Cryptography and encryption
-
Upload
ancy-mariam-babu -
Category
Education
-
view
760 -
download
1
description
Transcript of Cryptography and encryption
![Page 1: Cryptography and encryption](https://reader034.fdocuments.in/reader034/viewer/2022051322/546c4cc7b4af9f702c8b4fd1/html5/thumbnails/1.jpg)
CRYPTOGRAPHY AND ENCRYPTION
Ancy mariam babuVit university
![Page 2: Cryptography and encryption](https://reader034.fdocuments.in/reader034/viewer/2022051322/546c4cc7b4af9f702c8b4fd1/html5/thumbnails/2.jpg)
INTRODUCTION the need of multimedia secure
transmission need of more security What is cryptography…???
![Page 3: Cryptography and encryption](https://reader034.fdocuments.in/reader034/viewer/2022051322/546c4cc7b4af9f702c8b4fd1/html5/thumbnails/3.jpg)
CRYPTOGRAPHY CRYPTOGRAPHY IS THE
SCIENCE OF INFORMATION SECURITY
The word is derived from greek kryptos means hidden
Cryptography includes the techniques such as microdotes, merging words with images, other ways to hide information in storage or transit
Objectives of cryptography are
confidentiality
integrity
authentication
![Page 4: Cryptography and encryption](https://reader034.fdocuments.in/reader034/viewer/2022051322/546c4cc7b4af9f702c8b4fd1/html5/thumbnails/4.jpg)
COMPONENTS OF CRYPTOGRAPHY
Encryption : it is the process of converting a plain text into (unrecognizable) cipher text.
For strong encryption: two attributes -confusion -diffussion Decryption: it is the process of changing
back the cipher text to plain text.
![Page 5: Cryptography and encryption](https://reader034.fdocuments.in/reader034/viewer/2022051322/546c4cc7b4af9f702c8b4fd1/html5/thumbnails/5.jpg)
COMPONENTS OF CRYPTOGRAPHY
![Page 6: Cryptography and encryption](https://reader034.fdocuments.in/reader034/viewer/2022051322/546c4cc7b4af9f702c8b4fd1/html5/thumbnails/6.jpg)
CATEGORIES OF CRYPTOGRAPHY
![Page 7: Cryptography and encryption](https://reader034.fdocuments.in/reader034/viewer/2022051322/546c4cc7b4af9f702c8b4fd1/html5/thumbnails/7.jpg)
SYMMETRIC KEY CRYPTOGRAPHY
A single common key is used for encode and decode of messages
Both sender and receiver must know the common key
The common key need to be exchange before hand by some other secure method
Symmetric key encryption is fast and simple But the key management is impractical
![Page 8: Cryptography and encryption](https://reader034.fdocuments.in/reader034/viewer/2022051322/546c4cc7b4af9f702c8b4fd1/html5/thumbnails/8.jpg)
SYMMETRIC KEY CRYPTOGRAPHY
![Page 9: Cryptography and encryption](https://reader034.fdocuments.in/reader034/viewer/2022051322/546c4cc7b4af9f702c8b4fd1/html5/thumbnails/9.jpg)
ASSYMETRIC KEY CRYPTOGRAPHY
Two different key is used for encryption and decryption
Public key is used for encryption and private key is used for decryption
Each user has a public key and corresponding private key.
![Page 10: Cryptography and encryption](https://reader034.fdocuments.in/reader034/viewer/2022051322/546c4cc7b4af9f702c8b4fd1/html5/thumbnails/10.jpg)
ASSYMETRIC KEY CRYPTOGRAPHY
![Page 11: Cryptography and encryption](https://reader034.fdocuments.in/reader034/viewer/2022051322/546c4cc7b4af9f702c8b4fd1/html5/thumbnails/11.jpg)
ENCRYPTION… Encryption is the
process of converting plain text into cipher text.
