19CSE331 Cryptography 3-0-0-3
Introduction to
Cryptography
Lecture - 1
Definition
• Cryptography comes from Greek word
“crypto” means hiding
and “Graphy” means writing
• It is an ancient art and science of writing in
secret message.
• It is the art of achieving security by
encoding messages to make them non
readable using mathematics
Terminologie
s
Cryptanalysis(from the Greek kryptós, "hidden", and
analýein,"to loosen“ )
Is the study of analyzing information system in
order to study the hidden aspects of the systems.
Breaking “secret codes”
Cryptology (from Greek kryptós, "hidden, secret“,
and logia,"study“)
Is the study of cryptography and cryptanalysis
The art and science of making and breaking
“secret codes”
Terminologies
unintelligiblecontd..
Encryption Is the process of transforming information so it is
to anyone but the intended
Decryption recipient.
Is the process of transforming encrypted
Plain text/ information so that it is intelligible again.
Clear text The message to be transmitted or stored.
Cipher text The disguised message or encrypted message
Algorithm The mathematical formula/function/procedure used
for encryption and decryption
Key Value(secret) used by algorithm to encrypt and
decrypt
Cryptosyste
• m techniques and their
An implementation of cryptographic
accompanying infrastructure to provide information
security services.
• Also referred to as a Cipher System.
• Various components of a basic cryptosystem are as follows
−
– Plaintext
– Encryption Algorithm
– Ciphertext
– Decryption Algorithm
– Encryption Key
Process of
Cryptography
Purpose of
Authentication Cryptography
–The process of proving one's identity.
Confidentiality
–Ensuring that no one can read the message
except the intended receiver
–Data is kept secret from those without the
proper credentials, even if that data travels
through an insecure medium
Purpose of Cryptography
Integrity contd..
–Assuring the receiver that the received message has
not been altered in any way from the original.
Non-repudiation
–A mechanism to prove that the sender really sent
this message
Application of
• Secure communication
Cryptography
– To prevent eavesdropping in communication and
business transactions.
• Identification & Authentication
– Checking the integrity
• Secret sharing / data hiding
– Hide something that has been written.
• E-commerce / E-payment
• Certification
– Certification is a scheme by which trusted agents such
as certifying authorities guarantee for unknown
users.
Application of
• Key recovery Cryptography
– It is a technology that allows a key to be revealed under
certain circumstances without the owner of the key revealing
it.
• Remote access
– Passwords gives a level of security for secure access.
• Access control
– Regulate access to satellite and cable TV
Cryptographic
System
Characteristics
• The type of operations used for transforming
plaintext to cipher text.
• The number of keys used
• The scheme using which the plaintext is processed.
Types of
• Cryptography
Secret –key Cryptography(Symmetric key cryptography)
– Single key is used for both encryption and decryption.
• Public key Cryptography(Asymmetric key cryptography)
– Uses one key for encryption and another for decryption.
• Hash function
– It uses a mathematical transformation to irreversibly
“encrypt” information.
Crypto Talkin
g
Talking
to
core to Bob
Alice
Alice
Secret key Bob
establishment:
attacker???
Secure k m1
k
communication:
m2
confidentiality and integrity
What cryptography can
Digital signatures do ?
Anonymous communication
Anonymous digital cash and much more….
–Can I spend a “digital coin” without anyone knowing who I am?
–How to prevent double spending?
Who was
1$ Alice Internet that?
(anon.
comm.)
Things to
Cryptography is: remember
–A tremendous tool
–The basis for many security mechanisms
Cryptography is not:
–The solution to all security problems
–Reliable if not implemented and used properly
Quiz – 1
[CO01]
1. Enciphering refers to the process of converting ------------- into ----
-------
2. “oorinvruasc” is an example------------------- text.
3. Cryptanalysis is a method of ----------- without knowing -------
4. Alice suggested that she wants to send a secret text “hello” to
Bob. Sue suggested her to send the text as “oelhl” and Ria
suggested her to send the text as “IFMMP”. Which of these
suggestions offer better security? Why?
Self Explore
[CO01]
5.When a transaction is performed using credit/debit card which
type of cryptographic algorithm is used? Justify.
6.Solve the crossword
Down
1.Put into code (8)
2.Cipher Creators need this (3)
4. The right to use something(6)
Across
3. Security flaw leads to this(9)
5. Secret Code(6)
Self explore…
[CO01]
•Which type of Cryptography is used in systems to authenticate
users during login into Linux?
•What mechanism is used by whatsapp, one of the popular
social media, to secure communication?
•Can you quote a recent security failure/breach incident that
caused a great damage in cyberspace. [Include proper citations]
•What is linear and differential cryptanalysis? [Record your
findings in the class notebook]
Thank you ALL..