Sunteți pe pagina 1din 27

Can You Recognize ?

130 13042 13401 8501 115 3528 416 17214 6491 11310 18147 18222 21560
10247 11518 23677 13605 3494 14936 98092 5905 11311 10392 10371 0302
21290 5161 39695 23571 17504 11269 18276 18101 0317 0228 17694 4473
22284 22200 19452 21589 67893 5569 13918 8958 12137 1333 4725 4458
5905 17166 13851 4458 17149 14471 6706 13850 12224 6929 14991 7382
15857 67893 14218 36477 5870 17553 67893 5870 5454 16102 15217 22801
17138 21001 17388 7446 23638 18222 6719 14331 15021 23845 3156 23552
22096 21604 4797 9497 22464 20855 4377 23610 18140 22260 5905 13347
20420 39689 13732 20667 6929 5275 18507 52262 1340 22049 13339 11265
22295 10439 14814 4178 6992 8784 7632 7357 6926 52262 11267 21100
21272 9346 9559 22464 15874 18502 18500 15857 2188 5376 7381 98092
16127 13486 9350 9220 76036 14219 5144 2831 17920 11347 17142 11264
7667 7762 15099 9110 10482 97556 3569 3670
Zimmermann Telegram
By aurther Zimmermann,
Foreign Secretary of the German Empire, 1917
Prateek Sharma
Cryptography

Cryptography
The art/ science of devising ciphers.

Cryptanalysis
The art/ science of breaking the ciphers.

Cryptology
Both cryptography & cryptanalysis are collectively known as cryptology.
Encryption
The sender transforms the original information to another form &
sends the resulting unintelligible message out over the network.

Decryption
Reverses the encryption process in order to transform the message
back to its original form.

Annotation:
 The study & practice of encryption is called the science of Cryptography (US)/
Cryptology (Netherland).
 Both encryption & decryption are processes.
 Cryptology ( cryptography & cryptanalysis) is an art/ science.
The Encryption Model

Passive Active
intruder Intruder intruder
just listens can alter
msg.

Encryption Decryption
method/ Cipher method/
Plaintext, text Plaintext,
algorithm algorithm
P P
C = EK(P)

Encryption Decryption
Key Key
Notational relation b/w plaintext, cipher text & keys

DK {EK (P)}=P
Where,
P = plaintext
C = cipher text obtained by encrypting plain text, C = EK(P)
EK (P) = Encryption of plaintext P using key K.
DK (P) = Decryption of the cipher text.
Conventional
Public Key
Methods
Methods

Encryption/
Decryption
Methods
Character Level Bit Level
Encryption Encryption (2)
(1)
Mono- alphabetic Encoding/
Conventional Encryption
Decoding
Public Key
Algorithm Methods
Methods
Poly- alphabetic
Permutation
Encryption
Algorithm

Character Transpositional Substitution


DES
Level Encryption
Encryption
Product

X-OR
Bit Level RSA
Encryption Encryption
Rotation
Mono- alphabetic Encryption Algorithm
Sender Receiver

KE = 3 KD = 3
DEAR Add GHDU Subtract DEAR
Plaintext KE Cipher text KD Plaintext
Encryption Decryption
Algorithm Algorithm
Poly- alphabetic Encryption Algorithm
Sender Receiver

KE = Position KD = Position
DEAR Add EGDV Subtract DEAR
Plaintext KE Cipher text KD Plaintext
Encryption Decryption
Algorithm Algorithm
Transpositional Encryption
KE = KD

Encryption 1 2 3 4 5 6 Decryption
6 4 2 3 1 5

1 2 3 4 5 6 1 2 3 4 5 6 1 2 3 4 5 6
A T R U E U T R E A A T R U E
F R I E N D N I E R D F F R I E N D

Plaintext Cipher text Plaintext


Transpose Transpose
Encryption Decryption
Sender Receiver
Algorithm Algorithm
Encoding / Decoding

Input Output Input Output


00  0001 0001  00
01  0010 0010  01
10  0100 0100  10
11  1000 1000  11

2 X 4 Decoder 4 X 2 Encoder

 An Decoder changes an I/P of n bits into an O/P of 2^n bits.