Done by using encryption algorithms
Key is used Two types:
-Asymmetric
-symmetric
![Page 12: Cryptography and encryption](https://reader034.fdocuments.in/reader034/viewer/2022051322/546c4cc7b4af9f702c8b4fd1/html5/thumbnails/12.jpg)
ASYMMETRIC ENCRYPTION
![Page 13: Cryptography and encryption](https://reader034.fdocuments.in/reader034/viewer/2022051322/546c4cc7b4af9f702c8b4fd1/html5/thumbnails/13.jpg)
SYMMETRIC ENCRYPTION
![Page 14: Cryptography and encryption](https://reader034.fdocuments.in/reader034/viewer/2022051322/546c4cc7b4af9f702c8b4fd1/html5/thumbnails/14.jpg)
WHY USE ENCRYPTION Authentication
-protects personal data such as passwords Privacy
-provides for confidentiality of private information
Integraty
-ensures that a document or file not has been altered.
Accountability
- prevents denial or plagarism
![Page 15: Cryptography and encryption](https://reader034.fdocuments.in/reader034/viewer/2022051322/546c4cc7b4af9f702c8b4fd1/html5/thumbnails/15.jpg)
EXAMPLES OF ENCRYPTION
Web browser encryption Email encryption Hard drive encryption Operating system protection
![Page 16: Cryptography and encryption](https://reader034.fdocuments.in/reader034/viewer/2022051322/546c4cc7b4af9f702c8b4fd1/html5/thumbnails/16.jpg)
VIDEO ENCRYPTION Encryption on video Twotypes
- independent encryption
-joint compression and encryption
![Page 17: Cryptography and encryption](https://reader034.fdocuments.in/reader034/viewer/2022051322/546c4cc7b4af9f702c8b4fd1/html5/thumbnails/17.jpg)
INDEPENDENT ENCRYPTION
Both encryption and compression done seperatly
Any compression standard can use for compression
For encryption, can use either lightweight encription or heavyweight encryption
![Page 18: Cryptography and encryption](https://reader034.fdocuments.in/reader034/viewer/2022051322/546c4cc7b4af9f702c8b4fd1/html5/thumbnails/18.jpg)
INDEPENDENT ENCRYPTION
![Page 19: Cryptography and encryption](https://reader034.fdocuments.in/reader034/viewer/2022051322/546c4cc7b4af9f702c8b4fd1/html5/thumbnails/19.jpg)
HEAVY WEIGHT ENCRYPTION
Video encryption technique
Huge computation overhead
More secure
![Page 20: Cryptography and encryption](https://reader034.fdocuments.in/reader034/viewer/2022051322/546c4cc7b4af9f702c8b4fd1/html5/thumbnails/20.jpg)
HEAVYWEIGHT ENCRYPTION TECHNIQUES Examples Des:
- data encryption standard for electronic encryption
-short key length and symmetric key block cipher
Aes:
-advanced encryption algorithm
- symmetric key encryption Rsa:
-public key scheme
- difficulty for factoring large number
-secure
![Page 21: Cryptography and encryption](https://reader034.fdocuments.in/reader034/viewer/2022051322/546c4cc7b4af9f702c8b4fd1/html5/thumbnails/21.jpg)
LIGHTWEIGHT ENCRYPTION
Video encryption technique
Faster and simple Less complexity Less time cosumption
![Page 22: Cryptography and encryption](https://reader034.fdocuments.in/reader034/viewer/2022051322/546c4cc7b4af9f702c8b4fd1/html5/thumbnails/22.jpg)
LIGHTWEIGHT ENCRYPTION TECHNIQUES examples Rc6 Idea hb2 Present Tea
![Page 23: Cryptography and encryption](https://reader034.fdocuments.in/reader034/viewer/2022051322/546c4cc7b4af9f702c8b4fd1/html5/thumbnails/23.jpg)
JOINT COMPRESSION AND ENCRYPTION TECHNIQUE
Both encryption and compression integrates as a single step
System obtain multiple level of security Exaples
1.vea
2.rvea Two types
1.compression before encryption
2. compression after encryption
![Page 24: Cryptography and encryption](https://reader034.fdocuments.in/reader034/viewer/2022051322/546c4cc7b4af9f702c8b4fd1/html5/thumbnails/24.jpg)
COMPRESSION BEFORE ENCRYPTION
![Page 25: Cryptography and encryption](https://reader034.fdocuments.in/reader034/viewer/2022051322/546c4cc7b4af9f702c8b4fd1/html5/thumbnails/25.jpg)
COMPRESSION AFTER ENCRYPTION
![Page 26: Cryptography and encryption](https://reader034.fdocuments.in/reader034/viewer/2022051322/546c4cc7b4af9f702c8b4fd1/html5/thumbnails/26.jpg)