Académique Documents
Professionnel Documents
Culture Documents
S.VINILA KUMARI
DEPT.OF COMPUTER SCIENCE
SRI VSSC GOVT.DEGREE COLLEGE
SULLURPET
Outline
Introduction
Cryptography Issues
Cryptography Functions
Cryptography Algorithms
New Trends in Cryptography
Conclusion
References
Introduction
Cryptography definition
Net work and Security Risks
Cryptography Principles
Cryptography Issues
Confidentiality
Integrity
Non-repudiation
Authentication
Cryptography Functions
Hash Functions
Secret - Key Cryptography
Public Key Cryptography
Hash Function
Eg:
For example Bob received a hash
value of 17 and decrypted a
message Alice had sent as
you are being followed use
back roads, hurry
Hashing algorithm will multiply the
number of as, es and hs in the
message and will then add the
number of os to this value.
(3x4x1)+4=16
Which is different from the value 17
that Alice sent
Eg:
meet me at the roadhouse at noon urgent
If Alice and Bob agree on a key of 5, the cipher text of Alices message will be
meehannearotutetounrttasogmhdeoe
Meetm
Eatth
Eroad
House
Atnoo
Nurge
nt
Cryptography Algorithms
Substitution Cipher
Transposition Cipher
The DES Algorithm
The RSA Algorithm
Substitution Ciphers
Transposition Cipher
Transposition Cipher
In a columnar transposition, the
message is written out in rows of a
fixed length, and then read out
again column by column, and the
columns are chosen in some
scrambled order.
Eg: ZEBRAS is of length 6 and
6
W
I
R
E
E
3
E
S
E
A
2
A
C
D
T
4
R
O
F
O
1
E
V
L
N
5
D
E
E
C
2.
Encrypting a message
3.
Decrypting a message
Compute Cd (Mod N) = M
Quantum Cryptography
Next Generation
Communications are
transmitted by assigning digital
zero or one signal to each
photon or so called grains of
light
The signals are expressed the
strength and weak of the light
The information carried by
photons is instantly broken if
the communication is observed
Conclusion
References
>