Cryptography - An Overview
description
Transcript of Cryptography - An Overview
![Page 1: Cryptography - An Overview](https://reader035.fdocuments.in/reader035/viewer/2022062219/554a3b0bb4c9055a408b4942/html5/thumbnails/1.jpg)
Welcome Welcome
to the World of to the World of Secret Secret
CommunicationCommunication
![Page 2: Cryptography - An Overview](https://reader035.fdocuments.in/reader035/viewer/2022062219/554a3b0bb4c9055a408b4942/html5/thumbnails/2.jpg)
yhpargotpyrC
es qbsuib qsbujn ebtlqwhuud vbvwhpv lqgld syw owg
![Page 3: Cryptography - An Overview](https://reader035.fdocuments.in/reader035/viewer/2022062219/554a3b0bb4c9055a408b4942/html5/thumbnails/3.jpg)
Cryptography
es qbsuib qsbujn ebtlqwhuud vbvwhpv lqgld syw owg
Transposition Cipher
![Page 4: Cryptography - An Overview](https://reader035.fdocuments.in/reader035/viewer/2022062219/554a3b0bb4c9055a408b4942/html5/thumbnails/4.jpg)
Cryptography
es qbsuib qsbujn ebtlqwhuud vbvwhpv lqgld syw owg
Transposition Cipher
Jumbled Image
![Page 5: Cryptography - An Overview](https://reader035.fdocuments.in/reader035/viewer/2022062219/554a3b0bb4c9055a408b4942/html5/thumbnails/5.jpg)
Cryptography
dr partha pratim daslqwhuud vbvwhpv lqgld syw owg
Transposition Cipher
Jumbled Image
Substitution Cipher (next letter)
![Page 6: Cryptography - An Overview](https://reader035.fdocuments.in/reader035/viewer/2022062219/554a3b0bb4c9055a408b4942/html5/thumbnails/6.jpg)
Cryptography
dr partha pratim dasinterra systems india pvt ltd
Transposition Cipher
Jumbled Image
Substitution Cipher (next letter)
Caesar Cipher = 3
![Page 7: Cryptography - An Overview](https://reader035.fdocuments.in/reader035/viewer/2022062219/554a3b0bb4c9055a408b4942/html5/thumbnails/7.jpg)
Cryptography
Dr Partha Pratim DasInterra Systems India Pvt Ltd
Title Case Restored
![Page 8: Cryptography - An Overview](https://reader035.fdocuments.in/reader035/viewer/2022062219/554a3b0bb4c9055a408b4942/html5/thumbnails/8.jpg)
December 12, 2008
Cryptography – An Overview
Madhubanti Dasgupta & Partha Pratim DasInterra Systems (India) Pvt. Ltd.
![Page 9: Cryptography - An Overview](https://reader035.fdocuments.in/reader035/viewer/2022062219/554a3b0bb4c9055a408b4942/html5/thumbnails/9.jpg)
04/11/23 99
Vernacular Cryptography
![Page 10: Cryptography - An Overview](https://reader035.fdocuments.in/reader035/viewer/2022062219/554a3b0bb4c9055a408b4942/html5/thumbnails/10.jpg)
04/11/23 1010
Vernacular Cryptography
![Page 11: Cryptography - An Overview](https://reader035.fdocuments.in/reader035/viewer/2022062219/554a3b0bb4c9055a408b4942/html5/thumbnails/11.jpg)
04/11/23 Sir Arthur Conan Doyle 1111
The Adventure of the Dancing Men
AM HERE ABE SLANEY
![Page 12: Cryptography - An Overview](https://reader035.fdocuments.in/reader035/viewer/2022062219/554a3b0bb4c9055a408b4942/html5/thumbnails/12.jpg)
04/11/23 1212
The Adventure of the Dancing Men
AM HERE ABE SLANEY
A substitution cipher cracked by Holmes using frequency analysis
![Page 13: Cryptography - An Overview](https://reader035.fdocuments.in/reader035/viewer/2022062219/554a3b0bb4c9055a408b4942/html5/thumbnails/13.jpg)
04/11/23 1313
Agenda
• Cryptography – What & Why?
• Basic Cryptography
• Modern Cryptography– Secret-Key (Symmetric) Cryptography– Public-Key (Asymmetric) Cryptography– Hash Function (One-way) Cryptography
• How do Credit Cards work?
