SlideShare une entreprise Scribd logo
1  sur  37
Télécharger pour lire hors ligne
Information Security
Mamoona Jabbar
Information Security
Topic: Cryptology
Origins of Cryptography
Inherent needs as human being:
a. To communicate and share information and
b. To communicate selectively
These two needs gave rise to the art of coding the messages in such
a way that only the intended people could have access to the
information. Unauthorized people could not extract any information,
even if the scrambled messages fell in their hand.
The art and science of concealing the messages to introduce secrecy
in information security is recognized as cryptography.
Origins of Cryptography
The word ‘cryptography’ was coined by combining two Greek
words, ‘Krypto’ meaning hidden and ‘graphene’ meaning
writing.
History of Cryptography
The art of cryptography is considered to be born along with the
art of writing. As civilizations evolved, human beings got
organized in tribes, groups, and kingdoms. This led to the
emergence of ideas such as power, battles, supremacy, and
politics. These ideas further fueled the natural need of people to
communicate secretly with selective recipient which in turn
ensured the continuous evolution of cryptography as well.
The roots of cryptography are found in Roman and Egyptian
civilizations.
Cryptographic Technique
Cryptographic Technique
1. Hieroglyph
2. Symmetric Encryption
3. Asymmetric Encryption
4. Steganography
5. Hashing
Hieroglyph
4000 years ago, the Egyptians used to communicate by messages
written in hieroglyph. This code was the secret known only to the
scribes who used to transmit messages on behalf of the kings.
One such hieroglyph is shown below.
Hieroglyph
Later, using simple mono-alphabetic substitution ciphers during
500 to 600 BC. This involved replacing alphabets of message
with other alphabets with some secret rule.
This rule became a key to retrieve the message back from the
garbled message. The earlier Roman method of cryptography,
popularly known as the Caesar Shift Cipher, relies on shifting
the letters of a message by an agreed number (three was a
common choice), the recipient of this message would then shift
the letters back by the same number and obtain the original
message.
Symmetric Encryption
• Symmetrical encryption is a type of encryption that is used for
the encryption and decryption of electronic data by just one
secret key. Substitution ciphers are symmetrical encryption
techniques, but modern symmetric encryption can be much more
complicated.
• Data are converted to a method that cannot be understood by
anyone without a secret key to decrypt it using symmetrical
encryption algorithms.
• Symmetric encryption is an old algorithm but it is faster and
efficient than asymmetric encryption. Because of great
performance and fast speed of symmetric as compare to
asymmetric encryption.
Symmetric Encryption
• Whereas Symmetric key cryptography involves the usage of
the same key for encryption and decryption. While
Asymmetric key cryptography involves the usage of one key
for encryption and another different key for decryption.
• Symmetric encryption is typical for big quantities of
information, e.g. for database encryption, in bulk encryption.
In the case of a database, the secret key can only be encrypted
or decrypted by the database itself.
Symmetric Encryption
Two kinds of symmetrical encryption algorithms are available:
1. Block Algorithm
2. Stream Algorithm
Block Algorithm:
The set of bits is encoded with a specific secret key in electronic
data blocks. The system keeps the data in its memory while it
waiting to get complete blocks when the data are encrypted.
Some important Block cipher algorithms are DES, Triple DES,
AES, etc.
Symmetric Encryption
Stream Cipher Algorithm:
In this, Plain text numbers or characters are combined with
pseudorandom cipher digit stream. Some important Stream cipher
algorithms are RC4, A5, BLOWFISH, etc. In symmetric key
encryption, The encryption code can be cracked if someone finds
out the symmetric key. But this problem can be overcome with the
Diffie-Hellman algorithm. In the Diffie-Hellman key exchange or
agreement algorithm, the sender and receiver must agree on a
symmetric key using this technique. This key can then be used for
an encryption or decryption purpose.
Asymmetric Encryption
• Asymmetric encryption is also called public-key
cryptography. Asymmetric key encryption helps to resolve a
key exchange problem of symmetric key Cryptography. In
Asymmetric encryption, Two keys are used to encrypt plain
text in asymmetrical encryption. Through the internet or big
network, the secret keys are exchanged. It is necessary to
notice that anyone with a secret key can decrypt the message,
so asymmetric encryption is using two corresponding keys to
increase safety.
Asymmetric Encryption
• Anyone who wishes to send you a message will have a public
key freely accessible but the second private key is held the
secret for you to understand you only. A message encrypted
with a public key can be decoded with a private key. A
message encrypted with a private key can also be decrypted
with a public key.
Steganography
• Steganography is a technique that facilitates the hiring of a
message that is to be kept secret inside other messages. Earlier,
people used methods to hide messages such as invisible ink,
minute variations, etc.
• But in an age of technology, Steganography is a technique to
conceal data that can be the file, message, image, etc inside
other files, message or images.
Steganography
• Example: Invisible watermarking
• In steganography, an unintended recipient or an intruder is
unaware of the fact that observed data contains hidden
information. In cryptography, an intruder is normally aware that
data is being communicated, because they can see the
coded/scrambled message.
Hashing
• Hashing is the cryptographic technique that converts data which
can be any form into a unique string. Regardless of size or type,
any data can be hashed using a hashing algorithm. It takes data
of random length and converts it into fixed hashed value.
