SlideShare a Scribd company logo
Basic Cryptography
Presented by
Mr. Abhijeet A. More
(Perfect Training Center)
Introduction
• “Hidden writing”
• Increasingly used to protect information
• Can ensure confidentiality
– Integrity and Authenticity too
History – The Manual Era
• Dates back to at least 2000 B.C.
• Pen and Paper Cryptography
• Examples
– Scytale
– Atbash
– Caesar
– Vigenère
History – The Mechanical Era
• Invention of cipher machines
• Examples
– Confederate Army’s Cipher Disk
– Japanese Red and Purple Machines
– German Enigma
History – The Modern Era
• Computers!
• Examples
– Lucifer
– Rijndael
– RSA
– ElGamal
Required Term
Plaintext – A message in its natural format
readable by an attacker
Ciphertext – Message altered to be
unreadable by anyone except the intended
recipients
Key – Sequence that controls the operation
and behavior of the cryptographic
algorithm
Keyspace – Total number of possible values
of keys in a crypto algorithm
Required Term (2)
Initialization Vector – Random values used
with ciphers to ensure no patterns are
created during encryption
Cryptosystem – The combination of
algorithm, key, and key management
functions used to perform cryptographic
operations
Cryptosystem Services
• Confidentiality
• Integrity
• Authenticity
• Nonrepudiation
• Access Control
Types of Cryptography
• Stream-based Ciphers
– One at a time, please
– Mixes plaintext with key stream
– Good for real-time services
• Block Ciphers
– Amusement Park Ride
– Substitution and transposition
Encryption Systems
• Substitution Cipher
– Convert one letter to another
– Cryptoquip
• Transposition Cipher
– Change position of letter in text
– Word Jumble
• Monoalphabetic Cipher
– Caesar
Encryption Systems
• Polyalphabetic Cipher
– Vigenère
• Modular Mathematics
– Running Key Cipher
• One-time Pads
– Randomly generated keys
11
Steganography
• Hiding a message within another
medium, such as an image
• No key is required
• Example
– Modify color map of JPEG image
Cryptographic Methods
• Symmetric
– Same key for encryption and decryption
– Key distribution problem
• Asymmetric
– Mathematically related key pairs for
encryption and decryption
– Public and private keys
Cryptographic Methods
• Hybrid
– Combines strengths of both methods
– Asymmetric distributes symmetric key
• Also known as a session key
– Symmetric provides bulk encryption
– Example:
• SSL negotiates a hybrid method
Attributes of Strong
Encryption
• Confusion
– Change key values each round
– Performed through substitution
– Complicates plaintext/key relationship
• Diffusion
– Change location of plaintext in ciphertext
– Done through transposition
Symmetric Algorithms
• DES
– Modes: ECB, CBC, CFB, OFB, CM
• 3DES
• AES
• IDEA
• Blowfish
Symmetric Algorithms
• RC4
• RC5
• CAST
• SAFER
• Twofish
Asymmetric Algorithms
• Diffie-Hellman
• RSA
• El Gamal
• Elliptic Curve Cryptography (ECC)
Hashing Algorithms
• MD5
– Computes 128-bit hash value
– Widely used for file integrity checking
• SHA-1
– Computes 160-bit hash value
– NIST approved message digest algorithm
Hashing Algorithms
• HAVAL
– Computes between 128 and 256 bit hash
– Between 3 and 5 rounds
• RIPEMD-160
– Developed in Europe published in 1996
– Patent-free
20
Birthday Attack
• Collisions
– Two messages with the same hash value
