SlideShare a Scribd company logo
Information  Cryptography & Security Week 7
Information Security & Authentication Cryptography Derived from the Greek word  kryptos  (meaning ‘hidden’) The aim of Cryptography is to hide its  meaning , rather than the existence of a message Cryptography can be divided into 2 branches, such as: 1. Transposition 2. Substitution
Cryptographic Methods 1. The Rail-Fence Transposition It is a transposition cryptography in which the message is written with alternate letters on separate upper and lower lines. For instance: “Rail-Fence” Transposition Cryptography (Singh, 2000)
Cryptographic Methods 2. The Spartan  scytale Other transposition cryptography in the military device The  Scytale  is a wooden staff around which a strip of leather or parchment is wound. For instance: Spartan  scytale (Singh, 2000)
Cryptographic Methods 3. The Caesar Shift Cipher By substitution, Julius Caesar replaced each letter in the message with the letter that is 3 places further down the alphabet.  For instance: “The Caesar Cipher” (Singh, 2000)
Cryptographic Methods 4. The Vigenere Square cipher The Vigenere cipher lies in using 26 distinct cipher alphabets. For instance: (Singh, 2000)
Cryptographic Methods Form of transposition cipher (Singh, 2000)
Exercises Encrypt a message: “SBY IS OUR PRESIDENT” in the Rail-Fence transposition cipher, the Caesar cipher, and the Vigenere cipher. For Vigenere cipher, the key = “SUHENDRO”. Encrypt a message: “ALO” by using Key = “TOP” in binary numbers with a simple transposition cipher.
Older Cryptographic Machine Enigma Machine In the World War II, a German cryptographic machine was invented by  Arthur Scherbius. (Singh, 2000)
Modern Cryptography Other Cryptographic methods: 1. Secret Key Cryptography 2. Public Key Cryptography
Modern Cryptography 1. “Secret Key” Cryptography It uses a secret key such as Data Encryption Standard (DES) DES is a National Institute of Standards & Technology (NIST) standard key cryptography method that uses a 56-bit key.  ( http:// www.nist.gov ) DES lets both sender and receiver use the same key  to encrypt or decrypt.
Modern Cryptography 1. Process of “Secret Key” Cryptography Ref: http://dret.net/lectures/web-fall08/img/secret-key.gif
Modern Cryptography 2. “Public Key” Cryptography It uses a private key (kept by owner) & public key is published The public key uses a standard RSA (Rivest-Shamir-Adleman) Data Security, Inc. Redwood City, CA. ( http:// www.rsa.com ) It is more secured than a secret key cryptography
Modern Cryptography 2. Process of “Public Key” Cryptography Ref: http://dret.net/lectures/web-spring09/img/public-key-secret-encrypt.gif
Digital Signature The ‘signature’ is an encrypted digest of the file (text message,   executable, etc) Digital Signature uses hash functions to the message along  with a private key. The message’s signature generates according to PGP  (Pretty Good Privacy) or SMIME (Secure Multipurpose Internet  Mail Extensions) standards. Note: PGP is a software widely used for signing and    encrypting email messages.
Digital Signature Process of Digital Signature Authentication Ref: http://www.infosec.gov.hk/english/itpro/images/digital_signature.gif
Digital Certificate Digital Certificate (Certs) ensures if a public key belongs to the owner. Digital Certificate (Certs) consists of: 1. A public key 2. Certificate Information  (i.e.: Identity of user, such as name, userID, etc) 3. One or more Digital Signature
Digital Certificate Example: Digital Certificate Ref: http://www.mysecurecyberspace.com/encyclopedia/index/digitalcertificate.pic1.jpeg Ref: http://media.photobucket.com/image/digital%20certificate%20image/msanto/One-Offs2009/GearsofWarDigitalCertificate.jpg
Digital Watermark A pattern of bits embedded into a file used to identify  the source of illegal copies. If a digital watermark is placed into a master copy of  an audio CD, DVD, file, etc then all copies of that disc are  uniquely identified. Example:  Ref: http://www.bytescout.com/images/examples/watermarking/watermarked_image_sample_text_fits_page.png
References Singh, S. (2000).The Code Book Freedman, A. (2001). Computer Desktop Encyclopedia

