SlideShare a Scribd company logo
9
Most read
11
Most read
15
Most read
Zahid Mian
Part of the Brown-bag Series
 History andTerms
 WhyWe Need Encryption
 How is Encryption Used In Systems
 Difference in Ciphers
 Various Implementations
 HashValues
 Digital Signatures
 Why Attacks Are Successful
 Hieroglyphs
 4000 years ago
 Use pictures to represent words/messages
 Caesar ShiftCipher
 Replace characters by an offset (or shifting)
 Offset = 2, then “hello” -> “jgnnq”
 Improvements over time
 Steganography,Vigenere Coding
 Modern really means digital
 Much more mathematically oriented
 Operating on bit values
 Use of public key and secret key
 Even though algorithm are public, it’s nearly
impossible to obtain original information
 Plaintext –The original information
 Cipher – A secret way of writing (an algorithm)
 Encryption Key – A value that is used to encrypt plaintext
(aka, public key)
 Decryption Key – A value that is used to decrypt
Ciphertext (aka, private key)
 Ciphertext -The encrypted information
 Algorithm – (Often) Public algorithm that uses keys to
encrypt or decrypt information
 Interceptor/Attacker – unauthorized entity that tries to
determine the cipher text (aka, hacker)
 Symmetric – single key used for encryption and
decryption
 Asymmetric – uses public key and private key
http://www.infosectoday.com/Articles/Intro_to_Cryptography/CryptoFig05a.jpg
This is how things generally work today, but there are a lot of
pieces that make this happen.
 Passive – Simply gaining unauthorized access to
information.
 Most common password is 123456
 Active – A hacker attempts to make changes to
data on the target or data en route
 Masquerading: hacker pretends to be someone
 Denial of Service (DoS): deny access to legitimate
users by overwhelming the system (common)
 Using technical information to steal user id (e.g.,
using session id)
 Known Plaintext Attack (KPA)
 Attacker knows plaintext of some part of the ciphertext; attempts to
decrypt the rest
 Chosen Plaintext Attack (CPA)
 Attacker has ciphertext and plaintext; attempts to determine key
 Brute Force Attack (BFA)
 Attacker tries to determine key by attempting all possible values
 Man in the Middle (MIM)
 Simple, but technically challenging method of duping both the sender
and the receiver into thinking keys came from correct source
 Side Channel Attacks (SCA)
 Data Remanence (reading data that should have been deleted)
 Row Hammer (low-level memory hack)
 Fault Analysis (forcing errors and reading outputs for clues)
 Traditionally Ciphers were single character
 Caesar Cipher: shift a single character
 Two-character Cipher (Playfair)
 Use two characters as key
 String Cipher (Vigenere)
 Use a string (word) as key
 One-Time Pad
 Key length equals length of plaintext
 Block/Stream (DES,AES)
 Plaintext is processed in blocks/streams of bits at a
time
Simple
Feedback
 Underlying model for many block ciphers
 Same algorithm for encryption/decryption
 Steps
 Input is split into two halves
 RHS input is transformed by function f which receives
a subkey
 LHS combined with transformed input from RHS
using XOR operation
 RHS and LHS are switched to obtain the input for next
round
 Repeat
32 bit 32 bit
f
32 bit 32 bit
32 bit 32 bit
Ki
LHSi-1 RHSi-1
LHSi-1 = RHSi-1 RHSi-1 = LHSi-1
 Block size is 64 bits
 Key length is 64 bits (though only 56 are used)
 Round-key generator creates 48-bit Key
• Very Strong Cipher
• Fallen out of favor
because small key value
• Can be hacked with
exhaustive search
 Don’t abandon original DES; change usage
 Effectively use 3 Keys (3X56 = 168)
 Problem of short key solved
 Kind of slow
 Process
 Encrypt plaintext using K1
 Decrypt output of Step1 using K2
 Encrypt output of Step2 using K3
 Output of Step3 is ciphertext
 Decrypt in reverse order
 The more popular algorithm today
 Much faster thanTriple DES
 128-bit data; 128/192/256-bit keys
 Key size depends on the number of rounds
 A “bit” more complex algorithm (pun
intended)
 For details see online resources
 To-Date no attacks againstAES have been
successful
 Asymmetric Cipher (diff keys)
 Necessary due to growth of
Internet
 Used for smaller pieces of data
 ThreeTypes
 RSA (widely used)
 ElGamal
 Elliptic Curve Cryptography (ECC)
http://etutorials.org/Programming/Programming+.net+security/Part+III+.NET+Cryptography/Chapter+15.+Asymmetric+Encryption/15.1+
Asymmetric+Encryption+Explained/
 Function that converts arbitrarily long numeric
input into a fixed numeric output called a hash
 Very Efficient
 Hard to reverse value
 Hard to produce same hash for diff inputs
 Some well known Hash Functions
 Message Digest (MD), Secure Hash Function (SHA),
RIPEMD
 Most Common Use: Password Storage
 Secure Apps will not save your password in plaintext
 How can we be sure a message is authentic?
 In the old days, a signature on a letter proved
authenticity
 Digital Signatures do the same thing-they
ensure that the message is from the original
sender with the original message
 Adds trust when exchanging data
 Using Encryption with Digital Signatures is
important
 Certifying Authority (CA) responsible for
management of certificates
 Generating, issuing, publishing, verifying, revoking
Encryption of Email
Decryption of Email
 User Carelessness / Stolen Credentials
 Stolen equipment (laptops, phones, etc.)
 Incorrect Implementation / Backdoor
 Broken Processes / InsiderThreats
 PhishingAttacks
 Sending sensitive data over plaintext
 Zero-day threats / Maintenance
 Application vulnerabilities
Intro to modern cryptography
Intro to modern cryptography