• Based on the “birthday paradox”
• Hash algorithms should be resistant to
this attack
Message Authentication
Codes
• Small block of data generated with a
secret key and appended to a message
• HMAC (RFC 2104)
– Uses hash instead of cipher for speed
– Used in SSL/TLS and IPSec
Digital Signatures
 Hash of message encrypted with
private key
 Digital Signature Standard (DSS)
– DSA/RSA/ECD-SA plus SHA
 DSS provides
– Sender authentication
– Verification of message integrity
– Nonrepudiation
Encryption Management
• Key Distribution Center (KDC)
– Uses master keys to issue session keys
– Example: Kerberos
• ANSI X9.17
– Used by financial institutions
– Hierarchical set of keys
– Higher levels used to distribute lower
Public Key Infrastructure
• All components needed to enable
secure communication
– Policies and Procedures
– Keys and Algorithms
– Software and Data Formats
• Assures identity to users
• Provides key management features
PKI Components
 Digital Certificates
– Contains identity and verification info
 Certificate Authorities
– Trusted entity that issues certificates
 Registration Authorities
– Verifies identity for certificate requests
 Certificate Revocation List (CRL)
PKI Cross Certification
• Process to establish a trust
relationship between Cas
• Allows each CA to validate certificates
issued by the other CA
• Used in large organizations or
business partnerships
Cryptanalysis
• The study of methods to break
cryptosystems
• Often targeted at obtaining a key
• Attacks may be passive or active
Cryptanalysis
• Kerckhoff’s Principle
– The only secrecy involved with a
cryptosystem should be the key
• Cryptosystem Strength
– How hard is it to determine the secret
associated with the system?
Cryptanalysis Attacks
• Brute force
– Trying all key values in the keyspace
• Frequency Analysis
– Guess values based on frequency of
occurrence
• Dictionary Attack
– Find plaintext based on common words
Cryptanalysis Attacks
• Replay Attack
– Repeating previous known values
• Factoring Attacks
– Find keys through prime factorization
• Ciphertext-Only
• Known Plaintext
– Format or content of plaintext available
Cryptanalysis Attacks
• Chosen Plaintext
– Attack can encrypt chosen plaintext
• Chosen Ciphertext
– Decrypt known ciphertext to discover key
• Differential Power Analysis
– Side Channel Attack
– Identify algorithm and key length
Cryptanalysis Attacks
• Social Engineering
– Humans are the weakest link
• RNG Attack
– Predict IV used by an algorithm
• Temporary Files
– May contain plaintext
E-mail Security Protocols
• Privacy Enhanced Email (PEM)
• Pretty Good Privacy (PGP)
– Based on a distributed trust model
– Each user generates a key pair
• S/MIME
– Requires public key infrastructure
– Supported by most e-mail clients
Network Security
• Link Encryption
– Encrypt traffic headers + data
– Transparent to users
• End-to-End Encryption
– Encrypts application layer data only
– Network devices need not be aware
Network Security
 SSL/TLS
• Supports mutual authentication
• Secures a number of popular network
services
 IPSec
• Security extensions for TCP/IP protocols
• Supports encryption and authentication
• Used for VPNs
Questions?
Those who have any Query Contact me on my
Whats App No : 9766677504(only message)
37