More Related Content

PPTX
Cryptography ppt by vaishnavi khandelwal
VaishnaviKhandelwal6
 
PPTX
Cryptography
AnandKaGe
 
PPT
Cryptography
PPT4U
 
PDF
Applied Cryptography
Marcelo Martins
 
PPT
Cryptography
IGZ Software house
 
PPTX
Cryptography
shubham Kumar
 
PPTX
Cryptography
Sandip kumar
 
PPTX
cryptography ppt free download
Twinkal Harsora
 
Cryptography ppt by vaishnavi khandelwal
VaishnaviKhandelwal6
 
Cryptography
AnandKaGe
 
Cryptography
PPT4U
 
Applied Cryptography
Marcelo Martins
 
Cryptography
IGZ Software house
 
Cryptography
shubham Kumar
 
Cryptography
Sandip kumar
 
cryptography ppt free download
Twinkal Harsora
 

What's hot (9)

PDF
Information Security Cryptography ( L01- introduction )
Anas Rock
 
PPTX
Network security and cryptography
RajKumar Rampelli
 
PPTX
Basic cryptography
Perfect Training Center
 
PDF
digital signature for SMS security
Nilu Desai
 
PPSX
Cryptography
Niharjyoti Sarangi
 
PPT
Cryptography
amiable_indian
 
PDF
Ss
yuyatamaru
 
PPTX
Cryptography
Hassan Osama
 
PPTX
Symmetric and asymmetric key
Triad Square InfoSec
 
Information Security Cryptography ( L01- introduction )
Anas Rock
 
Network security and cryptography
RajKumar Rampelli
 
Basic cryptography
Perfect Training Center
 
digital signature for SMS security
Nilu Desai
 
Cryptography
Niharjyoti Sarangi
 
Cryptography
amiable_indian
 
Cryptography
Hassan Osama
 
Symmetric and asymmetric key
Triad Square InfoSec
 
Ad

Similar to Information Cryptography Security (20)

PPT
Cryptography - An Overview
ppd1961
 
PPTX
Introduction to Cryptography for btech cse
mahesh64847
 
PPTX
cryptography
Abhijeet Singh
 
PPT
Rothke Info Security Canada 2007 Final
Ben Rothke
 
PPT
Cryptography - A Brief History
prasenjeetd
 
PDF
Class 16
Dr. Ajith Sundaram
 
PPTX
Cryptography and Network Security Principles.pptx
AbrahamThompson3
 
PDF
Fundamentals of Cryptography: Securing Data in the Digital Age
avengersimran16
 
PDF
Survey Paper: Cryptography Is The Science Of Information Security
CSCJournals
 
PPTX
Network security
ABHISHEK KUMAR
 
PPTX
Cryptography
Jasim Jas
 
PDF
Evolution of Cryptography and Cryptographic techniques
Mona Rajput
 
PPT
Crypt
Mir Majid
 
PDF
Security Systems for Digital Data - Paper
Bernhard Hofer
 
DOC
Cryptography saurabh
SaurabhChakraverty1
 
PPTX
Cryptogravsgsgsgstysysysytsggsyphy (1).pptx
bashkebbay
 
DOCX
Cryptography : The Art of Secured Messaging
Sumit Satam
 
PPT
Fundamentals of cryptography
Hossain Md Shakhawat
 
PDF
Encryption
s1170037
 
PDF
encryption
s1170037
 
Cryptography - An Overview
ppd1961
 
Introduction to Cryptography for btech cse
mahesh64847
 
cryptography
Abhijeet Singh
 
Rothke Info Security Canada 2007 Final
Ben Rothke
 
Cryptography - A Brief History
prasenjeetd
 
Cryptography and Network Security Principles.pptx
AbrahamThompson3
 
Fundamentals of Cryptography: Securing Data in the Digital Age
avengersimran16
 
Survey Paper: Cryptography Is The Science Of Information Security
CSCJournals
 
Network security
ABHISHEK KUMAR
 
Cryptography
Jasim Jas
 
Evolution of Cryptography and Cryptographic techniques
Mona Rajput
 
Crypt
Mir Majid
 
Security Systems for Digital Data - Paper
Bernhard Hofer
 
Cryptography saurabh
SaurabhChakraverty1
 
Cryptogravsgsgsgstysysysytsggsyphy (1).pptx
bashkebbay
 
Cryptography : The Art of Secured Messaging
Sumit Satam
 
Fundamentals of cryptography
Hossain Md Shakhawat
 
Encryption
s1170037
 
encryption
s1170037
 
Ad

More from Achmad Solichin (20)