More Related Content

What's hot (20)

PPT
Cryptography and Network Security William Stallings Lawrie Brown
Information Security Awareness Group
 
PPTX
Cryptography
Darshini Parikh
 
PPTX
Cryptanalysis
Sou Jana
 
PPTX
Cryptographic algorithms
Anamika Singh
 
PPTX
SHA- Secure hashing algorithm
Ruchi Maurya
 
PPT
Network Security and Cryptography
Adam Reagan
 
PPTX
Data Encryption Standard (DES)
Haris Ahmed
 
PDF
Network security - OSI Security Architecture
BharathiKrishna6
 
PPTX
Rc4
Amjad Rehman
 
PDF
Classical encryption techniques
Dr.Florence Dayana
 
PPTX
Cryptography
Sagar Janagonda
 
PPTX
Encryption algorithms
trilokchandra prakash
 
PPTX
Cryptography
Sidharth Mohapatra
 
PPTX
Vigenere cipher
Abd-Ur Rehman Saqib
 
PPTX
Cryptography
jayashri kolekar
 
PPTX
CS8792 - Cryptography and Network Security
vishnukp34
 
PPTX
RSA Algorithm
Srinadh Muvva
 
PPTX
Symmetric and asymmetric key
Triad Square InfoSec
 
PPTX
Hash Function
ssuserdfb2da
 
PDF
Transposition cipher
Antony Alex
 
Cryptography and Network Security William Stallings Lawrie Brown
Information Security Awareness Group
 
Cryptography
Darshini Parikh
 
Cryptanalysis
Sou Jana
 
Cryptographic algorithms
Anamika Singh
 
SHA- Secure hashing algorithm
Ruchi Maurya
 
Network Security and Cryptography
Adam Reagan
 
Data Encryption Standard (DES)
Haris Ahmed
 
Network security - OSI Security Architecture
BharathiKrishna6
 
Classical encryption techniques
Dr.Florence Dayana
 
Cryptography
Sagar Janagonda
 
Encryption algorithms
trilokchandra prakash
 
Cryptography
Sidharth Mohapatra
 
Vigenere cipher
Abd-Ur Rehman Saqib
 
Cryptography
jayashri kolekar
 
CS8792 - Cryptography and Network Security
vishnukp34
 
RSA Algorithm
Srinadh Muvva
 
Symmetric and asymmetric key
Triad Square InfoSec
 
Hash Function
ssuserdfb2da
 
Transposition cipher
Antony Alex
 

Viewers also liked (20)

