Académique Documents
Professionnel Documents
Culture Documents
Keerthana.J
(060341039)
Topics Covered
Types of Attacks
Cryptography
Traditional methods
Symmetric and Public-Key Algorithms
Digital Signatures
Certificates
Cryptography with PHP
Types of Threat in Internet
1) Substitution Ciphers
a b c d e fghi j k l mno pqr s t u vwx y z
KEY: QWERTYUIOPASDFGHJKLZXCVBNM
Plaintext : attack
Ciphertext : QZZQEA
2)Transposition Cipher
M E G A B U C K (KEY)
7 4 51 2 8 3 6
t r an s f e r
o n em i l l I
o n t o a cc o
u n t s i x t w
w ot w o
Plaintext : transferonemilliontoaccountsixtwotwo
Ciphertext : nmoswsiaioelctrnnnoaetttrlowtoouwflcx
Symmetric-Key Algorithms
Traditional Vs Symmetric-Key
It uses the same key for encryption and
decryption
The key is called the secret key.
Drawback of Symmetric-key algorithms
Examples : Data Encryption Standard
Symmetric-Key Signatures
It has a central authority that knows everything
and whom everyone trusts.
Drawback is everyone has to believe in the third
party and he gets to read all the signed
messages.
Public-Key Signatures
These drawbacks are solved in this kind of
signatures.
Any public-key algorithm can be used for digital
signatures.
Working of Public-Key Signatures
Certificates
PlainText : Password
Encrypted Text :
3f13fa96ed14d842519897db6810aa7
Symmetric Encryption
PHP provides several algorithms for
symmetric encryption in the mcrypt
library. It also provides the mcrypt_ecb
function to implement the algorithms of
the mcrypt library.
Asymmetric Encryption