PDF
Kuliah Umum - Tips Publikasi Jurnal SINTA untuk Mahasiswa Galau (6 Agustus 2022)
Achmad Solichin
 
PDF
Materi Webinar Web 3.0 (16 Juli 2022)
Achmad Solichin
 
PDF
Webinar: Kesadaran Keamanan Informasi (3 Desember 2021)
Achmad Solichin
 
PPTX
Webinar PHP-ID: Mari Mengenal Logika Fuzzy (Fuzzy Logic)
Achmad Solichin
 
PDF
Webinar PHP-ID: Machine Learning dengan PHP
Achmad Solichin
 
PPTX
Webinar Data Mining dengan Rapidminer | Universitas Budi Luhur
Achmad Solichin
 
PPTX
TREN DAN IDE RISET BIDANG DATA MINING TERBARU
Achmad Solichin
 
PPTX
Metodologi Riset: Literature Review
Achmad Solichin
 
PPTX
Materi Seminar: Artificial Intelligence dengan PHP
Achmad Solichin
 
PPTX
Percobaan Perpindahan Kalor melalui Konduksi, Konveksi dan Radiasi
Achmad Solichin
 
PDF
Metodologi Riset: Literature Review
Achmad Solichin
 
PPTX
Depth First Search (DFS) pada Graph
Achmad Solichin
 
PPTX
Breadth First Search (BFS) pada Graph
Achmad Solichin
 
PPTX
Binary Search Tree (BST) - Algoritma dan Struktur Data
Achmad Solichin
 
PPTX
Computer Vision di Era Industri 4.0
Achmad Solichin
 
PDF
Seminar: Become a Reliable Web Programmer
Achmad Solichin
 
PPTX
The Big 5: Future IT Trends
Achmad Solichin
 
PDF
Modern PHP Developer
Achmad Solichin
 
PPTX
Seminar: PHP Developer for Dummies
Achmad Solichin
 
PPT
Pertemuan 1 - Algoritma dan Struktur Data 1
Achmad Solichin
 
Kuliah Umum - Tips Publikasi Jurnal SINTA untuk Mahasiswa Galau (6 Agustus 2022)
Achmad Solichin
 
Materi Webinar Web 3.0 (16 Juli 2022)
Achmad Solichin
 
Webinar: Kesadaran Keamanan Informasi (3 Desember 2021)
Achmad Solichin
 
Webinar PHP-ID: Mari Mengenal Logika Fuzzy (Fuzzy Logic)
Achmad Solichin
 
Webinar PHP-ID: Machine Learning dengan PHP
Achmad Solichin
 
Webinar Data Mining dengan Rapidminer | Universitas Budi Luhur
Achmad Solichin
 
TREN DAN IDE RISET BIDANG DATA MINING TERBARU
Achmad Solichin
 
Metodologi Riset: Literature Review
Achmad Solichin
 
Materi Seminar: Artificial Intelligence dengan PHP
Achmad Solichin
 
Percobaan Perpindahan Kalor melalui Konduksi, Konveksi dan Radiasi
Achmad Solichin
 
Metodologi Riset: Literature Review
Achmad Solichin
 
Depth First Search (DFS) pada Graph
Achmad Solichin
 
Breadth First Search (BFS) pada Graph
Achmad Solichin
 
Binary Search Tree (BST) - Algoritma dan Struktur Data
Achmad Solichin
 
Computer Vision di Era Industri 4.0
Achmad Solichin
 
Seminar: Become a Reliable Web Programmer
Achmad Solichin
 
The Big 5: Future IT Trends
Achmad Solichin
 
Modern PHP Developer
Achmad Solichin
 
Seminar: PHP Developer for Dummies
Achmad Solichin
 
Pertemuan 1 - Algoritma dan Struktur Data 1
Achmad Solichin
 

Recently uploaded (20)