PPT
Ch31
bitistu
 
PDF
Information Security Cryptography ( L02- Types Cryptography)
Anas Rock
 
PPTX
Cryptography using rsa cryptosystem
Samdish Arora
 
PDF
Modern Cryptography
James McGivern
 
PPTX
Apprenticeship artifact
Shooter24
 
PDF
Data Encryption and Decryption using Hill Cipher
Aashirwad Kashyap
 
PDF
Cryptography by Epul
Agate Studio
 
PPTX
Rsa algorithm key generation
swarnapatil
 
PPTX
Cryptography
pravin pandey
 
PPTX
Message digest & digital signature
Dinesh Kodam
 
PPT
Forouzan isdn
Mahesh Kumar Chelimilla
 
PPT
PSTN
aminpathan11
 
PPT
Basic ISDN
Chris McAndrew
 
PDF
CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
 
POT
ISDN & DSL
Umair Arain
 
PPT
Diffiehellman
chenlahero
 
PPT
13 asymmetric key cryptography
drewz lin
 
PPT
Lesson 1 the pstn
kongara
 
PPTX
Presentation on DSL & ADSL
rewa_monami
 
PPTX
DSL - ADSL
tucho
 
Ch31
bitistu
 
Information Security Cryptography ( L02- Types Cryptography)
Anas Rock
 
Cryptography using rsa cryptosystem
Samdish Arora
 
Modern Cryptography
James McGivern
 
Apprenticeship artifact
Shooter24
 
Data Encryption and Decryption using Hill Cipher
Aashirwad Kashyap
 
Cryptography by Epul
Agate Studio
 
Rsa algorithm key generation
swarnapatil
 
Cryptography
pravin pandey
 
Message digest & digital signature
Dinesh Kodam
 
Basic ISDN
Chris McAndrew
 
CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
 
ISDN & DSL
Umair Arain
 
Diffiehellman
chenlahero
 
13 asymmetric key cryptography
drewz lin
 
Lesson 1 the pstn
kongara
 
Presentation on DSL & ADSL
rewa_monami
 
DSL - ADSL
tucho
 
Ad

Similar to Intro to modern cryptography (20)

PPTX
CH02-CompSec4e.pptx
ams1ams11
 
PPT
needed.ppt
faizalkhan673954
 
PPT
crypto.ppt
Ganesh Chavan
 
PPT
crypto1.ppt
tommychauhan
 
PPT
introduction to cryptography (basics of it)
neonaveen
 
PPTX
NS UNIT 1 Advanced Encryption Standard& RSA
AntonySuresh13
 
PPT
introduction to cryptography
Priyamvada Singh
 
PDF
CNIT 125 Ch 4. Security Engineering (Part 2)
Sam Bowne
 
PDF
CISSP Prep: Ch 4. Security Engineering (Part 2)
Sam Bowne
 
PPT
CISSP EXAM PREPARATION FOR A PASSED SCORE
rinelaam
 
PPTX
Cryptography - 101
n|u - The Open Security Community
 
PPTX
Cryptography-101
Vishal Punjabi
 
PPTX
CISSP - Chapter 3 - Cryptography
Karthikeyan Dhayalan
 
PPTX
Cryptography
Pratiksha Patil
 
PPTX
Security - ch3.pptx
GebrehanaAlemaw
 
PPTX
Security - ch3.pptx
HabtamuHaileMichael2
 
PPTX
Chapter-Three Part One.pptxghgjhhjghjhjhhj
Shemse Shukre
 
PDF
Fundamentals of Cryptography: Securing Data in the Digital Age
avengersimran16
 