• Hashing is different from other encryption methods because, in
hashing, encryption cannot be reversed that is cannot be
decrypted using keys. MD5, SHA1, SHA 256 are the widely
used hashing algorithms.
Evolution of Cryptography
Evolution of Cryptography
• Improved coding techniques such as Vigenere Coding came
into existence in the 15th century, which offered moving letters
in the message with a number of variable places instead of
moving them the same number of places.
• Only after the 19th century, cryptography evolved from the ad
hoc approaches to encryption to the more sophisticated art and
science of information security.
Evolution of Cryptography
• In the early 20th century, the invention of mechanical and
electromechanical machines, such as the Enigma rotor
machine, provided more advanced and efficient means of
coding the information.
• During the period of World War II, both cryptography and
cryptanalysis became excessively mathematical.
Modern Cryptography
Modern Cryptography
• Modern cryptography is the cornerstone of computer and
communications security. Its foundation is based on various
concepts of mathematics such as number theory, computational-
complexity theory, and probability theory.
Characteristics of Modern Cryptography
Classic Cryptography Modern Cryptography
It manipulates traditional characters, i.e.,
letters and digits directly.
It operates on binary bit sequences.
It is mainly based on ‘security through
obscurity’. The techniques employed for
coding were kept secret and only the
parties involved in communication knew
about them.
It relies on publicly known mathematical
algorithms for coding the information.
Secrecy is obtained through a secrete key
which is used as the seed for the algorithm.
The computational difficulty of algorithms,
absence of secret key, etc., make it
impossible for an attacker to obtain the
original information even if he knows the
algorithm used for coding.
It requires the entire cryptosystem for
communicating confidentially.
Modern cryptography requires parties
interested in secure communication to
possess the secret key only.
Context of Cryptography
Cryptology, the study of cryptosystems, can be subdivided into two
branches −
• Cryptography
Cryptography is the art and science of making a cryptosystem
that is capable of providing information security.
• Cryptanalysis
The art and science of breaking the cipher text is known as
cryptanalysis.
Cryptanalysis is the sister branch of cryptography and they both co-
exist. The cryptographic process results in the cipher text for
transmission or storage. It involves the study of cryptographic
mechanism with the intention to break them. Cryptanalysis is also
used during the design of the new cryptographic techniques to test
their security strengths.
Context of Cryptography
Note:
Cryptography concerns with the design of
cryptosystems, while cryptanalysis studies the
breaking of cryptosystems.
Security Services of Cryptography
The primary objective of using cryptography is to provide the
following four fundamental information security services. Let us
now see the possible goals intended to be fulfilled by cryptography.
1. Confidentially
It is a security service that keeps the information from an
unauthorized person. It is sometimes referred to as privacy or
secrecy.
Security Services of Cryptography
2. Data integrity
It is security service that deals with identifying any
alteration to the data. The data may get modified by an unauthorized
entity intentionally or accidently. Integrity service confirms that
whether data is intact or not since it was last created, transmitted, or
stored by an authorized user.
Data integrity cannot prevent the alteration of data, but
provides a means for detecting whether data has been manipulated in
an unauthorized manner.
Security Services of Cryptography
3. Authentication
Authentication provides the identification of the originator. It
confirms to the receiver that the data received has been sent only by
an identified and verified sender.
Authentication service has two variants −
• Message authentication identifies the originator of the
message without any regard router or system that has sent the
message.
• Entity authentication is assurance that data has been
received from a specific entity, say a particular website
Security Services of Cryptography
4. Non-repudiation
It is a security service that ensures that an entity cannot refuse
the ownership of a previous commitment or an action. It is an
assurance that the original creator of the data cannot deny the
creation or transmission of the said data to a recipient or third
party.
Example: Once an order is placed electronically, a purchaser
cannot deny the purchase order, if non-repudiation service was
enabled in this transaction.
Cryptography Primitives
Cryptography primitives are nothing but the tools and techniques in
Cryptography that can be selectively used to provide a set of
desired security services:
• Encryption
• Hash functions
• Message Authentication codes (MAC)
• Digital Signatures
Cryptography Primitives
The following table shows the primitives that can achieve a
particular security service on their own.
Note − Cryptographic primitives are intricately related and they are
often combined to achieve a set of desired security services from a
cryptosystem
Cryptosystem
A cryptosystem is an implementation of cryptographic techniques
and their accompanying infrastructure to provide information
security services. A cryptosystem is also referred to as a cipher
system.
Model of a cryptosystem
Components of Cryptosystem
• Plaintext
• Encryption Algorithm
• Cipher text
• Decryption Algorithm
• Encryption Key
• Decryption Key
Types of Cryptosystem
1. Symmetric key Encryption
2. Asymmetric key Encryption
Types of Cryptosystem
1. Symmetric key Encryption
The encryption process where same keys are used for
encrypting and decrypting the information is known as
Symmetric Key Encryption.
Types of Cryptosystem
2. Asymmetric key Encryption
The encryption process where different keys are used for
encrypting and decrypting the information is known as
Asymmetric Key Encryption.

