Top Banner
Created By : Rahul Khanvani Roll No : 47 Department Of Computer Science Cryptography: Securing the Information. Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
20
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cryptography

Created By : Rahul Khanvani

Roll No : 47

Department Of Computer Science

Cryptography:

Securing the Information.

Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com

Page 2: Cryptography

Introduction

Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com

Page 3: Cryptography

Introduction

» EPFT UIJT MPPL MJLF OPOTFOTF UP ZPV ?

Does it look like nonsense to you ?

Did you notice that I asked you the same question twice ?

Confused ?

» Replace Each word With its Alphabet used before.

» The Cryptography is Simple

Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com

Page 4: Cryptography

» Cryptography is the art and science of converting ordinary information into gibberish and converting it back to its original, meaningful form.

» Its Amazing how rotating the alphabets by even just one position is enough to confuse human mind !

» We Call It Rotating Words.

» To convert data in meaningful form you need an algorithm ,

» you can also create your own small algorithm.

What Is Cryptography ?

Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com

Page 5: Cryptography

» If You Say No Then I Can Say You May B Don’t Use Cryptography.

Do You Use Gmail ?

Do You use Facebook ?

Have you Ever Opened a File Containing Password ?

Did U Use HTTPS Site ?

Do You Fill Forms on Internet ?

» Most Of You Are Saving Your GF/BF’s No. As Their Nick Names Is Also A Kind Of Cryptogrpahy.

E.g Saving Ur G.F’s No As “Battery Low” To Hide The Contact From Relatives.

Who Uses Cryptography ?

Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com

Page 6: Cryptography

» Plaintext – A message in its natural format readable by an attacker

» Cipher text – Message altered to be unreadable by anyone except the intended recipients

» Key – Sequence that controls the operation and behavior of the cryptographic algorithm

» Key-space – Total number of possible values of keys in a crypto algorithm

» Encryption Plain text Cipher text

» Decryption Cipher text Plain text

Terms Used In Cryptography

Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com

Page 7: Cryptography

» Defending against external/internal hackers

» Securing E-commerce

» Securing bank accounts/electronic transfers

» Securing intellectual property

Information Security for…

Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com

Page 8: Cryptography

» Pervasiveness of email/networks

» Online storage of sensitive information

» Insecure technologies (e.g. wireless)

» Trend towards paperless society

» Weak legal protection of email privacy.

Threats to Information Security

Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com

Page 9: Cryptography

How To Send A Secure Email Or Password Protected Email?

Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com

Page 10: Cryptography

Types Of Cryptography

Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com

Page 11: Cryptography

Secret Writing

Steganography

Cryptography

Types of Secret Writing

Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com

Page 12: Cryptography

» Steganography – covered writing

– is an art of hiding information

» Popular contemporary steganography

technologies hide information in images.

Steganography

Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com

Page 13: Cryptography

Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com

Page 14: Cryptography

» Encryption means the transformation of data by the use of Cryptography to produce unintelligible data to ensure confidentiality

» The inverse function of encryption is called as decryption

Encryption and decryption:-

Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com

Page 15: Cryptography

» Private (symmetric, secret) key – the same key used for encryption/decryption

» Problem of key distribution

» How Do Both Person Agree On Same Key ?

Private Key Cryptography

Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com

Page 16: Cryptography

» Public (asymmetric) key cryptography – a public key used for encryption and private key for decryption

» Key distribution problem solved

Public Key Cryptography

Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com

Page 17: Cryptography

DES (Data Encryption Standard) and derivatives: double DES and triple DES

IDEA (International Data Encryption Standard)

Blowfish

RC5 (Rivets Cipher #5)

AES (Advance Encryption Standard)

Currently Available Crypto Algorithms (private key)

Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com

Page 18: Cryptography

RSA (Rivest, Shamir, Adleman)

DH (Diffie-Hellman Key Agreement Algorithm)

ECDH (Elliptic Curve Diffie-Hellman Key Agreement Algorithm)

RPK (Raike Public Key)

Currently Available Crypto Algorithms (public key)

Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com

Page 19: Cryptography

» Algorithms are not theoretically unbreakable: successful attacks in the future are possible.

» Encryption does not guarantee security!

» Many ways to beat a crypto system NOT dependent on cryptanalysis, such as:

Viruses, worms, hackers, etc.

TEMPEST attacks,

Unauthorized physical access to secret keys

» Cryptography is only one element of comprehensive computer security

How Secure are Today’s Technologies?

Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com

Page 20: Cryptography

Thank You…

For More Visit Bnarybuzz.wordpress.com

Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com