Introduction to
Cryptography
by Petre POPESCU
What is cryptography?
"the art of hiding information"
OR
"the practice and study of techniques for secure
communication in the presence of third parties"
(wikipedia)
Modern Cryptography
a branch of mathematics
and
computer science
Modern Cryptography
2 main branches
1. Private Key Cryptography
2. Public Key Cryptography
Private Key Cryptography
The same key is used for both
encryption and decryption
Private Key Cryptography
Examples:
- DES
- AES
- Caesar Cipher
- Blowfish
Caesar Cipher
Named after Julius Caesar, who used it
in his private and military
correspondence.
Caesar Cipher
It is a substitution cipher
Each letter is replaced by another letter
depending on a "shift" value
Caesar Cipher
Cracking Caesar Cipher
(assuming we know Caesar Cipher is used)
1. Brute Force Attack
2. Word-pattern and letter distribution
attack
Brute Force Attack
Since the number of possible shifts is
limited, it is feasible to try each shift
and discard the results that are not
human readable.
Word-pattern and letter distribution attack
Step 1:
Find the average distribution of letter
in that language.
This can be done with ease by
analyzing long texts.
Word-pattern and letter distribution attack
Step 2:
A Caesar Cipher usually "shifts" this
distribution by the shift used for
encryption.
An error margin is permitted, so now
multiple possibilities are generated.
Word-pattern and letter distribution attack
Step 3:
Decrypt the text using the possible
shifts that were found in step 2.
Use word-pattern analysis (and
possibly a dictionary of words) to
discover the correct variant
Public Key Cryptography
Two keys are needed:
- one for encrypting the message
- one for decrypting the message
Public Key Cryptography
Key's properties
- neither keys can perform both
operations
- the two keys are mathematically
paired
- public key - used for encryption
- private key - used for decryption
Public Key Cryptography
Examples:
- RSA
- YAK
- Various elliptic curve techniques
RSA
Created by:
Ron Rivest
Adi Shamir
Leonard Adleman
Is based on the presumed difficulty of
factoring large integers.
RSA - Generating the two keys
(1) Choose two distinct prime numbers:
p and q
p and q should have high bit-length
p and q should be chosen at random
RSA - Generating the two keys
(2) Compute
n = pq
n is the "modulus" for both the public
and private keys
RSA - Generating the two keys
(3) Compute
φ(n) = φ(p)φ(q) = (p − 1)(q − 1)
RSA - Generating the two keys
(4) Choose e such that
1 < e < φ(n)
and
gcd(e, φ(n))
TIP: e and φ(n) are coprime
RSA - Generating the two keys
"e" is the Public Key Exponent
RSA - Generating the two keys
(5) Compute d where
d−1
≡ e (mod φ(n))
or
d is the multiplicative inverse of
e (modulo φ(n))
RSA - Generating the two keys
To calculate d
solve for d given
d*e ≡ 1 (mod φ(n))
RSA - Generating the two keys
Public Key: e and n
Private Key: d and n
d, p, q and φ(n) must be kept secret

More Related Content

PPTX
Cryptography.ppt
PDF
Introduction to Cryptography
PPTX
Cryptography
PPTX
cryptography
PPTX
Cryptography
PDF
Asymmetric Cryptography
PPTX
Key management
PPTX
Cryptography
Cryptography.ppt
Introduction to Cryptography
Cryptography
cryptography
Cryptography
Asymmetric Cryptography
Key management
Cryptography

What's hot (20)