Contenu connexe

Tendances (20)

Cryptography Intro
Cryptography IntroCryptography Intro
Cryptography Intro
 
Cryptography
CryptographyCryptography
Cryptography
 
Digital certificates
Digital certificatesDigital certificates
Digital certificates
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
 
Digital certificates and information security
Digital certificates and information securityDigital certificates and information security
Digital certificates and information security
 
Homomorphic Encryption
Homomorphic EncryptionHomomorphic Encryption
Homomorphic Encryption
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signatures
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Network Security- Secure Socket Layer
Network Security- Secure Socket LayerNetwork Security- Secure Socket Layer
Network Security- Secure Socket Layer
 
Encryption technology
Encryption technologyEncryption technology
Encryption technology
 
Cryptography - A Brief History
Cryptography - A Brief HistoryCryptography - A Brief History
Cryptography - A Brief History
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Certification authority
Certification   authorityCertification   authority
Certification authority
 
Homomorphic encryption
Homomorphic encryptionHomomorphic encryption
Homomorphic encryption
 
Secure Your Encryption with HSM
Secure Your Encryption with HSMSecure Your Encryption with HSM
Secure Your Encryption with HSM
 

Similaire à Evolution of Cryptography and Cryptographic techniques

Cryptography & Network Security.pptx
Cryptography & Network Security.pptxCryptography & Network Security.pptx
Cryptography & Network Security.pptxsunil sharma
 
Cryptography : The Art of Secured Messaging
Cryptography : The Art of Secured MessagingCryptography : The Art of Secured Messaging
Cryptography : The Art of Secured MessagingSumit Satam
 
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...Petar Radanliev
 
Cryptography, a science of secure writing
Cryptography, a science of secure writingCryptography, a science of secure writing
Cryptography, a science of secure writingtahirilyas92
 
Making Sense Of Cryptography
Making Sense Of CryptographyMaking Sense Of Cryptography
Making Sense Of Cryptographymarkjhouse
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Saif Kassim
 
