Top Banner
Cryptography The science of writing in secret code
17

Cryptography

Dec 31, 2015

Download

Documents

Kenyon Turner

Cryptography. The science of writing in secret code. Cryptography is an ancient art - first documented use of cryptography in writing dates back to circa 1900 B.C. when an Egyptian scribe used non-standard hieroglyphs in an inscription - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cryptography

Cryptography The science of writing in secret

code

Page 2: Cryptography

The Science of Writing In Secret Code

• Cryptography is an ancient art - first documented use of cryptography in writing dates back to circa 1900 B.C. when

an Egyptian scribe used non-standard hieroglyphs in an inscription

• New forms of cryptography came soon after the widespread development of computer communications

Page 3: Cryptography

Secure Communication

• Crypto is the secure communication in the presence of third parties (adversaries)

• Generally: about constructing and analyzing protocols that overcome such adversaries

• MAIN GOAL: SECURITY!

Page 4: Cryptography

DISCIPLINES• Modern crypto intersects disciples of Math,

Computer Science, and Electrical Engineering

• APPLICATIONS: ATM cards, computer passwords, electronic commerce, etc.

Related to various aspects in information security such as data confidentiality, data integrity, authentication

Page 5: Cryptography

Specific Security Requirements

• Authentication: process of proving one’s identity

• Privacy/confidentiality: ensuring that no one can read the message except the intended receiver

• Integrity: assuring the intended receiver that the original message has not been altered in any way

• Non-repudiation: mechanism to prove that sender really sent the message

Page 6: Cryptography

Cryptographic Schemes

• Initial unencrypted date is referred to as plaintext• It is then encrypted into ciphertext• Then decrypted into usable plaintext

PLAINTEXT CIPHERTEXT PLAINTEXT

Page 7: Cryptography

Types of Cryptography

• Secret Key Cryptography (SKC)• Public Key Cryptography (PKC)

•Hash Functions

Page 8: Cryptography

Crypto

Page 9: Cryptography

SECRET KEY ENCRYPTIONAlso known as private key & symmetric key

Page 10: Cryptography

Secret Key Encryption

Page 12: Cryptography

Public Key Encryption

Page 13: Cryptography

Why Three?

• Each scheme is optimized for some specific applications

• Secret Key Cryptography is suited for encrypting messages as it provides privacy and

confidentiality• Public Key Cryptography is ideal for non-

repudiation and user authentication• Hash functions ensure data integrity

Page 14: Cryptography

Caesar Cipher

Roman ruler Julius Caesar used a very simple cipher for secret communication

Involves the use of a “displacement” concept

Caesar cipher is the simplest to solve, since there are only 25 possible combinations

Page 15: Cryptography

Caesar Cipher

Outside wheel: The Alphabet

Inner wheel: can be rotated so that any letter on one wheel can be aligned with any letter on the other wheel

- The inner wheel becomes the key

Page 17: Cryptography

A lock is only as strong as its weakest link