved
Introduction to Cryptography
What is
Encryption?
Encryption (enciphering) is a cryptographic process where we convert
plaintext or raw data to unintelligible information (cipher) by processing
the data with an algorithm
Sender Recipient
Email
cipher
Copyright IntelliPaat, All rights reserved
Introduction to Cryptography
What is
Decryption?
Decryption (deciphering) is a cryptographic process where we convert
cipher back to plaintext by processing the data with an algorithm
Sender Recipient
Email
plaintext
Copyright IntelliPaat, All rights reserved
Introduction to Cryptography
What is
Cryptanalysis?
Copyright IntelliPaat, All rights reserved
Introduction to Cryptography
What is
Cryptanalysis?
Cryptanalysis is the study of deciphering ciphers without knowledge of
the encryption technique
cipher plaintext
Copyright IntelliPaat, All rights reserved
Introduction to Cryptography
Security Goals
Copyright IntelliPaat, All rights reserved
Introduction to Cryptography
Security Goals
Confidentiality
Copyright IntelliPaat, All rights reserved
Introduction to Cryptography
Security Goals
Confidentiality
Integrity
Copyright IntelliPaat, All rights reserved
Introduction to Cryptography
Security Goals
Confidentiality
Integrity
Availability
Copyright Intellipaat. All rights reserved.
Types of
Cryptography
Copyright IntelliPaat, All rights reserved
Types of Cryptography
Private Key
Cryptography
Copyright IntelliPaat, All rights reserved
Types of Cryptography
Private Key
Cryptography
Private Key Cryptography (Symmetric Key Cryptography) uses a single
common key on the receiving and sending end
Copyright IntelliPaat, All rights reserved
Types of Cryptography
Private Key
Cryptography
Private Key Cryptography (Symmetric Key Cryptography) uses a single
common key on the receiving and sending end
Sender Recipient
Email
Copyright IntelliPaat, All rights reserved
Types of Cryptography
Private Key
Cryptography
Private Key Cryptography (Symmetric Key Cryptography) uses a single
common key on the receiving and sending end
Sender Recipient
Email
Copyright IntelliPaat, All rights reserved
Types of Cryptography
Private Key
Cryptography
Private Key Cryptography (Symmetric Key Cryptography) uses a single
common key on the receiving and sending end
Sender Recipient
Email
Copyright IntelliPaat, All rights reserved
Types of Cryptography
Private Key
Cryptography
Private Key Cryptography (Symmetric Key Cryptography) uses a single
common key on the receiving and sending end
Sender Recipient
Email
Copyright IntelliPaat, All rights reserved
Types of Cryptography
Public Key
Cryptography
Copyright IntelliPaat, All rights reserved
Types of Cryptography
Public Key
Cryptography
Public Key Cryptography (Asymmetric Key Cryptography) uses a non
secretive public key for encryption, and a secretive private key for
decryption
Sender Recipient
Email
Public Key Private Key
Copyright IntelliPaat, All rights reserved
Types of Cryptography
Public Key
Cryptography
Public Key Cryptography (Asymmetric Key Cryptography) uses a non
secretive public key for encryption, and a secretive private key for
decryption
Sender Recipient
Email
Private Key
Copyright IntelliPaat, All rights reserved
Types of Cryptography
Public Key
Cryptography
Public Key Cryptography (Asymmetric Key Cryptography) uses a non
secretive public key for encryption, and a secretive private key for
decryption
Sender Recipient
Email
Private Key
Copyright IntelliPaat, All rights reserved
Types of Cryptography
Public Key
Cryptography
Public Key Cryptography (Asymmetric Key Cryptography) uses a non
secretive public key for encryption, and a secretive private key for
decryption
Sender Recipient
Email
Copyright IntelliPaat, All rights reserved
Types of Cryptography
Public Key
Encryption
Vs
Private Key
Encryption
Public Key CryptographyPrivate Key Cryptography
Copyright IntelliPaat, All rights reserved
Types of Cryptography
Public Key
Encryption
Vs
Private Key
Encryption
Public Key CryptographyPrivate Key Cryptography
Single Key Required Two Keys Required
Copyright IntelliPaat, All rights reserved
Types of Cryptography
Public Key
Encryption
Vs
Private Key
Encryption
Public Key CryptographyPrivate Key Cryptography
Single Key Required Two Keys Required
Size of the cipher text is less
than equal to plaintext
Size of the cipher text is
greater than equal to plaintext
Copyright IntelliPaat, All rights reserved
Types of Cryptography
Public Key
Encryption
Vs
Private Key
Encryption
Public Key CryptographyPrivate Key Cryptography
Single Key Required Two Keys Required
Size of the cipher text is less
than equal to plaintext
Size of the cipher text is
greater than equal to plaintext
Fast Encryption, less resources Slow Encryption, high resources
Copyright IntelliPaat, All rights reserved
Types of Cryptography
Public Key
Encryption
Vs
Private Key
Encryption
Public Key CryptographyPrivate Key Cryptography
Single Key Required Two Keys Required
Size of the cipher text is less
than equal to plaintext
Size of the cipher text is
greater than equal to plaintext
Fast Encryption, less resources Slow Encryption, high resources
Used for large data Used for small data
Copyright IntelliPaat, All rights reserved
Types of Cryptography
Public Key
Encryption
Vs
Private Key
Encryption
Public Key CryptographyPrivate Key Cryptography
Single Key Required Two Keys Required
Size of the cipher text is less
than equal to plaintext
Size of the cipher text is
greater than equal to plaintext
Fast Encryption, less resources Slow Encryption, high resources
Used for large data Used for small data
Confidentiality
Confidentiality, Authenticity
and Non-Repudiation
Copyright IntelliPaat, All rights reserved
Types of Cryptography
Public Key
Encryption
Vs
Private Key
Encryption
Public Key CryptographyPrivate Key Cryptography
Single Key Required Two Keys Required
Size of the cipher text is less
than equal to plaintext
