35
CRYPTOGRAPHY SANDHIYA S RANJTHA B

Cryptography

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: Cryptography

CRYPTOGRAPHY

SANDHIYA SRANJTHA B

Page 2: Cryptography

CRYPTOGRAPHIC TERMINOLOGY

• PLAIN TEXT: The format of the data before encrypted.

• CIPHER TEXT: The scrambled format of data after being encrypted.

• ENCRYPTION: Method of transforming plain text into an unreadable format.

• DECRYPTION: Method of obtaining the encrypted text into plain text.

Page 3: Cryptography

What is Cryptography

The art of protecting information by transforming it (Encrypting it) into an unreadable format, called Cipher text, only those who posses a secret key can Decipher or (Decrypt) the message into Plain text.

Page 4: Cryptography
Page 5: Cryptography

WHY WE NEED A CRYPTOGRAGHY

• For confidentiality

• For authentication

• For data integrity

Page 6: Cryptography

BASIC CONCEPT OF CRYPTOGRAPHY

Page 7: Cryptography
Page 8: Cryptography

SYMMETRIC KEY ENCRYPTION

Page 9: Cryptography

TYPES OF SYMMETRIC

ENCRYPTION oSUBSTITUTION CIPHERoTRANSPOSTION CIPERoVERNAM CIPER

Page 10: Cryptography
Page 11: Cryptography
Page 12: Cryptography

A- 0B- 1C- 2D- 3E- 4F- 5G- 6H- 7I- 8J- 9K- 10L- 11M-12N- 13O- 14P- 15Q- 16R- 17S- 18T- 19U- 20V- 21W-22X- 23Y- 24Z- 25

Page 13: Cryptography
Page 14: Cryptography

PUBLIC /PRIVATE KEY

• A public key known to everyone • private or secret key known only to the

recipient of the message• When John wants to send a secure

message to Jane, he uses Jane's public key to encrypt the message. Jane then uses her private key to decrypt it.

Page 15: Cryptography

ASYMMETRIC KEY ENCRYPTION

Page 16: Cryptography

TYPES OF ASYMMETRIC ALGORITHMS

DIFFIE-HELLMANRSAEI GAMALELLIPTIC CURVE CRYPTOGRAPHY(ECC)

Page 17: Cryptography

DIFFIE-HELLMAN METHOD

Alice and Bob were communicating each other via mail

Eve trying to hack the message To avoid hacking they are using

DIFFIE-HELLMAN METHOD

Page 18: Cryptography

EXAMPLE FOR DIFFIE-HELLMAN METHOD

alice Bob

Eve

Page 19: Cryptography

EXAMPLE FOR DIFFIE-HELLMAN METHOD

Alice Bob

Eve

Page 20: Cryptography

EXAMPLE FOR DIFFIE-HELLMAN METHOD

Alice Bob

Eve

Page 21: Cryptography

EXAMPLE FOR DIFFIE-HELLMAN METHOD

Alice Bob

Eve

Page 22: Cryptography

EXAMPLE FOR DIFFIE-HELLMAN METHOD

Alice Bob

Eve

Page 23: Cryptography

Alice Bob

Eve

EXAMPLE FOR DIFFIE-HELLMAN METHOD

Page 24: Cryptography

EXAMPLE FOR DIFFIE-HELLMAN METHOD

Eve

Page 25: Cryptography

Alice Bob

Eve

EXAMPLE FOR DIFFIE-HELLMAN METHOD

Page 26: Cryptography

EXAMPLE FOR DIFFIE-HELLMAN METHOD

Alice Bob

Eve

3xmod 17

3xmod 17

3xmod 17

Page 27: Cryptography

EXAPLE FOR DIFFIE-HELLMAN METHOD

Alice Bob

Eve

3xmod 17

3xmod 17

3xmod 17

Random Number=15Random Number=13

Page 28: Cryptography

EXAMPLE FOR DIFFIE-HELLMAN METHOD

Alice Bob

Eve

3xmod 17

3xmod 17

3xmod 17

Random Number=15Random Number=13

315 mod 17=6313mod 17=12

Page 29: Cryptography

Alice Bob

Eve

3xmod 17

3xmod 17

3xmod 17

Random Number=15Random Number=13

315 mod 17=6 12 = 313mod 17

6

6

12

12

EXAMPLE FOR DIFFIE-HELLMAN METHOD

Page 30: Cryptography

Alice Bob

Eve

3xmod 17

3xmod 17

3xmod 17

Random Number=15Random Number=13

315 mod 17=6 12 = 313mod 17

6

6

12

12

1215mod 17=10 613mod17=10

EXAMPLE FOR DIFFIE-HELLMAN METHOD

Page 31: Cryptography

Alice Bob

Eve

3xmod 17

3xmod 17

3xmod 17

Random Number=15Random Number=13

315 mod 17=6 12 = 313mod 17

6

6

12

12

1215mod 17=10 613mod17=10

36mod17=15312mod17=4

EXAMPLE FOR DIFFIE-HELLMAN METHOD

Page 32: Cryptography
Page 33: Cryptography
Page 34: Cryptography
Page 35: Cryptography