0% found this document useful (0 votes)
70 views

Lecture-1 - Intro To Cryptography

This document provides an introduction and overview of cryptography. It defines cryptography as the ancient art and science of writing secret messages. The document then discusses key cryptography terms and concepts such as encryption, decryption, cryptanalysis, cryptology, cipher text, plain text, and algorithms. It also describes the basic components of a cryptosystem and the purposes of cryptography including confidentiality, authentication, integrity, and non-repudiation. Finally, the document outlines some applications of cryptography and characteristics of cryptographic systems.

Uploaded by

markburg
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
70 views

Lecture-1 - Intro To Cryptography

This document provides an introduction and overview of cryptography. It defines cryptography as the ancient art and science of writing secret messages. The document then discusses key cryptography terms and concepts such as encryption, decryption, cryptanalysis, cryptology, cipher text, plain text, and algorithms. It also describes the basic components of a cryptosystem and the purposes of cryptography including confidentiality, authentication, integrity, and non-repudiation. Finally, the document outlines some applications of cryptography and characteristics of cryptographic systems.

Uploaded by

markburg
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 19

19CSE331 Cryptography 3-0-0-3

Introduction to
Cryptography

Lecture - 1
Definition
• Cryptography comes from Greek word
“crypto” means hiding
and “Graphy” means writing

• It is an ancient art and science of writing in


secret message.

• It is the art of achieving security by


encoding messages to make them non
readable using mathematics
Terminologie
s
Cryptanalysis(from the Greek kryptós, "hidden", and
analýein,"to loosen“ )

Is the study of analyzing information system in


order to study the hidden aspects of the systems.
Breaking “secret codes”

Cryptology (from Greek kryptós, "hidden, secret“,


and logia,"study“)
Is the study of cryptography and cryptanalysis
The art and science of making and breaking
“secret codes”
Terminologies
unintelligiblecontd..
Encryption Is the process of transforming information so it is
to anyone but the intended
Decryption recipient.
Is the process of transforming encrypted
Plain text/ information so that it is intelligible again.
Clear text The message to be transmitted or stored.
Cipher text The disguised message or encrypted message
Algorithm The mathematical formula/function/procedure used
for encryption and decryption
Key Value(secret) used by algorithm to encrypt and
decrypt
Cryptosyste
• m techniques and their
An implementation of cryptographic
accompanying infrastructure to provide information
security services.
• Also referred to as a Cipher System.
• Various components of a basic cryptosystem are as follows

– Plaintext
– Encryption Algorithm
– Ciphertext
– Decryption Algorithm
– Encryption Key
Process of
Cryptography
Purpose of
Authentication Cryptography
–The process of proving one's identity.

Confidentiality
–Ensuring that no one can read the message
except the intended receiver
–Data is kept secret from those without the
proper credentials, even if that data travels
through an insecure medium
Purpose of Cryptography
Integrity contd..
–Assuring the receiver that the received message has
not been altered in any way from the original.

Non-repudiation
–A mechanism to prove that the sender really sent
this message
Application of
• Secure communication
Cryptography
– To prevent eavesdropping in communication and
business transactions.
• Identification & Authentication
– Checking the integrity
• Secret sharing / data hiding
– Hide something that has been written.
• E-commerce / E-payment
• Certification
– Certification is a scheme by which trusted agents such
as certifying authorities guarantee for unknown
users.
Application of
• Key recovery Cryptography
– It is a technology that allows a key to be revealed under
certain circumstances without the owner of the key revealing
it.
• Remote access
– Passwords gives a level of security for secure access.
• Access control
– Regulate access to satellite and cable TV
Cryptographic
System
Characteristics
• The type of operations used for transforming
plaintext to cipher text.
• The number of keys used
• The scheme using which the plaintext is processed.
Types of
• Cryptography
Secret –key Cryptography(Symmetric key cryptography)
– Single key is used for both encryption and decryption.
• Public key Cryptography(Asymmetric key cryptography)
– Uses one key for encryption and another for decryption.
• Hash function
– It uses a mathematical transformation to irreversibly
“encrypt” information.
Crypto Talkin
g
Talking
to

core to Bob
Alice
Alice

Secret key Bob


establishment:

attacker???

Secure k m1
k
communication:
m2
confidentiality and integrity
What cryptography can
Digital signatures do ?
Anonymous communication

Anonymous digital cash and much more….


–Can I spend a “digital coin” without anyone knowing who I am?
–How to prevent double spending?
Who was
1$ Alice Internet that?
(anon.
comm.)
Things to
Cryptography is: remember
–A tremendous tool
–The basis for many security mechanisms

Cryptography is not:
–The solution to all security problems
–Reliable if not implemented and used properly
Quiz – 1
[CO01]
1. Enciphering refers to the process of converting ------------- into ----
-------
2. “oorinvruasc” is an example------------------- text.
3. Cryptanalysis is a method of ----------- without knowing -------
4. Alice suggested that she wants to send a secret text “hello” to
Bob. Sue suggested her to send the text as “oelhl” and Ria
suggested her to send the text as “IFMMP”. Which of these
suggestions offer better security? Why?
Self Explore
[CO01]
5.When a transaction is performed using credit/debit card which
type of cryptographic algorithm is used? Justify.

6.Solve the crossword


Down
1.Put into code (8)
2.Cipher Creators need this (3)
4. The right to use something(6)
Across
3. Security flaw leads to this(9)
5. Secret Code(6)
Self explore…
[CO01]
•Which type of Cryptography is used in systems to authenticate
users during login into Linux?
•What mechanism is used by whatsapp, one of the popular
social media, to secure communication?
•Can you quote a recent security failure/breach incident that
caused a great damage in cyberspace. [Include proper citations]
•What is linear and differential cryptanalysis? [Record your
findings in the class notebook]
Thank you ALL..

You might also like