Top Banner
CRYPTOGRAPHY SANDHIYA S RANJTHA B
35
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cryptography.

CRYPTOGRAPHY

SANDHIYA SRANJTHA B

Page 2: Cryptography.

CRYPTOGRAPHIC TERMINOLOGY

• PLAIN TEXT: The format of the data before encrypted.

• CIPHER TEXT: The scrambled format of data after being encrypted.

• ENCRYPTION: Method of transforming plain text into an unreadable format.

• DECRYPTION: Method of obtaining the encrypted text into plain text.

Page 3: Cryptography.

What is Cryptography

The art of protecting information by transforming it (Encrypting it) into an unreadable format, called Cipher text, only those who posses a secret key can Decipher or (Decrypt) the message into Plain text.

Page 4: Cryptography.
Page 5: Cryptography.

WHY WE NEED A CRYPTOGRAGHY

• For confidentiality

• For authentication

• For data integrity

Page 6: Cryptography.

BASIC CONCEPT OF CRYPTOGRAPHY

Page 7: Cryptography.
Page 8: Cryptography.

SYMMETRIC KEY ENCRYPTION

Page 9: Cryptography.

TYPES OF SYMMETRIC

ENCRYPTION oSUBSTITUTION CIPHERoTRANSPOSTION CIPERoVERNAM CIPER

Page 10: Cryptography.
Page 11: Cryptography.
Page 12: Cryptography.

A- 0B- 1C- 2D- 3E- 4F- 5G- 6H- 7I- 8J- 9K- 10L- 11M-12N- 13O- 14P- 15Q- 16R- 17S- 18T- 19U- 20V- 21W-22X- 23Y- 24Z- 25

Page 13: Cryptography.
Page 14: Cryptography.

PUBLIC /PRIVATE KEY

• A public key known to everyone • private or secret key known only to the

recipient of the message• When John wants to send a secure

message to Jane, he uses Jane's public key to encrypt the message. Jane then uses her private key to decrypt it.

Page 15: Cryptography.

ASYMMETRIC KEY ENCRYPTION

Page 16: Cryptography.

TYPES OF ASYMMETRIC ALGORITHMS

DIFFIE-HELLMANRSAEI GAMALELLIPTIC CURVE CRYPTOGRAPHY(ECC)

Page 17: Cryptography.

DIFFIE-HELLMAN METHOD

Alice and Bob were communicating each other via mail

Eve trying to hack the message To avoid hacking they are using

DIFFIE-HELLMAN METHOD

Page 18: Cryptography.

EXAMPLE FOR DIFFIE-HELLMAN METHOD

alice Bob

Eve

Page 19: Cryptography.

EXAMPLE FOR DIFFIE-HELLMAN METHOD

Alice Bob

Eve

Page 20: Cryptography.

EXAMPLE FOR DIFFIE-HELLMAN METHOD

Alice Bob

Eve

Page 21: Cryptography.

EXAMPLE FOR DIFFIE-HELLMAN METHOD

Alice Bob

Eve

Page 22: Cryptography.

EXAMPLE FOR DIFFIE-HELLMAN METHOD

Alice Bob

Eve

Page 23: Cryptography.

Alice Bob

Eve

EXAMPLE FOR DIFFIE-HELLMAN METHOD

Page 24: Cryptography.

EXAMPLE FOR DIFFIE-HELLMAN METHOD

Eve

Page 25: Cryptography.

Alice Bob

Eve

EXAMPLE FOR DIFFIE-HELLMAN METHOD

Page 26: Cryptography.

EXAMPLE FOR DIFFIE-HELLMAN METHOD

Alice Bob

Eve

3xmod 17

3xmod 17

3xmod 17

Page 27: Cryptography.

EXAPLE FOR DIFFIE-HELLMAN METHOD

Alice Bob

Eve

3xmod 17

3xmod 17

3xmod 17

Random Number=15Random Number=13

Page 28: Cryptography.

EXAMPLE FOR DIFFIE-HELLMAN METHOD

Alice Bob

Eve

3xmod 17

3xmod 17

3xmod 17

Random Number=15Random Number=13

315 mod 17=6313mod 17=12

Page 29: Cryptography.

Alice Bob

Eve

3xmod 17

3xmod 17

3xmod 17

Random Number=15Random Number=13

315 mod 17=6 12 = 313mod 17

6

6

12

12

EXAMPLE FOR DIFFIE-HELLMAN METHOD

Page 30: Cryptography.

Alice Bob

Eve

3xmod 17

3xmod 17

3xmod 17

Random Number=15Random Number=13

315 mod 17=6 12 = 313mod 17

6

6

12

12

1215mod 17=10 613mod17=10

EXAMPLE FOR DIFFIE-HELLMAN METHOD

Page 31: Cryptography.

Alice Bob

Eve

3xmod 17

3xmod 17

3xmod 17

Random Number=15Random Number=13

315 mod 17=6 12 = 313mod 17

6

6

12

12

1215mod 17=10 613mod17=10

36mod17=15312mod17=4

EXAMPLE FOR DIFFIE-HELLMAN METHOD

Page 32: Cryptography.
Page 33: Cryptography.
Page 34: Cryptography.
Page 35: Cryptography.