Académique Documents
Professionnel Documents
Culture Documents
Highlighted areas
Definition Types Algorithms An Example Text generation Receiver Key generation Cipher text generation Protocols Uses Conclusion
What is Cryptography?
Follows SYMMETRIC ALGORITHMS. Single key used to encrypt and decrypt. Key must be known by both parties.
Follows ASYMMETRIC ALGORITHMS. Each entity has 2 keys: private key (a secret) public key (well known)
Using Keys
Private keys are used for decrypting. Public keys are used for encrypting.
encryption plaintext ----------------- ciphertext public key decryption Ciphertext ----------------- plaintext private key
signing Plaintext --------------- signed message private key verification signed message ------------------- plaintext public key
RSA algorithm
Named for its three inventors- Rivest, Shamir, and Adleman.
1. n = p q (p & q are prime nos of equal length) 2. e randomly chosen integer. 3. f = (p-1)(q-1) 4. d = e^-1 mod f Encrypting: 5. C = P^e (mod n) Decrypting: 6. P = C^d (mod n)
Diffie-Hellman Algorithm
Designed for key exchange. Both parties create session key K.
(g^x mod p)^y mod p = (g^x mod p)^x mod p = g^xy mod p
Message Digest
Transforms a message
of any length and computes a fixed length string.
Need of Digest-
Alishas Signature
Bijay can compute the message digest himself. If the 2 message digests are identical, Bijay
knows Alisha sent the message.
Bijay
Sign with
IMAGE
encrypt using
IMAGE
decrypt using
IMAGE
IMAGE
RECEIVER
1.XOR 2.XOR
Swap
KEY GENERATION
KEY
IMAGE
MAT LAB
Algorithm
XOR
Algorithm
Alisha:
Protocols
Protocols, those are related to cryptography:SSL TLS HTTP PGP . and many more
Uses
Electronic commerce
Electronic voting
Conclusion
Cryptography has undergone tremendous development since the days it had come into existence some 4000 years ago. Developments are also taking place in the area of digital steganography, quantum cryptography, chaotic cryptosystems etc.