 An Encoder has 2^n bits I/P & n bits O/P.
Permutation (P- Boxes)
Input Input Input
1 0 1 0 1 1 0 0 0 1 1 1 0 1 1

1 1 0 0 0 1 1 1 0 1 0 1 1 1
Straight Permutation Compressed Permutation Expanded Permutation

Number of bits in I/P & O/P Number of bits is increased


are preserved; only Number of bits is reduced
(some bits are repeated).
positions are interchanged.

P- Boxes: Permutation units which can easily be made as H/w circuits with internal wiring.
Substitution (S- Boxes)
2 X 4 Decoder
Substitution of n bits by
another n bits can be achieved
using a combination of P-Boxes,
encoders, & decoders.
P- box
Input Output
00  01 S- box
01  00
10  11 4 X 2 Encoder
11  10
Product

P- boxes

A product is a S- boxes
combination of
P- boxes & S- boxes
P- boxes

S- boxes
Exclusive OR

0 1 1 0 0 1 1 1 8– bit plaintext
Sender 1 1 0 1 1 0 0 1 Key
1 0 1 1 1 1 1 0 8– bit cipher text

1 0 1 1 1 1 1 0 8– bit cipher text


Receiver 1 1 0 1 1 0 0 1 Key
0 1 1 0 0 1 1 1 8– bit plaintext
Rotation
Ptext 0 1 1 0 0 0 1 1 Before

1 0 1 1 0 0 0 1 After one rotation

1 1 0 1 1 0 0 0 After two rotation

Ctext 0 1 1 0 1 1 0 0 After three rotation


Data Encryption Standards (DES)
Key (56 bits)

Sub key Generator


K1 K2 Sub Keys K16
(Each 48 bits)
Transposition

Transposition
...

Swapping
Complex

Complex

Complex
Cipher
Plain Text
Text
64 bits 64 bits
1 2 3 17 18 19
 The algorithm encrypts 64 bit plaintext using 56 bit key.
 Steps 2 & 17 are very complex. Each step is a combination of transposition,
substitution , swapping, X- OR, & rotation.
Public Key Encryption (RSA- Rivest, Shamir, Aldeman)
Customer 1

Public Key

Private Key
Customer 2

Public Key

..
Customer n
.. Bank

Public Key  Each user has same encryption algo. & key.
 The decryption algo. & key are kept secret.
Limitations of Conventional Methods
Sender Receiver
KE = 3 KD = 3
DEAR Add GHDU Subtract DEAR
Plaintext KE Cipher text KD Plaintext
Encryption Decryption
Algorithm Algorithm

 Both algorithms (encr. & decr) uses the same key.

 Anyone who knows the encryption algorithm & key can deduct the decryption
algorithm, e.g. reasoning questions in various examinations.

 If we consider the case of bank accounts for remote customers, millions of


algorithms are required for individual customers.

 The decryption algorithm is just the inverse of the encryption algorithm.


Advantages of Public Key Methods

 The decryption algorithm is not the inverse of encryption algorithm.

 Every user have the same encryption algorithm & key.

 The decryption algorithm & key are kept secret.

 Anyone can encrypt information, but only an authorized receiver can decrypt it.
Applications of Cryptography

 Defense.
 Diplomatic corps.
 Diarists.
 Lovers.
 Security of ATM cards.
 Computer passwords.
 Electronic commerce.
 Framing reasoning questions.
Enjoy the scenic beauty at Joox Islands…
Joox Islands…
If
ABCDEFGHIJKLMNOPQRSTUVWXYZ
Is
ZYXWVUTSRQPONMLKJIHGFEDCBA

Then,
X I B K G LT I Z K S B
leads to
Fortifying Network Securities

Thank You

S-ar putea să vă placă și