PPT
Cryptography cse,ru
Hossain Md Shakhawat
 
PPTX
Fundamentals of Information Encryption
Amna Magzoub
 
CH02-CompSec4e.pptx
ams1ams11
 
needed.ppt
faizalkhan673954
 
crypto.ppt
Ganesh Chavan
 
crypto1.ppt
tommychauhan
 
introduction to cryptography (basics of it)
neonaveen
 
NS UNIT 1 Advanced Encryption Standard& RSA
AntonySuresh13
 
introduction to cryptography
Priyamvada Singh
 
CNIT 125 Ch 4. Security Engineering (Part 2)
Sam Bowne
 
CISSP Prep: Ch 4. Security Engineering (Part 2)
Sam Bowne
 
CISSP EXAM PREPARATION FOR A PASSED SCORE
rinelaam
 
Cryptography-101
Vishal Punjabi
 
CISSP - Chapter 3 - Cryptography
Karthikeyan Dhayalan
 
Cryptography
Pratiksha Patil
 
Security - ch3.pptx
GebrehanaAlemaw
 
Security - ch3.pptx
HabtamuHaileMichael2
 
Chapter-Three Part One.pptxghgjhhjghjhjhhj
Shemse Shukre
 
Fundamentals of Cryptography: Securing Data in the Digital Age
avengersimran16
 
Cryptography cse,ru
Hossain Md Shakhawat
 
Fundamentals of Information Encryption
Amna Magzoub
 
Ad

More from zahid-mian (9)

PDF
Mongodb Aggregation Pipeline
zahid-mian
 
PDF
MongoD Essentials
zahid-mian
 
PDF
Hadoop Technologies
zahid-mian
 
PDF
Hadoop M/R Pig Hive
zahid-mian
 
PDF
NoSQL Databases
zahid-mian
 
PDF
Statistics101: Numerical Measures
zahid-mian
 
PDF
Amazon SimpleDB
zahid-mian
 
PDF
C# 6 New Features
zahid-mian
 
PDF
Introduction to d3js (and SVG)
zahid-mian
 
Mongodb Aggregation Pipeline
zahid-mian
 
MongoD Essentials
zahid-mian
 
Hadoop Technologies
zahid-mian
 
Hadoop M/R Pig Hive
zahid-mian
 
NoSQL Databases
zahid-mian
 
Statistics101: Numerical Measures
zahid-mian
 
Amazon SimpleDB
zahid-mian
 
C# 6 New Features
zahid-mian
 
Introduction to d3js (and SVG)
zahid-mian
 

Recently uploaded (20)

PDF
AI + DevOps = Smart Automation with devseccops.ai.pdf
Devseccops.ai
 
PDF
AI Prompts Cheat Code prompt engineering
Avijit Kumar Roy
 
PPTX
AEM User Group: India Chapter Kickoff Meeting
jennaf3
 
PDF
SAP Firmaya İade ABAB Kodları - ABAB ile yazılmıl hazır kod örneği
Salih Küçük
 
PDF
Open Chain Q2 Steering Committee Meeting - 2025-06-25
Shane Coughlan
 
PDF
[Solution] Why Choose the VeryPDF DRM Protector Custom-Built Solution for You...
Lingwen1998
 
PDF
SciPy 2025 - Packaging a Scientific Python Project
Henry Schreiner
 
PPTX
OpenChain @ OSS NA - In From the Cold: Open Source as Part of Mainstream Soft...
Shane Coughlan
 
PPTX
Coefficient of Variance in IBM SPSS Statistics Version 31.pptx
Version 1 Analytics
 
PDF
The 5 Reasons for IT Maintenance - Arna Softech
Arna Softech
 
PPTX
Foundations of Marketo Engage - Powering Campaigns with Marketo Personalization
bbedford2
 
PPTX
Build a Custom Agent for Agentic Testing.pptx
klpathrudu
 
PDF
How to Hire AI Developers_ Step-by-Step Guide in 2025.pdf
DianApps Technologies
 
PDF
IObit Driver Booster Pro 12.4.0.585 Crack Free Download
henryc1122g
 
PDF
Salesforce Experience Cloud Consultant.pdf
VALiNTRY360
 
PDF
MiniTool Power Data Recovery 8.8 With Crack New Latest 2025
bashirkhan333g
 
PPTX
Homogeneity of Variance Test Options IBM SPSS Statistics Version 31.pptx
Version 1 Analytics
 
PDF
4K Video Downloader Plus Pro Crack for MacOS New Download 2025
bashirkhan333g
 
PDF
TheFutureIsDynamic-BoxLang witch Luis Majano.pdf
Ortus Solutions, Corp
 
PDF
Generic or Specific? Making sensible software design decisions
Bert Jan Schrijver
 