Cryptography
CryptographyCryptography
CryptographyJasim Jas
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographyMd. Afif Al Mamun
 
A Study of Different Partitioning Clustering Technique
A Study of Different Partitioning Clustering TechniqueA Study of Different Partitioning Clustering Technique
A Study of Different Partitioning Clustering Techniqueijsrd.com
 
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHICA NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHICijsrd.com
 
A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfYasmine Anino
 
Cryptography- "A Black Art"
Cryptography- "A Black Art"Cryptography- "A Black Art"
Cryptography- "A Black Art"Aditya Raina
 
Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)newbie2019
 

Similaire à Evolution of Cryptography and Cryptographic techniques (20)

Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Cryptography & Network Security.pptx
Cryptography & Network Security.pptxCryptography & Network Security.pptx
Cryptography & Network Security.pptx
 
Cryptography : The Art of Secured Messaging
Cryptography : The Art of Secured MessagingCryptography : The Art of Secured Messaging
Cryptography : The Art of Secured Messaging
 
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
 
Cryptography, a science of secure writing
Cryptography, a science of secure writingCryptography, a science of secure writing
Cryptography, a science of secure writing
 
Cryptography
CryptographyCryptography
Cryptography
 
Making Sense Of Cryptography
Making Sense Of CryptographyMaking Sense Of Cryptography
Making Sense Of Cryptography
 
groupWork.pptx
groupWork.pptxgroupWork.pptx
groupWork.pptx
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01
 
Cryptography
CryptographyCryptography
Cryptography
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Analysis of Cryptography Techniques
Analysis of Cryptography TechniquesAnalysis of Cryptography Techniques
Analysis of Cryptography Techniques
 
A Study of Different Partitioning Clustering Technique
A Study of Different Partitioning Clustering TechniqueA Study of Different Partitioning Clustering Technique
A Study of Different Partitioning Clustering Technique
 
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHICA NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
 
A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdf
 
F16 cs61 cryptography
F16 cs61   cryptographyF16 cs61   cryptography
F16 cs61 cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Crytography
CrytographyCrytography
Crytography
 
Cryptography- "A Black Art"
Cryptography- "A Black Art"Cryptography- "A Black Art"
Cryptography- "A Black Art"
 
Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)
 

Dernier

MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsManeerUddin
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxleah joy valeriano
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 

Dernier (20)

MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture hons
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 

