KEMBAR78
Cryptographicalgorithms | PPT
Cryptographic Algorithms By:  Kirti Chawla
Introduction Classification Algorithms Vis-à-Vis Looking back What is a Cipher or Crypto-algorithm ? A method or system for transforming given information in order to conceal its meaning.
Introduction Classification Algorithms Vis-à-Vis Looking back Transposition ciphers Prologue Substitution ciphers Transposition  Substitution  Computers Can Only Execute Answers CCOEAoan xnmnlesp _ycwu__u et__tre_ _ess____ Computers Can Only Execute Answers Frpsxwhuv Fdq Rqob Hahfxwh Dqvzhuv
Introduction Classification Algorithms Vis-à-Vis Looking back Algorithms Genealogy Algorithms Ciphers Authenticators Asymmetric Symmetric DES\3DES AES IDEA RC6 BlowFish … … … RSA ELGAMAL … SHA MD5 …
Algorithmic Parlance Introduction Classification Algorithms Vis-à-Vis Looking back Strong Open Key-oriented
At the heart of Algorithms Introduction Classification Algorithms Vis-à-Vis Looking back Methods to do Categories Directional Behavior Anomalous  Behavior Handling Key Management Controlled Chaos Creation Deciding Operations Simple XOR Modular Arithmetic with Polynomials Relative Prime Factors S-boxes & P-boxes Inversion Data distribution/redundancy Self generation or ask from user Key organization Key protection Buffer management Padding and boundary cases State management Hash or One time PADs Bi-directionality
Deciding Operations Introduction Classification Algorithms Vis-à-Vis Looking back This is secret message This is key Axaw sa dawawt sazawcsr This is secret message X 7  + x 5  + x 2  + 1 This is key Axaw sa dawawt sazawcsr This is secret message Factorized key 1 Factorized key 2 Axaw sa dawawt sazawcsr Simple XOR Modular arithmetic with polynomials Relative prime factors
Controlled Chaos Creation Introduction Classification Algorithms Vis-à-Vis Looking back S-box P-box Inversion Data distribution/redundancy 1010 (data) 001 1010 001 1010 0101(data) 1010 001 1010 001
Key Management Introduction Classification Algorithms Vis-à-Vis Looking back Self-generation Ask from user 1010 (data) 1010 XOR 11 = 1001 0101 (data) 0101 XOR 11 = 0110 Key organization 1010 0000 1010 1111 0000 1011 (key) 1010 0000 1010  (key) Key protection 1010 0000 1010 1111 0000 1011 (key) 1010 0000 1010 1111 0000 1010 1010
Anomalous Behavior Handling Introduction Classification Algorithms Vis-à-Vis Looking back Buffer management Padding Boundary cases State management 1010 1000 0010 1100  [+] 1000 1001 = Overflow Capture of 1010 1000 0010 1100 as  plain-text from buffer on which algorithm operate If the input data or key are  not exactly fulfilling the algorithm  requirements,  lets say required input is of multiple of 2 and > 512 bit, but  user does not provide … ! U/SIGN-INT  *  U/SIGN-INT > 65536/32768 If the algorithm works in various  stages, each stage signifying a state and  regurgitating  partially (weak)  cipher-text and hence making possible ‘interleaving’… !
Directional Behavior Introduction Classification Algorithms Vis-à-Vis Looking back Hash or one time PADs Bi-directionality Use one character once only for  substitution. Destroy or delete encryption mechanism. Destroy or delete decryption mechanism. Hash differs from one time PADs in  a way of producing output. Given the single algorithm,  the enciphering and deciphering operations should be inverse of each other.  Bi-directional nature of algorithm is there, because of need to get original data back.
A  single key  for  enciphering  and  deciphering  operations. More  the  number of bits  of key,  more secure  your data. Algorithms are usually characterized as  stream  or  block  ciphers. Algorithmic  proclivity  to certain  weak  keys can create problem. Used generally for  protecting  data. Symmetric Ciphers Introduction Classification Algorithms Vis-à-Vis Looking back
One  key  for  enciphering  and another key for  deciphering   operation. More  the  distance between mutually prime nos.  ( here they are key ),  more secure  your data. Used generally for  protecting  data as well for making sure its authentication . Asymmetric Ciphers Introduction Classification Algorithms Vis-à-Vis Looking back
Hash functions gives a  fixed-length  output for a  arbitrary-length   message. Strength of algorithm is measured by  collision resistance . Uni-directionality is innate capability of authentication algorithms. Authentication is achieved by  re-computing hash  and  compared with  stored hash value . Authenticators Introduction Classification Algorithms Vis-à-Vis Looking back
Introduction Classification Algorithms Vis-à-Vis Looking back Egyptian pictorial substitution Caesar cipher Cipher cylinders Enigma DES/… algorithms

Cryptographicalgorithms

  • 1.