PDF
Sunset Boulevard Student Revision Booklet
jpinnuck
 
PPTX
CARE OF UNCONSCIOUS PATIENTS .pptx
AneetaSharma15
 
PPTX
HISTORY COLLECTION FOR PSYCHIATRIC PATIENTS.pptx
PoojaSen20
 
PDF
1.Natural-Resources-and-Their-Use.ppt pdf /8th class social science Exploring...
Sandeep Swamy
 
PPTX
How to Manage Leads in Odoo 18 CRM - Odoo Slides
Celine George
 
DOCX
Unit 5: Speech-language and swallowing disorders
JELLA VISHNU DURGA PRASAD
 
PPTX
CDH. pptx
AneetaSharma15
 
PDF
The Picture of Dorian Gray summary and depiction
opaliyahemel
 
PPTX
An introduction to Prepositions for beginners.pptx
drsiddhantnagine
 
PDF
The-Invisible-Living-World-Beyond-Our-Naked-Eye chapter 2.pdf/8th science cur...
Sandeep Swamy
 
PDF
PG-BPSDMP 2 TAHUN 2025PG-BPSDMP 2 TAHUN 2025.pdf
AshifaRamadhani
 
PPTX
Introduction to pediatric nursing in 5th Sem..pptx
AneetaSharma15
 
PDF
Virat Kohli- the Pride of Indian cricket
kushpar147
 
PPTX
Odoo 18 Sales_ Managing Quotation Validity
Celine George
 
PDF
What is CFA?? Complete Guide to the Chartered Financial Analyst Program
sp4989653
 
PDF
UTS Health Student Promotional Representative_Position Description.pdf
Faculty of Health, University of Technology Sydney
 
PDF
Presentation of the MIPLM subject matter expert Erdem Kaya
MIPLM
 
PDF
The Minister of Tourism, Culture and Creative Arts, Abla Dzifa Gomashie has e...
nservice241
 
PPTX
Trends in pediatric nursing .pptx
AneetaSharma15
 
DOCX
SAROCES Action-Plan FOR ARAL PROGRAM IN DEPED
Levenmartlacuna1
 
Sunset Boulevard Student Revision Booklet
jpinnuck
 
CARE OF UNCONSCIOUS PATIENTS .pptx
AneetaSharma15
 
HISTORY COLLECTION FOR PSYCHIATRIC PATIENTS.pptx
PoojaSen20
 
1.Natural-Resources-and-Their-Use.ppt pdf /8th class social science Exploring...
Sandeep Swamy
 
How to Manage Leads in Odoo 18 CRM - Odoo Slides
Celine George
 
Unit 5: Speech-language and swallowing disorders
JELLA VISHNU DURGA PRASAD
 
CDH. pptx
AneetaSharma15
 
The Picture of Dorian Gray summary and depiction
opaliyahemel
 
An introduction to Prepositions for beginners.pptx
drsiddhantnagine
 
The-Invisible-Living-World-Beyond-Our-Naked-Eye chapter 2.pdf/8th science cur...
Sandeep Swamy
 
PG-BPSDMP 2 TAHUN 2025PG-BPSDMP 2 TAHUN 2025.pdf
AshifaRamadhani
 
Introduction to pediatric nursing in 5th Sem..pptx
AneetaSharma15
 
Virat Kohli- the Pride of Indian cricket
kushpar147
 
Odoo 18 Sales_ Managing Quotation Validity
Celine George
 
What is CFA?? Complete Guide to the Chartered Financial Analyst Program
sp4989653
 
UTS Health Student Promotional Representative_Position Description.pdf
Faculty of Health, University of Technology Sydney
 
Presentation of the MIPLM subject matter expert Erdem Kaya
MIPLM
 
The Minister of Tourism, Culture and Creative Arts, Abla Dzifa Gomashie has e...
nservice241
 