Evolution of Cryptography and Cryptographic techniques

  • 3. Origins of Cryptography Inherent needs as human being: a. To communicate and share information and b. To communicate selectively These two needs gave rise to the art of coding the messages in such a way that only the intended people could have access to the information. Unauthorized people could not extract any information, even if the scrambled messages fell in their hand. The art and science of concealing the messages to introduce secrecy in information security is recognized as cryptography.
  • 4. Origins of Cryptography The word ‘cryptography’ was coined by combining two Greek words, ‘Krypto’ meaning hidden and ‘graphene’ meaning writing.
  • 5. History of Cryptography The art of cryptography is considered to be born along with the art of writing. As civilizations evolved, human beings got organized in tribes, groups, and kingdoms. This led to the emergence of ideas such as power, battles, supremacy, and politics. These ideas further fueled the natural need of people to communicate secretly with selective recipient which in turn ensured the continuous evolution of cryptography as well. The roots of cryptography are found in Roman and Egyptian civilizations.
  • 7. Cryptographic Technique 1. Hieroglyph 2. Symmetric Encryption 3. Asymmetric Encryption 4. Steganography 5. Hashing
  • 8. Hieroglyph 4000 years ago, the Egyptians used to communicate by messages written in hieroglyph. This code was the secret known only to the scribes who used to transmit messages on behalf of the kings. One such hieroglyph is shown below.
  • 9. Hieroglyph Later, using simple mono-alphabetic substitution ciphers during 500 to 600 BC. This involved replacing alphabets of message with other alphabets with some secret rule. This rule became a key to retrieve the message back from the garbled message. The earlier Roman method of cryptography, popularly known as the Caesar Shift Cipher, relies on shifting the letters of a message by an agreed number (three was a common choice), the recipient of this message would then shift the letters back by the same number and obtain the original message.
  • 10. Symmetric Encryption • Symmetrical encryption is a type of encryption that is used for the encryption and decryption of electronic data by just one secret key. Substitution ciphers are symmetrical encryption techniques, but modern symmetric encryption can be much more complicated. • Data are converted to a method that cannot be understood by anyone without a secret key to decrypt it using symmetrical encryption algorithms. • Symmetric encryption is an old algorithm but it is faster and efficient than asymmetric encryption. Because of great performance and fast speed of symmetric as compare to asymmetric encryption.
  • 11. Symmetric Encryption • Whereas Symmetric key cryptography involves the usage of the same key for encryption and decryption. While Asymmetric key cryptography involves the usage of one key for encryption and another different key for decryption. • Symmetric encryption is typical for big quantities of information, e.g. for database encryption, in bulk encryption. In the case of a database, the secret key can only be encrypted or decrypted by the database itself.
  • 12. Symmetric Encryption Two kinds of symmetrical encryption algorithms are available: 1. Block Algorithm 2. Stream Algorithm Block Algorithm: The set of bits is encoded with a specific secret key in electronic data blocks. The system keeps the data in its memory while it waiting to get complete blocks when the data are encrypted. Some important Block cipher algorithms are DES, Triple DES, AES, etc.
  • 13. Symmetric Encryption Stream Cipher Algorithm: In this, Plain text numbers or characters are combined with pseudorandom cipher digit stream. Some important Stream cipher algorithms are RC4, A5, BLOWFISH, etc. In symmetric key encryption, The encryption code can be cracked if someone finds out the symmetric key. But this problem can be overcome with the Diffie-Hellman algorithm. In the Diffie-Hellman key exchange or agreement algorithm, the sender and receiver must agree on a symmetric key using this technique. This key can then be used for an encryption or decryption purpose.
  • 14. Asymmetric Encryption • Asymmetric encryption is also called public-key cryptography. Asymmetric key encryption helps to resolve a key exchange problem of symmetric key Cryptography. In Asymmetric encryption, Two keys are used to encrypt plain text in asymmetrical encryption. Through the internet or big network, the secret keys are exchanged. It is necessary to notice that anyone with a secret key can decrypt the message, so asymmetric encryption is using two corresponding keys to increase safety.
  • 15. Asymmetric Encryption • Anyone who wishes to send you a message will have a public key freely accessible but the second private key is held the secret for you to understand you only. A message encrypted with a public key can be decoded with a private key. A message encrypted with a private key can also be decrypted with a public key.
  • 16. Steganography • Steganography is a technique that facilitates the hiring of a message that is to be kept secret inside other messages. Earlier, people used methods to hide messages such as invisible ink, minute variations, etc. • But in an age of technology, Steganography is a technique to conceal data that can be the file, message, image, etc inside other files, message or images.
  • 17. Steganography • Example: Invisible watermarking • In steganography, an unintended recipient or an intruder is unaware of the fact that observed data contains hidden information. In cryptography, an intruder is normally aware that data is being communicated, because they can see the coded/scrambled message.
  • 18. Hashing • Hashing is the cryptographic technique that converts data which can be any form into a unique string. Regardless of size or type, any data can be hashed using a hashing algorithm. It takes data of random length and converts it into fixed hashed value. • Hashing is different from other encryption methods because, in hashing, encryption cannot be reversed that is cannot be decrypted using keys. MD5, SHA1, SHA 256 are the widely used hashing algorithms.