Size of the cipher text is
greater than equal to plaintext
Fast Encryption, less resources Slow Encryption, high resources
Used for large data Used for small data
Confidentiality
Confidentiality, Authenticity
and Non-Repudiation
Eg: 3DES, AES, DES and RC4
Eg: Diffie-Hellman, ECC, El
Gamal, DSA and RSA
Copyright IntelliPaat, All rights reserved
Types of Cryptography
Hash Functions
Copyright IntelliPaat, All rights reserved
Types of Cryptography
Hash Functions
Functions that convert plaintext into encrypted text are called hash
functions
Copyright IntelliPaat, All rights reserved
Types of Cryptography
Hash Functions
Functions that convert plaintext into encrypted text are called hash
functions
f( )=Plaintext Cipher
Copyright Intellipaat. All rights reserved.
Examples of
Cryptography
Copyright IntelliPaat, All rights reserved
Examples of Cryptography
Substitution:
Caesar Cipher
Copyright IntelliPaat, All rights reserved
Examples of Cryptography
Substitution:
Caesar Cipher
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Copyright IntelliPaat, All rights reserved
Examples of Cryptography
Substitution:
Caesar Cipher
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
FUN
Copyright IntelliPaat, All rights reserved
Examples of Cryptography
Substitution:
Caesar Cipher
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
FUN N = 3
Copyright IntelliPaat, All rights reserved
Examples of Cryptography
Substitution:
Caesar Cipher
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
FUN N = 3
Copyright IntelliPaat, All rights reserved
Examples of Cryptography
Substitution:
Caesar Cipher
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
FUN -> IXQ N = 3
Copyright IntelliPaat, All rights reserved
Examples of Cryptography
Substitution:
Caesar Cipher
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
FUN -> IXQ N = 3
By shifting the position of each alphabet forward by 3, we are able
to hide the original meaning of the word
Copyright IntelliPaat, All rights reserved
Examples of Cryptography
Transposition
Technique:
Rail-Fence Cipher
Copyright IntelliPaat, All rights reserved
Examples of Cryptography
Transposition
Technique:
Rail-Fence Cipher
HELLO FROM INTELLIPAAT
Copyright IntelliPaat, All rights reserved
Examples of Cryptography
Transposition
Technique:
Rail-Fence Cipher
HELLO FROM INTELLIPAAT
Copyright IntelliPaat, All rights reserved
Examples of Cryptography
Transposition
Technique:
Rail-Fence Cipher
HELLO FROM INTELLIPAAT
H
Copyright IntelliPaat, All rights reserved
Examples of Cryptography
Transposition
Technique:
Rail-Fence Cipher
HELLO FROM INTELLIPAAT
H
E
Copyright IntelliPaat, All rights reserved
Examples of Cryptography
Transposition
Technique:
Rail-Fence Cipher
HELLO FROM INTELLIPAAT
H L
E
Copyright IntelliPaat, All rights reserved
Examples of Cryptography
Transposition
Technique:
Rail-Fence Cipher
HELLO FROM INTELLIPAAT
H L O F O I T L I A T
E L R M N E L P A
Copyright IntelliPaat, All rights reserved
Examples of Cryptography
Transposition
Technique:
Rail-Fence Cipher
HELLO FROM INTELLIPAAT
H L O F O I T L I A T
E L R M N E L P A
HLOFOITLIATELRMNELPA
Copyright IntelliPaat, All rights reserved
Examples of Cryptography
Transposition
Technique:
Rail-Fence Cipher
HELLO FROM INTELLIPAAT
H L O F O I T L I A T
E L R M N E L P A
HLOFOITLIATELRMNELPA
Since the position of the letters have been changed, this is called a
Transpositional Technique
Copyright IntelliPaat, All rights reserved
Examples of Cryptography
Steganography
Copyright IntelliPaat, All rights reserved
Examples of Cryptography
Steganography
Steganography is the technique of hiding secret data within ordinary
files or messages
Copyright IntelliPaat, All rights reserved
Examples of Cryptography
Steganography
Steganography is the technique of hiding secret data within ordinary
files or messages
Data
Copyright IntelliPaat, All rights reserved
Examples of Cryptography
Steganography
Steganography is the technique of hiding secret data within ordinary
files or messages
Data
Image file
Copyright IntelliPaat, All rights reserved
Examples of Cryptography
Steganography
Steganography is the technique of hiding secret data within ordinary
files or messages
Data
Image file
Copyright IntelliPaat, All rights reserved
Examples of Cryptography
One Time Pad
(Vernam Cipher)
Copyright IntelliPaat, All rights reserved
Examples of Cryptography
One Time Pad
(Vernam Cipher)
This is called the ‘One Time’ Pad because the key is uniquely generated
for each new data transfer or communication instance, and is only valid
once
Copyright IntelliPaat, All rights reserved
Examples of Cryptography
One Time Pad
(Vernam Cipher)
This is called the ‘One Time’ Pad because the key is uniquely generated
for each new data transfer or communication instance, and is only valid
once
H E L L O
Copyright IntelliPaat, All rights reserved
Examples of Cryptography
One Time Pad
(Vernam Cipher)
This is called the ‘One Time’ Pad because the key is uniquely generated
for each new data transfer or communication instance, and is only valid
once
H E L L O
8 5 12 12 15
Copyright IntelliPaat, All rights reserved
Examples of Cryptography
One Time Pad
(Vernam Cipher)
This is called the ‘One Time’ Pad because the key is uniquely generated
for each new data transfer or communication instance, and is only valid
once
H E L L O
8 5 12 12 15
b x l k d
2 24 12 11 4
Copyright IntelliPaat, All rights reserved
Examples of Cryptography
One Time Pad
(Vernam Cipher)
This is called the ‘One Time’ Pad because the key is uniquely generated
for each new data transfer or communication instance, and is only valid
once
H E L L O
8 5 12 12 15
b x l k d
2 24 12 11 4
Copyright IntelliPaat, All rights reserved
Examples of Cryptography
One Time Pad
(Vernam Cipher)
This is called the ‘One Time’ Pad because the key is uniquely generated
for each new data transfer or communication instance, and is only valid