PPT
6. cryptography
PPTX
Cryptography and Information Security
PPT
Cryptography
PDF
Electronic mail security
PPTX
Cryptography
PPTX
Cryptography and Network Security
PPT
Fundamentals of cryptography
PPTX
Cryptography
PDF
Computer Security Lecture 7: RSA
PDF
AES-Advanced Encryption Standard
PPT
Cryptography Intro
PPT
Pretty good privacy
PPTX
Digital certificates
PPT
Message Authentication Code & HMAC
PPT
Information Security & Cryptography
PPTX
Cryptography
PPT
Cryptography ppt
PDF
Information Security Cryptography ( L02- Types Cryptography)
PPT
Symmetric Key Algorithm
6. cryptography
Cryptography and Information Security
Cryptography
Electronic mail security
Cryptography
Cryptography and Network Security
Fundamentals of cryptography
Cryptography
Computer Security Lecture 7: RSA
AES-Advanced Encryption Standard
Cryptography Intro
Pretty good privacy
Digital certificates
Message Authentication Code & HMAC
Information Security & Cryptography
Cryptography
Cryptography ppt
Information Security Cryptography ( L02- Types Cryptography)
Symmetric Key Algorithm
Ad

Similar to Introduction to Cryptography (20)

PDF
Cryptology - The practice and study of hiding information
DOC
DOCS ON NETWORK SECURITY
PPT
Cryptography - An Overview
PPT
PPT
Cryptography
PPT
Encryptolog y-1216310707267721-9
PPTX
UNIT-IV.pptx
PPT
Cryptography
PPTX
CS_Chapter_2Security concerns of different types of devices.pptx
PPTX
CS_Chapter_2Security concerns of different types of devices.pptx
DOCX
Cryptography : The Art of Secured Messaging
ODP
Basic techniques in cryptography
PPTX
CNS 3RD UNIT PPT.pptx
PPTX
Information system security Unit 2.pptx
PDF
international security system data threats
PDF
PRINCIPLES OF INFORMATION SYSTEM SECURITY
PDF
cryptography
PPT
Unit --3.ppt
Cryptology - The practice and study of hiding information
DOCS ON NETWORK SECURITY
Cryptography - An Overview
Cryptography
Encryptolog y-1216310707267721-9
UNIT-IV.pptx
Cryptography
CS_Chapter_2Security concerns of different types of devices.pptx
CS_Chapter_2Security concerns of different types of devices.pptx
Cryptography : The Art of Secured Messaging
Basic techniques in cryptography
CNS 3RD UNIT PPT.pptx
Information system security Unit 2.pptx
international security system data threats
PRINCIPLES OF INFORMATION SYSTEM SECURITY
cryptography
Unit --3.ppt
Ad

Recently uploaded (20)

PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PPTX
TEXTILE technology diploma scope and career opportunities
PPTX
Custom Battery Pack Design Considerations for Performance and Safety
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
How IoT Sensor Integration in 2025 is Transforming Industries Worldwide
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PDF
OpenACC and Open Hackathons Monthly Highlights July 2025
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PPTX
The various Industrial Revolutions .pptx
PDF
Zenith AI: Advanced Artificial Intelligence
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
Statistics on Ai - sourced from AIPRM.pdf
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
Consumable AI The What, Why & How for Small Teams.pdf
PPTX
Modernising the Digital Integration Hub
PDF
Getting started with AI Agents and Multi-Agent Systems
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
TEXTILE technology diploma scope and career opportunities
Custom Battery Pack Design Considerations for Performance and Safety
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
How IoT Sensor Integration in 2025 is Transforming Industries Worldwide
NewMind AI Weekly Chronicles – August ’25 Week III
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
OpenACC and Open Hackathons Monthly Highlights July 2025
A contest of sentiment analysis: k-nearest neighbor versus neural network
The various Industrial Revolutions .pptx
Zenith AI: Advanced Artificial Intelligence
Final SEM Unit 1 for mit wpu at pune .pptx
Statistics on Ai - sourced from AIPRM.pdf
sustainability-14-14877-v2.pddhzftheheeeee
Developing a website for English-speaking practice to English as a foreign la...
A proposed approach for plagiarism detection in Myanmar Unicode text
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Consumable AI The What, Why & How for Small Teams.pdf
Modernising the Digital Integration Hub
Getting started with AI Agents and Multi-Agent Systems

Introduction to Cryptography