Module-1 Part-3 Cryptography

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 15

MODULE - 1

PART – 3: CRYPTOGRAPHY
• Cryptology is the science of secret messages. Therefore, anything that
has to do with making or breaking codes falls into cryptology's domain.

Cryptology = Cryptography + Cryptanalysis

• Cryptography is the study and practice of techniques for secure


communication in the presence of third parties called adversaries.
• In Cryptography, Cryptosystem is a suite of cryptographic algorithms
needed to implement a particular security service, most commonly for
achieving confidentiality.
• Cryptanalysis is used to breach cryptographic security systems and gain
access to the contents of encrypted messages.
• A simple model of a cryptosystem that provides confidentiality to the
information being transmitted is shown below.
The various components of a basic cryptosystem are as follows.
• Plaintext. It is the data to be protected during transmission.
• Encryption Algorithm. It is a cryptographic algorithm that takes plaintext and an
encryption key as input and produces a ciphertext.
• Encryption Key. It is a value that is known to the sender. The sender inputs the
encryption key into the encryption algorithm along with the plaintext in order to
compute the ciphertext.
• Ciphertext. It is the scrambled version of the plaintext produced by the
encryption algorithm using a specific the encryption key. The ciphertext is not
guarded. It flows on public channel.
• Decryption Algorithm. It is a cryptographic algorithm that takes a ciphertext and
a decryption key as input, and outputs a plaintext.
• Decryption Key. It is a value that is known to the receiver. The receiver inputs
the decryption key into the decryption algorithm along with the ciphertext in
order to compute the plaintext.
Fundamentally, there are two types of cryptosystems as shown.
Symmetric Cryptosystem (Secret Key Cryptosystem)
• The encryption process where same keys are used for encrypting and decrypting
the information is known as Symmetric Encryption.
• The study of symmetric cryptosystems is referred to as Symmetric Cryptography.
Asymmetric Cryptosystem (Public Key Cryptosystem)
• The encryption process where different keys are used for encrypting and
decrypting the information is known as Asymmetric Encryption. Though the keys
are different, they are mathematically related.
• Study of asymmetric cryptosystems is referred to as Asymmetric Cryptography.
Cryptographic Hash Function
• A cryptographic hash function is an algorithm that takes an arbitrary
amount of data input and produces a fixed-size output called the hash
value, hash, or message digest.
• There is no practical way to recover the input from the output, hence, it is
also called one-way function.
• Also, two or more different inputs may result in same output. How will you
know which is the correct input?
• Common Hash algorithms are:
1. Message Digest 5 (MD5)
2. Secure Hash Algorithm 1 (SHA-1)
3. Secure Hash Algorithm 2 (SHA-2)
Applications of Hash Functions (Password Storage)
Applications of Hash Functions (Confidentiality + Integrity + Authenticity)
Applications of Hash Functions (Integrity + Authenticity)
Digital Signature
Message Authentication Code
HASH vs MAC vs DIGITAL SIGNATURE
THANK YOU

You might also like