once
H E L L O
8 5 12 12 15
b x l k d
2 24 12 11 4
10 29 24 23 19
Copyright IntelliPaat, All rights reserved
Examples of Cryptography
One Time Pad
(Vernam Cipher)
This is called the ‘One Time’ Pad because the key is uniquely generated
for each new data transfer or communication instance, and is only valid
once
H E L L O
b x l k d
( 10 29 24 23 19 ) % 26
10 3 24 23 19
Copyright IntelliPaat, All rights reserved
Examples of Cryptography
One Time Pad
(Vernam Cipher)
This is called the ‘One Time’ Pad because the key is uniquely generated
for each new data transfer or communication instance, and is only valid
once
H E L L O
b x l k d
( 10 29 24 23 19 ) % 26
10 3 24 23 19
J C X W S
Copyright IntelliPaat, All rights reserved
Examples of Cryptography
One Time Pad
(Vernam Cipher)
This is called the ‘One Time’ Pad because the key is uniquely generated
for each new data transfer or communication instance, and is only valid
once
H E L L O
b x l k d
( 10 29 24 23 19 ) % 26
10 3 24 23 19
J C X W S
Copyright IntelliPaat, All rights reserved
Examples of Cryptography
One Time Pad
(Vernam Cipher)
This is called the ‘One Time’ Pad because the key is uniquely generated
for each new data transfer or communication instance, and is only valid
once
H E L L O
b x l k d
( 10 29 24 23 19 ) % 26
10 3 24 23 19
J C X W S
Cipher
Copyright IntelliPaat, All rights reserved
Examples of Cryptography
Symmetric:
DES
(Data Encryption
Standard)
Copyright IntelliPaat, All rights reserved
Examples of Cryptography
Symmetric:
DES
(Data Encryption
Standard)
The Data Encryption Standard (DES) is a symmetric-key block cipher
published by the National Institute of Standards and Technology (NIST)
Copyright IntelliPaat, All rights reserved
Examples of Cryptography
Symmetric:
DES
(Data Encryption
Standard)
Initial Permutation
Round 1
Round 2
Round 16
Final Permutation
RoundKeyGenerator
64 bit Plaintext
64 bit Cipher
.
.
.
56 bit cipher key
Copyright IntelliPaat, All rights reserved
Examples of Cryptography
DES
(Data Encryption
Standard)
Advantages
Copyright IntelliPaat, All rights reserved
Examples of Cryptography
DES
(Data Encryption
Standard)
Advantages
Each small change in plaintext drastically affects the cipher
Copyright IntelliPaat, All rights reserved
Examples of Cryptography
DES
(Data Encryption
Standard)
Advantages
Each small change in plaintext drastically affects the cipher
Each cipher bit depends on several bits of plaintext
Copyright IntelliPaat, All rights reserved
Examples of Cryptography
Asymmetric:
RSA
(Rivest–Shamir–
Adleman)
Copyright IntelliPaat, All rights reserved
Examples of Cryptography
Asymmetric:
RSA
(Rivest–Shamir–
Adleman)
RSA is an asymmetric cryptography algorithm which requires two keys,
private, and public
Any two prime numbers : p & q
N = p * q
e is a derived number greater than 1 and less than
(q-1)(p-1). There should be no common factor for e and (q-
1)(p-1)
The public key is (N,e)
Copyright IntelliPaat, All rights reserved
Examples of Cryptography
Asymmetric:
RSA
(Rivest–Shamir–
Adleman)
RSA is an asymmetric cryptography algorithm which requires two keys,
private, and public
The private key is d
Calculate d when: ed = 1 mod (p-1)(q-1)
Encryption formula is Cipher = Plaintext * e mod N
Decryption formula is Plaintext = Cipher * d mod N
Copyright IntelliPaat, All rights reserved
Examples of Cryptography
Password Storage
Method
Copyright IntelliPaat, All rights reserved
Examples of Cryptography
Password Storage
Method
You create an account on a website
Copyright IntelliPaat, All rights reserved
Examples of Cryptography
Password Storage
Method
You create an account on a website
(username, password)
Copyright IntelliPaat, All rights reserved
Examples of Cryptography
Password Storage
Method
You create an account on a website
(username, password)
f(password) =
Encrypted Password
Copyright IntelliPaat, All rights reserved
Examples of Cryptography
Password Storage
Method
You create an account on a website
(username, password)
f(password) =
Encrypted Password
Encrypted Password stored in
website user database!
Copyright IntelliPaat, All rights reserved
Examples of Cryptography
Password Storage
Method
You create an account on a website
(username, password)
f(password) =
Encrypted Password
Encrypted Password stored in
website user database!
Copyright IntelliPaat, All rights reserved
Examples of Cryptography
Password Storage
Method
You log into the website later
Copyright IntelliPaat, All rights reserved
Examples of Cryptography
Password Storage
Method
You log into the website later
(username, password)
Copyright IntelliPaat, All rights reserved
Examples of Cryptography
Password Storage
Method
You log into the website later
(username, password)
f(password) =
Encrypted Password
Copyright IntelliPaat, All rights reserved
Examples of Cryptography
Password Storage
Method
You log into the website later
(username, password)
f(password) =
Encrypted Password
Encrypted Password compared
with the one in the database for
your username
Copyright IntelliPaat, All rights reserved
Examples of Cryptography
Password Storage
Method
You log into the website later
(username, password)
f(password) =
Encrypted Password
Encrypted Password compared
with the one in the database for
your username
If it’s a match, you successfully
log into your account!
Copyright IntelliPaat, All rights reserved
Examples of Cryptography
Password Storage
Method
Even if an attacker gains access to the user database, the attacker can’t
gain access to your account as the password in the database isn’t in
plaintext format!
f(Encrypted Password) =
Something Entirely Different
f(password) =
Encrypted Password
Copyright Intellipaat. All rights reserved.
Cryptography Demo
Copyright Intellipaat. All rights reserved.
India: +91-7847955955
US: 1-800-216-8930 (TOLL FREE)
support@intellipaat.com
24/7 Chat with Our Course Advisor
sales@intellipaat.com

