We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 14
MODULE - 1
PART – 3: CRYPTOGRAPHY • Cryptology is the science of secret messages. Therefore, anything that has to do with making or breaking codes falls into cryptology's domain.
Cryptology = Cryptography + Cryptanalysis
• Cryptography is the study and practice of techniques for secure
communication in the presence of third parties called adversaries. • In Cryptography, Cryptosystem is a suite of cryptographic algorithms needed to implement a particular security service, most commonly for achieving confidentiality. • Cryptanalysis is used to breach cryptographic security systems and gain access to the contents of encrypted messages, even if the cryptographic key is unknown. • A simple model of a cryptosystem that provides confidentiality to the information being transmitted is shown below. The various components of a basic cryptosystem are as follows. • Plaintext. It is the data to be protected during transmission. • Encryption Algorithm. It is a cryptographic algorithm that takes plaintext and an encryption key as input and produces a ciphertext. • Encryption Key. It is a value that is known to the sender. The sender inputs the encryption key into the encryption algorithm along with the plaintext in order to compute the ciphertext. • Ciphertext. It is the scrambled version of the plaintext produced by the encryption algorithm using a specific the encryption key. The ciphertext is not guarded. It flows on public channel. • Decryption Algorithm. It is a cryptographic algorithm that takes a ciphertext and a decryption key as input, and outputs a plaintext. • Decryption Key. It is a value that is known to the receiver. The receiver inputs the decryption key into the decryption algorithm along with the ciphertext in order to compute the plaintext. Fundamentally, there are two types of cryptosystems as shown. Symmetric Cryptosystem (Secret Key Cryptosystem) • The encryption process where same keys are used for encrypting and decrypting the information is known as Symmetric Encryption. • The study of symmetric cryptosystems is referred to as Symmetric Cryptography. Asymmetric Cryptosystem (Public Key Cryptosystem) • The encryption process where different keys are used for encrypting and decrypting the information is known as Asymmetric Encryption. Though the keys are different, they are mathematically related. • Study of asymmetric cryptosystems is referred to as Asymmetric Cryptography. Cryptographic Hash Function • A cryptographic hash function is an algorithm that takes an arbitrary amount of data input and produces a fixed-size output called the hash value, hash, or message digest. • There is no practical way to recover the input from the output, hence, it is also called one-way function. • Also, two or more different inputs may result in same output. How will you know which is the correct input? • Common Hash algorithms are: 1. Message Digest 5 (MD5) 2. Secure Hash Algorithm 1 (SHA-1) 3. Secure Hash Algorithm 2 (SHA-2) Applications of Hash Functions (Password Storage) Applications of Hash Functions (Confidentiality + Integrity + Authenticity) Applications of Hash Functions (Integrity + Authenticity) Digital Signature Message Authentication Code THANK YOU