More Related Content

PPTX
Cryptography
Darshini Parikh
 
PPTX
Cryptography.ppt
Uday Meena
 
PPTX
Intro to modern cryptography
zahid-mian
 
PPTX
Data encryption
Deepam Goyal
 
PPT
Cryptography
IGZ Software house
 
PPTX
Cryptography
Rutuja Solkar
 
PPTX
Introduction to Cryptography
Md. Afif Al Mamun
 
Cryptography
Darshini Parikh
 
Cryptography.ppt
Uday Meena
 
Intro to modern cryptography
zahid-mian
 
Data encryption
Deepam Goyal
 
Cryptography
IGZ Software house
 
Cryptography
Rutuja Solkar
 
Introduction to Cryptography
Md. Afif Al Mamun
 

What's hot (20)

PDF
Introduction to Cryptography
Seema Goel
 
PPTX
Cryptography
Jens Patel
 
PPTX
Cryptography
prasham95
 
PPTX
Cryptography
Sidharth Mohapatra
 
PPTX
Cryptography - 101
n|u - The Open Security Community
 
PPT
DES (Data Encryption Standard) pressentation
sarhadisoftengg
 
PPT
Data encryption, Description, DES
Huawei Technologies
 
PPTX
Cryptography
subodh pawar
 
PPTX
Cyber espionage
harshitakhandelwal26
 
PPTX
Symmetric and asymmetric key cryptography
MONIRUL ISLAM
 
PPTX
Cryptography
Birmingham City University
 
PPT
Cryptography
gueste4c97e
 
PPT
Cryptography ppt
Anubhav Sokhal
 
PPTX
cryptography
Abhijeet Singh
 
PPTX
Cryptography
EmaSushan
 
PPTX
Cryptography and Information Security
Dr Naim R Kidwai
 
PPT
6. cryptography
7wounders
 
PPT
Fundamentals of cryptography
Hossain Md Shakhawat
 
PPTX
Cryptography
Sagar Janagonda
 
Introduction to Cryptography
Seema Goel
 
Cryptography
Jens Patel
 
Cryptography
prasham95
 
Cryptography
Sidharth Mohapatra
 
DES (Data Encryption Standard) pressentation
sarhadisoftengg
 
Data encryption, Description, DES
Huawei Technologies
 
Cryptography
subodh pawar
 
Cyber espionage
harshitakhandelwal26
 
Symmetric and asymmetric key cryptography
MONIRUL ISLAM
 
Cryptography
gueste4c97e
 
Cryptography ppt
Anubhav Sokhal
 
cryptography
Abhijeet Singh
 
Cryptography
EmaSushan
 
Cryptography and Information Security
Dr Naim R Kidwai
 
6. cryptography
7wounders
 
Fundamentals of cryptography
Hossain Md Shakhawat
 
Cryptography
Sagar Janagonda
 
Ad

Viewers also liked (9)

PPTX
Cryptography.ppt
kusum sharma
 
PPTX
Cryptography
Shivanand Arur
 
PPSX
Introductory Lecture on Cryptography and Information Security
Bikramjit Sarkar, Ph.D.
 
PDF
A Brief History of Cryptography
guest9006ab
 
PDF
basic encryption and decryption
Rashmi Burugupalli
 
PPT
Cryptography - A Brief History
prasenjeetd
 
PPT
Basic Encryption Decryption Chapter 2
AfiqEfendy Zaen
 
PDF
Class 16
Dr. Ajith Sundaram
 
PPTX
Cissp d5-cryptography v2012-mini coursev2
infosecedu
 
Cryptography.ppt
kusum sharma
 
Cryptography
Shivanand Arur
 
Introductory Lecture on Cryptography and Information Security
Bikramjit Sarkar, Ph.D.
 
A Brief History of Cryptography
guest9006ab
 
basic encryption and decryption
Rashmi Burugupalli
 
Cryptography - A Brief History
prasenjeetd
 
Basic Encryption Decryption Chapter 2
AfiqEfendy Zaen
 
Cissp d5-cryptography v2012-mini coursev2
infosecedu
 
Ad

Similar to Basic cryptography (20)

PPT
Cryptography
Pragun Shah
 
PPT
Cryptography
suresh0506
 
PPTX
CISSP - Chapter 3 - Cryptography
Karthikeyan Dhayalan
 
PPT
Introduction To PKI Technology
Sylvain Maret
 
PDF
Secure 3 kany-vanda
Vanda KANY
 
PPT
Cryptography cse,ru
Hossain Md Shakhawat
 
PPT
Computer and Network Security
Muhammad Yousuf Abdul Qadir
 
DOCX
Cryptography : The Art of Secured Messaging
Sumit Satam
 
PPTX
Introduction to cryptography part1-final
Taymoor Nazmy
 
PPTX
Cryptographic Chronicles: Unveiling Definitions, Algorithms, Attacks, and App...
zachdwg
 
PDF
Fundamentals of Cryptography: Securing Data in the Digital Age
avengersimran16
 
PPT
Cryptography Intro
Christopher Martin
 
PPTX
Cryptography and Network Security-ch1-4.pptx
SamiDan3
 
PPTX
Network security
Perfect Training Center
 
PPTX
Introduction to Cryptography for btech cse
mahesh64847
 
PPT
Cryptography
Learn 2 Be
 
PPTX
NS Classical Encryption Techniqnbbghghgues.pptx
HumaKashafKhan
 
PPTX
CRYPTOGRAPHY crytopgraphy wh is sd wkd ,w d .pptx
abduganiyevbekzod011
 
Cryptography
Pragun Shah
 
Cryptography
suresh0506
 
CISSP - Chapter 3 - Cryptography
Karthikeyan Dhayalan
 
Introduction To PKI Technology
Sylvain Maret
 
Secure 3 kany-vanda
Vanda KANY
 
Cryptography cse,ru
Hossain Md Shakhawat
 
Computer and Network Security
Muhammad Yousuf Abdul Qadir
 
Cryptography : The Art of Secured Messaging
Sumit Satam
 
Introduction to cryptography part1-final
Taymoor Nazmy
 
Cryptographic Chronicles: Unveiling Definitions, Algorithms, Attacks, and App...
zachdwg
 
