Introduction to Cryptography.pptx
Introduction to Cryptography.pptx
S8 CSE – ELECTIVE
MODULE – 1
Fundamentals of
Cryptography
Definitions
■ Cryptography = the science (art) of encryption
■ Cryptanalysis = the science (art) of breaking
encryption
■ Cryptology = cryptography + cryptanalysis
Alice Bob
channel data, control
messages
Eve
Cryptography Goals
■ Encryption – Prevent Eve from intercepting message
■ Authentication – Prevent Eve from impersonating Alice
Network Security (N. Dulay & M. Huth) Symmetric Key Cryptography (3.13)
Symmetric Key Cryptography
Encryption & Decryption
Key (K)
C = EK (P)
Same
Key (K)
Ciphertext (C) Decrypt (D) Plaintext (P)
P = DK (C)
P = DK (EK (P))
AES- Advanced Encryption Standard
• also known as Rijndael algorithm • Sub Key Generation
• symmetric block cipher algorithm • uses 128 bit Master Key
• block/chunk size of 128 bits • Key is processed in words of
• converts these individual blocks size 32 bit (4 words / 16
using keys of 128, 192, and 256 bytes)
bits • Each sub key size is 32 bit /
• Once it encrypts these blocks, it 1 word/4 bytes
joins them together to form the • Each round have 4 sub keys
cipher text (128 bit/4 words/16 bytes)
• based on a • For pre round calculation we
substitution-permutation network, use 4 sub key initially
known as SP network • Total sub key is 44
AES- Advanced Encryption Standard
Substitute Byte
Asymmetric Cryptography
Asymmetric Cryptography
Asymmetric Cryptography
RSA
■ RSA stands for Rivest, Shamir, Adleman -
creators
■ public-key encryption technique used for
secure data transmission especially over the
internet
RSA
Question
■ Explain public and private keys. Perform
encryption and decryption using RSA for p=3,
q=11, e= 7 and M=5
Elliptic Curve Cryptography
■ Asymmetric Public key cryptosystem
■ Provides security with smaller key size
■ alternative to the RSA algorithm
■ used for digital signatures in cryptocurrencies,
such as Bitcoin and Ethereum, as well as
one-way encryption of emails, data and
software
■ fast key generation, fast key agreement and
fast signatures
Elliptic Curve Cryptography
■ 2 families of Elliptic curves
■ Prime curves over Zp
■ uses cubic equation in which variables and
coefficients from 0 through p-1
■ best for software applications
■ Binary curves over GF(2m)
■ variables and coefficients in GF(2m)
■ best for hardware applications
Elliptic Curve Cryptography
■ Makes use of Elliptic Curves y²=x³ + ax + b
■ variables and coefficients restricted to
elements in a finite field
■ Properties of Elliptical Curve
■ symmetric over x axis
■ A non vertical line will
intersect the curve at
most 3 points
ECC Diffie
Hellman Key
Exchange
ECC Encryption/ Decryption
To encrypt and send a message Pm to B, A
chooses a random positive integer k and
produces the ciphertext Cm consisting of the
pair of points:
Cm = {kG, Pm + kPb}