![Page 14: Cryptography - An Overview](https://reader035.fdocuments.in/reader035/viewer/2022062219/554a3b0bb4c9055a408b4942/html5/thumbnails/14.jpg)
04/11/23 1414
Cryptography – What & Why?
Basic NotionBasic Notion
![Page 15: Cryptography - An Overview](https://reader035.fdocuments.in/reader035/viewer/2022062219/554a3b0bb4c9055a408b4942/html5/thumbnails/15.jpg)
04/11/23 1515
What is Cryptography?
• Cryptography – The science of writing in secret code
• Cryptology– Study of Secrets
• “Cryptography is about communication in the presence of adversaries”– Ron Rivest
![Page 16: Cryptography - An Overview](https://reader035.fdocuments.in/reader035/viewer/2022062219/554a3b0bb4c9055a408b4942/html5/thumbnails/16.jpg)
04/11/23 1616
What is Cryptography?
Secret Writing
Steganography(hidden)
Cryptography(scrambled)
Substitution
Transposition
Code(replace words)
Cipher(replace letters)
![Page 17: Cryptography - An Overview](https://reader035.fdocuments.in/reader035/viewer/2022062219/554a3b0bb4c9055a408b4942/html5/thumbnails/17.jpg)
04/11/23 1717
Why Cryptography?
• Hiding the meaning of messages• Ensure secrecy in communications between
– Spies & Military leaders, – Diplomats, – Religious applications, – P-Language (used by girls in schools)– …
• Ensure– Identification, – Authentication, – Signature – …
![Page 18: Cryptography - An Overview](https://reader035.fdocuments.in/reader035/viewer/2022062219/554a3b0bb4c9055a408b4942/html5/thumbnails/18.jpg)
04/11/23 1818
Basic Cryptography
Notions, Terms, Examples & TechniquesNotions, Terms, Examples & Techniques
![Page 19: Cryptography - An Overview](https://reader035.fdocuments.in/reader035/viewer/2022062219/554a3b0bb4c9055a408b4942/html5/thumbnails/19.jpg)
04/11/23 1919
Cryptography – A Few Terms
• Plaintext– The initial unencrypted (unscrambled) data to be communicated.– Example: “dr partha pratim das”
• Ciphertext– Plaintext is encrypted (scrambled) into something unintelligible –
ciphertext for communication– Example: “es qbsuib qsbujn ebt”
• Encryption – The process of converting ordinary information (plaintext) into
ciphertext.
• Decryption – The reverse process of moving from unintelligible ciphertext to
plaintext.
![Page 20: Cryptography - An Overview](https://reader035.fdocuments.in/reader035/viewer/2022062219/554a3b0bb4c9055a408b4942/html5/thumbnails/20.jpg)
04/11/23 2020
Cryptography – A Few Terms• Cipher
– Pair of algorithms performing encryption & decryption. • Key
– A secret parameter for the cipher algorithm. • Key Management
– Management of generation, exchange, storage, safeguarding, use, vetting, and replacement of keys.
– Provisions in • Cryptosystem design, • Cryptographic protocols in that design, • User procedures, and so on.
• Crypto Analysis / Code Breaking– The study of how to circumvent the confidentiality sought by
using encryption.
![Page 21: Cryptography - An Overview](https://reader035.fdocuments.in/reader035/viewer/2022062219/554a3b0bb4c9055a408b4942/html5/thumbnails/21.jpg)
04/11/23 2121
Crypto Communicators
• Crypto literature frequently illustrates secret communication scenarios in terms of some fictitious characters:– Alice and Bob
• The common communicating parties. – Carol and Dave
• If there is a third or fourth party to the communication– Mallory
• The malicious party– Eve
• An eavesdropper– Trent
• A trusted third party.
![Page 22: Cryptography - An Overview](https://reader035.fdocuments.in/reader035/viewer/2022062219/554a3b0bb4c9055a408b4942/html5/thumbnails/22.jpg)
04/11/23 2222
Simple (Cipher) Cryptography• Transposition Ciphers
– Rearrange the order of letters in a message – 'help me' becomes 'ehpl em'
• Substitution Ciphers– Systematically replace letters or groups of letters with other letters
or groups of letters – 'fly at once' becomes 'gmz bu podf' by replacing each letter with
the one following it in the alphabet. • Caesar Cipher
– Each letter in the plaintext was replaced by a letter some fixed number of positions further down the alphabet.
