Download as pdf or txt
Download as pdf or txt
You are on page 1of 10

Module 2 – Cryptographic Techniques

Cryptography
 Cryptography is the science of keeping information secure by
transforming it into form that unintended recipients cannot
understand.

 Technique of securing information and communications through


use of codes so that only those persons for whom the information
is intended can understand it and process it.

 Thus, prevents unauthorized access to information.

 The prefix “crypt” means “hidden” or “secret” and suffix “graphy”


means “writing”.
Why do we need secret
writing?
 Most of the communication are held in a public network (internet)
In order to secure the data that we transfer over public network, we
use various security policies in the form of cryptographic techniques.
Cryptography-Terminologies
• Plaintext- original message
• Cipher text – coded message
• Enciphering, encryption – process of converting original
intelligible plaintext to ciphertext
• Deciphering, decryption – restoring the plaintext from the cipher text
• Cryptography – Principles and methods of transforming a message
into secure unintelligible form and back into original form
• Cryptanalysis – Recovering the plaintext from cipher text without
access to the key. Simply called as “breaking the code”.
• Cryptology – areas of cryptography and cryptanalysis together.
Cryptographic Services

Confidentiality – provides privacy and avoids the


unauthorized disclosure of information.

Authentication - ensures and confirms a user's identity


Integrity - ensures that data is real, accurate and safeguarded
from unauthorized user modification.

Nonrepudiation – sender cannot deny the transmitted


message to the receiver in case of dispute or query.

Access control - defines rules and policies for limiting access


to a system or to physical or virtual resources.
Cryptography - Types
Symmetric Key Cryptography (Private Key):

 It is an encryption system where the sender and receiver of message use a single common key to
encrypt and decrypt messages.

 Symmetric Key Systems are faster and simpler but the problem is that sender and receiver have to
somehow exchange key in a secure manner. Key will be transferred via secured channel.

 The most popular symmetric key cryptography system is Data Encryption System (DES).

Asymmetric Key Cryptography (Public Key):

 Under this system a pair of keys is used to encrypt and decrypt information.

 A public key is used for encryption and a private key is used for decryption.

 Public key and Private Key are different.

 Even if the public key is known by everyone the intended receiver can only decode it because he
alone knows the private key.
Cryptography - Operations
1. Transposition - rearrange the order of letters in a message (e.g., 'hello world'
becomes 'ehlol owrdl' in a trivially simple rearrangement scheme)

2. Substitution - systematically replace letters or groups of letters with other letters


or groups of letters (e.g., 'fly at once' becomes 'gmz bu podf' by replacing each
letter with the one following it in the alphabet.

 An early substitution cipher was the Caesar cipher, in which each letter in the
plaintext was replaced by a letter some fixed number of positions further down
the alphabet.
Cryptography – Way of processing
Stream cipher - Converts the plain text into cipher text by taking 1 byte (bit by
bit conversion) of plain text at a time.
o Generally, stream cipher uses 8 bits.
o Stream cipher can be designed to operate on one bit at a time or on units larger than a
byte at a time.
o Symmetric key cipher
Block cipher - Converts the plain text into cipher text by taking plain text’s block
at a time.
o Block cipher uses either 64 bits or more than 64 bits. Block size depends on the
encryption algorithm used.
o Symmetric key cipher
o Example:
◦ DES – 64 bits
◦ AES – 128 bits.
Conventional Encryption
Symmetric key cryptography
Single key (secret key or private key) is used to perform
both encryption and decryption.
Key should be known to both sender and receiver.
In conventional encryption model, there should be atleast
two parties.
Let sender be Alice and receiver be Bob.
Alice converts plaintext into cipher text and and send to
Bob. To do this conversion, encryption algorithm takes 2
parameters as input.
Original plain text message (P) and Key (K)
Key is generated independently of the plain text.
Conventional Encryption

Main objective of the conventional model is to enable Alice and Bob to


communicate over an insecure channel in such a way that attacker should
not understand the original plaintext.
5

You might also like