  • 20. Evolution of Cryptography • Improved coding techniques such as Vigenere Coding came into existence in the 15th century, which offered moving letters in the message with a number of variable places instead of moving them the same number of places. • Only after the 19th century, cryptography evolved from the ad hoc approaches to encryption to the more sophisticated art and science of information security.
  • 21. Evolution of Cryptography • In the early 20th century, the invention of mechanical and electromechanical machines, such as the Enigma rotor machine, provided more advanced and efficient means of coding the information. • During the period of World War II, both cryptography and cryptanalysis became excessively mathematical.
  • 23. Modern Cryptography • Modern cryptography is the cornerstone of computer and communications security. Its foundation is based on various concepts of mathematics such as number theory, computational- complexity theory, and probability theory.
  • 24. Characteristics of Modern Cryptography Classic Cryptography Modern Cryptography It manipulates traditional characters, i.e., letters and digits directly. It operates on binary bit sequences. It is mainly based on ‘security through obscurity’. The techniques employed for coding were kept secret and only the parties involved in communication knew about them. It relies on publicly known mathematical algorithms for coding the information. Secrecy is obtained through a secrete key which is used as the seed for the algorithm. The computational difficulty of algorithms, absence of secret key, etc., make it impossible for an attacker to obtain the original information even if he knows the algorithm used for coding. It requires the entire cryptosystem for communicating confidentially. Modern cryptography requires parties interested in secure communication to possess the secret key only.
  • 25. Context of Cryptography Cryptology, the study of cryptosystems, can be subdivided into two branches − • Cryptography Cryptography is the art and science of making a cryptosystem that is capable of providing information security. • Cryptanalysis The art and science of breaking the cipher text is known as cryptanalysis. Cryptanalysis is the sister branch of cryptography and they both co- exist. The cryptographic process results in the cipher text for transmission or storage. It involves the study of cryptographic mechanism with the intention to break them. Cryptanalysis is also used during the design of the new cryptographic techniques to test their security strengths.
  • 26. Context of Cryptography Note: Cryptography concerns with the design of cryptosystems, while cryptanalysis studies the breaking of cryptosystems.
  • 27. Security Services of Cryptography The primary objective of using cryptography is to provide the following four fundamental information security services. Let us now see the possible goals intended to be fulfilled by cryptography. 1. Confidentially It is a security service that keeps the information from an unauthorized person. It is sometimes referred to as privacy or secrecy.
  • 28. Security Services of Cryptography 2. Data integrity It is security service that deals with identifying any alteration to the data. The data may get modified by an unauthorized entity intentionally or accidently. Integrity service confirms that whether data is intact or not since it was last created, transmitted, or stored by an authorized user. Data integrity cannot prevent the alteration of data, but provides a means for detecting whether data has been manipulated in an unauthorized manner.
  • 29. Security Services of Cryptography 3. Authentication Authentication provides the identification of the originator. It confirms to the receiver that the data received has been sent only by an identified and verified sender. Authentication service has two variants − • Message authentication identifies the originator of the message without any regard router or system that has sent the message. • Entity authentication is assurance that data has been received from a specific entity, say a particular website
  • 30. Security Services of Cryptography 4. Non-repudiation It is a security service that ensures that an entity cannot refuse the ownership of a previous commitment or an action. It is an assurance that the original creator of the data cannot deny the creation or transmission of the said data to a recipient or third party. Example: Once an order is placed electronically, a purchaser cannot deny the purchase order, if non-repudiation service was enabled in this transaction.
  • 31. Cryptography Primitives Cryptography primitives are nothing but the tools and techniques in Cryptography that can be selectively used to provide a set of desired security services: • Encryption • Hash functions • Message Authentication codes (MAC) • Digital Signatures
  • 32. Cryptography Primitives The following table shows the primitives that can achieve a particular security service on their own. Note − Cryptographic primitives are intricately related and they are often combined to achieve a set of desired security services from a cryptosystem
  • 33. Cryptosystem A cryptosystem is an implementation of cryptographic techniques and their accompanying infrastructure to provide information security services. A cryptosystem is also referred to as a cipher system. Model of a cryptosystem
  • 34. Components of Cryptosystem • Plaintext • Encryption Algorithm • Cipher text • Decryption Algorithm • Encryption Key • Decryption Key
  • 35. Types of Cryptosystem 1. Symmetric key Encryption 2. Asymmetric key Encryption
  • 36. Types of Cryptosystem 1. Symmetric key Encryption The encryption process where same keys are used for encrypting and decrypting the information is known as Symmetric Key Encryption.
  • 37. Types of Cryptosystem 2. Asymmetric key Encryption The encryption process where different keys are used for encrypting and decrypting the information is known as Asymmetric Key Encryption.