– Named after Julius Caesar who is reported to have used it, with a shift of 3, to communicate with his generals during his military campaigns.
![Page 23: Cryptography - An Overview](https://reader035.fdocuments.in/reader035/viewer/2022062219/554a3b0bb4c9055a408b4942/html5/thumbnails/23.jpg)
04/11/23 2323
Modern Cryptography
Techniques, Standards and ApplicationsTechniques, Standards and Applications
![Page 24: Cryptography - An Overview](https://reader035.fdocuments.in/reader035/viewer/2022062219/554a3b0bb4c9055a408b4942/html5/thumbnails/24.jpg)
04/11/23 2424
Issues in Modern Cryptography
• Privacy/Confidentiality: – Ensuring that no one can read the message except the
intended receiver.
• Authentication: – The process of proving one's identity.
• Integrity: – Assuring the receiver that the received message has not
been altered in any way from the original.
• Non-repudiation: – A mechanism to prove that the sender really sent this
message.
![Page 25: Cryptography - An Overview](https://reader035.fdocuments.in/reader035/viewer/2022062219/554a3b0bb4c9055a408b4942/html5/thumbnails/25.jpg)
04/11/23 2525
Cryptography in Modern Living• Secure Communications
– Document / Data / Email Encryption – VPN
• Identification and Authentication • Secret Sharing • Electronic Commerce and Payments
– ATMs / Credit Cards– Net Banking / Web Shopping
• Certification– Digital Signature (NOT Digitized Signature)
• Key Recovery• Remote Access
– Secure ID
![Page 26: Cryptography - An Overview](https://reader035.fdocuments.in/reader035/viewer/2022062219/554a3b0bb4c9055a408b4942/html5/thumbnails/26.jpg)
04/11/23 2626
Cryptography in Modern Living
• Entertainment– Cable TV: Set-top Box – Pay-per-view (Encryption)– Satellite TV: Select Channel (Scrambling)
• Mobile Communication– Voice Encryption
• Anti-Spamming– CAPTCHA™ (from Carnegie Mellon University)
• Completely Automated Public Turing test to tell Computers and Humans Apart
• Steganography– Invisible ink, – Microdots, – Digital Watermarking
![Page 27: Cryptography - An Overview](https://reader035.fdocuments.in/reader035/viewer/2022062219/554a3b0bb4c9055a408b4942/html5/thumbnails/27.jpg)
04/11/23 2727
Core Cryptography Algorithms
• Secret-Key (Symmetric) Cryptography– Uses a single key for both encryption and
decryption
• Public-Key (Asymmetric) Cryptography– Uses one key for encryption and another for
decryption
• Hash Function (One-way) Cryptography– Uses a mathematical transformation to
irreversibly "encrypt" information
![Page 28: Cryptography - An Overview](https://reader035.fdocuments.in/reader035/viewer/2022062219/554a3b0bb4c9055a408b4942/html5/thumbnails/28.jpg)
04/11/23 2828
Core Cryptography Algorithms
![Page 29: Cryptography - An Overview](https://reader035.fdocuments.in/reader035/viewer/2022062219/554a3b0bb4c9055a408b4942/html5/thumbnails/29.jpg)
04/11/23 2929
Secret-Key Cryptography
An OverviewAn Overview
![Page 30: Cryptography - An Overview](https://reader035.fdocuments.in/reader035/viewer/2022062219/554a3b0bb4c9055a408b4942/html5/thumbnails/30.jpg)
04/11/23 3030
Secret-Key Cryptography• Single key used for both encryption & decryption.
– Sender uses the key (or some set of rules) to encrypt the plaintext and sends the ciphertext to the receiver.
– Receiver applies the same key (or ruleset) to decrypt the message and recover the plaintext.
• Also called symmetric encryption.• The key must be known to sender & receiver both.• Popular:
– Data Encryption Standard (DES) • Drawback
– Distribution of the key.• Advantage
– Very fast in encryption / decryption
![Page 31: Cryptography - An Overview](https://reader035.fdocuments.in/reader035/viewer/2022062219/554a3b0bb4c9055a408b4942/html5/thumbnails/31.jpg)
04/11/23 3131
Secret-Key Cryptography
• Secret key cryptography schemes – Stream Ciphers
• Encrypt the bits of the message one at a time
– Block Ciphers• Take a number of bits and encrypt them as a single
unit.