Contenu connexe

Tendances

SL_Long Beach_Creative Artists_12_04_2015
SL_Long Beach_Creative Artists_12_04_2015SL_Long Beach_Creative Artists_12_04_2015
SL_Long Beach_Creative Artists_12_04_2015
Jon Papp
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Manas Das
 
Advanced Persistent Threat: come muoversi tra il marketing e la realtà?
Advanced Persistent Threat: come muoversi tra il marketing e la realtà?Advanced Persistent Threat: come muoversi tra il marketing e la realtà?
Advanced Persistent Threat: come muoversi tra il marketing e la realtà?
festival ICT 2016
 

Tendances (20)

Fixing the Last Missing Piece in Securing IoT
Fixing the Last Missing Piece in Securing IoTFixing the Last Missing Piece in Securing IoT
Fixing the Last Missing Piece in Securing IoT
 
Complete Ethical Hacking Course | Ethical Hacking Training for Beginners | Ed...
Complete Ethical Hacking Course | Ethical Hacking Training for Beginners | Ed...Complete Ethical Hacking Course | Ethical Hacking Training for Beginners | Ed...
Complete Ethical Hacking Course | Ethical Hacking Training for Beginners | Ed...
 
Python-Assisted Red-Teaming Operation
Python-Assisted Red-Teaming OperationPython-Assisted Red-Teaming Operation
Python-Assisted Red-Teaming Operation
 
SL_Long Beach_Creative Artists_12_04_2015
SL_Long Beach_Creative Artists_12_04_2015SL_Long Beach_Creative Artists_12_04_2015
SL_Long Beach_Creative Artists_12_04_2015
 
IOT Security FUN-damental
IOT Security FUN-damentalIOT Security FUN-damental
IOT Security FUN-damental
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Advanced Persistent Threat: come muoversi tra il marketing e la realtà?
Advanced Persistent Threat: come muoversi tra il marketing e la realtà?Advanced Persistent Threat: come muoversi tra il marketing e la realtà?
Advanced Persistent Threat: come muoversi tra il marketing e la realtà?
 
Architectural Patterns in IoT Cloud Platforms
Architectural Patterns in IoT Cloud PlatformsArchitectural Patterns in IoT Cloud Platforms
Architectural Patterns in IoT Cloud Platforms
 
Down The Rabbit Hole, From Networker to Security Professional
Down The Rabbit Hole, From Networker to Security ProfessionalDown The Rabbit Hole, From Networker to Security Professional
Down The Rabbit Hole, From Networker to Security Professional
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
KazHackStan Doing The IoT Penetration Testing - Yogesh Ojha
KazHackStan Doing The IoT Penetration Testing - Yogesh OjhaKazHackStan Doing The IoT Penetration Testing - Yogesh Ojha
KazHackStan Doing The IoT Penetration Testing - Yogesh Ojha
 
TSTAS, the Life of a Splunk Trainer and using DevOps in Splunk Development
TSTAS, the Life of a Splunk Trainer and using DevOps in Splunk DevelopmentTSTAS, the Life of a Splunk Trainer and using DevOps in Splunk Development
TSTAS, the Life of a Splunk Trainer and using DevOps in Splunk Development
 
501 ch 6 threats vulnerabilities and common attacks
501 ch 6 threats vulnerabilities and common attacks501 ch 6 threats vulnerabilities and common attacks
501 ch 6 threats vulnerabilities and common attacks
 
How to Stop Cyber Attacks Using Adaptive Authentication
How to Stop Cyber Attacks Using Adaptive AuthenticationHow to Stop Cyber Attacks Using Adaptive Authentication
How to Stop Cyber Attacks Using Adaptive Authentication
 
Anatomy of the Compromised Insider
Anatomy of the Compromised InsiderAnatomy of the Compromised Insider
Anatomy of the Compromised Insider
 
Learn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | Edureka
Learn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | EdurekaLearn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | Edureka
Learn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | Edureka
 
Jim Wojno: Incident Response - No Pain, No Gain!
Jim Wojno: Incident Response - No Pain, No Gain!Jim Wojno: Incident Response - No Pain, No Gain!
Jim Wojno: Incident Response - No Pain, No Gain!
 
Information Security Lesson 2 - Attackers and Attacks - Eric Vanderburg
Information Security Lesson 2 - Attackers and Attacks - Eric VanderburgInformation Security Lesson 2 - Attackers and Attacks - Eric Vanderburg
Information Security Lesson 2 - Attackers and Attacks - Eric Vanderburg
 
Hunting Hard & Failing Fast (ScotSoft 2019)
Hunting Hard & Failing Fast (ScotSoft 2019)Hunting Hard & Failing Fast (ScotSoft 2019)
Hunting Hard & Failing Fast (ScotSoft 2019)
 

Similaire à Cryptography Tutorial

PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
vinitajain703
 
Cryptography intro
Cryptography introCryptography intro
Cryptography intro
ismaelhaider
 
Symmetric key encryption
Symmetric key encryptionSymmetric key encryption
Symmetric key encryption
mdhar123
 
Cscu module 04 data encryption
Cscu module 04 data encryptionCscu module 04 data encryption
Cscu module 04 data encryption
Sejahtera Affif
 

Similaire à Cryptography Tutorial (20)

PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
 
Presentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHYPresentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHY
 
cryptography ppt free download
cryptography ppt free downloadcryptography ppt free download
cryptography ppt free download
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.pptPresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
 
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.pptCRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
 
Data encryption
Data encryptionData encryption
Data encryption
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cryptography intro
Cryptography introCryptography intro
Cryptography intro
 
Marco Casassa Mont: Pki overview
Marco Casassa Mont: Pki overviewMarco Casassa Mont: Pki overview
Marco Casassa Mont: Pki overview
 
Symmetric key encryption
Symmetric key encryptionSymmetric key encryption
Symmetric key encryption
 
Encriptacion
EncriptacionEncriptacion
Encriptacion
 
Encriptacion
EncriptacionEncriptacion
Encriptacion
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01
 
Cscu module 04 data encryption
Cscu module 04 data encryptionCscu module 04 data encryption
Cscu module 04 data encryption
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Encriptacion
EncriptacionEncriptacion
Encriptacion
 
Cryptography, a science of secure writing
Cryptography, a science of secure writingCryptography, a science of secure writing
Cryptography, a science of secure writing
 

Plus de Intellipaat

Plus de Intellipaat (20)

Business analyst job description key roles | Business Analyst Roles
Business analyst job description key roles | Business Analyst RolesBusiness analyst job description key roles | Business Analyst Roles
Business analyst job description key roles | Business Analyst Roles
 
Agile Business Analyst Responsibilities
Agile Business Analyst ResponsibilitiesAgile Business Analyst Responsibilities
Agile Business Analyst Responsibilities
 
Voice search optimization | How to Optimize Your Website For Voice Search
Voice search optimization | How to Optimize Your Website For Voice SearchVoice search optimization | How to Optimize Your Website For Voice Search
Voice search optimization | How to Optimize Your Website For Voice Search
 
Functional testing vs non functional testing | Difference Between Functional ...
Functional testing vs non functional testing | Difference Between Functional ...Functional testing vs non functional testing | Difference Between Functional ...
Functional testing vs non functional testing | Difference Between Functional ...
 
How to start your career as a software engineer
How to start your career as a software engineer How to start your career as a software engineer
How to start your career as a software engineer
 
First programming language to learn | Which Programming Language to Learn Fi...
First programming language to learn |  Which Programming Language to Learn Fi...First programming language to learn |  Which Programming Language to Learn Fi...
First programming language to learn | Which Programming Language to Learn Fi...
 