AI + DevOps = Smart Automation with devseccops.ai.pdf
Devseccops.ai
 
AI Prompts Cheat Code prompt engineering
Avijit Kumar Roy
 
AEM User Group: India Chapter Kickoff Meeting
jennaf3
 
SAP Firmaya İade ABAB Kodları - ABAB ile yazılmıl hazır kod örneği
Salih Küçük
 
Open Chain Q2 Steering Committee Meeting - 2025-06-25
Shane Coughlan
 
[Solution] Why Choose the VeryPDF DRM Protector Custom-Built Solution for You...
Lingwen1998
 
SciPy 2025 - Packaging a Scientific Python Project
Henry Schreiner
 
OpenChain @ OSS NA - In From the Cold: Open Source as Part of Mainstream Soft...
Shane Coughlan
 
Coefficient of Variance in IBM SPSS Statistics Version 31.pptx
Version 1 Analytics
 
The 5 Reasons for IT Maintenance - Arna Softech
Arna Softech
 
Foundations of Marketo Engage - Powering Campaigns with Marketo Personalization
bbedford2
 
Build a Custom Agent for Agentic Testing.pptx
klpathrudu
 
How to Hire AI Developers_ Step-by-Step Guide in 2025.pdf
DianApps Technologies
 
IObit Driver Booster Pro 12.4.0.585 Crack Free Download
henryc1122g
 
Salesforce Experience Cloud Consultant.pdf
VALiNTRY360
 
MiniTool Power Data Recovery 8.8 With Crack New Latest 2025
bashirkhan333g
 
Homogeneity of Variance Test Options IBM SPSS Statistics Version 31.pptx
Version 1 Analytics
 
4K Video Downloader Plus Pro Crack for MacOS New Download 2025
bashirkhan333g
 
TheFutureIsDynamic-BoxLang witch Luis Majano.pdf
Ortus Solutions, Corp
 
Generic or Specific? Making sensible software design decisions
Bert Jan Schrijver
 