• Blocks of 64 bits have been commonly used;
• Advanced Encryption Standard (AES) – 128-bit blocks.
– Approved by NIST in December 2001.
![Page 32: Cryptography - An Overview](https://reader035.fdocuments.in/reader035/viewer/2022062219/554a3b0bb4c9055a408b4942/html5/thumbnails/32.jpg)
04/11/23 3232
Public-Key Cryptography
An OverviewAn Overview
![Page 33: Cryptography - An Overview](https://reader035.fdocuments.in/reader035/viewer/2022062219/554a3b0bb4c9055a408b4942/html5/thumbnails/33.jpg)
04/11/23 3333
Public-Key Cryptography
• A crypto system for secure communication over a non-secure communications channel without having to share a secret key.– Usually, a two-key system
• Public Key
• Private Key
• One key (public / private) is used to encrypt while the other (public / private) is used to decrypt.
• The most significant new development in cryptography in the last 300-400 years.
![Page 34: Cryptography - An Overview](https://reader035.fdocuments.in/reader035/viewer/2022062219/554a3b0bb4c9055a408b4942/html5/thumbnails/34.jpg)
04/11/23 3434
Public-Key Cryptography
• Applications:– Encryption– Digital Signature– Key Distribution for Symmetric Algorithm
• Popular: – RSA public-key cryptosystem – Diffie-Hellman public-key cryptosystem
In modern cryptosystem designs, both asymmetric (public key) and symmetric algorithms are used to take advantage of the virtues of both.
![Page 35: Cryptography - An Overview](https://reader035.fdocuments.in/reader035/viewer/2022062219/554a3b0bb4c9055a408b4942/html5/thumbnails/35.jpg)
04/11/23 3535
Key Generation: Public-Key
![Page 36: Cryptography - An Overview](https://reader035.fdocuments.in/reader035/viewer/2022062219/554a3b0bb4c9055a408b4942/html5/thumbnails/36.jpg)
04/11/23 3636
Encryption: Public-Key
![Page 37: Cryptography - An Overview](https://reader035.fdocuments.in/reader035/viewer/2022062219/554a3b0bb4c9055a408b4942/html5/thumbnails/37.jpg)
04/11/23 3737
Signature: Public-Key
![Page 38: Cryptography - An Overview](https://reader035.fdocuments.in/reader035/viewer/2022062219/554a3b0bb4c9055a408b4942/html5/thumbnails/38.jpg)
04/11/23 3838
Shared Secret: Public-Key
![Page 39: Cryptography - An Overview](https://reader035.fdocuments.in/reader035/viewer/2022062219/554a3b0bb4c9055a408b4942/html5/thumbnails/39.jpg)
04/11/23 3939
Public-Key Cryptography
• Based upon one-way trapdoor functions– Mathematical functions that are easy to
compute whereas their inverse function is relatively difficult to compute.
• Multiplication vs. factorization
• Exponentiation vs. logarithms
– Has a trap door in the one-way function so that the inverse calculation becomes easy given knowledge of some item of information.
![Page 40: Cryptography - An Overview](https://reader035.fdocuments.in/reader035/viewer/2022062219/554a3b0bb4c9055a408b4942/html5/thumbnails/40.jpg)
04/11/23 4040
PKC: Multiplication vs Factorization
• It is easy to multiply two primes:– 3 * 5 =– 17 * 23 =– 101 * 223 =
• It is difficult to factorize into two primes:– 35 = – 551 = – 24503 =
5 * 75 * 7
1515
391391
2252322523
19 * 2919 * 29
107 * 229107 * 229Heart of RSAHeart of RSA
![Page 41: Cryptography - An Overview](https://reader035.fdocuments.in/reader035/viewer/2022062219/554a3b0bb4c9055a408b4942/html5/thumbnails/41.jpg)
04/11/23 4141
PKC: Exponentiation vs Logarithm
• It is easy to raise a prime to another:– 3 ^ 2 =– 5 ^ 3 =– 11 ^ 7 =
• It is difficult to find base-exponent pair:– 8 = – 243 = – 1977326743 =
2 ^ 32 ^ 3
99
125125
1948717119487171
3 ^ 53 ^ 5
7 ^ 117 ^ 11Heart of Diffie-HellmanHeart of Diffie-Hellman
![Page 42: Cryptography - An Overview](https://reader035.fdocuments.in/reader035/viewer/2022062219/554a3b0bb4c9055a408b4942/html5/thumbnails/42.jpg)
04/11/23 4242
Inventors of Public-Key Cryptography
• "New Directions in Cryptography" – Whitfield Diffie & Martin Hellman, Stanford Univ.
