0% found this document useful (0 votes)
39 views14 pages

Module-1 Part-3 Cryptography

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views14 pages

Module-1 Part-3 Cryptography

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 14

MODULE - 1

PART – 3: CRYPTOGRAPHY
• Cryptology is the science of secret messages. Therefore, anything that
has to do with making or breaking codes falls into cryptology's domain.

Cryptology = Cryptography + Cryptanalysis

• Cryptography is the study and practice of techniques for secure


communication in the presence of third parties called adversaries.
• In Cryptography, Cryptosystem is a suite of cryptographic algorithms
needed to implement a particular security service, most commonly for
achieving confidentiality.
• Cryptanalysis is used to breach cryptographic security systems and gain
access to the contents of encrypted messages, even if the cryptographic
key is unknown.
• A simple model of a cryptosystem that provides confidentiality to the
information being transmitted is shown below.
The various components of a basic cryptosystem are as follows.
• Plaintext. It is the data to be protected during transmission.
• Encryption Algorithm. It is a cryptographic algorithm that takes plaintext and
an encryption key as input and produces a ciphertext.
• Encryption Key. It is a value that is known to the sender. The sender inputs
the encryption key into the encryption algorithm along with the plaintext in
order to compute the ciphertext.
• Ciphertext. It is the scrambled version of the plaintext produced by the
encryption algorithm using a specific the encryption key. The ciphertext is not
guarded. It flows on public channel.
• Decryption Algorithm. It is a cryptographic algorithm that takes a ciphertext
and a decryption key as input, and outputs a plaintext.
• Decryption Key. It is a value that is known to the receiver. The receiver inputs
the decryption key into the decryption algorithm along with the ciphertext in
order to compute the plaintext.
Fundamentally, there are two types of cryptosystems as shown.
Symmetric Cryptosystem (Secret Key Cryptosystem)
• The encryption process where same keys are used for encrypting and decrypting
the information is known as Symmetric Encryption.
• The study of symmetric cryptosystems is referred to as Symmetric Cryptography.
Asymmetric Cryptosystem (Public Key Cryptosystem)
• The encryption process where different keys are used for encrypting and
decrypting the information is known as Asymmetric Encryption. Though the keys
are different, they are mathematically related.
• Study of asymmetric cryptosystems is referred to as Asymmetric Cryptography.
Cryptographic Hash Function
• A cryptographic hash function is an algorithm that takes an arbitrary
amount of data input and produces a fixed-size output called the hash
value, hash, or message digest.
• There is no practical way to recover the input from the output, hence, it is
also called one-way function.
• Also, two or more different inputs may result in same output. How will you
know which is the correct input?
• Common Hash algorithms are:
1. Message Digest 5 (MD5)
2. Secure Hash Algorithm 1 (SHA-1)
3. Secure Hash Algorithm 2 (SHA-2)
Applications of Hash Functions (Password Storage)
Applications of Hash Functions (Confidentiality + Integrity + Authenticity)
Applications of Hash Functions (Integrity + Authenticity)
Digital Signature
Message Authentication Code
THANK YOU

You might also like