Fundamentals of Cryptography: Securing Data in the Digital Age
avengersimran16
 
Cryptography Intro
Christopher Martin
 
Cryptography and Network Security-ch1-4.pptx
SamiDan3
 
Network security
Perfect Training Center
 
Introduction to Cryptography for btech cse
mahesh64847
 
Cryptography
Learn 2 Be
 
NS Classical Encryption Techniqnbbghghgues.pptx
HumaKashafKhan
 
CRYPTOGRAPHY crytopgraphy wh is sd wkd ,w d .pptx
abduganiyevbekzod011
 

More from Perfect Training Center (7)

PPT
Basics of networking and routing
Perfect Training Center
 
PPTX
Cyber security
Perfect Training Center
 
PPTX
Cryptography make easy
Perfect Training Center
 
PPTX
Career option for BCA Student
Perfect Training Center
 
PPTX
Information gathering
Perfect Training Center
 
PPTX
Basics of network
Perfect Training Center
 
PPT
Stegnography
Perfect Training Center
 
Basics of networking and routing
Perfect Training Center
 
Cyber security
Perfect Training Center
 
Cryptography make easy
Perfect Training Center
 
Career option for BCA Student
Perfect Training Center
 
Information gathering
Perfect Training Center
 
Basics of network
Perfect Training Center
 

Recently uploaded (20)

PPTX
22PCOAM21 Session 1 Data Management.pptx
Guru Nanak Technical Institutions
 
PDF
Biodegradable Plastics: Innovations and Market Potential (www.kiu.ac.ug)
publication11
 
PPTX
Inventory management chapter in automation and robotics.
atisht0104
 
PDF
top-5-use-cases-for-splunk-security-analytics.pdf
yaghutialireza
 
PDF
settlement FOR FOUNDATION ENGINEERS.pdf
Endalkazene
 
PPTX
quantum computing transition from classical mechanics.pptx
gvlbcy
 
PDF
Chad Ayach - A Versatile Aerospace Professional
Chad Ayach
 
PDF
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
PDF
AI-Driven IoT-Enabled UAV Inspection Framework for Predictive Maintenance and...
ijcncjournal019
 
PPTX
MT Chapter 1.pptx- Magnetic particle testing
ABCAnyBodyCanRelax
 
PDF
2025 Laurence Sigler - Advancing Decision Support. Content Management Ecommer...
Francisco Javier Mora Serrano
 
PPTX
Online Cab Booking and Management System.pptx
diptipaneri80
 
PPTX
Module2 Data Base Design- ER and NF.pptx
gomathisankariv2
 
PPT
Understanding the Key Components and Parts of a Drone System.ppt
Siva Reddy
 
PDF
CAD-CAM U-1 Combined Notes_57761226_2025_04_22_14_40.pdf
shailendrapratap2002
 
PPTX
MULTI LEVEL DATA TRACKING USING COOJA.pptx
dollysharma12ab
 
PPT
1. SYSTEMS, ROLES, AND DEVELOPMENT METHODOLOGIES.ppt
zilow058
 
DOCX
SAR - EEEfdfdsdasdsdasdasdasdasdasdasdasda.docx
Kanimozhi676285
 
PDF
Cryptography and Information :Security Fundamentals
Dr. Madhuri Jawale
 
PPTX
database slide on modern techniques for optimizing database queries.pptx
aky52024
 
22PCOAM21 Session 1 Data Management.pptx
Guru Nanak Technical Institutions
 
Biodegradable Plastics: Innovations and Market Potential (www.kiu.ac.ug)
publication11
 