How to Grow Facebook Followers | How to Increase Facebook Followers quickly
How to Grow Facebook Followers | How to Increase Facebook Followers quickly How to Grow Facebook Followers | How to Increase Facebook Followers quickly
How to Grow Facebook Followers | How to Increase Facebook Followers quickly
 
Phishing For Beginners | Phishing Tutorial | What is Phishing | Intellipaat
Phishing For Beginners | Phishing Tutorial | What is Phishing | IntellipaatPhishing For Beginners | Phishing Tutorial | What is Phishing | Intellipaat
Phishing For Beginners | Phishing Tutorial | What is Phishing | Intellipaat
 
How Edge Computing Works | What is Edge Computing | Edge Computing Benefits |...
How Edge Computing Works | What is Edge Computing | Edge Computing Benefits |...How Edge Computing Works | What is Edge Computing | Edge Computing Benefits |...
How Edge Computing Works | What is Edge Computing | Edge Computing Benefits |...
 
How To Become Cyber Security Engineer | Cyber Security Career | Cyber Securit...
How To Become Cyber Security Engineer | Cyber Security Career | Cyber Securit...How To Become Cyber Security Engineer | Cyber Security Career | Cyber Securit...
How To Become Cyber Security Engineer | Cyber Security Career | Cyber Securit...
 
White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...
White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...
White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...
 
AWS Amplify | AWS Amplify Tutorial | What is AWS Amplify | AWS Amplify Datast...
AWS Amplify | AWS Amplify Tutorial | What is AWS Amplify | AWS Amplify Datast...AWS Amplify | AWS Amplify Tutorial | What is AWS Amplify | AWS Amplify Datast...
AWS Amplify | AWS Amplify Tutorial | What is AWS Amplify | AWS Amplify Datast...
 
Data Science Engineer Resume | Data Scientist Resume | Data Science Resume Ti...
Data Science Engineer Resume | Data Scientist Resume | Data Science Resume Ti...Data Science Engineer Resume | Data Scientist Resume | Data Science Resume Ti...
Data Science Engineer Resume | Data Scientist Resume | Data Science Resume Ti...
 
How to Become Data Architect | Data Architect Roles and Responsibilities | In...
How to Become Data Architect | Data Architect Roles and Responsibilities | In...How to Become Data Architect | Data Architect Roles and Responsibilities | In...
How to Become Data Architect | Data Architect Roles and Responsibilities | In...
 
Tableau vs Excel | Difference Between Tableau vs Excel | Excel vs Tableau | I...
Tableau vs Excel | Difference Between Tableau vs Excel | Excel vs Tableau | I...Tableau vs Excel | Difference Between Tableau vs Excel | Excel vs Tableau | I...
Tableau vs Excel | Difference Between Tableau vs Excel | Excel vs Tableau | I...
 
Data Architect Salary in India | Factors Affecting Data Architect Salary |Dat...
Data Architect Salary in India | Factors Affecting Data Architect Salary |Dat...Data Architect Salary in India | Factors Affecting Data Architect Salary |Dat...
Data Architect Salary in India | Factors Affecting Data Architect Salary |Dat...
 
Importance of digital marketing
Importance of digital marketingImportance of digital marketing
Importance of digital marketing
 
Azure Data Engineer Certification | How to Become Azure Data Engineer
Azure Data Engineer Certification | How to Become Azure Data EngineerAzure Data Engineer Certification | How to Become Azure Data Engineer
Azure Data Engineer Certification | How to Become Azure Data Engineer
 
Salesforce Admin Certification | Salesforce Developer Certification | Intelli...
Salesforce Admin Certification | Salesforce Developer Certification | Intelli...Salesforce Admin Certification | Salesforce Developer Certification | Intelli...
Salesforce Admin Certification | Salesforce Developer Certification | Intelli...
 
What is RPA?
What is RPA?What is RPA?
What is RPA?
 

Dernier

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Dernier (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 

