Vous êtes sur la page 1sur 16

Source: http://thumbs.dreamstime.com/z/cryptography-word-cloud-10082794.

jpg

What is cryptography ?
A Simple Example

Cat

Dbu

Tiger

Ujhfs

Come to OAT after 5


I will be waiting

hello

Dpnf up PBU bgufs 6


J xjmm cf xbjujoh

???

What is cryptography ?

The art and science of concealing the messages to introduce secrecy in


information security is recognized as cryptography.

Basic elements in cryptography are:

Hello

Plain Text

Increase each
letter by 3

key
Encryption System /
Cryptosytem

Khoor

Cipher Text

History

1900 B.C. - non-standard hieroglyphics

Julius Caesar and Caesar cipher

World War I

World War II

Source: http://www.ancient-egypt-online.com/images/hieroglyphs.jpg

Classical Cryptography

It manipulates traditional characters, i.e., letters and digits


directly.

It is mainly based on security through obscurity

It requires the entire cryptosystem for communicating


confidentially.

Examples:

Caesar Cipher

Substitution Cipher

Caesar Cipher

The earlier Roman method of cryptography

It relies on shifting the letters of a message by an agreed number

The recipient of this message would then shift the letters back by the
same number and obtain the original message.

Source: http://1.bp.blogspot.com/-1L0BHN4Qr0s/UieG2heAOI/AAAAAAAAAGg/Hop2r1Lg0yo/s1600/caesar.png

Substitution Cipher
ABCDEFGHIJKLMNOPQRSTUVWXYZ
QWERTYUIOPASDFGHJKLZXCVBNM
Attack at dawn
Qzzqea qz rqvf

Caesar cipher broken: Brute Force Attack

In this method, the attacker tries to determine the key by attempting all
possible keys.

Use of computer programs, called brute forcers

Captcha- Completely Automated Public Turing test to tell


Computers and Humans Apart

Substitution Cipher broken

Frequency analysis is the study of letters or groups of letters contained in a


cipher text

The English language have certain letters and groups of letters appear in
varying frequencies.

Source: http://crypto.interactive-maths.com/uploads/1/1/3/4/11345755/5749995_orig.jpg

Modern Cryptography

It operates on binary bit sequences.

It relies on publicly known mathematical algorithms for coding the


information.

Secrecy is obtained through a secrete key which is used as the seed for
the algorithms.

Modern Cryptography can be broadly divided as

Secret key cryptography

Public key cryptography

Secret Key Cryptography

It uses same key for encryption and decryption.

Secrecy of private key is necessary.

Source: https://maketecheasier-holisticmedia.netdnassl.com/assets/uploads/2013/09/aboutencryption-asymmetric.png

Public Key Cryptography

It uses different keys for encryption and decryption.

Public key know to all

Private key known only to you

Secrecy of only private key is necessary.

Source: https://maketecheasier-holisticmedia.netdnassl.com/assets/uploads/2013/09/aboutencryption-asymmetric.png

https (Secure http)

HTTP generally transmits data in plaintext.

Anyone that could intercept the message could plainly read the data.

This can include passwords, credit card data, and other sensitive
information

HTTPS uses of public key encryption for all communications between


the client and server.

Other Applications

Telecom Companies
ATM

Television Encryption

Online banking

References
1. Ella Deon Lackey, (2012), Encryption and Decryption, https://
developer.mozilla.org/en-US/docs/Archive/Security/Encryption_and_Decryption
2. Ella Deon Lackey, (2012), Introduction to Public-Key Cryptography,
https://developer.mozilla.org/en-US/docs/Archive/Security/Introduction_to_PublicKey_Cryptography
3. Christof Paar and Jan Pelzl, Understanding Cryptography, Springer, 2010 Edition
4. http://www.tutorialspoint.com , Modern Cryptography
5. http://www.tutorialspoint.com , Attacks on Cryptosystems

Any Questions ?

Vous aimerez peut-être aussi