Vous êtes sur la page 1sur 21

THE ROLE OF CRYPTOGRAPHY IN

SECURE DATA TRANSMISSION

S.VINILA KUMARI
DEPT.OF COMPUTER SCIENCE
SRI VSSC GOVT.DEGREE COLLEGE
SULLURPET

Outline

Introduction
Cryptography Issues
Cryptography Functions
Cryptography Algorithms
New Trends in Cryptography
Conclusion
References

Introduction

Cryptography definition
Net work and Security Risks

Denial of Service attack


Virus
Trojan Horse
Worm

Cryptography Principles

Cryptography Issues

Confidentiality
Integrity
Non-repudiation
Authentication

Cryptography Functions

Hash Functions
Secret - Key Cryptography
Public Key Cryptography

Hash Function
Eg:
For example Bob received a hash
value of 17 and decrypted a
message Alice had sent as
you are being followed use
back roads, hurry
Hashing algorithm will multiply the
number of as, es and hs in the
message and will then add the
number of os to this value.
(3x4x1)+4=16
Which is different from the value 17
that Alice sent

Secret Key Cryptography

Eg:
meet me at the roadhouse at noon urgent
If Alice and Bob agree on a key of 5, the cipher text of Alices message will be
meehannearotutetounrttasogmhdeoe
Meetm
Eatth
Eroad
House
Atnoo
Nurge
nt

Public Key Cryptography


1) Alice writes the message
2) Bob pulls Alice's public key off a
public key server
3) Bob encrypts the message with
Alice's public key
4) Bob sends the encrypted message to
Alice
5) Alice receives the message
6) Using her private key Alice decrypts
the message

Cryptography Algorithms

Substitution Cipher
Transposition Cipher
The DES Algorithm
The RSA Algorithm

Substitution & Transposition Cipher

Substitution Ciphers

Oldest ciphers is the Caesar


cipher.
It is also called shift by 3
method.
Eg: attack becomes
DWWDFN
A mono alphabetic cipher
uses fixed substitution over
the entire message
A poly alphabetic cipher
uses a number of
substitutions at different
times in the message

Transposition Cipher

Unkeyed single transposition is one


of the simplest methods of
enciphering. For example, the
message

TIME IS OF THE ESSENCE


is inscribed in a matrix with
predetermined vertical and
horizontal components. In this
instance the plaintext is inscribed
vertically in a 3 (vertical) by 6
(horizontal) matrix.

Transposition Cipher
In a columnar transposition, the
message is written out in rows of a
fixed length, and then read out
again column by column, and the
columns are chosen in some
scrambled order.
Eg: ZEBRAS is of length 6 and

the permutation is defined by


the alphabetical order of the
letters in the keyword. In this
case, the order would be "6 3 2
4 1 5".
WE ARE DISCOVERED. FLEE
AT ONCE
EVLNACDTESEAROFODEECWIREE

6
W
I
R
E
E

3
E
S
E
A

2
A
C
D
T

4
R
O
F
O

1
E
V
L
N

5
D
E
E
C

The DES Algorithm

Protecting sensitive commercial


and unclassified data
DES works on 64 bit data at a
time
Each 64 bit data is iterated
from 1 to 16 times
8 bits for error detection and
56 bit key system for security
purposes
The unique key chosen for
particular application
Unauthorized recipients can not
derive the original data
algorithmically

The RSA Algorithm

There are three phases


1.
Determination of public and
private keys

2.

Encrypting a message

3.

Choose two large primes, P


and Q.
Compute N = P * Q.
Compute F(n) = (P - 1)(Q - 1).
Compute C = Me (Mod N)

Decrypting a message

Compute Cd (Mod N) = M

New Trends in Cryptography

Elliptical Curve Cryptography


Quantum Cryptography

Elliptical Curve Cryptography

Faster, smaller and more efficient


cryptographic keys
Generate keys elliptical curve
equation instead of product of large
prime numbers
ECC can yield a level of security
with a 164-bit key
ECC used lower computing power
and battery resource usage
ECC is based on properties of a
particular type of creation derived
from points .
Multiplying a point on the curve by
a number will produce another
number
It is easy to perform

Quantum Cryptography

Next Generation
Communications are
transmitted by assigning digital
zero or one signal to each
photon or so called grains of
light
The signals are expressed the
strength and weak of the light
The information carried by
photons is instantly broken if
the communication is observed

Conclusion

Evolution of Cryptography follow the pace


of technology closely.
Types of algorithms to estimate correct
algorithm according to our requirement
Cryptography functions is used to protect
our data at the time of transmission
New trends in cryptography is used to
transmit data fastly and easily

References

Minoli, Deniel and Minoli, Emma. Web Commerce Technology


Handbook.New Delhi, Tata Mc Graw-Hill Edition, 1999

Tanenbaum, Andrew S. Computer Networks. 3rd ed. New Delhi, Prentice-Hall of


India, 1997.
Young, Margaret Levine, The Complete Reference Internet Millennium Edition,
New Delhi, TataMcGraw-Hill Edition, 1999.
Greenlaw Raymond and Hepp Ellen. In-line/On-line: Fundamentals of the
INTERNET and the World Wide Web, New Delhi, Tata McGraw-Hill Edition, 2000.
Richard Johnsonbaugh. DISCRETE MATHEMATICS, 5th ed.N.p.: Pearson
Education Asia, 2001.
S.J, P.T.Joseph. E-Commerce An Indian Perspective, 2nd ed, New Delhi, PrenticeHall of India,2006.

Kessler Gary C. An Overview of Cryptography. 22 May 2011. 22 Sep.


2011
<http://www.aresearchguide.com/12biblio.html#23

>

Vous aimerez peut-être aussi