YOU ARE DOWNLOADING DOCUMENT

Please tick the box to continue:

Transcript
Page 1: CryptographyVsStegnoGraphy
Page 2: CryptographyVsStegnoGraphy

What is meant by cryptography ? • Its Greek word

• Crypto means “ Secret”

• Graphie means “ Writing “

Why Cryptography ? • To convert the plain text to unreadable text

What is need of Cryptography ?

To secure the Sensitive Information

• Username – Password

• Credit Card Number etc..

Page 3: CryptographyVsStegnoGraphy

CRYPTOGRAPHY COMPONENT

Page 4: CryptographyVsStegnoGraphy

Cryptanalysisbasic component of cryptography is a cryptosystem

Cryptanalyst • Person working for unauthorized interceptor

Cryptographer

• Person working for legitimate sender or receiver

Cryptology

• encryption and decryption

Page 5: CryptographyVsStegnoGraphy

Cryptosystem A cryptosystem is a 5-tuple ( , D , M , K , C)

• M is the collection of plaintexts

• K is the set of keys

• C is the set of cipher texts

o = K → C is the set of encipher (encryption)o D = C K → M is the set of deciphering (decryption)

How it works ?

Note • Plaintext M : collection of original messages

• Cipher text C : set of messages in encrypted form

Page 6: CryptographyVsStegnoGraphy

Cryptosystem

Encryption Decryption

• Process of encoding (enciphering / encryption ) a message

• Process of decoding (deciphering or decryption) an encrypted message to its original form.

securesender

securereceiver

channel data, control messages

data data

Alisa Kishan

Trudy

Page 7: CryptographyVsStegnoGraphy

CRYPTOGRAPHY

CRYPTOGRAPHY

SYMMETRIC-KEY

CRYPTOGRAPHY

ASYMMETRIC-KEY

CRYPTOGRAPHY

Page 8: CryptographyVsStegnoGraphy

Types of Cryptosystems Symmetric Key Cryptosystems

• Also called single-key cryptosystems

• M = D ( K , E ( K , M ) )

• The encryption key and decryption key are the same

Page 9: CryptographyVsStegnoGraphy

Symmetric Cryptosystems Basic techniques for classical ciphers (Encryption)

Substitution

Transposition

Mono-alphabetic

Poly-alphabetic

Stream

• One letter is exchanged for another

• The order of the letters is rearranged Classical ciphers

• Letters of the plaintext alphabet are mapped into other unique letters

• Letters of the plaintext alphabet are mapped into letters of the cipher text space depending on their positions in the text

• Key stream is generated and used to encrypt the plaintext (Symmetric Key Algorithms)

Page 10: CryptographyVsStegnoGraphy

Transposition

Example :-

T 5 T RH 3 H C E EE 1 I E T GK 4 S S M AE 2 I A E SY 6 S S

TRHCEEIETGSSMAIAEASSCipher-Text :-

Refer (by key): IETGIAESHCEESSMATRSS

Columnar

• IEEIRSHSMESCSTATGSEA

T H E K E Y5 3 1 4 2 6

T H I S I SA S E C R ET M E S S AG E

Page 11: CryptographyVsStegnoGraphy

Types of Cryptosystems Asymmetric cryptosystem

• M = D (Kd , E (Ke , M ) )

• The encryption key and decryption key are not the same• Kd ≠ Ke

Page 12: CryptographyVsStegnoGraphy

Asymmetric Key Cryptosystem (Public Key Cryptosystem)

Uses public and private keys

• Public key for encryption• Private key for decryption

Examples

• RSA

• Trapdoor one-way function

• Elliptical curve cryptography

Page 13: CryptographyVsStegnoGraphy

RSA Principle Developed by Ron Rivets , Adi Shamir, and Leonard Adleman. (MIT, 1977)

C = me mod (pq)

• P , q : any two large prime numbers (more than 512 bits)

• e: public key

• d: private key

• Knowing C and e, it is “infeasible” to calculate m without knowing d , p and q

• Knowing d, p and q, it is easy to find the original plaintext message m = Cd mod (pq)

Page 14: CryptographyVsStegnoGraphy

RSA Principle

{m, e, p, q; C= me mod(pq)}

{C, e, p, q; m=Cd mod(pq)}

Sender

Intruder

Receiver

{C, e}

Page 15: CryptographyVsStegnoGraphy
Page 16: CryptographyVsStegnoGraphy

What is Steganography?What is Steganography?

• STEGANOS – “Covered”• GRAPHIE – “Writing”

Its Greek Words:

Steganography is about Hiding messages Digital Applications of Steganography

• Can be hidden in digital data - MS Word (doc)

- Web pages (html) - Sound files (mp3, wav, cda)- Video files (mpeg, avi)

- Digital images (bmp, gif, jpg) Today, steganography is used primarily

to protect digital rights

• “watermarking” copyright notices

• “fingerprinting” a serial ID

Page 17: CryptographyVsStegnoGraphy

History of History of SteganographySteganography Chinese silk balls

Invisible ink-jet technology

Microdots Easter eggs

Hiding a message within a text Shift some words by one point/pixel

- Shifted words (or their first letters) make the sentence Use different fonts

- Letter by letter or word by word

Page 18: CryptographyVsStegnoGraphy

A Real ExampleA Real Example During WW2 the following cipher

message was actually sent by a German spy “Apparently, neutral’s protest is

thoroughly discounted and ignored. Isman hard hit. Blockade issue affect pretext for embargo on by products, ejecting suets and vegetable oils.”

Hidden Message

• “ Pershing sails from NY June 1”

Page 19: CryptographyVsStegnoGraphy

ModernModern Steganography Steganography

Hiding one message within another (“container”)

Most containers are rich media

• Images , audio, video ,mp3 etc.

Copyright notices embedded in digital art

• Prove ownership

Digital cameras EXIF tags

• Not secretive, but hidden from the eyez• Embed info such as camera type, date, shutter

speed , focal length,..

Similarly , possible to embed messages in invisible parts of html pages

Page 20: CryptographyVsStegnoGraphy

Steganography Steganography SystemSystem

Page 21: CryptographyVsStegnoGraphy

ComparisonComparisonCryptography

C = Ek (P) Plain text

P = Dk (C)

Key

Steganography

secret message

cover image

f Stego message

f Ciphertext

Page 22: CryptographyVsStegnoGraphy

Hiding a Message in an ImageHiding a Message in an ImageOriginal Picture Embedded picture

Page 23: CryptographyVsStegnoGraphy
Page 24: CryptographyVsStegnoGraphy