Top Banner
SOURASHTRA COLLEGE CRYPTOGRAPHY BY L.S.KARNAN II YEAR B.Sc., Mathematics
21
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cryptography

SOURASHTRA COLLEGE

CRYPTOGRAPHY

BY

L.S.KARNAN

II YEAR

B.Sc., Mathematics

Page 2: Cryptography

Cryptography is the Study of art and science of keeping messages secure.

Some other authors defined the cryptography as “Cryptography

is the process of writing using various methods (“ciphers”) to keep messages secret”.

Modern Cryptography combines the studies of Computer Science and Mathematics for the purpose of Encoding information to ensure that data is secure.

CRYPTOGRAPHY:

Page 3: Cryptography

KEYWORDS:

• Cryptography

• Cryptanalysis

• Encryption

• Decryption

• Symmetric key

• Asymmetric key

• Algorithm

Page 4: Cryptography
Page 5: Cryptography

HISTORY OF CRYPTOGRAPHY:

Cryptography probably began in or around

2000 B.C. in Egypt.

There are three eras in the history of Cryptography:

▪ The Manual era

▪ The Mechanical era

▪ The Modern era

Page 6: Cryptography
Page 7: Cryptography

Manual era:Manual era refers to pen and paper Cryptography and

dates back to 2000 B.C.

E.G. - Scytale, Caesar, Vigenere.

Mechanical era:

Mechanical era refers to the invention of cipher machines.

E.G. - Japanese Red and Purple Machines, German Enigma.

Modern era:The Modern era of cryptography refers to computers.

There are infinite permutations of cryptography available

using computers.

E.G. - Lucifer, RSA, ElGamal.

Page 8: Cryptography

MODELS:

Ancient Cryptex Modern Cryptex

Sumerians

- Cuneiform writings Skytale

Page 9: Cryptography
Page 10: Cryptography
Page 11: Cryptography

Encryption: c = Ee(p)

Decryption: p = Dd(c)

Here p is a block of plaintext,

c is a block of ciphertext,

E is the encryption function,

e is the encryption key,

D is the decryption function and

d is the decryption key.

FORMULA:

Page 12: Cryptography

MATHSEncryption

NZGSHDecryption

MATHS

Example:

Plain text

Cipher textPlain text

NZGSH

Cipher text

Page 13: Cryptography

{

A B C D E……………Y Z

26 25 24 23 22…………... 2 1

1 2 3 4 5……………25 26 FORWARD NUMBER

FORWARD LETTER

BACKWARD NUMBER

M - 14 - N vice - versa

A - 26 - Z

T - 07 - G

H - 19 - S

S - 08 - H

For DecryptionFor Encryption

CODING METHOD :

F.LB.N

Page 14: Cryptography

CATEGORIES OF CRYPTOGRAPHY:

Page 15: Cryptography
Page 16: Cryptography
Page 17: Cryptography

CRYPTOGRAPHERS:

Caesar Leon Battista

Alberti

Blaise de Vigenere

Page 18: Cryptography

CRYPTANALYSERS:

Page 19: Cryptography

APPLICATIONS:

Privacy/confidentiality

Integrity

This method is followed in Military

This method is used in ATM centers

Now-a-days, internet is very insecure therefore

Cryptography method is followed to safeguard to

transmit data.

Page 20: Cryptography

- Takes a long time to figure out the code

- It takes long to create the code

- If you were to send a code to another person in

the past, it will take long to get to that person

- OVERALL CRYPTOGRAPHY IT'S A

LONG PROCESS.

LIMITATIONS:

Page 21: Cryptography