Introduction to
Cryptography
Lecture 1
Cryptography-Introduction
◼ Cryptography, a word with Greek origins
◼ kryptós means hidden or secret
◼ graphein means writing
◼ Cryptography - secret writing
◼ However, we use the term to refer to the
science and art of transforming messages
to make them secure and immune to
attacks.
2
Cryptography-Introduction
3
Cryptography-Introduction
4
Introduction
◼ Security is the degree of protection against
danger, damage, loss, and crime.
◼ Security as a form of protection are structures and
processes that provide or improve security as a
condition.
◼ a form of protection where a separation is created
between the assets and the threat.
◼ Related concepts
◼ Safety
◼ Continuity
◼ Reliability
5
6
Security Categorization
IT realm Political Physical realm
◼ Application ◼ Homeland security ◼ Airport security
security ◼ Human security ◼ Port
◼ Computer security ◼ International security/Supply
◼ Data security security chain security
◼ Information ◼ National security ◼ Food security
security ◼ Public security ◼ Home security
◼ Network security ◼ School security
◼ Shopping centre
security
Monetary ◼ Infrastructure
◼ Financial security security
...
◼ Aviation security
&
7
Security in IT Realm
Application Security
◼ encompasses measures taken throughout the
application's life-cycle to prevent exceptions in
the security policy of an application or the
underlying system (vulnerabilities) through flaws
in the design, development, deployment,
upgrade, or maintenance of the application.
◼ Web applications, Mobile applications
8
Security in IT Realm
Computer Security
◼ branch of computer technology known as information
security as applied to computers and networks.
◼ protection of information and property from theft,
corruption, or natural disaster, while allowing the
information and property to remain accessible and
productive to its intended users.
◼ The term computer system security means the collective
processes and mechanisms by which sensitive and
valuable information and services are protected from
publication, tampering or collapse by unauthorized
activities or untrustworthy individuals and unplanned
events respectively. 9
Security in IT Realm
Data Security
◼ the means of ensuring that data is kept safe from
corruption and that access to it is suitably controlled.
◼ Thus data security helps to ensure privacy.
◼ It also helps in protecting personal data.
Methods
◼ Disk Encryption
◼ Hardware based Mechanisms for Protecting Data
◼ Backups
◼ Data Masking
◼ Data Erasure
10
Security in IT Realm
Information Security
◼ protecting information and information systems from
unauthorized access, use, disclosure, disruption,
modification, perusal, inspection, recording or
destruction.
Key Concepts
◼ Confidentiality
◼ Integrity
◼ Availability
◼ Authenticity
◼ Non-repudiation
11
Security Concepts
◼ Assurance - assurance is the level of guarantee that a
security system will behave as expected
◼ Countermeasure - a countermeasure is a way to stop a
threat from triggering a risk event
◼ Defence in depth - never rely on one single security
measure alone
◼ Exploit - a vulnerability that has been triggered by a
threat - a risk of 100%
◼ Risk - a risk is a possible event which could cause a loss
◼ Threat - a threat is a method of triggering a risk event
that is dangerous
◼ Vulnerability - a weakness in a target that can potentially
be exploited by a threat security 12
Security Trends
◼ The trend in Internet-related vulnerabilities reported to
Computer Emergency Response Team (CERT)
Coordination Centre (CERT/CC) include
◼ security weaknesses in the operating systems of attached
computers (e.g., Windows, Linux)
◼ vulnerabilities in Internet routers and other network devices.
◼ Security-related incidents reported to CERT include
◼ denial of service attacks; IP spoofing, in which intruders
create packets with false IP addresses and exploit
applications that use authentication based on IP;
◼ various forms of eavesdropping and packet sniffing, in
which attackers read transmitted information, including
logon information and database contents. 13
Security Trends
https://iq.govwin.com/neo/marketAnalysis/view/530
14
Security Trends
https://www.statista.com/statistics/677015/number-
cyber-incident-reported-usa-gov/ 15
https://economictimes.indiatimes.com/tech/ites/over-53000-
cyber-security-incidents-observed-in-
2017/articleshow/62852008.cms
16
https://inc42.com/buzz/3-94-lakh-cybersecurity-
incidents-in-2019-as-per-cert-data-meity/
17
https://economictimes.indiatimes.com/tech/internet/view-make-
cert-in-liable-to-notify-victims-of-
cyberattacks/articleshow/71998076.cms
18
https://cio.economictimes.indiatimes.com/news/digital-
security/cert-in-is-warning-about-new-tycoon-virus-
targeting-your-pc/76742908
19
https://timesofindia.indiatimes.com/gadgets-news/cloud-
based-cyber-attacks-increased-630-globally-between-
january-to-april-this-year-report/articleshow/76036079.cms
20
https://www.firstpost.com/business/coronavirus-outbreak-
bse-cautions-market-intermediaries-against-malicious-
cyber-attacks-8247181.html
21
References
◼ Chapter 1 - Behrouz A Forouzan, Debdeep
Mukhopadhyay, Cryptography and Network
Security, Mc Graw Hill, 3rd Edition, 2015.
◼ Chapter 1 - William Stallings, Cryptography
and Network Security Principles and
Practices, 7th Edition, Pearson Education,
2017.
◼ CERT-INDIA. https://cert-in.org.in/
22