Cryptography Tutorial

  • 1. Copyright IntelliPaat, All rights reserved Cryptography TUTORIAL
  • 2. Copyright IntelliPaat, All rights reserved Agenda
  • 3. Copyright IntelliPaat, All rights reserved Agenda 01 Introduction to Cryptography
  • 4. Copyright IntelliPaat, All rights reserved Agenda 02 Types of Cryptography 01 Introduction to Cryptography
  • 5. Copyright IntelliPaat, All rights reserved Agenda 02 Types of Cryptography 01 Introduction to Cryptography 03 Examples of Cryptography
  • 6. Copyright IntelliPaat, All rights reserved Agenda 02 Types of Cryptography 01 Introduction to Cryptography 03 Examples of Cryptography 04 Ethical Hacking Cryptography: Hands-on
  • 7. Copyright Intellipaat. All rights reserved. Introduction to Cryptography
  • 8. Copyright IntelliPaat, All rights reserved Introduction to Cryptography What is Cryptography?
  • 9. Copyright IntelliPaat, All rights reserved Introduction to Cryptography What is Cryptography? Cryptography is the study of the various processes which are implemented to protect information and communications, through the use of mathematical concepts and rule-based calculations
  • 10. Copyright IntelliPaat, All rights reserved Introduction to Cryptography What is Cryptography? Cryptography is the study of the various processes which are implemented to protect information and communications, through the use of mathematical concepts and rule-based calculations Data Mathematics Protected Data
  • 11. Copyright IntelliPaat, All rights reserved Introduction to Cryptography Why do we need Cryptography?
  • 12. Copyright IntelliPaat, All rights reserved Introduction to Cryptography Why do we need Cryptography? Sender
  • 13. Copyright IntelliPaat, All rights reserved Introduction to Cryptography Why do we need Cryptography? Sender
  • 14. Copyright IntelliPaat, All rights reserved Introduction to Cryptography Why do we need Cryptography? Sender Recipient Email
  • 15. Copyright IntelliPaat, All rights reserved Introduction to Cryptography Why do we need Cryptography? Sender Recipient Email
  • 16. Copyright IntelliPaat, All rights reserved Introduction to Cryptography Why do we need Cryptography? Sender Recipient Email Intruder
  • 17. Copyright IntelliPaat, All rights reserved Introduction to Cryptography Why do we need Cryptography? Sender Recipient Email Intruder
  • 18. Copyright IntelliPaat, All rights reserved Introduction to Cryptography Why do we need Cryptography? Sender Recipient Email Intruder Intruder is able to read your data
  • 19. Copyright IntelliPaat, All rights reserved Introduction to Cryptography Why do we need Cryptography? Sender Recipient Email Intruder We need some method to make this data unreadable by the intruder
  • 20. Copyright IntelliPaat, All rights reserved Introduction to Cryptography Why do we need Cryptography? Sender Recipient Email We do this with ‘Encryption’
  • 21. Copyright IntelliPaat, All rights reserved Introduction to Cryptography What is Encryption?
  • 22. Copyright IntelliPaat, All rights reserved Introduction to Cryptography What is Encryption? Encryption (enciphering) is a cryptographic process where we convert plaintext or raw data to unintelligible information (cipher) by processing the data with an algorithm
  • 23. Copyright IntelliPaat, All rights reserved Introduction to Cryptography What is Encryption? Encryption (enciphering) is a cryptographic process where we convert plaintext or raw data to unintelligible information (cipher) by processing the data with an algorithm Sender Recipient Email plaintext
  • 24. Copyright IntelliPaat, All rights reserved Introduction to Cryptography What is Encryption? Encryption (enciphering) is a cryptographic process where we convert plaintext or raw data to unintelligible information (cipher) by processing the data with an algorithm Sender Recipient Email cipher
  • 25. Copyright IntelliPaat, All rights reserved Introduction to Cryptography What is Encryption? Encryption (enciphering) is a cryptographic process where we convert plaintext or raw data to unintelligible information (cipher) by processing the data with an algorithm Sender Recipient Email cipher
  • 26. Copyright IntelliPaat, All rights reserved Introduction to Cryptography What is Decryption? Decryption (deciphering) is a cryptographic process where we convert cipher back to plaintext by processing the data with an algorithm Sender Recipient Email plaintext
  • 27. Copyright IntelliPaat, All rights reserved Introduction to Cryptography What is Cryptanalysis?
  • 28. Copyright IntelliPaat, All rights reserved Introduction to Cryptography What is Cryptanalysis? Cryptanalysis is the study of deciphering ciphers without knowledge of the encryption technique cipher plaintext
  • 29. Copyright IntelliPaat, All rights reserved Introduction to Cryptography Security Goals
  • 30. Copyright IntelliPaat, All rights reserved Introduction to Cryptography Security Goals Confidentiality
  • 31. Copyright IntelliPaat, All rights reserved Introduction to Cryptography Security Goals Confidentiality Integrity
  • 32. Copyright IntelliPaat, All rights reserved Introduction to Cryptography Security Goals Confidentiality Integrity Availability
  • 33. Copyright Intellipaat. All rights reserved. Types of Cryptography
  • 34. Copyright IntelliPaat, All rights reserved Types of Cryptography Private Key Cryptography
  • 35. Copyright IntelliPaat, All rights reserved Types of Cryptography Private Key Cryptography Private Key Cryptography (Symmetric Key Cryptography) uses a single common key on the receiving and sending end
  • 36. Copyright IntelliPaat, All rights reserved Types of Cryptography Private Key Cryptography Private Key Cryptography (Symmetric Key Cryptography) uses a single common key on the receiving and sending end Sender Recipient Email
  • 37. Copyright IntelliPaat, All rights reserved Types of Cryptography Private Key Cryptography Private Key Cryptography (Symmetric Key Cryptography) uses a single common key on the receiving and sending end Sender Recipient Email
  • 38. Copyright IntelliPaat, All rights reserved Types of Cryptography Private Key Cryptography Private Key Cryptography (Symmetric Key Cryptography) uses a single common key on the receiving and sending end Sender Recipient Email
  • 39. Copyright IntelliPaat, All rights reserved Types of Cryptography Private Key Cryptography Private Key Cryptography (Symmetric Key Cryptography) uses a single common key on the receiving and sending end Sender Recipient Email
  • 40. Copyright IntelliPaat, All rights reserved Types of Cryptography Public Key Cryptography
  • 41. Copyright IntelliPaat, All rights reserved Types of Cryptography Public Key Cryptography Public Key Cryptography (Asymmetric Key Cryptography) uses a non secretive public key for encryption, and a secretive private key for decryption Sender Recipient Email Public Key Private Key
  • 42. Copyright IntelliPaat, All rights reserved Types of Cryptography Public Key Cryptography Public Key Cryptography (Asymmetric Key Cryptography) uses a non secretive public key for encryption, and a secretive private key for decryption Sender Recipient Email Private Key
  • 43. Copyright IntelliPaat, All rights reserved Types of Cryptography Public Key Cryptography Public Key Cryptography (Asymmetric Key Cryptography) uses a non secretive public key for encryption, and a secretive private key for decryption Sender Recipient Email Private Key