Inventory management chapter in automation and robotics.
atisht0104
 
top-5-use-cases-for-splunk-security-analytics.pdf
yaghutialireza
 
settlement FOR FOUNDATION ENGINEERS.pdf
Endalkazene
 
quantum computing transition from classical mechanics.pptx
gvlbcy
 
Chad Ayach - A Versatile Aerospace Professional
Chad Ayach
 
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
AI-Driven IoT-Enabled UAV Inspection Framework for Predictive Maintenance and...
ijcncjournal019
 
MT Chapter 1.pptx- Magnetic particle testing
ABCAnyBodyCanRelax
 
2025 Laurence Sigler - Advancing Decision Support. Content Management Ecommer...
Francisco Javier Mora Serrano
 
Online Cab Booking and Management System.pptx
diptipaneri80
 
Module2 Data Base Design- ER and NF.pptx
gomathisankariv2
 
Understanding the Key Components and Parts of a Drone System.ppt
Siva Reddy
 
CAD-CAM U-1 Combined Notes_57761226_2025_04_22_14_40.pdf
shailendrapratap2002
 
MULTI LEVEL DATA TRACKING USING COOJA.pptx
dollysharma12ab
 
1. SYSTEMS, ROLES, AND DEVELOPMENT METHODOLOGIES.ppt
zilow058
 
SAR - EEEfdfdsdasdsdasdasdasdasdasdasdasda.docx
Kanimozhi676285
 
Cryptography and Information :Security Fundamentals
Dr. Madhuri Jawale
 
database slide on modern techniques for optimizing database queries.pptx
aky52024
 