Intro to modern cryptography

  • 1. Zahid Mian Part of the Brown-bag Series
  • 2.  History andTerms  WhyWe Need Encryption  How is Encryption Used In Systems  Difference in Ciphers  Various Implementations  HashValues  Digital Signatures  Why Attacks Are Successful
  • 3.  Hieroglyphs  4000 years ago  Use pictures to represent words/messages  Caesar ShiftCipher  Replace characters by an offset (or shifting)  Offset = 2, then “hello” -> “jgnnq”  Improvements over time  Steganography,Vigenere Coding
  • 4.  Modern really means digital  Much more mathematically oriented  Operating on bit values  Use of public key and secret key  Even though algorithm are public, it’s nearly impossible to obtain original information
  • 5.  Plaintext –The original information  Cipher – A secret way of writing (an algorithm)  Encryption Key – A value that is used to encrypt plaintext (aka, public key)  Decryption Key – A value that is used to decrypt Ciphertext (aka, private key)  Ciphertext -The encrypted information  Algorithm – (Often) Public algorithm that uses keys to encrypt or decrypt information  Interceptor/Attacker – unauthorized entity that tries to determine the cipher text (aka, hacker)  Symmetric – single key used for encryption and decryption  Asymmetric – uses public key and private key
  • 7.  Passive – Simply gaining unauthorized access to information.  Most common password is 123456  Active – A hacker attempts to make changes to data on the target or data en route  Masquerading: hacker pretends to be someone  Denial of Service (DoS): deny access to legitimate users by overwhelming the system (common)  Using technical information to steal user id (e.g., using session id)
  • 8.  Known Plaintext Attack (KPA)  Attacker knows plaintext of some part of the ciphertext; attempts to decrypt the rest  Chosen Plaintext Attack (CPA)  Attacker has ciphertext and plaintext; attempts to determine key  Brute Force Attack (BFA)  Attacker tries to determine key by attempting all possible values  Man in the Middle (MIM)  Simple, but technically challenging method of duping both the sender and the receiver into thinking keys came from correct source  Side Channel Attacks (SCA)  Data Remanence (reading data that should have been deleted)  Row Hammer (low-level memory hack)  Fault Analysis (forcing errors and reading outputs for clues)
  • 9.  Traditionally Ciphers were single character  Caesar Cipher: shift a single character  Two-character Cipher (Playfair)  Use two characters as key  String Cipher (Vigenere)  Use a string (word) as key  One-Time Pad  Key length equals length of plaintext  Block/Stream (DES,AES)  Plaintext is processed in blocks/streams of bits at a time
  • 11.  Underlying model for many block ciphers  Same algorithm for encryption/decryption  Steps  Input is split into two halves  RHS input is transformed by function f which receives a subkey  LHS combined with transformed input from RHS using XOR operation  RHS and LHS are switched to obtain the input for next round  Repeat
  • 12. 32 bit 32 bit f 32 bit 32 bit 32 bit 32 bit Ki LHSi-1 RHSi-1 LHSi-1 = RHSi-1 RHSi-1 = LHSi-1
  • 13.  Block size is 64 bits  Key length is 64 bits (though only 56 are used)  Round-key generator creates 48-bit Key • Very Strong Cipher • Fallen out of favor because small key value • Can be hacked with exhaustive search
  • 14.  Don’t abandon original DES; change usage  Effectively use 3 Keys (3X56 = 168)  Problem of short key solved  Kind of slow  Process  Encrypt plaintext using K1  Decrypt output of Step1 using K2  Encrypt output of Step2 using K3  Output of Step3 is ciphertext  Decrypt in reverse order
  • 15.  The more popular algorithm today  Much faster thanTriple DES  128-bit data; 128/192/256-bit keys  Key size depends on the number of rounds  A “bit” more complex algorithm (pun intended)  For details see online resources  To-Date no attacks againstAES have been successful
  • 16.  Asymmetric Cipher (diff keys)  Necessary due to growth of Internet  Used for smaller pieces of data  ThreeTypes  RSA (widely used)  ElGamal  Elliptic Curve Cryptography (ECC)
  • 18.  Function that converts arbitrarily long numeric input into a fixed numeric output called a hash  Very Efficient  Hard to reverse value  Hard to produce same hash for diff inputs  Some well known Hash Functions  Message Digest (MD), Secure Hash Function (SHA), RIPEMD  Most Common Use: Password Storage  Secure Apps will not save your password in plaintext
  • 19.  How can we be sure a message is authentic?  In the old days, a signature on a letter proved authenticity  Digital Signatures do the same thing-they ensure that the message is from the original sender with the original message  Adds trust when exchanging data  Using Encryption with Digital Signatures is important  Certifying Authority (CA) responsible for management of certificates  Generating, issuing, publishing, verifying, revoking
  • 21.  User Carelessness / Stolen Credentials  Stolen equipment (laptops, phones, etc.)  Incorrect Implementation / Backdoor  Broken Processes / InsiderThreats  PhishingAttacks  Sending sensitive data over plaintext  Zero-day threats / Maintenance  Application vulnerabilities

Editor's Notes

  • #9: Which of these are likely to happen? Some are more theoretical than practical.
  • #11: In feedback cipher, the encrypted text of the previous step is used to encrypt the next block
  • #13: Right side image shows the all 16 rounds of encryption. Number of rounds is configurable Left side shows a single round of encryption. LHS = Left Hand Side RHS = Right Hand Side
  • #21: Each person adopting this scheme has a public-private key pair. the key pairs used for encryption/decryption and signing/verifying are different. The private key used for signing is referred to as the signature key and the public key as the verification key. Signer feeds data to the hash function and generates hash of data. Hash value and signature key are then fed to the signature algorithm which produces the digital signature on given hash. Signature is appended to the data and then both are sent to the verifier. Verifier feeds the digital signature and the verification key into the verification algorithm. The verification algorithm gives some value as output. Verifier also runs same hash function on received data to generate hash value. For verification, this hash value and output of verification algorithm are compared. Based on the comparison result, verifier decides whether the digital signature is valid. Since digital signature is created by ‘private’ key of signer and no one else can have this key; the signer cannot repudiate signing the data in future.