  • 2.
    Introduction Classification AlgorithmsVis-à-Vis Looking back What is a Cipher or Crypto-algorithm ? A method or system for transforming given information in order to conceal its meaning.
  • 3.
    Introduction Classification AlgorithmsVis-à-Vis Looking back Transposition ciphers Prologue Substitution ciphers Transposition Substitution Computers Can Only Execute Answers CCOEAoan xnmnlesp _ycwu__u et__tre_ _ess____ Computers Can Only Execute Answers Frpsxwhuv Fdq Rqob Hahfxwh Dqvzhuv
  • 4.
    Introduction Classification AlgorithmsVis-à-Vis Looking back Algorithms Genealogy Algorithms Ciphers Authenticators Asymmetric Symmetric DES\3DES AES IDEA RC6 BlowFish … … … RSA ELGAMAL … SHA MD5 …
  • 5.
    Algorithmic Parlance IntroductionClassification Algorithms Vis-à-Vis Looking back Strong Open Key-oriented
  • 6.
    At the heartof Algorithms Introduction Classification Algorithms Vis-à-Vis Looking back Methods to do Categories Directional Behavior Anomalous Behavior Handling Key Management Controlled Chaos Creation Deciding Operations Simple XOR Modular Arithmetic with Polynomials Relative Prime Factors S-boxes & P-boxes Inversion Data distribution/redundancy Self generation or ask from user Key organization Key protection Buffer management Padding and boundary cases State management Hash or One time PADs Bi-directionality
  • 7.
    Deciding Operations IntroductionClassification Algorithms Vis-à-Vis Looking back This is secret message This is key Axaw sa dawawt sazawcsr This is secret message X 7 + x 5 + x 2 + 1 This is key Axaw sa dawawt sazawcsr This is secret message Factorized key 1 Factorized key 2 Axaw sa dawawt sazawcsr Simple XOR Modular arithmetic with polynomials Relative prime factors
  • 8.
    Controlled Chaos CreationIntroduction Classification Algorithms Vis-à-Vis Looking back S-box P-box Inversion Data distribution/redundancy 1010 (data) 001 1010 001 1010 0101(data) 1010 001 1010 001
  • 9.
    Key Management IntroductionClassification Algorithms Vis-à-Vis Looking back Self-generation Ask from user 1010 (data) 1010 XOR 11 = 1001 0101 (data) 0101 XOR 11 = 0110 Key organization 1010 0000 1010 1111 0000 1011 (key) 1010 0000 1010 (key) Key protection 1010 0000 1010 1111 0000 1011 (key) 1010 0000 1010 1111 0000 1010 1010
  • 10.
    Anomalous Behavior HandlingIntroduction Classification Algorithms Vis-à-Vis Looking back Buffer management Padding Boundary cases State management 1010 1000 0010 1100 [+] 1000 1001 = Overflow Capture of 1010 1000 0010 1100 as plain-text from buffer on which algorithm operate If the input data or key are not exactly fulfilling the algorithm requirements, lets say required input is of multiple of 2 and > 512 bit, but user does not provide … ! U/SIGN-INT * U/SIGN-INT > 65536/32768 If the algorithm works in various stages, each stage signifying a state and regurgitating partially (weak) cipher-text and hence making possible ‘interleaving’… !
  • 11.
    Directional Behavior IntroductionClassification Algorithms Vis-à-Vis Looking back Hash or one time PADs Bi-directionality Use one character once only for substitution. Destroy or delete encryption mechanism. Destroy or delete decryption mechanism. Hash differs from one time PADs in a way of producing output. Given the single algorithm, the enciphering and deciphering operations should be inverse of each other. Bi-directional nature of algorithm is there, because of need to get original data back.
  • 12.
    A singlekey for enciphering and deciphering operations. More the number of bits of key, more secure your data. Algorithms are usually characterized as stream or block ciphers. Algorithmic proclivity to certain weak keys can create problem. Used generally for protecting data. Symmetric Ciphers Introduction Classification Algorithms Vis-à-Vis Looking back
  • 13.
    One key for enciphering and another key for deciphering operation. More the distance between mutually prime nos. ( here they are key ), more secure your data. Used generally for protecting data as well for making sure its authentication . Asymmetric Ciphers Introduction Classification Algorithms Vis-à-Vis Looking back
  • 14.
    Hash functions givesa fixed-length output for a arbitrary-length message. Strength of algorithm is measured by collision resistance . Uni-directionality is innate capability of authentication algorithms. Authentication is achieved by re-computing hash and compared with stored hash value . Authenticators Introduction Classification Algorithms Vis-à-Vis Looking back
  • 15.
    Introduction Classification AlgorithmsVis-à-Vis Looking back Egyptian pictorial substitution Caesar cipher Cipher cylinders Enigma DES/… algorithms