– IEEE Trans. on Information Theory, November 1976.
– Logarithm based.
• "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems" – Ronald Rivest, Adi Shamir, & Leonard Adleman, MIT.
– Communications of the ACM (CACM), February 1978.
– Factorization based.
![Page 43: Cryptography - An Overview](https://reader035.fdocuments.in/reader035/viewer/2022062219/554a3b0bb4c9055a408b4942/html5/thumbnails/43.jpg)
04/11/23 4343
Hash Function Cryptography
An OverviewAn Overview
![Page 44: Cryptography - An Overview](https://reader035.fdocuments.in/reader035/viewer/2022062219/554a3b0bb4c9055a408b4942/html5/thumbnails/44.jpg)
04/11/23 4444
Message Digest / Hash Function
• Should be– Like a random function in behavior– Deterministic – Efficiently computable.
• A cryptographic hash function is considered insecure if either of the following is computationally feasible:– finding a (previously unseen) message that matches a
given digest. (IRREVERSIBLE) – finding "collisions", wherein two different messages
have the same message digest. (UNIQUE)
![Page 45: Cryptography - An Overview](https://reader035.fdocuments.in/reader035/viewer/2022062219/554a3b0bb4c9055a408b4942/html5/thumbnails/45.jpg)
04/11/23 4545
Message Digest / Hash Function
• Applications:– Message Identity– Identical Files– Password Authentication
• Popular: – MD5: Message Digest Algorithm – SH-1: Secure Hash Algorithm
![Page 46: Cryptography - An Overview](https://reader035.fdocuments.in/reader035/viewer/2022062219/554a3b0bb4c9055a408b4942/html5/thumbnails/46.jpg)
04/11/23 4646
How do Credit Cards work?
Impact of Cryptography on CivilizationImpact of Cryptography on Civilization
![Page 47: Cryptography - An Overview](https://reader035.fdocuments.in/reader035/viewer/2022062219/554a3b0bb4c9055a408b4942/html5/thumbnails/47.jpg)
04/11/23 4747
Secure Electronic Transaction (SET)
![Page 48: Cryptography - An Overview](https://reader035.fdocuments.in/reader035/viewer/2022062219/554a3b0bb4c9055a408b4942/html5/thumbnails/48.jpg)
04/11/23 4848
Dual Signature
• Concept: Link Two Messages Intended for Two Different Receivers:– Order Information (OI): Customer to Merchant– Payment Information (PI): Customer to Bank
• Goal: Limit Information to A “Need-to-Know” Basis:– Merchant does not need credit card number.– Bank does not need details of customer order.– Afford the customer extra protection in terms of
privacy by keeping these items separate.• This link is needed to prove that payment is intended
for this order and not some other one.
![Page 49: Cryptography - An Overview](https://reader035.fdocuments.in/reader035/viewer/2022062219/554a3b0bb4c9055a408b4942/html5/thumbnails/49.jpg)
04/11/23 4949
References: Books
• “The Code Book: The Secret History of Codes and Code Breaking” by Simon Singh, 1998: http://www.simonsingh.net/The_Code_Book.html
![Page 50: Cryptography - An Overview](https://reader035.fdocuments.in/reader035/viewer/2022062219/554a3b0bb4c9055a408b4942/html5/thumbnails/50.jpg)
04/11/23 5050
References: Papers / URL
• “An Overview of Cryptography” by Gary C. Kessler, May 1998 (Revised 1 August 2006): http://www.garykessler.net/library/crypto.html
• “Cryptography” on Wikipedia:
http://en.wikipedia.org/wiki/Cryptography
• “Crypto FAQ” on RSA Security: http://www.rsasecurity.com/rsalabs/node.asp?id=2152
![Page 51: Cryptography - An Overview](https://reader035.fdocuments.in/reader035/viewer/2022062219/554a3b0bb4c9055a408b4942/html5/thumbnails/51.jpg)
04/11/23 5151
Thank You