Basic cryptography

  • 1. Basic Cryptography Presented by Mr. Abhijeet A. More (Perfect Training Center)
  • 2. Introduction • “Hidden writing” • Increasingly used to protect information • Can ensure confidentiality – Integrity and Authenticity too
  • 3. History – The Manual Era • Dates back to at least 2000 B.C. • Pen and Paper Cryptography • Examples – Scytale – Atbash – Caesar – Vigenère
  • 4. History – The Mechanical Era • Invention of cipher machines • Examples – Confederate Army’s Cipher Disk – Japanese Red and Purple Machines – German Enigma
  • 5. History – The Modern Era • Computers! • Examples – Lucifer – Rijndael – RSA – ElGamal
  • 6. Required Term Plaintext – A message in its natural format readable by an attacker Ciphertext – Message altered to be unreadable by anyone except the intended recipients Key – Sequence that controls the operation and behavior of the cryptographic algorithm Keyspace – Total number of possible values of keys in a crypto algorithm
  • 7. Required Term (2) Initialization Vector – Random values used with ciphers to ensure no patterns are created during encryption Cryptosystem – The combination of algorithm, key, and key management functions used to perform cryptographic operations
  • 8. Cryptosystem Services • Confidentiality • Integrity • Authenticity • Nonrepudiation • Access Control
  • 9. Types of Cryptography • Stream-based Ciphers – One at a time, please – Mixes plaintext with key stream – Good for real-time services • Block Ciphers – Amusement Park Ride – Substitution and transposition
  • 10. Encryption Systems • Substitution Cipher – Convert one letter to another – Cryptoquip • Transposition Cipher – Change position of letter in text – Word Jumble • Monoalphabetic Cipher – Caesar
  • 11. Encryption Systems • Polyalphabetic Cipher – Vigenère • Modular Mathematics – Running Key Cipher • One-time Pads – Randomly generated keys 11
  • 12. Steganography • Hiding a message within another medium, such as an image • No key is required • Example – Modify color map of JPEG image
  • 13. Cryptographic Methods • Symmetric – Same key for encryption and decryption – Key distribution problem • Asymmetric – Mathematically related key pairs for encryption and decryption – Public and private keys
  • 14. Cryptographic Methods • Hybrid – Combines strengths of both methods – Asymmetric distributes symmetric key • Also known as a session key – Symmetric provides bulk encryption – Example: • SSL negotiates a hybrid method
  • 15. Attributes of Strong Encryption • Confusion – Change key values each round – Performed through substitution – Complicates plaintext/key relationship • Diffusion – Change location of plaintext in ciphertext – Done through transposition
  • 16. Symmetric Algorithms • DES – Modes: ECB, CBC, CFB, OFB, CM • 3DES • AES • IDEA • Blowfish
  • 17. Symmetric Algorithms • RC4 • RC5 • CAST • SAFER • Twofish
  • 18. Asymmetric Algorithms • Diffie-Hellman • RSA • El Gamal • Elliptic Curve Cryptography (ECC)
  • 19. Hashing Algorithms • MD5 – Computes 128-bit hash value – Widely used for file integrity checking • SHA-1 – Computes 160-bit hash value – NIST approved message digest algorithm
  • 20. Hashing Algorithms • HAVAL – Computes between 128 and 256 bit hash – Between 3 and 5 rounds • RIPEMD-160 – Developed in Europe published in 1996 – Patent-free 20
  • 21. Birthday Attack • Collisions – Two messages with the same hash value • Based on the “birthday paradox” • Hash algorithms should be resistant to this attack
  • 22. Message Authentication Codes • Small block of data generated with a secret key and appended to a message • HMAC (RFC 2104) – Uses hash instead of cipher for speed – Used in SSL/TLS and IPSec
  • 23. Digital Signatures  Hash of message encrypted with private key  Digital Signature Standard (DSS) – DSA/RSA/ECD-SA plus SHA  DSS provides – Sender authentication – Verification of message integrity – Nonrepudiation
  • 24. Encryption Management • Key Distribution Center (KDC) – Uses master keys to issue session keys – Example: Kerberos • ANSI X9.17 – Used by financial institutions – Hierarchical set of keys – Higher levels used to distribute lower
  • 25. Public Key Infrastructure • All components needed to enable secure communication – Policies and Procedures – Keys and Algorithms – Software and Data Formats • Assures identity to users • Provides key management features
  • 26. PKI Components  Digital Certificates – Contains identity and verification info  Certificate Authorities – Trusted entity that issues certificates  Registration Authorities – Verifies identity for certificate requests  Certificate Revocation List (CRL)
  • 27. PKI Cross Certification • Process to establish a trust relationship between Cas • Allows each CA to validate certificates issued by the other CA • Used in large organizations or business partnerships
  • 28. Cryptanalysis • The study of methods to break cryptosystems • Often targeted at obtaining a key • Attacks may be passive or active
  • 29. Cryptanalysis • Kerckhoff’s Principle – The only secrecy involved with a cryptosystem should be the key • Cryptosystem Strength – How hard is it to determine the secret associated with the system?
  • 30. Cryptanalysis Attacks • Brute force – Trying all key values in the keyspace • Frequency Analysis – Guess values based on frequency of occurrence • Dictionary Attack – Find plaintext based on common words
  • 31. Cryptanalysis Attacks • Replay Attack – Repeating previous known values • Factoring Attacks – Find keys through prime factorization • Ciphertext-Only • Known Plaintext – Format or content of plaintext available
  • 32. Cryptanalysis Attacks • Chosen Plaintext – Attack can encrypt chosen plaintext • Chosen Ciphertext – Decrypt known ciphertext to discover key • Differential Power Analysis – Side Channel Attack – Identify algorithm and key length
  • 33. Cryptanalysis Attacks • Social Engineering – Humans are the weakest link • RNG Attack – Predict IV used by an algorithm • Temporary Files – May contain plaintext
  • 34. E-mail Security Protocols • Privacy Enhanced Email (PEM) • Pretty Good Privacy (PGP) – Based on a distributed trust model – Each user generates a key pair • S/MIME – Requires public key infrastructure – Supported by most e-mail clients
  • 35. Network Security • Link Encryption – Encrypt traffic headers + data – Transparent to users • End-to-End Encryption – Encrypts application layer data only – Network devices need not be aware
  • 36. Network Security  SSL/TLS • Supports mutual authentication • Secures a number of popular network services  IPSec • Security extensions for TCP/IP protocols • Supports encryption and authentication • Used for VPNs
  • 37. Questions? Those who have any Query Contact me on my Whats App No : 9766677504(only message) 37