  • 44. Copyright IntelliPaat, All rights reserved Types of Cryptography Public Key Cryptography Public Key Cryptography (Asymmetric Key Cryptography) uses a non secretive public key for encryption, and a secretive private key for decryption Sender Recipient Email
  • 45. Copyright IntelliPaat, All rights reserved Types of Cryptography Public Key Encryption Vs Private Key Encryption Public Key CryptographyPrivate Key Cryptography
  • 46. Copyright IntelliPaat, All rights reserved Types of Cryptography Public Key Encryption Vs Private Key Encryption Public Key CryptographyPrivate Key Cryptography Single Key Required Two Keys Required
  • 47. Copyright IntelliPaat, All rights reserved Types of Cryptography Public Key Encryption Vs Private Key Encryption Public Key CryptographyPrivate Key Cryptography Single Key Required Two Keys Required Size of the cipher text is less than equal to plaintext Size of the cipher text is greater than equal to plaintext
  • 48. Copyright IntelliPaat, All rights reserved Types of Cryptography Public Key Encryption Vs Private Key Encryption Public Key CryptographyPrivate Key Cryptography Single Key Required Two Keys Required Size of the cipher text is less than equal to plaintext Size of the cipher text is greater than equal to plaintext Fast Encryption, less resources Slow Encryption, high resources
  • 49. Copyright IntelliPaat, All rights reserved Types of Cryptography Public Key Encryption Vs Private Key Encryption Public Key CryptographyPrivate Key Cryptography Single Key Required Two Keys Required Size of the cipher text is less than equal to plaintext Size of the cipher text is greater than equal to plaintext Fast Encryption, less resources Slow Encryption, high resources Used for large data Used for small data
  • 50. Copyright IntelliPaat, All rights reserved Types of Cryptography Public Key Encryption Vs Private Key Encryption Public Key CryptographyPrivate Key Cryptography Single Key Required Two Keys Required Size of the cipher text is less than equal to plaintext Size of the cipher text is greater than equal to plaintext Fast Encryption, less resources Slow Encryption, high resources Used for large data Used for small data Confidentiality Confidentiality, Authenticity and Non-Repudiation
  • 51. Copyright IntelliPaat, All rights reserved Types of Cryptography Public Key Encryption Vs Private Key Encryption Public Key CryptographyPrivate Key Cryptography Single Key Required Two Keys Required Size of the cipher text is less than equal to plaintext Size of the cipher text is greater than equal to plaintext Fast Encryption, less resources Slow Encryption, high resources Used for large data Used for small data Confidentiality Confidentiality, Authenticity and Non-Repudiation Eg: 3DES, AES, DES and RC4 Eg: Diffie-Hellman, ECC, El Gamal, DSA and RSA
  • 52. Copyright IntelliPaat, All rights reserved Types of Cryptography Hash Functions
  • 53. Copyright IntelliPaat, All rights reserved Types of Cryptography Hash Functions Functions that convert plaintext into encrypted text are called hash functions
  • 54. Copyright IntelliPaat, All rights reserved Types of Cryptography Hash Functions Functions that convert plaintext into encrypted text are called hash functions f( )=Plaintext Cipher
  • 55. Copyright Intellipaat. All rights reserved. Examples of Cryptography
  • 56. Copyright IntelliPaat, All rights reserved Examples of Cryptography Substitution: Caesar Cipher
  • 57. Copyright IntelliPaat, All rights reserved Examples of Cryptography Substitution: Caesar Cipher A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
  • 58. Copyright IntelliPaat, All rights reserved Examples of Cryptography Substitution: Caesar Cipher A B C D E F G H I J K L M N O P Q R S T U V W X Y Z FUN
  • 59. Copyright IntelliPaat, All rights reserved Examples of Cryptography Substitution: Caesar Cipher A B C D E F G H I J K L M N O P Q R S T U V W X Y Z FUN N = 3
  • 60. Copyright IntelliPaat, All rights reserved Examples of Cryptography Substitution: Caesar Cipher A B C D E F G H I J K L M N O P Q R S T U V W X Y Z FUN N = 3
  • 61. Copyright IntelliPaat, All rights reserved Examples of Cryptography Substitution: Caesar Cipher A B C D E F G H I J K L M N O P Q R S T U V W X Y Z FUN -> IXQ N = 3
  • 62. Copyright IntelliPaat, All rights reserved Examples of Cryptography Substitution: Caesar Cipher A B C D E F G H I J K L M N O P Q R S T U V W X Y Z FUN -> IXQ N = 3 By shifting the position of each alphabet forward by 3, we are able to hide the original meaning of the word
  • 63. Copyright IntelliPaat, All rights reserved Examples of Cryptography Transposition Technique: Rail-Fence Cipher
  • 64. Copyright IntelliPaat, All rights reserved Examples of Cryptography Transposition Technique: Rail-Fence Cipher HELLO FROM INTELLIPAAT
  • 65. Copyright IntelliPaat, All rights reserved Examples of Cryptography Transposition Technique: Rail-Fence Cipher HELLO FROM INTELLIPAAT
  • 66. Copyright IntelliPaat, All rights reserved Examples of Cryptography Transposition Technique: Rail-Fence Cipher HELLO FROM INTELLIPAAT H
  • 67. Copyright IntelliPaat, All rights reserved Examples of Cryptography Transposition Technique: Rail-Fence Cipher HELLO FROM INTELLIPAAT H E
  • 68. Copyright IntelliPaat, All rights reserved Examples of Cryptography Transposition Technique: Rail-Fence Cipher HELLO FROM INTELLIPAAT H L E
  • 69. Copyright IntelliPaat, All rights reserved Examples of Cryptography Transposition Technique: Rail-Fence Cipher HELLO FROM INTELLIPAAT H L O F O I T L I A T E L R M N E L P A
  • 70. Copyright IntelliPaat, All rights reserved Examples of Cryptography Transposition Technique: Rail-Fence Cipher HELLO FROM INTELLIPAAT H L O F O I T L I A T E L R M N E L P A HLOFOITLIATELRMNELPA
  • 71. Copyright IntelliPaat, All rights reserved Examples of Cryptography Transposition Technique: Rail-Fence Cipher HELLO FROM INTELLIPAAT H L O F O I T L I A T E L R M N E L P A HLOFOITLIATELRMNELPA Since the position of the letters have been changed, this is called a Transpositional Technique
  • 72. Copyright IntelliPaat, All rights reserved Examples of Cryptography Steganography
  • 73. Copyright IntelliPaat, All rights reserved Examples of Cryptography Steganography Steganography is the technique of hiding secret data within ordinary files or messages
  • 74. Copyright IntelliPaat, All rights reserved Examples of Cryptography Steganography Steganography is the technique of hiding secret data within ordinary files or messages Data
  • 75. Copyright IntelliPaat, All rights reserved Examples of Cryptography Steganography Steganography is the technique of hiding secret data within ordinary files or messages Data Image file
  • 76. Copyright IntelliPaat, All rights reserved Examples of Cryptography Steganography Steganography is the technique of hiding secret data within ordinary files or messages Data Image file
  • 77. Copyright IntelliPaat, All rights reserved Examples of Cryptography One Time Pad (Vernam Cipher)
  • 78. Copyright IntelliPaat, All rights reserved Examples of Cryptography One Time Pad (Vernam Cipher) This is called the ‘One Time’ Pad because the key is uniquely generated for each new data transfer or communication instance, and is only valid once