Trends in pediatric nursing .pptx
AneetaSharma15
 
SAROCES Action-Plan FOR ARAL PROGRAM IN DEPED
Levenmartlacuna1
 

Information Cryptography Security

  • 1. Information Cryptography & Security Week 7
  • 2. Information Security & Authentication Cryptography Derived from the Greek word kryptos (meaning ‘hidden’) The aim of Cryptography is to hide its meaning , rather than the existence of a message Cryptography can be divided into 2 branches, such as: 1. Transposition 2. Substitution
  • 3. Cryptographic Methods 1. The Rail-Fence Transposition It is a transposition cryptography in which the message is written with alternate letters on separate upper and lower lines. For instance: “Rail-Fence” Transposition Cryptography (Singh, 2000)
  • 4. Cryptographic Methods 2. The Spartan scytale Other transposition cryptography in the military device The Scytale is a wooden staff around which a strip of leather or parchment is wound. For instance: Spartan scytale (Singh, 2000)
  • 5. Cryptographic Methods 3. The Caesar Shift Cipher By substitution, Julius Caesar replaced each letter in the message with the letter that is 3 places further down the alphabet. For instance: “The Caesar Cipher” (Singh, 2000)
  • 6. Cryptographic Methods 4. The Vigenere Square cipher The Vigenere cipher lies in using 26 distinct cipher alphabets. For instance: (Singh, 2000)
  • 7. Cryptographic Methods Form of transposition cipher (Singh, 2000)
  • 8. Exercises Encrypt a message: “SBY IS OUR PRESIDENT” in the Rail-Fence transposition cipher, the Caesar cipher, and the Vigenere cipher. For Vigenere cipher, the key = “SUHENDRO”. Encrypt a message: “ALO” by using Key = “TOP” in binary numbers with a simple transposition cipher.
  • 9. Older Cryptographic Machine Enigma Machine In the World War II, a German cryptographic machine was invented by Arthur Scherbius. (Singh, 2000)
  • 10. Modern Cryptography Other Cryptographic methods: 1. Secret Key Cryptography 2. Public Key Cryptography
  • 11. Modern Cryptography 1. “Secret Key” Cryptography It uses a secret key such as Data Encryption Standard (DES) DES is a National Institute of Standards & Technology (NIST) standard key cryptography method that uses a 56-bit key. ( http:// www.nist.gov ) DES lets both sender and receiver use the same key to encrypt or decrypt.
  • 12. Modern Cryptography 1. Process of “Secret Key” Cryptography Ref: http://dret.net/lectures/web-fall08/img/secret-key.gif
  • 13. Modern Cryptography 2. “Public Key” Cryptography It uses a private key (kept by owner) & public key is published The public key uses a standard RSA (Rivest-Shamir-Adleman) Data Security, Inc. Redwood City, CA. ( http:// www.rsa.com ) It is more secured than a secret key cryptography
  • 14. Modern Cryptography 2. Process of “Public Key” Cryptography Ref: http://dret.net/lectures/web-spring09/img/public-key-secret-encrypt.gif
  • 15. Digital Signature The ‘signature’ is an encrypted digest of the file (text message, executable, etc) Digital Signature uses hash functions to the message along with a private key. The message’s signature generates according to PGP (Pretty Good Privacy) or SMIME (Secure Multipurpose Internet Mail Extensions) standards. Note: PGP is a software widely used for signing and encrypting email messages.
  • 16. Digital Signature Process of Digital Signature Authentication Ref: http://www.infosec.gov.hk/english/itpro/images/digital_signature.gif
  • 17. Digital Certificate Digital Certificate (Certs) ensures if a public key belongs to the owner. Digital Certificate (Certs) consists of: 1. A public key 2. Certificate Information (i.e.: Identity of user, such as name, userID, etc) 3. One or more Digital Signature
  • 18. Digital Certificate Example: Digital Certificate Ref: http://www.mysecurecyberspace.com/encyclopedia/index/digitalcertificate.pic1.jpeg Ref: http://media.photobucket.com/image/digital%20certificate%20image/msanto/One-Offs2009/GearsofWarDigitalCertificate.jpg
  • 19. Digital Watermark A pattern of bits embedded into a file used to identify the source of illegal copies. If a digital watermark is placed into a master copy of an audio CD, DVD, file, etc then all copies of that disc are uniquely identified. Example: Ref: http://www.bytescout.com/images/examples/watermarking/watermarked_image_sample_text_fits_page.png
  • 20. References Singh, S. (2000).The Code Book Freedman, A. (2001). Computer Desktop Encyclopedia