  • 79. Copyright IntelliPaat, All rights reserved Examples of Cryptography One Time Pad (Vernam Cipher) This is called the ‘One Time’ Pad because the key is uniquely generated for each new data transfer or communication instance, and is only valid once H E L L O
  • 80. Copyright IntelliPaat, All rights reserved Examples of Cryptography One Time Pad (Vernam Cipher) This is called the ‘One Time’ Pad because the key is uniquely generated for each new data transfer or communication instance, and is only valid once H E L L O 8 5 12 12 15
  • 81. Copyright IntelliPaat, All rights reserved Examples of Cryptography One Time Pad (Vernam Cipher) This is called the ‘One Time’ Pad because the key is uniquely generated for each new data transfer or communication instance, and is only valid once H E L L O 8 5 12 12 15 b x l k d 2 24 12 11 4
  • 82. Copyright IntelliPaat, All rights reserved Examples of Cryptography One Time Pad (Vernam Cipher) This is called the ‘One Time’ Pad because the key is uniquely generated for each new data transfer or communication instance, and is only valid once H E L L O 8 5 12 12 15 b x l k d 2 24 12 11 4
  • 83. Copyright IntelliPaat, All rights reserved Examples of Cryptography One Time Pad (Vernam Cipher) This is called the ‘One Time’ Pad because the key is uniquely generated for each new data transfer or communication instance, and is only valid once H E L L O 8 5 12 12 15 b x l k d 2 24 12 11 4 10 29 24 23 19
  • 84. Copyright IntelliPaat, All rights reserved Examples of Cryptography One Time Pad (Vernam Cipher) This is called the ‘One Time’ Pad because the key is uniquely generated for each new data transfer or communication instance, and is only valid once H E L L O b x l k d ( 10 29 24 23 19 ) % 26 10 3 24 23 19
  • 85. Copyright IntelliPaat, All rights reserved Examples of Cryptography One Time Pad (Vernam Cipher) This is called the ‘One Time’ Pad because the key is uniquely generated for each new data transfer or communication instance, and is only valid once H E L L O b x l k d ( 10 29 24 23 19 ) % 26 10 3 24 23 19 J C X W S
  • 86. Copyright IntelliPaat, All rights reserved Examples of Cryptography One Time Pad (Vernam Cipher) This is called the ‘One Time’ Pad because the key is uniquely generated for each new data transfer or communication instance, and is only valid once H E L L O b x l k d ( 10 29 24 23 19 ) % 26 10 3 24 23 19 J C X W S
  • 87. Copyright IntelliPaat, All rights reserved Examples of Cryptography One Time Pad (Vernam Cipher) This is called the ‘One Time’ Pad because the key is uniquely generated for each new data transfer or communication instance, and is only valid once H E L L O b x l k d ( 10 29 24 23 19 ) % 26 10 3 24 23 19 J C X W S Cipher
  • 88. Copyright IntelliPaat, All rights reserved Examples of Cryptography Symmetric: DES (Data Encryption Standard)
  • 89. Copyright IntelliPaat, All rights reserved Examples of Cryptography Symmetric: DES (Data Encryption Standard) The Data Encryption Standard (DES) is a symmetric-key block cipher published by the National Institute of Standards and Technology (NIST)
  • 90. Copyright IntelliPaat, All rights reserved Examples of Cryptography Symmetric: DES (Data Encryption Standard) Initial Permutation Round 1 Round 2 Round 16 Final Permutation RoundKeyGenerator 64 bit Plaintext 64 bit Cipher . . . 56 bit cipher key
  • 91. Copyright IntelliPaat, All rights reserved Examples of Cryptography DES (Data Encryption Standard) Advantages
  • 92. Copyright IntelliPaat, All rights reserved Examples of Cryptography DES (Data Encryption Standard) Advantages Each small change in plaintext drastically affects the cipher
  • 93. Copyright IntelliPaat, All rights reserved Examples of Cryptography DES (Data Encryption Standard) Advantages Each small change in plaintext drastically affects the cipher Each cipher bit depends on several bits of plaintext
  • 94. Copyright IntelliPaat, All rights reserved Examples of Cryptography Asymmetric: RSA (Rivest–Shamir– Adleman)
  • 95. Copyright IntelliPaat, All rights reserved Examples of Cryptography Asymmetric: RSA (Rivest–Shamir– Adleman) RSA is an asymmetric cryptography algorithm which requires two keys, private, and public Any two prime numbers : p & q N = p * q e is a derived number greater than 1 and less than (q-1)(p-1). There should be no common factor for e and (q- 1)(p-1) The public key is (N,e)
  • 96. Copyright IntelliPaat, All rights reserved Examples of Cryptography Asymmetric: RSA (Rivest–Shamir– Adleman) RSA is an asymmetric cryptography algorithm which requires two keys, private, and public The private key is d Calculate d when: ed = 1 mod (p-1)(q-1) Encryption formula is Cipher = Plaintext * e mod N Decryption formula is Plaintext = Cipher * d mod N
  • 97. Copyright IntelliPaat, All rights reserved Examples of Cryptography Password Storage Method
  • 98. Copyright IntelliPaat, All rights reserved Examples of Cryptography Password Storage Method You create an account on a website
  • 99. Copyright IntelliPaat, All rights reserved Examples of Cryptography Password Storage Method You create an account on a website (username, password)
  • 100. Copyright IntelliPaat, All rights reserved Examples of Cryptography Password Storage Method You create an account on a website (username, password) f(password) = Encrypted Password
  • 101. Copyright IntelliPaat, All rights reserved Examples of Cryptography Password Storage Method You create an account on a website (username, password) f(password) = Encrypted Password Encrypted Password stored in website user database!
  • 102. Copyright IntelliPaat, All rights reserved Examples of Cryptography Password Storage Method You create an account on a website (username, password) f(password) = Encrypted Password Encrypted Password stored in website user database!
  • 103. Copyright IntelliPaat, All rights reserved Examples of Cryptography Password Storage Method You log into the website later
  • 104. Copyright IntelliPaat, All rights reserved Examples of Cryptography Password Storage Method You log into the website later (username, password)
  • 105. Copyright IntelliPaat, All rights reserved Examples of Cryptography Password Storage Method You log into the website later (username, password) f(password) = Encrypted Password
  • 106. Copyright IntelliPaat, All rights reserved Examples of Cryptography Password Storage Method You log into the website later (username, password) f(password) = Encrypted Password Encrypted Password compared with the one in the database for your username
  • 107. Copyright IntelliPaat, All rights reserved Examples of Cryptography Password Storage Method You log into the website later (username, password) f(password) = Encrypted Password Encrypted Password compared with the one in the database for your username If it’s a match, you successfully log into your account!
  • 108. Copyright IntelliPaat, All rights reserved Examples of Cryptography Password Storage Method Even if an attacker gains access to the user database, the attacker can’t gain access to your account as the password in the database isn’t in plaintext format! f(Encrypted Password) = Something Entirely Different f(password) = Encrypted Password
  • 109. Copyright Intellipaat. All rights reserved. Cryptography Demo
  • 110. Copyright Intellipaat. All rights reserved. India: +91-7847955955 US: 1-800-216-8930 (TOLL FREE) support@intellipaat.com 24/7 Chat with Our Course Advisor sales@intellipaat.com

Notes de l'éditeur

  1. Welcome back to the forth module of data science.